Trusted ring
A method for generating an authentication key at a device, possibly for providing a digital signature, permits authentication of an output from a ring of peers (e.g. IoT devices). It comprises generating a respective security credential for each peer, at least one credential being generated based on...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Ruhma Tahir Klaus Dieter McDonald-Maier William Gareth James Howells |
description | A method for generating an authentication key at a device, possibly for providing a digital signature, permits authentication of an output from a ring of peers (e.g. IoT devices). It comprises generating a respective security credential for each peer, at least one credential being generated based on at least one feature of the peer device. ICMetrics (Integrated Circuit Metrics) techniques may be used to generate the credentials, wherein feature values related to network configuration, device connectivity or contacts are inputted to a key generation algorithm to produce public/private keys Pr, Pb. A ring key is generated, possibly depending on peer security credentials, and the authentication key is generated in dependence on the ring key, a security credential of a first peer and respective security credentials of at least one other peer. A tolerance value may indicate the number of peers required to process the ring key, and the ring key may be a function of a polynomial of an order one less than the tolerance value. The authentication key may be generated by generating a verification function and XORing it with the ring key. This method may be used for committing a transaction on a permissioned blockchain. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_GB2578864A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>GB2578864A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_GB2578864A3</originalsourceid><addsrcrecordid>eNrjZOAJKSotLklNUSjKzEvnYWBNS8wpTuWF0twM8m6uIc4euqkF-fGpxQWJyal5qSXx7k5GpuYWFmYmjsaEVQAAnG0c6g</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Trusted ring</title><source>esp@cenet</source><creator>Ruhma Tahir ; Klaus Dieter McDonald-Maier ; William Gareth James Howells</creator><creatorcontrib>Ruhma Tahir ; Klaus Dieter McDonald-Maier ; William Gareth James Howells</creatorcontrib><description>A method for generating an authentication key at a device, possibly for providing a digital signature, permits authentication of an output from a ring of peers (e.g. IoT devices). It comprises generating a respective security credential for each peer, at least one credential being generated based on at least one feature of the peer device. ICMetrics (Integrated Circuit Metrics) techniques may be used to generate the credentials, wherein feature values related to network configuration, device connectivity or contacts are inputted to a key generation algorithm to produce public/private keys Pr, Pb. A ring key is generated, possibly depending on peer security credentials, and the authentication key is generated in dependence on the ring key, a security credential of a first peer and respective security credentials of at least one other peer. A tolerance value may indicate the number of peers required to process the ring key, and the ring key may be a function of a polynomial of an order one less than the tolerance value. The authentication key may be generated by generating a verification function and XORing it with the ring key. This method may be used for committing a transaction on a permissioned blockchain.</description><language>eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2020</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20200603&DB=EPODOC&CC=GB&NR=2578864A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20200603&DB=EPODOC&CC=GB&NR=2578864A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Ruhma Tahir</creatorcontrib><creatorcontrib>Klaus Dieter McDonald-Maier</creatorcontrib><creatorcontrib>William Gareth James Howells</creatorcontrib><title>Trusted ring</title><description>A method for generating an authentication key at a device, possibly for providing a digital signature, permits authentication of an output from a ring of peers (e.g. IoT devices). It comprises generating a respective security credential for each peer, at least one credential being generated based on at least one feature of the peer device. ICMetrics (Integrated Circuit Metrics) techniques may be used to generate the credentials, wherein feature values related to network configuration, device connectivity or contacts are inputted to a key generation algorithm to produce public/private keys Pr, Pb. A ring key is generated, possibly depending on peer security credentials, and the authentication key is generated in dependence on the ring key, a security credential of a first peer and respective security credentials of at least one other peer. A tolerance value may indicate the number of peers required to process the ring key, and the ring key may be a function of a polynomial of an order one less than the tolerance value. The authentication key may be generated by generating a verification function and XORing it with the ring key. This method may be used for committing a transaction on a permissioned blockchain.</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2020</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZOAJKSotLklNUSjKzEvnYWBNS8wpTuWF0twM8m6uIc4euqkF-fGpxQWJyal5qSXx7k5GpuYWFmYmjsaEVQAAnG0c6g</recordid><startdate>20200603</startdate><enddate>20200603</enddate><creator>Ruhma Tahir</creator><creator>Klaus Dieter McDonald-Maier</creator><creator>William Gareth James Howells</creator><scope>EVB</scope></search><sort><creationdate>20200603</creationdate><title>Trusted ring</title><author>Ruhma Tahir ; Klaus Dieter McDonald-Maier ; William Gareth James Howells</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_GB2578864A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2020</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Ruhma Tahir</creatorcontrib><creatorcontrib>Klaus Dieter McDonald-Maier</creatorcontrib><creatorcontrib>William Gareth James Howells</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Ruhma Tahir</au><au>Klaus Dieter McDonald-Maier</au><au>William Gareth James Howells</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Trusted ring</title><date>2020-06-03</date><risdate>2020</risdate><abstract>A method for generating an authentication key at a device, possibly for providing a digital signature, permits authentication of an output from a ring of peers (e.g. IoT devices). It comprises generating a respective security credential for each peer, at least one credential being generated based on at least one feature of the peer device. ICMetrics (Integrated Circuit Metrics) techniques may be used to generate the credentials, wherein feature values related to network configuration, device connectivity or contacts are inputted to a key generation algorithm to produce public/private keys Pr, Pb. A ring key is generated, possibly depending on peer security credentials, and the authentication key is generated in dependence on the ring key, a security credential of a first peer and respective security credentials of at least one other peer. A tolerance value may indicate the number of peers required to process the ring key, and the ring key may be a function of a polynomial of an order one less than the tolerance value. The authentication key may be generated by generating a verification function and XORing it with the ring key. This method may be used for committing a transaction on a permissioned blockchain.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_GB2578864A |
source | esp@cenet |
subjects | ELECTRIC COMMUNICATION TECHNIQUE ELECTRICITY TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | Trusted ring |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T06%3A16%3A38IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Ruhma%20Tahir&rft.date=2020-06-03&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EGB2578864A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |