MY157055A - A system and method for quantum mobile access verification - Google Patents
A system and method for quantum mobile access verificationInfo
- Publication number
- MY157055A MY157055A MYPI2010005982A MYPI2010005982A MY157055A MY 157055 A MY157055 A MY 157055A MY PI2010005982 A MYPI2010005982 A MY PI2010005982A MY PI2010005982 A MYPI2010005982 A MY PI2010005982A MY 157055 A MY157055 A MY 157055A
- Authority
- MY
- Malaysia
- Prior art keywords
- mav
- key
- encryption
- keys
- data streaming
- Prior art date
Links
- 238000000034 method Methods 0.000 title abstract 4
- 238000012795 verification Methods 0.000 title abstract 4
- VJYFKVYYMZPMAB-UHFFFAOYSA-N ethoprophos Chemical compound CCCSP(=O)(OCC)SCCC VJYFKVYYMZPMAB-UHFFFAOYSA-N 0.000 abstract 2
- VLCQZHSMCYCDJL-UHFFFAOYSA-N tribenuron methyl Chemical compound COC(=O)C1=CC=CC=C1S(=O)(=O)NC(=O)N(C)C1=NC(C)=NC(OC)=N1 VLCQZHSMCYCDJL-UHFFFAOYSA-N 0.000 abstract 2
- 238000013475 authorization Methods 0.000 abstract 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
- H04L9/0662—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Theoretical Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
Abstract
THE PRESENT INVENTION PROVIDES A SYSTEM (100) FOR QUANTUM MOBILE ACCESS VERIFICATION, Q-MAV THAT GENERATES TRUE RANDOM IDENTICAL KEYS FOR ENCRYPTION AND DECRYPTION OF DATA STREAMING. THE SYSTEM (100) COMPRISES AT LEAST ONE QUANTUM RANDOM NUMBER GENERATOR, QRNG WITH AT LEAST ONE MULTI OUTPUT PROCESSOR, MOP (106); AT LEAST ONE ENCRYPTED STORAGE (102); AT LEAST ONE BIOMETRIC SYSTEM (101); AT LEAST ONE ENCRYPTION SYSTEM (107); AND AT LEAST ONE DISPLAY SYSTEM (104), CHARACTERIZED IN THAT THE AT LEAST ONE QRNG WITH AT LEAST ONE MOP (106) GENERATES TRUE RANDOM IDENTICAL KEYS, KNOWN AS TRULY RANDOM INDEPENDENT-IDENTICAL KEYS OR i2 KEYS, FOR ENCRYPTION AND DECRYPTION OF DATA STREAMING WHEREIN FIRST KEY IS USED TO ENCRYPT HARDWARE IDENTIFICATION OF Q-MAV AND AUTHORITY CODE, AND SECOND KEY IS USED TO DECRYPT ENCRYPTED DATA THAT HAS BEEN SENT TO AN ACCESS SYSTEM. ANOTHER EMBODIMENT OF THE PRESENT INVENTION PROVIDES A METHOD FOR GENERATING TRUE RANDOM IDENTICAL KEYS FOR ENCRYPTION AND DECRYPTION OF DATA STREAMING. Q-MAV SYSTEM IS FIRST ACTIVATED (402). THEREAFTER, AT LEAST ONE SECURE SERVICE AND AT LEAST ONE UN-SECURE SERVICE IS DISPLAYED AT DISPLAY OF Q-MAV (404). USERS FINGER PRINT IS SCANNED IF SECURE SERVICE IS CHOSEN BY USER (406) AND USERS FINGERPRINT IDENTIFY IS VERIFIED BY Q-MAV SYSTEM (408). SUBSEQUENTLY, LOG ERROR IS DISPLAYED AND SEVERAL MEANS IS PROVIDED TO ATTEMPT IF VERIFICATION PROCESS IS UNSUCCESSFUL (410) AND USERS ACCOUNT IS LOCKED WHEN NUMBER OF ATTEMPTS IS EXCEEDED WHEREIN Q-MAV WILL FUNCTION AS MOBILE PHONE DEVICE (412). HARDWARE IDENTIFICATION OR QMAV AND AUTHORITY CODE IS PROVIDED IF VERIFICATION WAS VERIFIED (414) AND HARDWARE IDENTIFICATION AND AUTHORITY CODE IS SENT TO ENCRYPTION SYSTEM (416). TRULY RANDOM INDEPENDENT-IDENTICAL KEYS, i2-KEYS IS GENERATED AS PIN NUMBERS BY QRNG-MOP (418) AND HARDWARE IDENTIFICATION AND AUTHORITY CODE IS ENCRYPTED USING FIRST i2-KEY (420). THEREAFTER, ENCRYPTED DATA STREAMING IS SENT TO ACCESS SYSTEM BEING USED VIA TRANSMITTER CHANNEL MEANS (422); SECOND i2-KEY IS DISPLAYED ON DISPLAY SYSTEM OF Q-MAV SYSTEM (424) AND SECOND i2-KEY IS INSERTED INTO ACCESS SYSTEM USED TO DECRYPT ENCRYPTED DATA STREAMING (426). SUBSEQUENTLY, AUTHORIZATION FROM ACCESS SYSTEM IS OBTAIN IF DECRYPTION PROCESS IS SUCCESSFUL OR THE KEY IS VALIDATED (428) AND KEY IS DELETED IF TIME FRAME IS EXCEEDED WHEREIN THE TIME FRAME IS DETERMINED BASED ON USER?S PREFERENCE (430). THE MOST ILLUSTRATIVEDRAWING IS
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| MYPI2010005982A MY157055A (en) | 2010-12-15 | 2010-12-15 | A system and method for quantum mobile access verification |
| PCT/MY2011/000163 WO2012081968A1 (en) | 2010-12-15 | 2011-06-30 | A system and method for quantum mobile access verification |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| MYPI2010005982A MY157055A (en) | 2010-12-15 | 2010-12-15 | A system and method for quantum mobile access verification |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| MY157055A true MY157055A (en) | 2016-04-29 |
Family
ID=46244923
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| MYPI2010005982A MY157055A (en) | 2010-12-15 | 2010-12-15 | A system and method for quantum mobile access verification |
Country Status (2)
| Country | Link |
|---|---|
| MY (1) | MY157055A (en) |
| WO (1) | WO2012081968A1 (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN115035634A (en) * | 2022-04-26 | 2022-09-09 | 江铃汽车股份有限公司 | Bluetooth key ID resetting method, system, readable storage medium and computer |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114124367B (en) | 2020-08-31 | 2023-03-24 | Oppo广东移动通信有限公司 | Data transmission method, device and storage medium |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8477940B2 (en) * | 2005-07-15 | 2013-07-02 | Tyfone, Inc. | Symmetric cryptography with user authentication |
| US20100046755A1 (en) * | 2005-12-07 | 2010-02-25 | Fiske Software Llc | Cryptography related to keys with signature |
| US8194858B2 (en) * | 2009-02-19 | 2012-06-05 | Physical Optics Corporation | Chaotic cipher system and method for secure communication |
-
2010
- 2010-12-15 MY MYPI2010005982A patent/MY157055A/en unknown
-
2011
- 2011-06-30 WO PCT/MY2011/000163 patent/WO2012081968A1/en not_active Ceased
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN115035634A (en) * | 2022-04-26 | 2022-09-09 | 江铃汽车股份有限公司 | Bluetooth key ID resetting method, system, readable storage medium and computer |
| CN115035634B (en) * | 2022-04-26 | 2024-03-26 | 江铃汽车股份有限公司 | Bluetooth key ID resetting method, system, readable storage medium and computer |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2012081968A1 (en) | 2012-06-21 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| KR101874721B1 (en) | Identity authentication system, apparatus, and method, and identity authentication request apparatus | |
| CN102420821B (en) | Method and system for improving transmission security of file | |
| EP3132368B1 (en) | Method and apparatus of verifying usability of biological characteristic image | |
| RU2007135358A (en) | SMALL DIGITAL SIGNATURES BASED ON OPEN KEY USED FOR AUTHENTICATION | |
| WO2017016447A1 (en) | Two-dimensional code mask encryption and decryption method and system | |
| US20170103250A1 (en) | Fingerprint decryption method and device | |
| RU2013140418A (en) | SAFE ACCESS TO PERSONAL HEALTH RECORDS IN EMERGENCIES | |
| CA2530944A1 (en) | Challenge response system and method | |
| CN102946392A (en) | URL (Uniform Resource Locator) data encrypted transmission method and system | |
| CN109684129B (en) | Data backup recovery method, storage medium, encryption machine, client and server | |
| CN102664898A (en) | Fingerprint identification-based encrypted transmission method, fingerprint identification-based encrypted transmission device and fingerprint identification-based encrypted transmission system | |
| JP2014508456A5 (en) | ||
| RU2005105579A (en) | HIGHLY RELIABLE BIOMETRIC DEVICE | |
| CN106506479B (en) | Method, system and the client of cipher authentication, server and smart machine | |
| US20180332040A1 (en) | Method of login control | |
| KR101485968B1 (en) | Method for accessing to encoded files | |
| CN112351043A (en) | Vehicle navigation factory setting password management method and system | |
| MY157055A (en) | A system and method for quantum mobile access verification | |
| KR100826522B1 (en) | Dynamic Encryption Device and Method in Mobile Communication System | |
| WO2013025091A1 (en) | Mobile access control system involving a quantum random number generator | |
| CN102571810A (en) | Dynamic password authentication method based on hardware digital certificate carrier and dynamic password authentication system thereof | |
| CN106603486A (en) | Mobile terminal safety authorization method and system | |
| CN105282738A (en) | Security authentication method for mobile terminal | |
| KR101268289B1 (en) | Otp key generation module and method using the voice and communication apparatus thereof | |
| US20080104414A1 (en) | Apparatus And Method For Decryption, Electronic Apparatus And Method For Inputting Password Encryption, And Electronic System With A Password |