Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

896 results about "Key exchange" patented technology

Key exchange (also key establishment) is a method in cryptography by which cryptographic keys are exchanged between two parties, allowing use of a cryptographic algorithm. If the sender and receiver wish to exchange encrypted messages, each must be equipped to encrypt messages to be sent and decrypt messages received. The nature of the equipping they require depends on the encryption technique they might use. If they use a code, both will require a copy of the same codebook. If they use a cipher, they will need appropriate keys. If the cipher is a symmetric key cipher, both will need a copy of the same key. If it is an asymmetric key cipher with the public/private key property, both will need the other's public key.

Secure item identification and authentication system and method based on unclonable features

The present invention is a method and apparatus for protection of various items against counterfeiting using physical unclonable features of item microstructure images. The protection is based on the proposed identification and authentication protocols coupled with portable devices. In both cases a special transform is applied to data that provides a unique representation in the secure key-dependent domain of reduced dimensionality that also simultaneously resolves performance-security-complexity and memory storage requirement trade-offs. The enrolled database needed for the identification can be stored in the public domain without any risk to be used by the counterfeiters. Additionally, it can be easily transportable to various portable devices due to its small size. Notably, the proposed transformations are chosen in such a way to guarantee the best possible performance in terms of identification accuracy with respect to the identification in the raw data domain. The authentication protocol is based on the proposed transform jointly with the distributed source coding. Finally, the extensions of the described techniques to the protection of artworks and secure key exchange and extraction are disclosed in the invention.
Owner:UNIVERSITY OF GENEVA

System and method for secure communications involving an intermediary

A system and method for communicating information or a cryptographic key therefore between a first party and a second party, comprising the steps of receiving, by an intermediary, an identifier of desired information and accounting information for a transaction involving the information from the first party, transmitting an identifier of the first party to the second party, and negotiating, by the intermediary, a comprehension function for obscuring at least a portion of the information communicated between the first party and the second party. The data transmission may be made secure with respect to the intermediary by providing an asymmetric key or direct key exchange for encryption of the communication between the first and second party. The data transmission may be made secure with respect to the second party by maintaining the information in encrypted format at the second party, with the decryption key held only by the intermediary, and transmitting a secure composite of the decryption key and a new encryption key to the second party for transcoding of the data record, and providing the new decryption key to the first party, so that the information transmitted to the first party can be comprehended by it. According to the present invention, asymmetric key encryption may be employed to provide the establishment of secure communications channels involving an intermediary, without making the intermediary privy to the decryption key or the message.
Owner:RPX CORP

Encryption storage system for block chains and method for applying encryption storage system

InactiveCN106055993AStop out of capacity issuesAvoid the hassle of contactDigital data protectionKey exchangeComputer hardware
The invention provides an encryption storage system for block chains. The encryption storage system comprises file groups (S) (1), open file systems (2) and lock box devices (3). The file groups (S) are used for reducing the amounts of secret key exchange between users, differentiating file reading and writing, effectively processing and revoking access rights of the users and allowing authorization files of a distrusted server to carry out write operation; the open file systems are used for embedding encryption storage system prototypes of the block chains and comprise authentication databases; the lock box devices comprise a plurality of secrete key distribution schemes, and safety strategies and authentication mechanisms can be customized for files of each user by the aid of one of multiple client-based secret key distribution schemes. The invention further discloses a method for applying the encryption storage system for the block chains. The encryption storage system and the method have the advantages that the problem of possibly insufficient capacity of server sides due to expensive cipher computation can be solved by the aid of the encryption storage system and the method; the files can be accessed when file owners are offline, and accordingly the trouble of the requirement on contact with the corresponding file owner when each file needs to be accessed can be prevented.
Owner:SHENZHEN FANXI ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products