Trusted ring

A method for generating an authentication key at a device, possibly for providing a digital signature, permits authentication of an output from a ring of peers (e.g. IoT devices). It comprises generating a respective security credential for each peer, at least one credential being generated based on...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Ruhma Tahir, Klaus Dieter McDonald-Maier, William Gareth James Howells
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Ruhma Tahir
Klaus Dieter McDonald-Maier
William Gareth James Howells
description A method for generating an authentication key at a device, possibly for providing a digital signature, permits authentication of an output from a ring of peers (e.g. IoT devices). It comprises generating a respective security credential for each peer, at least one credential being generated based on at least one feature of the peer device. ICMetrics (Integrated Circuit Metrics) techniques may be used to generate the credentials, wherein feature values related to network configuration, device connectivity or contacts are inputted to a key generation algorithm to produce public/private keys Pr, Pb. A ring key is generated, possibly depending on peer security credentials, and the authentication key is generated in dependence on the ring key, a security credential of a first peer and respective security credentials of at least one other peer. A tolerance value may indicate the number of peers required to process the ring key, and the ring key may be a function of a polynomial of an order one less than the tolerance value. The authentication key may be generated by generating a verification function and XORing it with the ring key. This method may be used for committing a transaction on a permissioned blockchain.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_GB2578864A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>GB2578864A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_GB2578864A3</originalsourceid><addsrcrecordid>eNrjZOAJKSotLklNUSjKzEvnYWBNS8wpTuWF0twM8m6uIc4euqkF-fGpxQWJyal5qSXx7k5GpuYWFmYmjsaEVQAAnG0c6g</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Trusted ring</title><source>esp@cenet</source><creator>Ruhma Tahir ; Klaus Dieter McDonald-Maier ; William Gareth James Howells</creator><creatorcontrib>Ruhma Tahir ; Klaus Dieter McDonald-Maier ; William Gareth James Howells</creatorcontrib><description>A method for generating an authentication key at a device, possibly for providing a digital signature, permits authentication of an output from a ring of peers (e.g. IoT devices). It comprises generating a respective security credential for each peer, at least one credential being generated based on at least one feature of the peer device. ICMetrics (Integrated Circuit Metrics) techniques may be used to generate the credentials, wherein feature values related to network configuration, device connectivity or contacts are inputted to a key generation algorithm to produce public/private keys Pr, Pb. A ring key is generated, possibly depending on peer security credentials, and the authentication key is generated in dependence on the ring key, a security credential of a first peer and respective security credentials of at least one other peer. A tolerance value may indicate the number of peers required to process the ring key, and the ring key may be a function of a polynomial of an order one less than the tolerance value. The authentication key may be generated by generating a verification function and XORing it with the ring key. This method may be used for committing a transaction on a permissioned blockchain.</description><language>eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2020</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20200603&amp;DB=EPODOC&amp;CC=GB&amp;NR=2578864A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20200603&amp;DB=EPODOC&amp;CC=GB&amp;NR=2578864A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Ruhma Tahir</creatorcontrib><creatorcontrib>Klaus Dieter McDonald-Maier</creatorcontrib><creatorcontrib>William Gareth James Howells</creatorcontrib><title>Trusted ring</title><description>A method for generating an authentication key at a device, possibly for providing a digital signature, permits authentication of an output from a ring of peers (e.g. IoT devices). It comprises generating a respective security credential for each peer, at least one credential being generated based on at least one feature of the peer device. ICMetrics (Integrated Circuit Metrics) techniques may be used to generate the credentials, wherein feature values related to network configuration, device connectivity or contacts are inputted to a key generation algorithm to produce public/private keys Pr, Pb. A ring key is generated, possibly depending on peer security credentials, and the authentication key is generated in dependence on the ring key, a security credential of a first peer and respective security credentials of at least one other peer. A tolerance value may indicate the number of peers required to process the ring key, and the ring key may be a function of a polynomial of an order one less than the tolerance value. The authentication key may be generated by generating a verification function and XORing it with the ring key. This method may be used for committing a transaction on a permissioned blockchain.</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2020</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZOAJKSotLklNUSjKzEvnYWBNS8wpTuWF0twM8m6uIc4euqkF-fGpxQWJyal5qSXx7k5GpuYWFmYmjsaEVQAAnG0c6g</recordid><startdate>20200603</startdate><enddate>20200603</enddate><creator>Ruhma Tahir</creator><creator>Klaus Dieter McDonald-Maier</creator><creator>William Gareth James Howells</creator><scope>EVB</scope></search><sort><creationdate>20200603</creationdate><title>Trusted ring</title><author>Ruhma Tahir ; Klaus Dieter McDonald-Maier ; William Gareth James Howells</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_GB2578864A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2020</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Ruhma Tahir</creatorcontrib><creatorcontrib>Klaus Dieter McDonald-Maier</creatorcontrib><creatorcontrib>William Gareth James Howells</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Ruhma Tahir</au><au>Klaus Dieter McDonald-Maier</au><au>William Gareth James Howells</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Trusted ring</title><date>2020-06-03</date><risdate>2020</risdate><abstract>A method for generating an authentication key at a device, possibly for providing a digital signature, permits authentication of an output from a ring of peers (e.g. IoT devices). It comprises generating a respective security credential for each peer, at least one credential being generated based on at least one feature of the peer device. ICMetrics (Integrated Circuit Metrics) techniques may be used to generate the credentials, wherein feature values related to network configuration, device connectivity or contacts are inputted to a key generation algorithm to produce public/private keys Pr, Pb. A ring key is generated, possibly depending on peer security credentials, and the authentication key is generated in dependence on the ring key, a security credential of a first peer and respective security credentials of at least one other peer. A tolerance value may indicate the number of peers required to process the ring key, and the ring key may be a function of a polynomial of an order one less than the tolerance value. The authentication key may be generated by generating a verification function and XORing it with the ring key. This method may be used for committing a transaction on a permissioned blockchain.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_GB2578864A
source esp@cenet
subjects ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title Trusted ring
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T06%3A16%3A38IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Ruhma%20Tahir&rft.date=2020-06-03&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EGB2578864A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true