[go: up one dir, main page]

WO2012081968A1 - A system and method for quantum mobile access verification - Google Patents

A system and method for quantum mobile access verification Download PDF

Info

Publication number
WO2012081968A1
WO2012081968A1 PCT/MY2011/000163 MY2011000163W WO2012081968A1 WO 2012081968 A1 WO2012081968 A1 WO 2012081968A1 MY 2011000163 W MY2011000163 W MY 2011000163W WO 2012081968 A1 WO2012081968 A1 WO 2012081968A1
Authority
WO
WIPO (PCT)
Prior art keywords
mav
key
keys
encryption
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/MY2011/000163
Other languages
French (fr)
Inventor
Siswanto Meilana
Witjaksono Gunawan
Hamdan Zharfan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Mimos Bhd
Original Assignee
Mimos Bhd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mimos Bhd filed Critical Mimos Bhd
Publication of WO2012081968A1 publication Critical patent/WO2012081968A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
    • H04L9/0662Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography

Definitions

  • the present invention relates to a system and method for Quantum Mobile Access Verification (Q-MAV) that functions in a variety of verification-authentication processes.
  • Q-MAV Quantum Mobile Access Verification
  • RNG Random Number Generator
  • hacking tools such as, cloning, brute force, phishing, and skimming, make the use of a static key that is susceptible to cracking or theft which leads to misuse by unauthorized users.
  • the use of a random key based on RNG which does not have a truly random output.
  • an authorized biometric-fingerprint identity is recorded from a user of a known identity and stored in the encrypted storage and tampered proof for future reference.
  • the default operation of the device is similar to a mobile phone with additional security features.
  • the present invention provides a system (100) for Quantum Mobile Access Verification (Q-MAV) that generates true random identical keys for encryption and decryption of data streaming.
  • the system (100) comprises at least one Quantum Random Number Generator (QRNG) with at least one Multi Output Processor (MOP) (106); at least one encrypted storage (102); at least one biometric system (101); at least one Encryption system (107); and at least one display system (104), characterized in that the at least one QRNG with at least one MOP (106) generates true random identical keys, known as truly random independent-identical keys or i2 keys, for encryption and decryption of data streaming wherein first key is used to encrypt hardware identification of Q-MAV and authority code, and second key is used to decrypt encrypted data that has been sent to an access system.
  • the said display is part of mobile device and displays second i2 key. The said i2 keys are used multiple times and are deleted after several attempts for accessing system.
  • the said encryption system (107) is One Time Pad (OTP) encryption system wherein one bit of key is needed for each data to be encrypted and the said decryption system is decrypted using i2-keys that are changed automatically after every use, wherein the said keys are dynamic, random, and genuinely issued for each verification.
  • OTP One Time Pad
  • Another aspect of the present invention is a method (400) for generating true random identical keys for encryption and decryption of data streaming.
  • Q-MAV system is first activated (402). Thereafter, at least one secure service and at least one un-secure service is displayed at display of Q-MAV (404). Users fingerprint is scanned if secure service is chosen by user (406) and users fingerprint identify is verified by Q-MAV system (408). Subsequently, log error is displayed and several means is provided to attempt if verification process is unsuccessful (410) and users account is locked when number of attempts is exceeded wherein Q-MAV will function as mobile phone device (412). Hardware identification or Q-MAV and authority code is provided if verification was verified (414) and hardware identification and authority code is sent to encryption system (416).
  • Truly random independent-identical keys, i2-keys is generated as PIN numbers by QRNG-MOP (418) and hardware identification and authority code is encrypted using first i2-key (420). Thereafter, encrypted data streaming is sent to access system being used via transmitter channel means (422); second i2-key is displayed on display system of Q-MAV system (424) and second i2-key is inserted into access system used to decrypt encrypted data streaming (426). Subsequently, authorization from access system is obtain if decryption process is successful or the key is validated (428) and key is deleted if time frame is exceeded wherein the time frame is determined based on user's preference (430).
  • the present invention consists of features and a combination of parts hereinafter fully described and illustrated in the accompanying drawings, it being understood that various changes in the details may be made without departing from the scope of the invention or sacrificing any of the advantages of the present invention.
  • Fig. 1 illustrates internal architecture of Q-MAV system and its components.
  • Fig. 2 illustrates external architecture of Q-MAV system and its components.
  • Fig. 3 illustrates communication of Q-MAV system to any secure access system.
  • Fig. 4 is a flowchart illustrating method for generating true random identical keys for encryption and decryption of data streaming.
  • the present invention provides a system and method for Quantum Mobile Access Verification (Q-MAV) that functions in a variety of verification-authentication processes.
  • Q-MAV Quantum Mobile Access Verification
  • Fig. 1 illustrates internal architecture of Q-MAV system that is secure mobile communication based on quantum random number generator (QRNG) with multi output processor (MOP), which can be functioned for multi purposes of access system verification-authentication means while Fig. 2 illustrates external architecture of Q-MAV system.
  • QRNG quantum random number generator
  • MOP multi output processor
  • the said Q-MAV system comprises at least one Quantum Random Number Generator (QRNG) with at least one Multi Output Processor (MOP) (106), at least one encrypted storage (102) to store authorized users finger print sample for verification reference, at least one biometric system (101) which represents biometric scanner to scan users finger print to provide secure service, at least one encryption system (107) and at least one display system (104) to display pin number.
  • QRNG Quantum Random Number Generator
  • MOP Multi Output Processor
  • 106 Multi Output Processor
  • the said Q-MAV system comprises at least one Quantum Random Number Generator (QRNG) with at least one Multi Output Processor (MOP) (106), at least one encrypted storage (102) to store authorized users finger print sample for verification reference, at least one biometric system (101) which represents biometric scanner to scan users finger print to provide secure service, at least one encryption system (107) and at least one display system (104) to display pin number.
  • Other components (103) can be added since only basic minimum components are been described in internal architecture of Q-MAV system.
  • Quantum random number generator with MOP (106) acts as key generator which will generate truly random independent-identical keys (i2-keys) for encryption and decryption of data streaming wherein first key is used to encrypt hardware identification of Q-MAV and authority code, and second key is used to decrypt encrypted data that has been sent to access system.
  • the said encryption system (107) is One Time Pad (OTP) encryption system wherein one bit of key is needed for each data to be encrypted while decryption system is decrypted using i2-keys that are changed automatically after every use as the said keys are dynamic, random and genuinely issued for verification.
  • Transmitter channel (108) and antenna (110) acts as an interface to communicate with external access systems as provided in Q-MAV system.
  • the said biometric system (101) includes fingerprint scanner and is able to scan fingerprints.
  • Mobile device display (104) is part of mobile device system wherein it displays second i2 key; i2 keys are used multiple times and i2 keys are deleted after several attempts for accessing system.
  • the said encrypted storage (102) is encrypted using any encryption means and is tamper proof.
  • Fig. 3 illustrates communication of Q-MAV system to any secure access system.
  • the said Q-MAV system is capable of communicating to any secure access systems such as secure door lock access, secure computer or laptop access, and other secure equipment physical access systems means using some kinds of connections (;.e, wired, wireless, or no connection to communicate with third party or a head quarter).
  • the present invention focuses only on communication between Q-MAV with secure access systems. Communication between access parties to third parties or their headquarters with its policy requirements is beyond of the scope of the present invention.
  • Fig. 4 is a flowchart illustrating method for generating true random identical keys for encryption and decryption of data streaming.
  • Q-MAV system is first activated (402).
  • At least one secure service and at least one un-secure service is displayed at display of Q-MAV (404).
  • Device will functioned as normal mobile phone if secure service is not selected.
  • Q-MAV Q-MAV will provide and send its hardware ID and authority code to encryption system if scanned user's fingerprint matches stored authorized user's data reference (414). QRNG-MOP will be activated to generate two identical keys. If verification fails, Q-MAV system display log error (410) and return to secure services menu until failed attempts have exceeded, then the system will block users account wherein Q-MAV will functioned as mobile phone device (412). Subsequently, hardware identification and authority code is sent to encryption system (416) and QRNG- MOP generates truly random independent-identical keys (418). The two identical keys generated are truly random of independent-identical keys (i2-keys).
  • QRNG-MOP It is generated by QRNG-MOP as PIN numbers which is first identical key and second identical key.
  • the said first identical key will be used to encrypt Q-MAVs hardware identification (ID) and authority code using One Time Pad (OTP) encryption method (420). Thereafter, the encrypted streaming data will be sent to an access system being used via a transmitter channel (422).
  • ID hardware identification
  • OTP One Time Pad
  • Second identical key will be displayed at display of Q-MAV system, wherein user is required to decrypt the encrypted streaming data by keying-in the appeared key on the display of Q-MAV system to the access system being used (424). Displayed key can be used several times or for several accesses within time frame, if exceeded, displayed key will be deleted and Q-MAV will function as mobile phone. This security protocol is used to avoid misused of the authorization by non-authorized users. Second i2-key is inserted into access system used to decrypt encrypted data streaming (426). Thereafter, authorization is obtained from access system if decryption process is successful or when key is validated (428).
  • both keys are matched, an authorized user is able to access system within the time frame. If the time frame has exceeded, the access system will end the process by deleting key as time frame is determined based on users preference (430) and the process will restart at secure services menu. If both keys are not matched, system will provide log error and return to secure services menu until failed attempts have exceeded. Thereafter, the system will block the user's account. The numbers of failed attempts depends on third parties rule or specification.
  • the system and methodology of the present invention provides for independent-identical keys (i2-keys) generated by QRNG-MOP wherein the mobile device system transmits encrypted streaming data which consists of hardware identification and authority code.
  • i2-keys independent-identical keys
  • QRNG-MOP independent-identical keys generated by QRNG-MOP
  • the mobile device system transmits encrypted streaming data which consists of hardware identification and authority code.
  • the present invention may be embodied in other specific forms without departing from its essential characteristics.
  • the described embodiments are to be considered in all respects only as illustrative and not restrictive.
  • the scope of the invention is, therefore indicated by the appended claims rather than by the foregoing description. All changes, which come within the meaning and range of equivalency of the claims, are to be embraced within their scope.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides a system (100) for Quantum Mobile Access Verification (Q-MAV) that generates true random identical keys for encryption and decryption of data streaming. The system (100) comprises at least one Quantum Random Number Generator (QRNG) with at least one Multi Output Processor (MOP) (106); at least one Encrypted storage (102); at least one biometric system (101); at least one Encryption system (107); and at least one display system (104), characterized in that the at least one QRNG with at least one MOP (106) generates true random identical keys, known as truly random independent-identical keys or i2 keys, for encryption and decryption of data streaming wherein first key is used to encrypt hardware identification of Q-MAV and authority code, and second key is used to decrypt encrypted data that has been sent, to an access system.

Description

A SYSTEM AND METHOD FOR QUANTUM MOBILE
ACCESS VERIFICATION
FIELD OF INVENTION
The present invention relates to a system and method for Quantum Mobile Access Verification (Q-MAV) that functions in a variety of verification-authentication processes.
BACKGROUND ART
Increased security features are necessary for securing, for example, buildings, computers, and mobile phones. Conventionally, security systems require static key that requires users to memorize their key or use a random key that is generated by a Random Number Generator (RNG). However, hacking tools, such as, cloning, brute force, phishing, and skimming, make the use of a static key that is susceptible to cracking or theft which leads to misuse by unauthorized users. Further, the use of a random key based on RNG, which does not have a truly random output.
In the system of the present invention, an authorized biometric-fingerprint identity is recorded from a user of a known identity and stored in the encrypted storage and tampered proof for future reference. The default operation of the device is similar to a mobile phone with additional security features.
The approach and methodology in the present invention satisfies the need of security systems such as secure lock door access, secure computer or laptop access and secure system access verification means using QRNG-MOP which generates true random of independent-identical keys fi2 keys).
The subject matter claimed herein is not limited to embodiments that solve any disadvantages or that operate only in environments such as those described above. Rather, this background is only provided to illustrate one exemplary technology area where some embodiments described herein may be practice. SUMMARY OF INVENTION
The present invention provides a system (100) for Quantum Mobile Access Verification (Q-MAV) that generates true random identical keys for encryption and decryption of data streaming. The system (100) comprises at least one Quantum Random Number Generator (QRNG) with at least one Multi Output Processor (MOP) (106); at least one encrypted storage (102); at least one biometric system (101); at least one Encryption system (107); and at least one display system (104), characterized in that the at least one QRNG with at least one MOP (106) generates true random identical keys, known as truly random independent-identical keys or i2 keys, for encryption and decryption of data streaming wherein first key is used to encrypt hardware identification of Q-MAV and authority code, and second key is used to decrypt encrypted data that has been sent to an access system. Preferably, the said display is part of mobile device and displays second i2 key. The said i2 keys are used multiple times and are deleted after several attempts for accessing system.
Further, the said encryption system (107) is One Time Pad (OTP) encryption system wherein one bit of key is needed for each data to be encrypted and the said decryption system is decrypted using i2-keys that are changed automatically after every use, wherein the said keys are dynamic, random, and genuinely issued for each verification.
Another aspect of the present invention is a method (400) for generating true random identical keys for encryption and decryption of data streaming. Q-MAV system is first activated (402). Thereafter, at least one secure service and at least one un-secure service is displayed at display of Q-MAV (404). Users fingerprint is scanned if secure service is chosen by user (406) and users fingerprint identify is verified by Q-MAV system (408). Subsequently, log error is displayed and several means is provided to attempt if verification process is unsuccessful (410) and users account is locked when number of attempts is exceeded wherein Q-MAV will function as mobile phone device (412). Hardware identification or Q-MAV and authority code is provided if verification was verified (414) and hardware identification and authority code is sent to encryption system (416). Truly random independent-identical keys, i2-keys is generated as PIN numbers by QRNG-MOP (418) and hardware identification and authority code is encrypted using first i2-key (420). Thereafter, encrypted data streaming is sent to access system being used via transmitter channel means (422); second i2-key is displayed on display system of Q-MAV system (424) and second i2-key is inserted into access system used to decrypt encrypted data streaming (426). Subsequently, authorization from access system is obtain if decryption process is successful or the key is validated (428) and key is deleted if time frame is exceeded wherein the time frame is determined based on user's preference (430). The present invention consists of features and a combination of parts hereinafter fully described and illustrated in the accompanying drawings, it being understood that various changes in the details may be made without departing from the scope of the invention or sacrificing any of the advantages of the present invention.
BRIEF DESCRIPTION OF ACCOMPANYING DRAWINGS
To further clarify various aspects of some embodiments of the present invention, a more particular description of the invention will be rendered by references to specific embodiments thereof, which are illustrated in the appended drawings. It is appreciated that these drawings depict only typical embodiments of the invention and are therefore not to be considered limiting of its scope. The invention will be described and explained with additional specificity and detail through the accompanying drawings where:
Fig. 1 illustrates internal architecture of Q-MAV system and its components.
Fig. 2 illustrates external architecture of Q-MAV system and its components. Fig. 3 illustrates communication of Q-MAV system to any secure access system.
Fig. 4 is a flowchart illustrating method for generating true random identical keys for encryption and decryption of data streaming.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
The present invention provides a system and method for Quantum Mobile Access Verification (Q-MAV) that functions in a variety of verification-authentication processes. Hereinafter, this specification will describe the present invention according to the preferred embodiments. It is to be understood that limiting the description to the preferred embodiments of the invention is merely to facilitate discussion of the present invention and it is envisioned without departing from the scope of the appended claims.
Reference is first being made to Figs. 1 and 2 respectively. Fig. 1 illustrates internal architecture of Q-MAV system that is secure mobile communication based on quantum random number generator (QRNG) with multi output processor (MOP), which can be functioned for multi purposes of access system verification-authentication means while Fig. 2 illustrates external architecture of Q-MAV system. As illustrated in Fig. 1 and Fig. 2 respectively, the said Q-MAV system comprises at least one Quantum Random Number Generator (QRNG) with at least one Multi Output Processor (MOP) (106), at least one encrypted storage (102) to store authorized users finger print sample for verification reference, at least one biometric system (101) which represents biometric scanner to scan users finger print to provide secure service, at least one encryption system (107) and at least one display system (104) to display pin number. Other components (103) can be added since only basic minimum components are been described in internal architecture of Q-MAV system. The said display system (104) displays secure and unsecure services menu and second generated identical key while micro-processor system (105) acts as controller for all components. Quantum random number generator (QRNG) with MOP (106) acts as key generator which will generate truly random independent-identical keys (i2-keys) for encryption and decryption of data streaming wherein first key is used to encrypt hardware identification of Q-MAV and authority code, and second key is used to decrypt encrypted data that has been sent to access system.
The said encryption system (107) is One Time Pad (OTP) encryption system wherein one bit of key is needed for each data to be encrypted while decryption system is decrypted using i2-keys that are changed automatically after every use as the said keys are dynamic, random and genuinely issued for verification. Transmitter channel (108) and antenna (110) acts as an interface to communicate with external access systems as provided in Q-MAV system.
The said biometric system (101) includes fingerprint scanner and is able to scan fingerprints. Mobile device display (104) is part of mobile device system wherein it displays second i2 key; i2 keys are used multiple times and i2 keys are deleted after several attempts for accessing system. The said encrypted storage (102) is encrypted using any encryption means and is tamper proof.
Reference is now made to Fig. 3. Fig. 3 illustrates communication of Q-MAV system to any secure access system. The said Q-MAV system is capable of communicating to any secure access systems such as secure door lock access, secure computer or laptop access, and other secure equipment physical access systems means using some kinds of connections (;.e, wired, wireless, or no connection to communicate with third party or a head quarter).
The present invention focuses only on communication between Q-MAV with secure access systems. Communication between access parties to third parties or their headquarters with its policy requirements is beyond of the scope of the present invention.
Reference is now made to Fig. 4. Fig. 4 is a flowchart illustrating method for generating true random identical keys for encryption and decryption of data streaming. As illustrated in Fig. 4, Q-MAV system is first activated (402). At least one secure service and at least one un-secure service is displayed at display of Q-MAV (404). User needs to select secure service and scan user's fingerprint on biometric system of Q-MAV system (406). Device will functioned as normal mobile phone if secure service is not selected.
Thereafter, users scanned fingerprint will be verified with stored authorized users data reference in Q-MAV system (408). Q-MAV will provide and send its hardware ID and authority code to encryption system if scanned user's fingerprint matches stored authorized user's data reference (414). QRNG-MOP will be activated to generate two identical keys. If verification fails, Q-MAV system display log error (410) and return to secure services menu until failed attempts have exceeded, then the system will block users account wherein Q-MAV will functioned as mobile phone device (412). Subsequently, hardware identification and authority code is sent to encryption system (416) and QRNG- MOP generates truly random independent-identical keys (418). The two identical keys generated are truly random of independent-identical keys (i2-keys). It is generated by QRNG-MOP as PIN numbers which is first identical key and second identical key. The said first identical key will be used to encrypt Q-MAVs hardware identification (ID) and authority code using One Time Pad (OTP) encryption method (420). Thereafter, the encrypted streaming data will be sent to an access system being used via a transmitter channel (422).
Second identical key will be displayed at display of Q-MAV system, wherein user is required to decrypt the encrypted streaming data by keying-in the appeared key on the display of Q-MAV system to the access system being used (424). Displayed key can be used several times or for several accesses within time frame, if exceeded, displayed key will be deleted and Q-MAV will function as mobile phone. This security protocol is used to avoid misused of the authorization by non-authorized users. Second i2-key is inserted into access system used to decrypt encrypted data streaming (426). Thereafter, authorization is obtained from access system if decryption process is successful or when key is validated (428).
If both keys are matched, an authorized user is able to access system within the time frame. If the time frame has exceeded, the access system will end the process by deleting key as time frame is determined based on users preference (430) and the process will restart at secure services menu. If both keys are not matched, system will provide log error and return to secure services menu until failed attempts have exceeded. Thereafter, the system will block the user's account. The numbers of failed attempts depends on third parties rule or specification.
The system and methodology of the present invention provides for independent-identical keys (i2-keys) generated by QRNG-MOP wherein the mobile device system transmits encrypted streaming data which consists of hardware identification and authority code. The present invention may be embodied in other specific forms without departing from its essential characteristics. The described embodiments are to be considered in all respects only as illustrative and not restrictive. The scope of the invention is, therefore indicated by the appended claims rather than by the foregoing description. All changes, which come within the meaning and range of equivalency of the claims, are to be embraced within their scope.

Claims

1. A system (100) for Quantum Mobile Access Verification (Q-MAV) that generates true random identical keys for encryption and decryption of data streaming, comprising:
at least one Quantum Random Number Generator (QRNG) with at least one Multi Output Processor (MOP) (106);
at least one encrypted storage (102);
at least one biometric system (101);
at least one Encryption system (107); and
at least one display system (104),
characterized in that the at least one QRNG with at least one MOP (106) generates true random identical keys, known as truly random independent- identical keys or i2 keys for encryption and decryption of data streaming wherein first key is used to encrypt hardware identification of Q-MAV and authority code, and second key is used to decrypt encrypted data that has been sent to access system.
2. A system (100) according to Claim 1, wherein biometric system is fingerprint scanner.
3. A system (100) according to Claim 1 , wherein i2 keys are used multiple times.
4. A system (100) according to Claim 1, wherein encrypted data is sent via transmitter channel.
A system (100) according to Claim 1 , wherein display system is part of mobile device.
6. A system (100) according to Claim 1, wherein display system displays second i2 key.
7. A system (100) according to Claim 1 , wherein i2 keys are deleted after several attempts for accessing system.
8. A system (100) according to Claim 1, wherein encrypted storage (102) is encrypted using any encryption means and is tamper proof.
9. A system (100) according to Claim 1, wherein biometric system (101) is able to scan fingerprints.
10. A system (100) according to Claim 1, wherein encryption system (107) is One Time Pad (OTP) encryption system wherein one bit of key is needed for each data to be encrypted.
11. A system (100) according to Claim 1, wherein decryption system is decrypted using i2-keys that are changed automatically after every use, the said keys are dynamic, random, and genuinely issued for each verification.
12. A system (100) according to Claim 1 , wherein Q-MAV system has at least a time frame to maintain the key or without a time frame based on security level of mobile device.
13. A system (100) as claimed in Claim 1 , wherein Q-MAV system is implemented in hardware system and device-based access verification.
14. A method (400) for generating true random identical keys for encryption and decryption of data streaming comprising steps of:
activating Q-MAV system (402);
displaying at least one secure service and at least one un-secure service at display of Q-MAV (404);
scanning users finger print, if secure service is chosen by user (406); verifying users fingerprint identify by Q-MAV system (408);
displaying log error and providing means to attempt for several times if verification process is unsuccessful (410); locking users account when number of attempts is exceeded wherein Q- MAV will function as mobile phone device (412);
providing hardware identification or Q-MAV and authority code, if verification was verified (414);
sending hardware identification and authority code to encryption system (416);
generating truly random independent-identical keys, i2-keys as PIN numbers by QRNG-MOP (418);
encrypting hardware identification and authority code using first i2-key (420);
sending encrypted data streaming to access system being used via transmitter channel means (422);
displaying second i2-key on display system of Q-MAV system (424); inserting second i2-key into access system used to decrypt encrypted data streaming (426);
obtaining authorization from access system if decryption process is successful or the key is validated (428); and
deleting key if time frame is exceeded wherein the time frame is determined based on user's preference (430).
PCT/MY2011/000163 2010-12-15 2011-06-30 A system and method for quantum mobile access verification Ceased WO2012081968A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
MYPI2010005982A MY157055A (en) 2010-12-15 2010-12-15 A system and method for quantum mobile access verification
MYPI2010005982 2010-12-15

Publications (1)

Publication Number Publication Date
WO2012081968A1 true WO2012081968A1 (en) 2012-06-21

Family

ID=46244923

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/MY2011/000163 Ceased WO2012081968A1 (en) 2010-12-15 2011-06-30 A system and method for quantum mobile access verification

Country Status (2)

Country Link
MY (1) MY157055A (en)
WO (1) WO2012081968A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022042137A1 (en) * 2020-08-31 2022-03-03 Oppo广东移动通信有限公司 Data transmission method and apparatus, device, and storage medium

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115035634B (en) * 2022-04-26 2024-03-26 江铃汽车股份有限公司 Bluetooth key ID resetting method, system, readable storage medium and computer

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070014407A1 (en) * 2005-07-15 2007-01-18 Tyfone, Inc. Symmetric cryptography with user authentication
US20100046755A1 (en) * 2005-12-07 2010-02-25 Fiske Software Llc Cryptography related to keys with signature
US20100211787A1 (en) * 2009-02-19 2010-08-19 Leonid Bukshpun Chaotic cipher system and method for secure communication

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070014407A1 (en) * 2005-07-15 2007-01-18 Tyfone, Inc. Symmetric cryptography with user authentication
US20100046755A1 (en) * 2005-12-07 2010-02-25 Fiske Software Llc Cryptography related to keys with signature
US20100211787A1 (en) * 2009-02-19 2010-08-19 Leonid Bukshpun Chaotic cipher system and method for secure communication

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022042137A1 (en) * 2020-08-31 2022-03-03 Oppo广东移动通信有限公司 Data transmission method and apparatus, device, and storage medium
US11949781B2 (en) 2020-08-31 2024-04-02 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Data transmission method, device, apparatus and storage medium

Also Published As

Publication number Publication date
MY157055A (en) 2016-04-29

Similar Documents

Publication Publication Date Title
US7603565B2 (en) Apparatus and method for authenticating access to a network resource
CN103929306B (en) The approaches to IM of intelligent cipher key equipment and intelligent cipher key equipment
US8930700B2 (en) Remote device secure data file storage system and method
JP4507623B2 (en) Network connection system
KR102676616B1 (en) Method and apparatus, computer device, and storage medium for authenticating biometric payment devices
US20180091487A1 (en) Electronic device, server and communication system for securely transmitting information
WO2006041569A2 (en) Apparatus and method for authenticating access to a network resource using multiple shared devices
US7913096B2 (en) Method and system for the cipher key controlled exploitation of data resources, related network and computer program products
DK2414983T3 (en) Secure computer system
CN113472793A (en) Personal data protection system based on hardware password equipment
US20130097427A1 (en) Soft-Token Authentication System
CN103036864A (en) Template delivery type cancelable biometric authentication system and method therefor
CN109981665B (en) Resource providing method and device, and resource access method, device and system
US20190311145A1 (en) National identification number based authentication and content delivery
CN114070571B (en) Method, device, terminal and storage medium for establishing connection
KR102171377B1 (en) Method of login control
US8307209B2 (en) Universal authentication method
US20140250499A1 (en) Password based security method, systems and devices
WO2013025091A1 (en) Mobile access control system involving a quantum random number generator
WO2012081968A1 (en) A system and method for quantum mobile access verification
JP2004206258A (en) Multiple authentication system, computer program, and multiple authentication method
CN111817843A (en) A program code encryption method and system based on homomorphic encryption algorithm
CN113162766B (en) Key management method and system for key component
CN114329510B (en) A digital authorization method, device, terminal equipment and storage medium
JP2006268411A (en) Method and system for authenticating remotely accessed user using biometric data, and user device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11848777

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11848777

Country of ref document: EP

Kind code of ref document: A1