摘要:
A method for generating a data transaction ID for an interaction between first and second units, the method comprising: the first data unit generating a first data item as a function of a first time data element, the first time data element being representative of a first time value, and transmitting the first data item to the second data unit; the second data unit generating a second data item as a function of the received first data item and transmitting the second data item to the first data unit; and the first data unit generating a third data item as a function of the second data item and a second time data element, the second time data element being representative of a second time value, wherein the third data item comprises a transaction ID unique to the interaction between the first and second data units.
摘要:
A method of updating a data entry stored on a data storage unit, the data entry including data elements that are unique to the data storage unit and the data entry, the method comprising the steps of generating at the data storage unit an update request including the data entry for transmission to an authority authorised to update the data entry, extracting at the authority the unique data elements from the update request and verifying the authenticity of the data storage unit and data entry from the unique data elements, generating an updated data entry including a further data element unique to the updated data entry and derived from the updated data and transmitting the updated data entry to the data storage unit, and storing the updated data entry on the data storage unit.
摘要:
A method of updating a data entry stored on a data storage unit, the data entry including data elements that are unique to the data storage unit and the data entry, may begin with generating, at the data storage unit, an update request that includes the data entry for transmission to an authority authorized to update the data entry. The authority then extracts extracting at the authority the unique data elements from the update request and verifies the authenticity of the data storage unit and data entry from the unique data elements. The authority then generates an updated data entry including a further data element unique to the updated data entry and derived from the updated data. The authority then transmits the updated data entry to the data storage unit. The method may then include storing the updated data entry on the data storage unit.
摘要:
A method of verifying the authenticity of a product, the method comprising reading data from a data storage device which forms part of the packaging of the product, determining from the data an identity code for the data storage device, a random first identifier allocated to the data storage device by the product manufacturer and a digital signature of a parameter which is based on at least a second identifier not derivable from the data, communicating with the product manufacturer or an entity associated therewith using the random first identifier as a reference, receiving from the product manufacturer or the entity associated therewith the second identifier, and verifying the digital signature using the second identifier.
摘要:
A physical object comprises one or more memory circuits adapted to be read wirelessly by a reader device attached to or incorporated within the physical object. Data in the memory circuit is protected from access by an unauthorised reader. Data in the memory circuit is also adapted to identify an authorised bearer of the physical object. Moreover, data in the memory circuit is adapted to allow access to a specified asset or assets by the authorised bearer.
摘要:
A method for conducting a privacy ensured computerized poll includes, in a computerized anonymizing system (100), receiving a list (404) of invited participants (418) of said computerized poll, said list (404) comprising at least one address (202, 204) for each said participant (418). With said computerized anonymizing system (100), assigning each invited participant (418) in said poll at least one character string (410, 412) and transmitting to each invited participant (418) said at least one character string (410, 412) assigned to said participant (418) using said at least one address (202, 204). With said computerized anonymizing system (100), generating a list (408) comprising an entry for each said at least one character string (410, 412) assigned to one of said invited participants (418) and shuffling an order of said entries, and providing said shuffled list (408) to a poll initiator (402).
摘要:
An authentication method is provided between entities (10A; 10B) having matching one-time pads each with multiple OTP blocks. From the standpoint of a first one (10A) of the entities, the method involves sending (20S) a challenge that it has generated (20) by subjecting a first OTP block to a randomly-selected member of a first family of hashing functions. Each member of the first hashing-function family is associated with a respective member of a second family of hashing functions. On receiving back a response, the first entity (10A) tests (26) whether the response originates from the second entity (10B) by seeking a match between the response and a reference value generated (25) by subjecting a predetermined said OTP block to the member of the second hashing-function family that is associated with the member of the first hashing-function family used to generate the challenge.
摘要:
A quantum key distribution (QKD) method involves the sending of random data from a QKD transmitter to a QKD receiver over a quantum signal channel, and the QKD transmitter and receiver respectively processing the data transmitted and received over the quantum signal channel in order to seek to derive a common random data set. This processing is effected with the aid of messages exchanged between QKD transmitter and receiver over an insecure classical communication channel. The processing concludes with a check, effected by an exchange of authenticated messages over the classical communication channel, that the QKD transmitter and receiver have derived the same random data set. At least some of the other messages exchanged during processing are exchanged without authentication and integrity checking. A QKD transmitter and QKD receiver are also disclosed.
摘要:
A cryptographic method and apparatus is provided in which an identifier-based encryption process is used to encrypt a message with an identifier string that specifies conditions to be checked by a trusted entity before providing a decrypted form of the encrypted message, or enabling its decryption. A further trusted entity is used to verify the identity of the message sender as indicated by a further identifier string, and to provide the sender with a secret key that the sender uses to generate complimentary signature components. These signature components are sent along with the encrypted message and are used, along with other data including the first identifier string and a public key of the further trusted entity, to authenticate the identity of the message sender.
摘要:
First data is encrypted by a first party using an encryption key string formed using at least a hash value of the first data, this hash value being either in clear or in an encrypted form enabling its recovery in clear by a trusted party. The encrypted first data and the encryption key string are made available to a second party which forwards the encryption key string to the trusted party. The trusted party carries out at least one check on the basis of data contained in the encryption key string and, if the checks are satisfactory, provides a decryption key to the second party. Where the encryption key string comprises the hash value of the first data in encrypted form, the trusted party will typically decrypt the hash value and pass it to the second party to enable the latter to check the integrity of the first data.