CRYPTOGRAPHIC AUTHENTICATION AND IDENTIFICATION METHOD WITH REAL-TIME ENCRYPTION Russian patent published in 2016 - IPC H04L9/14 

Abstract RU 2584500 C2

FIELD: information technology.

SUBSTANCE: method for securing data and safeguarding their origin comprises the following steps: i) generating and storing an RSA key pair, consisting of the first key (Sa) and the second key (Pa), for signing customer certificates at the centre; ii) generating and storing two RSA key pairs for the customer device, consisting of the third key of the customer device (Sc) and the fourth key of the customer device (Pc), as well as the first key encryption key (St) and the second key encryption key (Pt); iii) generating an encrypted key by encrypting the third key of the customer device (Sc), using the second key encryption key (Pt), and generating a customer certificate at the centre; iv) transmitting the encrypted key and the customer certificate to the customer device; v) sending the first key encryption key (St) to the customer device based on a request by the customer device; vi) decrypting the encrypted key using the first key encryption key (St) in the customer device, the third key of the customer device (Sc) is obtained; vii) encrypting a reordered numerical sequence at the centre using the fourth key of the customer device (Pc); viii) sending the encrypted reordered numerical sequence; ix) decrypting the encrypted reordered numerical sequence in the customer device; x) encrypting the first PIN code input at the customer device, using the third key of the customer device (Sc), to a cipher; xi) sending the cipher and the customer certificate to the centre; xii) decrypting the cipher at the centre, using the fourth key of the customer device (Pc), decrypting the first PIN code input.

EFFECT: efficient protection of transmitted data.

16 cl, 3 dwg

Similar patents RU2584500C2

Title Year Author Number
METHODS FOR AUTHENTICATING, ENCRYPTING AND DECODING CLIENT TERMINAL IDENTIFIER AND APPARATUS FOR REALISING SAID METHODS 2007
  • Ur'En Paskal'
  • Badra Mokhamad
RU2451398C2
DEVICE FOR SAFE CALCULATION OF FUNCTION VALUE USING TWO SECRET DATA SETS WITHOUT COMPROMISING DATA SETS AND METHOD OF CALCULATING SOCIAL RATING USING DEVICE 2019
RU2715796C1
METHOD AND USER AUTHENTICATION SYSTEM THROUGH MOBILE DEVICE WITH USAGE OF CERTIFICATES 2013
  • Vantsak Gergej
RU2638741C2
METHOD AND SYSTEM FOR SECURE STORAGE OF INFORMATION IN FILE STORAGES OF DATA 2018
  • Karlov Andrej Vladimirovich
  • Frolov Mikhail Leonidovich
RU2707398C1
METHOD FOR ENSURING SAFETY OF GAME DEVICES AND A GAME DEVICE FOR ITS REALIZATION 2006
  • Falvej Grehkhem M.
  • Koller Kristian
  • Koperski Gregor
  • Tjukhler Gerkhard
RU2310907C1
METHOD FOR FORMING DOCUMENTS, WHICH MAY BE CHECKED AND WHICH ARE PROTECTED FROM FALSIFICATION, AND MONEY TRANSFER CENTER 2003
  • Majer Bernd
  • Lang Jurgen
RU2323531C2
METHOD, APPARATUS AND SYSTEM FOR TRANSMITTING DATA 2017
  • Meng, Fei
RU2715163C1
IMAGE BASED KEY DERIVATION FUNCTION 2014
  • Aissi, Selim
  • Kgil, Taekho
  • Gaddam, Adzhit
RU2676231C2
PROTECTED AUTONOMOUS OPERATIONS WITH RESOURCES 2017
  • Chen, Ge
  • Wang, Lei
  • Shen, Lingnan
  • Chen, Xing
RU2731330C1
CONFIDENTIAL COMMUNICATION CONTROL 2016
  • Le Saint Eric
  • Bhattacharya Soumendra
RU2718689C2

RU 2 584 500 C2

Authors

Bajdl Khajnrikh

Khrdi Ervin

Shauerkhuber Julius

Dates

2016-05-20Published

2013-01-28Filed