Nothing Special   »   [go: up one dir, main page]

Patel, 2016 - Google Patents

Cryptography

Patel, 2016

Document ID
414507156826992493
Author
Patel R
Publication year
Publication venue
Engineering & Technology Reference

External Links

Snippet

This article is an overview of cryptography and its application across different components within a typical technology platform. It discusses different cryptographic approaches and touches on trending requirements for cryptography. This is a fast developing field that is …
Continue reading at digital-library.theiet.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F1/00Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
    • G06F1/16Constructional details or arrangements
    • G06F1/1613Constructional details or arrangements for portable computers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/016Input arrangements with force or tactile feedback as computer generated output to the user
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/50Computer-aided design
    • G06F17/5009Computer-aided design using simulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/38Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation
    • G06F7/48Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation using non-contact-making devices, e.g. tube, solid state device; using unspecified devices
    • G06F7/4806Computations with complex numbers
    • G06F7/4818Computations with complex numbers using coordinate rotation digital computer [CORDIC]
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2131Lost password, e.g. recovery of lost or forgotten passwords

Similar Documents

Publication Publication Date Title
JP6869374B2 (en) Decentralized key management for trusted execution environments
US10142107B2 (en) Token binding using trust module protected keys
US10999276B2 (en) Industrial internet encryption system
CN111431713B (en) Private key storage method and device and related equipment
US20210357914A1 (en) Constructing a Distributed Ledger Transaction on a Cold Hardware Wallet
US20170171183A1 (en) Authentication of access request of a device and protecting confidential information
CN115549887A (en) Determination of a common secret and hierarchical deterministic keys for the secure exchange of information
Velliangiri et al. An efficient lightweight privacy-preserving mechanism for industry 4.0 based on elliptic curve cryptography
CN113316798B (en) Methods, systems, and computer program products for network binding agent re-encryption and PIN translation
SE1451210A1 (en) Generating a symmetric encryption key
JP2022546470A (en) Decentralized techniques for validation of data in transport layer security and other contexts
SE540133C2 (en) Improved system for establishing a secure communication channel
US20230163967A1 (en) Decentralized authorization of user access requests in a multi-tenant distributed service architecture
Akinyede et al. Development of a secure mobile e-banking system
Yildiz et al. Towards Interoperable Self-sovereign Identities
CN117176353A (en) Method and device for processing data
Sharma et al. A two-tier security solution for storing data across public cloud
Salim et al. Design and implementation of a secure mobile banking system based on elliptic curve integrated encryption schema
Ortiz-Yepes Enhancing Authentication in eBanking with NFC-enabled mobile phones
van Oorschot Public key cryptography’s impact on society: how Diffie and Hellman changed the world
Patel Cryptography
Bai et al. Ensuring Security at Data Level in Cloud using Multi Cloud Architecture
Shi et al. Verification of LINE encryption version 1.0 using proverif
Wu et al. A Robust Two Factor Authentication Scheme with Fine Grained Biometrics Verification
Gagged et al. Improved secure dynamic bit standard technique for a private cloud platform to address security challenges