ATE389987T1 - Verfahren und vorrichtung zum schutz der datenintegrität - Google Patents
Verfahren und vorrichtung zum schutz der datenintegritätInfo
- Publication number
- ATE389987T1 ATE389987T1 AT01610046T AT01610046T ATE389987T1 AT E389987 T1 ATE389987 T1 AT E389987T1 AT 01610046 T AT01610046 T AT 01610046T AT 01610046 T AT01610046 T AT 01610046T AT E389987 T1 ATE389987 T1 AT E389987T1
- Authority
- AT
- Austria
- Prior art keywords
- tag
- message
- received
- data integrity
- protecting data
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Power Engineering (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Collating Specific Patterns (AREA)
- Burglar Alarm Systems (AREA)
- Arrangements For Transmission Of Measured Signals (AREA)
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP01610046A EP1255372B1 (de) | 2001-05-03 | 2001-05-03 | Verfahren und Vorrichtung zum Schutz der Datenintegrität |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| ATE389987T1 true ATE389987T1 (de) | 2008-04-15 |
Family
ID=8183536
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| AT01610046T ATE389987T1 (de) | 2001-05-03 | 2001-05-03 | Verfahren und vorrichtung zum schutz der datenintegrität |
Country Status (4)
| Country | Link |
|---|---|
| US (1) | US7298840B2 (de) |
| EP (1) | EP1255372B1 (de) |
| AT (1) | ATE389987T1 (de) |
| DE (1) | DE60133266T2 (de) |
Families Citing this family (32)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7185105B2 (en) * | 2001-05-11 | 2007-02-27 | Bea Systems, Inc. | Application messaging system with flexible message header structure |
| CN1228978C (zh) * | 2002-09-23 | 2005-11-23 | 国际商业机器公司 | 使用请求短消息点播视频节目的视频点播系统及其方法 |
| US7702910B2 (en) | 2002-10-24 | 2010-04-20 | Telefonaktiebolaget L M Ericsson (Publ) | Message authentication |
| US7284127B2 (en) | 2002-10-24 | 2007-10-16 | Telefonktiebolaget Lm Ericsson (Publ) | Secure communications |
| CA2508526A1 (en) * | 2002-12-03 | 2004-06-17 | Funk Software, Inc. | Tunneled authentication protocol for preventing man-in-the-middle attacks |
| US7627764B2 (en) * | 2004-06-25 | 2009-12-01 | Intel Corporation | Apparatus and method for performing MD5 digesting |
| US7564970B2 (en) * | 2004-08-12 | 2009-07-21 | Cmla, Llc | Exponential data transform to enhance security |
| US7577250B2 (en) * | 2004-08-12 | 2009-08-18 | Cmla, Llc | Key derivation functions to enhance security |
| US8077861B2 (en) | 2004-08-12 | 2011-12-13 | Cmla, Llc | Permutation data transform to enhance security |
| US7577845B2 (en) * | 2004-08-17 | 2009-08-18 | Hengli Ma | Information matrix cryptogram |
| US20060150213A1 (en) * | 2004-12-16 | 2006-07-06 | Zechary Chang | Executing module and method thereof for playing multimedia in a wireless communication apparatus |
| US8812840B2 (en) | 2005-02-07 | 2014-08-19 | France Telecom | Method for fast pre-authentication by distance recognition |
| US7477913B2 (en) * | 2005-04-04 | 2009-01-13 | Research In Motion Limited | Determining a target transmit power of a wireless transmission according to security requirements |
| US9282081B2 (en) * | 2005-07-28 | 2016-03-08 | Vaporstream Incorporated | Reduced traceability electronic message system and method |
| DE102006039327B4 (de) * | 2006-08-22 | 2008-06-26 | Nokia Siemens Networks Gmbh & Co.Kg | Verfahren zur Authentifizierung |
| KR100785810B1 (ko) * | 2006-12-05 | 2007-12-13 | 한국전자통신연구원 | Rfid 데이터 보호 장치 및 방법 |
| WO2008084271A2 (en) * | 2006-12-29 | 2008-07-17 | Abb Research Limited | Method and system for message integrity architecture for use in industrial control systems |
| US8572374B2 (en) * | 2007-05-03 | 2013-10-29 | Intel Corporation | Continuous isochronous read access and measurement of data stored in non-volatile memory |
| TWI341095B (en) * | 2007-12-12 | 2011-04-21 | Nat Univ Tsing Hua | Light-overhead and flexible wireless sensor message authentication method |
| US20090170474A1 (en) * | 2007-12-27 | 2009-07-02 | Motorola, Inc. | Method and device for authenticating trunking control messages |
| US8387129B2 (en) * | 2008-06-09 | 2013-02-26 | Qualcomm Incorporated | Method and apparatus for verifying data packet integrity in a streaming data channel |
| US7899056B2 (en) * | 2009-01-13 | 2011-03-01 | Fujitsu Limited | Device and method for reducing overhead in a wireless network |
| US8023513B2 (en) * | 2009-02-24 | 2011-09-20 | Fujitsu Limited | System and method for reducing overhead in a wireless network |
| US8565229B2 (en) * | 2010-06-18 | 2013-10-22 | Schweitzer Engineering Laboratories Inc | Systems and methods for data packet transmission |
| US9106633B2 (en) * | 2011-05-26 | 2015-08-11 | First Data Corporation | Systems and methods for authenticating mobile device communications |
| US9104542B2 (en) * | 2012-12-28 | 2015-08-11 | Intel Corporation | Apparatus and method for fast tag hit with double error correction and triple error detection |
| DE102013218212A1 (de) * | 2013-09-11 | 2015-03-12 | Robert Bosch Gmbh | Verfahren zum abgesicherten Übermitteln von Daten |
| US9438425B2 (en) * | 2014-08-15 | 2016-09-06 | Alcatel Lucent | Robust MAC aggregation with short MAC tags |
| US9965639B2 (en) * | 2015-07-17 | 2018-05-08 | International Business Machines Corporation | Source authentication of a software product |
| JP6693574B2 (ja) * | 2016-12-15 | 2020-05-13 | 日本電気株式会社 | メッセージ認証システム、装置及びメッセージ検証方法 |
| US10608822B2 (en) * | 2017-04-26 | 2020-03-31 | Nxp B.V. | Efficient calculation of message authentication codes for related data |
| US12223096B2 (en) * | 2019-07-23 | 2025-02-11 | Sony Interactive Entertainment Inc. | Access control apparatus, access control method, and program |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6851052B1 (en) * | 1998-12-10 | 2005-02-01 | Telcordia Technologies, Inc. | Method and device for generating approximate message authentication codes |
| WO2001015382A1 (en) * | 1999-08-21 | 2001-03-01 | Kent Ridge Digital Labs | Legitimacy protection of electronic document and a printed copy thereof |
| US7039392B2 (en) * | 2000-10-10 | 2006-05-02 | Freescale Semiconductor | System and method for providing device authentication in a wireless network |
-
2001
- 2001-05-03 AT AT01610046T patent/ATE389987T1/de not_active IP Right Cessation
- 2001-05-03 DE DE60133266T patent/DE60133266T2/de not_active Expired - Lifetime
- 2001-05-03 EP EP01610046A patent/EP1255372B1/de not_active Expired - Lifetime
-
2002
- 2002-04-09 US US10/476,138 patent/US7298840B2/en not_active Expired - Lifetime
Also Published As
| Publication number | Publication date |
|---|---|
| US7298840B2 (en) | 2007-11-20 |
| EP1255372A1 (de) | 2002-11-06 |
| DE60133266T2 (de) | 2009-04-23 |
| DE60133266D1 (de) | 2008-04-30 |
| EP1255372B1 (de) | 2008-03-19 |
| US20040123102A1 (en) | 2004-06-24 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| DE60133266D1 (de) | Verfahren und Vorrichtung zum Schutz der Datenintegrität | |
| ATE552668T1 (de) | Verfahren und vorrichtung zur authentifizierung in einem mobilen kommunikationssystem | |
| ATE485691T1 (de) | Verfahren zum authentifizieren und verifizieren von sms-übermittlungen | |
| EP0856820A3 (de) | Chipkarte, System zum Verarbeiten von Chipkarten und Verfahren zum Beglaubigen von Chipkarten | |
| ATE313230T1 (de) | Verfahren und vorrichtung zur schlüsselaktualisierung mittels gegenseitiger validierung | |
| WO2002043309A3 (en) | Cryptographic data security system and method | |
| DE60236150D1 (de) | Verfahren zur sicherstellung der datenübertragungssicher heit, kommunikationssystem und kommunikationseinrichtung | |
| DE60125651D1 (de) | Verschlüsselungsvorrichtung, Entschlüsselungsvorrichtung, Vorrichtung zur Erzeugung eines erweiterten Schlüssels und zugehöriges Verfahren und Aufzeichnungsmedium | |
| EP0898216A3 (de) | Verfahren zur gesicherten Kommunikation von Fernbedien-Befehlen in einem Rechnernetz | |
| ATE185661T1 (de) | Verfahren und einrichtung zur authentifizierung einer benutzer-anbieter-kommunikation | |
| DE69320924D1 (de) | Verfahren zur Verwaltung eines Geheimübertragungsschlüssels | |
| NO943457D0 (no) | "Smartkort" tilpasset flere tjenesteytere og sekundær utnyttelse | |
| BR0208587A (pt) | Método e aparelho para mudar os recursos disponìveis em um conjunto de recursos implementado por software contendo uma pluralidade de recursos | |
| AU2003214456A1 (en) | Enhanced message security | |
| ATE526800T1 (de) | Vorrichtung und verfahren zum einstellen der nutzungsbeschränkung eines mobilen kommunikationsterminals | |
| EP0998073A3 (de) | Verfahren und Vorrichtung zur Authentifikation und zum Schlüsselaustausch zwischen verschiedenen Komponenten | |
| ATE540513T1 (de) | Vorrichtung und verfahren zum zugreifen auf schlüssel zur sicheren nachrichtenübermittlung | |
| ATE454000T1 (de) | Authentifizierungsverfahren | |
| NO20014097L (no) | Radiokommunikasjonsapparat samt fremgangsmåte for radiokommunikasjon | |
| ATE506797T1 (de) | Datenauthentifizierungsverfahren und agent basiertes system | |
| BR0115573A (pt) | Esquema de criptografia limite para sistemas de autenticação de mensagens | |
| ATE340451T1 (de) | Netzwerkgerät, system und verfahren zur authentifizierung | |
| WO2007111713A3 (en) | Method for device authentication | |
| WO2002091668A3 (en) | Method and system for data integrity protection | |
| CA2454974A1 (en) | Method for authenticating a message |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| RER | Ceased as to paragraph 5 lit. 3 law introducing patent treaties |