ATE506797T1 - Datenauthentifizierungsverfahren und agent basiertes system - Google Patents

Datenauthentifizierungsverfahren und agent basiertes system

Info

Publication number
ATE506797T1
ATE506797T1 AT04360049T AT04360049T ATE506797T1 AT E506797 T1 ATE506797 T1 AT E506797T1 AT 04360049 T AT04360049 T AT 04360049T AT 04360049 T AT04360049 T AT 04360049T AT E506797 T1 ATE506797 T1 AT E506797T1
Authority
AT
Austria
Prior art keywords
agent
data
random key
signature
trusted
Prior art date
Application number
AT04360049T
Other languages
English (en)
Inventor
Kristina Haufe
Original Assignee
Alcatel Lucent
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alcatel Lucent filed Critical Alcatel Lucent
Application granted granted Critical
Publication of ATE506797T1 publication Critical patent/ATE506797T1/de

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2115Third party

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)
  • General Factory Administration (AREA)
  • Communication Control (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
AT04360049T 2004-05-07 2004-05-07 Datenauthentifizierungsverfahren und agent basiertes system ATE506797T1 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP04360049A EP1594280B1 (de) 2004-05-07 2004-05-07 Datenauthentifizierungsverfahren und Agent basiertes System

Publications (1)

Publication Number Publication Date
ATE506797T1 true ATE506797T1 (de) 2011-05-15

Family

ID=34931773

Family Applications (1)

Application Number Title Priority Date Filing Date
AT04360049T ATE506797T1 (de) 2004-05-07 2004-05-07 Datenauthentifizierungsverfahren und agent basiertes system

Country Status (5)

Country Link
US (1) US7765396B2 (de)
EP (1) EP1594280B1 (de)
CN (1) CN1694395A (de)
AT (1) ATE506797T1 (de)
DE (1) DE602004032313D1 (de)

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7565358B2 (en) * 2005-08-08 2009-07-21 Google Inc. Agent rank
US8171293B2 (en) * 2005-12-30 2012-05-01 Apple Inc. Receiver non-repudiation via a secure device
US7890757B2 (en) * 2005-12-30 2011-02-15 Novell, Inc. Receiver non-repudiation
US9112681B2 (en) * 2007-06-22 2015-08-18 Fujitsu Limited Method and apparatus for secure information transfer to support migration
US8631235B2 (en) * 2007-08-08 2014-01-14 Oracle America, Inc. System and method for storing data using a virtual worm file system
CN100553193C (zh) * 2007-10-23 2009-10-21 西安西电捷通无线网络通信有限公司 一种基于可信第三方的实体双向鉴别方法及其系统
CN100495964C (zh) * 2007-12-03 2009-06-03 西安西电捷通无线网络通信有限公司 一种轻型接入认证方法
US8458477B2 (en) * 2008-12-01 2013-06-04 Novell, Inc. Communication with non-repudiation
US8806214B2 (en) 2008-12-01 2014-08-12 Novell, Inc. Communication with non-repudiation and blind signatures
CN101645776B (zh) * 2009-08-28 2011-09-21 西安西电捷通无线网络通信股份有限公司 一种引入在线第三方的实体鉴别方法
CN101674182B (zh) 2009-09-30 2011-07-06 西安西电捷通无线网络通信股份有限公司 引入在线可信第三方的实体公钥获取、证书验证及鉴别的方法及系统
US8606792B1 (en) 2010-02-08 2013-12-10 Google Inc. Scoring authors of posts
US8935177B2 (en) * 2010-12-22 2015-01-13 Yahoo! Inc. Method and system for anonymous measurement of online advertisement using offline sales
US9270467B1 (en) * 2013-05-16 2016-02-23 Symantec Corporation Systems and methods for trust propagation of signed files across devices
US9699167B1 (en) * 2015-01-06 2017-07-04 Shoretel, Inc. Distributed authentication
CN107066893B (zh) * 2017-02-28 2018-11-09 腾讯科技(深圳)有限公司 区块链中账户信息的处理方法和装置
CN114091014B (zh) * 2021-10-29 2024-10-18 珠海大横琴科技发展有限公司 一种数据处理的方法和装置
CN115459922B (zh) * 2022-08-29 2026-01-20 浙江省北大信息技术高等研究院 一种数字证书制作及其应用方法和系统

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6367013B1 (en) * 1995-01-17 2002-04-02 Eoriginal Inc. System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents
US7062781B2 (en) * 1997-02-12 2006-06-13 Verizon Laboratories Inc. Method for providing simultaneous parallel secure command execution on multiple remote hosts
US6108420A (en) 1997-04-10 2000-08-22 Channelware Inc. Method and system for networked installation of uniquely customized, authenticable, and traceable software application

Also Published As

Publication number Publication date
CN1694395A (zh) 2005-11-09
DE602004032313D1 (de) 2011-06-01
US20050251691A1 (en) 2005-11-10
EP1594280B1 (de) 2011-04-20
US7765396B2 (en) 2010-07-27
EP1594280A1 (de) 2005-11-09

Similar Documents

Publication Publication Date Title
ATE506797T1 (de) Datenauthentifizierungsverfahren und agent basiertes system
KR101054970B1 (ko) 개인 정보를 포함하는 전자 증명서를 이용하여 통신 상대를 인증하기 위한 시스템, 장치, 방법, 및 컴퓨터 판독 가능한 기록 매체
WO2008024559A3 (en) Method and apparatus for authenticating applications to secure services
DE60334614D1 (de) Verfahren zum authentifizieren und verifizieren von sms-übermittlungen
SG143962A1 (en) Validating an authentication chip using a secret key
US20100070766A1 (en) Authentication Method, Client, Server And System
MY162283A (en) Method and apparatus for mutual authentication
WO2002041125A3 (en) Personal authentication system
ATE406726T1 (de) Verfahren und vorrichtung zur speicherung kryptographischer schlüssel, wobei schlüsselserver durch besitz und sichere verteilung gespeicherter schlüssel authentifiziert werden
JP2009545229A5 (de)
JP2007511810A (ja) 乱数関数を利用した実行証明
DE60231629D1 (de) Verfahren zur datenübermittlung zwischen einem lokalem server und lokalen klienten
EP1251422A3 (de) Urheberrechtsschutzsystem und Verfahren hierfür
ATE309586T1 (de) Verfahren und vorrichtung zur symmetrischen schlüsselerzeugung in einer persönlichen sicherheitsvorrichtung mit begrenzten vertrauensbeziehungen
WO2007139706A3 (en) Authenticating a tamper-resistant module in a base station router
SI2414983T1 (en) Secure Data System
TW200701728A (en) Data-encrypting/decrypting method, data-saving media using the method, and data-encrypting/decrypting module
CN101136748A (zh) 一种身份认证方法及系统
ATE378747T1 (de) Verfahren und system zur schlüsseldistribution mit einem authentifizierungschritt und einem schlüsseldistributionsschritt unter verwendung von kek (key encryption key)
MXPA05010126A (es) Metodo de suministro de acceso.
EP0912011A3 (de) Verfahren und Vorrichtung zur Verschlüsselung und zur Rückgewinnung von Schlüseln
FR2826811B1 (fr) Procede d'authentification cryptographique
US20220164481A1 (en) Methods and devices for ai model integrity and secrecy protection
ATE387774T1 (de) Verfahren und vorrichtung zur gesicherten übertragung von daten zwischen teilnehmern
RU2004131500A (ru) Аутентификация на основе вызова, не требующая знания секретных аутентификационных данных

Legal Events

Date Code Title Description
RER Ceased as to paragraph 5 lit. 3 law introducing patent treaties