CN1689297A - 使用密钥基防止未经授权分发和使用电子密钥的方法 - Google Patents
使用密钥基防止未经授权分发和使用电子密钥的方法 Download PDFInfo
- Publication number
- CN1689297A CN1689297A CN03816358.6A CN03816358A CN1689297A CN 1689297 A CN1689297 A CN 1689297A CN 03816358 A CN03816358 A CN 03816358A CN 1689297 A CN1689297 A CN 1689297A
- Authority
- CN
- China
- Prior art keywords
- key
- main frame
- electronic
- described electronic
- electronic transaction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 54
- 238000009826 distribution Methods 0.000 title description 11
- 238000003860 storage Methods 0.000 claims abstract description 13
- 230000006870 function Effects 0.000 claims description 69
- 230000015654 memory Effects 0.000 claims description 37
- 238000009434 installation Methods 0.000 claims description 21
- 230000008878 coupling Effects 0.000 claims description 2
- 238000010168 coupling process Methods 0.000 claims description 2
- 238000005859 coupling reaction Methods 0.000 claims description 2
- 238000004321 preservation Methods 0.000 claims 4
- 238000012217 deletion Methods 0.000 claims 1
- 230000037430 deletion Effects 0.000 claims 1
- 238000004891 communication Methods 0.000 description 15
- 230000005540 biological transmission Effects 0.000 description 9
- 230000008901 benefit Effects 0.000 description 4
- 238000009795 derivation Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 238000011160 research Methods 0.000 description 3
- 238000012546 transfer Methods 0.000 description 3
- 230000006378 damage Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000003203 everyday effect Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000011084 recovery Methods 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- CVOFKRWYWCSDMA-UHFFFAOYSA-N 2-chloro-n-(2,6-diethylphenyl)-n-(methoxymethyl)acetamide;2,6-dinitro-n,n-dipropyl-4-(trifluoromethyl)aniline Chemical compound CCC1=CC=CC(CC)=C1N(COC)C(=O)CCl.CCCN(CCC)C1=C([N+]([O-])=O)C=C(C(F)(F)F)C=C1[N+]([O-])=O CVOFKRWYWCSDMA-UHFFFAOYSA-N 0.000 description 1
- 230000003213 activating effect Effects 0.000 description 1
- 230000003044 adaptive effect Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 230000002354 daily effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 201000006549 dyspepsia Diseases 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000005670 electromagnetic radiation Effects 0.000 description 1
- 230000002427 irreversible effect Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 206010025482 malaise Diseases 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000007620 mathematical function Methods 0.000 description 1
- 238000012797 qualification Methods 0.000 description 1
- 230000001052 transient effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
- H04L9/0897—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/061—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
Claims (38)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/192,920 US7352867B2 (en) | 2002-07-10 | 2002-07-10 | Method of preventing unauthorized distribution and use of electronic keys using a key seed |
US10/192,920 | 2002-07-10 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1689297A true CN1689297A (zh) | 2005-10-26 |
CN1689297B CN1689297B (zh) | 2014-01-08 |
Family
ID=30114424
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN03816358.6A Expired - Lifetime CN1689297B (zh) | 2002-07-10 | 2003-07-08 | 使用密钥基防止未经授权分发和使用电子密钥的方法 |
Country Status (8)
Country | Link |
---|---|
US (1) | US7352867B2 (zh) |
EP (1) | EP1520392B1 (zh) |
JP (1) | JP5295479B2 (zh) |
CN (1) | CN1689297B (zh) |
AU (1) | AU2003256388A1 (zh) |
CA (1) | CA2491049C (zh) |
MX (1) | MXPA05000472A (zh) |
WO (1) | WO2004006536A2 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102163178A (zh) * | 2010-02-24 | 2011-08-24 | 上海果壳电子有限公司 | 数据安全存储方法 |
CN101222324B (zh) * | 2008-01-23 | 2012-02-08 | 中兴通讯股份有限公司 | 用于端到端的媒体流安全的实现方法和装置 |
Families Citing this family (50)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPWO2004109972A1 (ja) * | 2003-06-05 | 2006-07-20 | 松下電器産業株式会社 | ライセンス受信用ユーザ端末 |
US20050135622A1 (en) * | 2003-12-18 | 2005-06-23 | Fors Chad M. | Upper layer security based on lower layer keying |
US8085938B2 (en) * | 2004-02-10 | 2011-12-27 | Ntt Communications Corporation | Secret information management scheme based on secret sharing scheme |
US8407752B2 (en) * | 2004-03-18 | 2013-03-26 | Digimarc Corporation | Synchronizing broadcast content with corresponding network content |
US20090294523A1 (en) * | 2005-01-03 | 2009-12-03 | Marano Robert F | Method, System and Device for Identification from Multiple Data Inputs |
US8332355B2 (en) * | 2005-03-28 | 2012-12-11 | Symantec Corporation | Method and apparatus for generating readable, unique identifiers |
US20070203843A1 (en) * | 2005-05-09 | 2007-08-30 | Lauri Tarkkala | System and method for efficient encryption and decryption of drm rights objects |
US20080031451A1 (en) * | 2005-11-14 | 2008-02-07 | Jean-Francois Poirier | Method and system for security of data transmissions |
US8788807B2 (en) * | 2006-01-13 | 2014-07-22 | Qualcomm Incorporated | Privacy protection in communication systems |
JP4829639B2 (ja) * | 2006-02-24 | 2011-12-07 | キヤノン株式会社 | データ処理装置およびデータ処理方法 |
US7848524B2 (en) * | 2006-06-30 | 2010-12-07 | Verint Americas Inc. | Systems and methods for a secure recording environment |
US7853800B2 (en) * | 2006-06-30 | 2010-12-14 | Verint Americas Inc. | Systems and methods for a secure recording environment |
US8826023B1 (en) * | 2006-06-30 | 2014-09-02 | Symantec Operating Corporation | System and method for securing access to hash-based storage systems |
US7769176B2 (en) | 2006-06-30 | 2010-08-03 | Verint Americas Inc. | Systems and methods for a secure recording environment |
US7953750B1 (en) | 2006-09-28 | 2011-05-31 | Verint Americas, Inc. | Systems and methods for storing and searching data in a customer center environment |
US7613915B2 (en) * | 2006-11-09 | 2009-11-03 | BroadOn Communications Corp | Method for programming on-chip non-volatile memory in a secure processor, and a device so programmed |
US8291227B2 (en) * | 2007-02-02 | 2012-10-16 | Red Hat, Inc. | Method and apparatus for secure communication |
US8281405B1 (en) * | 2007-06-13 | 2012-10-02 | Mcafee, Inc. | System, method, and computer program product for securing data on a server based on a heuristic analysis |
US20090034852A1 (en) * | 2007-07-31 | 2009-02-05 | Chris Brock | Method and System for Identifying the Source of an Image |
MX2010001748A (es) * | 2007-08-14 | 2010-12-15 | Triton Systems Of Delaware Llc | Metodo y sistema para la transferencia remota segura de claves maestras para cajeros automaticos de bancos. |
JP2009070119A (ja) * | 2007-09-13 | 2009-04-02 | Riso Kagaku Corp | 画像形成システム |
US20090202081A1 (en) * | 2008-02-08 | 2009-08-13 | Ayman Hammad | Key delivery system and method |
US8625785B2 (en) * | 2008-05-15 | 2014-01-07 | Qualcomm Incorporated | Identity based symmetric cryptosystem using secure biometric model |
US8401155B1 (en) | 2008-05-23 | 2013-03-19 | Verint Americas, Inc. | Systems and methods for secure recording in a customer center environment |
US9704159B2 (en) | 2009-05-15 | 2017-07-11 | Entit Software Llc | Purchase transaction system with encrypted transaction information |
EP2438580A2 (en) | 2009-06-02 | 2012-04-11 | Voltage Security, Inc. | Purchase transaction system with encrypted payment card data |
WO2011089143A1 (en) * | 2010-01-20 | 2011-07-28 | Intrinsic Id B.V. | Device and method for obtaining a cryptographic key |
EP2393029A1 (en) * | 2010-06-04 | 2011-12-07 | Nagravision S.A. | Method for activating at least a function on a chipset and chipset for the implementation of the method |
US10318932B2 (en) | 2011-06-07 | 2019-06-11 | Entit Software Llc | Payment card processing system with structure preserving encryption |
IL213497A0 (en) | 2011-06-12 | 2011-08-31 | Eliphaz Hibshoosh | Light public key cryptography |
US8914635B2 (en) * | 2011-07-25 | 2014-12-16 | Grey Heron Technologies, Llc | Method and system for establishing secure communications using composite key cryptography |
ES2691046T3 (es) * | 2011-11-11 | 2018-11-23 | Soprano Design Limited | Mensajería segura |
US8953790B2 (en) * | 2011-11-21 | 2015-02-10 | Broadcom Corporation | Secure generation of a device root key in the field |
CN102660714B (zh) * | 2012-06-05 | 2013-12-18 | 河南理工大学 | 一种高碳高钒耐磨钢 |
JP5908376B2 (ja) * | 2012-09-06 | 2016-04-26 | Kddi株式会社 | 秘密鍵生成装置、秘密鍵生成方法およびプログラム |
US9197408B2 (en) * | 2013-05-10 | 2015-11-24 | Sap Se | Systems and methods for providing a secure data exchange |
US9906372B2 (en) | 2013-06-03 | 2018-02-27 | Intel Deutschland Gmbh | Authentication devices, key generator devices, methods for controlling an authentication device, and methods for controlling a key generator |
EP3086585B1 (en) * | 2015-04-23 | 2019-12-11 | Nxp B.V. | Method and system for securing data communicated in a network |
JP2017118312A (ja) * | 2015-12-24 | 2017-06-29 | 日本電気株式会社 | 無線通信システム、サーバ、端末、無線通信方法、および、プログラム |
CA3016611C (en) * | 2016-03-14 | 2021-01-19 | Arris Enterprises Llc | Cable modem anti-cloning |
US11387996B2 (en) | 2016-03-14 | 2022-07-12 | Arris Enterprises Llc | Cable modem anti-cloning |
US10880090B2 (en) | 2016-03-14 | 2020-12-29 | Arris Enterprises Llc | Cable modem anti-cloning |
US9978192B1 (en) * | 2016-07-14 | 2018-05-22 | Guestof, LLC | Method and apparatus for streamlining guest entry into a building |
US20180097621A1 (en) * | 2016-09-30 | 2018-04-05 | Sony Interactive Entertainment America Llc | Obfuscated secret key derivation for non-secure commercial off-the-shelf (cots) devices |
US10498533B2 (en) * | 2016-12-16 | 2019-12-03 | Keysight Technologies Singapore (Sales) Pte. Ltd. | Methods, systems, and computer readable media for increasing the rate of established network connections in a test simulation environment |
JP2021177581A (ja) * | 2018-07-23 | 2021-11-11 | 株式会社AndGo | 秘密情報を管理するための機器、方法及びそのためのプログラム |
WO2020144758A1 (ja) * | 2019-01-09 | 2020-07-16 | 三菱電機株式会社 | 秘密計算装置及びクライアント装置 |
CN109768863A (zh) * | 2019-01-16 | 2019-05-17 | 杭州趣链科技有限公司 | 一种基于椭圆曲线的区块链密钥共享和动态更新方法 |
US11063753B2 (en) | 2019-03-20 | 2021-07-13 | Arris Enterprises Llc | Secure distribution of device key sets over a network |
JP7160443B2 (ja) * | 2020-04-24 | 2022-10-25 | 日本電気株式会社 | 無線通信システム、サーバ、端末、無線通信方法、および、プログラム |
Family Cites Families (63)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4634808A (en) * | 1984-03-15 | 1987-01-06 | M/A-Com Government Systems, Inc. | Descrambler subscriber key production system utilizing key seeds stored in descrambler |
JP2862141B2 (ja) * | 1989-12-29 | 1999-02-24 | 富士通株式会社 | 慣用暗号を用いた識別番号ベース鍵管理装置 |
US5265164A (en) * | 1991-10-31 | 1993-11-23 | International Business Machines Corporation | Cryptographic facility environment backup/restore and replication in a public key cryptosystem |
US5418854A (en) * | 1992-04-28 | 1995-05-23 | Digital Equipment Corporation | Method and apparatus for protecting the confidentiality of passwords in a distributed data processing system |
CA2176032A1 (en) * | 1994-01-13 | 1995-07-20 | Bankers Trust Company | Cryptographic system and method with key escrow feature |
US5598473A (en) * | 1994-08-17 | 1997-01-28 | Ibm Corporation | Digital signature generator/verifier/recorder (DS-GVR) for analog transmissions |
US5727065A (en) * | 1994-11-14 | 1998-03-10 | Hughes Electronics | Deferred billing, broadcast, electronic document distribution system and method |
US5701343A (en) * | 1994-12-01 | 1997-12-23 | Nippon Telegraph & Telephone Corporation | Method and system for digital information protection |
JPH08223151A (ja) * | 1995-02-13 | 1996-08-30 | Nippon Telegr & Teleph Corp <Ntt> | 暗号化通信システム及び暗号化通信方法 |
EP1526472A3 (en) * | 1995-02-13 | 2006-07-26 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
GB9507885D0 (en) * | 1995-04-18 | 1995-05-31 | Hewlett Packard Co | Methods and apparatus for authenticating an originator of a message |
US6487661B2 (en) * | 1995-04-21 | 2002-11-26 | Certicom Corp. | Key agreement and transport protocol |
US6292893B1 (en) * | 1995-10-24 | 2001-09-18 | Silvio Micali | Certificate revocation system |
FR2744818B1 (fr) * | 1996-02-12 | 1998-03-27 | Bull Sa | Procede de verification de la conservation de l'integrite d'une requete emise sans protection par un client vers un serveur au moyen de l'integrite de la reponse |
JP3486043B2 (ja) * | 1996-03-11 | 2004-01-13 | 株式会社東芝 | ソフトウエア流通システムの動作方法及びソフトウエアシステム |
US6002768A (en) * | 1996-05-07 | 1999-12-14 | International Computer Science Institute | Distributed registration and key distribution system and method |
US6085320A (en) * | 1996-05-15 | 2000-07-04 | Rsa Security Inc. | Client/server protocol for proving authenticity |
US5809495A (en) * | 1996-06-04 | 1998-09-15 | Oracle Corporation | Method for obtaining information regarding the current activity of a database management system from a viritual table in a memory of the database management system |
SG67354A1 (en) * | 1996-06-27 | 1999-09-21 | Inst Of Systems Science Nation | Computationally efficient method for trusted and dynamic digital objects dissemination |
US6600823B1 (en) * | 1996-10-22 | 2003-07-29 | Unisys Corporation | Apparatus and method for enhancing check security |
US6240513B1 (en) * | 1997-01-03 | 2001-05-29 | Fortress Technologies, Inc. | Network security device |
WO1998045980A2 (en) * | 1997-03-10 | 1998-10-15 | Fielder Guy L | Secure deterministic encryption key generator system and method |
WO1998047259A2 (en) * | 1997-03-10 | 1998-10-22 | Fielder Guy L | File encryption method and system |
US6028933A (en) * | 1997-04-17 | 2000-02-22 | Lucent Technologies Inc. | Encrypting method and apparatus enabling multiple access for multiple services and multiple transmission modes over a broadband communication network |
JPH10327147A (ja) * | 1997-05-21 | 1998-12-08 | Hitachi Ltd | 電子認証公証方法およびシステム |
US6282295B1 (en) * | 1997-10-28 | 2001-08-28 | Adam Lucas Young | Auto-recoverable and auto-certifiable cryptostem using zero-knowledge proofs for key escrow in general exponential ciphers |
US6389136B1 (en) * | 1997-05-28 | 2002-05-14 | Adam Lucas Young | Auto-Recoverable and Auto-certifiable cryptosystems with RSA or factoring based keys |
US6122742A (en) * | 1997-06-18 | 2000-09-19 | Young; Adam Lucas | Auto-recoverable and auto-certifiable cryptosystem with unescrowed signing keys |
US6202150B1 (en) * | 1997-05-28 | 2001-03-13 | Adam Lucas Young | Auto-escrowable and auto-certifiable cryptosystems |
US6243466B1 (en) * | 1997-08-29 | 2001-06-05 | Adam Lucas Young | Auto-escrowable and auto-certifiable cryptosystems with fast key generation |
TW338865B (en) * | 1997-06-03 | 1998-08-21 | Philips Eloctronics N V | Authentication system |
US6370249B1 (en) * | 1997-07-25 | 2002-04-09 | Entrust Technologies, Ltd. | Method and apparatus for public key management |
US6681017B1 (en) * | 1997-09-03 | 2004-01-20 | Lucent Technologies Inc. | Simplified secure shared key establishment and data delivery protocols for electronic commerce |
US6263437B1 (en) * | 1998-02-19 | 2001-07-17 | Openware Systems Inc | Method and apparatus for conducting crypto-ignition processes between thin client devices and server devices over data networks |
US6230269B1 (en) * | 1998-03-04 | 2001-05-08 | Microsoft Corporation | Distributed authentication system and method |
US6167518A (en) * | 1998-07-28 | 2000-12-26 | Commercial Electronics, Llc | Digital signature providing non-repudiation based on biological indicia |
IL126472A0 (en) * | 1998-10-07 | 1999-08-17 | Nds Ltd | Secure communications system |
JP2000113085A (ja) * | 1998-10-08 | 2000-04-21 | Sony Corp | 電子現金システム |
FI109278B (fi) * | 1998-11-25 | 2002-06-28 | Veikkaus Ab Oy | Menetelmä ja järjestelmä sähköisten pika-arpajaisten järjestämiseksi |
JP2000165373A (ja) * | 1998-11-25 | 2000-06-16 | Toshiba Corp | 暗号装置、暗号通信システム及び鍵復元システム並びに記憶媒体 |
US6473508B1 (en) * | 1998-12-22 | 2002-10-29 | Adam Lucas Young | Auto-recoverable auto-certifiable cryptosystems with unescrowed signature-only keys |
JP2000286830A (ja) * | 1999-03-29 | 2000-10-13 | Seiko Epson Corp | 暗号通信システムにおける暗号化処理方法 |
CA2267395C (en) * | 1999-03-30 | 2002-07-09 | Ibm Canada Limited-Ibm Canada Limitee | Method and system for managing keys for encrypted data |
CN1175613C (zh) * | 1999-06-03 | 2004-11-10 | 叶季青 | 生成防伪认证数据的方法与装置,其认证方法与装置及系统 |
GB2355905B (en) | 1999-10-05 | 2002-03-20 | Authoriszor Ltd | System and method for providing security for a network site |
US6775771B1 (en) * | 1999-12-14 | 2004-08-10 | International Business Machines Corporation | Method and system for presentation and manipulation of PKCS authenticated-data objects |
US6914985B1 (en) * | 1999-12-14 | 2005-07-05 | International Business Machines Corporation | Method and system for presentation and manipulation of PKCS enveloped-data objects |
US6772340B1 (en) * | 2000-01-14 | 2004-08-03 | Microsoft Corporation | Digital rights management system operating on computing device and having black box tied to computing device |
JP2001211153A (ja) * | 2000-01-25 | 2001-08-03 | Murata Mach Ltd | 秘密鍵生成方法 |
JP4457474B2 (ja) * | 2000-04-04 | 2010-04-28 | ソニー株式会社 | 情報記録装置、情報再生装置、情報記録方法、情報再生方法、および情報記録媒体、並びにプログラム提供媒体 |
US20020196935A1 (en) * | 2001-02-25 | 2002-12-26 | Storymail, Inc. | Common security protocol structure and mechanism and system and method for using |
CN1283827A (zh) * | 2000-08-18 | 2001-02-14 | 郝孟一 | 通用电子信息网络认证系统及方法 |
US6895504B1 (en) * | 2000-09-29 | 2005-05-17 | Intel Corporation | Enabling secure communications with a client |
WO2002033883A2 (en) * | 2000-10-18 | 2002-04-25 | Koninklijke Philips Electronics N.V. | Generation of a common encryption key |
US6904419B1 (en) * | 2000-10-23 | 2005-06-07 | Pitney Bowes Inc. | Postal counter postage evidencing system with closed loop verification |
JP2002185443A (ja) * | 2000-12-11 | 2002-06-28 | Hitachi Ltd | 秘密鍵管理方法 |
US6931128B2 (en) * | 2001-01-16 | 2005-08-16 | Microsoft Corporation | Methods and systems for generating encryption keys using random bit generators |
US7269736B2 (en) * | 2001-02-28 | 2007-09-11 | Microsoft Corporation | Distributed cryptographic methods and arrangements |
GB2367986B (en) * | 2001-03-16 | 2002-10-09 | Ericsson Telefon Ab L M | Address mechanisms in internet protocol |
US8255989B2 (en) * | 2001-09-26 | 2012-08-28 | General Instrument Corporation | Access control and key management system for streaming media |
US7487363B2 (en) * | 2001-10-18 | 2009-02-03 | Nokia Corporation | System and method for controlled copying and moving of content between devices and domains based on conditional encryption of content key depending on usage |
US6871206B2 (en) * | 2001-11-20 | 2005-03-22 | Ip-First, Llc | Continuous multi-buffering random number generator |
US20030123667A1 (en) * | 2001-12-28 | 2003-07-03 | Cable Television Laboratories, Inc. | Method for encryption key generation |
-
2002
- 2002-07-10 US US10/192,920 patent/US7352867B2/en not_active Expired - Lifetime
-
2003
- 2003-07-08 MX MXPA05000472A patent/MXPA05000472A/es active IP Right Grant
- 2003-07-08 JP JP2004519897A patent/JP5295479B2/ja not_active Expired - Lifetime
- 2003-07-08 WO PCT/US2003/021088 patent/WO2004006536A2/en active Application Filing
- 2003-07-08 EP EP03763224.7A patent/EP1520392B1/en not_active Expired - Lifetime
- 2003-07-08 AU AU2003256388A patent/AU2003256388A1/en not_active Abandoned
- 2003-07-08 CA CA002491049A patent/CA2491049C/en not_active Expired - Lifetime
- 2003-07-08 CN CN03816358.6A patent/CN1689297B/zh not_active Expired - Lifetime
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101222324B (zh) * | 2008-01-23 | 2012-02-08 | 中兴通讯股份有限公司 | 用于端到端的媒体流安全的实现方法和装置 |
CN102163178A (zh) * | 2010-02-24 | 2011-08-24 | 上海果壳电子有限公司 | 数据安全存储方法 |
Also Published As
Publication number | Publication date |
---|---|
EP1520392A2 (en) | 2005-04-06 |
AU2003256388A8 (en) | 2004-01-23 |
EP1520392B1 (en) | 2018-10-03 |
CN1689297B (zh) | 2014-01-08 |
US7352867B2 (en) | 2008-04-01 |
JP2005532742A (ja) | 2005-10-27 |
CA2491049A1 (en) | 2004-01-15 |
CA2491049C (en) | 2009-09-29 |
MXPA05000472A (es) | 2005-03-23 |
WO2004006536A2 (en) | 2004-01-15 |
US20040008846A1 (en) | 2004-01-15 |
WO2004006536A3 (en) | 2004-04-08 |
AU2003256388A1 (en) | 2004-01-23 |
JP5295479B2 (ja) | 2013-09-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1689297B (zh) | 使用密钥基防止未经授权分发和使用电子密钥的方法 | |
JP4603252B2 (ja) | ユニバーサル一般取引のためのセキュリティフレームワーク及びプロトコル | |
US8171289B2 (en) | Method and apparatus to provide authentication and privacy with low complexity devices | |
US20060195402A1 (en) | Secure data transmission using undiscoverable or black data | |
CN104322003B (zh) | 借助实时加密进行的密码认证和识别方法 | |
US20090187980A1 (en) | Method of authenticating, authorizing, encrypting and decrypting via mobile service | |
CN1261841C (zh) | 用于防止个人计算机被未经授权人员使用的安全系统 | |
CN1202288A (zh) | 文件认证系统及方法 | |
CN106953732B (zh) | 芯片卡的密钥管理系统及方法 | |
CN106936588A (zh) | 一种硬件控制锁的托管方法、装置及系统 | |
TWI476629B (zh) | Data security and security systems and methods | |
JP2008502045A5 (zh) | ||
US20020184501A1 (en) | Method and system for establishing secure data transmission in a data communications network notably using an optical media key encrypted environment (omkee) | |
CN111539032B (zh) | 一种抗量子计算破解的电子签名应用系统及其实现方法 | |
Khan et al. | A tamper-resistant digital token-based rights management system | |
JP2014081887A (ja) | セキュアシングルサインオン方式およびプログラム | |
More et al. | Decentralized Fingerprinting for Secure Peer-To-Peer Data Exchange of Aadhaar Via Public Key Infrastructure | |
Reddy et al. | Data Storage on Cloud using Split-Merge and Hybrid Cryptographic Techniques | |
JP4626001B2 (ja) | 暗号化通信システム及び暗号化通信方法 | |
Yang et al. | Secure Email Login Based on Lightweight Asymmetric Identities | |
TW465213B (en) | Method for performing encryption and decryption via computer and IC card | |
KR20050018982A (ko) | 키 시드를 사용한 전자 키들의 비인가된 분배 및 사용을방지하는 방법 | |
Venkateswari et al. | SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER | |
Rishi et al. | Secure Streaming Server: A Survey | |
Wang et al. | A virtual private network for virtual enterprise information systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
ASS | Succession or assignment of patent right |
Owner name: GENERAL INSTRUMENT HOLDING CO., LTD. Free format text: FORMER OWNER: GENERAL INSTRUMENT CO. Effective date: 20130918 Owner name: MOTOROLA MOBILITY LLC Free format text: FORMER OWNER: GENERAL INSTRUMENT HOLDING CO., LTD. Effective date: 20130918 |
|
C41 | Transfer of patent application or patent right or utility model | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20130918 Address after: Illinois State Applicant after: MOTOROLA MOBILITY LLC Address before: California, USA Applicant before: General instrument Holdings Ltd. Effective date of registration: 20130918 Address after: California, USA Applicant after: General instrument Holdings Ltd. Address before: American Pennsylvania Applicant before: GENERAL INSTRUMENT Corp. |
|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C41 | Transfer of patent application or patent right or utility model | ||
TR01 | Transfer of patent right |
Effective date of registration: 20160525 Address after: California, USA Patentee after: Google Technology Holdings LLC Address before: Illinois State Patentee before: MOTOROLA MOBILITY LLC |
|
CX01 | Expiry of patent term | ||
CX01 | Expiry of patent term |
Granted publication date: 20140108 |