ATE343271T1 - Verfahren und system zur autorisierung der erzeugung asymmetrischer kryptoschlüssel - Google Patents
Verfahren und system zur autorisierung der erzeugung asymmetrischer kryptoschlüsselInfo
- Publication number
- ATE343271T1 ATE343271T1 AT01986532T AT01986532T ATE343271T1 AT E343271 T1 ATE343271 T1 AT E343271T1 AT 01986532 T AT01986532 T AT 01986532T AT 01986532 T AT01986532 T AT 01986532T AT E343271 T1 ATE343271 T1 AT E343271T1
- Authority
- AT
- Austria
- Prior art keywords
- sponsor
- key
- user
- challenge
- crypto
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0827—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving distinctive intermediate devices or communication paths
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Information Transfer Between Computers (AREA)
- Mobile Radio Communication Systems (AREA)
- Exchange Systems With Centralized Control (AREA)
- General Factory Administration (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/739,119 US7149310B2 (en) | 2000-12-19 | 2000-12-19 | Method and system for authorizing generation of asymmetric crypto-keys |
Publications (1)
Publication Number | Publication Date |
---|---|
ATE343271T1 true ATE343271T1 (de) | 2006-11-15 |
Family
ID=24970900
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AT01986532T ATE343271T1 (de) | 2000-12-19 | 2001-12-18 | Verfahren und system zur autorisierung der erzeugung asymmetrischer kryptoschlüssel |
Country Status (5)
Country | Link |
---|---|
US (1) | US7149310B2 (de) |
EP (2) | EP1605625A3 (de) |
AT (1) | ATE343271T1 (de) |
DE (1) | DE60124011T2 (de) |
WO (1) | WO2002050631A2 (de) |
Families Citing this family (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8156223B2 (en) * | 2001-03-20 | 2012-04-10 | Microsoft Corporation | Distribution of binary executables and content from peer locations/machines |
US7333616B1 (en) * | 2001-11-14 | 2008-02-19 | Omniva Corp. | Approach for managing access to messages using encryption key management policies |
US20030174841A1 (en) * | 2002-03-15 | 2003-09-18 | Novell Inc. | Methods, systems, and data structures for secure data content presentation |
US7356147B2 (en) * | 2002-04-18 | 2008-04-08 | International Business Machines Corporation | Method, system and program product for attaching a title key to encrypted content for synchronized transmission to a recipient |
US7263619B1 (en) | 2002-06-26 | 2007-08-28 | Chong-Lim Kim | Method and system for encrypting electronic message using secure ad hoc encryption key |
GB0215524D0 (en) * | 2002-07-05 | 2002-08-14 | Hewlett Packard Co | Method and apparatus for generating a cryptographic key |
US8393001B1 (en) * | 2002-07-26 | 2013-03-05 | Mcafee, Inc. | Secure signature server system and associated method |
US7275156B2 (en) * | 2002-08-30 | 2007-09-25 | Xerox Corporation | Method and apparatus for establishing and using a secure credential infrastructure |
US20040088576A1 (en) * | 2002-10-31 | 2004-05-06 | Foster Ward Scott | Secure resource access |
US7386889B2 (en) * | 2002-11-18 | 2008-06-10 | Trusted Network Technologies, Inc. | System and method for intrusion prevention in a communications network |
US7591001B2 (en) * | 2004-05-14 | 2009-09-15 | Liquidware Labs, Inc. | System, apparatuses, methods and computer-readable media for determining the security status of a computer before establishing a network connection |
US7549159B2 (en) * | 2004-05-10 | 2009-06-16 | Liquidware Labs, Inc. | System, apparatuses, methods and computer-readable media for determining the security status of a computer before establishing connection thereto |
US7660980B2 (en) * | 2002-11-18 | 2010-02-09 | Liquidware Labs, Inc. | Establishing secure TCP/IP communications using embedded IDs |
US20040230817A1 (en) * | 2003-05-14 | 2004-11-18 | Kenneth Ma | Method and system for disaster recovery of data from a storage device |
US8190893B2 (en) * | 2003-10-27 | 2012-05-29 | Jp Morgan Chase Bank | Portable security transaction protocol |
WO2005057352A2 (en) * | 2003-12-02 | 2005-06-23 | Melodeo, Inc. | Secure digital content trading systems and methods |
US20050129244A1 (en) * | 2003-12-16 | 2005-06-16 | International Business Machines Corporation | System and method for mitigating denial of service attacks on trusted platform |
KR101042745B1 (ko) * | 2004-01-30 | 2011-06-20 | 삼성전자주식회사 | 클라이언트 단말장치와 서버 사이의 세션 재설정을 위한시스템 및 방법 |
DE102005018676B4 (de) * | 2005-04-21 | 2008-09-25 | Wincor Nixdorf International Gmbh | Verfahren zur Schlüsselverwaltung für Kryptographiemodule |
US20070143626A1 (en) * | 2005-12-20 | 2007-06-21 | Kyocera Mita Corporation | Data forming apparatus and method for data security |
CA2571891C (en) * | 2006-12-21 | 2015-11-24 | Bce Inc. | Device authentication and secure channel management for peer-to-peer initiated communications |
US20080208624A1 (en) * | 2007-02-22 | 2008-08-28 | General Electric Company | Methods and systems for providing clinical display and search of electronic medical record data from a variety of information systems |
US20090119475A1 (en) * | 2007-11-01 | 2009-05-07 | Microsoft Corporation | Time based priority modulus for security challenges |
US8254571B1 (en) | 2007-12-21 | 2012-08-28 | Voltage Security, Inc. | Cryptographic system with halting key derivation function capabilities |
US7522723B1 (en) * | 2008-05-29 | 2009-04-21 | Cheman Shaik | Password self encryption method and system and encryption by keys generated from personal secret information |
US9515836B2 (en) * | 2013-03-28 | 2016-12-06 | Xerox Corporation | System and method for location assurance using passive computational tags |
US9240982B2 (en) * | 2013-12-27 | 2016-01-19 | Canon Information And Imaging Solutions, Inc. | Method for associating an image-forming device, a mobile device, and a user |
US10320758B2 (en) * | 2017-04-25 | 2019-06-11 | International Business Machines Corporation | Cryptography using multi-factor key system and finite state machine |
US10541954B1 (en) * | 2018-08-05 | 2020-01-21 | Gideon Samid | Cyber companion: attaching a secondary message to a primary one |
CN111314074A (zh) * | 2020-02-25 | 2020-06-19 | 南京如般量子科技有限公司 | 基于秘密共享和时间戳的量子保密通信密钥分发和协商系统 |
Family Cites Families (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5241599A (en) * | 1991-10-02 | 1993-08-31 | At&T Bell Laboratories | Cryptographic protocol for secure communications |
US5440635A (en) * | 1993-08-23 | 1995-08-08 | At&T Corp. | Cryptographic protocol for remote authentication |
UA41387C2 (uk) * | 1994-01-13 | 2001-09-17 | Сертко, Інк | Спосіб установлення вірогідного перевірюваного зв'язку, спосіб захищеного зв'язку, спосіб оновлення мікропрограмного забезпечення, спосіб здійснення шифрованого зв'язку та спосіб надання перевіреному на справжність пристрою права на проведення електронної транзакції |
US5557678A (en) | 1994-07-18 | 1996-09-17 | Bell Atlantic Network Services, Inc. | System and method for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem |
US5748735A (en) * | 1994-07-18 | 1998-05-05 | Bell Atlantic Network Services, Inc. | Securing E-mail communications and encrypted file storage using yaksha split private key asymmetric cryptography |
US5588061A (en) * | 1994-07-20 | 1996-12-24 | Bell Atlantic Network Services, Inc. | System and method for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem |
US5737419A (en) | 1994-11-09 | 1998-04-07 | Bell Atlantic Network Services, Inc. | Computer system for securing communications using split private key asymmetric cryptography |
US6212634B1 (en) * | 1996-11-15 | 2001-04-03 | Open Market, Inc. | Certifying authorization in computer networks |
US5923756A (en) * | 1997-02-12 | 1999-07-13 | Gte Laboratories Incorporated | Method for providing secure remote command execution over an insecure computer network |
US5982898A (en) * | 1997-03-07 | 1999-11-09 | At&T Corp. | Certification process |
US6275941B1 (en) * | 1997-03-28 | 2001-08-14 | Hiatchi, Ltd. | Security management method for network system |
US6370249B1 (en) * | 1997-07-25 | 2002-04-09 | Entrust Technologies, Ltd. | Method and apparatus for public key management |
US6073237A (en) * | 1997-11-06 | 2000-06-06 | Cybercash, Inc. | Tamper resistant method and apparatus |
US6185685B1 (en) * | 1997-12-11 | 2001-02-06 | International Business Machines Corporation | Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same |
US6553493B1 (en) * | 1998-04-28 | 2003-04-22 | Verisign, Inc. | Secure mapping and aliasing of private keys used in public key cryptography |
CA2291920A1 (en) * | 1998-12-11 | 2000-06-11 | Karuna Ganesan | Technique for conducting secure transactions over a network |
US6704867B1 (en) * | 1999-03-30 | 2004-03-09 | Bitney Bowes, Inc. | Method for publishing certification information representative of selectable subsets of rights and apparatus and portable data storage media used to practice said method |
-
2000
- 2000-12-19 US US09/739,119 patent/US7149310B2/en not_active Expired - Lifetime
-
2001
- 2001-12-18 EP EP05015259A patent/EP1605625A3/de not_active Withdrawn
- 2001-12-18 WO PCT/US2001/048454 patent/WO2002050631A2/en active IP Right Grant
- 2001-12-18 DE DE60124011T patent/DE60124011T2/de not_active Expired - Fee Related
- 2001-12-18 AT AT01986532T patent/ATE343271T1/de not_active IP Right Cessation
- 2001-12-18 EP EP01986532A patent/EP1350356B1/de not_active Expired - Lifetime
Also Published As
Publication number | Publication date |
---|---|
EP1350356A4 (de) | 2004-12-01 |
EP1350356B1 (de) | 2006-10-18 |
DE60124011T2 (de) | 2007-05-31 |
US20020078354A1 (en) | 2002-06-20 |
WO2002050631A2 (en) | 2002-06-27 |
US7149310B2 (en) | 2006-12-12 |
EP1350356A2 (de) | 2003-10-08 |
WO2002050631A3 (en) | 2003-03-20 |
DE60124011D1 (de) | 2006-11-30 |
EP1605625A3 (de) | 2006-01-11 |
EP1605625A2 (de) | 2005-12-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
ATE343271T1 (de) | Verfahren und system zur autorisierung der erzeugung asymmetrischer kryptoschlüssel | |
WO2001091366A3 (en) | Cryptographic communications using pseudo-randomly generated cryptography keys | |
ATE422264T1 (de) | Speichern und authentifizierung von datentransaktionen | |
ATE252796T1 (de) | Verfahren und kommunikationssystem unter verwendung einer verschlüsselungseinrichtung | |
ATE219613T1 (de) | Verfahren und vorrichtung zur erzeugung komplexer verschlüsselungskodesequenzen | |
DE602005025328D1 (de) | Verfahren, system, gateway und benutzereinrichtung zum empfangen/senden von multimedia-nachrichten | |
EP1049287A3 (de) | Verfahren zur Verschlüsselung/entschlüsselung und Authentifizierungsverfahren unter Verwendung eines multiaffinen Schlüsselsystems und zugehörige Vorrichtungen | |
AU2003252817A1 (en) | Polynomial-based multi-user key generation and authentication method and system | |
HK1079926A1 (en) | System and method for using acoustic digital signature generator as oracle | |
BRPI0509538A (pt) | emprego e fornecimento de dispositivos portáteis sem fio | |
TW200517971A (en) | Methods and apparatus for providing application credentials | |
GB2296413B (en) | A method of messaging in a communciation system | |
DE602005011639D1 (de) | Bootstrapping-authentifikation unter verwendung distinguierter zufallsabfragen | |
DE602004020276D1 (de) | Anfrage-antwort-system und -verfahren | |
HK1063553A1 (en) | Subscriber identification device, method and apparatus for providing local authentication in a communication system | |
ATE465571T1 (de) | Systeme und verfahren zur verschlüsselung auf identitätsbasis und damit zusammenhängende kryptografische techniken | |
SG143152A1 (en) | System and method for secure record protocol using shared knowledge of mobile user credentials | |
DE60022320D1 (de) | Verfahren zur überprüfung einer unterschrift von einer nachricht | |
Smart | Efficient key encapsulation to multiple parties | |
DE60207289D1 (de) | Verfahren und vorrichtung zur symmetrischen schlüsselerzeugung in einer persönlichen sicherheitsvorrichtung mit begrenzten vertrauensbeziehungen | |
WO2002009348A3 (en) | Ring-based digital signature and authentication method and apparatus | |
WO2000070809A3 (en) | Method of and system for encrypting messages, generating encryption keys and producing secure session keys | |
SE0001044D0 (sv) | Metod och system för kryptering och autentisiering | |
EP0982958A3 (de) | Verfahren zur Schützung der mobile Anonymität | |
ATE343272T1 (de) | Verfahren zur validierung einer verschlüsselten nachricht |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
RER | Ceased as to paragraph 5 lit. 3 law introducing patent treaties |