DE60137757D1 - Verfahren zur Sicherung von Daten bezüglich von Benutzern einer Infrastruktur mit öffentlichen Schlüsseln - Google Patents
Verfahren zur Sicherung von Daten bezüglich von Benutzern einer Infrastruktur mit öffentlichen SchlüsselnInfo
- Publication number
- DE60137757D1 DE60137757D1 DE60137757T DE60137757T DE60137757D1 DE 60137757 D1 DE60137757 D1 DE 60137757D1 DE 60137757 T DE60137757 T DE 60137757T DE 60137757 T DE60137757 T DE 60137757T DE 60137757 D1 DE60137757 D1 DE 60137757D1
- Authority
- DE
- Germany
- Prior art keywords
- institution
- key
- relational data
- certificate
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP01810561 | 2001-06-11 |
Publications (1)
Publication Number | Publication Date |
---|---|
DE60137757D1 true DE60137757D1 (de) | 2009-04-09 |
Family
ID=8183960
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DE60137757T Expired - Fee Related DE60137757D1 (de) | 2001-06-11 | 2001-06-29 | Verfahren zur Sicherung von Daten bezüglich von Benutzern einer Infrastruktur mit öffentlichen Schlüsseln |
Country Status (3)
Country | Link |
---|---|
US (1) | US6738912B2 (de) |
AT (1) | ATE424067T1 (de) |
DE (1) | DE60137757D1 (de) |
Families Citing this family (42)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6889328B1 (en) * | 1999-05-28 | 2005-05-03 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for secure communication |
KR100416541B1 (ko) * | 2000-11-30 | 2004-02-05 | 삼성전자주식회사 | 홈게이트웨이와 홈포탈서버를 이용한 홈네트워크 접근방법 및 그 장치 |
JP3899808B2 (ja) * | 2000-12-07 | 2007-03-28 | 株式会社日立製作所 | ディジタル署名生成方法およびディジタル署名検証方法 |
US7937089B2 (en) * | 2002-02-06 | 2011-05-03 | Palo Alto Research Center Incorporated | Method, apparatus, and program product for provisioning secure wireless sensors |
JP2007524275A (ja) * | 2003-06-17 | 2007-08-23 | ビザ インターナショナル サービス アソシエーション | 電子取引における安全なデータ交換のための方法およびシステム |
US20050108528A1 (en) * | 2003-11-19 | 2005-05-19 | International Business Machines Corporation | Computer network and method for transmitting and authenticating data in the computer network |
US9331990B2 (en) * | 2003-12-22 | 2016-05-03 | Assa Abloy Ab | Trusted and unsupervised digital certificate generation using a security token |
AU2004201058B1 (en) * | 2004-03-15 | 2004-09-09 | Lockstep Consulting Pty Ltd | Means and method of issuing Anonymous Public Key Certificates for indexing electronic record systems |
US7546454B2 (en) * | 2004-06-30 | 2009-06-09 | At&T Intellectual Property I, L.P. | Automated digital certificate discovery and management |
US7647494B2 (en) * | 2005-06-08 | 2010-01-12 | International Business Machines Corporation | Name transformation for a public key infrastructure (PKI) |
US7992203B2 (en) * | 2006-05-24 | 2011-08-02 | Red Hat, Inc. | Methods and systems for secure shared smartcard access |
US8364952B2 (en) | 2006-06-06 | 2013-01-29 | Red Hat, Inc. | Methods and system for a key recovery plan |
US8495380B2 (en) | 2006-06-06 | 2013-07-23 | Red Hat, Inc. | Methods and systems for server-side key generation |
US8180741B2 (en) * | 2006-06-06 | 2012-05-15 | Red Hat, Inc. | Methods and systems for providing data objects on a token |
US8098829B2 (en) | 2006-06-06 | 2012-01-17 | Red Hat, Inc. | Methods and systems for secure key delivery |
US8332637B2 (en) * | 2006-06-06 | 2012-12-11 | Red Hat, Inc. | Methods and systems for nonce generation in a token |
US9769158B2 (en) | 2006-06-07 | 2017-09-19 | Red Hat, Inc. | Guided enrollment and login for token users |
US8099765B2 (en) * | 2006-06-07 | 2012-01-17 | Red Hat, Inc. | Methods and systems for remote password reset using an authentication credential managed by a third party |
US8589695B2 (en) | 2006-06-07 | 2013-11-19 | Red Hat, Inc. | Methods and systems for entropy collection for server-side key generation |
US8707024B2 (en) | 2006-06-07 | 2014-04-22 | Red Hat, Inc. | Methods and systems for managing identity management security domains |
US8412927B2 (en) * | 2006-06-07 | 2013-04-02 | Red Hat, Inc. | Profile framework for token processing system |
US8787566B2 (en) | 2006-08-23 | 2014-07-22 | Red Hat, Inc. | Strong encryption |
US8806219B2 (en) * | 2006-08-23 | 2014-08-12 | Red Hat, Inc. | Time-based function back-off |
US8356342B2 (en) | 2006-08-31 | 2013-01-15 | Red Hat, Inc. | Method and system for issuing a kill sequence for a token |
US8977844B2 (en) | 2006-08-31 | 2015-03-10 | Red Hat, Inc. | Smartcard formation with authentication keys |
US8074265B2 (en) | 2006-08-31 | 2011-12-06 | Red Hat, Inc. | Methods and systems for verifying a location factor associated with a token |
US9038154B2 (en) | 2006-08-31 | 2015-05-19 | Red Hat, Inc. | Token Registration |
US8693690B2 (en) | 2006-12-04 | 2014-04-08 | Red Hat, Inc. | Organizing an extensible table for storing cryptographic objects |
US8813243B2 (en) * | 2007-02-02 | 2014-08-19 | Red Hat, Inc. | Reducing a size of a security-related data object stored on a token |
US8832453B2 (en) * | 2007-02-28 | 2014-09-09 | Red Hat, Inc. | Token recycling |
US8639940B2 (en) | 2007-02-28 | 2014-01-28 | Red Hat, Inc. | Methods and systems for assigning roles on a token |
US9081948B2 (en) | 2007-03-13 | 2015-07-14 | Red Hat, Inc. | Configurable smartcard |
US8429734B2 (en) * | 2007-07-31 | 2013-04-23 | Symantec Corporation | Method for detecting DNS redirects or fraudulent local certificates for SSL sites in pharming/phishing schemes by remote validation and using a credential manager and recorded certificate attributes |
DE102009031817A1 (de) * | 2009-07-03 | 2011-01-05 | Charismathics Gmbh | Verfahren zur Ausstellung, Überprüfung und Verteilung von digitalen Zertifikaten für die Nutzung in Public-Key-Infrastrukturen |
US9477947B2 (en) | 2009-08-24 | 2016-10-25 | International Business Machines Corporation | Retrospective changing of previously sent messages |
FI124450B (fi) * | 2010-11-05 | 2014-09-15 | Linkin It Oy | Menetelmä ja järjestely sertifikaatin luomiseksi |
US8744078B2 (en) | 2012-06-05 | 2014-06-03 | Secure Channels Sa | System and method for securing multiple data segments having different lengths using pattern keys having multiple different strengths |
CN103944903B (zh) * | 2014-04-23 | 2017-02-15 | 福建联迪商用设备有限公司 | 一种多方授权的apk签名方法及系统 |
EP3477558A1 (de) | 2017-10-25 | 2019-05-01 | Reamis AG | Verfahren zur verwaltung eines technischen systems und verwaltetes technisches system |
CN108449174B (zh) * | 2018-02-09 | 2021-07-30 | 孔泽一 | 云计算应用中智能终端的可撤销加密方法及装置 |
US10896032B2 (en) * | 2018-11-02 | 2021-01-19 | Accenture Global Solutions, Limited | System and method for certifying and deploying instruction code |
EP3703312A1 (de) * | 2019-02-26 | 2020-09-02 | Siemens Aktiengesellschaft | In einem anlagenplanungswerkzeug integriertes zertifikatsmanagement |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4405829A (en) | 1977-12-14 | 1983-09-20 | Massachusetts Institute Of Technology | Cryptographic communications system and method |
US5343529A (en) * | 1993-09-28 | 1994-08-30 | Milton Goldfine | Transaction authentication using a centrally generated transaction identifier |
US6192131B1 (en) * | 1996-11-15 | 2001-02-20 | Securities Industry Automation Corporation | Enabling business transactions in computer networks |
JP3656688B2 (ja) * | 1997-03-31 | 2005-06-08 | 栄司 岡本 | 暗号データ回復方法及び鍵登録システム |
US6202151B1 (en) | 1997-05-09 | 2001-03-13 | Gte Service Corporation | System and method for authenticating electronic transactions using biometric certificates |
US6018724A (en) * | 1997-06-30 | 2000-01-25 | Sun Micorsystems, Inc. | Method and apparatus for authenticating on-line transaction data |
IL121550A (en) * | 1997-08-14 | 2003-07-31 | Diversinet Corp | System and method for handling permits |
US6092201A (en) * | 1997-10-24 | 2000-07-18 | Entrust Technologies | Method and apparatus for extending secure communication operations via a shared list |
US6510513B1 (en) * | 1999-01-13 | 2003-01-21 | Microsoft Corporation | Security services and policy enforcement for electronic data |
US6332193B1 (en) * | 1999-01-18 | 2001-12-18 | Sensar, Inc. | Method and apparatus for securely transmitting and authenticating biometric data over a network |
US6505193B1 (en) * | 1999-12-01 | 2003-01-07 | Iridian Technologies, Inc. | System and method of fast biometric database searching using digital certificates |
-
2001
- 2001-06-29 DE DE60137757T patent/DE60137757D1/de not_active Expired - Fee Related
- 2001-06-29 AT AT01810638T patent/ATE424067T1/de not_active IP Right Cessation
- 2001-06-29 US US09/893,413 patent/US6738912B2/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
US20020188848A1 (en) | 2002-12-12 |
US6738912B2 (en) | 2004-05-18 |
ATE424067T1 (de) | 2009-03-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE60137757D1 (de) | Verfahren zur Sicherung von Daten bezüglich von Benutzern einer Infrastruktur mit öffentlichen Schlüsseln | |
US7308574B2 (en) | Method and system for key certification | |
KR101054970B1 (ko) | 개인 정보를 포함하는 전자 증명서를 이용하여 통신 상대를 인증하기 위한 시스템, 장치, 방법, 및 컴퓨터 판독 가능한 기록 매체 | |
US7028180B1 (en) | System and method for usage of a role certificate in encryption and as a seal, digital stamp, and signature | |
EP1326368A3 (de) | Widerrufung und Aktualisierung von Token in einer Infrastruktur mit öffentlichen Schlüsseln | |
EP0802654A3 (de) | Verschlüsselungsverfahren, Entschlüsselungsverfahren und Beglaubigungsverfahren | |
DE60221880D1 (de) | System und verfahren zur erzeugung eines gesicherten netzes unter verwendung von beglaubigungen von verfahrensgruppen | |
US20030163700A1 (en) | Method and system for user generated keys and certificates | |
EP1117206A3 (de) | Infrastruktur für öffentliche Schlüssel | |
EP1365307A3 (de) | Methode und System zur Datenaktualisierung | |
EP1117204A3 (de) | Auf öffentlichem Schlüssel basierte Berechtigungsinfrastruktur | |
WO2015180673A1 (en) | Method and system for creating a certificate to authenticate a user identity | |
JP2001249612A (ja) | 使い捨て証明書を用いる公開鍵インフラストラクチャ | |
ATE331375T1 (de) | Verfahren und vorrichtung zur beglaubigung von daten | |
JP2004032731A (ja) | 暗号を用いたセキュリティ方法、ならびにそれに適した電子装置 | |
DE602005001613D1 (de) | Einrichten eines sicheren kontexts zur übermittlung von nachrichten zwischen computersystemen | |
WO2002091662A8 (en) | Use and generation of a session key in a secure socket layer connection | |
DE60132334D1 (de) | Vorrichtung und verfahren für ein web-basiertes anwendungsdienstmodell für die sicherheitsverwaltung | |
ATE353181T1 (de) | Benutzerauthentisierung quer durch die kommunikationssitzungen | |
ATE444617T1 (de) | System, vorrichtung und verfahren zum auswechseln eines kryptographischen schlüssels | |
CN101212293A (zh) | 一种身份认证方法及系统 | |
NO20030046D0 (no) | Sikker autentisering ved hjelp av hörbare toner | |
EP1162780A3 (de) | Vorrichtung und Verfahren zum Querauthentifizieren eines Verzeichnisses in einer Infrastruktur mit öffentlichen Schlüsseln | |
ATE309586T1 (de) | Verfahren und vorrichtung zur symmetrischen schlüsselerzeugung in einer persönlichen sicherheitsvorrichtung mit begrenzten vertrauensbeziehungen | |
EP1150452A3 (de) | System, Verfahren und Vorrichtung zur Authentifizierung |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
8364 | No opposition during term of opposition | ||
8339 | Ceased/non-payment of the annual fee |