AU2019379062B2 - Method and architecture for securing and managing networks of embedded systems with optimised public key infrastructure - Google Patents

Method and architecture for securing and managing networks of embedded systems with optimised public key infrastructure Download PDF

Info

Publication number
AU2019379062B2
AU2019379062B2 AU2019379062A AU2019379062A AU2019379062B2 AU 2019379062 B2 AU2019379062 B2 AU 2019379062B2 AU 2019379062 A AU2019379062 A AU 2019379062A AU 2019379062 A AU2019379062 A AU 2019379062A AU 2019379062 B2 AU2019379062 B2 AU 2019379062B2
Authority
AU
Australia
Prior art keywords
micro
certificate
public key
response
key infrastructure
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
AU2019379062A
Other languages
English (en)
Other versions
AU2019379062A1 (en
Inventor
Magzhan IKRAM
Steven Paul KERRISON
Vishram MISHRA
Ahnaf Aff SIDDIQI
Shazina Binte ZAINI
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsec Pte Ltd
Original Assignee
Microsec Pte Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsec Pte Ltd filed Critical Microsec Pte Ltd
Publication of AU2019379062A1 publication Critical patent/AU2019379062A1/en
Application granted granted Critical
Publication of AU2019379062B2 publication Critical patent/AU2019379062B2/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/006Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving public key infrastructure [PKI] trust models
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
AU2019379062A 2018-11-16 2019-07-31 Method and architecture for securing and managing networks of embedded systems with optimised public key infrastructure Active AU2019379062B2 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
SG10201810250P 2018-11-16
SG10201810250P 2018-11-16
PCT/SG2019/050382 WO2020101567A1 (en) 2018-11-16 2019-07-31 Method and architecture for securing and managing networks of embedded systems with optimised public key infrastructure

Publications (2)

Publication Number Publication Date
AU2019379062A1 AU2019379062A1 (en) 2021-06-10
AU2019379062B2 true AU2019379062B2 (en) 2025-04-24

Family

ID=70733044

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2019379062A Active AU2019379062B2 (en) 2018-11-16 2019-07-31 Method and architecture for securing and managing networks of embedded systems with optimised public key infrastructure

Country Status (6)

Country Link
US (1) US12250325B2 (https=)
EP (1) EP3881492A4 (https=)
JP (1) JP7551080B2 (https=)
AU (1) AU2019379062B2 (https=)
SG (1) SG11202105077UA (https=)
WO (1) WO2020101567A1 (https=)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3989483A1 (en) * 2020-10-26 2022-04-27 Viakoo, Inc Systems and methods of remotely updating a multitude of ip connected devices
US12494900B2 (en) * 2022-02-01 2025-12-09 Juniper Networks, Inc. Public key infrastructure based session authentication
CN114710289B (zh) * 2022-06-02 2022-09-02 确信信息股份有限公司 物联网终端安全注册和接入方法及系统
US11811752B1 (en) * 2022-08-03 2023-11-07 1080 Network, Inc. Systems, methods, and computing platforms for executing credential-less network-based communication exchanges
US12132846B2 (en) 2023-03-24 2024-10-29 Symmera Inc. System and method for extended attributes in certificates for dynamic authorization
US11968302B1 (en) 2023-03-24 2024-04-23 Srinivas Kumar Method and system for pre-shared key (PSK) based secure communications with domain name system (DNS) authenticator
US12476793B2 (en) 2023-03-24 2025-11-18 Symmera Inc. System and method to securely distribute authenticated and trusted data streams to AI systems
US12015721B1 (en) 2023-03-24 2024-06-18 Srinivas Kumar System and method for dynamic retrieval of certificates with remote lifecycle management

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100202616A1 (en) * 2009-02-12 2010-08-12 General Motors Corporation Method of securing and authenticating data using micro-certificates
US20160105289A1 (en) * 2014-10-08 2016-04-14 Google Inc. Certificates for low-power or low-memory devices

Family Cites Families (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4405829A (en) 1977-12-14 1983-09-20 Massachusetts Institute Of Technology Cryptographic communications system and method
US5093860A (en) 1990-09-27 1992-03-03 Motorola, Inc. Key management system
US5231668A (en) 1991-07-26 1993-07-27 The United States Of America, As Represented By The Secretary Of Commerce Digital signature algorithm
US6252960B1 (en) 1998-08-04 2001-06-26 Hewlett-Packard Company Compression and decompression of elliptic curve data points
JP3696445B2 (ja) * 1999-08-25 2005-09-21 日本電信電話株式会社 公開鍵証明証の発行方法並びに利用者端末及び認証センタ装置並びにこれらのプログラムを記録した媒体
US7284121B2 (en) * 2002-11-20 2007-10-16 Microsoft Corporation System and method for transmitting reduced information from a certificate to perform encryption operations
JP4960894B2 (ja) * 2008-01-17 2012-06-27 日本電信電話株式会社 楕円曲線の点圧縮装置、楕円曲線の点展開装置、それらの方法及びプログラム
US8327146B2 (en) * 2008-03-31 2012-12-04 General Motors Llc Wireless communication using compact certificates
KR20090104421A (ko) 2008-03-31 2009-10-06 고려대학교 산학협력단 무선센서네트워크에서의 타원곡선암호 기반 키 설정 방법과이를 이용한 무선센서네트워크 시스템 및 기록매체
EP2334008A1 (en) 2009-12-10 2011-06-15 Tata Consultancy Services Limited A system and method for designing secure client-server communication protocols based on certificateless public key infrastructure
US9832026B2 (en) 2010-04-30 2017-11-28 T-Central, Inc. System and method from Internet of Things (IoT) security and management
KR101135841B1 (ko) 2010-11-25 2012-04-19 한국전력공사 원격검침 프로토콜을 활용한 보안시스템 및 그 방법
US20120302265A1 (en) * 2011-05-24 2012-11-29 General Motors Llc Vehicle telematics communication for providing vehicle telematics services
KR101357074B1 (ko) 2011-12-12 2014-02-05 고려대학교 산학협력단 공개키 기반의 키 공유 메커니즘을 이용한 보안 키 설정 방법
US10164966B2 (en) 2013-02-25 2018-12-25 Lockstep Technologies Pty Ltd Decoupling identity from devices in the internet of things
US9215075B1 (en) 2013-03-15 2015-12-15 Poltorak Technologies Llc System and method for secure relayed communications from an implantable medical device
US9706372B2 (en) * 2014-04-03 2017-07-11 General Motors Llc Secure SMS messaging
US20160156614A1 (en) 2014-11-28 2016-06-02 Hcl Technologies Limited Provisioning a device over an internet of things
US9838390B2 (en) * 2015-03-31 2017-12-05 Afero, Inc. System and method for automatic wireless network authentication
WO2017053048A1 (en) 2015-09-25 2017-03-30 Pcms Holdings, Inc. Domain based iot authorization and authentication
US10164963B2 (en) 2015-10-23 2018-12-25 Oracle International Corporation Enforcing server authentication based on a hardware token
US10523437B2 (en) 2016-01-27 2019-12-31 Lg Electronics Inc. System and method for authentication of things
EP3291504B1 (en) 2016-08-30 2020-03-11 Wacom Co., Ltd. Authentication and secure transmission of data between signature devices and host computers using transport layer security

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100202616A1 (en) * 2009-02-12 2010-08-12 General Motors Corporation Method of securing and authenticating data using micro-certificates
US20160105289A1 (en) * 2014-10-08 2016-04-14 Google Inc. Certificates for low-power or low-memory devices

Also Published As

Publication number Publication date
SG11202105077UA (en) 2021-06-29
US20220006652A1 (en) 2022-01-06
JP2022507488A (ja) 2022-01-18
US12250325B2 (en) 2025-03-11
EP3881492A4 (en) 2022-07-27
JP7551080B2 (ja) 2024-09-17
WO2020101567A1 (en) 2020-05-22
AU2019379062A1 (en) 2021-06-10
EP3881492A1 (en) 2021-09-22

Similar Documents

Publication Publication Date Title
AU2019379062B2 (en) Method and architecture for securing and managing networks of embedded systems with optimised public key infrastructure
US11265709B2 (en) Efficient internet-of-things (IoT) data encryption/decryption
US12261835B2 (en) Authentication of networked devices having low computational capacity
US20220141004A1 (en) Efficient Internet-Of-Things (IoT) Data Encryption/Decryption
Li et al. iTLS: Lightweight transport-layer security protocol for IoT with minimal latency and perfect forward secrecy
US10601594B2 (en) End-to-end service layer authentication
Rizzardi et al. Analysis on functionalities and security features of Internet of Things related protocols
US20170201382A1 (en) Secure Endpoint Devices
Khashan et al. Innovative energy-efficient proxy re-encryption for secure data exchange in wireless sensor networks
Yu et al. Enabling end-to-end secure communication between wireless sensor networks and the Internet
Gunnarsson et al. Evaluating the performance of the OSCORE security protocol in constrained IoT environments
WO2017167771A1 (en) Handshake protocols for identity-based key material and certificates
Schmitt et al. TinyTO: Two-way authentication for constrained devices in the Internet of Things
Yang et al. Enhancing Cryptographic Security in Smart Consumer Electronics with a Hybrid Classical–Post-Quantum Framework
Migwi et al. Lightweight and scalable security for wireless IoT systems: challenges and research directions
Noack Optimization of two-way authentication protocol in internet of things
Shafagh Leveraging Public-key-based Authentication for the Internet of Things
Fun et al. Attribute based encryption—A data centric approach for securing internet of things (IoT)
Weber Designing a hybrid attribute-based encryption scheme supporting dynamic attributes
Mahmoud Optimal Selection of IPsec-Based Security Mechanisms in Resource Constrained IoT Environment
Gauhar Fatima et al. A security protocol for wireless sensor networks
Dhanasekaran Hierarchical Hash-based Mutual Trust Authentication Framework for Secure and Scalable Vehicular Cloud Communication in Dynamic Environments.
Agyemang et al. An Orchestration Framework for IoT Devices based on Public Key Infrastructure (PKI)
Adibi A multilayer non‐repudiation system: a Suite‐B approach
Martynov Secure Multicast with Source Authentication for the Internet of Things

Legal Events

Date Code Title Description
FGA Letters patent sealed or granted (standard patent)