CA2558353C - Key-based encryption - Google Patents
Key-based encryption Download PDFInfo
- Publication number
- CA2558353C CA2558353C CA2558353A CA2558353A CA2558353C CA 2558353 C CA2558353 C CA 2558353C CA 2558353 A CA2558353 A CA 2558353A CA 2558353 A CA2558353 A CA 2558353A CA 2558353 C CA2558353 C CA 2558353C
- Authority
- CA
- Canada
- Prior art keywords
- communications link
- idle
- data
- secret key
- predetermined period
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
- 238000004891 communication Methods 0.000 claims abstract description 116
- 230000006854 communication Effects 0.000 claims abstract description 116
- 238000000034 method Methods 0.000 claims abstract description 19
- 230000004044 response Effects 0.000 claims description 8
- 230000005540 biological transmission Effects 0.000 claims description 6
- 238000012544 monitoring process Methods 0.000 claims 3
- 238000004590 computer program Methods 0.000 abstract 2
- 230000000977 initiatory effect Effects 0.000 description 6
- 230000002035 prolonged effect Effects 0.000 description 3
- 230000001010 compromised effect Effects 0.000 description 2
- 238000012790 confirmation Methods 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 239000003999 initiator Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/166—Implementing security features at a particular protocol layer at the transport layer
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Storage Device Security (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Lock And Its Accessories (AREA)
- Reverberation, Karaoke And Other Acoustics (AREA)
- Computer And Data Communications (AREA)
- Mobile Radio Communication Systems (AREA)
- Small-Scale Networks (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB0405245.2 | 2004-03-09 | ||
| GBGB0405245.2A GB0405245D0 (en) | 2004-03-09 | 2004-03-09 | Key-based encryption |
| PCT/EP2005/050895 WO2005086452A1 (en) | 2004-03-09 | 2005-03-01 | Key-based encryption |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CA2558353A1 CA2558353A1 (en) | 2005-09-15 |
| CA2558353C true CA2558353C (en) | 2011-08-02 |
Family
ID=32117297
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CA2558353A Expired - Lifetime CA2558353C (en) | 2004-03-09 | 2005-03-01 | Key-based encryption |
Country Status (11)
| Country | Link |
|---|---|
| US (1) | US7649998B2 (enExample) |
| EP (1) | EP1726144B1 (enExample) |
| JP (1) | JP4591897B2 (enExample) |
| KR (1) | KR101013268B1 (enExample) |
| CN (1) | CN100571269C (enExample) |
| AT (1) | ATE437517T1 (enExample) |
| CA (1) | CA2558353C (enExample) |
| DE (1) | DE602005015560D1 (enExample) |
| GB (1) | GB0405245D0 (enExample) |
| IL (1) | IL177796A (enExample) |
| WO (1) | WO2005086452A1 (enExample) |
Families Citing this family (28)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP4699099B2 (ja) * | 2005-06-14 | 2011-06-08 | 富士通株式会社 | 通信制御装置および通信制御方法 |
| JP4674144B2 (ja) * | 2005-09-30 | 2011-04-20 | 株式会社日立製作所 | 暗号通信装置および暗号通信方法 |
| EP2021960B1 (en) | 2006-05-25 | 2015-12-23 | Celltrust Corporation | Secure mobile information management system and method |
| US9848081B2 (en) | 2006-05-25 | 2017-12-19 | Celltrust Corporation | Dissemination of real estate information through text messaging |
| US8260274B2 (en) | 2006-05-25 | 2012-09-04 | Celltrust Corporation | Extraction of information from e-mails and delivery to mobile phones, system and method |
| US8280359B2 (en) | 2006-05-25 | 2012-10-02 | Celltrust Corporation | Methods of authorizing actions |
| US9572033B2 (en) | 2006-05-25 | 2017-02-14 | Celltrust Corporation | Systems and methods for encrypted mobile voice communications |
| US8225380B2 (en) | 2006-05-25 | 2012-07-17 | Celltrust Corporation | Methods to authenticate access and alarm as to proximity to location |
| US8965416B2 (en) | 2006-05-25 | 2015-02-24 | Celltrust Corporation | Distribution of lottery tickets through mobile devices |
| US20070297609A1 (en) * | 2006-06-23 | 2007-12-27 | Research In Motion Limited | Secure Wireless HeartBeat |
| US20080214111A1 (en) * | 2007-03-02 | 2008-09-04 | Celltrust Corporation | Lost phone alarm system and method |
| CN101647026B (zh) * | 2007-03-30 | 2014-01-08 | 日本电气株式会社 | 用户认证控制设备、用户认证设备、数据处理设备及用户认证控制方法等 |
| US8131994B2 (en) | 2007-06-01 | 2012-03-06 | Cisco Technology, Inc. | Dual cryptographic keying |
| CA2719794C (en) * | 2008-03-28 | 2020-10-27 | Celltrust Corporation | Systems and methods for secure short messaging service and multimedia messaging service |
| US8331568B2 (en) * | 2009-05-28 | 2012-12-11 | Microsoft Corporation | Efficient distribution of computation in key agreement |
| JP4886833B2 (ja) * | 2009-10-27 | 2012-02-29 | シャープ株式会社 | 複合機制御システム |
| US8190879B2 (en) * | 2009-12-17 | 2012-05-29 | Cisco Technology, Inc. | Graceful conversion of a security to a non-security transparent proxy |
| US9088609B2 (en) * | 2009-12-24 | 2015-07-21 | International Business Machines Corporation | Logical partition media access control impostor detector |
| US10015286B1 (en) | 2010-06-23 | 2018-07-03 | F5 Networks, Inc. | System and method for proxying HTTP single sign on across network domains |
| US9537899B2 (en) * | 2012-02-29 | 2017-01-03 | Microsoft Technology Licensing, Llc | Dynamic selection of security protocol |
| US9106405B1 (en) * | 2012-06-25 | 2015-08-11 | Amazon Technologies, Inc. | Multi-user secret decay |
| US10789594B2 (en) | 2013-01-31 | 2020-09-29 | Moshir Vantures, Limited, LLC | Method and system to intelligently assess and mitigate security risks on a mobile device |
| US9584492B2 (en) * | 2014-06-23 | 2017-02-28 | Vmware, Inc. | Cryptographic proxy service |
| WO2016067473A1 (ja) * | 2014-10-31 | 2016-05-06 | 富士通株式会社 | セキュリティシステム及びコンピュータ機器間の通信方法 |
| US9942203B2 (en) | 2015-03-30 | 2018-04-10 | International Business Machines Corporation | Enhanced security when sending asynchronous messages |
| US10419211B1 (en) * | 2015-11-30 | 2019-09-17 | Cisco Technology, Inc. | Hash-based key distribution |
| US11086704B2 (en) * | 2017-04-28 | 2021-08-10 | Honeywell International Inc. | Inferred detection of data replication errors of source applications by enterprise applications |
| EP3871364A4 (en) * | 2018-10-23 | 2022-06-08 | Nokia Technologies OY | PHYSICAL ATTACK TESTING METHOD AND DEVICE |
Family Cites Families (20)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPS5856552A (ja) * | 1981-09-30 | 1983-04-04 | Fujitsu Ltd | 通信路での盗聴検出方式 |
| JPH02164154A (ja) * | 1988-12-19 | 1990-06-25 | Oki Electric Ind Co Ltd | 鍵送信方式 |
| GB2241851A (en) * | 1990-03-09 | 1991-09-11 | Philips Electronic Associated | Optimising transmitter power in a communications system |
| JPH053478A (ja) * | 1991-06-25 | 1993-01-08 | Nissan Motor Co Ltd | 多重通信制御装置 |
| JP3050665B2 (ja) * | 1991-10-15 | 2000-06-12 | 古河電気工業株式会社 | 多重伝送方式 |
| JP2786092B2 (ja) * | 1993-10-18 | 1998-08-13 | 日本電気株式会社 | 移動通信端末認証方式 |
| JPH09269727A (ja) * | 1996-03-29 | 1997-10-14 | Toshiba Corp | 暗号化方法および暗号化装置 |
| JPH11313077A (ja) * | 1998-04-30 | 1999-11-09 | Hitachi Ltd | 通信用lsi及びatm装置 |
| US6360269B1 (en) * | 1998-11-02 | 2002-03-19 | Nortel Networks Limited | Protected keepalive message through the internet |
| US6928551B1 (en) * | 1999-10-29 | 2005-08-09 | Lockheed Martin Corporation | Method and apparatus for selectively denying access to encoded data |
| US6795555B1 (en) * | 1999-12-30 | 2004-09-21 | Nortel Networks Limited | Encryption key exchange protocol |
| US6976071B1 (en) * | 2000-05-03 | 2005-12-13 | Nortel Networks Limited | Detecting if a secure link is alive |
| US7127742B2 (en) * | 2001-01-24 | 2006-10-24 | Microsoft Corporation | Establishing a secure connection with a private corporate network over a public network |
| WO2003036857A1 (en) * | 2001-10-24 | 2003-05-01 | Nokia Corporation | Ciphering as a part of the multicast cencept |
| JP2003348070A (ja) * | 2002-05-29 | 2003-12-05 | Hitachi Ltd | 機密化通信方法およびそれに用いるノード装置 |
| US7370194B2 (en) * | 2002-06-10 | 2008-05-06 | Microsoft Corporation | Security gateway for online console-based gaming |
| US20040078601A1 (en) * | 2002-08-02 | 2004-04-22 | Chris Tengwall | System and method for operating a wireless device network |
| US6956846B2 (en) * | 2002-08-16 | 2005-10-18 | Utstarcom Incorporated | System and method for foreign agent control node redundancy in a mobile internet protocol network |
| US7181016B2 (en) * | 2003-01-27 | 2007-02-20 | Microsoft Corporation | Deriving a symmetric key from an asymmetric key for file encryption or decryption |
| US20050025315A1 (en) * | 2003-07-31 | 2005-02-03 | Kreitzer Stuart S. | Method and apparatus for secure communications among portable communication devices |
-
2004
- 2004-03-09 GB GBGB0405245.2A patent/GB0405245D0/en not_active Ceased
-
2005
- 2005-03-01 CN CNB2005800036360A patent/CN100571269C/zh not_active Expired - Fee Related
- 2005-03-01 CA CA2558353A patent/CA2558353C/en not_active Expired - Lifetime
- 2005-03-01 DE DE602005015560T patent/DE602005015560D1/de not_active Expired - Lifetime
- 2005-03-01 JP JP2007502329A patent/JP4591897B2/ja not_active Expired - Fee Related
- 2005-03-01 US US10/598,509 patent/US7649998B2/en not_active Expired - Fee Related
- 2005-03-01 AT AT05729606T patent/ATE437517T1/de not_active IP Right Cessation
- 2005-03-01 KR KR1020067016526A patent/KR101013268B1/ko not_active Expired - Fee Related
- 2005-03-01 EP EP05729606A patent/EP1726144B1/en not_active Expired - Lifetime
- 2005-03-01 WO PCT/EP2005/050895 patent/WO2005086452A1/en not_active Ceased
-
2006
- 2006-08-31 IL IL177796A patent/IL177796A/en not_active IP Right Cessation
Also Published As
| Publication number | Publication date |
|---|---|
| CA2558353A1 (en) | 2005-09-15 |
| KR20070003862A (ko) | 2007-01-05 |
| ATE437517T1 (de) | 2009-08-15 |
| JP4591897B2 (ja) | 2010-12-01 |
| EP1726144B1 (en) | 2009-07-22 |
| KR101013268B1 (ko) | 2011-02-09 |
| CN100571269C (zh) | 2009-12-16 |
| US20070263874A1 (en) | 2007-11-15 |
| WO2005086452A1 (en) | 2005-09-15 |
| IL177796A0 (en) | 2006-12-31 |
| IL177796A (en) | 2010-12-30 |
| GB0405245D0 (en) | 2004-04-21 |
| JP2007528172A (ja) | 2007-10-04 |
| DE602005015560D1 (de) | 2009-09-03 |
| EP1726144A1 (en) | 2006-11-29 |
| CN1914882A (zh) | 2007-02-14 |
| US7649998B2 (en) | 2010-01-19 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CA2558353C (en) | Key-based encryption | |
| US7584505B2 (en) | Inspected secure communication protocol | |
| US7093127B2 (en) | System and method for computer storage security | |
| JP4746333B2 (ja) | コンピューティングシステムの効率的かつセキュアな認証 | |
| US7735120B2 (en) | Server computer issued credential authentication | |
| CN1685687B (zh) | 确定目标节点对于源节点的邻近性的方法 | |
| EP2056546A1 (en) | Proxy Authentication Server | |
| KR20210045676A (ko) | 차량용 통신 시스템 및 그를 위한 보안 통신 방법 | |
| JP2009239919A (ja) | トランスコーディング・プロキシでの複数の起点サーバへの動的接続 | |
| WO2013128470A1 (en) | Authentication and secured information exchange system, and method therefor | |
| WO2006032214A1 (en) | Method for realizng transmission of syncml synchronous data | |
| CN101809964A (zh) | 信息交换安全化方法、设备、及相应的计算机程序产品 | |
| EP1746802A2 (en) | User authentication in connection with a security protocol | |
| CN105359480A (zh) | 针对受约束资源设备的密钥建立 | |
| CN116848822A (zh) | 用于提供针对通信的安全水平的方法和设备 | |
| CN102668450B (zh) | 基于身份的网络策略实现方法 | |
| CN110855561A (zh) | 一种物联网智能网关 | |
| CN118174921A (zh) | 基于国密算法并支持双向鉴权的多因素ssh登录认证方法 | |
| JP5334104B2 (ja) | 全交換セッションセキュリティ | |
| CN114386054A (zh) | 用于消息存储处理和安全认证的控制方法、系统和介质 | |
| CN103986716A (zh) | Ssl连接的建立方法以及基于ssl连接的通信方法及装置 | |
| JP2004274134A (ja) | 通信方法並びにこの通信方法を用いた通信システム、サーバおよびクライアント | |
| JP2002328905A (ja) | クライアント認証方法及び認証装置並びにプログラム及び記録媒体 | |
| CN119583227B (zh) | 一种Shell命令加密远程传递方法及系统 | |
| lei Zhang | Three attacks in SSL protocol and their solutions |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| EEER | Examination request |