AU2003208233A1 - System and method for authenticating components of a storage network - Google Patents

System and method for authenticating components of a storage network

Info

Publication number
AU2003208233A1
AU2003208233A1 AU2003208233A AU2003208233A AU2003208233A1 AU 2003208233 A1 AU2003208233 A1 AU 2003208233A1 AU 2003208233 A AU2003208233 A AU 2003208233A AU 2003208233 A AU2003208233 A AU 2003208233A AU 2003208233 A1 AU2003208233 A1 AU 2003208233A1
Authority
AU
Australia
Prior art keywords
storage network
authenticating components
authenticating
components
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU2003208233A
Inventor
Clement Kent
Daniel Thanos
Yongge Wang
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kasten Chase Applied Res Ltd
Original Assignee
Kasten Chase Applied Res Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kasten Chase Applied Res Ltd filed Critical Kasten Chase Applied Res Ltd
Publication of AU2003208233A1 publication Critical patent/AU2003208233A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)
AU2003208233A 2002-03-11 2003-03-11 System and method for authenticating components of a storage network Abandoned AU2003208233A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CA002375898A CA2375898A1 (en) 2002-03-11 2002-03-11 Authentication protocols for networked storage devices
CA2,375,898 2002-03-11
PCT/CA2003/000324 WO2003077471A1 (en) 2002-03-11 2003-03-11 System and method for authenticating components of a storage network

Publications (1)

Publication Number Publication Date
AU2003208233A1 true AU2003208233A1 (en) 2003-09-22

Family

ID=27792830

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2003208233A Abandoned AU2003208233A1 (en) 2002-03-11 2003-03-11 System and method for authenticating components of a storage network

Country Status (3)

Country Link
AU (1) AU2003208233A1 (en)
CA (1) CA2375898A1 (en)
WO (1) WO2003077471A1 (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE69327238T2 (en) * 1993-08-17 2000-09-07 Entrust Technologies Switzerla Digital signature process and key agreement process
US5761305A (en) * 1995-04-21 1998-06-02 Certicom Corporation Key agreement and transport protocol with implicit signatures
US6263445B1 (en) * 1998-06-30 2001-07-17 Emc Corporation Method and apparatus for authenticating connections to a storage system coupled to a network
SG104928A1 (en) * 1999-09-02 2004-07-30 Compaq Computer Corp Autokey initialization of cryptographic devices

Also Published As

Publication number Publication date
CA2375898A1 (en) 2003-09-11
WO2003077471A1 (en) 2003-09-18

Similar Documents

Publication Publication Date Title
AU2003264941A1 (en) Method and system for establishing a connection via an access network
AU2003216161A1 (en) System and method for creating a distributed network architecture
AU2003295755A1 (en) System and method for managing computer networks
AU2002327686A1 (en) A system and method for the allocation of network storage
AU2003263908A1 (en) System and method for data management
EP1420079B8 (en) Film-forming system and film-forming method
AU2002351232A1 (en) Method and system for providing listener-requested music over a network
AU2003216143A1 (en) Configuration management method and system
AU2003243426A1 (en) Method and system for simplifying distributed server management
AU2003299704A1 (en) Method and system for modular authentication and session management
AU2003222143A1 (en) Open platform system and method
AU2003205166A1 (en) Identifier vocabulary data access method and system
AU2003210427A1 (en) A software distribution method and system
AU2003301158A1 (en) Method and system for group communications
AU2003251577A1 (en) Method and system for authentication ____
AU2003277131A1 (en) Method and system for secure distribution
AU2003284048A1 (en) System and method for buffer management in a packet-based network
AU2003269731A1 (en) Regasification system and method
AU2003272706A1 (en) Method and system for active knowledge management
AU2002336620A1 (en) A system and method for management of a storage area network
AU2002368384A1 (en) Apparatus management system and method thereof
AU2002368021A1 (en) Method and system for authenticating a software
AU2003210080A1 (en) A system and method for controlling the access to an external network
AU2003268347A1 (en) System and method for deriving data
AU2003216331A1 (en) System and method for server network configuration and addressing

Legal Events

Date Code Title Description
MK6 Application lapsed section 142(2)(f)/reg. 8.3(3) - pct applic. not entering national phase