DE60133266D1 - Verfahren und Vorrichtung zum Schutz der Datenintegrität - Google Patents

Verfahren und Vorrichtung zum Schutz der Datenintegrität

Info

Publication number
DE60133266D1
DE60133266D1 DE60133266T DE60133266T DE60133266D1 DE 60133266 D1 DE60133266 D1 DE 60133266D1 DE 60133266 T DE60133266 T DE 60133266T DE 60133266 T DE60133266 T DE 60133266T DE 60133266 D1 DE60133266 D1 DE 60133266D1
Authority
DE
Germany
Prior art keywords
tag
message
received
data integrity
protecting data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
DE60133266T
Other languages
English (en)
Other versions
DE60133266T2 (de
Inventor
Christian Gehrmann
Rolf Blom
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Telefonaktiebolaget LM Ericsson AB
Original Assignee
Telefonaktiebolaget LM Ericsson AB
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget LM Ericsson AB filed Critical Telefonaktiebolaget LM Ericsson AB
Publication of DE60133266D1 publication Critical patent/DE60133266D1/de
Application granted granted Critical
Publication of DE60133266T2 publication Critical patent/DE60133266T2/de
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Power Engineering (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Arrangements For Transmission Of Measured Signals (AREA)
  • Collating Specific Patterns (AREA)
  • Burglar Alarm Systems (AREA)
DE60133266T 2001-05-03 2001-05-03 Verfahren und Vorrichtung zum Schutz der Datenintegrität Expired - Lifetime DE60133266T2 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP01610046A EP1255372B1 (de) 2001-05-03 2001-05-03 Verfahren und Vorrichtung zum Schutz der Datenintegrität

Publications (2)

Publication Number Publication Date
DE60133266D1 true DE60133266D1 (de) 2008-04-30
DE60133266T2 DE60133266T2 (de) 2009-04-23

Family

ID=8183536

Family Applications (1)

Application Number Title Priority Date Filing Date
DE60133266T Expired - Lifetime DE60133266T2 (de) 2001-05-03 2001-05-03 Verfahren und Vorrichtung zum Schutz der Datenintegrität

Country Status (4)

Country Link
US (1) US7298840B2 (de)
EP (1) EP1255372B1 (de)
AT (1) ATE389987T1 (de)
DE (1) DE60133266T2 (de)

Families Citing this family (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7185105B2 (en) * 2001-05-11 2007-02-27 Bea Systems, Inc. Application messaging system with flexible message header structure
US8077861B2 (en) 2004-08-12 2011-12-13 Cmla, Llc Permutation data transform to enhance security
US7577250B2 (en) * 2004-08-12 2009-08-18 Cmla, Llc Key derivation functions to enhance security
US7564970B2 (en) * 2004-08-12 2009-07-21 Cmla, Llc Exponential data transform to enhance security
CN1228978C (zh) * 2002-09-23 2005-11-23 国际商业机器公司 使用请求短消息点播视频节目的视频点播系统及其方法
US7284127B2 (en) 2002-10-24 2007-10-16 Telefonktiebolaget Lm Ericsson (Publ) Secure communications
US7702910B2 (en) 2002-10-24 2010-04-20 Telefonaktiebolaget L M Ericsson (Publ) Message authentication
CA2508526A1 (en) * 2002-12-03 2004-06-17 Funk Software, Inc. Tunneled authentication protocol for preventing man-in-the-middle attacks
US7627764B2 (en) * 2004-06-25 2009-12-01 Intel Corporation Apparatus and method for performing MD5 digesting
US7577845B2 (en) * 2004-08-17 2009-08-18 Hengli Ma Information matrix cryptogram
US20060150213A1 (en) * 2004-12-16 2006-07-06 Zechary Chang Executing module and method thereof for playing multimedia in a wireless communication apparatus
WO2006082310A1 (fr) * 2005-02-07 2006-08-10 France Telecom Procede de pre-authentification rapide par reconnaissance de la distance
US7477913B2 (en) * 2005-04-04 2009-01-13 Research In Motion Limited Determining a target transmit power of a wireless transmission according to security requirements
US9282081B2 (en) * 2005-07-28 2016-03-08 Vaporstream Incorporated Reduced traceability electronic message system and method
DE102006039327B4 (de) * 2006-08-22 2008-06-26 Nokia Siemens Networks Gmbh & Co.Kg Verfahren zur Authentifizierung
KR100785810B1 (ko) * 2006-12-05 2007-12-13 한국전자통신연구원 Rfid 데이터 보호 장치 및 방법
WO2008084271A2 (en) * 2006-12-29 2008-07-17 Abb Research Limited Method and system for message integrity architecture for use in industrial control systems
US8572374B2 (en) * 2007-05-03 2013-10-29 Intel Corporation Continuous isochronous read access and measurement of data stored in non-volatile memory
TWI341095B (en) * 2007-12-12 2011-04-21 Nat Univ Tsing Hua Light-overhead and flexible wireless sensor message authentication method
US20090170474A1 (en) * 2007-12-27 2009-07-02 Motorola, Inc. Method and device for authenticating trunking control messages
US8387129B2 (en) * 2008-06-09 2013-02-26 Qualcomm Incorporated Method and apparatus for verifying data packet integrity in a streaming data channel
US7899056B2 (en) * 2009-01-13 2011-03-01 Fujitsu Limited Device and method for reducing overhead in a wireless network
US8023513B2 (en) * 2009-02-24 2011-09-20 Fujitsu Limited System and method for reducing overhead in a wireless network
US8565229B2 (en) * 2010-06-18 2013-10-22 Schweitzer Engineering Laboratories Inc Systems and methods for data packet transmission
US9106632B2 (en) 2011-05-26 2015-08-11 First Data Corporation Provisioning by delivered items
US9104542B2 (en) * 2012-12-28 2015-08-11 Intel Corporation Apparatus and method for fast tag hit with double error correction and triple error detection
DE102013218212A1 (de) * 2013-09-11 2015-03-12 Robert Bosch Gmbh Verfahren zum abgesicherten Übermitteln von Daten
US9438425B2 (en) * 2014-08-15 2016-09-06 Alcatel Lucent Robust MAC aggregation with short MAC tags
US9965639B2 (en) * 2015-07-17 2018-05-08 International Business Machines Corporation Source authentication of a software product
WO2018109906A1 (ja) * 2016-12-15 2018-06-21 日本電気株式会社 メッセージ認証システム、装置及びメッセージ検証方法
US10608822B2 (en) * 2017-04-26 2020-03-31 Nxp B.V. Efficient calculation of message authentication codes for related data
JP7178500B2 (ja) * 2019-07-23 2022-11-25 株式会社ソニー・インタラクティブエンタテインメント アクセス制御装置、アクセス制御方法及びプログラム

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6851052B1 (en) * 1998-12-10 2005-02-01 Telcordia Technologies, Inc. Method and device for generating approximate message authentication codes
GB2365184B (en) * 1999-08-21 2004-06-16 Kent Ridge Digital Labs Legitimacy protection of electronic document and a printed copy thereof
US7039392B2 (en) * 2000-10-10 2006-05-02 Freescale Semiconductor System and method for providing device authentication in a wireless network

Also Published As

Publication number Publication date
US20040123102A1 (en) 2004-06-24
EP1255372A1 (de) 2002-11-06
ATE389987T1 (de) 2008-04-15
DE60133266T2 (de) 2009-04-23
US7298840B2 (en) 2007-11-20
EP1255372B1 (de) 2008-03-19

Similar Documents

Publication Publication Date Title
ATE389987T1 (de) Verfahren und vorrichtung zum schutz der datenintegrität
ATE345621T1 (de) Verfahren und vorrichtung zur gewährleistung der authentifizierung in einem kommunikationssystem
DE60334614D1 (de) Verfahren zum authentifizieren und verifizieren von sms-übermittlungen
WO2001091366A3 (en) Cryptographic communications using pseudo-randomly generated cryptography keys
EP0856820A3 (de) Chipkarte, System zum Verarbeiten von Chipkarten und Verfahren zum Beglaubigen von Chipkarten
ATE313230T1 (de) Verfahren und vorrichtung zur schlüsselaktualisierung mittels gegenseitiger validierung
ATE466429T1 (de) Verfahren zur sicherstellung der datenübertragungssicher heit, kommunikationssystem und kommunikationseinrichtung
EP1049287A3 (de) Verfahren zur Verschlüsselung/entschlüsselung und Authentifizierungsverfahren unter Verwendung eines multiaffinen Schlüsselsystems und zugehörige Vorrichtungen
DE69326775D1 (de) Verfahren und einrichtung zur authentifizierung einer benutzer-anbieter-kommunikation
ATE309586T1 (de) Verfahren und vorrichtung zur symmetrischen schlüsselerzeugung in einer persönlichen sicherheitsvorrichtung mit begrenzten vertrauensbeziehungen
NO943457D0 (no) "Smartkort" tilpasset flere tjenesteytere og sekundær utnyttelse
ATE526800T1 (de) Vorrichtung und verfahren zum einstellen der nutzungsbeschränkung eines mobilen kommunikationsterminals
EP1339189A3 (de) Verfahren zur Authentifizierung zwischen zwei Geräten unter Verwendung eines Challenge-Response-Systems
DE60302276D1 (de) Verfahren zur ferngesteuerten Änderung eines Kommunikationspasswortes
EP0998073A3 (de) Verfahren und Vorrichtung zur Authentifikation und zum Schlüsselaustausch zwischen verschiedenen Komponenten
ATE540513T1 (de) Vorrichtung und verfahren zum zugreifen auf schlüssel zur sicheren nachrichtenübermittlung
NO20014097L (no) Radiokommunikasjonsapparat samt fremgangsmåte for radiokommunikasjon
ATE506797T1 (de) Datenauthentifizierungsverfahren und agent basiertes system
EP1326424A3 (de) Bilderzeugungsgerät und Verfahren zur Erzeugung von Echtheitsprüfungsdaten
DE60301750D1 (de) Vorrichtung zur Erzeugung eines erweiterten Schlüssels, Verschlüsselungsvorrichtung und Verschlüsselungssystem
ATE429746T1 (de) Verfahren und vorrichtung zur verschlüsselung oder entschlüsselung und rechnerlesbares medium zur aufzeichnung des programmes
BR0115573A (pt) Esquema de criptografia limite para sistemas de autenticação de mensagens
ATE377881T1 (de) Netzwerkgerät, system und verfahren zur authentifizierung
WO2002091668A3 (en) Method and system for data integrity protection
CA2454974A1 (en) Method for authenticating a message

Legal Events

Date Code Title Description
8364 No opposition during term of opposition