Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

391 results about "Key (cryptography)" patented technology

In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm. For encryption algorithms, a key specifies the transformation of plaintext into ciphertext, and vice versa for decryption algorithms. Keys also specify transformations in other cryptographic algorithms, such as digital signature schemes and message authentication codes.

System and method for delivering encrypted information in a communication network using location indentity and key tables

Access to digital data is controlled by encrypting the data in such a manner that, in a single digital data acquisition step, it can be decrypted only at a specified location, within a specific time frame, and with a secret key. Data encrypted in such a manner is said to be geo-encrypted. This geo-encryption process comprises a method in which plaintext data is first encrypted using a data encrypting key that is generated at the time of encryption. The data encrypting key is then encrypted (or locked) using a key encrypting key and information derived from the location of the intended receiver. The encrypted data encrypting key is then transmitted to the receiver along with the ciphertext data. The receiver both must be at the correct location and must have a copy of the corresponding key decrypting key in order to derive the location information and decrypt the data encrypting key. After the data encrypting key is decrypted (or unlocked), it is used to decrypt the ciphertext. If an attempt is made to decrypt the data encrypting key at an incorrect location or using an incorrect secret key, the decryption will fail. If the sender so elects, access to digital data also can be controlled by encrypting it in such a manner that it must traverse a specific route from the sender to the recipient in order to enable decryption of the data. Key management can be handled using either private-key or public-key cryptography. If private-key cryptography is used, the sender can manage the secret key decrypting keys required for decryption in a secure manner that is transparent to the recipient. As a consequence of its ability to manipulate the secret keys, the sender of encrypted data retains the ability to control access to its plaintext even after its initial transmission.
Owner:LONGBEAM TECH LLC

Song ci poetry text message hiding technology based on hybrid encryption

The invention provides a Song ci poetry text message hiding technology based on hybrid encryption, which belongs to the information hiding and data security directions in the field of computers. The Song ci poetry text message hiding technology comprises the steps of encrypting secret information to be hidden by using an advanced encryption standard (AES) in a hybrid manner, encrypting an AES secret key by using an elliptic curve cryptography (ECC) algorithm, passing all information after encryption processing through a 140 tune name template library of the complete collection of Song ci poetry, and hiding the information by means of the system which is composed of templates, a dictionary, a steganographic device and an extractor, wherein the system can generate steganographic Song ci poetry through a random selection or template designation method according to the length of a cryptograph, and the sentence length, grammatical style and intonation sentence pattern of the steganographic Song ci poetry conform to the original Song ci poetry completely, thereby achieving the purposes of obfuscating attackers and ensuring secure transmission of the hidden information. The Song ci poetry text message hiding technology disclosed by the invention can solve the security problem of data transmission in channels, can provide double security measures of information hiding and data encryption, and has high practical application value.
Owner:NANJING UNIV OF AERONAUTICS & ASTRONAUTICS

Data security authentication transmission method and device for Internet of Things terminal

ActiveCN112291230AImplement mutual authenticationImplement data encryptionUser identity/authority verificationInstrumentsKey (cryptography)Cryptographic protocol
The invention discloses a data security certification transmission method and device for an Internet of Things terminal. The method comprises the steps: presetting identification key pairs in a factory of an Internet of Things terminal, and presetting a corresponding public key matrix in an edge gateway; according to a preset identification key pair of the Internet of Things terminal and a presetpublic key matrix of the edge gateway, completing the bidirectional authentication of the Internet of Things terminal and the edge gateway, and acquiring a communication encryption/decryption key; andcompleting the encryption and decryption of transmission data between the Internet of Things terminal and the edge gateway by using the communication encryption/decryption key. And the problem that the traditional safety means is difficult to meet the Internet-of-Things scene is effectively solved. A key management system which is realized based on a public key cryptography technology and can beapplied to an Internet of Things terminal is constructed through a lightweight authentication system, online support of a third party is not needed, large-scale key generation is conveniently realized, the authentication efficiency is high, the authentication process is simple, a cryptographic protocol and a cryptographic module are realized on the basis of a national cryptographic algorithm, andthe interactive authentication and data encryption of the Internet of Things terminal are realized.
Owner:THE FIRST RES INST OF MIN OF PUBLIC SECURITY

Scatter method and system for single asymmetrical secret key pair, single-stage asymmetrical secret key pair and multistage asymmetrical secret key pair

The invention relates to a scatter method and system for a single asymmetrical secret key pair, a single-stage asymmetrical secret key pair and a multistage asymmetrical secret key pair. The method has flexibility and a superior and subordinate relation the same as those of a symmetric key method. All subordinate (including the subordinate of the subordinate and until the most subordinate) secret key pairs of any key pair can be computed as required. Since a scatter algorithm and superior and subordinate relation are predetermined, just an exclusive private key and a Hash factor are required to be kept. The invention provides an asymmetrical secret key scatter method used in an ECC public key cryptography system. The asymmetrical secret key scatter method is mainly characterized in that a scatter secret key pair can be computed just by a main secret key pair MK (d,P) and a scatter factor; the method can be used for secret key scatter of an elliptic curve cryptography (ECC) algorithm and a secret key pair SK(d, P) is acquired after the scatter is performed; the method can be used for a domestic cryptographic algorithm SM2; multistage secret key scatter is supported; the storage amount of secret key pairs can be greatly reduced and secret key pair storage and management difficulty can be greatly reduced when the method is used on occasions with a large asymmetrical secret key data size.
Owner:BEIJING JN TASS TECH

Method for conducting quantum secret key distribution on passive optical network and passive optical network

The invention discloses a method for conducting quantum secret key distribution on a passive optical network. An optical line terminal and/or an optical network terminal encrypt and decipher communication data needing transmitting on the passive optical network through a quantum secret key; and the quantum secret key is distributed through a quantum secret key distribution device. The invention further discloses the passive optical network, and a light distribution network is connected between the optical line terminal and the optical network terminal, the optical line terminal corresponds to one quantum secret key distribution device, and the optical line terminal is encrypted and deciphered through a quantum cryptography communication data. Each optical network terminal respectively corresponds to one quantum secret key distribution device, and the optical network terminal encrypts and deciphers the communication data through quantum cryptographies. The method depends on quantum mechanical properties, a quantum secret key transmitting procedure cannot be broken through, outside attacks can be easy to find, and the quantum secret key encrypts the data, achieves an encryption mode of one encryption once and guarantees absolute security of the data.
Owner:ANHUI QASKY QUANTUM SCI & TECH CO LTD

Absolute public key cryptographic system and method surviving private-key compromise with other advantages

The present invention presents a public key cryptographic system and method called Absolute Public Key Cryptography that survives private key compromise and offers two-way communication security. Communications are secured even when the private key is revealed. It provides security to the private-to-public side communications and also allows short keys to be used with mobile devices that have low processing power. The system uses keys with two or more components and encrypts a message into the same number of cipher versions. The cipher versions are delivered to the destination in source routing mode, or hop-by-hop routing mode with a small time gap. The recipient performs certain mathematical operations on all the cipher versions and obtains the original message. All the versions are necessary for obtaining the original message. Even a single version missing leads to produce a junk for an attacker. As an attacker at an intermediary IP router can not have all the cipher versions available, he can not obtain the original message even when he knows the private key. This is why the system is called Absolute Public Key Cryptography. The robustness against private key compromise is achieved by blinding the public key through adding a random number to each of its components before encryption. When the encryption process is complete, the random number is discarded and the cipher versions are delivered to the recipient. The effect of blinding is made void by the actual intended recipient, who has all the cipher versions available. Robustness is also achieved another way, that is, by choosing the encrypting key such that each of its components has a common factor with Euler Totient Function of the key modulus, and there is no common factor among all the components. This makes it harder for an attacker to decrypt a single cipher version of the message into the original message and thereby allows smaller keys to be used for mobile communications. Communication in both directions is secured by using two different key pairs, one for public-to-private-side and the other for private-to-public-side communications.
Owner:KIOBA PROCESSING LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products