WO2006078556A3 - Technique for providing multiple levels of security - Google Patents

Technique for providing multiple levels of security Download PDF

Info

Publication number
WO2006078556A3
WO2006078556A3 PCT/US2006/001257 US2006001257W WO2006078556A3 WO 2006078556 A3 WO2006078556 A3 WO 2006078556A3 US 2006001257 W US2006001257 W US 2006001257W WO 2006078556 A3 WO2006078556 A3 WO 2006078556A3
Authority
WO
WIPO (PCT)
Prior art keywords
security
technique
transformed
type
multiple levels
Prior art date
Application number
PCT/US2006/001257
Other languages
French (fr)
Other versions
WO2006078556A2 (en
Inventor
Ravinderpal Singh Sandhu
Brett Jason Schoppert
Ravi Ganesan
Mihir Bellare
Colin Joseph Desa
Original Assignee
Tricipher Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US11/056,115 external-priority patent/US7596697B2/en
Application filed by Tricipher Inc filed Critical Tricipher Inc
Publication of WO2006078556A2 publication Critical patent/WO2006078556A2/en
Publication of WO2006078556A3 publication Critical patent/WO2006078556A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

Techniques for authentication are provided. A first authentication request transformed with a private portion of a first type split private key is received. A first user is authenticated for a first level of network access based upon the first request being transformed with the first type of split private key. A second authentication request that is transformed with a private portion of a second type private key is also received. A second user is authenticated for a second level of network access based upon the second request being transformed with the second type of split private key.
PCT/US2006/001257 2005-01-18 2006-01-13 Technique for providing multiple levels of security WO2006078556A2 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US64402805P 2005-01-18 2005-01-18
US60/644,028 2005-01-18
US11/056,115 2005-02-14
US11/056,115 US7596697B2 (en) 2005-02-14 2005-02-14 Technique for providing multiple levels of security

Publications (2)

Publication Number Publication Date
WO2006078556A2 WO2006078556A2 (en) 2006-07-27
WO2006078556A3 true WO2006078556A3 (en) 2009-05-22

Family

ID=36692745

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2006/001257 WO2006078556A2 (en) 2005-01-18 2006-01-13 Technique for providing multiple levels of security

Country Status (1)

Country Link
WO (1) WO2006078556A2 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020078345A1 (en) * 2000-12-19 2002-06-20 Ravi Sandhu System and method for authentication in a crypto-system utilizing symmetric and asymmetric crypto-keys
US6542608B2 (en) * 1997-02-13 2003-04-01 Tecsec Incorporated Cryptographic key split combiner

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6542608B2 (en) * 1997-02-13 2003-04-01 Tecsec Incorporated Cryptographic key split combiner
US20020078345A1 (en) * 2000-12-19 2002-06-20 Ravi Sandhu System and method for authentication in a crypto-system utilizing symmetric and asymmetric crypto-keys

Also Published As

Publication number Publication date
WO2006078556A2 (en) 2006-07-27

Similar Documents

Publication Publication Date Title
WO2006101667A3 (en) Authenticating an endpoint using a stun server
WO2008121157A3 (en) Cryptographic key management system facilitating secure access of data portions to corresponding groups of users
WO2008036947A3 (en) Reverse proxy system
WO2010141445A3 (en) Workgroup key wrapping for community of interest membership authentication
WO2006113189A3 (en) Provisioning root keys
WO2007136508A3 (en) Techniques for providing security protection in wireless networks by switching modes
WO2009068956A3 (en) Authentication method without credential duplication for users belonging to different organizations
WO2006020141A3 (en) Technique for trasfering encrypted content from first device to second device associated with same user
WO2006078430A3 (en) Wireless network credential provisioning
WO2007001329A3 (en) Cryptographic key management
WO2007039866A3 (en) System and/or method for authentication and/or authorization via a network
WO2006119184A3 (en) Protecting one-time-passwords against man-in-the-middle attacks
WO2009088615A3 (en) Selective authorization based on authentication input attributes
WO2009031056A3 (en) Providing services to a guest device in a personal network
EP3938934A4 (en) Improving computer system security using a biometric authentication gateway for user service access with a divided and distributed private encryption key
WO2006022821A3 (en) Log-in security device
HK1091616A1 (en) Authenticated key exchange based on pairwise master key
WO2003032126A3 (en) Multi-factor authentication system
WO2010060704A3 (en) Method and system for token-based authentication
WO2007115209A3 (en) Identity and access management framework
WO2006063194A3 (en) Technique for securely communicating programming content
WO2007005573A3 (en) Facilitating mobility for a mobile station
WO2007039873A3 (en) System and/or method for class-based authorization
TW200737890A (en) Certify and split system and method for replacing cryptographic keys
WO2008127430A3 (en) Secure access to restricted resource

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 06718344

Country of ref document: EP

Kind code of ref document: A2

DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)