Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

176 results about "Message integrity" patented technology

Definition of: message integrity. message integrity. The validity of a transmitted message. Message integrity means that a message has not been tampered with or altered. The most common approach is to use a hash function that combines all the bytes in the message with a secret key and produces a message digest that is difficult to reverse.

Fast switching method for wireless local area network

The present invention provides a fast handoff method in a wireless Local Area Network, the method is that a line mobile node STA selects an Access Point aggregation of the Wireless Local Area Network swept the frequency; the STA performs the interaction of the unicast type detecting and authenticating information to the AP aggregation, completes an active frequency sweep process, and selects a goal AP; the STA and the goal AP are associated newly. The present invention also provides a fast handoff method by adopting the unicast type active sweep-frequency and augmenting the safety during the two stages of the re-authentication. A technical proposal provided by the present invention merges the two stages of the sweep-frequency and the re-authentication into one sweep-frequency authentication stage, and the unicast type active sweep-frequency method is also adopted, to effectively decrease the waiting time consumed in a channel and reduce the handover time delay; a Message Integrity Identifying Code is joined during the interaction of the sweep-frequency authentication information, to enhance the safety of the switch. The other technical proposal also decreases the waiting time consumed in the channel, decreases the handover time delay, and enhances the safety of the switch.
Owner:XIDIAN UNIV +1

Method and system for signing javascript object notation (JSON) messages

JSON (JavaScript Object Notation) message integrity is provided using a digital signature scheme. The digital signature scheme implements a set of processing rules for creating and representing digital signatures using a JSON signature syntax. The syntax preferably comprises a set of named elements, including a reference element, a signature information element, and a signature element. In one embodiment, a machine-implemented method for signing a JSON message begins by constructing a reference element for each data object in the JSON message to be signed. The data object is identified by a reference identifier. The reference element includes the reference identifier, a pointer (such as a URI) to a digest method, and a digest generated by applying the digest method to the data object or a given function of the data object. Then, a signature information element is constructed for one or more of the reference elements corresponding to the one or more data objects in the message that are being signed. The signature information element includes a pointer to a signature method, as well as one or more reference elements, or a canonical form of the one or more reference elements. Then, a signature element is constructed. The signature element includes the signature information element, and a signature value generated by applying the signature method (identified in the signature information element) to the signature information element. The signature element is the JSON message signature. The signature enables a sending entity (such as a Web browser or Web server) to generate a digest on all or parts of a JSON message and then to secure the digests using a signing key.
Owner:IBM CORP

DigiKey and DigiLock

The present invention discloses an improvement in conventional lock and key mechanical fastening devices. This complete electronic security system utilizes a radio standard and communications protocol such as bluetooth, asymmetric cryptography encryption algorithms for authentication, confidentiality and non-repudiation purposes such as GPG, and a magnetic lock mechanism.
A magnetic lock is mounted on the frame and can be set between locked and unlocked positions. The lock mechanism selectively blocks and unblocks the access opening depending on the authenication communication provided by both the emmiter (I.E. Cell Phone) and the magnetic lock. The receiving device (GPG de-encryptor) will be embedded inside the lock itself and will be responsible for verifying message integrity and origin by calculating the hash value of the received message and comparing it against the decoded signature (the original hash). If the hash from the emitter (IE Cell Phone) and the hash on the receiver (IE Magnetic Lock) side do not match, then the received message is not identical to the message which the sender “signed”, or the sender's identity is wrong, thus the magnetic lock device will not open, and an signal can be emitted via SMS thus allerting of an anomality.
The emmiter (I.E. Cell Phone) will be provided with a software code for it to encrypt the message signaling a lock/unlock status to the magnetic lock using his private key, then a second encryption is performed using the receiver's public key thus achieving authentication, non-repudiation, and confidentiality.
Owner:MARTINEZ DANILO JOSE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products