CN104067286B - 无效托管密钥的检测 - Google Patents
无效托管密钥的检测 Download PDFInfo
- Publication number
- CN104067286B CN104067286B CN201380005350.0A CN201380005350A CN104067286B CN 104067286 B CN104067286 B CN 104067286B CN 201380005350 A CN201380005350 A CN 201380005350A CN 104067286 B CN104067286 B CN 104067286B
- Authority
- CN
- China
- Prior art keywords
- key
- file
- trustship
- confirmation data
- computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US13/350,360 US8667284B2 (en) | 2012-01-13 | 2012-01-13 | Detection of invalid escrow keys |
| US13/350,360 | 2012-01-13 | ||
| PCT/US2013/020913 WO2013106492A1 (en) | 2012-01-13 | 2013-01-10 | Detection of invalid escrow keys |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN104067286A CN104067286A (zh) | 2014-09-24 |
| CN104067286B true CN104067286B (zh) | 2017-03-29 |
Family
ID=48780839
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201380005350.0A Active CN104067286B (zh) | 2012-01-13 | 2013-01-10 | 无效托管密钥的检测 |
Country Status (6)
| Country | Link |
|---|---|
| US (1) | US8667284B2 (enExample) |
| EP (1) | EP2803011B1 (enExample) |
| JP (1) | JP6046745B2 (enExample) |
| KR (1) | KR102133606B1 (enExample) |
| CN (1) | CN104067286B (enExample) |
| WO (1) | WO2013106492A1 (enExample) |
Families Citing this family (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9087205B2 (en) | 2013-10-11 | 2015-07-21 | Sap Se | Shared encrypted storage |
| US9639710B2 (en) | 2013-12-23 | 2017-05-02 | Symantec Corporation | Device-based PIN authentication process to protect encrypted data |
| DE102014213454A1 (de) * | 2014-07-10 | 2016-01-14 | Siemens Aktiengesellschaft | Verfahren und System zur Erkennung einer Manipulation von Datensätzen |
| CN106936794B (zh) * | 2015-12-30 | 2021-01-08 | 阿里巴巴集团控股有限公司 | 一种用于更改秘钥的方法、装置及设置秘钥的方法、装置 |
| US10509574B2 (en) * | 2016-02-08 | 2019-12-17 | Microsoft Technology Licensing, Llc | Container credentialing by host |
| CN107122139A (zh) * | 2017-04-28 | 2017-09-01 | 深圳天珑无线科技有限公司 | 数据写入方法及装置、数据读取方法及装置 |
| CN107492032A (zh) * | 2017-09-18 | 2017-12-19 | 发贵科技(贵州)有限公司 | 一种企业财务审计报告管理系统及其数据库平台 |
| US11025642B1 (en) * | 2018-03-23 | 2021-06-01 | Amazon Technologies, Inc. | Electronic message authentication |
| US11424914B2 (en) * | 2019-12-03 | 2022-08-23 | Microsoft Technology Licensing, Llc | Enhanced security of secret data for dynamic user groups |
| CN114329631B (zh) * | 2021-12-30 | 2025-04-04 | 航天信息股份有限公司 | 一种数据校验方法、装置及相关设备 |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1729526A (zh) * | 2000-12-28 | 2006-02-01 | 英特尔公司 | 通过在媒体的剪辑区存储验证数据而验证媒体密钥块的完整性 |
| EP1641176A1 (en) * | 2004-09-27 | 2006-03-29 | Axalto SA | Escrowing services oriented encryption and decryption methods |
| US20110252243A1 (en) * | 2010-04-07 | 2011-10-13 | Apple Inc. | System and method for content protection based on a combination of a user pin and a device specific identifier |
Family Cites Families (17)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5633929A (en) * | 1995-09-15 | 1997-05-27 | Rsa Data Security, Inc | Cryptographic key escrow system having reduced vulnerability to harvesting attacks |
| US6249866B1 (en) * | 1997-09-16 | 2001-06-19 | Microsoft Corporation | Encrypting file system and method |
| JP2000267565A (ja) * | 1999-03-12 | 2000-09-29 | Mitsubishi Electric Corp | 暗号化復号化装置及びプログラムを記録したコンピュータ読み取り可能な記録媒体 |
| US6931549B1 (en) | 2000-05-25 | 2005-08-16 | Stamps.Com | Method and apparatus for secure data storage and retrieval |
| US20030204724A1 (en) * | 2002-04-30 | 2003-10-30 | Microsoft Corporation | Methods for remotely changing a communications password |
| US7272231B2 (en) | 2003-01-27 | 2007-09-18 | International Business Machines Corporation | Encrypting data for access by multiple users |
| GB2419762A (en) | 2004-11-01 | 2006-05-03 | Sony Uk Ltd | Method of generating protected media signals by replacing data bits with hash values |
| JP4489712B2 (ja) * | 2006-02-24 | 2010-06-23 | 大日本印刷株式会社 | 電子フォーム処理方法 |
| US20080005024A1 (en) | 2006-05-17 | 2008-01-03 | Carter Kirkwood | Document authentication system |
| CA2684229A1 (en) * | 2007-04-12 | 2008-10-23 | Ncipher Corporation Ltd. | Method and system for identifying and managing keys |
| JP4843587B2 (ja) * | 2007-04-24 | 2011-12-21 | 日本電信電話株式会社 | 情報記録媒体のセキュリティ方法、情報処理装置、プログラム及び記録媒体 |
| US20100005318A1 (en) * | 2008-07-02 | 2010-01-07 | Akram Hosain | Process for securing data in a storage unit |
| US8315395B2 (en) | 2008-12-10 | 2012-11-20 | Oracle America, Inc. | Nearly-stateless key escrow service |
| US20110047371A1 (en) | 2009-08-18 | 2011-02-24 | Benjamin William Timby | System and method for secure data sharing |
| US8539234B2 (en) | 2010-03-30 | 2013-09-17 | Salesforce.Com, Inc. | Secure client-side communication between multiple domains |
| US8589680B2 (en) | 2010-04-07 | 2013-11-19 | Apple Inc. | System and method for synchronizing encrypted data on a device having file-level content protection |
| US8510552B2 (en) | 2010-04-07 | 2013-08-13 | Apple Inc. | System and method for file-level data protection |
-
2012
- 2012-01-13 US US13/350,360 patent/US8667284B2/en active Active
-
2013
- 2013-01-10 WO PCT/US2013/020913 patent/WO2013106492A1/en not_active Ceased
- 2013-01-10 EP EP13735912.1A patent/EP2803011B1/en active Active
- 2013-01-10 KR KR1020147019250A patent/KR102133606B1/ko active Active
- 2013-01-10 JP JP2014552276A patent/JP6046745B2/ja not_active Expired - Fee Related
- 2013-01-10 CN CN201380005350.0A patent/CN104067286B/zh active Active
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1729526A (zh) * | 2000-12-28 | 2006-02-01 | 英特尔公司 | 通过在媒体的剪辑区存储验证数据而验证媒体密钥块的完整性 |
| EP1641176A1 (en) * | 2004-09-27 | 2006-03-29 | Axalto SA | Escrowing services oriented encryption and decryption methods |
| US20110252243A1 (en) * | 2010-04-07 | 2011-10-13 | Apple Inc. | System and method for content protection based on a combination of a user pin and a device specific identifier |
Also Published As
| Publication number | Publication date |
|---|---|
| US20130185557A1 (en) | 2013-07-18 |
| JP2015505221A (ja) | 2015-02-16 |
| US8667284B2 (en) | 2014-03-04 |
| EP2803011A1 (en) | 2014-11-19 |
| WO2013106492A1 (en) | 2013-07-18 |
| JP6046745B2 (ja) | 2016-12-21 |
| KR20140109952A (ko) | 2014-09-16 |
| EP2803011B1 (en) | 2018-10-10 |
| EP2803011A4 (en) | 2015-08-26 |
| KR102133606B1 (ko) | 2020-07-13 |
| CN104067286A (zh) | 2014-09-24 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN104067286B (zh) | 无效托管密钥的检测 | |
| JP7545419B2 (ja) | 統合された隔離されたアプリケーションにおけるランサムウェアの被害の軽減 | |
| US11379771B2 (en) | Management of workflows | |
| EP3500972B1 (en) | Protection feature for data stored at storage service | |
| US8352735B2 (en) | Method and system for encrypted file access | |
| CN107005568B (zh) | 数据安全操作与预期 | |
| CN114586315A (zh) | 去中心化的数据认证 | |
| US10728031B2 (en) | Durable cryptographic keys | |
| US10003584B1 (en) | Durable key management | |
| US20130152160A1 (en) | Systems and methods for using cipher objects to protect data | |
| US20170373853A1 (en) | Managing user profiles securely in a user environment | |
| US20150012974A1 (en) | System and methods for tamper proof interaction recording and timestamping | |
| US9824231B2 (en) | Retention management in a facility with multiple trust zones and encryption based secure deletion | |
| Scarfone et al. | Guide to storage encryption technologies for end user devices | |
| US20220130401A1 (en) | Systems and methods for watermarking audio of saas applications | |
| TW201530344A (zh) | 應用程式存取保護方法及應用程式存取保護裝置 | |
| CN113326522A (zh) | 一种数据处理方法、装置、设备和计算机存储介质 | |
| CN114511431A (zh) | 一种基于区块链的业务处理方法、设备及介质 | |
| US8499357B1 (en) | Signing a library file to verify a callback function | |
| KR102202775B1 (ko) | 데이터를 보호하기 위해 암호 객체들을 사용하는 시스템 및 방법들 | |
| CN115470525A (zh) | 一种文件保护方法、系统、计算设备及存储介质 | |
| HK40066642B (zh) | 用於去中心化的数据认证的系统、方法和计算机可读介质 | |
| CN114817960A (zh) | 加密、鉴权处理方法、装置、设备、介质与处理系统 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| ASS | Succession or assignment of patent right |
Owner name: MICROSOFT TECHNOLOGY LICENSING LLC Free format text: FORMER OWNER: MICROSOFT CORP. Effective date: 20150805 |
|
| C41 | Transfer of patent application or patent right or utility model | ||
| TA01 | Transfer of patent application right |
Effective date of registration: 20150805 Address after: Washington State Applicant after: Micro soft technique license Co., Ltd Address before: Washington State Applicant before: Microsoft Corp. |
|
| GR01 | Patent grant | ||
| GR01 | Patent grant |