AU2001285083A1 - Countering credentials copying - Google Patents

Countering credentials copying

Info

Publication number
AU2001285083A1
AU2001285083A1 AU2001285083A AU8508301A AU2001285083A1 AU 2001285083 A1 AU2001285083 A1 AU 2001285083A1 AU 2001285083 A AU2001285083 A AU 2001285083A AU 8508301 A AU8508301 A AU 8508301A AU 2001285083 A1 AU2001285083 A1 AU 2001285083A1
Authority
AU
Australia
Prior art keywords
countering
credentials
copying
credentials copying
countering credentials
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU2001285083A
Inventor
Warwick Ford
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Verisign Inc
Original Assignee
Verisign Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Verisign Inc filed Critical Verisign Inc
Publication of AU2001285083A1 publication Critical patent/AU2001285083A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2117User registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
AU2001285083A 2000-08-18 2001-08-16 Countering credentials copying Abandoned AU2001285083A1 (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US22642900P 2000-08-18 2000-08-18
US60/226,429 2000-08-18
US09/921,265 2001-08-01
US09/921,265 US20020062452A1 (en) 2000-08-18 2001-08-01 Countering credentials copying
PCT/US2001/025927 WO2002017555A2 (en) 2000-08-18 2001-08-16 Countering credentials copying

Publications (1)

Publication Number Publication Date
AU2001285083A1 true AU2001285083A1 (en) 2002-03-04

Family

ID=26920528

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2001285083A Abandoned AU2001285083A1 (en) 2000-08-18 2001-08-16 Countering credentials copying

Country Status (3)

Country Link
US (2) US20020062452A1 (en)
AU (1) AU2001285083A1 (en)
WO (1) WO2002017555A2 (en)

Families Citing this family (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6795905B1 (en) 2000-03-31 2004-09-21 Intel Corporation Controlling accesses to isolated memory using a memory controller for isolated execution
US6986052B1 (en) 2000-06-30 2006-01-10 Intel Corporation Method and apparatus for secure execution using a secure memory partition
US7793111B1 (en) 2000-09-28 2010-09-07 Intel Corporation Mechanism to handle events in a machine with isolated execution
US7398549B2 (en) 2001-05-18 2008-07-08 Imprivata, Inc. Biometric authentication with security against eavesdropping
US7124273B2 (en) 2002-02-25 2006-10-17 Intel Corporation Method and apparatus for translating guest physical addresses in a virtual machine environment
US7418500B1 (en) * 2002-03-25 2008-08-26 Network Appliance, Inc. Mechanism for controlled sharing of files in a clustered application environment
US7069442B2 (en) 2002-03-29 2006-06-27 Intel Corporation System and method for execution of a secured environment initialization instruction
US7058807B2 (en) * 2002-04-15 2006-06-06 Intel Corporation Validation of inclusion of a platform within a data center
US7318141B2 (en) 2002-12-17 2008-01-08 Intel Corporation Methods and systems to control virtual machines
US20040187029A1 (en) * 2003-03-21 2004-09-23 Ting David M. T. System and method for data and request filtering
US7660880B2 (en) * 2003-03-21 2010-02-09 Imprivata, Inc. System and method for automated login
US7320073B2 (en) 2003-04-07 2008-01-15 Aol Llc Secure method for roaming keys and certificates
US7739521B2 (en) 2003-09-18 2010-06-15 Intel Corporation Method of obscuring cryptographic computations
US20050080934A1 (en) 2003-09-30 2005-04-14 Cota-Robles Erik C. Invalidating translation lookaside buffer entries in a virtual machine (VM) system
US8156343B2 (en) 2003-11-26 2012-04-10 Intel Corporation Accessing private data about the state of a data processing machine from storage that is publicly accessible
WO2005055018A1 (en) * 2003-12-08 2005-06-16 Kobil Systems Gmbh Method and device for securing digital data
US8037314B2 (en) 2003-12-22 2011-10-11 Intel Corporation Replacing blinded authentication authority
US7802085B2 (en) 2004-02-18 2010-09-21 Intel Corporation Apparatus and method for distributing private keys to an entity with minimal secret, unique information
US8924728B2 (en) 2004-11-30 2014-12-30 Intel Corporation Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive information
US8533777B2 (en) 2004-12-29 2013-09-10 Intel Corporation Mechanism to determine trust of out-of-band management agents
US7809957B2 (en) 2005-09-29 2010-10-05 Intel Corporation Trusted platform module for generating sealed data
US8014530B2 (en) 2006-03-22 2011-09-06 Intel Corporation Method and apparatus for authenticated, recoverable key distribution with no database secrets
US7950021B2 (en) 2006-03-29 2011-05-24 Imprivata, Inc. Methods and systems for providing responses to software commands
US8418235B2 (en) * 2006-11-15 2013-04-09 Research In Motion Limited Client credential based secure session authentication method and apparatus
FR2937204B1 (en) * 2008-10-15 2013-08-23 In Webo Technologies AUTHENTICATION SYSTEM
US8397281B2 (en) * 2009-12-30 2013-03-12 Symantec Corporation Service assisted secret provisioning
US8606234B2 (en) * 2009-12-31 2013-12-10 Symantec Corporation Methods and apparatus for provisioning devices with secrets
US8453222B1 (en) * 2010-08-20 2013-05-28 Symantec Corporation Possession of synchronized data as authentication factor in online services
US9582685B2 (en) 2010-11-19 2017-02-28 Nagravision S.A. Method to detect cloned software
US8806192B2 (en) * 2011-05-04 2014-08-12 Microsoft Corporation Protected authorization for untrusted clients
EP2845403A4 (en) * 2012-04-26 2016-03-02 Nokia Technologies Oy Method and apparatus for controlling wireless network access parameter sharing
AU2012101558B4 (en) * 2012-08-29 2013-05-30 Device Authority Ltd Adaptive device authentication
US9838424B2 (en) 2014-03-20 2017-12-05 Microsoft Technology Licensing, Llc Techniques to provide network security through just-in-time provisioned accounts
US20150281225A1 (en) * 2014-03-27 2015-10-01 Microsoft Corporation Techniques to operate a service with machine generated authentication tokens
US9578511B2 (en) 2014-06-30 2017-02-21 Libre Wireless Technologies, Inc. Systems and techniques for wireless device configuration
US9374370B1 (en) 2015-01-23 2016-06-21 Island Intellectual Property, Llc Invariant biohash security system and method
WO2017009915A1 (en) * 2015-07-10 2017-01-19 富士通株式会社 Device authentication system, management device, and device authentication method
EP4348924A1 (en) * 2021-05-25 2024-04-10 Visa International Service Association Multi-party computation for many computers

Family Cites Families (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4200770A (en) * 1977-09-06 1980-04-29 Stanford University Cryptographic apparatus and method
US5146498A (en) * 1991-01-10 1992-09-08 Motorola, Inc. Remote key manipulations for over-the-air re-keying
US5323464A (en) * 1992-10-16 1994-06-21 International Business Machines Corporation Commercial data masking
JP3053527B2 (en) * 1993-07-30 2000-06-19 インターナショナル・ビジネス・マシーンズ・コーポレイション Method and apparatus for validating a password, method and apparatus for generating and preliminary validating a password, method and apparatus for controlling access to resources using an authentication code
JP2786092B2 (en) * 1993-10-18 1998-08-13 日本電気株式会社 Mobile communication terminal authentication method
DE19607017C2 (en) * 1996-02-24 2000-06-29 Daimler Chrysler Ag Remote control device and operating method therefor, in particular for controlling motor vehicle-related devices
US5815665A (en) * 1996-04-03 1998-09-29 Microsoft Corporation System and method for providing trusted brokering services over a distributed network
FR2753857B1 (en) * 1996-09-25 1998-12-11 METHOD AND SYSTEM FOR SECURING THE DELIVERY OF SERVICES BROADCASTED ON AN INTERNET-TYPE COMPUTER NETWORK
FR2753858B1 (en) * 1996-09-25 1999-03-26 METHOD AND SYSTEM FOR SECURING TELEPHONE CALL MANAGEMENT CENTERS
US6029150A (en) * 1996-10-04 2000-02-22 Certco, Llc Payment and transactions in electronic commerce system
US5953420A (en) * 1996-10-25 1999-09-14 International Business Machines Corporation Method and apparatus for establishing an authenticated shared secret value between a pair of users
US5995624A (en) * 1997-03-10 1999-11-30 The Pacid Group Bilateral authentication and information encryption token system and method
JP3595109B2 (en) * 1997-05-28 2004-12-02 日本ユニシス株式会社 Authentication device, terminal device, authentication method in those devices, and storage medium
US6240184B1 (en) * 1997-09-05 2001-05-29 Rsa Security Inc. Password synchronization
US5991405A (en) * 1998-01-27 1999-11-23 Dsc Telecom, L.P. Method for dynamically updating cellular phone unique encryption keys
US6182220B1 (en) * 1998-03-30 2001-01-30 International Business Machines Corporation System and method for building and exchanging encrypted passwords between a client and server
US6757825B1 (en) * 1999-07-13 2004-06-29 Lucent Technologies Inc. Secure mutual network authentication protocol
US6802000B1 (en) * 1999-10-28 2004-10-05 Xerox Corporation System for authenticating access to online content referenced in hardcopy documents
US7236598B2 (en) * 2000-05-23 2007-06-26 Invicta Networks, Inc. Systems and methods for communication protection
WO2002017539A2 (en) * 2000-08-18 2002-02-28 Distributed Trust Management Inc. Distributed information system and protocol for affixing electronic signatures and authenticating documents

Also Published As

Publication number Publication date
US8478998B2 (en) 2013-07-02
WO2002017555A2 (en) 2002-02-28
US20020062452A1 (en) 2002-05-23
US20070192829A1 (en) 2007-08-16
WO2002017555A3 (en) 2003-01-03

Similar Documents

Publication Publication Date Title
AU2001285083A1 (en) Countering credentials copying
AU2001231752A1 (en) Cook-top
AU2001228708A1 (en) Coin-validation arrangement
AU2002351212A1 (en) Uri munging
AU2000267458A1 (en) Hypercomputer
AU2001220246A1 (en) Neckphone
AU2002222262A1 (en) An improved heater
AU1104301A (en) Primary n-hydroxylamines
AUPQ661800A0 (en) Insulin-potentiating compounds
AU2001265871A1 (en) Substituted sulfonylaminopyrimidines
AU2001254731A1 (en) Substituted phenyluracils
AU2001258255A1 (en) Substituted benzoylcyclohexenones
AU2002210743A1 (en) Deck oven
AU2002225724A1 (en) Motilide compounds
AU2002217285A1 (en) Compounds
AU2002244136A1 (en) Graphics-displaying sheet
AU2001282644A1 (en) Case
AU2001246243A1 (en) Planar transformer
AU2001226668A1 (en) Crankshaft-starter-generator
AU2002223604A1 (en) Substituted phenyluracils
AU2002216043A1 (en) Compounds
AU7634201A (en) 6-methyl-4-trihalomethyltriazine compounds
AU2002363919A1 (en) Quilt
AU2001277689A1 (en) The easy-parker-indicator
AUPR372001A0 (en) The original illumi-jig