BR112014007665A2 - derivação chave baseada em parâmetros - Google Patents
derivação chave baseada em parâmetrosInfo
- Publication number
- BR112014007665A2 BR112014007665A2 BR112014007665A BR112014007665A BR112014007665A2 BR 112014007665 A2 BR112014007665 A2 BR 112014007665A2 BR 112014007665 A BR112014007665 A BR 112014007665A BR 112014007665 A BR112014007665 A BR 112014007665A BR 112014007665 A2 BR112014007665 A2 BR 112014007665A2
- Authority
- BR
- Brazil
- Prior art keywords
- keys
- key
- invocations
- function
- parameter
- Prior art date
Links
- 238000009795 derivation Methods 0.000 title abstract 2
- 238000000034 method Methods 0.000 abstract 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
- G06F21/335—User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0884—Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/108—Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Power Engineering (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Input From Keyboards Or The Like (AREA)
- Information Transfer Between Computers (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
resumo derivação chave baseada em parâmetros sistemas e métodos para chaves que geram autenticação a partir de cre-denciais secretas compartilhadas entre partes de autenticação e autenticadores. a geração das chaves pode envolver utilizar informações especializadas que, como resultado de serem usadas para gerar as chaves, geram as chaves geradas utilizá-veis para um escopo menor de usos do que a credencial secreta. ainda, a geração de chave pode envolver várias invocações de uma função onde cada um pelo me-nos um subgrupo de invocações da função resulta em uma chave que tem um escopo menor de uso permissível do que uma chave produzida a partir de várias invocações anteriores da função. as chaves geradas podem ser usadas como chaves de assinatura para assinar as mensagens. uma ou mais ações podem ser tomadas dependendo de se uma mensagem e/ou o modo no qual a mensagem foi submetida cumpre com as restrições de uso da chave.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
BR122015024906-6A BR122015024906B1 (pt) | 2011-09-29 | 2012-09-28 | Método implementado por computador e sistema para delegar acesso a um recurso de computação a partir de um delegante para um primeiro delegado e meio de armazenamento não transitório legível por computador |
Applications Claiming Priority (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/248,953 US9203613B2 (en) | 2011-09-29 | 2011-09-29 | Techniques for client constructed sessions |
US13/248.953 | 2011-09-29 | ||
US13/248.962 | 2011-09-29 | ||
US13/248,973 US9197409B2 (en) | 2011-09-29 | 2011-09-29 | Key derivation techniques |
US13/248,962 US9178701B2 (en) | 2011-09-29 | 2011-09-29 | Parameter based key derivation |
US13/248.973 | 2011-09-29 | ||
PCT/US2012/058083 WO2013049689A1 (en) | 2011-09-29 | 2012-09-28 | Parameter based key derivation |
Publications (2)
Publication Number | Publication Date |
---|---|
BR112014007665A2 true BR112014007665A2 (pt) | 2017-04-18 |
BR112014007665B1 BR112014007665B1 (pt) | 2021-07-13 |
Family
ID=47996473
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
BR122015024906-6A BR122015024906B1 (pt) | 2011-09-29 | 2012-09-28 | Método implementado por computador e sistema para delegar acesso a um recurso de computação a partir de um delegante para um primeiro delegado e meio de armazenamento não transitório legível por computador |
BR112014007665-0A BR112014007665B1 (pt) | 2011-09-29 | 2012-09-28 | Método, meio de armazenamento e sistema de computação de derivação chave baseada em parâmetros |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
BR122015024906-6A BR122015024906B1 (pt) | 2011-09-29 | 2012-09-28 | Método implementado por computador e sistema para delegar acesso a um recurso de computação a partir de um delegante para um primeiro delegado e meio de armazenamento não transitório legível por computador |
Country Status (10)
Country | Link |
---|---|
EP (3) | EP2761487B1 (pt) |
JP (3) | JP6082015B2 (pt) |
CN (2) | CN107017984B (pt) |
AU (3) | AU2012315674B9 (pt) |
BR (2) | BR122015024906B1 (pt) |
CA (1) | CA2847713C (pt) |
IN (1) | IN2014DN03111A (pt) |
RU (6) | RU2582540C2 (pt) |
SG (3) | SG2014012264A (pt) |
WO (1) | WO2013049689A1 (pt) |
Families Citing this family (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101837150B1 (ko) * | 2016-06-30 | 2018-03-09 | (주)넷비젼텔레콤 | 프록시 서비스 제공을 위한 프록시 인증시스템 및 인증방법 |
US20180019986A1 (en) * | 2016-07-12 | 2018-01-18 | Qualcomm Incorporated | User privacy protected location-based authentication on mobile devices |
DE102017201891A1 (de) * | 2017-02-07 | 2018-08-09 | Siemens Aktiengesellschaft | Programmierbares Hardware-Sicherheitsmodul und Verfahren auf einem programmierbaren Hardware-Sicherheitsmodul |
WO2019099014A1 (en) * | 2017-11-16 | 2019-05-23 | Intuit Inc. | Cryptographic key generation for logically sharded data stores |
US10586057B2 (en) | 2017-11-16 | 2020-03-10 | Intuit Inc. | Processing data queries in a logically sharded data store |
US10873450B2 (en) | 2017-11-16 | 2020-12-22 | Intuit Inc. | Cryptographic key generation for logically sharded data stores |
EP3599737A1 (en) * | 2018-07-24 | 2020-01-29 | Gemalto Sa | Method to create a primary cryptographic key with owner-defined transformation rules |
CN111768304A (zh) | 2018-08-06 | 2020-10-13 | 阿里巴巴集团控股有限公司 | 区块链交易方法及装置、电子设备 |
WO2019072278A2 (en) | 2018-11-27 | 2019-04-18 | Alibaba Group Holding Limited | SYSTEM AND METHOD FOR INFORMATION PROTECTION |
BR112019007727A2 (pt) | 2018-11-27 | 2019-11-12 | Alibaba Group Holding Ltd | sistema e método para proteção de informações |
SG11201903419WA (en) | 2018-11-27 | 2019-05-30 | Alibaba Group Holding Ltd | System and method for information protection |
WO2019072277A2 (en) | 2018-11-27 | 2019-04-18 | Alibaba Group Holding Limited | SYSTEM AND METHOD FOR INFORMATION PROTECTION |
US10700850B2 (en) | 2018-11-27 | 2020-06-30 | Alibaba Group Holding Limited | System and method for information protection |
AU2018322507B2 (en) | 2018-11-27 | 2020-10-08 | Advanced New Technologies Co., Ltd. | System and method for information protection |
WO2020239179A1 (en) * | 2019-05-28 | 2020-12-03 | Kamstrup A/S | Distributed access control |
CN114531302A (zh) * | 2021-12-28 | 2022-05-24 | 中国电信股份有限公司 | 数据加密方法、装置及存储介质 |
Family Cites Families (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5956404A (en) | 1996-09-30 | 1999-09-21 | Schneier; Bruce | Digital signature with auditing bits |
US5917911A (en) * | 1997-01-23 | 1999-06-29 | Motorola, Inc. | Method and system for hierarchical key access and recovery |
US6097817A (en) * | 1997-12-10 | 2000-08-01 | Omnipoint Corporation | Encryption and decryption in communication system with wireless trunk |
US6601172B1 (en) * | 1997-12-31 | 2003-07-29 | Philips Electronics North America Corp. | Transmitting revisions with digital signatures |
GB2342195A (en) * | 1998-09-30 | 2000-04-05 | Xerox Corp | Secure token-based document server |
US6711679B1 (en) * | 1999-03-31 | 2004-03-23 | International Business Machines Corporation | Public key infrastructure delegation |
US6643774B1 (en) * | 1999-04-08 | 2003-11-04 | International Business Machines Corporation | Authentication method to enable servers using public key authentication to obtain user-delegated tickets |
US20030041110A1 (en) * | 2000-07-28 | 2003-02-27 | Storymail, Inc. | System, Method and Structure for generating and using a compressed digital certificate |
US20020194483A1 (en) * | 2001-02-25 | 2002-12-19 | Storymail, Inc. | System and method for authorization of access to a resource |
US7308431B2 (en) * | 2000-09-11 | 2007-12-11 | Nokia Corporation | System and method of secure authentication and billing for goods and services using a cellular telecommunication and an authorization infrastructure |
JP4301482B2 (ja) * | 2001-06-26 | 2009-07-22 | インターナショナル・ビジネス・マシーンズ・コーポレーション | サーバ、情報処理装置及びそのアクセス制御システム並びにその方法 |
JP2003058657A (ja) * | 2001-08-09 | 2003-02-28 | Matsushita Electric Ind Co Ltd | ライセンス管理サーバ及びライセンス管理方法 |
US7113594B2 (en) * | 2001-08-13 | 2006-09-26 | The Board Of Trustees Of The Leland Stanford University | Systems and methods for identity-based encryption and related cryptographic techniques |
US7617542B2 (en) | 2001-12-21 | 2009-11-10 | Nokia Corporation | Location-based content protection |
EP2339777A3 (en) * | 2002-01-30 | 2011-12-28 | Tecsec, Incorporated | Method of authenticating a user to use a system |
NO318842B1 (no) * | 2002-03-18 | 2005-05-09 | Telenor Asa | Autentisering og tilgangskontroll |
US6971017B2 (en) * | 2002-04-16 | 2005-11-29 | Xerox Corporation | Ad hoc secure access to documents and services |
EP1570442A2 (en) | 2002-11-27 | 2005-09-07 | RSA Security Inc. | Identity authentication system and method |
EP1515507A1 (en) * | 2003-09-09 | 2005-03-16 | Axalto S.A. | Authentication in data communication |
JP2006120089A (ja) * | 2004-10-25 | 2006-05-11 | Ntt Docomo Inc | データ管理システム及びデータ管理方法 |
JP4701733B2 (ja) * | 2005-02-04 | 2011-06-15 | パナソニック株式会社 | 管理サーバ、機器、およびライセンス管理システム |
WO2006132597A1 (en) * | 2005-06-07 | 2006-12-14 | Matsushita Electric Industrial Co., Ltd. | Systems, methods and computer program products for authorising ad-hoc access |
JP4792944B2 (ja) * | 2005-11-30 | 2011-10-12 | 日本電気株式会社 | 権限管理システム、トークン検証方法、トークン検証プログラム |
JP4823704B2 (ja) * | 2006-02-01 | 2011-11-24 | Kddi株式会社 | 認証システムおよび同システムにおける認証情報委譲方法ならびにセキュリティデバイス |
JP4766249B2 (ja) * | 2006-03-01 | 2011-09-07 | 日本電気株式会社 | トークン譲渡方法、トークン譲渡システム及び権限認証許可サーバ |
US8312523B2 (en) * | 2006-03-31 | 2012-11-13 | Amazon Technologies, Inc. | Enhanced security for electronic communications |
US8112794B2 (en) * | 2006-07-17 | 2012-02-07 | Research In Motion Limited | Management of multiple connections to a security token access device |
JP2008172728A (ja) * | 2007-01-15 | 2008-07-24 | Megachips System Solutions Inc | セキュリティシステム |
AU2008211235B2 (en) * | 2007-01-26 | 2012-01-19 | Interdigital Technology Corporation | Method and apparatus for securing location information and access control using the location information |
JP4982215B2 (ja) * | 2007-03-14 | 2012-07-25 | 株式会社トヨタIt開発センター | 暗号通信システム、暗号通信方法、暗号通信プログラム、車載端末およびサーバ |
US9106426B2 (en) * | 2008-11-26 | 2015-08-11 | Red Hat, Inc. | Username based authentication and key generation |
JP5446650B2 (ja) * | 2009-09-17 | 2014-03-19 | 沖電気工業株式会社 | 通信データ新規性確認システム並びに送信端末及び受信端末 |
-
2012
- 2012-09-28 SG SG2014012264A patent/SG2014012264A/en unknown
- 2012-09-28 EP EP12835045.1A patent/EP2761487B1/en active Active
- 2012-09-28 SG SG10201903265PA patent/SG10201903265PA/en unknown
- 2012-09-28 EP EP18200502.5A patent/EP3493070B1/en active Active
- 2012-09-28 RU RU2014117153/08A patent/RU2582540C2/ru active
- 2012-09-28 SG SG10201608067QA patent/SG10201608067QA/en unknown
- 2012-09-28 CA CA2847713A patent/CA2847713C/en active Active
- 2012-09-28 BR BR122015024906-6A patent/BR122015024906B1/pt active IP Right Grant
- 2012-09-28 AU AU2012315674A patent/AU2012315674B9/en active Active
- 2012-09-28 CN CN201710265201.8A patent/CN107017984B/zh active Active
- 2012-09-28 CN CN201280047625.2A patent/CN103842984B/zh active Active
- 2012-09-28 RU RU2016110793A patent/RU2636105C1/ru active
- 2012-09-28 IN IN3111DEN2014 patent/IN2014DN03111A/en unknown
- 2012-09-28 EP EP20186781.9A patent/EP3742300A1/en active Pending
- 2012-09-28 WO PCT/US2012/058083 patent/WO2013049689A1/en active Application Filing
- 2012-09-28 BR BR112014007665-0A patent/BR112014007665B1/pt active IP Right Grant
- 2012-09-28 JP JP2014533431A patent/JP6082015B2/ja active Active
-
2017
- 2017-01-19 JP JP2017007876A patent/JP6527179B2/ja active Active
- 2017-10-09 RU RU2017135822A patent/RU2670778C9/ru active
- 2017-10-09 RU RU2017135821A patent/RU2671052C1/ru active
-
2018
- 2018-03-29 AU AU2018202251A patent/AU2018202251B2/en active Active
- 2018-10-22 RU RU2018137062A patent/RU2709162C1/ru active
-
2019
- 2019-05-09 JP JP2019089153A patent/JP6895478B2/ja active Active
- 2019-11-21 RU RU2019137439A patent/RU2019137439A/ru unknown
-
2020
- 2020-01-28 AU AU2020200584A patent/AU2020200584B2/en active Active
Also Published As
Similar Documents
Publication | Publication Date | Title |
---|---|---|
BR112014007665A2 (pt) | derivação chave baseada em parâmetros | |
BR112015028071A2 (pt) | sistemas e métodos para comunicação segura | |
US9979552B2 (en) | Systems, methods and apparatuses for the application-specific identification of devices | |
BR112014007061A2 (pt) | sistema criptográfico, método de geração de uma chave secreta de usuário para utilização em um sistema criptográfico com base em atributo hierárquico, método de descriptografia de um ciphertext para utilização em um sistema criptográfico com base em atributo hierárquico, método de criptografia de uma mensagem para utilização em um sistema criptográfico com base em atributo hierárquico, e, programa de computador | |
PH12016501640A1 (en) | Techniques to operate a service with machine generated authentication tokens | |
CL2018002369A1 (es) | Intercambio basado en cadena de bloques con tokenización. | |
SG10201901366WA (en) | Key exchange through partially trusted third party | |
BR112017003018A2 (pt) | fornecimento seguro de uma credencial de autenticação | |
BR112019008371A2 (pt) | método, aparelho e sistema de transmissão de dados | |
BR112017002747A2 (pt) | método implementado por computador, e, sistema de computador. | |
BR112017009376A2 (pt) | métodos e sistemas para interoperabilidade de autenticação | |
GB2534801A (en) | A set of servers for "Machine-to-Machine" communications using public key infrastructure | |
BR112016028287A2 (pt) | geração de assinatura digital semideterminística | |
BR112017017425A2 (pt) | meio de armazenamento legível por computador não transitório configurado para armazenar instruções e processo implementado por computador | |
WO2014138430A3 (en) | Secure simple enrollment | |
BR112015023522A2 (pt) | classificação de resiliência operacional melhorada usando indicadores de inteligência | |
BR112015013770A2 (pt) | método e aparelho para marcação de itens fabricados usando-se características físicas | |
WO2015023341A3 (en) | Secure authorization systems and methods | |
BR112013001728A2 (pt) | métodos para criptografar um valor introduzido em um dispositivo de usuário, para verificar um valor comunicado a um sistema de autenticação via uma rede de comunicações, e para comunicar um valor introduzido em um dispositivo de usuário a um sistema de autenticação via uma rede de comunicações, dispositivo de usuário, sistema, software, e, meio legível por computador. | |
MX355275B (es) | Acceso habilitado a datos. | |
JP2015500585A5 (pt) | ||
AR086343A1 (es) | Metodo para realizar una firma digital de grupo | |
FI20120110A (fi) | Tietoturvallinen etäyhteydellä suoritettava toimintaoikeuden myöntömenettely | |
GB2593293A (en) | Key generation for use in secured communication | |
GB2498063B (en) | System for checking acceptance of string by automaton |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
B06F | Objections, documents and/or translations needed after an examination request according [chapter 6.6 patent gazette] | ||
B06U | Preliminary requirement: requests with searches performed by other patent offices: procedure suspended [chapter 6.21 patent gazette] | ||
B09A | Decision: intention to grant [chapter 9.1 patent gazette] | ||
B16A | Patent or certificate of addition of invention granted [chapter 16.1 patent gazette] |
Free format text: PRAZO DE VALIDADE: 20 (VINTE) ANOS CONTADOS A PARTIR DE 28/09/2012, OBSERVADAS AS CONDICOES LEGAIS. |