DE602004026787C9 - Sicherer datentransfer - Google Patents
Sicherer datentransfer Download PDFInfo
- Publication number
- DE602004026787C9 DE602004026787C9 DE602004026787.2A DE602004026787A DE602004026787C9 DE 602004026787 C9 DE602004026787 C9 DE 602004026787C9 DE 602004026787 A DE602004026787 A DE 602004026787A DE 602004026787 C9 DE602004026787 C9 DE 602004026787C9
- Authority
- DE
- Germany
- Prior art keywords
- radio communication
- communication device
- symmetric key
- key
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
- 238000012546 transfer Methods 0.000 title claims abstract 20
- 238000004891 communication Methods 0.000 claims abstract 57
- 238000013475 authorization Methods 0.000 claims 12
- 241001393742 Simian endogenous retrovirus Species 0.000 claims 9
- 238000000034 method Methods 0.000 claims 8
- 238000012795 verification Methods 0.000 claims 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Memory System Of A Hierarchy Structure (AREA)
Abstract
A method of providing secure data transfer from a first radio communication device of a first party to a second radio communication device, the data transfer to be overseen by a transfer device of a second party, the method comprising the steps of:- generating randomly a first symmetric key at the first radio communication device, encrypting user data of the first radio communication device with the generated first symmetric key at the first radio communication device, characterized in that the method further comprises the steps of:- encrypting at the first radio communication device the generated first symmetric key with a public key of a third party,- sending the encrypted first symmetric key from the first radio communication device to the second radio communication device via the transfer device,- decrypting at the second radio communication device the received encrypted first symmetric key by utilizing a secret key associated with the public key and comprised in a security device of the third party, the security device connected to the second radio communication device, sending the encrypted user data from the first radio communication device to the second radio communication device via the transfer device, and- decrypting at the second radio communication device the received encrypted user data with the decrypted first symmetric key.
Description
Claims (13)
- A method of providing secure data transfer from a first radio communication device of a first party to a second radio communication device, the data transfer to be overseen by a transfer device of a second party, the method comprising the steps of: - generating randomly a first symmetric key at the first radio communication device, encrypting user data of the first radio communication device with the generated first symmetric key at the first radio communication device, characterized in that the method further comprises the steps of: - encrypting at the first radio communication device the generated first symmetric key with a public key of a third party, - sending the encrypted first symmetric key from the first radio communication device to the second radio communication device via the transfer device, - decrypting at the second radio communication device the received encrypted first symmetric key by utilizing a secret key associated with the public key and comprised in a security device of the third party, the security device connected to the second radio communication device, sending the encrypted user data from the first radio communication device to the second radio communication device via the transfer device, and - decrypting at the second radio communication device the received encrypted user data with the decrypted first symmetric key.
- The method according to claim 1, characterized in that the step of decrypting at the second radio communication device the received encrypted first symmetric key by utilizing a secret key associated with the public key and comprised in a security device of the third party further comprises the steps of: - generating randomly a second symmetric key at the second radio communication device, - generating at the second radio communication device a request message comprising the generated second symmetric key and the received encrypted first symmetric key, and the request message encrypted with the public key, - sending the request message from the second radio communication device to the security device, - decrypting at the security device the received request message with the secret key to obtain the second symmetric key and the encrypted first symmetric key, - further decrypting at the security device the obtained encrypted first symmetric key with the secret key to obtain the first symmetric key, - generating at the security device a response message comprising the obtained first symmetric key, and the response message encrypted with the obtained second symmetric key, - sending the response message from the security device to the second radio communication device, - decrypting at the second radio communication device the received response message with the generated second symmetric key to obtain the decrypted first symmetric key.
- The method according to claim 2, characterized in that the method further comprises the steps of: - enclosing, at the first radio communication device, a first authorization information with the first symmetric key, - inclosing, at the second radio communication device, a second authorization information with the request message, and - verifying, at the security device, that the received first authorization information matches the received second authorization information before performing the step of generating the response message.
- The method according to claim 3, characterized in that a password input by the first party is used as first and second authorization information.
- The method according to claim 3, characterized in that an identity information associated with the first party is used as first and second authorization information.
- A system of providing secure data transfer between radio communication devices, comprising: - a first radio communication device (MS1) of a first party having user data to be transferred, and comprising a first key generator (KG1) for randomly generating a first symmetric key, and a user data encryption means (UD_ENC) for encrypting the user data with the generated first symmetric key, - a second radio communication device (MS2) for receiving the user data to be transferred, a transfer device (SERV) of a second party for linking the first and second radio communication devices to each other, and for overseeing the data transfer, characterized in that the first radio communication device (MS1) further comprises: - a key encryption means (K_ENC) for encrypting the first symmetric key with a public key of a third party, and in that the system further comprises: - a security device (SEC) of the third party connected to the second radio communication device (MS2), and comprising a secret key associated with the public key, and in that the second radio communication device (MS2) comprises: - key decryption means (K_DEC) for decrypting the encrypted first symmetric key by utilizing the secret key comprised in the security device (SEC), the encrypted first symmetric key having been received from the first radio communication device (MS1) via the transfer device (SERV), and a user data decryption means (UD_DEC) for decrypting the encrypted user data with the decrypted first symmetric key, the encrypted user data having been received from the first radio communication device (MS1) via the transfer device (SERV).
- The system according to claim 6, characterized in that the key decryption means (K_DEC) comprises: - a second key generator (KG2) for randomly generating a second symmetric key, and - a request message means (REQ_MSG) for generating a request message comprising the generated second symmetric key and the received encrypted first symmetric key, for encrypting the request message with the public key, and for sending the request message to the security device (SEC), and in that the security device (SEC) comprises: - a response message means (RESP_MSG) for decrypting the received request message with the secret key to obtain the second symmetric key and the encrypted first symmetric key, for further decrypting the obtained encrypted first symmetric key with the secret key to obtain the first symmetric key, for generating a response message comprising the obtained first symmetric key, for encrypting the response message with the obtained second symmetric key, and for sending the response message to the second radio communication device, and in that the key decryption means (K_DEC) further comprises: - a response message decryption means (RESP_MSG_DEC) for decrypting the received response message with the generated second symmetric key to obtain the first symmetric key.
- The system according to claim 7, characterized in that the first radio communication device (MS1) further comprises: - a first authorization means (AUTH1) for enclosing a first authorization information with the first symmetric key, and in that the second radio communication device (MS2) further comprises: - a second authorization means (AUTH2) for enclosing a second authorization information with the request message, and in that the security device (SEC) further comprises: - a verification means (VER) for verifying, before generating the response message, that the received first authorization information matches the received second authorization information.
- The system according to claim 6, 7 or 8, characterized in that the second radio communication device (MS2) is connected to the security device (SEC) via a mobile telecommunication network.
- A radio communication device (MS2), characterized in that the radio communication device (MS2) comprises: - key decryption means (K_DEC) for decrypting an encrypted first symmetric key by utilizing a secret key comprised in a security device (SEC) connected to the radio communication device (MS2), the secret key being a private key associated with a public key, the encrypted first symmetric key having been received from another radio communication device (MS1) via a transfer device (SERV), and - a user data decryption means (UD_DEC) for decrypting encrypted user data with the decrypted first symmetric key, the encrypted user data having been received from the another radio communication device (MS1) via the transfer device (SERV).
- A radio communication device (MS2) of a first party, characterized in that the radio communication device (MS2) comprises: - key decryption means (K_DEC) for decrypting an encrypted first symmetric key by utilizing a secret key comprised in a security device (SEC) of a third party connected to the radio communication device (MS2), the secret key only being available to the third party, the encrypted first symmetric key having been received from another radio communication device (MS1) of the first party via a transfer device (SERV), and - a user data decryption means (UD_DEC) for decrypting encrypted user data with the decrypted first symmetric key, the encrypted user data having been received from the another radio communication device (MS1) via the transfer device (SERV), wherein the user data are user data from the another radio communication device (MS1) that are to be recovered on the radio communication device (MS2), and wherein the user data comprise personal, private and highly sensitive data of the user of the radio communication device (MS2) such as saved messages, address book entries, calendar entries and credit card numbers.
- A radio communication device (MS2), characterized in that the radio communication device (MS2) comprises: - key decryption means (K_DEC) for decrypting an encrypted first symmetric key by utilizing a secret key comprised in a security device (SEC) connected to the radio communication device (MS2), the secret key being kept secret from the radio communication device, the encrypted first symmetric key having been received from another radio communication device (MS1) via a transfer device (SERV), and - a user data decryption means (UD_DEC) for decrypting encrypted user data with the decrypted first symmetric key, the encrypted user data having been received from the another radio communication device (MS1) via the transfer device (SERV).
- A security device (SEC), characterized in that the security device (SEC) comprises: - a response message means (RESP_MSG) for receiving from a radio communication device (MS2) a request message comprising a first symmetric key encrypted with a public key and a second symmetric key and the message encrypted with the public key, for decrypting the received request message with a secret key comprised in the security device (SEC) and associated with the public key to obtain the second symmetric key and the encrypted first symmetric key, for further decrypting the obtained encrypted first symmetric key with the secret key to obtain the first symmetric key, for generating a response message comprising the obtained first symmetric key, for encrypting the response message with the obtained second symmetric key, and for sending the response message to the radio communication device (MS2).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE602004026787.2A DE602004026787C9 (de) | 2004-03-22 | 2004-03-22 | Sicherer datentransfer |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE602004026787.2A DE602004026787C9 (de) | 2004-03-22 | 2004-03-22 | Sicherer datentransfer |
PCT/FI2004/000162 WO2005091553A1 (en) | 2004-03-22 | 2004-03-22 | Secure data transfer |
EP04722304A EP1728352B1 (de) | 2004-03-22 | 2004-03-22 | Sicherer datentransfer |
Publications (1)
Publication Number | Publication Date |
---|---|
DE602004026787C9 true DE602004026787C9 (de) | 2023-09-21 |
Family
ID=34994055
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DE602004026787.2T Expired - Lifetime DE602004026787C5 (de) | 2004-03-22 | 2004-03-22 | Sicherer datentransfer |
DE602004026787.2A Expired - Lifetime DE602004026787C9 (de) | 2004-03-22 | 2004-03-22 | Sicherer datentransfer |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DE602004026787.2T Expired - Lifetime DE602004026787C5 (de) | 2004-03-22 | 2004-03-22 | Sicherer datentransfer |
Country Status (6)
Country | Link |
---|---|
US (1) | US8145907B2 (de) |
EP (1) | EP1728352B1 (de) |
CN (1) | CN1926802B (de) |
AT (1) | ATE465572T1 (de) |
DE (2) | DE602004026787C5 (de) |
WO (1) | WO2005091553A1 (de) |
Families Citing this family (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007080629A1 (ja) * | 2006-01-10 | 2007-07-19 | Fujitsu Limited | 携帯型端末装置、アドレス帳転送装置、携帯型端末装置における情報の表示方法、アドレス帳転送方法、およびコンピュータプログラム |
US8625784B2 (en) * | 2006-12-22 | 2014-01-07 | Samsung Electronics Co., Ltd. | Broadcast encryption method and broadcast decryption method thereof |
CN101183938B (zh) * | 2007-10-22 | 2011-11-23 | 华中科技大学 | 一种无线网络安全传输方法、系统及设备 |
US8738531B1 (en) * | 2008-07-08 | 2014-05-27 | InfoWatch | Cryptographic distributed storage system and method |
WO2010080637A1 (en) | 2008-12-18 | 2010-07-15 | C. R. Bard, Inc. | Needle guides for a sonographic imaging device |
US10863970B2 (en) | 2008-12-18 | 2020-12-15 | C. R. Bard, Inc. | Needle guide including enhanced visibility entrance |
US8403856B2 (en) * | 2009-03-11 | 2013-03-26 | Volcano Corporation | Rotational intravascular ultrasound probe with an active spinning element |
CN101568110A (zh) * | 2009-05-21 | 2009-10-28 | 中兴通讯股份有限公司 | 一种无线数据传输方法及系统 |
US10177934B1 (en) | 2009-09-04 | 2019-01-08 | Amazon Technologies, Inc. | Firmware updates inaccessible to guests |
US8214653B1 (en) | 2009-09-04 | 2012-07-03 | Amazon Technologies, Inc. | Secured firmware updates |
US9565207B1 (en) | 2009-09-04 | 2017-02-07 | Amazon Technologies, Inc. | Firmware updates from an external channel |
US8887144B1 (en) | 2009-09-04 | 2014-11-11 | Amazon Technologies, Inc. | Firmware updates during limited time period |
US8971538B1 (en) | 2009-09-08 | 2015-03-03 | Amazon Technologies, Inc. | Firmware validation from an external channel |
US8601170B1 (en) | 2009-09-08 | 2013-12-03 | Amazon Technologies, Inc. | Managing firmware update attempts |
US8959611B1 (en) | 2009-09-09 | 2015-02-17 | Amazon Technologies, Inc. | Secure packet management for bare metal access |
US8300641B1 (en) | 2009-09-09 | 2012-10-30 | Amazon Technologies, Inc. | Leveraging physical network interface functionality for packet processing |
US8381264B1 (en) | 2009-09-10 | 2013-02-19 | Amazon Technologies, Inc. | Managing hardware reboot and reset in shared environments |
US8516255B2 (en) * | 2010-05-10 | 2013-08-20 | Qualcomm Incorporated | Methods and apparatus for peer-to-peer transfer of secure data using near field communications |
WO2012088458A1 (en) | 2010-12-22 | 2012-06-28 | C. R. Bard, Inc. | Selectable angle needle guide |
BR112013030351A2 (pt) | 2011-06-23 | 2017-08-01 | Bard Inc C R | conjunto de guia de agulha, característica de parada de agulha e conjunto de guia de agulha para uso com uma sonda de ultrassom |
US8984273B2 (en) * | 2011-12-16 | 2015-03-17 | Protected Mobility, Llc | Method to provide secure multimedia messaging between peer systems |
CN102665204B (zh) * | 2012-04-19 | 2015-08-12 | 北京邮电大学 | 一种定位服务安全防护方法及系统 |
WO2014041397A1 (en) * | 2012-09-13 | 2014-03-20 | Nokia Corporation | Discovery and secure transfer of user interest data |
US9009480B1 (en) * | 2013-03-07 | 2015-04-14 | Facebook, Inc. | Techniques for handshake-free encrypted communication using public key bootstrapping |
US9735967B2 (en) * | 2014-04-30 | 2017-08-15 | International Business Machines Corporation | Self-validating request message structure and operation |
WO2015167381A1 (en) * | 2014-04-30 | 2015-11-05 | Telefonaktiebolaget L M Ericsson (Publ) | Residential local break out in a communication system |
KR102125562B1 (ko) * | 2014-06-18 | 2020-06-22 | 삼성전자주식회사 | 키 공유 방법 및 장치 |
CN105654290B (zh) * | 2014-11-10 | 2020-08-21 | 国民技术股份有限公司 | 一种终端与智能密码钥匙通信的方法、网关、终端及系统 |
CN104618355B (zh) * | 2015-01-19 | 2017-04-05 | 北京海泰方圆科技股份有限公司 | 一种安全存储和传输数据的方法 |
CN104602208B (zh) * | 2015-01-29 | 2018-02-27 | 成都三零瑞通移动通信有限公司 | 一种基于移动网络的短信加密通信方法 |
US10659438B2 (en) | 2015-07-09 | 2020-05-19 | International Business Machines Corporation | Policy based message cryptographic expiry |
CN105592071A (zh) * | 2015-11-16 | 2016-05-18 | 中国银联股份有限公司 | 一种在设备之间进行授权的方法和装置 |
EP3182666B1 (de) * | 2015-12-16 | 2023-01-25 | Materna Virtual Solution GmbH | Sichere übertragung von lokalen privaten codierungsdaten |
DE102021103995A1 (de) | 2021-02-19 | 2022-08-25 | Bundesdruckerei Gmbh | Auslesen von Identitätsattributen mit einem entfernte Sicherheitselement |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB9903124D0 (en) * | 1999-02-11 | 1999-04-07 | Nokia Telecommunications Oy | An authentication method |
US6643774B1 (en) * | 1999-04-08 | 2003-11-04 | International Business Machines Corporation | Authentication method to enable servers using public key authentication to obtain user-delegated tickets |
US6718467B1 (en) * | 1999-10-28 | 2004-04-06 | Cisco Technology, Inc. | Password based protocol for secure communications |
JP3552648B2 (ja) * | 2000-06-20 | 2004-08-11 | インターナショナル・ビジネス・マシーンズ・コーポレーション | アドホック無線通信用データ送受システム及びアドホック無線通信用データ送受方法 |
WO2003007542A1 (en) * | 2001-07-14 | 2003-01-23 | Kent Ridge Digital Labs | Method for certifying location stamping for wireless transactions |
DE10218943A1 (de) * | 2002-04-22 | 2003-11-13 | Deutsche Telekom Ag | Verfahren und Vorrichtung zur Implementierung eines Sicherheitssystems durch Verteilung von Authentifikationsinformationen über wenigstens ein Mobilfunknetz |
-
2004
- 2004-03-22 AT AT04722304T patent/ATE465572T1/de not_active IP Right Cessation
- 2004-03-22 EP EP04722304A patent/EP1728352B1/de not_active Expired - Lifetime
- 2004-03-22 DE DE602004026787.2T patent/DE602004026787C5/de not_active Expired - Lifetime
- 2004-03-22 DE DE602004026787.2A patent/DE602004026787C9/de not_active Expired - Lifetime
- 2004-03-22 CN CN2004800425241A patent/CN1926802B/zh not_active Expired - Lifetime
- 2004-03-22 WO PCT/FI2004/000162 patent/WO2005091553A1/en not_active Application Discontinuation
-
2006
- 2006-09-22 US US11/525,152 patent/US8145907B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
EP1728352B1 (de) | 2010-04-21 |
CN1926802B (zh) | 2010-06-02 |
US8145907B2 (en) | 2012-03-27 |
DE602004026787C5 (de) | 2021-10-21 |
CN1926802A (zh) | 2007-03-07 |
ATE465572T1 (de) | 2010-05-15 |
US20070016781A1 (en) | 2007-01-18 |
WO2005091553A1 (en) | 2005-09-29 |
EP1728352A1 (de) | 2006-12-06 |
DE602004026787D1 (de) | 2010-06-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE602004026787C9 (de) | Sicherer datentransfer | |
CN101789865B (zh) | 一种用于加密的专用服务器及加密方法 | |
CN100574511C (zh) | 一种移动终端通讯中对端身份确认的方法及系统 | |
US20150350894A1 (en) | Method and System for Establishing a Secure Communication Channel | |
CN101635924B (zh) | 一种cdma端到端加密通信系统及其密钥分发方法 | |
CN102394749B (zh) | 数据传输的线路保护方法、系统、信息安全设备及应用设备 | |
CA2457493A1 (en) | Data certification method and apparatus | |
WO2004071006A1 (ja) | ブロードキャスト暗号鍵配布システム | |
CN101917710A (zh) | 移动互联网加密通讯的方法、系统及相关装置 | |
CN101720071A (zh) | 基于安全sim卡的短消息两阶段加密传输和安全存储方法 | |
CN114900304B (zh) | 数字签名方法和装置、电子设备和计算机可读存储介质 | |
JP2008535427A (ja) | データ処理デバイスとセキュリティモジュールとの間のセキュア通信 | |
CN109218251B (zh) | 一种防重放的认证方法及系统 | |
CN105554008A (zh) | 用户终端、认证服务器、中间服务器、系统和传送方法 | |
CN114331456A (zh) | 一种通信方法、装置、系统以及可读存储介质 | |
CN102377758B (zh) | 一种对个人网设备进行认证的认证方法及系统 | |
CN101420687B (zh) | 一种基于移动终端支付的身份验证方法 | |
JPH0969831A (ja) | 暗号通信システム | |
JP4615128B2 (ja) | 暗号鍵スプリットコンバイナを用いる音声及びデータ暗号化方法 | |
US12058247B2 (en) | Secure communication device equipped with quantum encryption chip based quantum random number and method of providing secure communication service using the same | |
CN102036194A (zh) | 一种加密mms的方法及系统 | |
KR20020010165A (ko) | 일회용 패스워드를 이용한 컴퓨터 시스템 액세스 제어방법 및 인증서 활용방법 | |
JP3327368B2 (ja) | 利用者パスワード認証方法 | |
KR100808654B1 (ko) | 안전한 데이터 전송 | |
KR100458955B1 (ko) | 무선랜 보안 방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
8364 | No opposition during term of opposition |