DE102013007202A8 - Method for building a key infrastructure - Google Patents

Method for building a key infrastructure Download PDF

Info

Publication number
DE102013007202A8
DE102013007202A8 DE102013007202.6A DE102013007202A DE102013007202A8 DE 102013007202 A8 DE102013007202 A8 DE 102013007202A8 DE 102013007202 A DE102013007202 A DE 102013007202A DE 102013007202 A8 DE102013007202 A8 DE 102013007202A8
Authority
DE
Germany
Prior art keywords
building
key infrastructure
infrastructure
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
DE102013007202.6A
Other languages
German (de)
Other versions
DE102013007202A1 (en
Inventor
Helmut Scherzer
Dr. Meister Gisela
Dr. Martini Ullrich
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Giesecke and Devrient Mobile Security GmbH
Original Assignee
Giesecke and Devrient GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Giesecke and Devrient GmbH filed Critical Giesecke and Devrient GmbH
Priority to DE102013007202.6A priority Critical patent/DE102013007202A1/en
Publication of DE102013007202A1 publication Critical patent/DE102013007202A1/en
Publication of DE102013007202A8 publication Critical patent/DE102013007202A8/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0827Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving distinctive intermediate devices or communication paths
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0492Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload by using a location-limited connection, e.g. near-field communication or limited proximity of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
DE102013007202.6A 2013-04-25 2013-04-25 Method for building a key infrastructure Withdrawn DE102013007202A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
DE102013007202.6A DE102013007202A1 (en) 2013-04-25 2013-04-25 Method for building a key infrastructure

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
DE102013007202.6A DE102013007202A1 (en) 2013-04-25 2013-04-25 Method for building a key infrastructure

Publications (2)

Publication Number Publication Date
DE102013007202A1 DE102013007202A1 (en) 2014-10-30
DE102013007202A8 true DE102013007202A8 (en) 2014-12-24

Family

ID=51684715

Family Applications (1)

Application Number Title Priority Date Filing Date
DE102013007202.6A Withdrawn DE102013007202A1 (en) 2013-04-25 2013-04-25 Method for building a key infrastructure

Country Status (1)

Country Link
DE (1) DE102013007202A1 (en)

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030149874A1 (en) * 2002-02-06 2003-08-07 Xerox Corporation Systems and methods for authenticating communications in a network medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
An Introduction to Cryptography. PGP Version 7.0, Copyright 1990-2000. Seiten 1-86. Gefunden im Internet am 20.11.2013 unter folgendem Link: ftp://ftp.pgpi.org/pub/pgp/7.0/docs/english/IntroToCrypto.pdf
Yang, Y., et al.; Case Study: Trust Establishment in Personal Area Networks. IEEE 2009, Seiten 1-5.

Also Published As

Publication number Publication date
DE102013007202A1 (en) 2014-10-30

Similar Documents

Publication Publication Date Title
BR112016021957A2 (en) method for producing a building panel
HK1218413A1 (en) Bio-based repair method for concrete
DE102013102529A8 (en) Method for controlling a spark gap, in particular a spark plug
GB201322415D0 (en) A building block for a mechanical construction
SG11201600207TA (en) Method for producing a large quartz-glass pipe
GB2509554B (en) A method for plugging a hydrocarbon well
GB201322417D0 (en) A building block for a mechanical construction
DK3060551T3 (en) Process for producing a PDE4 inhibitor
BR112016003022A2 (en) method for producing a semi-product for a building panel
GB201322409D0 (en) A building block for a mechanical construction
FI20135942A (en) METHOD FOR LIFTING A CONCRETE PRODUCT BY LIFTING BOOM AND LIFTING BOOM
LT2997205T (en) A method for joining building boards
DE112014004039A5 (en) Method for monitoring a power supply
PT2762284T (en) A method for manufacturing cladding slabs
GB2531961B (en) Method for manufacturing wooden building blocks
SI3055113T1 (en) Method for producing a gypsum plasterboard
DE112014000762A5 (en) Method for controlling a transmission
DE102012018635A8 (en) Method for producing a 3D structure
DE112014005703A5 (en) Method for creating a communication protocol assignment file
PL3058048T3 (en) Method for treating a subterranean formation
DE112013007187A5 (en) Method for applying a bonding layer
BR112016009448A2 (en) method for producing acrylic acid
DE112014002829A5 (en) Method for producing a printing plate
EP2973073A4 (en) System and method for realizing a building using automated building massing configuration generation
GB2528011B (en) Method for determining a stacked model describing architectural elements

Legal Events

Date Code Title Description
R163 Identified publications notified
R082 Change of representative
R081 Change of applicant/patentee

Owner name: GIESECKE+DEVRIENT MOBILE SECURITY GMBH, DE

Free format text: FORMER OWNER: GIESECKE & DEVRIENT GMBH, 81677 MUENCHEN, DE

R120 Application withdrawn or ip right abandoned