AU2002213182A1 - Secret key messaging - Google Patents

Secret key messaging

Info

Publication number
AU2002213182A1
AU2002213182A1 AU2002213182A AU1318202A AU2002213182A1 AU 2002213182 A1 AU2002213182 A1 AU 2002213182A1 AU 2002213182 A AU2002213182 A AU 2002213182A AU 1318202 A AU1318202 A AU 1318202A AU 2002213182 A1 AU2002213182 A1 AU 2002213182A1
Authority
AU
Australia
Prior art keywords
secret key
key messaging
messaging
secret
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU2002213182A
Inventor
Marco Aurelio Garib
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
EVERSYSTEMS Inc
Original Assignee
EVERSYSTEMS Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by EVERSYSTEMS Inc filed Critical EVERSYSTEMS Inc
Publication of AU2002213182A1 publication Critical patent/AU2002213182A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3674Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/88Medical equipments
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)
AU2002213182A 2000-10-13 2001-10-11 Secret key messaging Abandoned AU2002213182A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US24056500P 2000-10-13 2000-10-13
US60/240,565 2000-10-13
PCT/US2001/032008 WO2002032044A2 (en) 2000-10-13 2001-10-11 Secret key messaging

Publications (1)

Publication Number Publication Date
AU2002213182A1 true AU2002213182A1 (en) 2002-04-22

Family

ID=22907062

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2002213182A Abandoned AU2002213182A1 (en) 2000-10-13 2001-10-11 Secret key messaging

Country Status (5)

Country Link
US (1) US6728378B2 (en)
EP (1) EP1325583A2 (en)
AU (1) AU2002213182A1 (en)
BR (1) BR0114602A (en)
WO (1) WO2002032044A2 (en)

Families Citing this family (71)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6256393B1 (en) * 1998-06-23 2001-07-03 General Instrument Corporation Authorization and access control of software object residing in set-top terminals
US20020112015A1 (en) * 1999-03-02 2002-08-15 International Business Machines Corporation Selective security encryption of electronic communication for selected recipients
US6714967B1 (en) * 1999-07-30 2004-03-30 Microsoft Corporation Integration of a computer-based message priority system with mobile electronic devices
JP2001211157A (en) * 2000-01-25 2001-08-03 Murata Mach Ltd Secret key registering method, secret key register secret key issuing method, cipher communication method, cipher communication system and recording medium
GB2366706B (en) * 2000-08-31 2004-11-03 Content Technologies Ltd Monitoring electronic mail messages digests
US7003800B1 (en) * 2000-11-06 2006-02-21 Ralph Victor Bain Self-decrypting web site pages
EP1241857A1 (en) * 2001-03-15 2002-09-18 Nokia Corporation Method for accessing files stored in a mobile terminal device supporting an internet protocol
US20020178353A1 (en) * 2001-04-11 2002-11-28 Graham Randall James Secure messaging using self-decrypting documents
JP2002344441A (en) * 2001-05-11 2002-11-29 Ricoh Co Ltd Digital data encryption system, digital data reproducing device, digital data enciphering method, digital data reproducing method and program for making computer execute the method
US8117450B2 (en) * 2001-10-11 2012-02-14 Hewlett-Packard Development Company, L.P. System and method for secure data transmission
FR2834158B1 (en) * 2001-12-21 2005-02-11 Radiotelephone Sfr ELECTRONIC SIGNATURE METHOD
CA2479601C (en) 2002-03-20 2012-07-03 Research In Motion Limited System and method for transmitting and utilizing attachments
AUPS217002A0 (en) * 2002-05-07 2002-06-06 Wireless Applications Pty Ltd Clarence tan
US7908330B2 (en) * 2003-03-11 2011-03-15 Sonicwall, Inc. Message auditing
US7539726B1 (en) 2002-07-16 2009-05-26 Sonicwall, Inc. Message testing
US8396926B1 (en) 2002-07-16 2013-03-12 Sonicwall, Inc. Message challenge response
US8924484B2 (en) 2002-07-16 2014-12-30 Sonicwall, Inc. Active e-mail filter with challenge-response
JP2004078053A (en) * 2002-08-22 2004-03-11 Sony Corp Ciphering device
US7406502B1 (en) 2003-02-20 2008-07-29 Sonicwall, Inc. Method and system for classifying a message based on canonical equivalent of acceptable items included in the message
US8266215B2 (en) 2003-02-20 2012-09-11 Sonicwall, Inc. Using distinguishing properties to classify messages
US7299261B1 (en) 2003-02-20 2007-11-20 Mailfrontier, Inc. A Wholly Owned Subsidiary Of Sonicwall, Inc. Message classification using a summary
JP3923028B2 (en) * 2003-04-28 2007-05-30 シャープ株式会社 Image recording system and image recording apparatus
US7949877B2 (en) * 2003-06-30 2011-05-24 Realnetworks, Inc. Rights enforcement and usage reporting on a client device
US7461257B2 (en) * 2003-09-22 2008-12-02 Proofpoint, Inc. System for detecting spoofed hyperlinks
EP1521390B1 (en) * 2003-10-01 2008-08-13 Hewlett-Packard Development Company, L.P. Digital signature method and apparatus
EP1536305A1 (en) * 2003-11-27 2005-06-01 Océ-Technologies B.V. Secure transmission of electronic documents
EP1542396B1 (en) * 2003-11-27 2007-05-30 Océ-Technologies B.V. Secure data transmission in a network system of image processing devices
UA68467C2 (en) * 2003-12-18 2004-08-16 Close Joint Stock Company Comm Method for registering a user by a control authorities for subsequent operations with a service organization
US9537731B2 (en) * 2004-07-07 2017-01-03 Sciencelogic, Inc. Management techniques for non-traditional network and information system topologies
WO2006014504A2 (en) 2004-07-07 2006-02-09 Sciencelogic, Llc Self configuring network management system
US7660987B2 (en) * 2004-10-29 2010-02-09 Baylis Stephen W Method of establishing a secure e-mail transmission link
US20060136717A1 (en) 2004-12-20 2006-06-22 Mark Buer System and method for authentication via a proximate device
US8295484B2 (en) * 2004-12-21 2012-10-23 Broadcom Corporation System and method for securing data from a remote input device
KR100771911B1 (en) * 2005-02-04 2007-11-01 삼성전자주식회사 Method of key establishment between wireless communication devices
US20060184785A1 (en) * 2005-02-16 2006-08-17 David Carroll Challener Apparatus, system, and method for securing I/O communications between a blade and a peripheral interface device of a blade-based computer system
US7529937B2 (en) * 2005-03-07 2009-05-05 Microsoft Corporation System and method for establishing that a server and a correspondent have compatible secure email
US7702107B1 (en) 2005-07-27 2010-04-20 Messing John H Server-based encrypted messaging method and apparatus
US7664947B2 (en) * 2005-10-12 2010-02-16 The Boeing Company Systems and methods for automated exchange of electronic mail encryption certificates
US8549295B2 (en) * 2006-05-31 2013-10-01 Microsoft Corporation Establishing secure, mutually authenticated communication credentials
US8028026B2 (en) * 2006-05-31 2011-09-27 Microsoft Corporation Perimeter message filtering with extracted user-specific preferences
US8726020B2 (en) * 2006-05-31 2014-05-13 Microsoft Corporation Updating configuration information to a perimeter network
EP1924047B1 (en) 2006-11-15 2012-04-04 Research In Motion Limited Client credential based secure session authentication method and apparatus
US8418235B2 (en) * 2006-11-15 2013-04-09 Research In Motion Limited Client credential based secure session authentication method and apparatus
EP1926278B1 (en) * 2006-11-22 2009-04-01 Research In Motion Limited System and method for secure record protocol using shared knowledge of mobile user credentials
US20080118059A1 (en) * 2006-11-22 2008-05-22 Research In Motion Limited System and method for secure record protocol using shared knowledge of mobile user credentials
FR2909243B1 (en) * 2006-11-23 2009-02-06 Sagem Comm METHOD AND SYSTEM FOR LOCKING / UNLOCKING NETWORK ACCESS FUNCTIONS OF A MULTI FUNCTION TERMINAL.
US8341417B1 (en) * 2006-12-12 2012-12-25 Cisco Technology, Inc. Data storage using encoded hash message authentication code
US20080189381A1 (en) * 2007-02-01 2008-08-07 Universal Data Protection Corporation Method and system for secure communication between devices
US20080294895A1 (en) * 2007-02-15 2008-11-27 Michael Bodner Disaggregation/reassembly method system for information rights management of secure documents
WO2008100606A1 (en) * 2007-02-15 2008-08-21 Children's Hospital Medical Center Disaggregation/reassembly method system for information rights management of secure documents
US8041763B2 (en) * 2007-06-12 2011-10-18 International Business Machines Corporation Method and system for providing sharable bookmarking of web pages consisting of dynamic content
GB0713915D0 (en) * 2007-07-18 2007-08-29 Solutions & Services Uk Ltd E E-mail system
US8559637B2 (en) * 2008-09-10 2013-10-15 Verizon Patent And Licensing Inc. Securing information exchanged via a network
US20100100465A1 (en) * 2008-10-17 2010-04-22 Innovapost Inc. Trusted third party authentication and notarization for email
US8848904B2 (en) * 2008-10-24 2014-09-30 University Of Maryland, College Park Method and implementation for information exchange using Markov models
US8856525B2 (en) * 2009-08-13 2014-10-07 Michael Gregor Kaplan Authentication of email servers and personal computers
US8468580B1 (en) * 2009-08-20 2013-06-18 Apple Inc. Secure communication between trusted parties
US20110083018A1 (en) * 2009-10-06 2011-04-07 Validity Sensors, Inc. Secure User Authentication
US8463938B2 (en) * 2009-10-23 2013-06-11 Comcast Cable Communications, Llc Address couplet communication filtering
WO2011100715A1 (en) 2010-02-12 2011-08-18 Service Heartbeat Llc Workflow and resource management system with integrated bi-directional communications
US9129107B2 (en) * 2011-02-10 2015-09-08 SecurenCrypt, LLC Document encryption and decryption
US8732462B2 (en) * 2011-07-07 2014-05-20 Ziptr, Inc. Methods and apparatus for secure data sharing
US8645681B1 (en) * 2011-09-28 2014-02-04 Emc Corporation Techniques for distributing secure communication secrets
US9673983B2 (en) 2012-09-14 2017-06-06 Qualcomm Incorporated Apparatus and method for protecting message data
DE102013102849A1 (en) * 2013-03-20 2014-09-25 HvS-Consulting AG Method and device for the persistent decryption of electronic messages such as e-mails
US10461942B1 (en) * 2016-07-20 2019-10-29 United Services Automobile Association Multi-factor authentication with code rotation
WO2018076190A1 (en) * 2016-10-26 2018-05-03 华为技术有限公司 Communication method, terminal, core network user plane device and access network device
US11070368B2 (en) 2018-09-11 2021-07-20 Dycrav Security Incorporated System, method, and program for transmitting and receiving any type of secure digital data
EP3899911A1 (en) * 2018-12-19 2021-10-27 Telit Communications S.P.A. Systems and methods for managing a trusted application in a computer chip module
JP7445135B2 (en) * 2020-08-27 2024-03-07 富士通株式会社 Communication program, communication device, communication method, and communication system
DE102020212451A1 (en) * 2020-10-01 2022-04-07 Robert Bosch Gesellschaft mit beschränkter Haftung Method of digitally signing a message

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
IL114361A (en) * 1995-06-27 1998-08-16 Veritas Technology Solutions L File encryption method
US5943423A (en) * 1995-12-15 1999-08-24 Entegrity Solutions Corporation Smart token system for secure electronic transactions and identification
US6014688A (en) 1997-04-25 2000-01-11 Postx Corporation E-mail program capable of transmitting, opening and presenting a container having digital content using embedded executable software
CA2357016A1 (en) * 1999-01-14 2000-07-20 Tumbleweed Communications Corp. Web-based delivery of secure e-mail messages
AU3491300A (en) * 1999-02-19 2000-09-04 Messagemedia, Inc. Message encryption system and method
US6367010B1 (en) 1999-07-02 2002-04-02 Postx Corporation Method for generating secure symmetric encryption and decryption
GB0022724D0 (en) * 2000-09-15 2000-11-01 Innovation Venture Ltd Secure messaging

Also Published As

Publication number Publication date
WO2002032044A3 (en) 2003-01-09
BR0114602A (en) 2004-09-28
US20020078351A1 (en) 2002-06-20
EP1325583A2 (en) 2003-07-09
WO2002032044A2 (en) 2002-04-18
US6728378B2 (en) 2004-04-27

Similar Documents

Publication Publication Date Title
AU2002213182A1 (en) Secret key messaging
AU1224701A (en) Key encryption using client-unique additional key
AU2001259262A1 (en) Lock construction
AU2001268071A1 (en) Cryptographic communications using pseudo-randomly generated cryptography keys
AU2001271302A1 (en) Encryption system that dynamically locates keys
AU2002212457A1 (en) Distributing public keys
AU2001291783A1 (en) Encryption
AU2001238602A1 (en) Lock construction
AU2002222217A1 (en) Directoryless public key cryptographic system and method
AU2002365343A1 (en) Time-based encryption key
AU757159C (en) Biometric key
AU2002214083A1 (en) Secure keyboard
AU2001221106A1 (en) User key validation
AU2002254663A1 (en) Pipelined deciphering round keys generation
AU2001241872A1 (en) Combination lock
AU2001250373A1 (en) Encrypting and decrypting
AU2001287874A1 (en) Secure messaging
AU2001240817A1 (en) Security feature
AU2001280190A1 (en) Key holder
AU2002218340A1 (en) Key pair generation
AU2002301313A1 (en) Padlocks
AU2002229540A1 (en) Encryption system
AU2002210230A1 (en) Lock
CA90648S (en) Key
AUPQ870100A0 (en) Security doorbell