-
公开(公告)号:MY179060A
公开(公告)日:2020-10-26
申请号:MYPI2012004831
申请日:2012-11-05
Applicant: MIMOS BERHAD
Abstract: The invention provides a method (100) of multi-user steganography. Firstly, the method involves establishing secure channels between at least three users including the steps of: each of the users randomly selecting a sequence of ordered GreenbergerHome-Zeilinger (GHZ) states having at least three particles (110); each of the users taking one particle from each of their respective GHZ states to each form at least three subsequences (120); each of the users keeping an initial subsequence in their own site and transmitting a respective one of the remaining subsequences to each of the other users (130); and each of the users checking the security of established channels by measuring the number of particles on either side, as agreed between the users (140). Next, the method involves the users transmitting messages between each other by performing the steps of: each of the users encoding a cover message by applying a unitary transformation on the subsequences sent by the other users (150); each of th users transmitting the subsequences encoded with their cover message to the other users (160); each of the users retrieving their respective subsequence in which the cover messages of the other users are encoded (170); each of the users performing GHZsbased measurements on the subsequence having the cover messages of the other users encoded thereon, and comparing measurement outputs with the initial subsequence to obtain the encoded messages (180); and each of the users checking the security of established channels by measuring the number of particles on either side, as agreed between the users (190). After this process. the users exchange stenographic messages (200).
-
公开(公告)号:MY166564A
公开(公告)日:2018-07-16
申请号:MYPI2013001491
申请日:2013-04-25
Applicant: MIMOS BERHAD
Inventor: JAMALUL-LAIL AB MANAN , MOHD FAIZAL MUBARAK
Abstract: A SYSTEM AND METHOD FOR PRIVACY MANAGEMENT FOR INTERNET OF THINGS (LOT) SERVICES IS PROVIDED BY UTILIZING INFORMATION PRIVACY CONTROL MODULE (IPCM) TO INTEGRATE INTERNET OF THINGS (LOT) DEVICES AND INTERNET OF THINGS (LOT) GATEWAY. GENUINE USERS UTILIZE INTERNET OF THINGS (LOT) SERVICES ANONYMOUSLY FOR PROTECTION OF IDENTITY AND GENUINE USERS HAVE CONTROL OVER PERSONAL PRIVATE DATA THROUGH PRIVACY ACCESS POLICY. THE SYSTEM OF THE PRESENT INVENTION INCLUDES AT LEAST ONE ACCESS CONTROL SERVER (302); AT LEAST ONE INFORMATION PRIVACY CONTROL MODULE (304) WITHIN AT LEAST ONE ACCESS CONTROL SERVER (302); AT LEAST ONE PRIVACY POLICY TABLE (306) WITHIN AT LEAST ONE ACCESS CONTROL SERVER (302); A PLURALITY OF INTERNET OF THINGS GATEWAYS (312); AND A PLURALITY OF INTERNET OF THINGS SENSORS (316). THE AT LEAST ONE INFORMATION PRIVACY CONTROL MODULE (304) PROVIDES ACCESS RIGHTS TO CLIENT FOR CLIENT TO ACCESS THE INTERNET OF THINGS GATEWAY BASED ON USER PRIVACY ACCESS RIGHTS IN CLIENT PRIVACY POLICY TABLE. FURTHER, SECURE CONNECTION IS PROVIDED BY THE INFORMATION PRIVACY CONTROL MODULE FOR CLIENT TO ACCESS TO SELECTED INTERNET OF THINGS GATEWAY AND INTERNET OF THINGS GATEWAY IS INITIATED TO PERFORM CHALLENGE RESPONSE WITH INTERNET OF THINGS SENSORS TO PROVIDE UNCLONABLE IDENTITY. THE UNCLONABLE IDENTITY IS PROVIDED BY THE PHYSICALLY UNCLONABLE FUNCTIONS EMBEDDED WITHIN THE SENSORS TO ELIMINATE WRONG MEASUREMENTS BY EXTRACTING SECRET CRYPTOGRAPHIC KEYS FROM PHYSICAL CHARACTERISTIC OF INTEGRATED CIRCUIT. IN SHORT, FOR TRUST ESTABLISHMENT, INTEGRITY VERIFICATION PROTECTS AGAINST PHISING AND ROOTKITS AND INTERNET OF THINGS SENSORS EMBEDDED WITH PHYSICALLY UNCLONABLE FUNCTIONS PROVIDES UNCLONABLE IDENTITY AND ELIMINATES WRONG MEASUREMENTS. THE MOST ILLUSTRATIVE DRAWING IS
-
3.
公开(公告)号:WO2010151102A1
公开(公告)日:2010-12-29
申请号:PCT/MY2010/000100
申请日:2010-06-15
Applicant: MIMOS BERHAD , MOHD AZUDDIN BIN PARMAN , JAMALUL-LAIL AB MANAN
Inventor: MOHD AZUDDIN BIN PARMAN , JAMALUL-LAIL AB MANAN
CPC classification number: H04W12/08 , G06F21/88 , G06F2221/2143 , H04W12/12
Abstract: A method (100) and an apparatus (200) for protecting and ensuring data security by destroying and disabling functionality of a mobile device through a Trusted Platform Module (TPM), the apparatus comprising at least one or more processors (102), a memory in communication with at least one of the processors (104) and a Trusted Platform Module (TPM) in communication with at least one of the processors (106). The at least one or more processors in communication with the memory and the TPM having means for initializing the TPM via a TPM command (202), detecting a status of the TPM wherein the status of the TPM is a non-activated TPM, an activated TPM or a tampered TPM (204), extracting a key information of the TPM (206), processing an application for the mobile device using the extracted key information of the activated TPM (208), receiving a destroy command and the key information of the TPM (210) and disabling functionality of the mobile device (212).
Abstract translation: 一种用于通过可信平台模块(TPM)破坏和禁用移动设备的功能来保护和确保数据安全性的方法(100)和装置(200),所述设备包括至少一个或多个处理器(102),存储器 与处理器(104)中的至少一个通信,以及与至少一个处理器(106)通信的可信平台模块(TPM)。 与存储器和TPM通信的至少一个或多个处理器具有用于经由TPM命令(202)初始化TPM的装置,检测TPM的状态,其中TPM的状态是未激活的TPM,激活的 TPM或篡改TPM(204),提取TPM的密钥信息(206),使用提取的激活TPM的密钥信息处理移动设备的应用(208),接收摧毁命令和密钥信息 TPM(210)和所述移动设备(212)的禁用功能。
-
-