DE60308971T2 - Verfahren und Vorrichtung für sichere Datenkommunikationsverbindungen - Google Patents
Verfahren und Vorrichtung für sichere Datenkommunikationsverbindungen Download PDFInfo
- Publication number
- DE60308971T2 DE60308971T2 DE60308971T DE60308971T DE60308971T2 DE 60308971 T2 DE60308971 T2 DE 60308971T2 DE 60308971 T DE60308971 T DE 60308971T DE 60308971 T DE60308971 T DE 60308971T DE 60308971 T2 DE60308971 T2 DE 60308971T2
- Authority
- DE
- Germany
- Prior art keywords
- data
- key
- delegation
- message
- data processing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims description 84
- 238000004891 communication Methods 0.000 title claims description 44
- 230000006854 communication Effects 0.000 title claims description 44
- 238000012545 processing Methods 0.000 claims description 73
- 238000004422 calculation algorithm Methods 0.000 claims description 15
- 238000010295 mobile communication Methods 0.000 claims description 8
- 230000008569 process Effects 0.000 claims description 6
- 230000004044 response Effects 0.000 claims description 6
- 238000003860 storage Methods 0.000 claims description 3
- 230000001419 dependent effect Effects 0.000 claims 1
- 230000006870 function Effects 0.000 description 19
- 230000015654 memory Effects 0.000 description 14
- 210000002023 somite Anatomy 0.000 description 9
- 238000013459 approach Methods 0.000 description 6
- 238000013475 authorization Methods 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 6
- 238000007726 management method Methods 0.000 description 5
- 229920001690 polydopamine Polymers 0.000 description 5
- 238000012546 transfer Methods 0.000 description 5
- 230000009471 action Effects 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 4
- 230000007246 mechanism Effects 0.000 description 4
- 230000001360 synchronised effect Effects 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 230000001010 compromised effect Effects 0.000 description 3
- 238000004590 computer program Methods 0.000 description 3
- 238000013478 data encryption standard Methods 0.000 description 3
- 239000000284 extract Substances 0.000 description 3
- 210000004027 cell Anatomy 0.000 description 2
- 238000009826 distribution Methods 0.000 description 2
- 238000009434 installation Methods 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- BJGMCBVGOYXEBZ-LBPRGKRZSA-N (2s)-5-amino-2-[4-[(5-methyl-1,2-oxazol-3-yl)sulfamoyl]anilino]-5-oxopentanoic acid Chemical compound O1C(C)=CC(NS(=O)(=O)C=2C=CC(N[C@@H](CCC(N)=O)C(O)=O)=CC=2)=N1 BJGMCBVGOYXEBZ-LBPRGKRZSA-N 0.000 description 1
- 241001136792 Alle Species 0.000 description 1
- 101000896740 Solanum tuberosum Cysteine protease inhibitor 9 Proteins 0.000 description 1
- 241000700605 Viruses Species 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007175 bidirectional communication Effects 0.000 description 1
- 210000004271 bone marrow stromal cell Anatomy 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000010267 cellular communication Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000011217 control strategy Methods 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 229920002239 polyacrylonitrile Polymers 0.000 description 1
- 201000006292 polyarteritis nodosa Diseases 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
- 230000003936 working memory Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB0220203A GB2392590B (en) | 2002-08-30 | 2002-08-30 | Methods and apparatus for secure data communication links |
| GB0220203 | 2002-08-30 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| DE60308971D1 DE60308971D1 (de) | 2006-11-23 |
| DE60308971T2 true DE60308971T2 (de) | 2007-06-14 |
Family
ID=9943244
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| DE60308971T Expired - Fee Related DE60308971T2 (de) | 2002-08-30 | 2003-08-29 | Verfahren und Vorrichtung für sichere Datenkommunikationsverbindungen |
Country Status (5)
| Country | Link |
|---|---|
| US (1) | US20040117623A1 (enExample) |
| EP (1) | EP1394982B1 (enExample) |
| JP (1) | JP4199074B2 (enExample) |
| DE (1) | DE60308971T2 (enExample) |
| GB (1) | GB2392590B (enExample) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE102017219265A1 (de) * | 2017-10-26 | 2019-05-02 | Bundesdruckerei Gmbh | Verhaltensbasierte Authentifizierung unter Berücksichtigung von Umweltparametern |
| DE102017219261A1 (de) * | 2017-10-26 | 2019-05-02 | Bundesdruckerei Gmbh | Bereitstellen physiologischer Daten |
Families Citing this family (90)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8079086B1 (en) | 1997-11-06 | 2011-12-13 | Finjan, Inc. | Malicious mobile code runtime monitoring system and methods |
| US9219755B2 (en) | 1996-11-08 | 2015-12-22 | Finjan, Inc. | Malicious mobile code runtime monitoring system and methods |
| US7058822B2 (en) | 2000-03-30 | 2006-06-06 | Finjan Software, Ltd. | Malicious mobile code runtime monitoring system and methods |
| GB2410658B (en) * | 2002-10-14 | 2006-03-01 | Toshiba Res Europ Ltd | Methods and systems for flexible delegation |
| US6845338B1 (en) * | 2003-02-25 | 2005-01-18 | Symbol Technologies, Inc. | Telemetric contextually based spatial audio system integrated into a mobile terminal wireless system |
| US7181726B2 (en) * | 2003-03-07 | 2007-02-20 | Benq Corporation | Method for providing active protection to programming tools for programmable devices |
| TW595195B (en) * | 2003-04-04 | 2004-06-21 | Benq Corp | Network lock method and related apparatus by ciphered network lock and inerasable deciphering key |
| CN1838980A (zh) * | 2003-09-19 | 2006-09-27 | 诺基亚公司 | 支持使用多人游戏集线器的无线多人游戏的方法和设备 |
| US8190893B2 (en) * | 2003-10-27 | 2012-05-29 | Jp Morgan Chase Bank | Portable security transaction protocol |
| EP1680720B1 (en) * | 2003-11-07 | 2012-01-04 | Telecom Italia S.p.A. | Method and system for the authentication of a user of a data processing system |
| US7636844B2 (en) * | 2003-11-17 | 2009-12-22 | Intel Corporation | Method and system to provide a trusted channel within a computer system for a SIM device |
| US20050138387A1 (en) * | 2003-12-19 | 2005-06-23 | Lam Wai T. | System and method for authorizing software use |
| DE102004025734B4 (de) * | 2004-05-26 | 2006-07-27 | Siemens Ag | Verfahren zur Optimierung von Rekonfigurationsprozessen in Mobilfunknetzwerken mit rekonfigurierbaren Endgeräten durch Sammlung und Bereitstellung geeigneter Messdaten sowie eine entsprechende Anordnung |
| US8341088B2 (en) * | 2004-06-30 | 2012-12-25 | France Telecom | Multipurpose electronic payment method and system |
| US20060068758A1 (en) * | 2004-09-30 | 2006-03-30 | Abhay Dharmadhikari | Securing local and intra-platform links |
| US8627086B2 (en) * | 2004-10-11 | 2014-01-07 | Telefonaktiebolaget Lm Ericsson (Publ) | Secure loading and storing of data in a data processing device |
| JP4704729B2 (ja) * | 2004-10-20 | 2011-06-22 | 株式会社日立製作所 | パケットデータ処理ノード装置 |
| US20060089123A1 (en) * | 2004-10-22 | 2006-04-27 | Frank Edward H | Use of information on smartcards for authentication and encryption |
| US20060130154A1 (en) * | 2004-11-30 | 2006-06-15 | Wai Lam | Method and system for protecting and verifying stored data |
| KR20060087271A (ko) * | 2005-01-28 | 2006-08-02 | 엘지전자 주식회사 | 이동통신 가입자 인증의 보안 전송 방법 |
| US7468981B2 (en) * | 2005-02-15 | 2008-12-23 | Cisco Technology, Inc. | Clock-based replay protection |
| US7676679B2 (en) * | 2005-02-15 | 2010-03-09 | Cisco Technology, Inc. | Method for self-synchronizing time between communicating networked systems using timestamps |
| US8291224B2 (en) | 2005-03-30 | 2012-10-16 | Wells Fargo Bank, N.A. | Distributed cryptographic management for computer systems |
| US20060282525A1 (en) * | 2005-06-10 | 2006-12-14 | Giles James R | Method and apparatus for delegating responses to conditions in computing systems |
| US8015404B2 (en) * | 2005-09-16 | 2011-09-06 | Gm Global Technology Operations, Llc | System and method for collecting traffic data using probe vehicles |
| US8788802B2 (en) | 2005-09-29 | 2014-07-22 | Qualcomm Incorporated | Constrained cryptographic keys |
| US7681239B2 (en) * | 2005-09-30 | 2010-03-16 | Microsoft Corporation | Modularly constructing a software defined radio |
| DE102005050878A1 (de) * | 2005-10-21 | 2007-04-26 | Fiducia It Ag | Verfahren zur datentechnisch gesicherten elektronischen Kommunikation sowie eine Vorrichtung zur Ausführung dieses Verfahrens |
| US8396041B2 (en) | 2005-11-08 | 2013-03-12 | Microsoft Corporation | Adapting a communication network to varying conditions |
| US8381047B2 (en) | 2005-11-30 | 2013-02-19 | Microsoft Corporation | Predicting degradation of a communication channel below a threshold based on data transmission errors |
| CA2571255C (en) * | 2005-12-23 | 2016-05-10 | Bce Inc. | Wireless device authentication between different networks |
| US7551915B1 (en) * | 2006-04-24 | 2009-06-23 | Sprint Spectrum L.P. | Method of establishing route optimized communication in mobile IPv6 by securing messages sent between a mobile node and home agent |
| US20070297609A1 (en) * | 2006-06-23 | 2007-12-27 | Research In Motion Limited | Secure Wireless HeartBeat |
| US20080005558A1 (en) * | 2006-06-29 | 2008-01-03 | Battelle Memorial Institute | Methods and apparatuses for authentication and validation of computer-processable communications |
| US7570398B2 (en) * | 2006-10-10 | 2009-08-04 | Ricoh Company, Ltd. | Secure scanning device |
| US8103247B2 (en) * | 2006-10-31 | 2012-01-24 | Microsoft Corporation | Automated secure pairing for wireless devices |
| JP4997373B2 (ja) | 2006-10-31 | 2012-08-08 | ティーティーアイ インベンションズ シー リミテッド ライアビリティ カンパニー | 暗号ハッシュを用いたウィルス位置決定法 |
| WO2008074366A1 (en) * | 2006-12-19 | 2008-06-26 | Telefonaktiebolaget Lm Ericsson (Publ) | Managing user access in a communications network |
| CN101262342A (zh) * | 2007-03-05 | 2008-09-10 | 松下电器产业株式会社 | 分布式授权与验证方法、装置及系统 |
| US7991152B2 (en) * | 2007-03-28 | 2011-08-02 | Intel Corporation | Speeding up Galois Counter Mode (GCM) computations |
| US20100293379A1 (en) * | 2007-05-31 | 2010-11-18 | Beijing Transpacific Ip Technology Development Ltd | method for secure data transmission in wireless sensor network |
| US8331989B2 (en) * | 2007-06-15 | 2012-12-11 | Intel Corporation | Field programming of a mobile station with subscriber identification and related information |
| EP2183697A4 (en) * | 2007-06-18 | 2014-12-03 | Ericsson Telefon Ab L M | SECURITY FOR SOFTWARE-DEFINED WIRELESS DEVICES |
| US8316236B2 (en) * | 2007-08-31 | 2012-11-20 | Cisco Technology, Inc. | Determining security states using binary output sequences |
| US8213923B1 (en) * | 2007-11-02 | 2012-07-03 | Trend Micro Incorporated | Product update via voice call in mobile security |
| US8676998B2 (en) * | 2007-11-29 | 2014-03-18 | Red Hat, Inc. | Reverse network authentication for nonstandard threat profiles |
| US20090216680A1 (en) * | 2008-02-26 | 2009-08-27 | Battelle Energy Alliance, Llc | Systems and Methods for Performing File Distribution and Purchase |
| KR20100126476A (ko) * | 2008-03-04 | 2010-12-01 | 애플 인크. | 보안 동작 환경에서의 소프트웨어 개발자들에 대한 코드 자격들의 관리 |
| US8565434B2 (en) * | 2008-05-27 | 2013-10-22 | Qualcomm Incorporated | Methods and systems for maintaining security keys for wireless communication |
| US20100153709A1 (en) * | 2008-12-10 | 2010-06-17 | Qualcomm Incorporated | Trust Establishment From Forward Link Only To Non-Forward Link Only Devices |
| DE102009005978B4 (de) | 2009-01-23 | 2011-02-03 | Gottfried Wilhelm Leibniz Universität Hannover | Verfahren zur verteilten Erzeugung miteinander korrelierender Daten |
| US9059979B2 (en) * | 2009-02-27 | 2015-06-16 | Blackberry Limited | Cookie verification methods and apparatus for use in providing application services to communication devices |
| US20100250949A1 (en) * | 2009-03-31 | 2010-09-30 | Torino Maria E | Generation, requesting, and/or reception, at least in part, of token |
| US20100287402A1 (en) * | 2009-05-11 | 2010-11-11 | Electronics And Telecommunications Research Institute | Timestamping apparatus and method |
| US8588746B2 (en) * | 2009-10-31 | 2013-11-19 | SAIFE Technologies Incorporated | Technique for bypassing an IP PBX |
| US8380881B2 (en) * | 2009-11-10 | 2013-02-19 | Broadcom Corporation | Synchronizing data transmission between a wireless network and a wired network |
| CN102656841B (zh) * | 2009-12-18 | 2015-07-08 | 诺基亚公司 | 凭证转移 |
| CN102804826B (zh) * | 2010-03-17 | 2016-03-02 | 瑞典爱立信有限公司 | 用于srns重定位的增强密钥管理 |
| US8571218B2 (en) | 2010-06-01 | 2013-10-29 | GreatCall, Inc. | Short message service cipher |
| US8839357B2 (en) * | 2010-12-22 | 2014-09-16 | Canon U.S.A., Inc. | Method, system, and computer-readable storage medium for authenticating a computing device |
| US20120189122A1 (en) * | 2011-01-20 | 2012-07-26 | Yi-Li Huang | Method with dynamic keys for mutual authentication in wireless communication environments without prior authentication connection |
| KR101425711B1 (ko) * | 2011-10-13 | 2014-08-04 | (주) 아이씨티케이 | 스마트 모바일 환경에서의 정보 보안 시스템 |
| CN102595405A (zh) * | 2012-01-21 | 2012-07-18 | 华为技术有限公司 | 一种网络接入的认证方法、系统和设备 |
| JP5295408B1 (ja) * | 2012-05-13 | 2013-09-18 | 淳也 榎本 | セキュア通信方法、被操作装置及び操作プログラム |
| WO2014069909A1 (en) * | 2012-11-01 | 2014-05-08 | Lg Electronics Inc. | Method and apparatus of providing integrity protection for proximity-based service discovery with extended discovery range |
| US9270649B1 (en) * | 2013-03-11 | 2016-02-23 | Emc Corporation | Secure software authenticator data transfer between processing devices |
| US9092778B2 (en) | 2013-03-15 | 2015-07-28 | Varsgen, Llc | Bank account protection method utilizing a variable assigning request string generator and receiver algorithm |
| WO2014167389A1 (en) * | 2013-04-12 | 2014-10-16 | Nokia Siemens Networks Oy | Secure radio information transfer over mobile radio bearer |
| US9401905B1 (en) * | 2013-09-25 | 2016-07-26 | Emc Corporation | Transferring soft token authentication capabilities to a new device |
| US9225516B1 (en) * | 2013-10-03 | 2015-12-29 | Whatsapp Inc. | Combined authentication and encryption |
| CN104883677B (zh) | 2014-02-28 | 2018-09-18 | 阿里巴巴集团控股有限公司 | 一种近场通讯设备间通讯的连接方法、装置和系统 |
| US9544329B2 (en) | 2014-03-18 | 2017-01-10 | Shape Security, Inc. | Client/server security by an intermediary executing instructions received from a server and rendering client application instructions |
| US9954848B1 (en) | 2014-04-04 | 2018-04-24 | Wells Fargo Bank, N.A. | Central cryptographic management for computer systems |
| US9800602B2 (en) | 2014-09-30 | 2017-10-24 | Shape Security, Inc. | Automated hardening of web page content |
| US9524158B2 (en) * | 2015-02-23 | 2016-12-20 | Apple Inc. | Managing firmware updates for integrated components within mobile devices |
| NL2014743B1 (en) * | 2015-04-30 | 2017-01-18 | Ubiqu B V | A first entity, a second entity, an intermediate node, methods for setting up a secure session between a first and second entity, and computer program products. |
| US10783506B2 (en) * | 2015-08-28 | 2020-09-22 | Transparent Wireless Systems, Llc | Methods and systems for access control to secure facilities |
| JP6449131B2 (ja) * | 2015-10-23 | 2019-01-09 | Kddi株式会社 | 通信装置、通信方法、およびコンピュータプログラム |
| US9699655B1 (en) * | 2016-02-23 | 2017-07-04 | T-Mobile Usa, Inc. | Cellular device authentication |
| JP6471112B2 (ja) | 2016-02-29 | 2019-02-13 | Kddi株式会社 | 通信システム、端末装置、通信方法、及びプログラム |
| US10567363B1 (en) * | 2016-03-03 | 2020-02-18 | Shape Security, Inc. | Deterministic reproduction of system state using seeded pseudo-random number generators |
| US20180060989A1 (en) * | 2016-08-30 | 2018-03-01 | MaaS Global Oy | System, method and device for digitally assisted personal mobility management |
| US10735425B2 (en) * | 2017-01-31 | 2020-08-04 | Pivotal Software, Inc. | Invocation path security in distributed systems |
| JP6740545B2 (ja) * | 2017-05-30 | 2020-08-19 | 日本電気株式会社 | 情報処理装置、検証装置、情報処理システム、情報処理方法、及び、プログラム |
| US11431511B2 (en) * | 2019-06-03 | 2022-08-30 | Intuit Inc. | Centralized authentication and authorization with certificate management |
| WO2021045675A1 (en) | 2019-09-02 | 2021-03-11 | Grabtaxi Holdings Pte. Ltd. | Communications server apparatus and method for determination of an abstention attack |
| CN112073187B (zh) * | 2020-08-28 | 2023-03-28 | 江苏卓易信息科技股份有限公司 | 一种基于非阻塞方式加速系统可信链构建的方法 |
| US11265106B1 (en) | 2020-12-29 | 2022-03-01 | Imperva, Inc. | Streaming-friendly technology for detection of data |
| CN113919005B (zh) * | 2021-10-18 | 2024-06-14 | 北京理工大学 | 一种基于Schnorr聚合签名的数字证书颁发方法 |
| CN116757685B (zh) * | 2023-06-07 | 2025-01-28 | 四川公用信息产业有限责任公司 | 一种5g消息的支付安全加密系统 |
Family Cites Families (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5224163A (en) * | 1990-09-28 | 1993-06-29 | Digital Equipment Corporation | Method for delegating authorization from one entity to another through the use of session encryption keys |
| JP4083218B2 (ja) * | 1995-06-05 | 2008-04-30 | サートコ・インコーポレーテッド | マルチステップディジタル署名方法およびそのシステム |
| GB2357225B (en) * | 1999-12-08 | 2003-07-16 | Hewlett Packard Co | Electronic certificate |
| US6734886B1 (en) * | 1999-12-21 | 2004-05-11 | Personalpath Systems, Inc. | Method of customizing a browsing experience on a world-wide-web site |
| ATE345631T1 (de) * | 2000-06-30 | 2006-12-15 | Microsoft Corp | Vorrichtungen und verfahren für delegierte zugangsberechtigung von zusammenfassungsinformation |
| US20020138635A1 (en) * | 2001-03-26 | 2002-09-26 | Nec Usa, Inc. | Multi-ISP controlled access to IP networks, based on third-party operated untrusted access stations |
| AU2002258999A1 (en) * | 2001-04-25 | 2002-11-05 | Probaris Technologies, Inc. | Method and system for managing access to services |
| US7340438B2 (en) * | 2001-05-21 | 2008-03-04 | Nokia Corporation | Method and apparatus for managing and enforcing user privacy |
| US7698381B2 (en) * | 2001-06-20 | 2010-04-13 | Microsoft Corporation | Methods and systems for controlling the scope of delegation of authentication credentials |
-
2002
- 2002-08-30 GB GB0220203A patent/GB2392590B/en not_active Expired - Lifetime
-
2003
- 2003-08-29 EP EP03255384A patent/EP1394982B1/en not_active Expired - Lifetime
- 2003-08-29 DE DE60308971T patent/DE60308971T2/de not_active Expired - Fee Related
- 2003-08-29 US US10/650,755 patent/US20040117623A1/en not_active Abandoned
- 2003-09-01 JP JP2003308871A patent/JP4199074B2/ja not_active Expired - Fee Related
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE102017219265A1 (de) * | 2017-10-26 | 2019-05-02 | Bundesdruckerei Gmbh | Verhaltensbasierte Authentifizierung unter Berücksichtigung von Umweltparametern |
| DE102017219261A1 (de) * | 2017-10-26 | 2019-05-02 | Bundesdruckerei Gmbh | Bereitstellen physiologischer Daten |
Also Published As
| Publication number | Publication date |
|---|---|
| EP1394982A1 (en) | 2004-03-03 |
| GB2392590A (en) | 2004-03-03 |
| GB0220203D0 (en) | 2002-10-09 |
| US20040117623A1 (en) | 2004-06-17 |
| DE60308971D1 (de) | 2006-11-23 |
| EP1394982B1 (en) | 2006-10-11 |
| JP4199074B2 (ja) | 2008-12-17 |
| JP2004166238A (ja) | 2004-06-10 |
| GB2392590B (en) | 2005-02-23 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| DE60308971T2 (de) | Verfahren und Vorrichtung für sichere Datenkommunikationsverbindungen | |
| DE69433771T2 (de) | Verfahren und Vorrichtung zur Geheimhaltung und Authentifizierung in einem mobilen drahtlosen Netz | |
| DE60029217T2 (de) | Verfahren und vorrichtung zum initialisieren von sicheren verbindungen zwischen und nur zwischen zueinandergehörenden schnurlosen einrichtungen | |
| DE19822795C2 (de) | Verfahren und Anordnung zum rechnergestützten Austausch kryptographischer Schlüssel zwischen einer ersten Computereinheit und einer zweiten Computereinheit | |
| DE60037593T2 (de) | Gesichertes ad hoc netzwerk sowie verfahren zu dessen betreiben | |
| DE69925920T2 (de) | Sichere verarbeitung für die authentifizierung eines drahtlosen kommunikationsgeräts | |
| DE60302276T2 (de) | Verfahren zur ferngesteuerten Änderung eines Kommunikationspasswortes | |
| DE60312911T2 (de) | System für mobile Authentifizierung mit reduzierten Authentifizierungsverzögerung | |
| DE60310968T2 (de) | Sicherheits- und Privatsphärenverbesserungen für Sicherheitseinrichtungen | |
| DE602004012233T2 (de) | Verfahren zur Bereitstellung eines Signierungsschlüssels zur digitalen Signierung, Überprüfung oder Verschlüsselung von Daten | |
| US7424115B2 (en) | Generating asymmetric keys in a telecommunications system | |
| EP1449324B1 (de) | Nutzung eines public-key-schlüsselpaares im endgerät zur authentisierung und autorisierung des telekommunikations-teilnehmers gegenüber dem netzbetreiber und geschäftspartnern | |
| DE112017000483T5 (de) | System, gerät und verfahren für schlüsselbereitstellungsdelegation | |
| US20040073801A1 (en) | Methods and systems for flexible delegation | |
| DE112015000213T5 (de) | Passwortgestützte Berechtigungsprüfung | |
| DE10393847B4 (de) | Verfahren und Vorrichtung zum Auffinden einer gemeinsam genutzten vertraulichen Information ohne Beeinträchtigung nicht-gemeinsam genutzter vertraulicher Informationen | |
| US20050144144A1 (en) | System and method for authenticating a terminal based upon at least one characteristic of the terminal located at a position within an organization | |
| US20050149724A1 (en) | System and method for authenticating a terminal based upon a position of the terminal within an organization | |
| DE112008002860T5 (de) | Verfahren und Vorrichtung für das Bereitstellen einer sicheren Verknüpfung mit einer Benutzeridentität in einem System für digitale Rechteverwaltung | |
| DE60224391T2 (de) | Sicherer Zugang zu einem Teilnehmermodul | |
| DE60311328T2 (de) | Verfahren und vorrichtung zur netzwerksicherheit | |
| DE19518546C1 (de) | Verfahren zum rechnergestützten Austausch kryptographischer Schlüssel zwischen einer Benutzercomputereinheit U und einer Netzcomputereinheit N | |
| EP3939226A1 (de) | Verfahren zum authentifizieren eines computersystems | |
| DE19518544C1 (de) | Verfahren zum rechnergestützten Austausch kryptographischer Schlüssel zwischen einer Benutzercomputereinheit und einer Netzcomputereinheit | |
| DE19518545C1 (de) | Verfahren zum rechnergestützten Austausch kryptographischer Schlüssel zwischen einer Benutzercomputereinheit und einer Netzcomputereinheit |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 8364 | No opposition during term of opposition | ||
| 8339 | Ceased/non-payment of the annual fee |