WO2006078556A3 - Technique for providing multiple levels of security - Google Patents
Technique for providing multiple levels of security Download PDFInfo
- Publication number
- WO2006078556A3 WO2006078556A3 PCT/US2006/001257 US2006001257W WO2006078556A3 WO 2006078556 A3 WO2006078556 A3 WO 2006078556A3 US 2006001257 W US2006001257 W US 2006001257W WO 2006078556 A3 WO2006078556 A3 WO 2006078556A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- security
- technique
- transformed
- type
- multiple levels
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
Techniques for authentication are provided. A first authentication request transformed with a private portion of a first type split private key is received. A first user is authenticated for a first level of network access based upon the first request being transformed with the first type of split private key. A second authentication request that is transformed with a private portion of a second type private key is also received. A second user is authenticated for a second level of network access based upon the second request being transformed with the second type of split private key.
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US64402805P | 2005-01-18 | 2005-01-18 | |
US60/644,028 | 2005-01-18 | ||
US11/056,115 | 2005-02-14 | ||
US11/056,115 US7596697B2 (en) | 2005-02-14 | 2005-02-14 | Technique for providing multiple levels of security |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2006078556A2 WO2006078556A2 (en) | 2006-07-27 |
WO2006078556A3 true WO2006078556A3 (en) | 2009-05-22 |
Family
ID=36692745
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2006/001257 WO2006078556A2 (en) | 2005-01-18 | 2006-01-13 | Technique for providing multiple levels of security |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2006078556A2 (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020078345A1 (en) * | 2000-12-19 | 2002-06-20 | Ravi Sandhu | System and method for authentication in a crypto-system utilizing symmetric and asymmetric crypto-keys |
US6542608B2 (en) * | 1997-02-13 | 2003-04-01 | Tecsec Incorporated | Cryptographic key split combiner |
-
2006
- 2006-01-13 WO PCT/US2006/001257 patent/WO2006078556A2/en active Search and Examination
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6542608B2 (en) * | 1997-02-13 | 2003-04-01 | Tecsec Incorporated | Cryptographic key split combiner |
US20020078345A1 (en) * | 2000-12-19 | 2002-06-20 | Ravi Sandhu | System and method for authentication in a crypto-system utilizing symmetric and asymmetric crypto-keys |
Also Published As
Publication number | Publication date |
---|---|
WO2006078556A2 (en) | 2006-07-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2006101667A3 (en) | Authenticating an endpoint using a stun server | |
WO2008121157A3 (en) | Cryptographic key management system facilitating secure access of data portions to corresponding groups of users | |
WO2008036947A3 (en) | Reverse proxy system | |
WO2010141445A3 (en) | Workgroup key wrapping for community of interest membership authentication | |
WO2006113189A3 (en) | Provisioning root keys | |
WO2007136508A3 (en) | Techniques for providing security protection in wireless networks by switching modes | |
WO2009068956A3 (en) | Authentication method without credential duplication for users belonging to different organizations | |
WO2006020141A3 (en) | Technique for trasfering encrypted content from first device to second device associated with same user | |
WO2006078430A3 (en) | Wireless network credential provisioning | |
WO2007001329A3 (en) | Cryptographic key management | |
WO2007039866A3 (en) | System and/or method for authentication and/or authorization via a network | |
WO2006119184A3 (en) | Protecting one-time-passwords against man-in-the-middle attacks | |
WO2009088615A3 (en) | Selective authorization based on authentication input attributes | |
WO2009031056A3 (en) | Providing services to a guest device in a personal network | |
EP3938934A4 (en) | Improving computer system security using a biometric authentication gateway for user service access with a divided and distributed private encryption key | |
WO2006022821A3 (en) | Log-in security device | |
HK1091616A1 (en) | Authenticated key exchange based on pairwise master key | |
WO2003032126A3 (en) | Multi-factor authentication system | |
WO2010060704A3 (en) | Method and system for token-based authentication | |
WO2007115209A3 (en) | Identity and access management framework | |
WO2006063194A3 (en) | Technique for securely communicating programming content | |
WO2007005573A3 (en) | Facilitating mobility for a mobile station | |
WO2007039873A3 (en) | System and/or method for class-based authorization | |
TW200737890A (en) | Certify and split system and method for replacing cryptographic keys | |
WO2008127430A3 (en) | Secure access to restricted resource |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DPE1 | Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101) | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 06718344 Country of ref document: EP Kind code of ref document: A2 |
|
DPE1 | Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101) |