RussianPatents.com

Method for encoding/decoding

Method for encoding/decoding
IPC classes for russian patent Method for encoding/decoding (RU 2249857):

H04L9/16 - the keys or algorithms being changed during operation
G09C1/06 - wherein elements corresponding to the signs making up the clear text are operatively connected with elements corresponding to the signs making up the ciphered text, the connections, during operation of the apparatus, being automatically and continuously permuted by a coding or key member
Another patents in same IPC classes:
Method for encoding/decoding Method for encoding/decoding / 2249857
Method is performed using microcontrollers with two memory types: data and software. For transfer of each symbol individual main and reserve codes are used, on basis of number of repeats of symbol in transferred message. First transfer of symbol is performed by main code, second transfer of same symbol - by reserve code, and then codes synchronization displacement is activated for a step around circle relatively to symbols until finish of circle. After transfer of displaced reserve code, closing the circle, synchronous replacement of codes variants is performed, and then order of codes replacement is repeated in case of repeat of any symbol in transferred message. Number of required code variants is set by planned volume of information, sent via communication line.
Method for generation of encryption key Method for generation of encryption key / 2286022
At information receiver side, open encryption key is generated in form of two multi-bit binary numbers p and α. First multi-bit binary number is selected so that Eiler function φ(p) contains at least one simple multiplier γ in form of ξ-bit binary number. Second multi-bit binary number α is calculated from formula α=βφ(p)/γmod p. Then open encryption key is transferred to information sender, where image of encryption key is formed R=[αWmodp]tmodp, where t≥2 - coefficient, previously given by information sender and information receiver, and W - randomly generated multi-bit binary number. After that image of encryption key is transferred to information receiver, where encryption key is calculated from formula K=RZmodp, where Z=tγ-2modγ. Also proven is that when using the invention, amount of encryption key computation is reduced 4-16 times.
Method and apparatus for end-to-end encrypted communication Method and apparatus for end-to-end encrypted communication / 2495532
Method for end-to-end encrypted communication includes: storing a set of keys suitable for end-to-end encrypted communication in a user terminal. One or more keys are associated with a validity indicator which defines a cryptographic group of two or more user terminals in which the corresponding key should be used, and a period during which said key is usable in said cryptographic group; connecting, at the user terminal, to the cryptographic group communication and selecting the key to be used from the stored set of keys based on said cryptographic group and current time in accordance with the associated validity indicator.
Systems, methods and apparatus for detecting and correcting encryption errors Systems, methods and apparatus for detecting and correcting encryption errors / 2501173
Method involves using a first set from one or more input encryption parameters for decrypting data in a received protocol data unit, wherein encrypted data were encrypted using a second set from one or more input encryption parameters; comparing the value of at least part of the decrypted data with an expected value; detecting, using a decryption control scheme, an encryption error if the value of at least part of the decrypted data does not match the expected value; and initiating an encryption resynchronisation procedure in response to the determination that there has been an encryption error, in order to resynchronise at least one input encryption parameter from the first set with at least one input encryption parameter from the second set.
Methods and apparatus for authentication and identification using public key infrastructure in ip telephony environment Methods and apparatus for authentication and identification using public key infrastructure in ip telephony environment / 2506703
Invention relates to authentication methods and specifically to methods and an apparatus for authentication of subscribers in IP telephony networks. The technical result is achieved due to that the disclosed method for authentication through a user device when attempting to access an IP telephony network comprises steps of: obtaining one or more private keys of said user from secure memory associated with said user device; generating an integrity key and a ciphering key; encrypting said integrity key and said ciphering key using a session key; encrypting said session key with a public key of said IP telephony network; and providing said encrypted session key, encrypted integrity key and encrypted ciphering key to said IP telephony network for authentication using a public key infrastructure (PKI) coupled with an authentication and key agreement (AKA) mechanism.
Method for encoding/decoding Method for encoding/decoding / 2249857
Method is performed using microcontrollers with two memory types: data and software. For transfer of each symbol individual main and reserve codes are used, on basis of number of repeats of symbol in transferred message. First transfer of symbol is performed by main code, second transfer of same symbol - by reserve code, and then codes synchronization displacement is activated for a step around circle relatively to symbols until finish of circle. After transfer of displaced reserve code, closing the circle, synchronous replacement of codes variants is performed, and then order of codes replacement is repeated in case of repeat of any symbol in transferred message. Number of required code variants is set by planned volume of information, sent via communication line.
Method for generation of encoding-decoding key Method for generation of encoding-decoding key / 2277759
Method includes generating two binary vectors of numbers a and p, having certain parameters, transferred by means of unprotected communication channel to each user of network, and generation by network users independently from each other of secret keys and generation of open keys by network users by means of transformation of binary vectors of secret key and numbers a and p, to obstruct possible determining of secret keys, and also common secret sub-keys of network users, while for determining secret sub-keys K it is required to know binary checksum vector of transferred message ξ, which changes for each communication session in random fashion. Utilization of checksum for source message during generation of protection key allows to prevent imposing of false information and to determine errors in transferred message, while possibility of determining of secret keys and common secret sub-keys of network users is excluded even when using cryptanalysis method with known open text. Instead of generation of binary checksum vector for transferred message binary hash function vector may be generated for transferred message or a random binary vector, for example, by using random numbers generator in conjunction with timer indications.
Information protection system Information protection system / 2325695
Invention may be used both at software and hardware implementation levels in computing and information systems for cryptographic protection of information in digital form. As keys, sequence of prime numbers (PN) in a row are used, order numbers (indices) of which are vectors of users initialization. For identification individual number of users is used. User with one personal number may enter different systems, where there is a current PN value corresponding to them from prime numbers range, which is licensed for this system. Size of stated sequence forms circle, that is after the last PN goes the first PN. Change of keys is done by shifting the register by correct time signals.
Method of double-sided authentication of access Method of double-sided authentication of access / 2444143
Method includes stages, at which the following is carried out: according to the system parameters, which are previously determined by the third object, the first object sends a packet of access authentication request to the second object, then the second object inspects authenticity, whether the signature of the first object is correct, and if yes, the general main key of the second object is calculated; the second object develops a packet of access authentication response and sends it to the first object, then the first object checks authenticity, whether the signature of the access authentication response and the code of message integrity check are correct; if yes, the general main key of the first object is calculated; the first object sends a packet of access authentication confirmation to the second object, the second object inspects authenticity of integrity of the access authentication confirmation packet, if, having passed the authenticity check, the general main key of the first object is matched with the general main key of the second object, access authentication is achieved.
Method and apparatus for end-to-end encrypted communication Method and apparatus for end-to-end encrypted communication / 2495532
Method for end-to-end encrypted communication includes: storing a set of keys suitable for end-to-end encrypted communication in a user terminal. One or more keys are associated with a validity indicator which defines a cryptographic group of two or more user terminals in which the corresponding key should be used, and a period during which said key is usable in said cryptographic group; connecting, at the user terminal, to the cryptographic group communication and selecting the key to be used from the stored set of keys based on said cryptographic group and current time in accordance with the associated validity indicator.
Methods and devices for transmitting encrypted multimedia content in packet mode, recording medium for implementing said methods Methods and devices for transmitting encrypted multimedia content in packet mode, recording medium for implementing said methods / 2496140
Method comprises steps of selecting an arbitrary duration T for successive crypto-periods; replacing the current encryption key TEKj with a new key TEKj+1 at the end of each crypto-period using a synchroniser; encrypting successive segments Pi K through TEKj, wherein each Pi begins at the corresponding time tdi; the generator generating a packet Si, the duration of reception of which is shorter than the duration of reproducing Pi, wherein Si includes an encrypted Pi and a cryptogram of each TEK, used to encrypt Pi, wherein the step of replacing TEKj with TEKj+1 for encrypting Pi is delayed until a time tdi+TSTKM or is postponed to tdi in response to the exchange of a synchronisation signal between the generator and the synchroniser, wherein duration of TSTKM is greater than or equal to the time required by the receiver to decrypt the crytogram TEKj, included in Si, and is strictly less than a selected T.
Data exchange method Data exchange method / 2517697
Invention relates to exchange of data between at least two servers using a gateway. Each server has a unique federative identifier, said identifier identifying a single patient (P). By creating one session pseudonym for each pair of a providing server (12), which stores relevant patient data, and a requesting server (10) and by formatting the input session identifier associated with the requesting server and the output session identifier associated with the providing server for each session pseudonym, the servers can exchange anonymous data with each other. Patient data are transmitted from at least one providing server to a requesting server, and all session pseudonyms are replaced at the requesting server with an identifier of the requesting server for the patient (P).

FIELD: electric communications.

SUBSTANCE: method is performed using microcontrollers with two memory types: data and software. For transfer of each symbol individual main and reserve codes are used, on basis of number of repeats of symbol in transferred message. First transfer of symbol is performed by main code, second transfer of same symbol - by reserve code, and then codes synchronization displacement is activated for a step around circle relatively to symbols until finish of circle. After transfer of displaced reserve code, closing the circle, synchronous replacement of codes variants is performed, and then order of codes replacement is repeated in case of repeat of any symbol in transferred message. Number of required code variants is set by planned volume of information, sent via communication line.

EFFECT: higher efficiency.

1 dwg

 

The invention relates to the field of telecommunication and can be used as a method of encoding-decoding to protect information during transmission over the communication line.

Known methods of encoding-decoding use the same code to transmit the information symbol regardless of the number of its repetitions in the transmitted message. This affects the security of the communication channel and allows decryption of the message transmitted by needresume.

Currently, the protection of information in communication networks mainly provide methods for effective coding, see, for example, Megarobot, Kagosima, Smerobot. “Theoretical foundations of secure protection stationary protected objects”, ed. “Home of the Grail”, Moscow, 2002, page 100...115. The use of effective codes provides practical reliability of information protection at the maximum transfer rate. However, this did not address the issue with the transfer is repeated in the message characters. They will be sent the same codes. This impairs the security of information transmitted in the communication network from unauthorized access.

Known methods of encoding-decoding the closest analogue may be recognized as a way built “Electronic locking device”, see Patent No. 2180386 on application No. 2001100885, is) from 09.01.2001, which is selected as a prototype.

The prototype contains transceivers and microcontrollers with two kinds of memory: data and software. The data memory contains the same for lock and key account codes for each individual release. Program memory contains a record of commands that are run when the vehicle is unlocked or locked. The data memory contains n cells. In each of the cells recorded different code on each opening of the lock. In one of the memory cells of the data is the code for the current release, which subsequent locking randomly goes into another cell. In the program memory contains a sequence of commands that are used when unlocking and locking the lock. These commands for the key and lock are different and run automatically after pressing the key “OPEN” or “CLOSE”.

The prototype works as follows. When working between the key and lock is a two-way communication. For unlocking the key asks for the number of cells in which the recorded code unlock. On request key lock transmits a key to this room. In accordance with the room key gets the unlock code from its memory and transmits it to the castle. Get the code unlocking, the lock is unlocked.

When locking the lock code unlock automatically changes randomly for a new one, which is written in another memory cell of the castle.

The original prototype cannot be used as a coding-decoding device, however, on the basis of a prototype of such a device can be created.

The aim of the invention is the creation of a coding-decoding device, which improves the quality of protection through on-line communication information from interception her needresume by converting the transmitted message in code, without repetitions.

This goal is achieved by the fact that in the encoding-decoding device, the microcontroller has two kinds of memory: data and software. In-memory data written characters, such as letters, numbers, symbols, and the corresponding individual codes for the transmission of symbols over a communications line. In the program memory of the listed commands, which leads to the substitution of symbols for codes in encoding and codes to the symbols in the decoding device. Each character in the data memory is made with a permanent address. The codes used for transmission of any character performed with a variable address. Due to this, any re-transmission symbol in the transmitted message has a new code. There are several options codes. In each embodiment, each symbol has its own primary and redundant code.

Code transmitted symbol defined the program memory based on the number of its surface is of Areni in the transmitted message. The first transmission symbol made the main code. The second transmission of the same symbol backed code. Then in the encoding-decoding device involved simultaneous shift codes on the step in a circle towards the characters. Re the third transmission symbol executed shifted the main code. Fourth retransmission symbol made eect of redundant code. Then used a synchronous shift codes for the next step. This is repeated until the completion of the circle. After the transmission is shifted back code, closing the circle, in the encoding-decoding device is made synchronous change options codes. Then the procedure for change codes when the repetition of any character in the transmitted message is repeated. The number of required option code is set to the planned volume of information transmitted over communication lines, equipped with data a sample of the coding-decoding device.

The drawing shows a structural diagram of the inventive device. In this scheme, the transmitted signal is connected to codereuse device 1. This signal is fed to the input node, the program memory 2. Node 2 has a two-way communication with the node data memory 3. The output signal of encoder 1 are codes that are removed from the output node 2.

The received code signal is connected to a decoding device 4. This is t the signal at the input node program memory 5. Node 5 has two-way communication with the node data memory 6. The output signal of the decoding device 4 are characters that are removed from the output node 5.

The claimed device operates as follows. Depending on the number of repetitions of the same symbol in the transmitted message, the inventive device is either a major source or backup code, or replacement option codes.

Consider these modes of operation.

1. The operation of the device with the main code.

The encoder 1 is running the following commands in the program memory 2:

1. The reception of a symbol.

2. The transmission symbol in the address data memory.

3. Query of the main character code from the data memory.

4. The main character code from the data memory.

5. Transmission main character code to the output of the coding device 1.

The decoding device 4 operates in the following commands in the program memory 5:

1. The receiving core code.

2. Transmission main code in the memory address data.

3. The query symbol from the data memory.

4. Receiving the symbol from the data memory.

5. The transmission symbol at the output of the decoding device 4.

2. The operation of the device with the backup ID.

The encoder 1 is running the following commands in the program memory 2:

1. Repeated reception of the same symbol.

2. The transmission is of mwala in the memory address data.

3. Request backup character code from the data memory.

4. Getting back character code from the data memory.

5. Transfer backup character code to the output of the coding device 1.

6. In-memory data, relative to character, the offset of the individual codes on the step in a circle.

The decoding device 4 operates in the following commands in the program memory 5:

1. Welcome back code.

2. Transfer the backup code in the memory address data.

3. The query symbol from the data memory.

4. Receiving the symbol from the data memory.

5. The transmission symbol at the output of the decoding device 4.

6. In-memory data, relative to character, the offset of the individual codes on the step in a circle.

3. The operation of the device with the replacement option codes.

The encoder 1 is running the following commands in the program memory 2:

1. Repeated reception of the same symbol, which refers to the last step of the circle.

2. The transmission symbol in the address data memory.

3. Request backup character code from the data memory.

4. Getting back character code from the data memory.

5. Transfer backup character code to the output of the coding device 1.

6. In-memory data change options codes.

The decoding device 4 operates in the following commands in the program memory 5:

1. Welcome back code of the last step of the kr who ha

2. Transfer back code of the last step of the circle in the memory address data.

3. The query symbol from the data memory.

4. Receiving the symbol from the data memory.

5. The transmission symbol at the output of the decoding device 4.

6. In-memory data change options codes.

If you need to expand the communications network new subscriber, before be included in the connection requests from any of the subscribers operating in a communication network, the code that is currently being used for transmission of the first character. After receiving it, a new subscriber sets in-memory data source individual codes of all characters on the basis of the code of the first character. These codes coincide with the source at the moment of time at which network subscribers. Then a new subscriber maintains communication in the usual manner.

The line, which included the inventive device provides communication codes without repetition.

This quality is achieved by the fact that each re-transmission of any character in the transmitted message is a new code.

Due to this, no decoding of the message transmitted by padrasto with the interception of a communication session.

The encoding-decoding, protecting information during transmission over the communication line from the intercept are not the addressees performed using microcontrollers, which are two of the IDA memory: data and software, characterized in that the data memory write characters, such as letters, numbers, symbols and corresponding individual codes for the transmission symbols in the communication line, the program memory of the put command, which leads to the substitution of symbols for codes in encoding and codes to the symbols in the decoding device, with each symbol in the data memory perform with a permanent address, and codes used for transmission of any character, performed with a variable address, due to which any re-transmission symbol in the transmitted message has a new code, and involved several variants of code that have each character has its own primary and backup codes, and code transmitted symbol is determined by the command program memory, based on the number of its repetitions in the transmitted message, the first transmission symbol execute the main code, and the second redundant code, then in the encoding-decoding device uses a synchronous shift codes on the step in a circle towards the characters, re third gear symbol carry out is shifted to the main code, the fourth retransmission symbol fulfill shifted back ID, and then uses a synchronous shift codes on the next step, and this is repeated until the completion of the circle, and after sending out backup is ode, closing the circle, in the encoding-decoding device to perform synchronous shift options, codes, and then the procedure for change codes when the repetition of any character in the transmitted message is repeated, the number of required option code is set to the planned volume of information transmitted over communication lines, equipped with data a sample of the coding-decoding device.

 

© 2013-2014 Russian business network RussianPatents.com - Special Russian commercial information project for world wide. Foreign filing in English.