HK1040023A1 - Voice and data encryption method using a cryptographic key split combiner - Google Patents
Voice and data encryption method using a cryptographic key split combiner Download PDFInfo
- Publication number
- HK1040023A1 HK1040023A1 HK02101235.1A HK02101235A HK1040023A1 HK 1040023 A1 HK1040023 A1 HK 1040023A1 HK 02101235 A HK02101235 A HK 02101235A HK 1040023 A1 HK1040023 A1 HK 1040023A1
- Authority
- HK
- Hong Kong
- Prior art keywords
- key
- split
- data
- generating
- splits
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
- Lock And Its Accessories (AREA)
- Telephonic Communication Services (AREA)
Abstract
A cryptographic key split combiner, which includes a number of key split generators (42, 48, and 56) for generating cryptographic key splits (32, 34, 36, 38, and 64) and a key split randomizer for randomizing the cryptographic key splits to produce a cryptographic key (62), and a process for forming cryptographic keys. Each of the key split generators (42, 48 and 56) generates key splits (32, 34, 36, 38, and 64) from seed data (40, 44, 46, 50, 52, 54, 58, and 60). The key split generators may include a random split generator (42) for generating a random key split (32) based on reference data (40) and encryption date/time (44). Other key split generators may include a token split generator (48) for generating a token key split (34) based on label data (46) and organization data (50), a console split generator (56) for generating a console key split (36) based on current maintenance data (52) and previous maintenance data (54), and a biometric split generator for generating a biometric key split (38) based on biometric data (58). All splits may further be based on static data, which may be updated, for example by modifying a prime number divisor of the static data. The label data may be read from a storage medium, and may include user authorization data. The label data may be associated with label categories and sub-categories of addresses, which are meaningful to a user who is specifying or determining the intended recipient(s) of the encrypted information or object. An array associated with a software component object may use key splits (32, 34, 36, 38, and 64) which determine which methods and properties are allowed and control access to the memory address for those allowed methods and properties. The resulting cryptographic key (62) may be, for example, a stream of symbols, at least one symbol block, or a key matrix.
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US12408699P | 1999-03-11 | 1999-03-11 | |
| US124086P | 1999-03-11 | ||
| PCT/US2000/006110 WO2000054455A1 (en) | 1999-03-11 | 2000-03-10 | Voice and data encryption method using a cryptographic key split combiner |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| HK1040023A1 true HK1040023A1 (en) | 2002-05-17 |
Family
ID=22412687
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| HK02101235.1A HK1040023A1 (en) | 1999-03-11 | 2000-03-10 | Voice and data encryption method using a cryptographic key split combiner |
Country Status (8)
| Country | Link |
|---|---|
| EP (1) | EP1161812A4 (en) |
| JP (1) | JP4615128B2 (en) |
| AU (1) | AU753951B2 (en) |
| BR (1) | BR0008595A (en) |
| CA (1) | CA2368307C (en) |
| HK (1) | HK1040023A1 (en) |
| MX (1) | MXPA01009051A (en) |
| WO (1) | WO2000054455A1 (en) |
Families Citing this family (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7111173B1 (en) * | 1998-09-01 | 2006-09-19 | Tecsec, Inc. | Encryption process including a biometric unit |
| GB2381916B (en) | 2001-11-08 | 2005-03-23 | Ncr Int Inc | Biometrics template |
| EP1832036A2 (en) * | 2004-12-22 | 2007-09-12 | Koninklijke Philips Electronics N.V. | Method and device for key generation and proving authenticity |
| CN103250441A (en) * | 2010-12-07 | 2013-08-14 | 瑞典爱立信有限公司 | Method and apparatus for provisioning temporary identity module using a key-sharing scheme |
| US8705730B2 (en) | 2010-12-23 | 2014-04-22 | Morega Systems Inc. | Elliptic curve cryptography with fragmented key processing and methods for use therewith |
| US8892908B2 (en) | 2010-12-23 | 2014-11-18 | Morega Systems Inc. | Cryptography module for use with fragmented key and methods for use therewith |
| EP3624392B1 (en) * | 2018-09-17 | 2023-05-10 | Secure-IC SAS | Methods and devices for secure secret key generation |
| CN117202181A (en) * | 2023-05-11 | 2023-12-08 | 长江量子(武汉)科技有限公司 | Method for synchronizing keys of two-ear earphone and two-ear encryption earphone |
Family Cites Families (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE4010305A1 (en) * | 1990-03-30 | 1991-10-02 | Gao Ges Automation Org | RANDOM NUMBER GENERATOR |
| US5276738A (en) * | 1992-12-17 | 1994-01-04 | Bull Hn Information Systems Inc. | Software data protection mechanism |
| US5557678A (en) * | 1994-07-18 | 1996-09-17 | Bell Atlantic Network Services, Inc. | System and method for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem |
| US5577124A (en) * | 1995-03-09 | 1996-11-19 | Arithmetica, Inc. | Multi-purpose high speed cryptographically secure sequence generator based on zeta-one-way functions |
| US5761305A (en) * | 1995-04-21 | 1998-06-02 | Certicom Corporation | Key agreement and transport protocol with implicit signatures |
| US5627738A (en) * | 1995-05-19 | 1997-05-06 | Eni, A Division Of Astec America, Inc. | Low cost, high reliability soft start arrangement |
| US5710815A (en) * | 1995-06-07 | 1998-01-20 | Vtech Communications, Ltd. | Encoder apparatus and decoder apparatus for a television signal having embedded viewer access control data |
| US5815573A (en) * | 1996-04-10 | 1998-09-29 | International Business Machines Corporation | Cryptographic key recovery system |
| US5778069A (en) * | 1996-04-10 | 1998-07-07 | Microsoft Corporation | Non-biased pseudo random number generator |
| US5857025A (en) * | 1996-09-09 | 1999-01-05 | Intelligent Security Systems, Inc. | Electronic encryption device and method |
| WO1998036520A1 (en) * | 1997-02-13 | 1998-08-20 | Secure Transaction Solutions, Llc | Cryptographic key split combiner |
| JP2000115153A (en) * | 1998-09-30 | 2000-04-21 | Fujitsu Ltd | Security method and security device |
-
2000
- 2000-03-10 WO PCT/US2000/006110 patent/WO2000054455A1/en not_active Ceased
- 2000-03-10 EP EP00914874A patent/EP1161812A4/en not_active Withdrawn
- 2000-03-10 CA CA002368307A patent/CA2368307C/en not_active Expired - Fee Related
- 2000-03-10 AU AU36204/00A patent/AU753951B2/en not_active Ceased
- 2000-03-10 MX MXPA01009051A patent/MXPA01009051A/en active IP Right Grant
- 2000-03-10 JP JP2000604568A patent/JP4615128B2/en not_active Expired - Fee Related
- 2000-03-10 HK HK02101235.1A patent/HK1040023A1/en unknown
- 2000-03-10 BR BR0008595-2A patent/BR0008595A/en not_active IP Right Cessation
Also Published As
| Publication number | Publication date |
|---|---|
| JP4615128B2 (en) | 2011-01-19 |
| AU753951B2 (en) | 2002-10-31 |
| JP2002539489A (en) | 2002-11-19 |
| EP1161812A4 (en) | 2004-04-14 |
| MXPA01009051A (en) | 2004-04-05 |
| BR0008595A (en) | 2002-01-08 |
| AU3620400A (en) | 2000-09-28 |
| WO2000054455A1 (en) | 2000-09-14 |
| CA2368307C (en) | 2007-05-22 |
| EP1161812A1 (en) | 2001-12-12 |
| CA2368307A1 (en) | 2000-09-14 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US6885747B1 (en) | Cryptographic key split combiner | |
| US4757534A (en) | Code protection using cryptography | |
| US7974410B2 (en) | Cryptographic key split combiner | |
| US6079021A (en) | Method and apparatus for strengthening passwords for protection of computer systems | |
| US7783887B2 (en) | Method and apparatus for providing television services using an authenticating television receiver device | |
| US8054978B2 (en) | Key management for content protection | |
| US7382884B2 (en) | Key management for content protection | |
| US20030105967A1 (en) | Apparatus for encrypting data and method thereof | |
| US20020131590A1 (en) | Key matrix methodology | |
| KR950029930A (en) | Method and device for securing file access | |
| GB2136175A (en) | File access security method and means | |
| CN101977108A (en) | Public key media key block | |
| DE60207223D1 (en) | METHOD AND SYSTEM FOR PROVIDING BUS ENCRYPTION BASED ON A CRYPTOGRAPHIC KEY EXCHANGE | |
| JP2001514834A (en) | Secure deterministic cryptographic key generation system and method | |
| MY121311A (en) | Information processing apparatus, information processing method, information processing system and recording medium | |
| JP2012501579A (en) | Pre-calculation of message authentication code applied to secure memory | |
| WO1998036520A1 (en) | Cryptographic key split combiner | |
| US20100017623A1 (en) | Executable software security system | |
| US6088456A (en) | Data encryption technique | |
| HK1040023A1 (en) | Voice and data encryption method using a cryptographic key split combiner | |
| EP1223496A3 (en) | Encryption scheme for limiting the maximum number of accesses to a digital file of predetermined content | |
| EP1693982A3 (en) | Method for establishing a secure communication channel | |
| US20100293390A1 (en) | Secure movie download | |
| US20080025497A1 (en) | Multiple key encryption with "Red Herrings" | |
| US7694132B2 (en) | Secure intermediary communications system |