US 12,445,286 B2
Cyber security method and system based on multi-party and multi-factor dynamic strong encryption authentication
Yuan-Sheng Chen, Hsinchu (TW); Wu-Hsiung Huang, Hsinchu (TW); Tsu-Pin Weng, Hsinchu (TW); Jia-You Jiang, Hsinchu (TW); Wen-Hsing Kuo, Hsinchu (TW); and Yin-Te Tsai, Hsinchu (TW)
Assigned to EverMore Technology Inc., Hsinchu (TW)
Filed by EverMore Technology Inc., Hsinchu (TW)
Filed on Aug. 8, 2023, as Appl. No. 18/231,329.
Claims priority of application No. 112104021 (TW), filed on Feb. 4, 2023.
Prior Publication US 2024/0267224 A1, Aug. 8, 2024
Int. Cl. H04L 29/06 (2006.01); H04L 9/08 (2006.01); H04L 9/32 (2006.01)
CPC H04L 9/3213 (2013.01) [H04L 9/0869 (2013.01); H04L 9/3226 (2013.01); H04L 9/3247 (2013.01)] 10 Claims
OG exemplary drawing
 
1. A cyber security method, comprising:
in a first device:
randomly generating a first ephemeral decryption key in response to an input of an authentication information;
encrypting an identity information based on the first ephemeral decryption key to generate an electronic digital signature;
randomly generating a second ephemeral decryption key;
encrypting the electronic digital signature based on the second ephemeral decryption key to generate an authentication token;
transmitting the first ephemeral decryption key and the second ephemeral decryption key to a third device and retrieving a token index from the third device, wherein the token index is generated by the third device and refers to a strictly smaller portion that is sufficient to retrieve the first and second ephemeral decryption keys from the third device;
combining the authentication information, the identity information, the token index and the authentication token to form an ephemeral string and sending the ephemeral string to a second device;
in the second device:
acquiring the authentication information, the identity information, the token index and the authentication token by receiving and parsing the ephemeral string;
requesting to retrieve the first ephemeral decryption key and the second ephemeral decryption key from the third device based on the token index;
decrypting the authentication token based on the second ephemeral decryption key to obtain the electronic digital signature;
verifying whether the electronic digital signature is correctly encrypted and not altered during the above transmitting and retrieving based on the first ephemeral decryption key; and
decrypting the electronic digital signature based on the first ephemeral decryption key to obtain the identity information, if the electronic digital signature is correctly encrypted and not altered.