ATE497658T1 - Verfahren und vorrichtung zur sicheren kryptoschlüsselspeicherung und -nutzung. - Google Patents
Verfahren und vorrichtung zur sicheren kryptoschlüsselspeicherung und -nutzung.Info
- Publication number
- ATE497658T1 ATE497658T1 AT98965522T AT98965522T ATE497658T1 AT E497658 T1 ATE497658 T1 AT E497658T1 AT 98965522 T AT98965522 T AT 98965522T AT 98965522 T AT98965522 T AT 98965522T AT E497658 T1 ATE497658 T1 AT E497658T1
- Authority
- AT
- Austria
- Prior art keywords
- key
- pin
- valid
- correct
- pseudo
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/02—Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1025—Identification of user by a PIN code
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2127—Bluffing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/20—Manipulating the length of blocks of bits, e.g. padding or block truncation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Accounting & Taxation (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Finance (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Devices For Executing Special Programs (AREA)
- Devices For Checking Fares Or Tickets At Control Points (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US08/996,758 US6170058B1 (en) | 1997-12-23 | 1997-12-23 | Method and apparatus for cryptographically camouflaged cryptographic key storage, certification and use |
| PCT/US1998/027751 WO1999033222A1 (en) | 1997-12-23 | 1998-12-22 | Method and apparatus for secure cryptographic key storage, certification and use |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| ATE497658T1 true ATE497658T1 (de) | 2011-02-15 |
Family
ID=25543275
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| AT98965522T ATE497658T1 (de) | 1997-12-23 | 1998-12-22 | Verfahren und vorrichtung zur sicheren kryptoschlüsselspeicherung und -nutzung. |
Country Status (10)
| Country | Link |
|---|---|
| US (2) | US6170058B1 (de) |
| EP (2) | EP1048143B1 (de) |
| JP (1) | JP4463979B2 (de) |
| AT (1) | ATE497658T1 (de) |
| AU (1) | AU746966B2 (de) |
| CA (1) | CA2314349C (de) |
| DE (1) | DE69842122D1 (de) |
| ES (1) | ES2359205T3 (de) |
| NO (1) | NO20003310L (de) |
| WO (1) | WO1999033222A1 (de) |
Families Citing this family (162)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| NO305420B1 (no) * | 1997-09-02 | 1999-05-25 | Ericsson Telefon Ab L M | Anordning ved datakommunikasjonssystem, spesielt ved kommunikasjon via brannmurer |
| US7328350B2 (en) | 2001-03-29 | 2008-02-05 | Arcot Systems, Inc. | Method and apparatus for secure cryptographic key generation, certification and use |
| US7454782B2 (en) * | 1997-12-23 | 2008-11-18 | Arcot Systems, Inc. | Method and system for camouflaging access-controlled data |
| US6574733B1 (en) * | 1999-01-25 | 2003-06-03 | Entrust Technologies Limited | Centralized secure backup system and method |
| JP2002536706A (ja) | 1999-02-12 | 2002-10-29 | マック ヒックス | 証明書関連その他のサービスを提供するシステム及び方法 |
| FR2791203A1 (fr) * | 1999-03-17 | 2000-09-22 | Schlumberger Systems & Service | Dispositif d'authentification d'un message lors d'une operation de traitement cryptographique dudit message |
| US6697948B1 (en) | 1999-05-05 | 2004-02-24 | Michael O. Rabin | Methods and apparatus for protecting information |
| US6629150B1 (en) * | 1999-06-18 | 2003-09-30 | Intel Corporation | Platform and method for creating and using a digital container |
| US7111172B1 (en) * | 1999-07-19 | 2006-09-19 | Rsa Security Inc. | System and methods for maintaining and distributing personal security devices |
| US20020029200A1 (en) | 1999-09-10 | 2002-03-07 | Charles Dulin | System and method for providing certificate validation and other services |
| WO2001024082A1 (en) * | 1999-09-24 | 2001-04-05 | Mary Mckenney | System and method for providing payment services in electronic commerce |
| US6708049B1 (en) * | 1999-09-28 | 2004-03-16 | Nellcor Puritan Bennett Incorporated | Sensor with signature of data relating to sensor |
| US6895391B1 (en) * | 1999-11-09 | 2005-05-17 | Arcot Systems, Inc. | Method and system for secure authenticated payment on a computer network |
| US6704868B1 (en) * | 1999-11-12 | 2004-03-09 | International Business Machines Corporation | Method for associating a pass phase with a secured public/private key pair |
| US6718468B1 (en) * | 1999-11-12 | 2004-04-06 | International Business Machines Corporation | Method for associating a password with a secured public/private key pair |
| WO2001061659A1 (en) * | 2000-02-16 | 2001-08-23 | Mastercard International Incorporated | System and method for conducting electronic commerce with a remote wallet server |
| WO2001092989A2 (en) * | 2000-05-26 | 2001-12-06 | Interchecks, Llc | Methods and systems for network based electronic purchasing system |
| AU2001284882A1 (en) * | 2000-08-14 | 2002-02-25 | Peter H. Gien | System and method for facilitating signing by buyers in electronic commerce |
| US9252955B2 (en) * | 2000-08-18 | 2016-02-02 | United States Postal Service | Apparatus and methods for the secure transfer of electronic data |
| EP1325599A1 (de) | 2000-09-08 | 2003-07-09 | Guy S. Tallent | System und verfahren zur bereitstellung der authorisierung und anderer dienste |
| AU2001290727A1 (en) * | 2000-09-08 | 2002-03-22 | Larry R. Miller | System and method for transparently providing certificate validation and other services within an electronic transaction |
| US6889209B1 (en) * | 2000-11-03 | 2005-05-03 | Shieldip, Inc. | Method and apparatus for protecting information and privacy |
| US20020091929A1 (en) * | 2000-12-19 | 2002-07-11 | Jakob Ehrensvard | Secure digital signing of data |
| US20020106085A1 (en) * | 2001-01-05 | 2002-08-08 | Sandeep Jain | Security breach management |
| WO2002059818A1 (en) * | 2001-01-26 | 2002-08-01 | Accenture Llp | Method for an escrow function during a transaction using an electronic/physical mail address database framework |
| US7711122B2 (en) * | 2001-03-09 | 2010-05-04 | Arcot Systems, Inc. | Method and apparatus for cryptographic key storage wherein key servers are authenticated by possession and secure distribution of stored keys |
| GB2373074B (en) * | 2001-03-10 | 2004-10-13 | Ibm | A method and apparatus for storage of security keys and certificates |
| JP4064647B2 (ja) * | 2001-08-24 | 2008-03-19 | 富士通株式会社 | 情報処理装置及び入力操作装置 |
| US7376625B2 (en) * | 2001-11-15 | 2008-05-20 | Nokia Corporation | System and method for activating individualized software modules in a digital broadcast environment |
| JP4157709B2 (ja) * | 2002-01-31 | 2008-10-01 | 富士通株式会社 | アクセス制御方法及び記憶装置 |
| US7529944B2 (en) * | 2002-02-07 | 2009-05-05 | Activcard Ireland Limited | Support for multiple login method |
| US7660988B2 (en) * | 2002-03-18 | 2010-02-09 | Cognomina, Inc. | Electronic notary |
| US7899753B1 (en) | 2002-03-25 | 2011-03-01 | Jpmorgan Chase Bank, N.A | Systems and methods for time variable financial authentication |
| AU2003243187A1 (en) | 2002-05-02 | 2003-11-17 | Shieldip, Inc. | Method and apparatus for protecting information and privacy |
| US7418099B2 (en) * | 2002-05-03 | 2008-08-26 | Certicom Corp. | Method and apparatus for performing elliptic curve arithmetic |
| EP1429224A1 (de) * | 2002-12-10 | 2004-06-16 | Texas Instruments Incorporated | Firmware Laufzeit Authentisierung |
| AU2003900413A0 (en) * | 2003-01-31 | 2003-02-13 | Mckeon, Brian Bernard | Regulated issuance of digital certificates |
| DK1624878T3 (da) * | 2003-05-22 | 2007-01-08 | Pantarhei Bioscience Bv | Anvendelse af præparater som omfatter en östrogen komponent til behandling og forebyggelse af muskel-skelet-smerte |
| US7506161B2 (en) * | 2003-09-02 | 2009-03-17 | Authernative, Inc. | Communication session encryption and authentication system |
| US7581100B2 (en) * | 2003-09-02 | 2009-08-25 | Authernative, Inc. | Key generation method for communication session encryption and authentication system |
| US7299356B2 (en) * | 2003-09-02 | 2007-11-20 | Authernative, Inc. | Key conversion method for communication session encryption and authentication system |
| US7596704B2 (en) * | 2003-10-10 | 2009-09-29 | Jing-Jang Hwang | Partition and recovery of a verifiable digital secret |
| US7562230B2 (en) * | 2003-10-14 | 2009-07-14 | Intel Corporation | Data security |
| US20050154906A1 (en) * | 2003-11-05 | 2005-07-14 | Patrick Kriech | BIOS locked application media |
| US20050131835A1 (en) * | 2003-12-12 | 2005-06-16 | Howell James A.Jr. | System for pre-trusting of applications for firewall implementations |
| US20050201555A1 (en) * | 2004-02-09 | 2005-09-15 | I-Ling Yen | System, method and apparatus for secure computation on encrypted data |
| US20050203843A1 (en) * | 2004-03-12 | 2005-09-15 | Wood George L. | Internet debit system |
| US7418728B2 (en) * | 2004-03-17 | 2008-08-26 | Arcot Systems, Inc. | Auditing secret key cryptographic operations |
| US7287159B2 (en) | 2004-04-01 | 2007-10-23 | Shieldip, Inc. | Detection and identification methods for software |
| US7711965B2 (en) * | 2004-10-20 | 2010-05-04 | Intel Corporation | Data security |
| US7620187B1 (en) * | 2005-03-30 | 2009-11-17 | Rockwell Collins, Inc. | Method and apparatus for ad hoc cryptographic key transfer |
| US20070118735A1 (en) * | 2005-11-10 | 2007-05-24 | Jeff Cherrington | Systems and methods for trusted information exchange |
| US7921304B2 (en) * | 2005-12-06 | 2011-04-05 | Microsoft Corporation | Securing data set images |
| US8230487B2 (en) | 2005-12-21 | 2012-07-24 | International Business Machines Corporation | Method and system for controlling access to a secondary system |
| DE102006015212B4 (de) * | 2006-03-30 | 2017-05-04 | Bundesdruckerei Gmbh | Verfahren zum Schutz eines beweglichen Gutes, insbesondere eines Fahrzeugs, gegen unberechtigte Nutzung |
| US7992203B2 (en) * | 2006-05-24 | 2011-08-02 | Red Hat, Inc. | Methods and systems for secure shared smartcard access |
| US8180741B2 (en) | 2006-06-06 | 2012-05-15 | Red Hat, Inc. | Methods and systems for providing data objects on a token |
| US8332637B2 (en) * | 2006-06-06 | 2012-12-11 | Red Hat, Inc. | Methods and systems for nonce generation in a token |
| US8495380B2 (en) | 2006-06-06 | 2013-07-23 | Red Hat, Inc. | Methods and systems for server-side key generation |
| US8098829B2 (en) * | 2006-06-06 | 2012-01-17 | Red Hat, Inc. | Methods and systems for secure key delivery |
| US8364952B2 (en) | 2006-06-06 | 2013-01-29 | Red Hat, Inc. | Methods and system for a key recovery plan |
| US9769158B2 (en) | 2006-06-07 | 2017-09-19 | Red Hat, Inc. | Guided enrollment and login for token users |
| US8707024B2 (en) | 2006-06-07 | 2014-04-22 | Red Hat, Inc. | Methods and systems for managing identity management security domains |
| US8589695B2 (en) | 2006-06-07 | 2013-11-19 | Red Hat, Inc. | Methods and systems for entropy collection for server-side key generation |
| US8412927B2 (en) * | 2006-06-07 | 2013-04-02 | Red Hat, Inc. | Profile framework for token processing system |
| US8099765B2 (en) * | 2006-06-07 | 2012-01-17 | Red Hat, Inc. | Methods and systems for remote password reset using an authentication credential managed by a third party |
| US8806219B2 (en) * | 2006-08-23 | 2014-08-12 | Red Hat, Inc. | Time-based function back-off |
| US8787566B2 (en) * | 2006-08-23 | 2014-07-22 | Red Hat, Inc. | Strong encryption |
| US8074265B2 (en) | 2006-08-31 | 2011-12-06 | Red Hat, Inc. | Methods and systems for verifying a location factor associated with a token |
| US9038154B2 (en) | 2006-08-31 | 2015-05-19 | Red Hat, Inc. | Token Registration |
| US8356342B2 (en) | 2006-08-31 | 2013-01-15 | Red Hat, Inc. | Method and system for issuing a kill sequence for a token |
| US8977844B2 (en) | 2006-08-31 | 2015-03-10 | Red Hat, Inc. | Smartcard formation with authentication keys |
| JP4551380B2 (ja) * | 2006-10-04 | 2010-09-29 | 株式会社日立製作所 | 認証システムおよびその方法 |
| US8693690B2 (en) | 2006-12-04 | 2014-04-08 | Red Hat, Inc. | Organizing an extensible table for storing cryptographic objects |
| US20080178252A1 (en) * | 2007-01-18 | 2008-07-24 | General Instrument Corporation | Password Installation in Home Networks |
| US8813243B2 (en) | 2007-02-02 | 2014-08-19 | Red Hat, Inc. | Reducing a size of a security-related data object stored on a token |
| US8639940B2 (en) | 2007-02-28 | 2014-01-28 | Red Hat, Inc. | Methods and systems for assigning roles on a token |
| US8832453B2 (en) | 2007-02-28 | 2014-09-09 | Red Hat, Inc. | Token recycling |
| US9081948B2 (en) | 2007-03-13 | 2015-07-14 | Red Hat, Inc. | Configurable smartcard |
| US20090006842A1 (en) * | 2007-06-26 | 2009-01-01 | John Gordon Ross | Sealing Electronic Data Associated With Multiple Electronic Documents |
| US20090006258A1 (en) * | 2007-06-26 | 2009-01-01 | John Gordon Ross | Registration Process |
| US20090003588A1 (en) * | 2007-06-26 | 2009-01-01 | John Gordon Ross | Counter Sealing Archives of Electronic Seals |
| US20090006860A1 (en) * | 2007-06-26 | 2009-01-01 | John Gordon Ross | Generating multiple seals for electronic data |
| EP2232761B1 (de) * | 2008-01-18 | 2021-02-24 | Identrust, Inc. | Bindung eines digitalen zertifikats an mehrtrust-domänen |
| US9444622B2 (en) * | 2008-09-15 | 2016-09-13 | Hewlett Packard Enterprise Development Lp | Computing platform with system key |
| US8520855B1 (en) * | 2009-03-05 | 2013-08-27 | University Of Washington | Encapsulation and decapsulation for data disintegration |
| US8572394B2 (en) | 2009-09-04 | 2013-10-29 | Computer Associates Think, Inc. | OTP generation using a camouflaged key |
| IT1398518B1 (it) * | 2009-09-25 | 2013-03-01 | Colombo | Safe milano |
| US8533460B2 (en) * | 2009-11-06 | 2013-09-10 | Computer Associates Think, Inc. | Key camouflaging method using a machine identifier |
| JP4656458B1 (ja) * | 2009-11-09 | 2011-03-23 | Necインフロンティア株式会社 | ハンディターミナル、及びハンディターミナルによる決済方法 |
| US8843757B2 (en) * | 2009-11-12 | 2014-09-23 | Ca, Inc. | One time PIN generation |
| EP2348446B1 (de) * | 2009-12-18 | 2015-04-15 | CompuGroup Medical AG | Computerimplementiertes Verfahren zur Erzeugung eines Pseudonyms, computerlesbares Speichermedium und Computersystem |
| EP2343665B1 (de) * | 2009-12-18 | 2012-04-18 | CompuGroup Medical AG | Computerimplementiertes Verfahren zur Erzeugung eines Pseudonyms, computerlesbares Speichermedium und Computersystem |
| EP2348449A3 (de) | 2009-12-18 | 2013-07-10 | CompuGroup Medical AG | Computerimplementiertes Verfahren zur Erzeugung eines Pseudonyms, computerlesbares Speichermedium und Computersystem |
| EP2348452B1 (de) | 2009-12-18 | 2014-07-02 | CompuGroup Medical AG | Computerimplementiertes Verfahren zur Erzeugung eines Pseudonyms, computerlesbares Speichermedium und Computersystem |
| US8719587B2 (en) | 2009-12-18 | 2014-05-06 | CompuGroup Medical AG | Computer implemented method for generating a pseudonym, computer readable storage medium and computer system |
| US9532222B2 (en) | 2010-03-03 | 2016-12-27 | Duo Security, Inc. | System and method of notifying mobile devices to complete transactions after additional agent verification |
| US9544143B2 (en) | 2010-03-03 | 2017-01-10 | Duo Security, Inc. | System and method of notifying mobile devices to complete transactions |
| EP2365456B1 (de) | 2010-03-11 | 2016-07-20 | CompuGroup Medical SE | Computerimplementiertes Verfahren zur Erzeugung eines Pseudonyms, computerlesbares Speichermedium und Computersystem |
| US9282085B2 (en) * | 2010-12-20 | 2016-03-08 | Duo Security, Inc. | System and method for digital user authentication |
| US8931069B2 (en) * | 2011-03-09 | 2015-01-06 | Ca, Inc. | Authentication with massively pre-generated one-time passwords |
| US9467463B2 (en) | 2011-09-02 | 2016-10-11 | Duo Security, Inc. | System and method for assessing vulnerability of a mobile device |
| US8763077B2 (en) | 2011-10-07 | 2014-06-24 | Duo Security, Inc. | System and method for enforcing a policy for an authenticator device |
| US9524388B2 (en) | 2011-10-07 | 2016-12-20 | Duo Security, Inc. | System and method for enforcing a policy for an authenticator device |
| US10979226B1 (en) * | 2011-10-12 | 2021-04-13 | Cybrsecurity Corporation | Soft-token authentication system with token blocking after entering the wrong PIN |
| US8924712B2 (en) * | 2011-11-14 | 2014-12-30 | Ca, Inc. | Using QR codes for authenticating users to ATMs and other secure machines for cardless transactions |
| WO2013080062A1 (en) * | 2011-12-01 | 2013-06-06 | International Business Machines Corporation | Cross system secure logon |
| US20140068247A1 (en) * | 2011-12-12 | 2014-03-06 | Moose Loop Holdings, LLC | Security device access |
| EP2828103B1 (de) | 2012-03-20 | 2017-02-22 | Aperia Technologies | Reifenfüllanlage |
| US9842335B2 (en) * | 2012-03-23 | 2017-12-12 | The Toronto-Dominion Bank | System and method for authenticating a payment terminal |
| US20140006781A1 (en) | 2012-06-23 | 2014-01-02 | Pomian & Corella, Llc | Encapsulating the complexity of cryptographic authentication in black-boxes |
| US9887989B2 (en) | 2012-06-23 | 2018-02-06 | Pomian & Corella, Llc | Protecting passwords and biometrics against back-end security breaches |
| US9361619B2 (en) * | 2012-08-06 | 2016-06-07 | Ca, Inc. | Secure and convenient mobile authentication techniques |
| US9165130B2 (en) | 2012-11-21 | 2015-10-20 | Ca, Inc. | Mapping biometrics to a unique key |
| US9338156B2 (en) | 2013-02-22 | 2016-05-10 | Duo Security, Inc. | System and method for integrating two-factor authentication in a device |
| US8893230B2 (en) | 2013-02-22 | 2014-11-18 | Duo Security, Inc. | System and method for proxying federated authentication protocols |
| US9607156B2 (en) | 2013-02-22 | 2017-03-28 | Duo Security, Inc. | System and method for patching a device through exploitation |
| US9443073B2 (en) | 2013-08-08 | 2016-09-13 | Duo Security, Inc. | System and method for verifying status of an authentication device |
| US9037865B1 (en) | 2013-03-04 | 2015-05-19 | Ca, Inc. | Method and system to securely send secrets to users |
| US9325499B1 (en) * | 2013-06-24 | 2016-04-26 | Emc Corporation | Message encryption and decryption utilizing low-entropy keys |
| US9053310B2 (en) | 2013-08-08 | 2015-06-09 | Duo Security, Inc. | System and method for verifying status of an authentication device through a biometric profile |
| US9608814B2 (en) | 2013-09-10 | 2017-03-28 | Duo Security, Inc. | System and method for centralized key distribution |
| US9092302B2 (en) | 2013-09-10 | 2015-07-28 | Duo Security, Inc. | System and method for determining component version compatibility across a device ecosystem |
| CN103763103B (zh) * | 2013-12-31 | 2017-02-01 | 飞天诚信科技股份有限公司 | 一种智能卡生成脱机认证凭据的方法 |
| US9762590B2 (en) | 2014-04-17 | 2017-09-12 | Duo Security, Inc. | System and method for an integrity focused authentication service |
| US9838205B2 (en) | 2014-09-16 | 2017-12-05 | Keypasco Ab | Network authentication method for secure electronic transactions |
| US9231925B1 (en) * | 2014-09-16 | 2016-01-05 | Keypasco Ab | Network authentication method for secure electronic transactions |
| GB2531770A (en) * | 2014-10-30 | 2016-05-04 | Ibm | Confidential Extracting System Internal Data |
| US9979719B2 (en) | 2015-01-06 | 2018-05-22 | Duo Security, Inc. | System and method for converting one-time passcodes to app-based authentication |
| US20160260091A1 (en) * | 2015-03-04 | 2016-09-08 | THC Farmaceuticals, Inc. | Universal wallet for digital currency |
| US9641341B2 (en) | 2015-03-31 | 2017-05-02 | Duo Security, Inc. | Method for distributed trust authentication |
| GB2538052B (en) * | 2015-04-27 | 2019-07-03 | Gurulogic Microsystems Oy | Encoder, decoder, encryption system, encryption key wallet and method |
| US20160335627A1 (en) * | 2015-05-11 | 2016-11-17 | Gemalto Sa | Method, device and a server for signing data |
| US10009324B2 (en) * | 2015-06-29 | 2018-06-26 | American Express Travel Related Services Company, Inc. | Host card emulation systems and methods |
| US9774579B2 (en) | 2015-07-27 | 2017-09-26 | Duo Security, Inc. | Method for key rotation |
| WO2017070638A1 (en) | 2015-10-23 | 2017-04-27 | Xivix Holdings Llc | System and method for authentication using a mobile device |
| US10182044B1 (en) | 2015-12-03 | 2019-01-15 | Amazon Technologies, Inc. | Personalizing global session identifiers |
| US9900160B1 (en) | 2015-12-03 | 2018-02-20 | Amazon Technologies, Inc. | Asymmetric session credentials |
| US9894067B1 (en) | 2015-12-03 | 2018-02-13 | Amazon Technologies, Inc. | Cross-region roles |
| US10277569B1 (en) * | 2015-12-03 | 2019-04-30 | Amazon Technologies, Inc. | Cross-region cache of regional sessions |
| WO2017160660A2 (en) * | 2016-03-15 | 2017-09-21 | Visa International Service Association | Validation cryptogram for interaction |
| WO2017201406A1 (en) * | 2016-05-19 | 2017-11-23 | Arris Enterprises Llc | Implicit rsa certificates |
| JP6997755B2 (ja) * | 2016-07-29 | 2022-01-18 | エヌチェーン ホールディングス リミテッド | ブロックチェーンにより実装される方法及びシステム |
| GB201617620D0 (en) * | 2016-10-18 | 2016-11-30 | Cybernetica As | Composite digital signatures |
| US10607017B2 (en) * | 2017-01-04 | 2020-03-31 | Ca, Inc. | Restricting access to sensitive data using tokenization |
| AT519755B1 (de) * | 2017-02-14 | 2018-10-15 | Avl List Gmbh | Zylindergehäuse einer brennkraftmaschine |
| US10665047B1 (en) | 2017-04-28 | 2020-05-26 | 1 Micro, LLC | Methods and apparatus for accessing secured physical assets |
| CN107508686B (zh) * | 2017-10-18 | 2020-07-03 | 克洛斯比尔有限公司 | 身份认证方法和系统以及计算设备和存储介质 |
| US10412113B2 (en) | 2017-12-08 | 2019-09-10 | Duo Security, Inc. | Systems and methods for intelligently configuring computer security |
| US10680820B2 (en) * | 2018-03-09 | 2020-06-09 | Coolbitx Ltd. | Method of creating and recovering digital wallet |
| US10693648B2 (en) * | 2018-03-26 | 2020-06-23 | Ca, Inc. | System and method for dynamic grid authentication |
| US11941610B2 (en) | 2018-07-13 | 2024-03-26 | Circle Internet Financial, Ltd | Cryptocurrency securing system and method |
| US20200036527A1 (en) * | 2018-07-24 | 2020-01-30 | Ca, Inc. | User authentication based on password-specific cryptographic keys |
| WO2020046786A1 (en) | 2018-08-27 | 2020-03-05 | Fireblocks Ltd. | System and method for securing crypto-asset transactions |
| US11386429B2 (en) * | 2018-10-12 | 2022-07-12 | Cybavo Pte. Ltd. | Cryptocurrency securing method and device thereof |
| EP3654578B1 (de) * | 2018-11-16 | 2022-04-06 | SafeTech BV | Verfahren und systeme zur verwaltung kryptographischer privater schlüssel für sichere mehrparteispeicherung und transfer von informationen |
| US11658962B2 (en) | 2018-12-07 | 2023-05-23 | Cisco Technology, Inc. | Systems and methods of push-based verification of a transaction |
| WO2021159052A1 (en) * | 2020-02-08 | 2021-08-12 | Cameron Laghaeian | Method and apparatus for managing encryption keys and encrypted electronic information on a network server |
| US12073386B1 (en) * | 2021-07-08 | 2024-08-27 | Wells Fargo Bank, N.A. | Digital asset vault |
| US11915242B2 (en) | 2021-12-30 | 2024-02-27 | The Adt Security Corporation | Premises security system with secure embedded cryptocurrency storage |
| US20250005187A1 (en) * | 2022-11-23 | 2025-01-02 | Book.Io, Inc. | Systems and methods for providing secure access to digital assets |
| CN120768669B (zh) * | 2025-08-20 | 2026-01-23 | 北京创卓文化传播有限公司 | 一种大数据网络安全数据传输方法 |
Family Cites Families (20)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US3798605A (en) | 1971-06-30 | 1974-03-19 | Ibm | Centralized verification system |
| US5206905A (en) * | 1989-05-15 | 1993-04-27 | Dallas Semiconductor Corp. | Password protected device using incorrect passwords as seed values for pseudo-random number generator for outputting random data to thwart unauthorized accesses |
| JP2606419B2 (ja) * | 1989-08-07 | 1997-05-07 | 松下電器産業株式会社 | 暗号通信システムと暗号通信方法 |
| US5142578A (en) * | 1991-08-22 | 1992-08-25 | International Business Machines Corporation | Hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors |
| US6408388B1 (en) | 1993-05-05 | 2002-06-18 | Addison M. Fischer | Personal date/time notary device |
| US5651066A (en) * | 1994-04-28 | 1997-07-22 | Nippon Telegraph And Telephone Corporation | Cipher key distribution system effectively preventing illegitimate use and charging of enciphered information |
| US5668876A (en) | 1994-06-24 | 1997-09-16 | Telefonaktiebolaget Lm Ericsson | User authentication method and apparatus |
| US5535276A (en) * | 1994-11-09 | 1996-07-09 | Bell Atlantic Network Services, Inc. | Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography |
| DE69529663T2 (de) * | 1994-07-18 | 2003-10-16 | Koninkl Philips Electronics Nv | Dünne anzeigevorrichtung |
| RU2144269C1 (ru) | 1994-07-19 | 2000-01-10 | Сертко, Ллс | Способ секретного использования цифровых подписей в коммерческой криптографической системе |
| US5694471A (en) * | 1994-08-03 | 1997-12-02 | V-One Corporation | Counterfeit-proof identification card |
| US5604801A (en) * | 1995-02-03 | 1997-02-18 | International Business Machines Corporation | Public key data communications system under control of a portable security device |
| US5606615A (en) * | 1995-05-16 | 1997-02-25 | Lapointe; Brian K. | Computer security system |
| EP0753816A1 (de) * | 1995-07-07 | 1997-01-15 | Thomson Consumer Electronics, Inc. | Verfahren und Vorrichtung zur sicheren Speicherung emfindlicher Informationen in einem relativen unsicheren Datenträger |
| US5745574A (en) * | 1995-12-15 | 1998-04-28 | Entegrity Solutions Corporation | Security infrastructure for electronic transactions |
| US5761306A (en) * | 1996-02-22 | 1998-06-02 | Visa International Service Association | Key replacement in a public key cryptosystem |
| US5818936A (en) * | 1996-03-15 | 1998-10-06 | Novell, Inc. | System and method for automically authenticating a user in a distributed network system |
| FR2747208B1 (fr) * | 1996-04-09 | 1998-05-15 | Clemot Olivier | Procede de dissimulation d'un code secret dans un dispositif d'authentification informatique |
| US5815573A (en) * | 1996-04-10 | 1998-09-29 | International Business Machines Corporation | Cryptographic key recovery system |
| US6002768A (en) * | 1996-05-07 | 1999-12-14 | International Computer Science Institute | Distributed registration and key distribution system and method |
-
1997
- 1997-12-23 US US08/996,758 patent/US6170058B1/en not_active Expired - Lifetime
-
1998
- 1998-12-22 CA CA002314349A patent/CA2314349C/en not_active Expired - Lifetime
- 1998-12-22 WO PCT/US1998/027751 patent/WO1999033222A1/en not_active Ceased
- 1998-12-22 AT AT98965522T patent/ATE497658T1/de not_active IP Right Cessation
- 1998-12-22 DE DE69842122T patent/DE69842122D1/de not_active Expired - Lifetime
- 1998-12-22 JP JP2000526008A patent/JP4463979B2/ja not_active Expired - Lifetime
- 1998-12-22 AU AU20973/99A patent/AU746966B2/en not_active Expired
- 1998-12-22 EP EP98965522A patent/EP1048143B1/de not_active Expired - Lifetime
- 1998-12-22 ES ES98965522T patent/ES2359205T3/es not_active Expired - Lifetime
- 1998-12-22 EP EP10010031.2A patent/EP2302833B1/de not_active Expired - Lifetime
-
2000
- 2000-06-23 NO NO20003310A patent/NO20003310L/no not_active Application Discontinuation
- 2000-12-27 US US09/750,511 patent/US6956950B2/en not_active Expired - Lifetime
Also Published As
| Publication number | Publication date |
|---|---|
| HK1032306A1 (en) | 2001-07-13 |
| US6170058B1 (en) | 2001-01-02 |
| JP2001527325A (ja) | 2001-12-25 |
| NO20003310D0 (no) | 2000-06-23 |
| CA2314349C (en) | 2005-09-06 |
| EP1048143B1 (de) | 2011-02-02 |
| WO1999033222A1 (en) | 1999-07-01 |
| US20010008012A1 (en) | 2001-07-12 |
| EP2302833A2 (de) | 2011-03-30 |
| US6956950B2 (en) | 2005-10-18 |
| NO20003310L (no) | 2000-08-22 |
| EP2302833B1 (de) | 2018-02-14 |
| AU746966B2 (en) | 2002-05-09 |
| DE69842122D1 (de) | 2011-03-17 |
| AU2097399A (en) | 1999-07-12 |
| EP1048143A1 (de) | 2000-11-02 |
| JP4463979B2 (ja) | 2010-05-19 |
| ES2359205T3 (es) | 2011-05-19 |
| EP2302833A3 (de) | 2011-12-07 |
| CA2314349A1 (en) | 1999-07-01 |
| EP1048143A4 (de) | 2006-02-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| ATE497658T1 (de) | Verfahren und vorrichtung zur sicheren kryptoschlüsselspeicherung und -nutzung. | |
| GB2339518B (en) | Method for secure key management using a biometric | |
| WO2003041324A3 (en) | Biometrics template | |
| EP0997808A2 (de) | Verfahren und Vorrichtung zur Steuerung des Zugriffs auf gespeicherte Information | |
| DE60126874D1 (de) | Vorrichtung und verfahren zur informationsverarbeitung | |
| WO1999003277A3 (en) | Arrangement for independently requesting a playing authorization for a reproduced encrypted information signal | |
| ATE190147T1 (de) | Methode zur programdatensicherung | |
| ATE309604T1 (de) | Verfahren und system zur bereitstellung von busverschlüsselung basierend auf einem kryptographischen schlüsselaustausch | |
| EP0894377A4 (de) | Verfahren zur erzeugung eines sicheren, nichtwiederverwendbaren und einmaligen kennworts | |
| WO1999016031A3 (en) | Method and apparatus for asymmetric key management in a cryptographic system | |
| CA2130531A1 (en) | Method and Apparatus for Verification of Classes of Documents | |
| WO1996008093B1 (en) | Biometric controlled key generation | |
| ATE469476T1 (de) | Verfahren und vorrichtung zum tarnen von daten, informationen und funktionstransformationen | |
| ATE221677T1 (de) | Zugriffssteuerungs/verschlüsselungssystem | |
| DK1455503T3 (da) | Fremgangsmåde og apparat til datacertificering | |
| GB2289965A (en) | Secure personal indentification instument and method for creating same | |
| EP0998073A3 (de) | Verfahren und Vorrichtung zur Authentifikation und zum Schlüsselaustausch zwischen verschiedenen Komponenten | |
| JPH10247906A (ja) | 処理機能付きデバイス装置、情報処理システム、認証方法、認証・暗号化方法及び認証・復号方法 | |
| KR900012179A (ko) | 데이터인증 시스템과 그 인증방법 | |
| JP4137468B2 (ja) | プログラム使用認証方法 | |
| RU2004109811A (ru) | Способ инициализации чип-карты | |
| DE60302631D1 (de) | System und Verfahren zum Verteilen von kryptographischen Schlüsseln, Zugangspunkt und System zum Verteilen eines Authentifizierungskodes | |
| NZ514022A (en) | Methods and apparatus for authenticating the download of information onto a smart card | |
| ATE374490T1 (de) | Verfahren und vorrichtung zur sicheren verteilung von authentifizierungsdaten an umherstreifende teilnehmer | |
| JP3904964B2 (ja) | ネットワーク印刷システム |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| RER | Ceased as to paragraph 5 lit. 3 law introducing patent treaties |