CN1411572A - 硬件令牌自登记过程 - Google Patents
硬件令牌自登记过程 Download PDFInfo
- Publication number
- CN1411572A CN1411572A CN00817344A CN00817344A CN1411572A CN 1411572 A CN1411572 A CN 1411572A CN 00817344 A CN00817344 A CN 00817344A CN 00817344 A CN00817344 A CN 00817344A CN 1411572 A CN1411572 A CN 1411572A
- Authority
- CN
- China
- Prior art keywords
- hardware token
- user
- certificate
- token processor
- htp
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims description 65
- 230000008569 process Effects 0.000 title claims description 23
- 230000007246 mechanism Effects 0.000 claims description 58
- 238000012795 verification Methods 0.000 claims description 57
- 238000004891 communication Methods 0.000 claims description 7
- 230000000977 initiatory effect Effects 0.000 claims description 3
- 238000009434 installation Methods 0.000 claims description 2
- 230000004044 response Effects 0.000 claims description 2
- 230000001413 cellular effect Effects 0.000 claims 1
- 238000000151 deposition Methods 0.000 claims 1
- 230000008520 organization Effects 0.000 claims 1
- 239000004744 fabric Substances 0.000 description 9
- 239000004065 semiconductor Substances 0.000 description 7
- 239000002184 metal Substances 0.000 description 5
- 230000005540 biological transmission Effects 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000001514 detection method Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 241000700605 Viruses Species 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 238000006073 displacement reaction Methods 0.000 description 1
- 238000005538 encapsulation Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
- H04L9/0897—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
- G06F2211/008—Public Key, Asymmetric Key, Asymmetric Encryption
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
表1识别数据库的结构 | ||
字段名 | 用途 | 索引号 |
HTP ID# | HTP ID编号字段用于存储与本记录相关联的HTP标识编号。这是一个关键字字段,用于HTP标识记录间的彼此区分。每条记录以及每个相应的HTP都被赋予一个唯一HTP标识编号。 | 130 |
Admin PIN | Admin PIN字段用于存储初始化过程中产生的HTP的管理个人标识编号。 | 135 |
User PIN | User PIN字段用于存储初始化过程中产生的HTP的用户个人标识编号。 | 140 |
Initialized | 初始化字段用于存储一个布尔变量。该布尔变量的状态表示HTP是否已初始化,在HTP被以初始化值编程后设置为“真”。初始化值包括但不限于HTP标识编号、管理个人标识编号、用户个人标识编号、用户证书、服务器证书编号。 | 145 |
UserCertificate | 用户证书字段用于存储一个专用密钥,HTP用该专用密钥对收自证书认证机构的消息进行解密。 | 150 |
UserCertificationNumber | 用户证书编号字段用于存储一个公用密钥,证书认证机构用该公用密钥对送往HTP的消息进行加密。 | 160 |
ServerCertificate | 服务器证书字段用于存储一个专用密钥,证书认证机构用该专用密钥对收自HTP的消息进行解密。 | 165 |
ServerCertificationNumber | 服务器证书编号字段用于存储一个公用密钥,HTP用该公用密钥对送往证书认证机构的消息进行加密。 | 170 |
Registered | 注册字段用于存储用户使用HTP注册获取认证服务的日期。在初始化过程中,注册字段设置为空值。 | 175 |
User Data | 用户数据字段用于存储有关使用HTP注册获取认证服务的用户的信息。这些信息包括但不限于:名字、地址、员工编号、社会保险编号、电子邮件地址、电话和传真号码。 | 180 |
Claims (28)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17191499P | 1999-12-21 | 1999-12-21 | |
US60/171,914 | 1999-12-21 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1411572A true CN1411572A (zh) | 2003-04-16 |
CN100428106C CN100428106C (zh) | 2008-10-22 |
Family
ID=22625621
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB008173443A Expired - Fee Related CN100428106C (zh) | 1999-12-21 | 2000-12-20 | 硬件令牌自登记过程 |
Country Status (6)
Country | Link |
---|---|
EP (1) | EP1252560B1 (zh) |
JP (1) | JP2003518283A (zh) |
CN (1) | CN100428106C (zh) |
AU (1) | AU2290801A (zh) |
DE (1) | DE60016042T2 (zh) |
WO (1) | WO2001046788A1 (zh) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101421968B (zh) * | 2003-12-23 | 2011-01-26 | 万朝维亚有限公司 | 用于连网计算机应用的鉴权系统 |
CN1965527B (zh) * | 2004-04-30 | 2013-08-07 | 高通股份有限公司 | 加密签章服务的签章特权的管理 |
CN105743859A (zh) * | 2014-12-10 | 2016-07-06 | 深圳云之家网络有限公司 | 一种轻应用认证的方法、装置及系统 |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7185086B2 (en) | 2002-06-26 | 2007-02-27 | Hewlett-Packard Development Company, L.P. | Method for electronic tracking of an electronic device |
US20040054898A1 (en) * | 2002-08-28 | 2004-03-18 | International Business Machines Corporation | Authenticating and communicating verifiable authorization between disparate network domains |
WO2004023712A1 (en) | 2002-09-09 | 2004-03-18 | U.S. Encode Corporation | Systems and methods for secure authentication of electronic transactions |
US7340769B2 (en) * | 2005-01-07 | 2008-03-04 | Cisco Technology, Inc. | System and method for localizing data and devices |
DE102006006489A1 (de) * | 2006-02-10 | 2007-08-16 | Bundesdruckerei Gmbh | Verfahren zur Durchführung eines Schreibzugriffs, Computerprogrammprodukt, Computersystem und Chipkarte |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5267149A (en) * | 1986-08-20 | 1993-11-30 | Oki Electric Industry Co. Ltd. | System and method for registering passwords |
EP0413822A4 (en) * | 1988-09-26 | 1993-11-10 | Hitachi Maxell Ltd. | Data processing system using ic card |
JPH08204698A (ja) * | 1995-01-24 | 1996-08-09 | Mitsubishi Electric Corp | 暗号装置 |
DE69704684T2 (de) * | 1996-02-23 | 2004-07-15 | Fuji Xerox Co., Ltd. | Vorrichtung und Verfahren zur Authentifizierung von Zugangsrechten eines Benutzers zu Betriebsmitteln nach dem Challenge-Response-Prinzip |
US5784463A (en) * | 1996-12-04 | 1998-07-21 | V-One Corporation | Token distribution, registration, and dynamic configuration of user entitlement for an application level security system and method |
JP4212068B2 (ja) * | 1997-05-19 | 2009-01-21 | ローム株式会社 | Icカードおよびicチップモジュール |
-
2000
- 2000-12-20 EP EP00986725A patent/EP1252560B1/en not_active Expired - Lifetime
- 2000-12-20 AU AU22908/01A patent/AU2290801A/en not_active Abandoned
- 2000-12-20 JP JP2001547238A patent/JP2003518283A/ja active Pending
- 2000-12-20 CN CNB008173443A patent/CN100428106C/zh not_active Expired - Fee Related
- 2000-12-20 WO PCT/US2000/035151 patent/WO2001046788A1/en active IP Right Grant
- 2000-12-20 DE DE60016042T patent/DE60016042T2/de not_active Expired - Lifetime
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101421968B (zh) * | 2003-12-23 | 2011-01-26 | 万朝维亚有限公司 | 用于连网计算机应用的鉴权系统 |
CN1965527B (zh) * | 2004-04-30 | 2013-08-07 | 高通股份有限公司 | 加密签章服务的签章特权的管理 |
CN105743859A (zh) * | 2014-12-10 | 2016-07-06 | 深圳云之家网络有限公司 | 一种轻应用认证的方法、装置及系统 |
CN105743859B (zh) * | 2014-12-10 | 2019-03-01 | 深圳云之家网络有限公司 | 一种轻应用认证的方法、装置及系统 |
Also Published As
Publication number | Publication date |
---|---|
DE60016042T2 (de) | 2005-04-07 |
EP1252560B1 (en) | 2004-11-17 |
EP1252560A1 (en) | 2002-10-30 |
WO2001046788A1 (en) | 2001-06-28 |
CN100428106C (zh) | 2008-10-22 |
AU2290801A (en) | 2001-07-03 |
JP2003518283A (ja) | 2003-06-03 |
DE60016042D1 (de) | 2004-12-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7302703B2 (en) | Hardware token self enrollment process | |
US11967186B1 (en) | Blockchain-based election system | |
US11824991B2 (en) | Securing transactions with a blockchain network | |
EP2956852B1 (en) | Data security service | |
JP3595109B2 (ja) | 認証装置、端末装置、および、それら装置における認証方法、並びに、記憶媒体 | |
CN101421968B (zh) | 用于连网计算机应用的鉴权系统 | |
CN100580657C (zh) | 分布式单一注册服务 | |
CN108833114A (zh) | 一种基于区块链的去中心化身份认证系统及方法 | |
US20050235148A1 (en) | Access system utilizing multiple factor identification and authentication | |
JP2000357156A (ja) | 認証シード配布のためのシステムおよび方法 | |
CN1261841C (zh) | 用于防止个人计算机被未经授权人员使用的安全系统 | |
CN1689297A (zh) | 使用密钥基防止未经授权分发和使用电子密钥的方法 | |
TW200402224A (en) | Biometric private key infrastructure | |
CN104798083A (zh) | 用于验证访问请求的方法和系统 | |
US20140258718A1 (en) | Method and system for secure transmission of biometric data | |
WO2003065169A9 (en) | Access system utilizing multiple factor identification and authentication | |
JP2003526836A (ja) | 通信ネットワークを安全化するための方法、システム、サーバ、および装置 | |
CN107733933A (zh) | 一种基于生物识别技术的双因子身份认证的方法及系统 | |
EP2619706A1 (en) | Secondary credentials for batch system | |
CN106936588A (zh) | 一种硬件控制锁的托管方法、装置及系统 | |
JP2001249901A (ja) | 認証装置およびその方法、並びに、記憶媒体 | |
CN100428106C (zh) | 硬件令牌自登记过程 | |
US20150143129A1 (en) | Secure mobile identity | |
TW202213147A (zh) | 分散式匿名化相容加密管理系統 | |
CN110505199A (zh) | 基于轻量级非对称身份的Email安全登录方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
ASS | Succession or assignment of patent right |
Owner name: AOL COMPANY Free format text: FORMER OWNER: AOL LIMITED LIABILITY COMPANY Effective date: 20131220 Owner name: MARATHON SOLUTIONS LLC Free format text: FORMER OWNER: AOL COMPANY Effective date: 20131220 |
|
C41 | Transfer of patent application or patent right or utility model | ||
C56 | Change in the name or address of the patentee |
Owner name: AOL LIMITED LIABILITY COMPANY Free format text: FORMER NAME: AMERICAN ON-LINE |
|
CP03 | Change of name, title or address |
Address after: Delaware Patentee after: Oath Inc. Address before: Virginia Patentee before: AMERICA ONLINE Inc. |
|
TR01 | Transfer of patent right |
Effective date of registration: 20131220 Address after: Nevada Patentee after: Marathon solutions LLC Address before: Delaware Patentee before: AOL Co. Effective date of registration: 20131220 Address after: Delaware Patentee after: AOL Co. Address before: Delaware Patentee before: Oath Inc. |
|
ASS | Succession or assignment of patent right |
Owner name: BRIGHT SUN TECHNOLOGIES LTD., UNITED INSURANCE TRU Free format text: FORMER OWNER: MARATHON SOLUTIONS LLC Effective date: 20150724 |
|
C41 | Transfer of patent application or patent right or utility model | ||
TR01 | Transfer of patent right |
Effective date of registration: 20150724 Address after: American California Patentee after: Canyang Technology Company, United Insurance Trust I Series 42 Address before: Nevada Patentee before: Marathon solutions LLC |
|
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20081022 Termination date: 20181220 |