DE602006005913D1 - Verfahren und Vorrichtung zum Schützen von Daten eines mobilen Agenten in einem Netzwerksystem. - Google Patents
Verfahren und Vorrichtung zum Schützen von Daten eines mobilen Agenten in einem Netzwerksystem.Info
- Publication number
- DE602006005913D1 DE602006005913D1 DE602006005913T DE602006005913T DE602006005913D1 DE 602006005913 D1 DE602006005913 D1 DE 602006005913D1 DE 602006005913 T DE602006005913 T DE 602006005913T DE 602006005913 T DE602006005913 T DE 602006005913T DE 602006005913 D1 DE602006005913 D1 DE 602006005913D1
- Authority
- DE
- Germany
- Prior art keywords
- server
- sko
- data
- key
- mobile agent
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/004—Countermeasures against attacks on cryptographic mechanisms for fault attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Strategic Management (AREA)
- Finance (AREA)
- General Business, Economics & Management (AREA)
- Computing Systems (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
- Maintenance And Management Of Digital Transmission (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP06290878A EP1860817B1 (de) | 2006-05-26 | 2006-05-26 | Verfahren und Vorrichtung zum Schützen von Daten eines mobilen Agenten in einem Netzwerksystem. |
Publications (1)
Publication Number | Publication Date |
---|---|
DE602006005913D1 true DE602006005913D1 (de) | 2009-05-07 |
Family
ID=37052586
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DE602006005913T Active DE602006005913D1 (de) | 2006-05-26 | 2006-05-26 | Verfahren und Vorrichtung zum Schützen von Daten eines mobilen Agenten in einem Netzwerksystem. |
Country Status (4)
Country | Link |
---|---|
US (1) | US8001378B2 (de) |
EP (1) | EP1860817B1 (de) |
AT (1) | ATE426967T1 (de) |
DE (1) | DE602006005913D1 (de) |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9064364B2 (en) * | 2003-10-22 | 2015-06-23 | International Business Machines Corporation | Confidential fraud detection system and method |
ATE425491T1 (de) * | 2007-01-19 | 2009-03-15 | Sap Ag | Verfahren und system zur sicheren erweiterung des weges eines mobilagenten innerhalb eines netzwerksystems |
US20090257593A1 (en) * | 2008-04-10 | 2009-10-15 | Comverse Ltd. | Method and apparatus for secure messaging |
GB2485241A (en) | 2010-11-05 | 2012-05-09 | Bluecava Inc | Incremental browser-based fingerprinting of a computing device |
US10019259B2 (en) | 2013-01-29 | 2018-07-10 | Mobilize.Net Corporation | Code transformation using extensibility libraries |
US9465608B2 (en) | 2013-03-15 | 2016-10-11 | ArtinSoft Corporation | Code separation with semantic guarantees |
US10061573B2 (en) | 2013-01-29 | 2018-08-28 | Mobilize.Net Corporation | User interfaces of application porting software platform |
US9459862B2 (en) * | 2013-01-29 | 2016-10-04 | ArtinSoft Corporation | Automated porting of application to mobile infrastructures |
US9817953B2 (en) * | 2013-09-26 | 2017-11-14 | Rubicon Labs, Inc. | Systems and methods for establishing and using distributed key servers |
EP2978158A1 (de) * | 2014-07-21 | 2016-01-27 | Nxp B.V. | Verfahren und Architektur zur Verschlüsselung und Entschlüsselung von Daten |
US10460087B2 (en) | 2016-08-18 | 2019-10-29 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus to secure and protect data-centers and generalized utility-based cloud computing environments from uninvited guests in the form of both hardware and software |
CN108848094B (zh) * | 2018-06-22 | 2021-04-16 | 平安科技(深圳)有限公司 | 数据安全验证方法、装置、系统、计算机设备及存储介质 |
JP7372527B2 (ja) * | 2019-09-26 | 2023-11-01 | 富士通株式会社 | 通信中継プログラム、中継装置、及び通信中継方法 |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000031958A (ja) | 1998-07-16 | 2000-01-28 | Yaskawa Electric Corp | 移動エージェントの認証方法 |
EP1067457B1 (de) | 1999-07-05 | 2008-12-17 | Sony Deutschland GmbH | Verwaltung eines Kommunikationsnetzwerks und Migration von mobilen Agenten |
GB2354350B (en) * | 1999-09-17 | 2004-03-24 | Mitel Corp | Policy representations and mechanisms for the control of software |
US7020697B1 (en) * | 1999-10-01 | 2006-03-28 | Accenture Llp | Architectures for netcentric computing systems |
JP3584831B2 (ja) | 2000-01-18 | 2004-11-04 | 日本電気株式会社 | 移動エージェントによる署名計算システムおよびプログラムを記録した記録媒体 |
DE10023818A1 (de) | 2000-05-15 | 2001-11-22 | Siemens Ag | Lizenzmanager |
US6513059B1 (en) * | 2000-08-24 | 2003-01-28 | Cambira Corporation | Adaptive collaborative intelligent network system |
JP3918448B2 (ja) * | 2001-04-02 | 2007-05-23 | 日本ビクター株式会社 | エージェントシステムにおける認証方法 |
JP2002305513A (ja) | 2001-04-05 | 2002-10-18 | Canon Software Inc | 情報通信システム及び情報端末及びその制御方法及びコンピュータプログラム並びに記憶媒体 |
CN1717697B (zh) * | 2001-06-12 | 2012-01-25 | 捷讯研究有限公司 | 压缩安全电子邮件用于与移动通信设备交换的系统和方法 |
US20040044739A1 (en) * | 2002-09-04 | 2004-03-04 | Robert Ziegler | System and methods for processing PIN-authenticated transactions |
US20040083373A1 (en) | 2002-10-28 | 2004-04-29 | Perkins Gregory M. | Automatically generated cryptographic functions for renewable tamper resistant security systems |
US7669207B2 (en) * | 2003-07-17 | 2010-02-23 | Gradient Enterprises, Inc. | Method for detecting, reporting and responding to network node-level events and a system thereof |
JP2005149205A (ja) | 2003-11-17 | 2005-06-09 | Mitsubishi Electric Corp | モバイルエージェントシステム |
US20050141706A1 (en) * | 2003-12-31 | 2005-06-30 | Regli William C. | System and method for secure ad hoc mobile communications and applications |
GB2415580B (en) | 2004-06-24 | 2006-08-16 | Toshiba Res Europ Ltd | Network node security analysis method |
US7881468B2 (en) * | 2005-04-08 | 2011-02-01 | Telefonaktiebolaget L M Ericsson (Publ) | Secret authentication key setup in mobile IPv6 |
US8151112B2 (en) * | 2005-04-22 | 2012-04-03 | Gerard Lin | Deliver-upon-request secure electronic message system |
ATE426966T1 (de) * | 2006-05-26 | 2009-04-15 | Sap Ag | Verfahren und vorrichtung zur sicheren bearbeitung eines befehls durch einen mobilen agent in einem netzwerk. |
-
2006
- 2006-05-26 DE DE602006005913T patent/DE602006005913D1/de active Active
- 2006-05-26 EP EP06290878A patent/EP1860817B1/de active Active
- 2006-05-26 AT AT06290878T patent/ATE426967T1/de not_active IP Right Cessation
-
2007
- 2007-05-18 US US11/804,696 patent/US8001378B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
EP1860817A1 (de) | 2007-11-28 |
ATE426967T1 (de) | 2009-04-15 |
US20070288751A1 (en) | 2007-12-13 |
US8001378B2 (en) | 2011-08-16 |
EP1860817B1 (de) | 2009-03-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE602006005913D1 (de) | Verfahren und Vorrichtung zum Schützen von Daten eines mobilen Agenten in einem Netzwerksystem. | |
ATE514314T1 (de) | Verfahren zum sicheren entriegeln eines mobilen endgeräts | |
CN103150493A (zh) | 一种JavaScript代码的混淆方法和装置 | |
JP2006191534A5 (de) | ||
CN104038761B (zh) | 一种基于cabac二进制串映射的加密域h.264/avc视频数据隐藏方法 | |
CN105282090B (zh) | 一种互联网上防非法访问的公开url加密编码方法 | |
CN110348181A (zh) | 一种校验软件使用权合法性的方法 | |
CN106796624A (zh) | 挑战响应方法和相关联的计算设备 | |
ATE549813T1 (de) | System und verfahren zum fernbedienten zurücksetzen von kennwort und kryptografischem schlüssel | |
CN112528236B (zh) | 基于虚拟机的应用软件授权方法 | |
CN102135944A (zh) | 一种在移动通讯设备中安全存储数据的方法 | |
Zhang et al. | A Joint Encryption and Reversible Data Hiding Scheme Based on Integer‐DWT and Arnold Map Permutation | |
JP2013524587A5 (de) | ||
CN109412754B (zh) | 一种编码云的数据存储、分发以及访问方法 | |
JP2011512762A5 (de) | ||
CN104426663A (zh) | 一种url地址加密方法 | |
CN103383721A (zh) | 基于数字水印和进程隐形加密相结合的管线数据监控方法 | |
CN108197438A (zh) | 一种基于复合加密技术的数字版权保护方法 | |
ATE426966T1 (de) | Verfahren und vorrichtung zur sicheren bearbeitung eines befehls durch einen mobilen agent in einem netzwerk. | |
CN108632295A (zh) | 防止终端反复攻击服务器的方法 | |
Yasmeen et al. | A novel watermarking scheme based on discrete wavelet transform‐singular value decomposition | |
CN1801699A (zh) | 一种访问密码设备的方法 | |
CN107888593A (zh) | 一种登录安全巡查系统 | |
Choudhury et al. | Data encryption in public cloud using multi-phase encryption model | |
CN109714148B (zh) | 对用户身份进行远程多方认证的方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
8364 | No opposition during term of opposition |