CN101090321B - 使用非周期精确测量发现仿真客户机的设备和方法 - Google Patents

使用非周期精确测量发现仿真客户机的设备和方法 Download PDF

Info

Publication number
CN101090321B
CN101090321B CN 200710110153 CN200710110153A CN101090321B CN 101090321 B CN101090321 B CN 101090321B CN 200710110153 CN200710110153 CN 200710110153 CN 200710110153 A CN200710110153 A CN 200710110153A CN 101090321 B CN101090321 B CN 101090321B
Authority
CN
China
Prior art keywords
client
challenge
response
emulated
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN 200710110153
Other languages
English (en)
Chinese (zh)
Other versions
CN101090321A (zh
Inventor
奥利维耶·赫恩
埃里克·迪尔
阿兰·迪朗
穆罕默德·卡若米
尼古拉斯·普里让
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Thomson Licensing SAS
Original Assignee
Thomson Licensing SAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Thomson Licensing SAS filed Critical Thomson Licensing SAS
Publication of CN101090321A publication Critical patent/CN101090321A/zh
Application granted granted Critical
Publication of CN101090321B publication Critical patent/CN101090321B/zh
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • G06F21/445Program or device authentication by mutual authentication, e.g. between devices or programs
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1408Protection against unauthorised use of memory or access to memory by using cryptography
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/72Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
    • G06F21/725Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits operating on a secure reference time value
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2129Authenticate client device independently of the user
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Computer And Data Communications (AREA)
CN 200710110153 2006-06-16 2007-06-18 使用非周期精确测量发现仿真客户机的设备和方法 Expired - Fee Related CN101090321B (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP20060290992 EP1868126B1 (en) 2006-06-16 2006-06-16 Device and method for discovering emulated clients
EP06290992.4 2006-06-16

Publications (2)

Publication Number Publication Date
CN101090321A CN101090321A (zh) 2007-12-19
CN101090321B true CN101090321B (zh) 2012-04-18

Family

ID=37398740

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200710110153 Expired - Fee Related CN101090321B (zh) 2006-06-16 2007-06-18 使用非周期精确测量发现仿真客户机的设备和方法

Country Status (5)

Country Link
US (1) US9137248B2 (enExample)
EP (1) EP1868126B1 (enExample)
JP (1) JP5183978B2 (enExample)
CN (1) CN101090321B (enExample)
TW (1) TWI412254B (enExample)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2012174195A (ja) * 2011-02-24 2012-09-10 Renesas Electronics Corp 認証システム
US9878555B2 (en) 2013-08-30 2018-01-30 Hewlett-Packard Development Company, L.P. Supply authentication via timing challenge response
US9195821B2 (en) * 2013-11-24 2015-11-24 Truly Protect Oy System and methods for remote software authentication of a computing device
GB201413836D0 (en) 2014-08-05 2014-09-17 Arm Ip Ltd Device security apparatus and methods
GB2540961B (en) 2015-07-31 2019-09-18 Arm Ip Ltd Controlling configuration data storage
GB2540965B (en) 2015-07-31 2019-01-30 Arm Ip Ltd Secure configuration data storage
US10728230B2 (en) * 2018-07-05 2020-07-28 Dell Products L.P. Proximity-based authorization for encryption and decryption services

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1477810A (zh) * 2003-06-12 2004-02-25 上海格尔软件股份有限公司 基于数字证书实现的动态口令认证方法
CN1701316A (zh) * 2003-07-28 2005-11-23 索尼株式会社 信息处理设备和方法、记录媒体和程序

Family Cites Families (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5815665A (en) 1996-04-03 1998-09-29 Microsoft Corporation System and method for providing trusted brokering services over a distributed network
US7197639B1 (en) * 1999-02-05 2007-03-27 Rsa Security Inc. Cryptographic countermeasures against connection depletion attacks
US6289455B1 (en) * 1999-09-02 2001-09-11 Crypotography Research, Inc. Method and apparatus for preventing piracy of digital content
US6985940B1 (en) 1999-11-12 2006-01-10 International Business Machines Corporation Performance testing of server systems
US7685423B1 (en) * 2000-02-15 2010-03-23 Silverbrook Research Pty Ltd Validation protocol and system
FI20000760A0 (fi) 2000-03-31 2000-03-31 Nokia Corp Autentikointi pakettidataverkossa
US6940980B2 (en) * 2000-12-19 2005-09-06 Tricipher, Inc. High security cryptosystem
FI115097B (fi) 2000-12-27 2005-02-28 Nokia Corp Todentaminen dataviestinnässä
FI115098B (fi) 2000-12-27 2005-02-28 Nokia Corp Todentaminen dataviestinnässä
US7516325B2 (en) * 2001-04-06 2009-04-07 Certicom Corp. Device authentication in a PKI
US7194765B2 (en) 2002-06-12 2007-03-20 Telefonaktiebolaget Lm Ericsson (Publ) Challenge-response user authentication
CA2483989C (en) * 2002-04-30 2013-04-09 Robert Eryou System and apparatus for authenticating to a system or network
AU2003246997A1 (en) * 2002-07-26 2004-02-23 Koninklijke Philips Electronics N.V. Secure authenticated distance measurement
CN1243434C (zh) * 2002-09-23 2006-02-22 华为技术有限公司 基于远程认证的网络中实现eap认证的方法
JP4881538B2 (ja) * 2003-06-10 2012-02-22 株式会社日立製作所 コンテンツ送信装置およびコンテンツ送信方法
AU2004282865B2 (en) * 2003-10-14 2009-05-28 Syferlock Technology Corporation Authentication system
US7512794B2 (en) * 2004-02-24 2009-03-31 Intersil Americas Inc. System and method for authentication
US20050246529A1 (en) 2004-04-30 2005-11-03 Microsoft Corporation Isolated persistent identity storage for authentication of computing devies
US7886345B2 (en) 2004-07-02 2011-02-08 Emc Corporation Password-protection module
US8887287B2 (en) 2004-10-27 2014-11-11 Alcatel Lucent Method and apparatus for software integrity protection using timed executable agents
CN101120351B (zh) * 2005-02-18 2010-10-06 Rsa安全公司 派生种子的分发方法
US8302199B2 (en) * 2005-04-06 2012-10-30 Valve Corporation Anti-cheat facility for use in a networked game environment

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1477810A (zh) * 2003-06-12 2004-02-25 上海格尔软件股份有限公司 基于数字证书实现的动态口令认证方法
CN1701316A (zh) * 2003-07-28 2005-11-23 索尼株式会社 信息处理设备和方法、记录媒体和程序

Also Published As

Publication number Publication date
CN101090321A (zh) 2007-12-19
JP2007336558A (ja) 2007-12-27
US9137248B2 (en) 2015-09-15
EP1868126B1 (en) 2011-08-10
TW200810470A (en) 2008-02-16
EP1868126A1 (en) 2007-12-19
US20080263198A1 (en) 2008-10-23
TWI412254B (zh) 2013-10-11
JP5183978B2 (ja) 2013-04-17

Similar Documents

Publication Publication Date Title
KR101237632B1 (ko) 토큰과 검증자 사이의 인증을 위한 네크워크 헬퍼
KR101508497B1 (ko) 차량용 데이터의 인증 및 획득 방법
CN102026195B (zh) 基于一次性口令的移动终端身份认证方法和系统
CN112989426B (zh) 授权认证方法及装置、资源访问令牌的获取方法
CN105828332B (zh) 一种无线局域网认证机制的改进方法
CN101090321B (zh) 使用非周期精确测量发现仿真客户机的设备和方法
MXPA03003710A (es) Metodos para cambiar a distancia una contrasena de comunicaciones.
CN102187619A (zh) 认证系统
CN107820239A (zh) 信息处理方法及装置
CN109347887B (zh) 一种身份认证的方法及装置
CN116707961A (zh) 用户认证方法、计算机设备及计算机存储介质
JP5171837B2 (ja) 第1装置と第2装置とを関連付ける方法及び装置
CN115955320B (zh) 一种视频会议身份认证方法
KR100842267B1 (ko) 다중 인증 수단을 가지는 시스템의 통합 사용자 인증 서버,클라이언트 및 방법
CN104734856A (zh) 一种抗服务器端信息泄露的口令认证方法
CN101438564B (zh) 带有反模拟机制的服务传送设备、系统和方法
CN117615373B (zh) 基于ecc与puf的轻量级密钥协商身份认证与通信交流方法
CN114079573B (zh) 一种路由器访问方法以及路由器
WO2025112759A1 (zh) 一种口令检测方法、服务端、用户端以及口令检测系统
HK40046034B (en) Authorization authentication method and device, resource access token acquisition method
HK40046034A (en) Authorization authentication method and device, resource access token acquisition method
CN119449459A (zh) 一种基于sip协议的双鉴权安全防护方法及系统
CN118540063A (zh) 一种基于智能设备的随机口令验证方法
Vaidya et al. HOTP-based user authentication scheme in home networks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120418

Termination date: 20190618