ATE252795T1 - Verfahren zur überprüfung der benützung von öffentlichen schlüsseln welche von einem geladenen system generiert werden - Google Patents

Verfahren zur überprüfung der benützung von öffentlichen schlüsseln welche von einem geladenen system generiert werden

Info

Publication number
ATE252795T1
ATE252795T1 AT00903786T AT00903786T ATE252795T1 AT E252795 T1 ATE252795 T1 AT E252795T1 AT 00903786 T AT00903786 T AT 00903786T AT 00903786 T AT00903786 T AT 00903786T AT E252795 T1 ATE252795 T1 AT E252795T1
Authority
AT
Austria
Prior art keywords
sub
identifier
public key
key
mother
Prior art date
Application number
AT00903786T
Other languages
English (en)
Inventor
Denis Pinkas
Original Assignee
Bull Sa
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bull Sa filed Critical Bull Sa
Application granted granted Critical
Publication of ATE252795T1 publication Critical patent/ATE252795T1/de

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Prepayment Telephone Systems (AREA)
AT00903786T 1999-02-11 2000-02-10 Verfahren zur überprüfung der benützung von öffentlichen schlüsseln welche von einem geladenen system generiert werden ATE252795T1 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR9901652A FR2789829B1 (fr) 1999-02-11 1999-02-11 Procede de verification de l'usage de cles publiques engendrees par un systeme embarque
PCT/FR2000/000332 WO2000048355A2 (fr) 1999-02-11 2000-02-10 Procede de verification de l'usage de cles publiques engendrees par un systeme embarque

Publications (1)

Publication Number Publication Date
ATE252795T1 true ATE252795T1 (de) 2003-11-15

Family

ID=9541902

Family Applications (1)

Application Number Title Priority Date Filing Date
AT00903786T ATE252795T1 (de) 1999-02-11 2000-02-10 Verfahren zur überprüfung der benützung von öffentlichen schlüsseln welche von einem geladenen system generiert werden

Country Status (8)

Country Link
US (1) US6968060B1 (de)
EP (1) EP1072124B1 (de)
JP (1) JP4155712B2 (de)
AT (1) ATE252795T1 (de)
CA (1) CA2328101C (de)
DE (1) DE60006041T2 (de)
FR (1) FR2789829B1 (de)
WO (1) WO2000048355A2 (de)

Families Citing this family (43)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2810139B1 (fr) * 2000-06-08 2002-08-23 Bull Cp8 Procede de securisation de la phase de pre-initialisation d'un systeme embarque a puce electronique, notamment d'une carte a puce, et systeme embarque mettant en oeuvre le procede
FI114180B (fi) * 2001-06-12 2004-08-31 Nokia Corp Parannettu menetelmä ja laitejärjestely tietojen siirron salaamiseksi radioverkon päätelaitteen sisältämässä rajapinnassa sekä radioverkon päätelaite
US7930756B1 (en) 2001-12-12 2011-04-19 Crocker Steven Toye Multi-level cryptographic transformations for securing digital assets
US8006280B1 (en) 2001-12-12 2011-08-23 Hildebrand Hal S Security system for generating keys from access rules in a decentralized manner and methods therefor
US7921450B1 (en) * 2001-12-12 2011-04-05 Klimenty Vainstein Security system using indirect key generation from access rules and methods therefor
US7260555B2 (en) 2001-12-12 2007-08-21 Guardian Data Storage, Llc Method and architecture for providing pervasive security to digital assets
US8065713B1 (en) 2001-12-12 2011-11-22 Klimenty Vainstein System and method for providing multi-location access management to secured items
US10360545B2 (en) 2001-12-12 2019-07-23 Guardian Data Storage, Llc Method and apparatus for accessing secured electronic data off-line
US7921288B1 (en) 2001-12-12 2011-04-05 Hildebrand Hal S System and method for providing different levels of key security for controlling access to secured items
US7178033B1 (en) 2001-12-12 2007-02-13 Pss Systems, Inc. Method and apparatus for securing digital assets
USRE41546E1 (en) 2001-12-12 2010-08-17 Klimenty Vainstein Method and system for managing security tiers
US7565683B1 (en) 2001-12-12 2009-07-21 Weiqing Huang Method and system for implementing changes to security policies in a distributed security system
US7380120B1 (en) 2001-12-12 2008-05-27 Guardian Data Storage, Llc Secured data format for access control
US7921284B1 (en) 2001-12-12 2011-04-05 Gary Mark Kinghorn Method and system for protecting electronic data in enterprise environment
US10033700B2 (en) 2001-12-12 2018-07-24 Intellectual Ventures I Llc Dynamic evaluation of access rights
US7681034B1 (en) 2001-12-12 2010-03-16 Chang-Ping Lee Method and apparatus for securing electronic data
US7950066B1 (en) 2001-12-21 2011-05-24 Guardian Data Storage, Llc Method and system for restricting use of a clipboard application
US8176334B2 (en) 2002-09-30 2012-05-08 Guardian Data Storage, Llc Document security system that permits external users to gain access to secured files
US8613102B2 (en) 2004-03-30 2013-12-17 Intellectual Ventures I Llc Method and system for providing document retention using cryptography
US7748045B2 (en) 2004-03-30 2010-06-29 Michael Frederick Kenrich Method and system for providing cryptographic document retention with off-line access
US7512810B1 (en) 2002-09-11 2009-03-31 Guardian Data Storage Llc Method and system for protecting encrypted files transmitted over a network
US7836310B1 (en) 2002-11-01 2010-11-16 Yevgeniy Gutnik Security system that uses indirect password-based encryption
US7890990B1 (en) 2002-12-20 2011-02-15 Klimenty Vainstein Security system with staging capabilities
US8707034B1 (en) 2003-05-30 2014-04-22 Intellectual Ventures I Llc Method and system for using remote headers to secure electronic files
US7730543B1 (en) 2003-06-30 2010-06-01 Satyajit Nath Method and system for enabling users of a group shared across multiple file security systems to access secured files
US8127366B2 (en) 2003-09-30 2012-02-28 Guardian Data Storage, Llc Method and apparatus for transitioning between states of security policies used to secure electronic documents
US7703140B2 (en) 2003-09-30 2010-04-20 Guardian Data Storage, Llc Method and system for securing digital assets using process-driven security policies
US7707427B1 (en) 2004-07-19 2010-04-27 Michael Frederick Kenrich Multi-level file digests
JP2006195586A (ja) * 2005-01-11 2006-07-27 Ntt Docomo Inc コンテンツ配信ノード、ネットワーク機器および販売システム
US20070226514A1 (en) * 2006-03-24 2007-09-27 Atmel Corporation Secure biometric processing system and method of use
US20070237366A1 (en) * 2006-03-24 2007-10-11 Atmel Corporation Secure biometric processing system and method of use
US7849312B2 (en) * 2006-03-24 2010-12-07 Atmel Corporation Method and system for secure external TPM password generation and use
WO2010067433A1 (ja) 2008-12-11 2010-06-17 三菱電機株式会社 自己認証通信機器、自己認証検証通信機器、機器認証システム、機器認証システムの機器認証方法、自己認証通信プログラムおよび自己認証検証通信プログラム
JP5202646B2 (ja) * 2008-12-11 2013-06-05 三菱電機株式会社 自己認証通信機器および機器認証システム
US8331568B2 (en) * 2009-05-28 2012-12-11 Microsoft Corporation Efficient distribution of computation in key agreement
US9754253B1 (en) 2011-11-28 2017-09-05 Amazon Technologies, Inc. Conditioned use of certificates
CN110050437B (zh) * 2016-09-06 2020-10-23 华为技术有限公司 分布式证书注册的装置和方法
US10505931B2 (en) * 2017-06-02 2019-12-10 Nxp B.V. Method for authenticating an integrated circuit device
WO2020229895A2 (en) * 2019-04-11 2020-11-19 Lg Electronics, Inc. Systems and methods for countering co-existence attack
CN110191415B (zh) * 2019-05-29 2022-01-25 深圳市元征科技股份有限公司 一种车辆信息的加密方法、车载设备及服务器
JP2020195100A (ja) * 2019-05-29 2020-12-03 株式会社bitFlyer Blockchain 公開鍵の信頼性を証明するための装置、方法及びそのためのプログラム
CN112350821B (zh) * 2019-08-06 2024-07-26 北京车和家信息技术有限公司 密钥的获取方法、装置及系统
CN111769953B (zh) * 2020-06-29 2023-03-24 中钞信用卡产业发展有限公司杭州区块链技术研究院 一种数字证照证明方法、装置、设备及可读存储介质

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB8819767D0 (en) * 1988-08-19 1989-07-05 Ncr Co Public key diversification method
FR2662007B1 (fr) * 1990-05-10 1992-07-10 Bull Sa Procede d'obtention d'une attestation en clair securisee dans un environnement de systeme informatique distribue.
US5164988A (en) * 1991-10-31 1992-11-17 International Business Machines Corporation Method to establish and enforce a network cryptographic security policy in a public key cryptosystem
GB9213169D0 (en) * 1992-06-22 1992-08-05 Ncr Int Inc Cryptographic key management apparatus and method
US5586186A (en) * 1994-07-15 1996-12-17 Microsoft Corporation Method and system for controlling unauthorized access to information distributed to users
US6134658A (en) * 1997-06-09 2000-10-17 Microsoft Corporation Multi-server location-independent authentication certificate management system
DE19748954A1 (de) * 1997-10-29 1999-05-06 Francotyp Postalia Gmbh Verfahren für eine digital druckende Frankiermaschine zur Erzeugung und Überprüfung eines Sicherheitsabdruckes

Also Published As

Publication number Publication date
FR2789829A1 (fr) 2000-08-18
EP1072124B1 (de) 2003-10-22
FR2789829B1 (fr) 2001-04-20
DE60006041T2 (de) 2004-08-26
CA2328101C (en) 2009-02-03
CA2328101A1 (en) 2000-08-17
JP2002537685A (ja) 2002-11-05
DE60006041D1 (de) 2003-11-27
WO2000048355A2 (fr) 2000-08-17
WO2000048355A3 (fr) 2000-11-16
EP1072124A2 (de) 2001-01-31
JP4155712B2 (ja) 2008-09-24
US6968060B1 (en) 2005-11-22

Similar Documents

Publication Publication Date Title
ATE252795T1 (de) Verfahren zur überprüfung der benützung von öffentlichen schlüsseln welche von einem geladenen system generiert werden
CN109845188B (zh) 对授权证明请求的安全的处理
EP3687107B1 (de) Informationssicherung unter verwendung einer integritäts- und identitätsflexiblen blockchain
US11856106B2 (en) Secure configuration of a device
CN109889498B (zh) 基于区块链的计算验证方法及系统
Bellissimo et al. Secure Software Updates: Disappointments and New Challenges.
US7516490B2 (en) System, method and software for supplying activation information to a subsystem
CN107094077B (zh) 一种不限制签名算法的许可链账户系统
US20140006783A1 (en) Establishing secure, mutually authenticated communication credentials
US11088848B2 (en) Using public keys provided by an authentication server to verify digital signatures
CN108696356B (zh) 一种基于区块链的数字证书删除方法、装置及系统
US20050005150A1 (en) Apparatus and method for location specific authentication using powerline networking
DE69824291D1 (de) Überprüfen der echtheit von gütern unter verwendung von zufallszahlen
DE60228554D1 (de) Verfahren und vorrichtung zur speicherung kryptogresitz und sichere verteilung gespeicherter schlüssel authentifiziert werden
KR20080030359A (ko) 컴퓨팅 플랫폼의 설정 정보를 은닉하면서 무결성 보증을제공하는 방법
TWI264213B (en) Method and network for controlling access by a client of a network of computer systems
US10581595B2 (en) Generating public/private key pairs to deploy public keys at computing devices to verify digital signatures
JP2008502251A (ja) プロセスを使用するキーストアを有するコンピュータ装置及びコンピュータ装置を動作させる方法
KR20080033373A (ko) 취소 정보 관리
CN113261253A (zh) 用于控制资源的释放的方法和系统
CN110635904B (zh) 一种软件定义物联网节点远程证明方法及系统
ZA202213534B (en) System and method for authenticating a device on a network
CN109547402A (zh) 数据保护方法、装置、电子设备和可读存储介质
CN115348077A (zh) 一种虚拟机加密方法、装置、设备、存储介质
CN105279404B (zh) 操作系统操作控制方法及装置

Legal Events

Date Code Title Description
RER Ceased as to paragraph 5 lit. 3 law introducing patent treaties