AR110172A1 - Protecciones contra copias no autorizadas (anti clonación), método y sistema - Google Patents
Protecciones contra copias no autorizadas (anti clonación), método y sistemaInfo
- Publication number
- AR110172A1 AR110172A1 ARP170103206A ARP170103206A AR110172A1 AR 110172 A1 AR110172 A1 AR 110172A1 AR P170103206 A ARP170103206 A AR P170103206A AR P170103206 A ARP170103206 A AR P170103206A AR 110172 A1 AR110172 A1 AR 110172A1
- Authority
- AR
- Argentina
- Prior art keywords
- key
- cloning
- against unauthorized
- keys
- unauthorized copies
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00166—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised contents recorded on or reproduced from a record carrier, e.g. music or software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Storage Device Security (AREA)
- Preparation Of Compounds By Using Micro-Organisms (AREA)
- Manufacturing Of Micro-Capsules (AREA)
- Nitrogen Condensed Heterocyclic Rings (AREA)
Abstract
Se protege un objeto contra una copia no autorizada mediante un generador de clave para el objeto, se producir una primera clave, una segunda clave y un bloqueo para las claves, se almacena la primera clave en el objeto, se almacena la segunda clave en una base de datos separada del objeto, se leen las claves primera y segunda, se abre el bloqueo con las claves primera y segunda, se producen y las claves tercera y cuarta y un nuevo bloqueo para el objeto, se invalidan las claves primera y segunda, se reemplaza la primera clave en el objeto con la tercera clave, y se reemplaza la segunda clave en la base de datos con la cuarta clave.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/IB2016/056960 WO2018091946A1 (en) | 2016-11-18 | 2016-11-18 | Protections for unauthorized copying (anti-cloning) method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
AR110172A1 true AR110172A1 (es) | 2019-03-06 |
Family
ID=57421909
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
ARP170103206A AR110172A1 (es) | 2016-11-18 | 2017-11-17 | Protecciones contra copias no autorizadas (anti clonación), método y sistema |
Country Status (17)
Country | Link |
---|---|
US (1) | US11316686B2 (es) |
EP (1) | EP3378188B1 (es) |
JP (1) | JP6857725B2 (es) |
CN (1) | CN109964445B (es) |
AR (1) | AR110172A1 (es) |
CY (1) | CY1123572T1 (es) |
DK (1) | DK3378188T3 (es) |
EA (1) | EA036720B1 (es) |
ES (1) | ES2803752T3 (es) |
HR (1) | HRP20201061T1 (es) |
HU (1) | HUE049881T2 (es) |
LT (1) | LT3378188T (es) |
PL (1) | PL3378188T3 (es) |
PT (1) | PT3378188T (es) |
RS (1) | RS60498B1 (es) |
SI (1) | SI3378188T1 (es) |
WO (1) | WO2018091946A1 (es) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
PT3378188T (pt) | 2016-11-18 | 2020-06-08 | Permanent Privacy Ltd | Método e sistema de proteção contra cópia não autorizada (anti-clonagem) |
CN109493488B (zh) * | 2018-11-23 | 2020-11-10 | 北京小米移动软件有限公司 | 智能卡认证方法、智能锁、智能卡、系统及装置 |
CN110443927B (zh) * | 2019-08-12 | 2021-04-27 | 北京百佑科技有限公司 | 访客密码生成方法、验证方法、服务器及智能门锁 |
Family Cites Families (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000124887A (ja) * | 1998-10-14 | 2000-04-28 | Fuji Xerox Co Ltd | グループ単位の暗号化・復号方法および署名方法ならびに装置 |
KR100972831B1 (ko) * | 2003-04-24 | 2010-07-28 | 엘지전자 주식회사 | 엔크립트된 데이터의 보호방법 및 그 재생장치 |
KR100974448B1 (ko) * | 2003-04-24 | 2010-08-10 | 엘지전자 주식회사 | 광디스크의 복사 방지 정보 관리방법 |
DE102004053942A1 (de) | 2004-11-09 | 2006-05-11 | Solarwatt Solar-Systeme Gmbh | Anschlusseinheit für photovoltaische Solarmodule |
JP4256361B2 (ja) * | 2005-04-21 | 2009-04-22 | ベーステクノロジー株式会社 | 認証管理方法及びシステム |
US8130959B2 (en) * | 2006-09-07 | 2012-03-06 | International Business Machines Corporation | Rekeying encryption for removable storage media |
JP2008199206A (ja) * | 2007-02-09 | 2008-08-28 | Fuji Electric Holdings Co Ltd | 電子マネーシステム、その決済端末、プログラム |
EP2273409A3 (en) * | 2009-07-10 | 2013-01-16 | Disney Enterprises, Inc. | Interoperable keychest |
US8713314B2 (en) | 2011-08-30 | 2014-04-29 | Comcast Cable Communications, Llc | Reoccuring keying system |
CN102930223B (zh) * | 2012-09-21 | 2015-07-22 | 北京深思洛克软件技术股份有限公司 | 一种磁盘数据保护方法和系统 |
WO2015073850A1 (en) * | 2013-11-15 | 2015-05-21 | Afl Telecommunications Llc | Wireless inspection solution |
US9703965B1 (en) * | 2014-06-30 | 2017-07-11 | EMC IP Holding Company LLC | Secure containers for flexible credential protection in devices |
CN104363209B (zh) * | 2014-10-29 | 2019-04-05 | 中国建设银行股份有限公司 | 一种密钥管理方法及装置 |
US9379890B1 (en) * | 2015-12-07 | 2016-06-28 | Workiva Inc. | System and method for managing cryptographic keys |
US20170200149A1 (en) * | 2016-01-08 | 2017-07-13 | Mastercard International Incorporated | Authenticating payment credentials in closed loop transaction processing |
JP6270005B1 (ja) * | 2016-11-11 | 2018-01-31 | 株式会社 C−t−i | 磁気記録カード及び情報照合システム |
PT3378188T (pt) | 2016-11-18 | 2020-06-08 | Permanent Privacy Ltd | Método e sistema de proteção contra cópia não autorizada (anti-clonagem) |
-
2016
- 2016-11-18 PT PT168021475T patent/PT3378188T/pt unknown
- 2016-11-18 ES ES16802147T patent/ES2803752T3/es active Active
- 2016-11-18 HU HUE16802147A patent/HUE049881T2/hu unknown
- 2016-11-18 DK DK16802147.5T patent/DK3378188T3/da active
- 2016-11-18 PL PL16802147T patent/PL3378188T3/pl unknown
- 2016-11-18 EA EA201991163A patent/EA036720B1/ru unknown
- 2016-11-18 CN CN201680090783.4A patent/CN109964445B/zh active Active
- 2016-11-18 LT LTEP16802147.5T patent/LT3378188T/lt unknown
- 2016-11-18 US US16/349,907 patent/US11316686B2/en active Active
- 2016-11-18 EP EP16802147.5A patent/EP3378188B1/en active Active
- 2016-11-18 WO PCT/IB2016/056960 patent/WO2018091946A1/en active Application Filing
- 2016-11-18 RS RS20200758A patent/RS60498B1/sr unknown
- 2016-11-18 JP JP2019520847A patent/JP6857725B2/ja active Active
- 2016-11-18 SI SI201630826T patent/SI3378188T1/sl unknown
-
2017
- 2017-11-17 AR ARP170103206A patent/AR110172A1/es active IP Right Grant
-
2020
- 2020-06-23 CY CY20201100571T patent/CY1123572T1/el unknown
- 2020-07-06 HR HRP20201061TT patent/HRP20201061T1/hr unknown
Also Published As
Publication number | Publication date |
---|---|
PL3378188T3 (pl) | 2020-11-16 |
JP6857725B2 (ja) | 2021-04-14 |
CN109964445B (zh) | 2021-11-19 |
CN109964445A (zh) | 2019-07-02 |
EA036720B1 (ru) | 2020-12-11 |
HUE049881T2 (hu) | 2020-10-28 |
US20190312721A1 (en) | 2019-10-10 |
HRP20201061T1 (hr) | 2020-10-30 |
EP3378188A1 (en) | 2018-09-26 |
LT3378188T (lt) | 2020-07-10 |
SI3378188T1 (sl) | 2020-10-30 |
ES2803752T3 (es) | 2021-01-29 |
DK3378188T3 (da) | 2020-07-06 |
EA201991163A1 (ru) | 2019-11-29 |
JP2019536319A (ja) | 2019-12-12 |
CY1123572T1 (el) | 2022-03-24 |
EP3378188B1 (en) | 2020-04-08 |
RS60498B1 (sr) | 2020-08-31 |
US11316686B2 (en) | 2022-04-26 |
WO2018091946A1 (en) | 2018-05-24 |
PT3378188T (pt) | 2020-06-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
PH12018502196A1 (en) | System and methods for validating and performing operations on homomorphically encrypted data | |
AR110172A1 (es) | Protecciones contra copias no autorizadas (anti clonación), método y sistema | |
GB2540298A8 (en) | Signature retrieval and matching for media monitoring | |
CL2019001288A1 (es) | Gestión de claves seguras. | |
MX370232B (es) | Aprendizaje y uso de reglas de recuperación de contenido contextual para desambiguación de consulta. | |
GB2538927A (en) | Methods and apparatus to identify media using hash keys | |
EP3834488A4 (en) | SECURITY KEY GENERATION TECHNIQUES | |
CY1123097T1 (el) | Κλειδι, αντιστοιχη κλειδαρια και συστημα που περιεχει κλειδι και κλειδαρια | |
PH12017550127A1 (en) | Privacy enhanced personal search index | |
FI20185962A1 (fi) | Menetelmä salaisen uniikkiavaimen tuottamiseksi haihtuvamuistiselle FPGA:lle | |
Gotchev | Cardinalities of weakly Lindelöf spaces with regular $ G_\kappa $-diagonals | |
McCormack | The end of the postwar? The Abe government, Okinawa, and Yonaguni Island | |
Cifuentes-Silva | Service-Oriented Architecture for automatic markup of documents. An use case for legal documents | |
Giuffrida et al. | Detection of Intrusions and Malware, and Vulnerability Assessment | |
Carmack et al. | TopFuel 2015 | |
de Gravelle | F16RS LO No. 1 | |
Petit et al. | S15RS SGR No. 15 (3 Midterm Policy) | |
Chunsheng | Multilinear maps using random matrix | |
TH183888B (th) | ดัชนีค้นหาส่วนบุคคลที่เพิ่มความเป็นส่วนตัว | |
Ploegstra | Love, Creation, Virtue as Models for Environmental Education | |
TH183888A (th) | ดัชนีค้นหาส่วนบุคคลที่เพิ่มความเป็นส่วนตัว | |
Loga | F14RS LO No. 1 (Murphy for Programming) | |
de Gravelle et al. | F15RS SGFB No. 4 (Scantrons & Bluebooks) | |
Pell | National Foundation on the Arts and Humanities: S. 1386 (1979): Note 01 | |
Triche et al. | F15RS SGR No. 1 (Michael Smith Thank You) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FG | Grant, registration |