AR106764A1 - Verificación de la configuración de cifrado - Google Patents
Verificación de la configuración de cifradoInfo
- Publication number
- AR106764A1 AR106764A1 ARP160103554A ARP160103554A AR106764A1 AR 106764 A1 AR106764 A1 AR 106764A1 AR P160103554 A ARP160103554 A AR P160103554A AR P160103554 A ARP160103554 A AR P160103554A AR 106764 A1 AR106764 A1 AR 106764A1
- Authority
- AR
- Argentina
- Prior art keywords
- node
- key management
- message
- configuration
- carried out
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0877—Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/4401—Bootstrapping
- G06F9/4406—Loading of operating system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
- H04L9/0897—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
- H04L2209/127—Trusted platform modules [TPM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
Abstract
Mecanismos para la verificación de la configuración de cifrado de un bloque de datos. El método se lleva a cabo por medio de un nodo de cliente. Un método comprende la obtención de una indicación para cifrar el bloque de datos. El método comprende el suministro de un primer mensaje a un nodo de cómputo que indica una solicitud de configuración de un volumen de almacenamiento de bloques, V, a ser cifrado, en el que el primer mensaje comprende un nonce, N. El método comprende la obtención de un segundo mensaje desde el nodo de cómputo, en la que el segundo mensaje comprende el nonce, N, y proporciona la validación de que un nodo de gestión de claves ha participado en la configuración del cifrado del bloque de acuerdo con el nodo de gestión de claves. También tal nodo de cliente. Además un nodo de cómputo y un método llevado a cabo por medio del nodo de cómputo. Además un nodo de gestión de claves y un método llevado cabo por medio del nodo de gestión de claves.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/EP2015/077211 WO2017084717A1 (en) | 2015-11-20 | 2015-11-20 | Encryption setup verification |
Publications (1)
Publication Number | Publication Date |
---|---|
AR106764A1 true AR106764A1 (es) | 2018-02-14 |
Family
ID=54601810
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
ARP160103554A AR106764A1 (es) | 2015-11-20 | 2016-11-18 | Verificación de la configuración de cifrado |
Country Status (3)
Country | Link |
---|---|
US (1) | US20170272247A1 (es) |
AR (1) | AR106764A1 (es) |
WO (1) | WO2017084717A1 (es) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107204987A (zh) * | 2017-06-27 | 2017-09-26 | 重庆大广宇科技有限公司 | 一种手机数据传输方法 |
US10924282B2 (en) * | 2018-05-24 | 2021-02-16 | Cyber Pack Ventures, Inc. | System and method for measuring and reporting IoT boot integrity |
WO2022087206A1 (en) * | 2020-10-23 | 2022-04-28 | Secturion Systems, Inc. | Multi-independent level security for high performance computing and data storage systems |
-
2015
- 2015-11-20 US US15/304,523 patent/US20170272247A1/en not_active Abandoned
- 2015-11-20 WO PCT/EP2015/077211 patent/WO2017084717A1/en active Application Filing
-
2016
- 2016-11-18 AR ARP160103554A patent/AR106764A1/es unknown
Also Published As
Publication number | Publication date |
---|---|
US20170272247A1 (en) | 2017-09-21 |
WO2017084717A1 (en) | 2017-05-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CL2018002369A1 (es) | Intercambio basado en cadena de bloques con tokenización. | |
CL2018002363A1 (es) | Determinación de un secreto común para el intercambio seguro de información y claves criptográficas deterministas y jerárquicas. | |
BR112017003018A2 (pt) | fornecimento seguro de uma credencial de autenticação | |
PH12020550006A1 (en) | Key attestation statement generation providing device anonymity | |
BR112017017425A2 (pt) | meio de armazenamento legível por computador não transitório configurado para armazenar instruções e processo implementado por computador | |
PH12019501715A1 (en) | Digital certificate management method and apparatus, and electronic device | |
ECSP18079192A (es) | Sistemas y métodos para proporcionar una verificación de identidad personal multifactorial basada en una cadena de bloques | |
BR112019008371A2 (pt) | método, aparelho e sistema de transmissão de dados | |
BR112017009376A2 (pt) | métodos e sistemas para interoperabilidade de autenticação | |
BR112017002747A2 (pt) | método implementado por computador, e, sistema de computador. | |
EA201891822A1 (ru) | Безопасность персональных устройств с использованием криптографии на основе эллиптических кривых для разделения секрета | |
BR112016024453A8 (pt) | método implementado por computador para gerenciar conjunto de dados, sistema de computação e meio de armazenamento legível por computador físico | |
BR112017017098A2 (pt) | aparelhos, métodos e sistemas de agente de chave de criptografia de nuvem | |
WO2016057086A8 (en) | Common modulus rsa key pairs for signature generation and encryption/decryption | |
MX2016012639A (es) | Tecnicas para operar un servicio con señales de autentificacion generadas por maquina. | |
RU2015113046A (ru) | Способ и устройство информационного взаимодействия, электронное устройство | |
MX2017005313A (es) | Mensajeria de transacciones. | |
BR112017020675A2 (pt) | acordo de autenticação e chave com sigilo perfeito de emissão | |
WO2015134760A3 (en) | Secure hardware for cross-device trusted applications | |
MX361684B (es) | Método y sistema para la transmisión segura de mensajes del servicio de notificación a distancia a dispositivos móviles sin elementos de seguridad. | |
JP2016512675A5 (es) | ||
BR112014007665A2 (pt) | derivação chave baseada em parâmetros | |
MX2016010086A (es) | Metodo y sistema para generar una llave de almacenamiento avanzada en un dispositivo movil sin elementos de seguridad. | |
ES2530625T3 (es) | Método para detectar infracciones del límite de velocidad de un vehículo | |
BR112017008214A2 (pt) | métodos e sistemas para interoperacionalidade de autenticação |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FB | Suspension of granting procedure |