CN1413320B - 鉴别匿名用户同时减少潜在“中间人”舞弊的方法 - Google Patents
鉴别匿名用户同时减少潜在“中间人”舞弊的方法 Download PDFInfo
- Publication number
- CN1413320B CN1413320B CN008175438A CN00817543A CN1413320B CN 1413320 B CN1413320 B CN 1413320B CN 008175438 A CN008175438 A CN 008175438A CN 00817543 A CN00817543 A CN 00817543A CN 1413320 B CN1413320 B CN 1413320B
- Authority
- CN
- China
- Prior art keywords
- user
- information
- component
- difficult problem
- value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3674—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Business, Economics & Management (AREA)
- Signal Processing (AREA)
- Accounting & Taxation (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Pinball Game Machines (AREA)
- Time Recorders, Dirve Recorders, Access Control (AREA)
- Saccharide Compounds (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US09/468,557 US6944765B1 (en) | 1999-12-21 | 1999-12-21 | Method of authentication anonymous users while reducing potential for “middleman” fraud |
| US09/468,557 | 1999-12-21 | ||
| PCT/US2000/034981 WO2001046787A2 (en) | 1999-12-21 | 2000-12-21 | Method of authenticating users of software |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN1413320A CN1413320A (zh) | 2003-04-23 |
| CN1413320B true CN1413320B (zh) | 2010-05-12 |
Family
ID=23860287
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN008175438A Expired - Lifetime CN1413320B (zh) | 1999-12-21 | 2000-12-21 | 鉴别匿名用户同时减少潜在“中间人”舞弊的方法 |
Country Status (12)
| Country | Link |
|---|---|
| US (1) | US6944765B1 (enExample) |
| EP (1) | EP1261903B2 (enExample) |
| JP (1) | JP4782343B2 (enExample) |
| KR (1) | KR100833828B1 (enExample) |
| CN (1) | CN1413320B (enExample) |
| AT (1) | ATE342539T1 (enExample) |
| AU (1) | AU2592201A (enExample) |
| BR (1) | BRPI0016507B1 (enExample) |
| DE (1) | DE60031304T3 (enExample) |
| HK (1) | HK1052570A1 (enExample) |
| TW (1) | TW498233B (enExample) |
| WO (1) | WO2001046787A2 (enExample) |
Families Citing this family (28)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7143163B1 (en) * | 2000-07-26 | 2006-11-28 | Lucent Technologies Inc. | System and method for exacting a system resource access cost |
| US7356696B1 (en) * | 2000-08-01 | 2008-04-08 | Lucent Technologies Inc. | Proofs of work and bread pudding protocols |
| GB2375970B (en) * | 2001-05-31 | 2005-11-23 | Nokia Corp | Electronic gaming |
| JP3668175B2 (ja) * | 2001-10-24 | 2005-07-06 | 株式会社東芝 | 個人認証方法、個人認証装置および個人認証システム |
| US7603452B1 (en) | 2002-03-26 | 2009-10-13 | Symantec Corporation | Networked computer environment assurance system and method |
| US20030233584A1 (en) * | 2002-06-14 | 2003-12-18 | Microsoft Corporation | Method and system using combinable computational puzzles as challenges to network entities for identity check |
| CA2508526A1 (en) * | 2002-12-03 | 2004-06-17 | Funk Software, Inc. | Tunneled authentication protocol for preventing man-in-the-middle attacks |
| US7606915B1 (en) * | 2003-02-25 | 2009-10-20 | Microsoft Corporation | Prevention of unauthorized scripts |
| US8892673B1 (en) * | 2003-08-08 | 2014-11-18 | Radix Holdings, Llc | Hybrid challenge-response |
| US7694335B1 (en) * | 2004-03-09 | 2010-04-06 | Cisco Technology, Inc. | Server preventing attacks by generating a challenge having a computational request and a secure cookie for processing by a client |
| US7757086B2 (en) * | 2004-05-27 | 2010-07-13 | Silverbrook Research Pty Ltd | Key transportation |
| US7427117B2 (en) * | 2004-05-27 | 2008-09-23 | Silverbrook Research Pty Ltd | Method of expelling ink from nozzles in groups, alternately, starting at outside nozzles of each group |
| US7549718B2 (en) * | 2004-05-27 | 2009-06-23 | Silverbrook Research Pty Ltd | Printhead module having operation controllable on basis of thermal sensors |
| US7848501B2 (en) * | 2005-01-25 | 2010-12-07 | Microsoft Corporation | Storage abuse prevention |
| KR100786796B1 (ko) * | 2005-03-25 | 2007-12-18 | 주식회사 다음커뮤니케이션 | 인터넷 광고 과금 방법 및 시스템 |
| US7730532B1 (en) * | 2005-06-13 | 2010-06-01 | Symantec Corporation | Automatic tracking cookie detection |
| KR20060028463A (ko) * | 2006-03-09 | 2006-03-29 | 정성욱 | 온라인 광고 시스템에서의 이용자 부정 클릭 추적과 방지시스템 및 그 방법 |
| KR20080026856A (ko) * | 2006-09-21 | 2008-03-26 | 삼성전자주식회사 | 휴대 단말기의 메시지 송수신 방법 |
| US8683549B2 (en) * | 2007-03-23 | 2014-03-25 | Microsoft Corporation | Secure data storage and retrieval incorporating human participation |
| US8793497B2 (en) * | 2008-05-09 | 2014-07-29 | Qualcomm Incorporated | Puzzle-based authentication between a token and verifiers |
| US8892881B2 (en) * | 2009-03-03 | 2014-11-18 | The Governing Council Of The University Of Toronto | Split key secure access system |
| US9306905B2 (en) * | 2011-12-20 | 2016-04-05 | Tata Consultancy Services Ltd. | Secure access to application servers using out-of-band communication |
| EP2736213B1 (en) * | 2012-11-21 | 2015-10-21 | Mitsubishi Electric R&D Centre Europe B.V. | Method and system for authenticating at least one terminal requesting access to at least one resource |
| US9265458B2 (en) | 2012-12-04 | 2016-02-23 | Sync-Think, Inc. | Application of smooth pursuit cognitive testing paradigms to clinical drug development |
| US9380976B2 (en) | 2013-03-11 | 2016-07-05 | Sync-Think, Inc. | Optical neuroinformatics |
| CN107835077B (zh) * | 2017-09-22 | 2020-10-02 | 中国人民解放军国防科技大学 | 一种面向车载网匿名认证的互信簇协同验证方法 |
| EP3716570B1 (en) * | 2019-03-29 | 2022-07-27 | Mitsubishi Electric R&D Centre Europe B.V. | Computational puzzles against dos attacks |
| RU2722925C1 (ru) * | 2019-10-09 | 2020-06-04 | Общество с ограниченной ответственностью "Доверенные Решения" (ООО "Доверенные Решения") | Способ защищенного информационного обмена данными |
Family Cites Families (20)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4964163A (en) * | 1988-04-04 | 1990-10-16 | Motorola, Inc. | Method and apparatus for controlling access to a communication system |
| US5241599A (en) * | 1991-10-02 | 1993-08-31 | At&T Bell Laboratories | Cryptographic protocol for secure communications |
| US5311596A (en) * | 1992-08-31 | 1994-05-10 | At&T Bell Laboratories | Continuous authentication using an in-band or out-of-band side channel |
| TW237588B (enExample) * | 1993-06-07 | 1995-01-01 | Microsoft Corp | |
| US5825880A (en) * | 1994-01-13 | 1998-10-20 | Sudia; Frank W. | Multi-step digital signature method and system |
| US5757907A (en) * | 1994-04-25 | 1998-05-26 | International Business Machines Corporation | Method and apparatus for enabling trial period use of software products: method and apparatus for generating a machine-dependent identification |
| US5724425A (en) * | 1994-06-10 | 1998-03-03 | Sun Microsystems, Inc. | Method and apparatus for enhancing software security and distributing software |
| US5790667A (en) * | 1995-01-20 | 1998-08-04 | Matsushita Electric Industrial Co., Ltd. | Personal authentication method |
| JP3497936B2 (ja) * | 1995-01-20 | 2004-02-16 | 松下電器産業株式会社 | 個人認証方法 |
| US5970143A (en) * | 1995-11-22 | 1999-10-19 | Walker Asset Management Lp | Remote-auditing of computer generated outcomes, authenticated billing and access control, and software metering system using cryptographic and other protocols |
| US5768382A (en) * | 1995-11-22 | 1998-06-16 | Walker Asset Management Limited Partnership | Remote-auditing of computer generated outcomes and authenticated biling and access control system using cryptographic and other protocols |
| US6073236A (en) * | 1996-06-28 | 2000-06-06 | Sony Corporation | Authentication method, communication method, and information processing apparatus |
| US6148083A (en) * | 1996-08-23 | 2000-11-14 | Hewlett-Packard Company | Application certification for an international cryptography framework |
| US5841870A (en) * | 1996-11-12 | 1998-11-24 | Cheyenne Property Trust | Dynamic classes of service for an international cryptography framework |
| US5796952A (en) * | 1997-03-21 | 1998-08-18 | Dot Com Development, Inc. | Method and apparatus for tracking client interaction with a network resource and creating client profiles and resource database |
| EP0895149B1 (en) * | 1997-07-31 | 2003-09-17 | Siemens Aktiengesellschaft | Computer system for protecting a file and a method for protecting a file |
| US6151676A (en) * | 1997-12-24 | 2000-11-21 | Philips Electronics North America Corporation | Administration and utilization of secret fresh random numbers in a networked environment |
| US6141010A (en) * | 1998-07-17 | 2000-10-31 | B. E. Technology, Llc | Computer interface method and apparatus with targeted advertising |
| JP4651212B2 (ja) * | 2001-03-22 | 2011-03-16 | 大日本印刷株式会社 | 携帯可能情報記憶媒体およびその認証方法 |
| CN101241735B (zh) * | 2003-07-07 | 2012-07-18 | 罗威所罗生股份有限公司 | 重放加密的视听内容的方法 |
-
1999
- 1999-12-21 US US09/468,557 patent/US6944765B1/en not_active Expired - Lifetime
-
2000
- 2000-12-21 BR BRPI0016507A patent/BRPI0016507B1/pt not_active IP Right Cessation
- 2000-12-21 AT AT00989414T patent/ATE342539T1/de not_active IP Right Cessation
- 2000-12-21 WO PCT/US2000/034981 patent/WO2001046787A2/en not_active Ceased
- 2000-12-21 DE DE60031304T patent/DE60031304T3/de not_active Expired - Lifetime
- 2000-12-21 KR KR1020027007813A patent/KR100833828B1/ko not_active Expired - Fee Related
- 2000-12-21 CN CN008175438A patent/CN1413320B/zh not_active Expired - Lifetime
- 2000-12-21 HK HK03104853.5A patent/HK1052570A1/zh unknown
- 2000-12-21 AU AU25922/01A patent/AU2592201A/en not_active Abandoned
- 2000-12-21 JP JP2001547237A patent/JP4782343B2/ja not_active Expired - Fee Related
- 2000-12-21 EP EP00989414A patent/EP1261903B2/en not_active Expired - Lifetime
-
2001
- 2001-01-20 TW TW089127512A patent/TW498233B/zh not_active IP Right Cessation
Also Published As
| Publication number | Publication date |
|---|---|
| KR20020091059A (ko) | 2002-12-05 |
| HK1052570A1 (zh) | 2003-09-19 |
| EP1261903A2 (en) | 2002-12-04 |
| WO2001046787A3 (en) | 2002-09-26 |
| DE60031304D1 (de) | 2006-11-23 |
| KR100833828B1 (ko) | 2008-06-02 |
| EP1261903B1 (en) | 2006-10-11 |
| JP4782343B2 (ja) | 2011-09-28 |
| DE60031304T2 (de) | 2007-05-24 |
| JP2003520467A (ja) | 2003-07-02 |
| AU2592201A (en) | 2001-07-03 |
| TW498233B (en) | 2002-08-11 |
| BRPI0016507B1 (pt) | 2016-02-10 |
| ATE342539T1 (de) | 2006-11-15 |
| WO2001046787A2 (en) | 2001-06-28 |
| US6944765B1 (en) | 2005-09-13 |
| DE60031304T3 (de) | 2010-07-01 |
| BR0016507A (pt) | 2002-12-24 |
| EP1261903B2 (en) | 2009-10-07 |
| CN1413320A (zh) | 2003-04-23 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN1413320B (zh) | 鉴别匿名用户同时减少潜在“中间人”舞弊的方法 | |
| Diffie et al. | New directions in cryptography | |
| US7603560B2 (en) | Method and apparatus for digital signature authentication | |
| US8300811B2 (en) | Method and device for processing data | |
| CN113051590B (zh) | 一种数据处理方法和相关设备 | |
| CN112152792A (zh) | 基于mts的相互认证的远程证明 | |
| CN107483212A (zh) | 一种双方协作生成数字签名的方法 | |
| JP2002520905A (ja) | 漏洩抵抗力を有する暗号索引付き鍵の更新方法及びデバイス | |
| Wu et al. | An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks | |
| CN118984214B (zh) | 一种分布式抗量子数字签名方法及系统 | |
| JP2004512570A (ja) | 非安全な暗号加速器を用いる方法と装置 | |
| Chattopadhyay et al. | An efficient verifiable (t, n)-threshold secret image sharing scheme with ultralight shares | |
| CN109728905B (zh) | 基于非对称密钥池的抗量子计算mqv密钥协商方法和系统 | |
| JP2002536875A (ja) | 減少した計算組を伴う認証または署名プロセス | |
| CN113536336B (zh) | 一种数据共享方法、装置、终端及存储介质 | |
| JP4706811B2 (ja) | 依頼計算を用いた演算装置、及び記録媒体 | |
| CN110677253A (zh) | 基于非对称密钥池和ecc的抗量子计算rfid认证方法及系统 | |
| CN110519045B (zh) | 基于群组非对称密钥池的抗量子计算联盟链交易方法、系统 | |
| CN117134900A (zh) | 一种实现非对称加密的结构及控制方法 | |
| KR20040096509A (ko) | 다수의 엔티티와 그에 따른 장치에 부하를 분배하는암호화 방법 | |
| Dufka et al. | SHINE: Resilience via Practical Interoperability of Multi-party Schnorr Signature Schemes. | |
| JP5101535B2 (ja) | 認証方法、認証システム、プログラムおよび共有鍵生成方法 | |
| Al-bakri et al. | A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael | |
| JP2833747B2 (ja) | 鍵生成装置 | |
| Paar et al. | Digital Signatures |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C14 | Grant of patent or utility model | ||
| GR01 | Patent grant | ||
| REG | Reference to a national code |
Ref country code: HK Ref legal event code: WD Ref document number: 1052570 Country of ref document: HK |
|
| CX01 | Expiry of patent term |
Granted publication date: 20100512 |
|
| CX01 | Expiry of patent term |