BR112014007665A2 - derivação chave baseada em parâmetros - Google Patents

derivação chave baseada em parâmetros

Info

Publication number
BR112014007665A2
BR112014007665A2 BR112014007665A BR112014007665A BR112014007665A2 BR 112014007665 A2 BR112014007665 A2 BR 112014007665A2 BR 112014007665 A BR112014007665 A BR 112014007665A BR 112014007665 A BR112014007665 A BR 112014007665A BR 112014007665 A2 BR112014007665 A2 BR 112014007665A2
Authority
BR
Brazil
Prior art keywords
keys
key
invocations
function
parameter
Prior art date
Application number
BR112014007665A
Other languages
English (en)
Other versions
BR112014007665B1 (pt
Inventor
Jeffery Behm Bradley
M Ilac Cristian
D Crahen Eric
Jason Brandwine Eric
B Roth Gregory
Ross O'neill Kevin
R Fitch Nathan
Original Assignee
Amazon Tech Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US13/248,953 external-priority patent/US9203613B2/en
Priority claimed from US13/248,973 external-priority patent/US9197409B2/en
Priority claimed from US13/248,962 external-priority patent/US9178701B2/en
Application filed by Amazon Tech Inc filed Critical Amazon Tech Inc
Priority to BR122015024906-6A priority Critical patent/BR122015024906B1/pt
Publication of BR112014007665A2 publication Critical patent/BR112014007665A2/pt
Publication of BR112014007665B1 publication Critical patent/BR112014007665B1/pt

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • G06F21/335User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0884Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Power Engineering (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Input From Keyboards Or The Like (AREA)
  • Information Transfer Between Computers (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

resumo “derivação chave baseada em parâmetros” sistemas e métodos para chaves que geram autenticação a partir de cre-denciais secretas compartilhadas entre partes de autenticação e autenticadores. a geração das chaves pode envolver utilizar informações especializadas que, como resultado de serem usadas para gerar as chaves, geram as chaves geradas utilizá-veis para um escopo menor de usos do que a credencial secreta. ainda, a geração de chave pode envolver várias invocações de uma função onde cada um pelo me-nos um subgrupo de invocações da função resulta em uma chave que tem um escopo menor de uso permissível do que uma chave produzida a partir de várias invocações anteriores da função. as chaves geradas podem ser usadas como chaves de assinatura para assinar as mensagens. uma ou mais ações podem ser tomadas dependendo de se uma mensagem e/ou o modo no qual a mensagem foi submetida cumpre com as restrições de uso da chave.
BR112014007665-0A 2011-09-29 2012-09-28 Método, meio de armazenamento e sistema de computação de derivação chave baseada em parâmetros BR112014007665B1 (pt)

Priority Applications (1)

Application Number Priority Date Filing Date Title
BR122015024906-6A BR122015024906B1 (pt) 2011-09-29 2012-09-28 Método implementado por computador e sistema para delegar acesso a um recurso de computação a partir de um delegante para um primeiro delegado e meio de armazenamento não transitório legível por computador

Applications Claiming Priority (7)

Application Number Priority Date Filing Date Title
US13/248,953 US9203613B2 (en) 2011-09-29 2011-09-29 Techniques for client constructed sessions
US13/248.953 2011-09-29
US13/248.962 2011-09-29
US13/248,973 US9197409B2 (en) 2011-09-29 2011-09-29 Key derivation techniques
US13/248,962 US9178701B2 (en) 2011-09-29 2011-09-29 Parameter based key derivation
US13/248.973 2011-09-29
PCT/US2012/058083 WO2013049689A1 (en) 2011-09-29 2012-09-28 Parameter based key derivation

Publications (2)

Publication Number Publication Date
BR112014007665A2 true BR112014007665A2 (pt) 2017-04-18
BR112014007665B1 BR112014007665B1 (pt) 2021-07-13

Family

ID=47996473

Family Applications (2)

Application Number Title Priority Date Filing Date
BR122015024906-6A BR122015024906B1 (pt) 2011-09-29 2012-09-28 Método implementado por computador e sistema para delegar acesso a um recurso de computação a partir de um delegante para um primeiro delegado e meio de armazenamento não transitório legível por computador
BR112014007665-0A BR112014007665B1 (pt) 2011-09-29 2012-09-28 Método, meio de armazenamento e sistema de computação de derivação chave baseada em parâmetros

Family Applications Before (1)

Application Number Title Priority Date Filing Date
BR122015024906-6A BR122015024906B1 (pt) 2011-09-29 2012-09-28 Método implementado por computador e sistema para delegar acesso a um recurso de computação a partir de um delegante para um primeiro delegado e meio de armazenamento não transitório legível por computador

Country Status (10)

Country Link
EP (3) EP2761487B1 (pt)
JP (3) JP6082015B2 (pt)
CN (2) CN107017984B (pt)
AU (3) AU2012315674B9 (pt)
BR (2) BR122015024906B1 (pt)
CA (1) CA2847713C (pt)
IN (1) IN2014DN03111A (pt)
RU (6) RU2582540C2 (pt)
SG (3) SG2014012264A (pt)
WO (1) WO2013049689A1 (pt)

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101837150B1 (ko) * 2016-06-30 2018-03-09 (주)넷비젼텔레콤 프록시 서비스 제공을 위한 프록시 인증시스템 및 인증방법
US20180019986A1 (en) * 2016-07-12 2018-01-18 Qualcomm Incorporated User privacy protected location-based authentication on mobile devices
DE102017201891A1 (de) * 2017-02-07 2018-08-09 Siemens Aktiengesellschaft Programmierbares Hardware-Sicherheitsmodul und Verfahren auf einem programmierbaren Hardware-Sicherheitsmodul
WO2019099014A1 (en) * 2017-11-16 2019-05-23 Intuit Inc. Cryptographic key generation for logically sharded data stores
US10586057B2 (en) 2017-11-16 2020-03-10 Intuit Inc. Processing data queries in a logically sharded data store
US10873450B2 (en) 2017-11-16 2020-12-22 Intuit Inc. Cryptographic key generation for logically sharded data stores
EP3599737A1 (en) * 2018-07-24 2020-01-29 Gemalto Sa Method to create a primary cryptographic key with owner-defined transformation rules
CN111768304A (zh) 2018-08-06 2020-10-13 阿里巴巴集团控股有限公司 区块链交易方法及装置、电子设备
WO2019072278A2 (en) 2018-11-27 2019-04-18 Alibaba Group Holding Limited SYSTEM AND METHOD FOR INFORMATION PROTECTION
BR112019007727A2 (pt) 2018-11-27 2019-11-12 Alibaba Group Holding Ltd sistema e método para proteção de informações
SG11201903419WA (en) 2018-11-27 2019-05-30 Alibaba Group Holding Ltd System and method for information protection
WO2019072277A2 (en) 2018-11-27 2019-04-18 Alibaba Group Holding Limited SYSTEM AND METHOD FOR INFORMATION PROTECTION
US10700850B2 (en) 2018-11-27 2020-06-30 Alibaba Group Holding Limited System and method for information protection
AU2018322507B2 (en) 2018-11-27 2020-10-08 Advanced New Technologies Co., Ltd. System and method for information protection
WO2020239179A1 (en) * 2019-05-28 2020-12-03 Kamstrup A/S Distributed access control
CN114531302A (zh) * 2021-12-28 2022-05-24 中国电信股份有限公司 数据加密方法、装置及存储介质

Family Cites Families (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5956404A (en) 1996-09-30 1999-09-21 Schneier; Bruce Digital signature with auditing bits
US5917911A (en) * 1997-01-23 1999-06-29 Motorola, Inc. Method and system for hierarchical key access and recovery
US6097817A (en) * 1997-12-10 2000-08-01 Omnipoint Corporation Encryption and decryption in communication system with wireless trunk
US6601172B1 (en) * 1997-12-31 2003-07-29 Philips Electronics North America Corp. Transmitting revisions with digital signatures
GB2342195A (en) * 1998-09-30 2000-04-05 Xerox Corp Secure token-based document server
US6711679B1 (en) * 1999-03-31 2004-03-23 International Business Machines Corporation Public key infrastructure delegation
US6643774B1 (en) * 1999-04-08 2003-11-04 International Business Machines Corporation Authentication method to enable servers using public key authentication to obtain user-delegated tickets
US20030041110A1 (en) * 2000-07-28 2003-02-27 Storymail, Inc. System, Method and Structure for generating and using a compressed digital certificate
US20020194483A1 (en) * 2001-02-25 2002-12-19 Storymail, Inc. System and method for authorization of access to a resource
US7308431B2 (en) * 2000-09-11 2007-12-11 Nokia Corporation System and method of secure authentication and billing for goods and services using a cellular telecommunication and an authorization infrastructure
JP4301482B2 (ja) * 2001-06-26 2009-07-22 インターナショナル・ビジネス・マシーンズ・コーポレーション サーバ、情報処理装置及びそのアクセス制御システム並びにその方法
JP2003058657A (ja) * 2001-08-09 2003-02-28 Matsushita Electric Ind Co Ltd ライセンス管理サーバ及びライセンス管理方法
US7113594B2 (en) * 2001-08-13 2006-09-26 The Board Of Trustees Of The Leland Stanford University Systems and methods for identity-based encryption and related cryptographic techniques
US7617542B2 (en) 2001-12-21 2009-11-10 Nokia Corporation Location-based content protection
EP2339777A3 (en) * 2002-01-30 2011-12-28 Tecsec, Incorporated Method of authenticating a user to use a system
NO318842B1 (no) * 2002-03-18 2005-05-09 Telenor Asa Autentisering og tilgangskontroll
US6971017B2 (en) * 2002-04-16 2005-11-29 Xerox Corporation Ad hoc secure access to documents and services
EP1570442A2 (en) 2002-11-27 2005-09-07 RSA Security Inc. Identity authentication system and method
EP1515507A1 (en) * 2003-09-09 2005-03-16 Axalto S.A. Authentication in data communication
JP2006120089A (ja) * 2004-10-25 2006-05-11 Ntt Docomo Inc データ管理システム及びデータ管理方法
JP4701733B2 (ja) * 2005-02-04 2011-06-15 パナソニック株式会社 管理サーバ、機器、およびライセンス管理システム
WO2006132597A1 (en) * 2005-06-07 2006-12-14 Matsushita Electric Industrial Co., Ltd. Systems, methods and computer program products for authorising ad-hoc access
JP4792944B2 (ja) * 2005-11-30 2011-10-12 日本電気株式会社 権限管理システム、トークン検証方法、トークン検証プログラム
JP4823704B2 (ja) * 2006-02-01 2011-11-24 Kddi株式会社 認証システムおよび同システムにおける認証情報委譲方法ならびにセキュリティデバイス
JP4766249B2 (ja) * 2006-03-01 2011-09-07 日本電気株式会社 トークン譲渡方法、トークン譲渡システム及び権限認証許可サーバ
US8312523B2 (en) * 2006-03-31 2012-11-13 Amazon Technologies, Inc. Enhanced security for electronic communications
US8112794B2 (en) * 2006-07-17 2012-02-07 Research In Motion Limited Management of multiple connections to a security token access device
JP2008172728A (ja) * 2007-01-15 2008-07-24 Megachips System Solutions Inc セキュリティシステム
AU2008211235B2 (en) * 2007-01-26 2012-01-19 Interdigital Technology Corporation Method and apparatus for securing location information and access control using the location information
JP4982215B2 (ja) * 2007-03-14 2012-07-25 株式会社トヨタIt開発センター 暗号通信システム、暗号通信方法、暗号通信プログラム、車載端末およびサーバ
US9106426B2 (en) * 2008-11-26 2015-08-11 Red Hat, Inc. Username based authentication and key generation
JP5446650B2 (ja) * 2009-09-17 2014-03-19 沖電気工業株式会社 通信データ新規性確認システム並びに送信端末及び受信端末

Also Published As

Publication number Publication date
RU2019137439A3 (pt) 2021-11-16
AU2020200584A1 (en) 2020-02-13
AU2020200584B2 (en) 2021-05-06
AU2018202251A1 (en) 2018-04-26
EP2761487A4 (en) 2015-06-24
CA2847713A1 (en) 2013-04-04
RU2636105C1 (ru) 2017-11-20
CN107017984B (zh) 2020-09-01
JP6082015B2 (ja) 2017-02-15
RU2709162C1 (ru) 2019-12-16
EP3493070A1 (en) 2019-06-05
CN103842984B (zh) 2017-05-17
JP6527179B2 (ja) 2019-06-05
EP2761487A1 (en) 2014-08-06
AU2018202251B2 (en) 2019-10-31
JP6895478B2 (ja) 2021-06-30
AU2012315674B2 (en) 2018-04-19
WO2013049689A1 (en) 2013-04-04
BR112014007665B1 (pt) 2021-07-13
AU2012315674B9 (en) 2018-08-30
SG2014012264A (en) 2014-08-28
JP2014531855A (ja) 2014-11-27
RU2670778C1 (ru) 2018-10-25
JP2019149833A (ja) 2019-09-05
SG10201608067QA (en) 2016-11-29
BR122015024906B1 (pt) 2021-10-19
JP2017069989A (ja) 2017-04-06
RU2670778C9 (ru) 2018-11-23
RU2582540C2 (ru) 2016-04-27
CN107017984A (zh) 2017-08-04
EP3742300A1 (en) 2020-11-25
AU2012315674A1 (en) 2014-03-20
RU2014117153A (ru) 2015-11-10
BR122015024906A2 (pt) 2019-08-27
RU2019137439A (ru) 2021-05-21
EP3493070B1 (en) 2020-07-29
IN2014DN03111A (pt) 2015-05-15
EP2761487B1 (en) 2018-11-07
CN103842984A (zh) 2014-06-04
CA2847713C (en) 2021-02-09
SG10201903265PA (en) 2019-05-30
RU2671052C1 (ru) 2018-10-29

Similar Documents

Publication Publication Date Title
BR112014007665A2 (pt) derivação chave baseada em parâmetros
BR112015028071A2 (pt) sistemas e métodos para comunicação segura
US9979552B2 (en) Systems, methods and apparatuses for the application-specific identification of devices
BR112014007061A2 (pt) sistema criptográfico, método de geração de uma chave secreta de usuário para utilização em um sistema criptográfico com base em atributo hierárquico, método de descriptografia de um ciphertext para utilização em um sistema criptográfico com base em atributo hierárquico, método de criptografia de uma mensagem para utilização em um sistema criptográfico com base em atributo hierárquico, e, programa de computador
PH12016501640A1 (en) Techniques to operate a service with machine generated authentication tokens
CL2018002369A1 (es) Intercambio basado en cadena de bloques con tokenización.
SG10201901366WA (en) Key exchange through partially trusted third party
BR112017003018A2 (pt) fornecimento seguro de uma credencial de autenticação
BR112019008371A2 (pt) método, aparelho e sistema de transmissão de dados
BR112017002747A2 (pt) método implementado por computador, e, sistema de computador.
BR112017009376A2 (pt) métodos e sistemas para interoperabilidade de autenticação
GB2534801A (en) A set of servers for "Machine-to-Machine" communications using public key infrastructure
BR112016028287A2 (pt) geração de assinatura digital semideterminística
BR112017017425A2 (pt) meio de armazenamento legível por computador não transitório configurado para armazenar instruções e processo implementado por computador
WO2014138430A3 (en) Secure simple enrollment
BR112015023522A2 (pt) classificação de resiliência operacional melhorada usando indicadores de inteligência
BR112015013770A2 (pt) método e aparelho para marcação de itens fabricados usando-se características físicas
WO2015023341A3 (en) Secure authorization systems and methods
BR112013001728A2 (pt) métodos para criptografar um valor introduzido em um dispositivo de usuário, para verificar um valor comunicado a um sistema de autenticação via uma rede de comunicações, e para comunicar um valor introduzido em um dispositivo de usuário a um sistema de autenticação via uma rede de comunicações, dispositivo de usuário, sistema, software, e, meio legível por computador.
MX355275B (es) Acceso habilitado a datos.
JP2015500585A5 (pt)
AR086343A1 (es) Metodo para realizar una firma digital de grupo
FI20120110A (fi) Tietoturvallinen etäyhteydellä suoritettava toimintaoikeuden myöntömenettely
GB2593293A (en) Key generation for use in secured communication
GB2498063B (en) System for checking acceptance of string by automaton

Legal Events

Date Code Title Description
B06F Objections, documents and/or translations needed after an examination request according [chapter 6.6 patent gazette]
B06U Preliminary requirement: requests with searches performed by other patent offices: procedure suspended [chapter 6.21 patent gazette]
B09A Decision: intention to grant [chapter 9.1 patent gazette]
B16A Patent or certificate of addition of invention granted [chapter 16.1 patent gazette]

Free format text: PRAZO DE VALIDADE: 20 (VINTE) ANOS CONTADOS A PARTIR DE 28/09/2012, OBSERVADAS AS CONDICOES LEGAIS.