RussianPatents.com

Using a plurality of keys or algorithms (H04L9/14)

Wireless transmission protection system and method

Wireless transmission protection system and method relate to wireless communication. The method of transmitting secure messages by a transmitting device includes encoding a message using a secret code for generating L output code words, where L is an integer value greater than 1, wherein the secret code includes a first security code and a second security code, transmitting one of the L output code words to a communication device if the channel quality between the transmitting device and the communication device satisfies a certain criterion, repeating transmission for each of the remaining L-1 output code words.

Method and apparatus for obtaining security key in relay system

Invention relates to communication engineering. The method of obtaining a security key in a relay system, wherein a node in a relay system obtains an initial key, in accordance with the initial key, the node obtains a root key of the security key of the radio interface between the node and another node adjoining said node, and in accordance with the root key, the node obtains a security key of the radio interface between the node and said other adjoining node. Therefore, in accordance with the initial key, each lower-level node obtains a root key of the security key of the radio interface between each lower-level node, such that UE data on an interface link Un can be secured accordingly.

Method of organising and controlling access to content during hierarchical encoding, processor and transmitting unit for implementing method

Method of organising and controlling access to content during hierarchical encoding, processor and transmitting unit for implementing method

Invention relates to controlling access to scrambled content during hierarchical encoding. The hierarchical access control method includes: receiving and transmitting to a protective processor second cryptograms (CWi)Ki for i, ranging from 1 to k-1, obtained by encoding control words CW1-CWk-1 using corresponding keys K1-Kk-1, built using at least part of an array formed by data residing in ECMk, and an operational key CEk; decoding the second cryptograms (CWi)Ki, only if access conditions CAk, obtained in the ECMk message, correspond to access rules TA, and without preliminary comparison of access conditions CAi with access rules TA for i, strictly less than k, and, otherwise, blocking decoding of the second cryptograms (CWi)Ki, if access conditions CAk do not correspond to access rules TA.

Digital rights management apparatus and method

Digital rights management apparatus and method

Method comprises steps of: encoding a digital program to link said digital program with an authentication agent by packing the digital program and authentication agent into single digital content. Said authentication agent includes a program code executed by a device, wherein the device can reproduce said digital program and execute the program code. The program code is configured to authenticate the device when executed in the device; and provide said device with digital content which includes said digital program and said authentication agent. Said digital program is encrypted via a first encryption algorithm, and the decryption key of the fist encryption algorithm is encrypted via a second encryption algorithm and is stored in the authentication agent.

Multi-factor content protection

Multi-factor content protection

Recipient receives content from a publisher. Some content is managed by an access server. The access server controls the recipient's use of managed content through interaction with a trusted agent at the recipient. The content is encrypted on a content key, and the content is associated with policy information. The policy information includes the content key for decrypting the content. The policy information is encrypted on an access server key allowing the policy information to be decrypted by the access server. The content key is received from the access server. The content key is encrypted on a trusted agent key. The content key is further encrypted on additional factor(s) defining additional content protection beyond that provided by trusted agent. The content key is decrypted using the trusted agent key and the at least one additional factor. The content is decrypted using the content key.

Method, network element and mobile station for negotiating encryption algorithms

Method, network element and mobile station for negotiating encryption algorithms

Method of negotiating encryption algorithms comprises steps of: obtaining information that a plug-in card of the mobile station (MS) does not support a first encryption algorithm; deleting the first encryption algorithm from an encryption algorithm list permitted by a core network element according to the information that the plug-in card of the MS does not support the first encryption algorithm; sending the encryption algorithm list excluding the first encryption algorithm to an access network element, so that the access network element selects an encryption algorithm according to the encryption algorithm list excluding the first encryption algorithm and the MS capability information sent from the MS and sends the selected encryption algorithm to the MS.

Method and device for transmission of coding parameters

Method and device for transmission of coding parameters

Transmitting device codes voice superframes DMR using coding parameters, and sends coding parameters in at least one of voice superframes with the help of the following: identification of a selected number of bits from multiple frames of a vocoder of a voice superframe; replacement of each of identified bits with an appropriate bit of the first coding parameter; placement of at least one coding parameter in the field of inbuilt alarm of the voice superframe; and transmission of a voice superframe with coding parameters into a receiving device. The receiving device extracts coding parameters, which may be an identifier of a key, an identifier of a logic and an initialisation vector for use in decoded messages from the transmitting device.

Unit using operating system and image forming apparatus using said unit

Unit using operating system and image forming apparatus using said unit

Image forming apparatus comprises: a main housing and a detachable unit. The main housing has a main controller which controls operation of the image forming apparatus. The detachable unit is connected to the main housing and is configured to perform the image forming operation with the main housing. The detachable unit comprises: a memory unit and a central processing unit (CPU). The memory unit stores an initialisation program, unique information associated with the detachable unit, and status information on use of the detachable unit. The CPU performs initialisation using the initialisation program independent of the main housing. The main controller carries out a process of authenticating the detachable unit.

Method of creating and authenticating collective electronic digital signature certifying electronic document

Method of creating and authenticating collective electronic digital signature certifying electronic document

Method of generating and verifying an electronic digital signature (EDS) involves generating an elliptic curve (EC), given over a prime field GF(p), where p is a prime number of the form p=2k±µg2g±µh2h±1, where k≥99; 0<g<k; 0<h<g; µg∈{0,1};µh∈{0,1}, in form of a set of points, each given by two multidigit binary numbers (MDN) - its abscissa and ordinate; n>2 secret keys are generated in form of MDN k1, k2,…, kn; n public keys are generated from the secret keys in form of points P1, P2,…, Pn; the electronic document (ED) represented by MDN N is received; a collective public key is generated in form of points P of the EC, generated depending on points pα1, pα2,…, pα, where α1, α2,…, αm are natural numbers, 2≤m≤n, αj≤n and j=1, 2,…, m, depending on the received ED from values kα1, kα2,…, kα,m and from points P, EDS Q is generated in form of two MDN e and s; first A and second B verification MDN are generated. At least one of the verification MDN is generated depending on the collective public key P, and MDN A and B are compared. The EDS is authentic if their parameters match.

Content download system, content download method, content supplying apparatus, content supplying method, content receiving apparatus, content receiving method, and programme

Content download system, content download method, content supplying apparatus, content supplying method, content receiving apparatus, content receiving method, and programme

Disclosed is a content download system comprises: a content supplying device, a content receiving device, a download apparatus designed to download encrypted content and playing control data necessary for playing said content from said content supplying device according to user operations; obtaining apparatus to confirm the existence of a license which includes a key for decrypting said encrypted content based on said playing control data when playing said downloaded content, and to obtain said license according to the confirmation result; and playing apparatus to play said encrypted content using said obtained license. Playing control metafile describes <content_title>, <drm_server_uri>, <license_id>, <license_type>, <license_description>, <user_confirmation>, <user_messsage>, and <price>. In the case when multiple licenses are set for a single content, the items <license_id> through <price> describe only the number of set licenses.

Method of storing and using cryptographic key

Method of storing and using cryptographic key

Method of storing and using a cryptographic key of asymmetric cryptographic algorithms on elliptical curves, in which a private key d is divided into parts d1,…,dn, where d=d1+…+dn (mod q), which are securely stored on key carriers, cryptographic operations for generating an electronic digital signature, decoding and/or generating a general in accordance with a Diffie-Hellman algorithm are performed distributively on key carriers without generating a general private key, and results of performing these operations are processed in a computer system (assembly unit) which generates a general result of the cryptographic operation, wherein during generation of the electronic digital signature, each key carrier generates a random number ki (7≤i≤n - number of the key carrier), generates the corresponding multiple point of the elliptical curve Ri=ki P and sends it to the computer system which finds the point R=R1+…+Rn and sends the first coordinate of that point (r) to key carriers, after which each key carrier finds si=(rdi+ki e)(mod q) and sends the obtained value to the computer system, where s=(s1+…+sn)(mod q) is generated, wherein the number pair (r, s) is the electronic digital signature.

Method of creating and authenticating electronic digital signature certifying electronic document

Method of creating and authenticating electronic digital signature certifying electronic document

Method of generating and verifying an electronic digital signature includes the following sequence of operations: multi-bit binary number p is generated, a secret key in form of a multi-bit binary number x is generated, an open key is generated on the secret key in form of a multi-bit binary number y by raising the multi-bit binary number x to the power of a z-bit binary number k modulo p, where z>16, an electronic document, which is represented by a multi-bit binary number H, is received, depending on the value H and the value of the secret key, an electronic digital signature is created in form of a pair of multi-bit binary numbers (R,S), a first A and a second B authentication multi-bit binary number are formed and then compared, and authenticity of the electronic digital signature is indicated by coincidence of their parametres.

Method and device for executing cryptographic computation

Method and device for executing cryptographic computation

Key is generated in an electronic component for a specific cryptographic algorithm. For this purpose a prime number P is stored in memory of the electronic component and at least one secret prime number is generated. In order to generate a secret prime number at step /a/ two integers p1' and p2' whose sum is equal to a number p' are randomly selected; at step /b/ it is determined (12) whether the number p' is a prime number, on the basis of a combination of the stored prime number P with the numbers p1' and p2' so as to maintain said number p' secret; at step /c/ if the number p' is determined to be a prime number, numbers p1' and p2' are stored (14) in the memory of the electronic component, otherwise steps /a/ and /b/ are repeated.

Method for generation and verification of collective electronic digital signature that certifies electronic document

Method for generation and verification of collective electronic digital signature that certifies electronic document

Method for generation and verification of electronic digital signature (EDS) includes the following sequence of actions: combination of n≥2 secret keys is generated in the form of multidigit binary numbers (MBN) k1, k2,…,kn, using secret keys, n open keys P1, P2, …, Pn are generated, at least one electronic document presented by MBN is received, depending on received electronic document and on value of at least two secret keys, electronic digital sinature Q is generated in the form of two or more MBN, collective open key is generated depending on T open keys where a1, a2,…,am are natural numbers, 2≤m≤n, aj≤n and j = 1, 2,…,m, the first A and second B verification MBN are generated, besides at least one of verification MBN is generated depending on collective open key. MBN A and B are compared. If their parametres coincide, conclusion on authenticity of electronic digital signature is made.

Signing and verifying authenticity of session initiation protocol routing headers

Signing and verifying authenticity of session initiation protocol routing headers

Group of inventions relates to apparatus for signing and verifying authenticity of session initiation protocol routing headers for authentication of routing commands. Described are a method, a computer readable carrier having instructions which are executed by a computer, and a computer readable carrier on which is stored a data structure for signing and verifying authenticity of session initiation protocol (SIP) routing headers. A SIP node can receive a SIP request which includes a message header. A signature can be generated based on at least part of the message header, and a header element of the SIP node. The signature can then be inserted into the header element of the SIP node.

Method for generation and authentication of electronic digital signature that certifies electronic document

Method for generation and authentication of electronic digital signature that certifies electronic document

Invention is related to the field of cryptographic devices of electronic digital signature (EDS). Substance of invention consists in the fact that method for generation and authentication of EDS includes the following sequence of actions: secret key is generated in the form of multi-digit binary number (MBN) x, secret key is used to generate open key Y in the form of MBN size vector m, where 2≤m<64, electronic document (ED) is received, represented by MBN H, depending on received electronic document and on value of secret key, EDS Q is generated in the form of two MBNs, depending on EDS, ED and open key, the first A and second B authenticating MBN are generated, MBN A and B are compared. When they parametres coincide, conclusion is made on authenticity of electronic digital signature.

Method for generation and authentication of electronic digital signature that certifies electronic document

Method for generation and authentication of electronic digital signature that certifies electronic document

Invention is related to the field of cryptographic devices. Substance of invention consists in the fact that method for generation and authentication of EDS includes the following sequence of actions: secret key is generated in the form of multi-digit binary number (MBN) x, secret key is used to generate open key Y in the form of MBN size vector w x w, where 2≤m<32, electronic document (ED) is received, represented by MBN H, depending on received electronic document and on value of secret key, EDS Q is generated in the form of two MBNs, depending on Q, Y and H, the first A and second B authenticating MBN are generated, MBN A and B are compared. When they parametres coincide, conclusion is made on authenticity of electronic digital signature.

Method for generation and authentication of electronic digital signature that certifies electronic document

Method for generation and authentication of electronic digital signature that certifies electronic document

Invention is related to the field of cryptographic devices. Substance of invention consists in the fact that method for generation and authentication of EDS includes the following sequence of actions: combination of n≥2 secret keys is generated in the form of multi-digit binary numbers (MBN) x1, x2,…, xn, secret keys are used to generate n open keys Y1, Y2, …, Yn in the form of MBN size matrices w x w, where 2≤w<32, at least one electronic document (ED) is received, represented by MBN H, depending on received electronic document and on value of at least two secret keys, EDS Q is generated in the form of two MBNs, depending on m open keys where α1, α2, …, αm - natural numbers, 2≤m≤n, αj≤n and j=1, 2, …, m, the first A and second B authenticating MBN are generated depending on EDS and ED, besides one of authenticating MBN is generated depending on collective open key. MBN A and B are compared. When they parametres coincide, conclusion is made on authenticity of electronic digital signature.

System and method for authentication in communication system

System and method for authentication in communication system

Invention relates to mobile communication. A mobile station (MS), base station (BS) and an authentication, authorisation and account server (AAA) receive the first master session key through first EAP authentication for the mobile station (MS) in a "EAP-in-EAP" connection. After the first EAP authentication, a second master session key (MSK) is received through second EAP authentication for the mobile station (MS) in a "EAP-in-EAP" connection. An authorisation key is generated based on use of the first and second pairs of master keys, generated through truncation of the first and second master session keys, respectively.

Polarisation quantum cryptosystem

Polarisation quantum cryptosystem

Present invention relates to quantum cryptosystems and can be used for generating secret keys, used for encoding information in quantum data transfer systems. The polarisation quantum cryptosystem has transmitting and receiving sides. The transmitting side comprises a first unit for generating a secret key, the output of which is the first output of the cryptosystem, first and second random number generators, single photon laser and a polarisation modulator. The receiving side comprises a second unit for generating a secret key, the output of which is the second output of the cryptosystem, a third random number generator, polarisation beam splitter, fixed mirror, and first and second photon detectors. The data exchange input/output of the second unit for generating secret key is connected to the first non-classified communication channel. The polarisation quantum cryptosystem also contains a polarisation modulator, first quantum communication channel, second non-classified communication channel, device for measuring the complete set of Bell states, second quantum communication channel, source of polarisation-mixed up photon pairs and a third quantum communication channel.

Efficient encryption and authentication for data processing systems

Efficient encryption and authentication for data processing systems

Set of positions for plain text and/or set of positions for ciphered text is used for determining which data units will be used for generating values (470) of the control total of the input value and values (475) of the control total of the output value and these control totals are then used for generating an authentication tag.

Efficient coding and identification for data processing systems

Efficient coding and identification for data processing systems

Claimed method and device relate to information protection systems. The objective is achieved by skipping coding of some data along with identification of all data. Different identification unit definitions are used depending on whether the unit is positioned as open or encoded text. Then identification units are combined to form control amount which is encoded to form identification tag.

Text ciphering method

Text ciphering method

Novelty is use of equally-probable-value analytic function during certain interval, generation of chaotic digital sequence of analytic-function characters, and generation of ciphering field around it, each of whose characters presenting digital group of several numbers; how many numbers in group depends on amount of message being transferred.

Method for initialization of chip-card

Method for initialization of chip-card

Disclosed further is method for inputting initialization data IND into chip-card, in accordance to which encrypted authentication value is transferred and decrypted with production of at least one key ENK for unblocking chip-card. This key ENK for unblocking chip-card is compared to key ENK' for unblocking chip-card stored in chip-card. If both aforementioned keys match, initialization data EIND, IND are transferred into chip-card, which are recorded into its energy-independent memorizing device.

Method for generation of encryption/decryption key

Method for generation of encryption/decryption key

For realization of method at transferring side of communication guiding a random series is generated in form of three blocks X1,X2,X3 with lengths of k1,k2,k3 respectively. Series is transferred with errors via communication channel (Y1,Y2,Y3 - received blocks). Blocks of checking symbols C1 and C2 are formed for blocks X1 and X2. Message SC1+C2 is formed by concatenating blocks C1 and C2. Authenticator w for received message is formed, using a checking code and block Y3. Blocks of checking symbols C1 and C2 are selected from received message SC1+C2. from blocks Y1, Y2 received in advance via communication channel with errors and blocks of checking symbols C1 and C2 decoded blocks . Encryption/decryption keys are generated at receiving and transferring communication guiding sides by hashing block X1 at transferring communication guiding side and decoded block at receiving communication guiding side.

Method and system for distributed program development for programmable portable information medium

Method and system for distributed program development for programmable portable information medium

Initial program text is created on user's computer, transferred to information medium issuer's computer, where initial text is compiled and assembled; executable program code is created, which is enciphered and converted to transport code, which is downloaded to information medium through user's computer. At the same time during preliminary assembly information medium is equipped with instrumental program means for restoring executable program code from transport code, which is presented in intermediate format. Also system for distributed development of executed program for portable information medium, and information medium are disclosed.

Method for generation of encoding-decoding key

Method for generation of encoding-decoding key

Method includes generating two binary vectors of numbers a and p, having certain parameters, transferred by means of unprotected communication channel to each user of network, and generation by network users independently from each other of secret keys and generation of open keys by network users by means of transformation of binary vectors of secret key and numbers a and p, to obstruct possible determining of secret keys, and also common secret sub-keys of network users, while for determining secret sub-keys K it is required to know binary checksum vector of transferred message ξ, which changes for each communication session in random fashion. Utilization of checksum for source message during generation of protection key allows to prevent imposing of false information and to determine errors in transferred message, while possibility of determining of secret keys and common secret sub-keys of network users is excluded even when using cryptanalysis method with known open text. Instead of generation of binary checksum vector for transferred message binary hash function vector may be generated for transferred message or a random binary vector, for example, by using random numbers generator in conjunction with timer indications.

Data protection method

Data protection method

According to invention, biometric parameter is prepared and this biometric parameter is digitized with receipt of authentication data of digitizes biometric parameter, different, because on basis of authentication data of digitized biometric parameter encoded codeword is decoded and by decoding of codeword on basis of authentication data of digitized biometric parameter and on basis of method for correcting error with certain arbitrarily set volume used in encoding theory, secret data are restored.

Another patent 2513127.

© 2013-2014 Russian business network RussianPatents.com - Special Russian commercial information project for world wide. Foreign filing in English.