MY158544A - Secured i2-keys management - Google Patents

Secured i2-keys management

Info

Publication number
MY158544A
MY158544A MYPI2011003858A MYPI2011003858A MY158544A MY 158544 A MY158544 A MY 158544A MY PI2011003858 A MYPI2011003858 A MY PI2011003858A MY PI2011003858 A MYPI2011003858 A MY PI2011003858A MY 158544 A MY158544 A MY 158544A
Authority
MY
Malaysia
Prior art keywords
keys
key
block
present
qrng
Prior art date
Application number
MYPI2011003858A
Inventor
Mohammad Firdaus Juhari
Meilana Siswanto
Gunawan Witjaksono
Zharfan Hamdan
Aizuddin Nuruddin
Original Assignee
Mimos Berhad
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mimos Berhad filed Critical Mimos Berhad
Priority to MYPI2011003858A priority Critical patent/MY158544A/en
Priority to PCT/MY2012/000158 priority patent/WO2013025091A1/en
Publication of MY158544A publication Critical patent/MY158544A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

SECURED I2-KEYS MANAGEMENT RELATES TO A SYSTEM AND METHOD FOR MANAGING KEYS IN QUANTUM MOBILE ACCESS VERIFICATION (Q-MAV) TO ENSURE INTEGRITY OF KEYS AND CONTINUITY OF OPERATION.THE Q-MAV SYSTEM OF THE PRESENT INVENTION PROVIDES SECURE MOBILE COMMUNICATION BASED ON QUANTUM RANDOM NUMBER GENERATOR (QRNG) WITH MULTI OUTPUT PROCESSOR (MOP) WHICH FUNCTIONS FOR MULTI PURPOSES OF ACCESS SYSTEM VERIFICATION AND AUTHENTICATION.THE PRESENT INVENTION COMPRISES AT LEAST ONE KEY GENERATOR (202) COMPRISING OF AT LEAST ONE QUANTUM RANDOM NUMBER GENERATOR (QRNG) WITH AT LEAST ONE MULTI OUTPUT PROCESSOR (MOP), AT LEAST ONE KEY PREPARATION BLOCK (204) TO PROCESS TRULY RANDOM INDEPENDENT IDENTICAL KEYS, I2-KEYS (FIRST I2 KEY 1 AND SECOND I2 KEY) AND IDENTIFICATION (ID) TAG, AT LEAST ONE KEY COMPARATOR BLOCK (206) FOR COMPARING I2-KEYS TO ENSURE KEYS REMAINS IDENTICAL, AT LEAST ONE ENCODER (208, 210) TO ENCODE EXTRACTED I2- KEYS AND AT LEAST ONE DATA TAGGER BLOCK (212). THE DATA TAGGER BLOCK (212) OF THE PRESENT INVENTION SYNCHRONIZES KEYS AT ACCESS SYSTEM AND ENSURES CONTINUITY OF OPERATION BY APPENDING ENCRYPTED DATA USING IDENTIFICATION (ID) TAG.
MYPI2011003858A 2011-08-17 2011-08-17 Secured i2-keys management MY158544A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
MYPI2011003858A MY158544A (en) 2011-08-17 2011-08-17 Secured i2-keys management
PCT/MY2012/000158 WO2013025091A1 (en) 2011-08-17 2012-06-28 Mobile access control system involving a quantum random number generator

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
MYPI2011003858A MY158544A (en) 2011-08-17 2011-08-17 Secured i2-keys management

Publications (1)

Publication Number Publication Date
MY158544A true MY158544A (en) 2016-10-14

Family

ID=46640087

Family Applications (1)

Application Number Title Priority Date Filing Date
MYPI2011003858A MY158544A (en) 2011-08-17 2011-08-17 Secured i2-keys management

Country Status (2)

Country Link
MY (1) MY158544A (en)
WO (1) WO2013025091A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9838385B2 (en) 2015-06-30 2017-12-05 International Business Machines Corporation Password generation based on dynamic factors
CN105024801B (en) * 2015-07-06 2017-05-17 国网山东寿光市供电公司 Quantum encryption communication method
WO2020171841A1 (en) * 2019-02-18 2020-08-27 Quantum Lock Technologies LLC Quantum random number generator lock
US10990356B2 (en) * 2019-02-18 2021-04-27 Quantum Lock Technologies LLC Tamper-resistant smart factory

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2409558B (en) * 2001-04-17 2005-08-10 Symbol Technologies Inc Trigger-operated system for electro-optically reading indicia
DE10317257A1 (en) * 2003-04-14 2004-11-04 Giesecke & Devrient Gmbh Contactless data carrier
US20040267847A1 (en) * 2003-05-13 2004-12-30 Bsi2000, Inc. Hardware random-number generator
US7646873B2 (en) * 2004-07-08 2010-01-12 Magiq Technologies, Inc. Key manager for QKD networks
US7577257B2 (en) * 2006-12-21 2009-08-18 Verizon Services Operations, Inc. Large scale quantum cryptographic key distribution network
JP4404924B2 (en) * 2007-09-13 2010-01-27 シャープ株式会社 Display system
US8407463B2 (en) * 2007-10-30 2013-03-26 Telecom Italia S.P.A. Method of authentication of users in data processing systems
EP2474931A1 (en) * 2010-12-31 2012-07-11 Gemalto SA System providing an improved skimming resistance for an electronic identity document.

Also Published As

Publication number Publication date
WO2013025091A1 (en) 2013-02-21

Similar Documents

Publication Publication Date Title
WO2010015906A3 (en) Apparatus, systems and methods for authentication of objects having multiple components
GB2534801A (en) A set of servers for "Machine-to-Machine" communications using public key infrastructure
AU2018256568A1 (en) Systems and methods for software based encryption
MX2009002509A (en) Method and system for secure processing of authentication key material in an ad hoc wireless network.
AU2012225621A8 (en) Secure file sharing method and system
PE20170656A1 (en) AUTHENTICATION OF THE SERVICE NETWORK
MX2016011988A (en) Confidential data management method and device, and security authentication mehod and system.
WO2013068843A8 (en) Multi-key cryptography for encrypting file system acceleration
WO2012096791A3 (en) Methods and systems for distributing cryptographic data to authenticated recipients
PH12018502160A1 (en) Systems and methods for secure storage of user information in a user profile
BR112014018914A8 (en) CRYPTOGRAPHIC METHOD OF AUTHENTICATION AND IDENTIFICATION WITH REAL-TIME CODING
WO2008091978A3 (en) Methods and apparatus for enhancing privacy of objects associated with radio-frequency identification tags
WO2011119300A3 (en) System and methods for remote maintenance of multiple clients in an electronic network using time-based encryption keys
WO2013009045A3 (en) Method for changing mno in embedded sim on basis of dynamic key generation and embedded sim and recording medium therefor
NO20091199L (en) Method, system and device for synchronization between server and mobile device
EP2320348A4 (en) Anonymous authentication method based on pre-shared cipher key, reader-writer, electronic tag and system thereof
WO2012146943A3 (en) Improvements for 3d design and manufacturing systems
RS20120254A1 (en) System and method for high security biometric access control
IN2014CN03915A (en)
WO2012172832A3 (en) Authenticator, authenticatee and authentication method
EP2398208A3 (en) Method for securing transmission data and security system for implementing the same
WO2013005989A3 (en) Method and apparatus for managing group key for mobile device
SG11202104530YA (en) Key management method, security chip, service server and information system
GB2498063B (en) System for checking acceptance of string by automaton
GB201217507D0 (en) Database management system