ATE378747T1 - Verfahren und system zur schlüsseldistribution mit einem authentifizierungschritt und einem schlüsseldistributionsschritt unter verwendung von kek (key encryption key) - Google Patents

Verfahren und system zur schlüsseldistribution mit einem authentifizierungschritt und einem schlüsseldistributionsschritt unter verwendung von kek (key encryption key)

Info

Publication number
ATE378747T1
ATE378747T1 AT03016787T AT03016787T ATE378747T1 AT E378747 T1 ATE378747 T1 AT E378747T1 AT 03016787 T AT03016787 T AT 03016787T AT 03016787 T AT03016787 T AT 03016787T AT E378747 T1 ATE378747 T1 AT E378747T1
Authority
AT
Austria
Prior art keywords
key
encrypted
processing system
passphrase
data processing
Prior art date
Application number
AT03016787T
Other languages
English (en)
Inventor
Corrado Ronchi
Shukhrat Zakhidov
Original Assignee
Eisst Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Eisst Ltd filed Critical Eisst Ltd
Application granted granted Critical
Publication of ATE378747T1 publication Critical patent/ATE378747T1/de

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)
  • Mobile Radio Communication Systems (AREA)
AT03016787T 2003-07-23 2003-07-23 Verfahren und system zur schlüsseldistribution mit einem authentifizierungschritt und einem schlüsseldistributionsschritt unter verwendung von kek (key encryption key) ATE378747T1 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP03016787A EP1501238B1 (de) 2003-07-23 2003-07-23 Verfahren und System zur Schlüsseldistribution mit einem Authentifizierungschritt und einem Schlüsseldistributionsschritt unter Verwendung von KEK (key encryption key)

Publications (1)

Publication Number Publication Date
ATE378747T1 true ATE378747T1 (de) 2007-11-15

Family

ID=33483933

Family Applications (1)

Application Number Title Priority Date Filing Date
AT03016787T ATE378747T1 (de) 2003-07-23 2003-07-23 Verfahren und system zur schlüsseldistribution mit einem authentifizierungschritt und einem schlüsseldistributionsschritt unter verwendung von kek (key encryption key)

Country Status (4)

Country Link
US (1) US20050033963A1 (de)
EP (1) EP1501238B1 (de)
AT (1) ATE378747T1 (de)
DE (1) DE60317498T2 (de)

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006071695A (ja) * 2004-08-31 2006-03-16 Yamatake Corp 暗号化、復号化プログラム及び暗号システム。
US7477908B2 (en) 2004-12-13 2009-01-13 Research In Motion Limited Messaging protocol/service switching methods and devices
US7636940B2 (en) * 2005-04-12 2009-12-22 Seiko Epson Corporation Private key protection for secure servers
US20080276309A1 (en) * 2006-07-06 2008-11-06 Edelman Lance F System and Method for Securing Software Applications
US8683549B2 (en) * 2007-03-23 2014-03-25 Microsoft Corporation Secure data storage and retrieval incorporating human participation
EP2195963B1 (de) * 2008-05-12 2016-02-10 BlackBerry Limited Sicherheitsmassnahmen zur abwehr einer unbefugten entschlüsselung
US20100153342A1 (en) * 2008-12-17 2010-06-17 Alistair Duncan Vim next generation - migration
US9047477B2 (en) * 2009-05-26 2015-06-02 Microsoft Technology Licensing, Llc Distributed key encryption in servers
US8862889B2 (en) * 2011-07-02 2014-10-14 Eastcliff LLC Protocol for controlling access to encryption keys
FR2990818B1 (fr) * 2012-05-21 2015-02-13 Myocean It Procede de transfert et de stockage securise de documents et appareils associes au procede.
US8856519B2 (en) 2012-06-30 2014-10-07 International Business Machines Corporation Start method for application cryptographic keystores
US9294267B2 (en) * 2012-11-16 2016-03-22 Deepak Kamath Method, system and program product for secure storage of content
CN103561023A (zh) * 2013-10-31 2014-02-05 曙光云计算技术有限公司 通讯信息的发起和接收方法以及发起和接收装置
US9639687B2 (en) 2014-11-18 2017-05-02 Cloudfare, Inc. Multiply-encrypting data requiring multiple keys for decryption
TWI608361B (zh) * 2016-09-23 2017-12-11 群暉科技股份有限公司 電子裝置、伺服器、通訊系統及通訊方法
US10237270B2 (en) 2016-09-29 2019-03-19 International Business Machines Corporation Distributed storage of authentication data
US10560476B2 (en) 2017-02-22 2020-02-11 International Business Machines Corporation Secure data storage system
US11451521B2 (en) * 2018-10-18 2022-09-20 Paypal, Inc. Systems and methods for encrypted data transmission
EP3699800A1 (de) * 2019-02-22 2020-08-26 Atos Information Technology GmbH Verfahren zur verteilung eines objekts in einem dokumentenmanagementsystem, computerprogramm, dokumentenverwaltungssystem

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5892828A (en) * 1996-10-23 1999-04-06 Novell, Inc. User presence verification with single password across applications
US6069957A (en) * 1997-03-07 2000-05-30 Lucent Technologies Inc. Method and apparatus for providing hierarchical key system in restricted-access television system
US6154543A (en) * 1998-11-25 2000-11-28 Hush Communications Anguilla, Inc. Public key cryptosystem with roaming user capability
US6834112B1 (en) * 2000-04-21 2004-12-21 Intel Corporation Secure distribution of private keys to multiple clients
US6950523B1 (en) * 2000-09-29 2005-09-27 Intel Corporation Secure storage of private keys
EP1249981A1 (de) * 2001-04-02 2002-10-16 NuMeme Limited System und Verfahren für Sicherheitsüberwachung

Also Published As

Publication number Publication date
EP1501238B1 (de) 2007-11-14
US20050033963A1 (en) 2005-02-10
DE60317498D1 (de) 2007-12-27
DE60317498T2 (de) 2008-11-06
EP1501238A1 (de) 2005-01-26

Similar Documents

Publication Publication Date Title
DE60317498D1 (de) Verfahren und System zur Schlüsseldistribution mit einem Authentifizierungschritt und einem Schlüsseldistributionsschritt unter Verwendung von KEK (key encryption key)
CA2590989C (en) Protocol and method for client-server mutual authentication using event-based otp
JP2020519208A5 (de)
CA2530944A1 (en) Challenge response system and method
JP2008226159A5 (de)
RU2017106105A (ru) Способы безопасного генерирования криптограмм
US8417954B1 (en) Installation image including digital signature
CN113545006A (zh) 远程授权访问锁定的数据存储设备
ATE406726T1 (de) Verfahren und vorrichtung zur speicherung kryptographischer schlüssel, wobei schlüsselserver durch besitz und sichere verteilung gespeicherter schlüssel authentifiziert werden
RU2005109159A (ru) Способ и системы для обеспечения безопасного распределения данных через сети общего пользования
US7587045B2 (en) System and method for securing document transmittal
WO2010015906A3 (en) Apparatus, systems and methods for authentication of objects having multiple components
RU2019117050A (ru) Управление шифрованием данных посредством множества органов управления
US11831752B2 (en) Initializing a data storage device with a manager device
US11606206B2 (en) Recovery key for unlocking a data storage device
TW201329776A (zh) 保護檔案內容安全的方法和系統
WO2014026462A1 (zh) 一种数字权益管理方法
MY151312A (en) A method and system for file encryption and decryption in a server
ATE506797T1 (de) Datenauthentifizierungsverfahren und agent basiertes system
CN114175574A (zh) 无线安全协议
CN113316149A (zh) 身份安全认证方法、装置、系统、无线接入点及介质
CN113383510A (zh) 数据存储设备的多角色解锁
CN112528309A (zh) 一种数据存储加密和解密的方法及其装置
CN113316915A (zh) 解锁数据存储设备
CN113545021A (zh) 预先授权设备的注册

Legal Events

Date Code Title Description
RER Ceased as to paragraph 5 lit. 3 law introducing patent treaties