ATE506797T1 - Datenauthentifizierungsverfahren und agent basiertes system - Google Patents
Datenauthentifizierungsverfahren und agent basiertes systemInfo
- Publication number
- ATE506797T1 ATE506797T1 AT04360049T AT04360049T ATE506797T1 AT E506797 T1 ATE506797 T1 AT E506797T1 AT 04360049 T AT04360049 T AT 04360049T AT 04360049 T AT04360049 T AT 04360049T AT E506797 T1 ATE506797 T1 AT E506797T1
- Authority
- AT
- Austria
- Prior art keywords
- agent
- data
- random key
- signature
- trusted
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2115—Third party
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
- General Factory Administration (AREA)
- Communication Control (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP04360049A EP1594280B1 (de) | 2004-05-07 | 2004-05-07 | Datenauthentifizierungsverfahren und Agent basiertes System |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| ATE506797T1 true ATE506797T1 (de) | 2011-05-15 |
Family
ID=34931773
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| AT04360049T ATE506797T1 (de) | 2004-05-07 | 2004-05-07 | Datenauthentifizierungsverfahren und agent basiertes system |
Country Status (5)
| Country | Link |
|---|---|
| US (1) | US7765396B2 (de) |
| EP (1) | EP1594280B1 (de) |
| CN (1) | CN1694395A (de) |
| AT (1) | ATE506797T1 (de) |
| DE (1) | DE602004032313D1 (de) |
Families Citing this family (18)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7565358B2 (en) * | 2005-08-08 | 2009-07-21 | Google Inc. | Agent rank |
| US8171293B2 (en) * | 2005-12-30 | 2012-05-01 | Apple Inc. | Receiver non-repudiation via a secure device |
| US7890757B2 (en) * | 2005-12-30 | 2011-02-15 | Novell, Inc. | Receiver non-repudiation |
| US9112681B2 (en) * | 2007-06-22 | 2015-08-18 | Fujitsu Limited | Method and apparatus for secure information transfer to support migration |
| US8631235B2 (en) * | 2007-08-08 | 2014-01-14 | Oracle America, Inc. | System and method for storing data using a virtual worm file system |
| CN100553193C (zh) * | 2007-10-23 | 2009-10-21 | 西安西电捷通无线网络通信有限公司 | 一种基于可信第三方的实体双向鉴别方法及其系统 |
| CN100495964C (zh) * | 2007-12-03 | 2009-06-03 | 西安西电捷通无线网络通信有限公司 | 一种轻型接入认证方法 |
| US8458477B2 (en) * | 2008-12-01 | 2013-06-04 | Novell, Inc. | Communication with non-repudiation |
| US8806214B2 (en) | 2008-12-01 | 2014-08-12 | Novell, Inc. | Communication with non-repudiation and blind signatures |
| CN101645776B (zh) * | 2009-08-28 | 2011-09-21 | 西安西电捷通无线网络通信股份有限公司 | 一种引入在线第三方的实体鉴别方法 |
| CN101674182B (zh) | 2009-09-30 | 2011-07-06 | 西安西电捷通无线网络通信股份有限公司 | 引入在线可信第三方的实体公钥获取、证书验证及鉴别的方法及系统 |
| US8606792B1 (en) | 2010-02-08 | 2013-12-10 | Google Inc. | Scoring authors of posts |
| US8935177B2 (en) * | 2010-12-22 | 2015-01-13 | Yahoo! Inc. | Method and system for anonymous measurement of online advertisement using offline sales |
| US9270467B1 (en) * | 2013-05-16 | 2016-02-23 | Symantec Corporation | Systems and methods for trust propagation of signed files across devices |
| US9699167B1 (en) * | 2015-01-06 | 2017-07-04 | Shoretel, Inc. | Distributed authentication |
| CN107066893B (zh) * | 2017-02-28 | 2018-11-09 | 腾讯科技(深圳)有限公司 | 区块链中账户信息的处理方法和装置 |
| CN114091014B (zh) * | 2021-10-29 | 2024-10-18 | 珠海大横琴科技发展有限公司 | 一种数据处理的方法和装置 |
| CN115459922B (zh) * | 2022-08-29 | 2026-01-20 | 浙江省北大信息技术高等研究院 | 一种数字证书制作及其应用方法和系统 |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6367013B1 (en) * | 1995-01-17 | 2002-04-02 | Eoriginal Inc. | System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents |
| US7062781B2 (en) * | 1997-02-12 | 2006-06-13 | Verizon Laboratories Inc. | Method for providing simultaneous parallel secure command execution on multiple remote hosts |
| US6108420A (en) | 1997-04-10 | 2000-08-22 | Channelware Inc. | Method and system for networked installation of uniquely customized, authenticable, and traceable software application |
-
2004
- 2004-05-07 AT AT04360049T patent/ATE506797T1/de not_active IP Right Cessation
- 2004-05-07 DE DE602004032313T patent/DE602004032313D1/de not_active Expired - Lifetime
- 2004-05-07 EP EP04360049A patent/EP1594280B1/de not_active Expired - Lifetime
-
2005
- 2005-04-21 US US11/110,707 patent/US7765396B2/en not_active Expired - Fee Related
- 2005-05-08 CN CN200510068374.8A patent/CN1694395A/zh active Pending
Also Published As
| Publication number | Publication date |
|---|---|
| CN1694395A (zh) | 2005-11-09 |
| DE602004032313D1 (de) | 2011-06-01 |
| US20050251691A1 (en) | 2005-11-10 |
| EP1594280B1 (de) | 2011-04-20 |
| US7765396B2 (en) | 2010-07-27 |
| EP1594280A1 (de) | 2005-11-09 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| ATE506797T1 (de) | Datenauthentifizierungsverfahren und agent basiertes system | |
| KR101054970B1 (ko) | 개인 정보를 포함하는 전자 증명서를 이용하여 통신 상대를 인증하기 위한 시스템, 장치, 방법, 및 컴퓨터 판독 가능한 기록 매체 | |
| WO2008024559A3 (en) | Method and apparatus for authenticating applications to secure services | |
| DE60334614D1 (de) | Verfahren zum authentifizieren und verifizieren von sms-übermittlungen | |
| SG143962A1 (en) | Validating an authentication chip using a secret key | |
| US20100070766A1 (en) | Authentication Method, Client, Server And System | |
| MY162283A (en) | Method and apparatus for mutual authentication | |
| WO2002041125A3 (en) | Personal authentication system | |
| ATE406726T1 (de) | Verfahren und vorrichtung zur speicherung kryptographischer schlüssel, wobei schlüsselserver durch besitz und sichere verteilung gespeicherter schlüssel authentifiziert werden | |
| JP2009545229A5 (de) | ||
| JP2007511810A (ja) | 乱数関数を利用した実行証明 | |
| DE60231629D1 (de) | Verfahren zur datenübermittlung zwischen einem lokalem server und lokalen klienten | |
| EP1251422A3 (de) | Urheberrechtsschutzsystem und Verfahren hierfür | |
| ATE309586T1 (de) | Verfahren und vorrichtung zur symmetrischen schlüsselerzeugung in einer persönlichen sicherheitsvorrichtung mit begrenzten vertrauensbeziehungen | |
| WO2007139706A3 (en) | Authenticating a tamper-resistant module in a base station router | |
| SI2414983T1 (en) | Secure Data System | |
| TW200701728A (en) | Data-encrypting/decrypting method, data-saving media using the method, and data-encrypting/decrypting module | |
| CN101136748A (zh) | 一种身份认证方法及系统 | |
| ATE378747T1 (de) | Verfahren und system zur schlüsseldistribution mit einem authentifizierungschritt und einem schlüsseldistributionsschritt unter verwendung von kek (key encryption key) | |
| MXPA05010126A (es) | Metodo de suministro de acceso. | |
| EP0912011A3 (de) | Verfahren und Vorrichtung zur Verschlüsselung und zur Rückgewinnung von Schlüseln | |
| FR2826811B1 (fr) | Procede d'authentification cryptographique | |
| US20220164481A1 (en) | Methods and devices for ai model integrity and secrecy protection | |
| ATE387774T1 (de) | Verfahren und vorrichtung zur gesicherten übertragung von daten zwischen teilnehmern | |
| RU2004131500A (ru) | Аутентификация на основе вызова, не требующая знания секретных аутентификационных данных |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| RER | Ceased as to paragraph 5 lit. 3 law introducing patent treaties |