EverMore Technology Inc. (20240267224). CYBER SECURITY METHOD AND SYSTEM BASED ON MULTI-PARTY AND MULTI-FACTOR DYNAMIC STRONG ENCRYPTION AUTHENTICATION simplified abstract

From WikiPatents
Jump to navigation Jump to search

CYBER SECURITY METHOD AND SYSTEM BASED ON MULTI-PARTY AND MULTI-FACTOR DYNAMIC STRONG ENCRYPTION AUTHENTICATION

Organization Name

EverMore Technology Inc.

Inventor(s)

Yuan-Sheng Chen of Hsinchu City (TW)

Wu-Hsiung Huang of Hsinchu City (TW)

Tsu-Pin Weng of Hsinchu City (TW)

Jia-You Jiang of Hsinchu City (TW)

Wen-Hsing Kuo

Yin-Te Tsai of Hsinchu City (TW)

CYBER SECURITY METHOD AND SYSTEM BASED ON MULTI-PARTY AND MULTI-FACTOR DYNAMIC STRONG ENCRYPTION AUTHENTICATION - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240267224 titled 'CYBER SECURITY METHOD AND SYSTEM BASED ON MULTI-PARTY AND MULTI-FACTOR DYNAMIC STRONG ENCRYPTION AUTHENTICATION

The present invention is a cyber security method that involves generating an ephemeral decryption key (EDK) in response to authentication information input, transmitting the EDK to a third device, encrypting ID information to generate an electronic digital signature (EDS) and an authentication token (AT), combining various elements to form an ephemeral string, and decrypting and verifying the EDS based on the EDK.

  • Randomly generating an ephemeral decryption key (EDK) in response to authentication information input
  • Transmitting the EDK to a third device and retrieving a token index (TI)
  • Encrypting ID information to generate an electronic digital signature (EDS) and an authentication token (AT)
  • Combining authentication information, ID information, token index, and authentication token to form an ephemeral string
  • Acquiring various elements by parsing the ephemeral string in a second device and decrypting and verifying the EDS based on the EDK

Potential Applications: - Secure communication systems - Data encryption and decryption processes - Authentication protocols

Problems Solved: - Enhancing data security - Preventing unauthorized access - Ensuring the integrity of transmitted information

Benefits: - Improved security measures - Enhanced data protection - Streamlined authentication processes

Commercial Applications: Title: Enhanced Cyber Security Method for Secure Data Transmission This technology can be utilized in industries such as: - Banking and finance - Healthcare - Government agencies

Questions about Cyber Security Method: 1. How does the ephemeral decryption key enhance data security?

  - The ephemeral decryption key adds an extra layer of security by generating a unique key for each authentication session, making it harder for unauthorized users to access sensitive information.

2. What are the potential drawbacks of using an ephemeral decryption key in a cyber security method?

  - While the ephemeral decryption key enhances security, it may introduce complexity to the authentication process and require additional resources for key management.


Original Abstract Submitted

the present invention relates to a cyber security method, which includes: in a first device: randomly generating an ephemeral decryption key (edk) in response to an input of an authentication information (ai); transmitting the edk to a third device and retrieving a token index (ti) from the third device; encrypting an id info to generate an electronic digital signature (eds) based on a part of the edk to generate an authentication token (at) accordingly; and combining the ai, the id info, the ti and the at to form an ephemeral string and sending the ephemeral string to a second device; and in the second device: acquiring the ai, the id info, the ti and the at by parsing the ephemeral string and requesting to retrieve the edk from the third device based on the ti; and decrypting the at and verifying the eds based on the edk.