[go: up one dir, main page]

HK1040023A1 - Voice and data encryption method using a cryptographic key split combiner - Google Patents

Voice and data encryption method using a cryptographic key split combiner Download PDF

Info

Publication number
HK1040023A1
HK1040023A1 HK02101235.1A HK02101235A HK1040023A1 HK 1040023 A1 HK1040023 A1 HK 1040023A1 HK 02101235 A HK02101235 A HK 02101235A HK 1040023 A1 HK1040023 A1 HK 1040023A1
Authority
HK
Hong Kong
Prior art keywords
key
split
data
generating
splits
Prior art date
Application number
HK02101235.1A
Other languages
Chinese (zh)
Inventor
M. Scheidt Edward
Original Assignee
Tecsec, Incorporated
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tecsec, Incorporated filed Critical Tecsec, Incorporated
Publication of HK1040023A1 publication Critical patent/HK1040023A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Lock And Its Accessories (AREA)
  • Telephonic Communication Services (AREA)

Abstract

A cryptographic key split combiner, which includes a number of key split generators (42, 48, and 56) for generating cryptographic key splits (32, 34, 36, 38, and 64) and a key split randomizer for randomizing the cryptographic key splits to produce a cryptographic key (62), and a process for forming cryptographic keys. Each of the key split generators (42, 48 and 56) generates key splits (32, 34, 36, 38, and 64) from seed data (40, 44, 46, 50, 52, 54, 58, and 60). The key split generators may include a random split generator (42) for generating a random key split (32) based on reference data (40) and encryption date/time (44). Other key split generators may include a token split generator (48) for generating a token key split (34) based on label data (46) and organization data (50), a console split generator (56) for generating a console key split (36) based on current maintenance data (52) and previous maintenance data (54), and a biometric split generator for generating a biometric key split (38) based on biometric data (58). All splits may further be based on static data, which may be updated, for example by modifying a prime number divisor of the static data. The label data may be read from a storage medium, and may include user authorization data. The label data may be associated with label categories and sub-categories of addresses, which are meaningful to a user who is specifying or determining the intended recipient(s) of the encrypted information or object. An array associated with a software component object may use key splits (32, 34, 36, 38, and 64) which determine which methods and properties are allowed and control access to the memory address for those allowed methods and properties. The resulting cryptographic key (62) may be, for example, a stream of symbols, at least one symbol block, or a key matrix.
HK02101235.1A 1999-03-11 2000-03-10 Voice and data encryption method using a cryptographic key split combiner HK1040023A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US12408699P 1999-03-11 1999-03-11
US124086P 1999-03-11
PCT/US2000/006110 WO2000054455A1 (en) 1999-03-11 2000-03-10 Voice and data encryption method using a cryptographic key split combiner

Publications (1)

Publication Number Publication Date
HK1040023A1 true HK1040023A1 (en) 2002-05-17

Family

ID=22412687

Family Applications (1)

Application Number Title Priority Date Filing Date
HK02101235.1A HK1040023A1 (en) 1999-03-11 2000-03-10 Voice and data encryption method using a cryptographic key split combiner

Country Status (8)

Country Link
EP (1) EP1161812A4 (en)
JP (1) JP4615128B2 (en)
AU (1) AU753951B2 (en)
BR (1) BR0008595A (en)
CA (1) CA2368307C (en)
HK (1) HK1040023A1 (en)
MX (1) MXPA01009051A (en)
WO (1) WO2000054455A1 (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7111173B1 (en) * 1998-09-01 2006-09-19 Tecsec, Inc. Encryption process including a biometric unit
GB2381916B (en) 2001-11-08 2005-03-23 Ncr Int Inc Biometrics template
EP1832036A2 (en) * 2004-12-22 2007-09-12 Koninklijke Philips Electronics N.V. Method and device for key generation and proving authenticity
CN103250441A (en) * 2010-12-07 2013-08-14 瑞典爱立信有限公司 Method and apparatus for provisioning temporary identity module using a key-sharing scheme
US8705730B2 (en) 2010-12-23 2014-04-22 Morega Systems Inc. Elliptic curve cryptography with fragmented key processing and methods for use therewith
US8892908B2 (en) 2010-12-23 2014-11-18 Morega Systems Inc. Cryptography module for use with fragmented key and methods for use therewith
EP3624392B1 (en) * 2018-09-17 2023-05-10 Secure-IC SAS Methods and devices for secure secret key generation
CN117202181A (en) * 2023-05-11 2023-12-08 长江量子(武汉)科技有限公司 Method for synchronizing keys of two-ear earphone and two-ear encryption earphone

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE4010305A1 (en) * 1990-03-30 1991-10-02 Gao Ges Automation Org RANDOM NUMBER GENERATOR
US5276738A (en) * 1992-12-17 1994-01-04 Bull Hn Information Systems Inc. Software data protection mechanism
US5557678A (en) * 1994-07-18 1996-09-17 Bell Atlantic Network Services, Inc. System and method for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem
US5577124A (en) * 1995-03-09 1996-11-19 Arithmetica, Inc. Multi-purpose high speed cryptographically secure sequence generator based on zeta-one-way functions
US5761305A (en) * 1995-04-21 1998-06-02 Certicom Corporation Key agreement and transport protocol with implicit signatures
US5627738A (en) * 1995-05-19 1997-05-06 Eni, A Division Of Astec America, Inc. Low cost, high reliability soft start arrangement
US5710815A (en) * 1995-06-07 1998-01-20 Vtech Communications, Ltd. Encoder apparatus and decoder apparatus for a television signal having embedded viewer access control data
US5815573A (en) * 1996-04-10 1998-09-29 International Business Machines Corporation Cryptographic key recovery system
US5778069A (en) * 1996-04-10 1998-07-07 Microsoft Corporation Non-biased pseudo random number generator
US5857025A (en) * 1996-09-09 1999-01-05 Intelligent Security Systems, Inc. Electronic encryption device and method
WO1998036520A1 (en) * 1997-02-13 1998-08-20 Secure Transaction Solutions, Llc Cryptographic key split combiner
JP2000115153A (en) * 1998-09-30 2000-04-21 Fujitsu Ltd Security method and security device

Also Published As

Publication number Publication date
JP4615128B2 (en) 2011-01-19
AU753951B2 (en) 2002-10-31
JP2002539489A (en) 2002-11-19
EP1161812A4 (en) 2004-04-14
MXPA01009051A (en) 2004-04-05
BR0008595A (en) 2002-01-08
AU3620400A (en) 2000-09-28
WO2000054455A1 (en) 2000-09-14
CA2368307C (en) 2007-05-22
EP1161812A1 (en) 2001-12-12
CA2368307A1 (en) 2000-09-14

Similar Documents

Publication Publication Date Title
US6885747B1 (en) Cryptographic key split combiner
US4757534A (en) Code protection using cryptography
US7974410B2 (en) Cryptographic key split combiner
US6079021A (en) Method and apparatus for strengthening passwords for protection of computer systems
US7783887B2 (en) Method and apparatus for providing television services using an authenticating television receiver device
US8054978B2 (en) Key management for content protection
US7382884B2 (en) Key management for content protection
US20030105967A1 (en) Apparatus for encrypting data and method thereof
US20020131590A1 (en) Key matrix methodology
KR950029930A (en) Method and device for securing file access
GB2136175A (en) File access security method and means
CN101977108A (en) Public key media key block
DE60207223D1 (en) METHOD AND SYSTEM FOR PROVIDING BUS ENCRYPTION BASED ON A CRYPTOGRAPHIC KEY EXCHANGE
JP2001514834A (en) Secure deterministic cryptographic key generation system and method
MY121311A (en) Information processing apparatus, information processing method, information processing system and recording medium
JP2012501579A (en) Pre-calculation of message authentication code applied to secure memory
WO1998036520A1 (en) Cryptographic key split combiner
US20100017623A1 (en) Executable software security system
US6088456A (en) Data encryption technique
HK1040023A1 (en) Voice and data encryption method using a cryptographic key split combiner
EP1223496A3 (en) Encryption scheme for limiting the maximum number of accesses to a digital file of predetermined content
EP1693982A3 (en) Method for establishing a secure communication channel
US20100293390A1 (en) Secure movie download
US20080025497A1 (en) Multiple key encryption with "Red Herrings"
US7694132B2 (en) Secure intermediary communications system