DE102013007202A8 - Method for building a key infrastructure - Google Patents
Method for building a key infrastructure Download PDFInfo
- Publication number
- DE102013007202A8 DE102013007202A8 DE102013007202.6A DE102013007202A DE102013007202A8 DE 102013007202 A8 DE102013007202 A8 DE 102013007202A8 DE 102013007202 A DE102013007202 A DE 102013007202A DE 102013007202 A8 DE102013007202 A8 DE 102013007202A8
- Authority
- DE
- Germany
- Prior art keywords
- building
- key infrastructure
- infrastructure
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0827—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving distinctive intermediate devices or communication paths
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0492—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload by using a location-limited connection, e.g. near-field communication or limited proximity of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102013007202.6A DE102013007202A1 (en) | 2013-04-25 | 2013-04-25 | Method for building a key infrastructure |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102013007202.6A DE102013007202A1 (en) | 2013-04-25 | 2013-04-25 | Method for building a key infrastructure |
Publications (2)
Publication Number | Publication Date |
---|---|
DE102013007202A1 DE102013007202A1 (en) | 2014-10-30 |
DE102013007202A8 true DE102013007202A8 (en) | 2014-12-24 |
Family
ID=51684715
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DE102013007202.6A Withdrawn DE102013007202A1 (en) | 2013-04-25 | 2013-04-25 | Method for building a key infrastructure |
Country Status (1)
Country | Link |
---|---|
DE (1) | DE102013007202A1 (en) |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030149874A1 (en) * | 2002-02-06 | 2003-08-07 | Xerox Corporation | Systems and methods for authenticating communications in a network medium |
-
2013
- 2013-04-25 DE DE102013007202.6A patent/DE102013007202A1/en not_active Withdrawn
Non-Patent Citations (2)
Title |
---|
An Introduction to Cryptography. PGP Version 7.0, Copyright 1990-2000. Seiten 1-86. Gefunden im Internet am 20.11.2013 unter folgendem Link: ftp://ftp.pgpi.org/pub/pgp/7.0/docs/english/IntroToCrypto.pdf |
Yang, Y., et al.; Case Study: Trust Establishment in Personal Area Networks. IEEE 2009, Seiten 1-5. |
Also Published As
Publication number | Publication date |
---|---|
DE102013007202A1 (en) | 2014-10-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
BR112016021957A2 (en) | method for producing a building panel | |
HK1218413A1 (en) | Bio-based repair method for concrete | |
DE102013102529A8 (en) | Method for controlling a spark gap, in particular a spark plug | |
GB201322415D0 (en) | A building block for a mechanical construction | |
SG11201600207TA (en) | Method for producing a large quartz-glass pipe | |
GB2509554B (en) | A method for plugging a hydrocarbon well | |
GB201322417D0 (en) | A building block for a mechanical construction | |
DK3060551T3 (en) | Process for producing a PDE4 inhibitor | |
BR112016003022A2 (en) | method for producing a semi-product for a building panel | |
GB201322409D0 (en) | A building block for a mechanical construction | |
FI20135942A (en) | METHOD FOR LIFTING A CONCRETE PRODUCT BY LIFTING BOOM AND LIFTING BOOM | |
LT2997205T (en) | A method for joining building boards | |
DE112014004039A5 (en) | Method for monitoring a power supply | |
PT2762284T (en) | A method for manufacturing cladding slabs | |
GB2531961B (en) | Method for manufacturing wooden building blocks | |
SI3055113T1 (en) | Method for producing a gypsum plasterboard | |
DE112014000762A5 (en) | Method for controlling a transmission | |
DE102012018635A8 (en) | Method for producing a 3D structure | |
DE112014005703A5 (en) | Method for creating a communication protocol assignment file | |
PL3058048T3 (en) | Method for treating a subterranean formation | |
DE112013007187A5 (en) | Method for applying a bonding layer | |
BR112016009448A2 (en) | method for producing acrylic acid | |
DE112014002829A5 (en) | Method for producing a printing plate | |
EP2973073A4 (en) | System and method for realizing a building using automated building massing configuration generation | |
GB2528011B (en) | Method for determining a stacked model describing architectural elements |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
R163 | Identified publications notified | ||
R082 | Change of representative | ||
R081 | Change of applicant/patentee |
Owner name: GIESECKE+DEVRIENT MOBILE SECURITY GMBH, DE Free format text: FORMER OWNER: GIESECKE & DEVRIENT GMBH, 81677 MUENCHEN, DE |
|
R120 | Application withdrawn or ip right abandoned |