DE602004032313D1 - Datenauthentifizierungsverfahren und Agent basiertes System - Google Patents
Datenauthentifizierungsverfahren und Agent basiertes SystemInfo
- Publication number
- DE602004032313D1 DE602004032313D1 DE602004032313T DE602004032313T DE602004032313D1 DE 602004032313 D1 DE602004032313 D1 DE 602004032313D1 DE 602004032313 T DE602004032313 T DE 602004032313T DE 602004032313 T DE602004032313 T DE 602004032313T DE 602004032313 D1 DE602004032313 D1 DE 602004032313D1
- Authority
- DE
- Germany
- Prior art keywords
- agent
- data
- random key
- signature
- trusted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
- 238000000034 method Methods 0.000 title abstract 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2115—Third party
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
- General Factory Administration (AREA)
- Communication Control (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP04360049A EP1594280B1 (de) | 2004-05-07 | 2004-05-07 | Datenauthentifizierungsverfahren und Agent basiertes System |
Publications (1)
Publication Number | Publication Date |
---|---|
DE602004032313D1 true DE602004032313D1 (de) | 2011-06-01 |
Family
ID=34931773
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DE602004032313T Expired - Lifetime DE602004032313D1 (de) | 2004-05-07 | 2004-05-07 | Datenauthentifizierungsverfahren und Agent basiertes System |
Country Status (5)
Country | Link |
---|---|
US (1) | US7765396B2 (de) |
EP (1) | EP1594280B1 (de) |
CN (1) | CN1694395A (de) |
AT (1) | ATE506797T1 (de) |
DE (1) | DE602004032313D1 (de) |
Families Citing this family (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7565358B2 (en) * | 2005-08-08 | 2009-07-21 | Google Inc. | Agent rank |
US7890757B2 (en) * | 2005-12-30 | 2011-02-15 | Novell, Inc. | Receiver non-repudiation |
US8171293B2 (en) | 2005-12-30 | 2012-05-01 | Apple Inc. | Receiver non-repudiation via a secure device |
US9112681B2 (en) * | 2007-06-22 | 2015-08-18 | Fujitsu Limited | Method and apparatus for secure information transfer to support migration |
US8631235B2 (en) * | 2007-08-08 | 2014-01-14 | Oracle America, Inc. | System and method for storing data using a virtual worm file system |
CN100553193C (zh) * | 2007-10-23 | 2009-10-21 | 西安西电捷通无线网络通信有限公司 | 一种基于可信第三方的实体双向鉴别方法及其系统 |
CN100495964C (zh) * | 2007-12-03 | 2009-06-03 | 西安西电捷通无线网络通信有限公司 | 一种轻型接入认证方法 |
US8806214B2 (en) | 2008-12-01 | 2014-08-12 | Novell, Inc. | Communication with non-repudiation and blind signatures |
US8458477B2 (en) * | 2008-12-01 | 2013-06-04 | Novell, Inc. | Communication with non-repudiation |
CN101645776B (zh) * | 2009-08-28 | 2011-09-21 | 西安西电捷通无线网络通信股份有限公司 | 一种引入在线第三方的实体鉴别方法 |
CN101674182B (zh) | 2009-09-30 | 2011-07-06 | 西安西电捷通无线网络通信股份有限公司 | 引入在线可信第三方的实体公钥获取、证书验证及鉴别的方法及系统 |
US8606792B1 (en) | 2010-02-08 | 2013-12-10 | Google Inc. | Scoring authors of posts |
US8935177B2 (en) * | 2010-12-22 | 2015-01-13 | Yahoo! Inc. | Method and system for anonymous measurement of online advertisement using offline sales |
US9270467B1 (en) * | 2013-05-16 | 2016-02-23 | Symantec Corporation | Systems and methods for trust propagation of signed files across devices |
US9699167B1 (en) * | 2015-01-06 | 2017-07-04 | Shoretel, Inc. | Distributed authentication |
CN107066893B (zh) * | 2017-02-28 | 2018-11-09 | 腾讯科技(深圳)有限公司 | 区块链中账户信息的处理方法和装置 |
CN114091014B (zh) * | 2021-10-29 | 2024-10-18 | 珠海大横琴科技发展有限公司 | 一种数据处理的方法和装置 |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6367013B1 (en) * | 1995-01-17 | 2002-04-02 | Eoriginal Inc. | System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents |
US7062781B2 (en) * | 1997-02-12 | 2006-06-13 | Verizon Laboratories Inc. | Method for providing simultaneous parallel secure command execution on multiple remote hosts |
US6108420A (en) | 1997-04-10 | 2000-08-22 | Channelware Inc. | Method and system for networked installation of uniquely customized, authenticable, and traceable software application |
-
2004
- 2004-05-07 AT AT04360049T patent/ATE506797T1/de not_active IP Right Cessation
- 2004-05-07 EP EP04360049A patent/EP1594280B1/de not_active Expired - Lifetime
- 2004-05-07 DE DE602004032313T patent/DE602004032313D1/de not_active Expired - Lifetime
-
2005
- 2005-04-21 US US11/110,707 patent/US7765396B2/en not_active Expired - Fee Related
- 2005-05-08 CN CN200510068374.8A patent/CN1694395A/zh active Pending
Also Published As
Publication number | Publication date |
---|---|
EP1594280B1 (de) | 2011-04-20 |
EP1594280A1 (de) | 2005-11-09 |
US7765396B2 (en) | 2010-07-27 |
CN1694395A (zh) | 2005-11-09 |
US20050251691A1 (en) | 2005-11-10 |
ATE506797T1 (de) | 2011-05-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
ATE506797T1 (de) | Datenauthentifizierungsverfahren und agent basiertes system | |
US8239679B2 (en) | Authentication method, client, server and system | |
KR101054970B1 (ko) | 개인 정보를 포함하는 전자 증명서를 이용하여 통신 상대를 인증하기 위한 시스템, 장치, 방법, 및 컴퓨터 판독 가능한 기록 매체 | |
WO2008024559A3 (en) | Method and apparatus for authenticating applications to secure services | |
SG143962A1 (en) | Validating an authentication chip using a secret key | |
EP1363424A3 (de) | Authentifizierungsverfahren und Vorrichtung zur verschlüsselt eines Tickets mit einem symmetrisch Schlüssel, wobei der symmetrisch Sclüssel mit einem asymmetrisch Schlüssel verschlusselt ist | |
MY162283A (en) | Method and apparatus for mutual authentication | |
WO2008001327A3 (en) | Method and apparatus for encrypting/decrypting data | |
JP2009545229A5 (de) | ||
TW200701728A (en) | Data-encrypting/decrypting method, data-saving media using the method, and data-encrypting/decrypting module | |
MXPA03010476A (es) | Sistema y metodo para transmitir informacion reducida de un certificado para realizar operaciones de encriptacion. | |
WO2004012378A3 (en) | Digital content security system and method | |
CN1801029A (zh) | 生成数字证书及应用该所生成的数字证书的方法 | |
JP2007511810A (ja) | 乱数関数を利用した実行証明 | |
DE60231629D1 (de) | Verfahren zur datenübermittlung zwischen einem lokalem server und lokalen klienten | |
ATE309586T1 (de) | Verfahren und vorrichtung zur symmetrischen schlüsselerzeugung in einer persönlichen sicherheitsvorrichtung mit begrenzten vertrauensbeziehungen | |
WO2007139706A3 (en) | Authenticating a tamper-resistant module in a base station router | |
CN111884814B (zh) | 一种用于智能终端防伪造的方法和系统 | |
TW200729890A (en) | Device and method for key block based authentication | |
SI2414983T1 (en) | Secure data system | |
ATE378747T1 (de) | Verfahren und system zur schlüsseldistribution mit einem authentifizierungschritt und einem schlüsseldistributionsschritt unter verwendung von kek (key encryption key) | |
EP0912011A3 (de) | Verfahren und Vorrichtung zur Verschlüsselung und zur Rückgewinnung von Schlüseln | |
MXPA05010126A (es) | Metodo de suministro de acceso. | |
FR2826811B1 (fr) | Procede d'authentification cryptographique | |
ATE387774T1 (de) | Verfahren und vorrichtung zur gesicherten übertragung von daten zwischen teilnehmern |