AU2019379062B2 - Method and architecture for securing and managing networks of embedded systems with optimised public key infrastructure - Google Patents
Method and architecture for securing and managing networks of embedded systems with optimised public key infrastructure Download PDFInfo
- Publication number
- AU2019379062B2 AU2019379062B2 AU2019379062A AU2019379062A AU2019379062B2 AU 2019379062 B2 AU2019379062 B2 AU 2019379062B2 AU 2019379062 A AU2019379062 A AU 2019379062A AU 2019379062 A AU2019379062 A AU 2019379062A AU 2019379062 B2 AU2019379062 B2 AU 2019379062B2
- Authority
- AU
- Australia
- Prior art keywords
- micro
- certificate
- public key
- response
- key infrastructure
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/006—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving public key infrastructure [PKI] trust models
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| SG10201810250P | 2018-11-16 | ||
| SG10201810250P | 2018-11-16 | ||
| PCT/SG2019/050382 WO2020101567A1 (en) | 2018-11-16 | 2019-07-31 | Method and architecture for securing and managing networks of embedded systems with optimised public key infrastructure |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| AU2019379062A1 AU2019379062A1 (en) | 2021-06-10 |
| AU2019379062B2 true AU2019379062B2 (en) | 2025-04-24 |
Family
ID=70733044
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| AU2019379062A Active AU2019379062B2 (en) | 2018-11-16 | 2019-07-31 | Method and architecture for securing and managing networks of embedded systems with optimised public key infrastructure |
Country Status (6)
| Country | Link |
|---|---|
| US (1) | US12250325B2 (https=) |
| EP (1) | EP3881492A4 (https=) |
| JP (1) | JP7551080B2 (https=) |
| AU (1) | AU2019379062B2 (https=) |
| SG (1) | SG11202105077UA (https=) |
| WO (1) | WO2020101567A1 (https=) |
Families Citing this family (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP3989483A1 (en) * | 2020-10-26 | 2022-04-27 | Viakoo, Inc | Systems and methods of remotely updating a multitude of ip connected devices |
| US12494900B2 (en) * | 2022-02-01 | 2025-12-09 | Juniper Networks, Inc. | Public key infrastructure based session authentication |
| CN114710289B (zh) * | 2022-06-02 | 2022-09-02 | 确信信息股份有限公司 | 物联网终端安全注册和接入方法及系统 |
| US11811752B1 (en) * | 2022-08-03 | 2023-11-07 | 1080 Network, Inc. | Systems, methods, and computing platforms for executing credential-less network-based communication exchanges |
| US12132846B2 (en) | 2023-03-24 | 2024-10-29 | Symmera Inc. | System and method for extended attributes in certificates for dynamic authorization |
| US11968302B1 (en) | 2023-03-24 | 2024-04-23 | Srinivas Kumar | Method and system for pre-shared key (PSK) based secure communications with domain name system (DNS) authenticator |
| US12476793B2 (en) | 2023-03-24 | 2025-11-18 | Symmera Inc. | System and method to securely distribute authenticated and trusted data streams to AI systems |
| US12015721B1 (en) | 2023-03-24 | 2024-06-18 | Srinivas Kumar | System and method for dynamic retrieval of certificates with remote lifecycle management |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20100202616A1 (en) * | 2009-02-12 | 2010-08-12 | General Motors Corporation | Method of securing and authenticating data using micro-certificates |
| US20160105289A1 (en) * | 2014-10-08 | 2016-04-14 | Google Inc. | Certificates for low-power or low-memory devices |
Family Cites Families (23)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4405829A (en) | 1977-12-14 | 1983-09-20 | Massachusetts Institute Of Technology | Cryptographic communications system and method |
| US5093860A (en) | 1990-09-27 | 1992-03-03 | Motorola, Inc. | Key management system |
| US5231668A (en) | 1991-07-26 | 1993-07-27 | The United States Of America, As Represented By The Secretary Of Commerce | Digital signature algorithm |
| US6252960B1 (en) | 1998-08-04 | 2001-06-26 | Hewlett-Packard Company | Compression and decompression of elliptic curve data points |
| JP3696445B2 (ja) * | 1999-08-25 | 2005-09-21 | 日本電信電話株式会社 | 公開鍵証明証の発行方法並びに利用者端末及び認証センタ装置並びにこれらのプログラムを記録した媒体 |
| US7284121B2 (en) * | 2002-11-20 | 2007-10-16 | Microsoft Corporation | System and method for transmitting reduced information from a certificate to perform encryption operations |
| JP4960894B2 (ja) * | 2008-01-17 | 2012-06-27 | 日本電信電話株式会社 | 楕円曲線の点圧縮装置、楕円曲線の点展開装置、それらの方法及びプログラム |
| US8327146B2 (en) * | 2008-03-31 | 2012-12-04 | General Motors Llc | Wireless communication using compact certificates |
| KR20090104421A (ko) | 2008-03-31 | 2009-10-06 | 고려대학교 산학협력단 | 무선센서네트워크에서의 타원곡선암호 기반 키 설정 방법과이를 이용한 무선센서네트워크 시스템 및 기록매체 |
| EP2334008A1 (en) | 2009-12-10 | 2011-06-15 | Tata Consultancy Services Limited | A system and method for designing secure client-server communication protocols based on certificateless public key infrastructure |
| US9832026B2 (en) | 2010-04-30 | 2017-11-28 | T-Central, Inc. | System and method from Internet of Things (IoT) security and management |
| KR101135841B1 (ko) | 2010-11-25 | 2012-04-19 | 한국전력공사 | 원격검침 프로토콜을 활용한 보안시스템 및 그 방법 |
| US20120302265A1 (en) * | 2011-05-24 | 2012-11-29 | General Motors Llc | Vehicle telematics communication for providing vehicle telematics services |
| KR101357074B1 (ko) | 2011-12-12 | 2014-02-05 | 고려대학교 산학협력단 | 공개키 기반의 키 공유 메커니즘을 이용한 보안 키 설정 방법 |
| US10164966B2 (en) | 2013-02-25 | 2018-12-25 | Lockstep Technologies Pty Ltd | Decoupling identity from devices in the internet of things |
| US9215075B1 (en) | 2013-03-15 | 2015-12-15 | Poltorak Technologies Llc | System and method for secure relayed communications from an implantable medical device |
| US9706372B2 (en) * | 2014-04-03 | 2017-07-11 | General Motors Llc | Secure SMS messaging |
| US20160156614A1 (en) | 2014-11-28 | 2016-06-02 | Hcl Technologies Limited | Provisioning a device over an internet of things |
| US9838390B2 (en) * | 2015-03-31 | 2017-12-05 | Afero, Inc. | System and method for automatic wireless network authentication |
| WO2017053048A1 (en) | 2015-09-25 | 2017-03-30 | Pcms Holdings, Inc. | Domain based iot authorization and authentication |
| US10164963B2 (en) | 2015-10-23 | 2018-12-25 | Oracle International Corporation | Enforcing server authentication based on a hardware token |
| US10523437B2 (en) | 2016-01-27 | 2019-12-31 | Lg Electronics Inc. | System and method for authentication of things |
| EP3291504B1 (en) | 2016-08-30 | 2020-03-11 | Wacom Co., Ltd. | Authentication and secure transmission of data between signature devices and host computers using transport layer security |
-
2019
- 2019-07-31 EP EP19885191.7A patent/EP3881492A4/en active Pending
- 2019-07-31 US US17/293,928 patent/US12250325B2/en active Active
- 2019-07-31 JP JP2021526464A patent/JP7551080B2/ja active Active
- 2019-07-31 WO PCT/SG2019/050382 patent/WO2020101567A1/en not_active Ceased
- 2019-07-31 AU AU2019379062A patent/AU2019379062B2/en active Active
- 2019-07-31 SG SG11202105077UA patent/SG11202105077UA/en unknown
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20100202616A1 (en) * | 2009-02-12 | 2010-08-12 | General Motors Corporation | Method of securing and authenticating data using micro-certificates |
| US20160105289A1 (en) * | 2014-10-08 | 2016-04-14 | Google Inc. | Certificates for low-power or low-memory devices |
Also Published As
| Publication number | Publication date |
|---|---|
| SG11202105077UA (en) | 2021-06-29 |
| US20220006652A1 (en) | 2022-01-06 |
| JP2022507488A (ja) | 2022-01-18 |
| US12250325B2 (en) | 2025-03-11 |
| EP3881492A4 (en) | 2022-07-27 |
| JP7551080B2 (ja) | 2024-09-17 |
| WO2020101567A1 (en) | 2020-05-22 |
| AU2019379062A1 (en) | 2021-06-10 |
| EP3881492A1 (en) | 2021-09-22 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| AU2019379062B2 (en) | Method and architecture for securing and managing networks of embedded systems with optimised public key infrastructure | |
| US11265709B2 (en) | Efficient internet-of-things (IoT) data encryption/decryption | |
| US12261835B2 (en) | Authentication of networked devices having low computational capacity | |
| US20220141004A1 (en) | Efficient Internet-Of-Things (IoT) Data Encryption/Decryption | |
| Li et al. | iTLS: Lightweight transport-layer security protocol for IoT with minimal latency and perfect forward secrecy | |
| US10601594B2 (en) | End-to-end service layer authentication | |
| Rizzardi et al. | Analysis on functionalities and security features of Internet of Things related protocols | |
| US20170201382A1 (en) | Secure Endpoint Devices | |
| Khashan et al. | Innovative energy-efficient proxy re-encryption for secure data exchange in wireless sensor networks | |
| Yu et al. | Enabling end-to-end secure communication between wireless sensor networks and the Internet | |
| Gunnarsson et al. | Evaluating the performance of the OSCORE security protocol in constrained IoT environments | |
| WO2017167771A1 (en) | Handshake protocols for identity-based key material and certificates | |
| Schmitt et al. | TinyTO: Two-way authentication for constrained devices in the Internet of Things | |
| Yang et al. | Enhancing Cryptographic Security in Smart Consumer Electronics with a Hybrid Classical–Post-Quantum Framework | |
| Migwi et al. | Lightweight and scalable security for wireless IoT systems: challenges and research directions | |
| Noack | Optimization of two-way authentication protocol in internet of things | |
| Shafagh | Leveraging Public-key-based Authentication for the Internet of Things | |
| Fun et al. | Attribute based encryption—A data centric approach for securing internet of things (IoT) | |
| Weber | Designing a hybrid attribute-based encryption scheme supporting dynamic attributes | |
| Mahmoud | Optimal Selection of IPsec-Based Security Mechanisms in Resource Constrained IoT Environment | |
| Gauhar Fatima et al. | A security protocol for wireless sensor networks | |
| Dhanasekaran | Hierarchical Hash-based Mutual Trust Authentication Framework for Secure and Scalable Vehicular Cloud Communication in Dynamic Environments. | |
| Agyemang et al. | An Orchestration Framework for IoT Devices based on Public Key Infrastructure (PKI) | |
| Adibi | A multilayer non‐repudiation system: a Suite‐B approach | |
| Martynov | Secure Multicast with Source Authentication for the Internet of Things |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| FGA | Letters patent sealed or granted (standard patent) |