WO2001097443A3 - Method and apparatus for enhancing network security protection server performance - Google Patents

Method and apparatus for enhancing network security protection server performance Download PDF

Info

Publication number
WO2001097443A3
WO2001097443A3 PCT/US2001/018878 US0118878W WO0197443A3 WO 2001097443 A3 WO2001097443 A3 WO 2001097443A3 US 0118878 W US0118878 W US 0118878W WO 0197443 A3 WO0197443 A3 WO 0197443A3
Authority
WO
WIPO (PCT)
Prior art keywords
public key
prime numbers
efficiency
network security
establishing
Prior art date
Application number
PCT/US2001/018878
Other languages
French (fr)
Other versions
WO2001097443A2 (en
Inventor
Hovav Shacham
Dan Boneh
Sanjay Beri
Original Assignee
Ingrian Systems Inc
Hovav Shacham
Dan Boneh
Sanjay Beri
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ingrian Systems Inc, Hovav Shacham, Dan Boneh, Sanjay Beri filed Critical Ingrian Systems Inc
Priority to AU2001269794A priority Critical patent/AU2001269794A1/en
Publication of WO2001097443A2 publication Critical patent/WO2001097443A2/en
Publication of WO2001097443A3 publication Critical patent/WO2001097443A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/60Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
    • G06F7/72Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
    • G06F7/723Modular exponentiation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/166Implementing security features at a particular protocol layer at the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/60Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
    • G06F7/72Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
    • G06F7/721Modular inversion, reciprocal or quotient calculation

Abstract

Presented is a method and system for improving the efficiency of network security protections communication protocols such as Secure Socket Layer ('SSL') using enhanced Rivest-Shamir-Adleman ('RSA') encryption and decryption techniques. During the establishment of the initial handshake of SSL communications, where a client is coupled to a server, the server generates a RSA public/private key pair. The public key is formed using two distinct prime numbers. By reducing the size of these prime numbers and arriving at the decrypted message using the Chinese Remainder Theorem, the efficiency of establishing a secure communications session is increased. Likewise if during generation of the public key, the prime numbers possess a mathematical relationship to the public key such that the prime numbers on the order of a third of the size of the public key then the efficiency of establishing the initial handshake is again improved.
PCT/US2001/018878 2000-06-12 2001-06-12 Method and apparatus for enhancing network security protection server performance WO2001097443A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2001269794A AU2001269794A1 (en) 2000-06-12 2001-06-12 Method and apparatus for enhancing network security protection server performance

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US21103100P 2000-06-12 2000-06-12
US21102300P 2000-06-12 2000-06-12
US60/211,023 2000-06-12
US60/211,031 2000-06-12
US09/877,302 US20020039420A1 (en) 2000-06-12 2001-06-08 Method and apparatus for batched network security protection server performance

Publications (2)

Publication Number Publication Date
WO2001097443A2 WO2001097443A2 (en) 2001-12-20
WO2001097443A3 true WO2001097443A3 (en) 2003-05-08

Family

ID=27395582

Family Applications (2)

Application Number Title Priority Date Filing Date
PCT/US2001/018825 WO2001097442A2 (en) 2000-06-12 2001-06-12 Method and apparatus for batched network security protection server performance
PCT/US2001/018878 WO2001097443A2 (en) 2000-06-12 2001-06-12 Method and apparatus for enhancing network security protection server performance

Family Applications Before (1)

Application Number Title Priority Date Filing Date
PCT/US2001/018825 WO2001097442A2 (en) 2000-06-12 2001-06-12 Method and apparatus for batched network security protection server performance

Country Status (3)

Country Link
US (1) US20020039420A1 (en)
AU (2) AU2001268325A1 (en)
WO (2) WO2001097442A2 (en)

Families Citing this family (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7509486B1 (en) * 1999-07-08 2009-03-24 Broadcom Corporation Encryption processor for performing accelerated computations to establish secure network sessions connections
US20020087884A1 (en) * 2000-06-12 2002-07-04 Hovav Shacham Method and apparatus for enhancing network security protection server performance
US7137143B2 (en) 2000-08-07 2006-11-14 Ingrian Systems Inc. Method and system for caching secure web content
US20040015725A1 (en) * 2000-08-07 2004-01-22 Dan Boneh Client-side inspection and processing of secure content
US7757278B2 (en) * 2001-01-04 2010-07-13 Safenet, Inc. Method and apparatus for transparent encryption
WO2004019182A2 (en) * 2002-08-24 2004-03-04 Ingrian Networks, Inc. Selective feature activation
US20060149962A1 (en) * 2003-07-11 2006-07-06 Ingrian Networks, Inc. Network attached encryption
US20080270494A1 (en) * 2004-03-04 2008-10-30 Koninklijke Philips Electronics N.V. Method for the Exponentiation or Scalar Multiplication of Elements
US7519835B2 (en) * 2004-05-20 2009-04-14 Safenet, Inc. Encrypted table indexes and searching encrypted tables
JP4162237B2 (en) * 2004-06-24 2008-10-08 インターナショナル・ビジネス・マシーンズ・コーポレーション ENCRYPTED COMMUNICATION SYSTEM, ENCRYPTION DEVICE, DECRYPTION DEVICE, ENCRYPTION METHOD, DECRYPTION METHOD, ENCRYPTION PROGRAM, AND DECRYPTION PROGRAM
US20070180228A1 (en) * 2005-02-18 2007-08-02 Ulf Mattsson Dynamic loading of hardware security modules
US20070038703A1 (en) * 2005-07-14 2007-02-15 Yahoo! Inc. Content router gateway
US7623515B2 (en) * 2005-07-14 2009-11-24 Yahoo! Inc. Content router notification
US20070016636A1 (en) * 2005-07-14 2007-01-18 Yahoo! Inc. Methods and systems for data transfer and notification mechanisms
US20070014307A1 (en) * 2005-07-14 2007-01-18 Yahoo! Inc. Content router forwarding
US7849199B2 (en) * 2005-07-14 2010-12-07 Yahoo ! Inc. Content router
US20070014277A1 (en) * 2005-07-14 2007-01-18 Yahoo! Inc. Content router repository
US7631045B2 (en) * 2005-07-14 2009-12-08 Yahoo! Inc. Content router asynchronous exchange
US20070079386A1 (en) * 2005-09-26 2007-04-05 Brian Metzger Transparent encryption using secure encryption device
US20070079140A1 (en) * 2005-09-26 2007-04-05 Brian Metzger Data migration
US7725927B2 (en) * 2005-10-28 2010-05-25 Yahoo! Inc. Low code-footprint security solution
US8024290B2 (en) 2005-11-14 2011-09-20 Yahoo! Inc. Data synchronization and device handling
US8065680B2 (en) * 2005-11-15 2011-11-22 Yahoo! Inc. Data gateway for jobs management based on a persistent job table and a server table
US9367832B2 (en) * 2006-01-04 2016-06-14 Yahoo! Inc. Synchronizing image data among applications and devices
US7848516B2 (en) * 2006-01-20 2010-12-07 Chiou-Haun Lee Diffused symmetric encryption/decryption method with asymmetric keys
US8386768B2 (en) * 2006-02-08 2013-02-26 Safenet, Inc. High performance data encryption server and method for transparently encrypting/decrypting data
US7958091B2 (en) 2006-02-16 2011-06-07 Ingrian Networks, Inc. Method for fast bulk loading data into a database while bypassing exit routines
US20080034008A1 (en) * 2006-08-03 2008-02-07 Yahoo! Inc. User side database
US8144875B2 (en) * 2006-09-06 2012-03-27 Paul McGough Method and system for establishing real-time authenticated and secured communications channels in a public network
US8379865B2 (en) * 2006-10-27 2013-02-19 Safenet, Inc. Multikey support for multiple office system
US8549122B2 (en) * 2006-12-04 2013-10-01 Oracle International Corporation System and method for communication agent within a fully distributed network
US20080270629A1 (en) * 2007-04-27 2008-10-30 Yahoo! Inc. Data snychronization and device handling using sequence numbers
US20100031321A1 (en) 2007-06-11 2010-02-04 Protegrity Corporation Method and system for preventing impersonation of computer system user
US20090132804A1 (en) * 2007-11-21 2009-05-21 Prabir Paul Secured live software migration
US7978854B2 (en) * 2008-03-25 2011-07-12 International Business Machines Corporation Asymmetric key generation
EP2222013A1 (en) * 2009-02-19 2010-08-25 Thomson Licensing Method and device for countering fault attacks
US8638926B2 (en) * 2009-02-26 2014-01-28 Red Hat, Inc. Sharing a secret with modular inverses
WO2014158183A1 (en) 2013-03-29 2014-10-02 Hewlett-Packard Development Company, L.P. Batching tuples
US9112907B2 (en) 2013-05-31 2015-08-18 International Business Machines Corporation System and method for managing TLS connections among separate applications within a network of computing systems
US9112908B2 (en) 2013-05-31 2015-08-18 International Business Machines Corporation System and method for managing TLS connections among separate applications within a network of computing systems
JP6262085B2 (en) * 2014-06-25 2018-01-17 ルネサスエレクトロニクス株式会社 Data processing apparatus and decryption processing method
FR3088452B1 (en) * 2018-11-08 2023-01-06 Idemia France METHOD FOR VERIFYING THE INTEGRITY OF A PAIR OF CRYPTOGRAPHIC KEYS AND CRYPTOGRAPHIC DEVICE
US11533603B2 (en) * 2019-10-14 2022-12-20 Qualcomm Incorporated Power saving for pedestrian user equipments
US11151071B1 (en) * 2020-05-27 2021-10-19 EMC IP Holding Company LLC Host device with multi-path layer distribution of input-output operations across storage caches

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0946018A2 (en) * 1998-03-26 1999-09-29 Nippon Telegraph and Telephone Corporation Scheme for fast realization of encryption, decryption and authentication

Family Cites Families (51)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4386416A (en) * 1980-06-02 1983-05-31 Mostek Corporation Data compression, encryption, and in-line transmission system
US4964164A (en) * 1989-08-07 1990-10-16 Algorithmic Research, Ltd. RSA computation method for efficient batch processing
US5222133A (en) * 1991-10-17 1993-06-22 Wayne W. Chou Method of protecting computer software from unauthorized execution using multiple keys
JP3082554B2 (en) * 1994-01-11 2000-08-28 株式会社日立製作所 Self healing ring switch
US5557712A (en) * 1994-02-16 1996-09-17 Apple Computer, Inc. Color map tables smoothing in a color computer graphics system avoiding objectionable color shifts
US5734744A (en) * 1995-06-07 1998-03-31 Pixar Method and apparatus for compression and decompression of color data
US5764235A (en) * 1996-03-25 1998-06-09 Insight Development Corporation Computer implemented method and system for transmitting graphical images from server to client at user selectable resolution
US5828832A (en) * 1996-07-30 1998-10-27 Itt Industries, Inc. Mixed enclave operation in a computer network with multi-level network security
JP3695045B2 (en) * 1996-10-01 2005-09-14 ソニー株式会社 Encoder
US6098096A (en) * 1996-12-09 2000-08-01 Sun Microsystems, Inc. Method and apparatus for dynamic cache preloading across a network
US5848159A (en) * 1996-12-09 1998-12-08 Tandem Computers, Incorporated Public key cryptographic apparatus and method
US5923756A (en) * 1997-02-12 1999-07-13 Gte Laboratories Incorporated Method for providing secure remote command execution over an insecure computer network
US6061448A (en) * 1997-04-01 2000-05-09 Tumbleweed Communications Corp. Method and system for dynamic server document encryption
US6012198A (en) * 1997-04-11 2000-01-11 Wagner Spray Tech Corporation Painting apparatus
US6105012A (en) * 1997-04-22 2000-08-15 Sun Microsystems, Inc. Security system and method for financial institution server and client web browser
US6397330B1 (en) * 1997-06-30 2002-05-28 Taher Elgamal Cryptographic policy filters and policy control method and apparatus
US6256712B1 (en) * 1997-08-01 2001-07-03 International Business Machines Corporation Scaleable method for maintaining and making consistent updates to caches
US6470386B1 (en) * 1997-09-26 2002-10-22 Worldcom, Inc. Integrated proxy interface for web based telecommunications management tools
US6621505B1 (en) * 1997-09-30 2003-09-16 Journee Software Corp. Dynamic process-based enterprise computing system and method
US6081598A (en) * 1997-10-20 2000-06-27 Microsoft Corporation Cryptographic system and method with fast decryption
US6202157B1 (en) * 1997-12-08 2001-03-13 Entrust Technologies Limited Computer network security system and method having unilateral enforceable security policy provision
US6154542A (en) * 1997-12-17 2000-11-28 Apple Computer, Inc. Method and apparatus for simultaneously encrypting and compressing data
US6233565B1 (en) * 1998-02-13 2001-05-15 Saranac Software, Inc. Methods and apparatus for internet based financial transactions with evidence of payment
US6073242A (en) * 1998-03-19 2000-06-06 Agorics, Inc. Electronic authority server
US6578061B1 (en) * 1999-01-19 2003-06-10 Nippon Telegraph And Telephone Corporation Method and apparatus for data permutation/division and recording medium with data permutation/division program recorded thereon
US6081900A (en) * 1999-03-16 2000-06-27 Novell, Inc. Secure intranet access
US6594279B1 (en) * 1999-04-22 2003-07-15 Nortel Networks Limited Method and apparatus for transporting IP datagrams over synchronous optical networks at guaranteed quality of service
US6886095B1 (en) * 1999-05-21 2005-04-26 International Business Machines Corporation Method and apparatus for efficiently initializing secure communications among wireless devices
US6477646B1 (en) * 1999-07-08 2002-11-05 Broadcom Corporation Security chip architecture and implementations for cryptography acceleration
US6757823B1 (en) * 1999-07-27 2004-06-29 Nortel Networks Limited System and method for enabling secure connections for H.323 VoIP calls
US6654354B1 (en) * 1999-12-22 2003-11-25 Worldcom, Inc. System and method for planning multiple MUX levels in a fiber optic network simulation plan
US6616350B1 (en) * 1999-12-23 2003-09-09 Nortel Networks Limited Method and apparatus for providing a more efficient use of the total bandwidth capacity in a synchronous optical network
US6587866B1 (en) * 2000-01-10 2003-07-01 Sun Microsystems, Inc. Method for distributing packets to server nodes using network client affinity and packet distribution table
US6763459B1 (en) * 2000-01-14 2004-07-13 Hewlett-Packard Company, L.P. Lightweight public key infrastructure employing disposable certificates
US20020087884A1 (en) * 2000-06-12 2002-07-04 Hovav Shacham Method and apparatus for enhancing network security protection server performance
US7177945B2 (en) * 2000-08-04 2007-02-13 Avaya Technology Corp. Non-intrusive multiplexed transaction persistency in secure commerce environments
US7137143B2 (en) * 2000-08-07 2006-11-14 Ingrian Systems Inc. Method and system for caching secure web content
US20040015725A1 (en) * 2000-08-07 2004-01-22 Dan Boneh Client-side inspection and processing of secure content
EP1327191B1 (en) * 2000-09-22 2013-10-23 Lumension Security, Inc. Non-invasive automatic offsite patch fingerprinting and updating system and method
US6963980B1 (en) * 2000-11-16 2005-11-08 Protegrity Corporation Combined hardware and software based encryption of databases
US20020066038A1 (en) * 2000-11-29 2002-05-30 Ulf Mattsson Method and a system for preventing impersonation of a database user
US7757278B2 (en) * 2001-01-04 2010-07-13 Safenet, Inc. Method and apparatus for transparent encryption
US20030065919A1 (en) * 2001-04-18 2003-04-03 Albert Roy David Method and system for identifying a replay attack by an access device to a computer system
US7853781B2 (en) * 2001-07-06 2010-12-14 Juniper Networks, Inc. Load balancing secure sockets layer accelerator
US20030097428A1 (en) * 2001-10-26 2003-05-22 Kambiz Afkhami Internet server appliance platform with flexible integrated suite of server resources and content delivery capabilities supporting continuous data flow demands and bursty demands
EP1315065B1 (en) * 2001-11-23 2007-10-10 Protegrity Research & Development Method for intrusion detection in a database system
US7269729B2 (en) * 2001-12-28 2007-09-11 International Business Machines Corporation Relational database management encryption system
US7742992B2 (en) * 2002-02-05 2010-06-22 Pace Anti-Piracy Delivery of a secure software license for a software product and a toolset for creating the software product
US6874089B2 (en) * 2002-02-25 2005-03-29 Network Resonance, Inc. System, method and computer program product for guaranteeing electronic transactions
US6694323B2 (en) * 2002-04-25 2004-02-17 Sybase, Inc. System and methodology for providing compact B-Tree
US6782000B2 (en) * 2002-10-31 2004-08-24 Ciena Corporation Method, system and storage medium for providing a cross connect user interface

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0946018A2 (en) * 1998-03-26 1999-09-29 Nippon Telegraph and Telephone Corporation Scheme for fast realization of encryption, decryption and authentication

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
TAKAGI T: "FAST RSA-TYPE CRYPTOSYSTEM MODULO PKQ", ADVANCES IN CRYPTOLOGY. CRYPTO '98. 18TH ANNUAL INTERNATIONAL CRYPTOLOGY CONFERENCE. SANTA BARBARA, AUG. 23 - 27, 1998. PROCEEDINGS, LECTURE NOTES IN COMPUTER SCIENCE;VOL. 1462, BERLIN: SPRINGER, DE, 23 August 1998 (1998-08-23), pages 318 - 326, XP000792177, ISBN: 3-540-64892-5 *
W. STALLINGS: "CRYPTOGRAPHY AND NETWORK SECURITY: PRINCIPLES AND PRACTICE", 1999, PRENTICE HALL, NEW JERSEY, XP002219172 *

Also Published As

Publication number Publication date
AU2001268325A1 (en) 2001-12-24
WO2001097442A3 (en) 2003-02-06
WO2001097443A2 (en) 2001-12-20
US20020039420A1 (en) 2002-04-04
WO2001097442A2 (en) 2001-12-20
AU2001269794A1 (en) 2001-12-24

Similar Documents

Publication Publication Date Title
WO2001097443A3 (en) Method and apparatus for enhancing network security protection server performance
EP0938209A3 (en) Method and apparatus for conducting crypto-ignition processes between thin client devices and server devices over data networks
CA2278670A1 (en) Encryption and decryption method and apparatus
EP1104959A3 (en) A cryptographic protocol for secure communications
CA2335172A1 (en) Secure mutual network authentication and key exchange protocol
TW363154B (en) Token distribution, registration, and dynamic configuration of user entitlement for and application level security system and method
EP0858186A3 (en) Method for secure communication in a telecommunication system
HK1072134A1 (en) Method for secure data exchange between two devices
WO2004051964A3 (en) Tunneled authentication protocol for preventing man-in-the-middle attacks
EP0807911A3 (en) Client/server protocol for proving authenticity
AU1240499A (en) Security of data connections
CA2241052A1 (en) Application level security system and method
EP0720326A3 (en) Method for secure session key generation
EP1223705A3 (en) Methods and systems for generating encryption keys using random bit sequences
WO2000041357A8 (en) Exchanging a secret over an unreliable network
CA2427699A1 (en) A system and method of exploiting the security of a secure communication channel to secure a non-secure communication channel
CN101022455A (en) Web communication encrypting method
CN113852460B (en) Implementation method and system for enhancing working key security based on quantum key
EP1122930A3 (en) Encryption key exchange protocol
WO2001084766A3 (en) System and method for encryption using transparent keys
EP0982958A3 (en) Method for protecting mobile anonymity
US20020146119A1 (en) Two channel secure communication
Matsuura et al. Modified aggressive mode of Internet key exchange resistant against denial-of-service attacks
MXPA05012234A (en) Des algorithm-based encryption method.
CN212115340U (en) Anti-quantum computation encryption device and anti-quantum computation encryption communication system

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US US US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP