CA2558353C - Key-based encryption - Google Patents

Key-based encryption Download PDF

Info

Publication number
CA2558353C
CA2558353C CA2558353A CA2558353A CA2558353C CA 2558353 C CA2558353 C CA 2558353C CA 2558353 A CA2558353 A CA 2558353A CA 2558353 A CA2558353 A CA 2558353A CA 2558353 C CA2558353 C CA 2558353C
Authority
CA
Canada
Prior art keywords
communications link
idle
data
secret key
predetermined period
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CA2558353A
Other languages
English (en)
French (fr)
Other versions
CA2558353A1 (en
Inventor
Richard Michael Wyn Harran
Michael Horan
Jonathan Rumsey
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Publication of CA2558353A1 publication Critical patent/CA2558353A1/en
Application granted granted Critical
Publication of CA2558353C publication Critical patent/CA2558353C/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/166Implementing security features at a particular protocol layer at the transport layer
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Storage Device Security (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Lock And Its Accessories (AREA)
  • Reverberation, Karaoke And Other Acoustics (AREA)
  • Computer And Data Communications (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Small-Scale Networks (AREA)
CA2558353A 2004-03-09 2005-03-01 Key-based encryption Expired - Lifetime CA2558353C (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
GB0405245.2 2004-03-09
GBGB0405245.2A GB0405245D0 (en) 2004-03-09 2004-03-09 Key-based encryption
PCT/EP2005/050895 WO2005086452A1 (en) 2004-03-09 2005-03-01 Key-based encryption

Publications (2)

Publication Number Publication Date
CA2558353A1 CA2558353A1 (en) 2005-09-15
CA2558353C true CA2558353C (en) 2011-08-02

Family

ID=32117297

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2558353A Expired - Lifetime CA2558353C (en) 2004-03-09 2005-03-01 Key-based encryption

Country Status (11)

Country Link
US (1) US7649998B2 (enExample)
EP (1) EP1726144B1 (enExample)
JP (1) JP4591897B2 (enExample)
KR (1) KR101013268B1 (enExample)
CN (1) CN100571269C (enExample)
AT (1) ATE437517T1 (enExample)
CA (1) CA2558353C (enExample)
DE (1) DE602005015560D1 (enExample)
GB (1) GB0405245D0 (enExample)
IL (1) IL177796A (enExample)
WO (1) WO2005086452A1 (enExample)

Families Citing this family (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4699099B2 (ja) * 2005-06-14 2011-06-08 富士通株式会社 通信制御装置および通信制御方法
JP4674144B2 (ja) * 2005-09-30 2011-04-20 株式会社日立製作所 暗号通信装置および暗号通信方法
EP2021960B1 (en) 2006-05-25 2015-12-23 Celltrust Corporation Secure mobile information management system and method
US9848081B2 (en) 2006-05-25 2017-12-19 Celltrust Corporation Dissemination of real estate information through text messaging
US8260274B2 (en) 2006-05-25 2012-09-04 Celltrust Corporation Extraction of information from e-mails and delivery to mobile phones, system and method
US8280359B2 (en) 2006-05-25 2012-10-02 Celltrust Corporation Methods of authorizing actions
US9572033B2 (en) 2006-05-25 2017-02-14 Celltrust Corporation Systems and methods for encrypted mobile voice communications
US8225380B2 (en) 2006-05-25 2012-07-17 Celltrust Corporation Methods to authenticate access and alarm as to proximity to location
US8965416B2 (en) 2006-05-25 2015-02-24 Celltrust Corporation Distribution of lottery tickets through mobile devices
US20070297609A1 (en) * 2006-06-23 2007-12-27 Research In Motion Limited Secure Wireless HeartBeat
US20080214111A1 (en) * 2007-03-02 2008-09-04 Celltrust Corporation Lost phone alarm system and method
CN101647026B (zh) * 2007-03-30 2014-01-08 日本电气株式会社 用户认证控制设备、用户认证设备、数据处理设备及用户认证控制方法等
US8131994B2 (en) 2007-06-01 2012-03-06 Cisco Technology, Inc. Dual cryptographic keying
CA2719794C (en) * 2008-03-28 2020-10-27 Celltrust Corporation Systems and methods for secure short messaging service and multimedia messaging service
US8331568B2 (en) * 2009-05-28 2012-12-11 Microsoft Corporation Efficient distribution of computation in key agreement
JP4886833B2 (ja) * 2009-10-27 2012-02-29 シャープ株式会社 複合機制御システム
US8190879B2 (en) * 2009-12-17 2012-05-29 Cisco Technology, Inc. Graceful conversion of a security to a non-security transparent proxy
US9088609B2 (en) * 2009-12-24 2015-07-21 International Business Machines Corporation Logical partition media access control impostor detector
US10015286B1 (en) 2010-06-23 2018-07-03 F5 Networks, Inc. System and method for proxying HTTP single sign on across network domains
US9537899B2 (en) * 2012-02-29 2017-01-03 Microsoft Technology Licensing, Llc Dynamic selection of security protocol
US9106405B1 (en) * 2012-06-25 2015-08-11 Amazon Technologies, Inc. Multi-user secret decay
US10789594B2 (en) 2013-01-31 2020-09-29 Moshir Vantures, Limited, LLC Method and system to intelligently assess and mitigate security risks on a mobile device
US9584492B2 (en) * 2014-06-23 2017-02-28 Vmware, Inc. Cryptographic proxy service
WO2016067473A1 (ja) * 2014-10-31 2016-05-06 富士通株式会社 セキュリティシステム及びコンピュータ機器間の通信方法
US9942203B2 (en) 2015-03-30 2018-04-10 International Business Machines Corporation Enhanced security when sending asynchronous messages
US10419211B1 (en) * 2015-11-30 2019-09-17 Cisco Technology, Inc. Hash-based key distribution
US11086704B2 (en) * 2017-04-28 2021-08-10 Honeywell International Inc. Inferred detection of data replication errors of source applications by enterprise applications
EP3871364A4 (en) * 2018-10-23 2022-06-08 Nokia Technologies OY PHYSICAL ATTACK TESTING METHOD AND DEVICE

Family Cites Families (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS5856552A (ja) * 1981-09-30 1983-04-04 Fujitsu Ltd 通信路での盗聴検出方式
JPH02164154A (ja) * 1988-12-19 1990-06-25 Oki Electric Ind Co Ltd 鍵送信方式
GB2241851A (en) * 1990-03-09 1991-09-11 Philips Electronic Associated Optimising transmitter power in a communications system
JPH053478A (ja) * 1991-06-25 1993-01-08 Nissan Motor Co Ltd 多重通信制御装置
JP3050665B2 (ja) * 1991-10-15 2000-06-12 古河電気工業株式会社 多重伝送方式
JP2786092B2 (ja) * 1993-10-18 1998-08-13 日本電気株式会社 移動通信端末認証方式
JPH09269727A (ja) * 1996-03-29 1997-10-14 Toshiba Corp 暗号化方法および暗号化装置
JPH11313077A (ja) * 1998-04-30 1999-11-09 Hitachi Ltd 通信用lsi及びatm装置
US6360269B1 (en) * 1998-11-02 2002-03-19 Nortel Networks Limited Protected keepalive message through the internet
US6928551B1 (en) * 1999-10-29 2005-08-09 Lockheed Martin Corporation Method and apparatus for selectively denying access to encoded data
US6795555B1 (en) * 1999-12-30 2004-09-21 Nortel Networks Limited Encryption key exchange protocol
US6976071B1 (en) * 2000-05-03 2005-12-13 Nortel Networks Limited Detecting if a secure link is alive
US7127742B2 (en) * 2001-01-24 2006-10-24 Microsoft Corporation Establishing a secure connection with a private corporate network over a public network
WO2003036857A1 (en) * 2001-10-24 2003-05-01 Nokia Corporation Ciphering as a part of the multicast cencept
JP2003348070A (ja) * 2002-05-29 2003-12-05 Hitachi Ltd 機密化通信方法およびそれに用いるノード装置
US7370194B2 (en) * 2002-06-10 2008-05-06 Microsoft Corporation Security gateway for online console-based gaming
US20040078601A1 (en) * 2002-08-02 2004-04-22 Chris Tengwall System and method for operating a wireless device network
US6956846B2 (en) * 2002-08-16 2005-10-18 Utstarcom Incorporated System and method for foreign agent control node redundancy in a mobile internet protocol network
US7181016B2 (en) * 2003-01-27 2007-02-20 Microsoft Corporation Deriving a symmetric key from an asymmetric key for file encryption or decryption
US20050025315A1 (en) * 2003-07-31 2005-02-03 Kreitzer Stuart S. Method and apparatus for secure communications among portable communication devices

Also Published As

Publication number Publication date
CA2558353A1 (en) 2005-09-15
KR20070003862A (ko) 2007-01-05
ATE437517T1 (de) 2009-08-15
JP4591897B2 (ja) 2010-12-01
EP1726144B1 (en) 2009-07-22
KR101013268B1 (ko) 2011-02-09
CN100571269C (zh) 2009-12-16
US20070263874A1 (en) 2007-11-15
WO2005086452A1 (en) 2005-09-15
IL177796A0 (en) 2006-12-31
IL177796A (en) 2010-12-30
GB0405245D0 (en) 2004-04-21
JP2007528172A (ja) 2007-10-04
DE602005015560D1 (de) 2009-09-03
EP1726144A1 (en) 2006-11-29
CN1914882A (zh) 2007-02-14
US7649998B2 (en) 2010-01-19

Similar Documents

Publication Publication Date Title
CA2558353C (en) Key-based encryption
US7584505B2 (en) Inspected secure communication protocol
US7093127B2 (en) System and method for computer storage security
JP4746333B2 (ja) コンピューティングシステムの効率的かつセキュアな認証
US7735120B2 (en) Server computer issued credential authentication
CN1685687B (zh) 确定目标节点对于源节点的邻近性的方法
EP2056546A1 (en) Proxy Authentication Server
KR20210045676A (ko) 차량용 통신 시스템 및 그를 위한 보안 통신 방법
JP2009239919A (ja) トランスコーディング・プロキシでの複数の起点サーバへの動的接続
WO2013128470A1 (en) Authentication and secured information exchange system, and method therefor
WO2006032214A1 (en) Method for realizng transmission of syncml synchronous data
CN101809964A (zh) 信息交换安全化方法、设备、及相应的计算机程序产品
EP1746802A2 (en) User authentication in connection with a security protocol
CN105359480A (zh) 针对受约束资源设备的密钥建立
CN116848822A (zh) 用于提供针对通信的安全水平的方法和设备
CN102668450B (zh) 基于身份的网络策略实现方法
CN110855561A (zh) 一种物联网智能网关
CN118174921A (zh) 基于国密算法并支持双向鉴权的多因素ssh登录认证方法
JP5334104B2 (ja) 全交換セッションセキュリティ
CN114386054A (zh) 用于消息存储处理和安全认证的控制方法、系统和介质
CN103986716A (zh) Ssl连接的建立方法以及基于ssl连接的通信方法及装置
JP2004274134A (ja) 通信方法並びにこの通信方法を用いた通信システム、サーバおよびクライアント
JP2002328905A (ja) クライアント認証方法及び認証装置並びにプログラム及び記録媒体
CN119583227B (zh) 一种Shell命令加密远程传递方法及系统
lei Zhang Three attacks in SSL protocol and their solutions

Legal Events

Date Code Title Description
EEER Examination request