CN1832394B - 用于非对称密钥安全的方法和系统 - Google Patents

用于非对称密钥安全的方法和系统 Download PDF

Info

Publication number
CN1832394B
CN1832394B CN2006100037302A CN200610003730A CN1832394B CN 1832394 B CN1832394 B CN 1832394B CN 2006100037302 A CN2006100037302 A CN 2006100037302A CN 200610003730 A CN200610003730 A CN 200610003730A CN 1832394 B CN1832394 B CN 1832394B
Authority
CN
China
Prior art keywords
server
key
client computer
pki
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN2006100037302A
Other languages
English (en)
Chinese (zh)
Other versions
CN1832394A (zh
Inventor
A·伯兹
A·K·楠达
D·R·希蒙
J·P·休丘科
J·D·本纳龙
K·卡麦龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ivalley Holding Co Ltd
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp filed Critical Microsoft Corp
Publication of CN1832394A publication Critical patent/CN1832394A/zh
Application granted granted Critical
Publication of CN1832394B publication Critical patent/CN1832394B/zh
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • AHUMAN NECESSITIES
    • A45HAND OR TRAVELLING ARTICLES
    • A45DHAIRDRESSING OR SHAVING EQUIPMENT; EQUIPMENT FOR COSMETICS OR COSMETIC TREATMENTS, e.g. FOR MANICURING OR PEDICURING
    • A45D29/00Manicuring or pedicuring implements
    • A45D29/11Polishing devices for nails
    • A45D29/12Polishing devices for nails manually operated
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • G06F21/445Program or device authentication by mutual authentication, e.g. between devices or programs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2129Authenticate client device independently of the user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/061Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
CN2006100037302A 2005-03-07 2006-02-07 用于非对称密钥安全的方法和系统 Active CN1832394B (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11/074,885 2005-03-07
US11/074,885 US7822200B2 (en) 2005-03-07 2005-03-07 Method and system for asymmetric key security

Publications (2)

Publication Number Publication Date
CN1832394A CN1832394A (zh) 2006-09-13
CN1832394B true CN1832394B (zh) 2011-06-29

Family

ID=36587037

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2006100037302A Active CN1832394B (zh) 2005-03-07 2006-02-07 用于非对称密钥安全的方法和系统

Country Status (5)

Country Link
US (1) US7822200B2 (enExample)
EP (1) EP1701283B8 (enExample)
JP (1) JP4896537B2 (enExample)
KR (1) KR101169100B1 (enExample)
CN (1) CN1832394B (enExample)

Families Citing this family (57)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7739500B2 (en) * 2005-03-07 2010-06-15 Microsoft Corporation Method and system for consistent recognition of ongoing digital relationships
WO2006129654A1 (ja) * 2005-06-01 2006-12-07 Matsushita Electric Industrial Co., Ltd. 電子機器、更新サーバ装置、鍵更新装置
US7747540B2 (en) * 2006-02-24 2010-06-29 Microsoft Corporation Account linking with privacy keys
US8495380B2 (en) * 2006-06-06 2013-07-23 Red Hat, Inc. Methods and systems for server-side key generation
US7930759B2 (en) * 2006-11-09 2011-04-19 Kabushiki Kaisha Toshiba Backup system for image forming apparatus and backup method for image forming apparatus
US8352738B2 (en) * 2006-12-01 2013-01-08 Carnegie Mellon University Method and apparatus for secure online transactions
US8291227B2 (en) * 2007-02-02 2012-10-16 Red Hat, Inc. Method and apparatus for secure communication
US8694787B2 (en) * 2007-08-07 2014-04-08 Christophe Niglio Apparatus and method for securing digital data with a security token
JP4995667B2 (ja) * 2007-08-28 2012-08-08 富士通株式会社 情報処理装置、サーバ装置、情報処理プログラム及び方法
JP2009130882A (ja) * 2007-11-28 2009-06-11 Oki Electric Ind Co Ltd チェックバリュー確認方法及び装置
US8321682B1 (en) 2008-01-24 2012-11-27 Jpmorgan Chase Bank, N.A. System and method for generating and managing administrator passwords
US8108777B2 (en) 2008-08-11 2012-01-31 Microsoft Corporation Sections of a presentation having user-definable properties
US9230109B2 (en) * 2008-10-07 2016-01-05 Microsoft Technology Licensing, Llc Trusted platform module security
US8452963B2 (en) * 2009-01-27 2013-05-28 Cisco Technology, Inc. Generating protected access credentials
US9736149B2 (en) * 2009-02-03 2017-08-15 Inbay Technologies Inc. Method and system for establishing trusted communication using a security device
US9485254B2 (en) * 2009-02-03 2016-11-01 Inbay Technologies Inc. Method and system for authenticating a security device
US9548978B2 (en) 2009-02-03 2017-01-17 Inbay Technologies Inc. Method and system for authorizing secure electronic transactions using a security device
US9521142B2 (en) 2009-02-03 2016-12-13 Inbay Technologies Inc. System and method for generating passwords using key inputs and contextual inputs
US9608988B2 (en) 2009-02-03 2017-03-28 Inbay Technologies Inc. Method and system for authorizing secure electronic transactions using a security device having a quick response code scanner
US8352741B2 (en) 2009-06-11 2013-01-08 Microsoft Corporation Discovery of secure network enclaves
US9742560B2 (en) * 2009-06-11 2017-08-22 Microsoft Technology Licensing, Llc Key management in secure network enclaves
US9100171B1 (en) * 2009-12-17 2015-08-04 Secure Forward, LLC Computer-implemented forum for enabling secure exchange of information
EP2526505B1 (en) * 2010-01-20 2015-06-17 Intrinsic ID B.V. Device and method for obtaining a cryptographic key
CN102271330A (zh) * 2010-06-04 2011-12-07 希姆通信息技术(上海)有限公司 终端、网络服务器及终端与网络服务器间的通讯方法
CN101917710A (zh) * 2010-08-27 2010-12-15 中兴通讯股份有限公司 移动互联网加密通讯的方法、系统及相关装置
CN102467711A (zh) * 2010-11-19 2012-05-23 阿奇八八科技股份有限公司 数字版权管理交易系统
US8972746B2 (en) * 2010-12-17 2015-03-03 Intel Corporation Technique for supporting multiple secure enclaves
US20120166792A1 (en) * 2010-12-22 2012-06-28 Tat Kin Tan Efficient nemo security with ibe
DE102011051498A1 (de) * 2011-06-06 2012-12-06 Kobil Systems Gmbh Gesicherter Zugriff auf Daten in einem Gerät
CN103166757B (zh) * 2011-12-19 2016-01-20 卓望数码技术(深圳)有限公司 一种动态保护用户隐私数据的方法及系统
WO2013175640A1 (ja) * 2012-05-25 2013-11-28 株式会社東芝 ホストデバイスおよびホストデバイスにおける認証方法
US20160125416A1 (en) * 2013-05-08 2016-05-05 Acuity Systems, Inc. Authentication system
EP3100408B1 (en) 2014-01-31 2020-04-15 Cryptometry Limited System and method for performing secure communications
CA2942765C (en) * 2014-03-16 2022-05-17 Ric B. Richardson Persistent authentication system incorporating one time pass codes
WO2015179020A2 (en) * 2014-03-27 2015-11-26 Ent Technologies, Inc. Generalized entity network translation (gent)
KR101544722B1 (ko) 2014-11-13 2015-08-18 주식회사 엘지씨엔에스 부인 방지 방법, 이를 위한 결제 관리 서버 및 사용자 단말기
US10454676B2 (en) * 2015-02-13 2019-10-22 International Business Machines Corporation Automatic key management using enterprise user identity management
US10348727B2 (en) 2015-02-13 2019-07-09 International Business Machines Corporation Automatic key management using enterprise user identity management
US10205598B2 (en) * 2015-05-03 2019-02-12 Ronald Francis Sulpizio, JR. Temporal key generation and PKI gateway
WO2016191376A1 (en) * 2015-05-22 2016-12-01 Antique Books, Inc. Initial provisioning through shared proofs of knowledge and crowdsourced identification
CN106332061B (zh) * 2015-06-23 2019-11-05 南京中兴软件有限责任公司 空口引导设置处理方法及终端设备
EP4016920A1 (en) * 2015-06-30 2022-06-22 Visa International Service Association Confidential authentication and provisioning
US9967244B2 (en) * 2015-10-14 2018-05-08 Microsoft Technology Licensing, Llc Multi-factor user authentication framework using asymmetric key
BR112018016234A2 (pt) * 2016-02-23 2019-01-02 nChain Holdings Limited método implementado por computador para controlar o acesso a um recurso, sistemas baseados em computador e método para controle de acesso a uma carteira digital
JP6903064B2 (ja) * 2016-02-23 2021-07-14 エヌチェーン ホールディングス リミテッドNchain Holdings Limited 統合ブロックチェーンに基づくデータ転送制御方法及びシステム
CN105681036B (zh) * 2016-03-10 2018-12-04 上汽通用汽车有限公司 一种获取密钥的方法和装置
US10644875B2 (en) * 2016-04-28 2020-05-05 International Business Machines Corporation Pre-authorization of public key infrastructure
JP6801448B2 (ja) * 2016-12-27 2020-12-16 大日本印刷株式会社 電子情報記憶媒体、認証システム、認証方法、及び認証アプリケーションプログラム
EP3834398A1 (en) * 2018-08-10 2021-06-16 Medroster.com Corporation Encrypted messaging system
CN113330712A (zh) * 2018-11-13 2021-08-31 蓝捕快股份公司 采用基于排列群的加密技术的加密系统及方法
WO2020101325A1 (ko) * 2018-11-13 2020-05-22 (주)블루팝콘 순열그룹 기반의 암호화 기술을 적용한 암호화시스템 및 방법
CN109462481B (zh) * 2018-11-23 2022-04-26 上海扈民区块链科技有限公司 一种基于非对称双线性对的匿签密方法
CN110247762A (zh) * 2019-06-20 2019-09-17 江西金格科技股份有限公司 一种基于sm9算法的可信网站搭建方法
US20220286291A1 (en) * 2019-08-23 2022-09-08 Commonwealth Scientific And Industrial Research Organisation Secure environment for cryptographic key generation
CN113127814B (zh) * 2019-12-31 2023-03-14 杭州海康威视数字技术股份有限公司 软件防抄方法、装置、电子设备及可读存储介质
CN111865592A (zh) * 2020-09-21 2020-10-30 四川科锐得电力通信技术有限公司 物联网设备快速接入方法、装置、物联网平台及存储介质
US20220239502A1 (en) * 2021-01-27 2022-07-28 Anderson Software LLC System to Securely Issue and Count Electronic Ballots

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1478121A2 (en) * 2003-05-09 2004-11-17 Abu, Nor Azman bin Method and apparatus for ID-based public key generation

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6853988B1 (en) * 1999-09-20 2005-02-08 Security First Corporation Cryptographic server with provisions for interoperability between cryptographic systems
EP2429116B1 (en) * 2001-08-13 2013-07-10 The Board of Trustees of the Leland Stanford Junior University Method for identity-based encryption and related crytographic techniques
CN100563242C (zh) 2002-03-20 2009-11-25 捷讯研究有限公司 证书信息存储系统和方法
EP1586054A4 (en) 2002-12-13 2010-12-08 Symantec Corp METHOD, SYSTEM, AND SECURING COMPUTER PROGRAM WITHIN A GLOBAL COMPUTER NETWORK
AU2004100268B9 (en) 2004-04-09 2004-07-15 Lockstep Consulting Pty Ltd Means and method of using cryptographic devices to combat online institution identity theft
US7373505B2 (en) 2004-04-15 2008-05-13 Microsoft Corporation Displaying a security element with a browser window
US7555784B2 (en) 2005-03-04 2009-06-30 Microsoft Corporation Method and system for safely disclosing identity over the internet
US7739500B2 (en) 2005-03-07 2010-06-15 Microsoft Corporation Method and system for consistent recognition of ongoing digital relationships

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1478121A2 (en) * 2003-05-09 2004-11-17 Abu, Nor Azman bin Method and apparatus for ID-based public key generation

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
A.Menezes,P.Van Oorschot,S.Vanstone,.Handbook of Applied Cryptography.CRC Press,Inc,1997,385-424. *
N.Zhang,Q.Shi and M.Merabti.Anonymous public-key certificates for anonymous and fairdocument exchange.IEE PROCEEDINGS:COMMUNICATIONS,INSTITUTION OF ELECTRICAL ENGINEERS147 6.2000,147(6),345-350.
同上.
同上.同上,同上.
同上.同上,同上.;N.Zhang,Q.Shi and M.Merabti.Anonymous public-key certificates for anonymous and fairdocument exchange.IEE PROCEEDINGS:COMMUNICATIONS,INSTITUTION OF ELECTRICAL ENGINEERS147 6.2000,147(6),345-350. *

Also Published As

Publication number Publication date
EP1701283B1 (en) 2017-04-19
JP2006254423A (ja) 2006-09-21
US20060198517A1 (en) 2006-09-07
CN1832394A (zh) 2006-09-13
EP1701283B8 (en) 2017-08-30
US7822200B2 (en) 2010-10-26
KR101169100B1 (ko) 2012-07-26
EP1701283A1 (en) 2006-09-13
JP4896537B2 (ja) 2012-03-14
KR20060097583A (ko) 2006-09-14

Similar Documents

Publication Publication Date Title
CN1832394B (zh) 用于非对称密钥安全的方法和系统
TWI288552B (en) Method for implementing new password and computer readable medium for performing the method
JP4617763B2 (ja) 機器認証システム、機器認証サーバ、端末機器、機器認証方法、および機器認証プログラム
US8621210B2 (en) Ad-hoc trust establishment using visual verification
US20060195402A1 (en) Secure data transmission using undiscoverable or black data
JP2000357156A (ja) 認証シード配布のためのシステムおよび方法
JP2006014325A (ja) ポータブルセキュリティトークンを使用して、ネットワークにおけるデバイス群に関する公開鍵証明を円滑にするための方法及び装置
US20030145237A1 (en) Multiple secure socket layer keyfiles for client login support
JPH07212357A (ja) 非順応暗号システムにおけるメッセージ認証方法及び通信装置
WO2010115607A1 (en) Secure data system
CN116346341A (zh) 私钥保护和服务端访问方法、系统、设备及存储介质
Bindel et al. To attest or not to attest, this is the question–Provable attestation in FIDO2
US20020184501A1 (en) Method and system for establishing secure data transmission in a data communications network notably using an optical media key encrypted environment (omkee)
US7739500B2 (en) Method and system for consistent recognition of ongoing digital relationships
CN116708016A (zh) 一种敏感数据传输方法、服务器及存储介质
KR20020041857A (ko) 공개키 기반구조에서 개인키 이동과 로밍서비스를 위한이중암호화 및 송/수신방법
JP4140617B2 (ja) 認証用記録媒体を用いた認証システムおよび認証用記録媒体の作成方法
JP2021125824A (ja) 認証システムおよび認証方法
WO2000067447A1 (en) Improvements in and relating to secure data transmission
CN113726807B (zh) 一种网络摄像机访问方法、设备、系统及存储介质
JP5114733B2 (ja) アクセス制御装置及びユーザ端末及びプログラム
JP4626001B2 (ja) 暗号化通信システム及び暗号化通信方法
CN117675182A (zh) 身份认证方法、系统、设备及介质
CN119071038A (zh) 基于量子密钥的单点登录方法、系统、装置、设备和介质
KR20020042083A (ko) 공개키 기반구조에서 개인키 이동과 로밍서비스를 위한이중암호화 및 송/수신방법

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: MICROSOFT TECHNOLOGY LICENSING LLC

Free format text: FORMER OWNER: MICROSOFT CORP.

Effective date: 20150429

C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20150429

Address after: Washington State

Patentee after: Micro soft technique license Co., Ltd

Address before: Washington State

Patentee before: Microsoft Corp.

C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20160722

Address after: Grand Cayman, Georgetown, Cayman Islands

Patentee after: IValley Holding Co., Ltd.

Address before: Washington State

Patentee before: Micro soft technique license Co., Ltd