DE60315726D1 - Verfahren zum sicherstellen von anonymität in einer elektronischen transaktion mittels sitzungsschlüsselblöcken - Google Patents
Verfahren zum sicherstellen von anonymität in einer elektronischen transaktion mittels sitzungsschlüsselblöckenInfo
- Publication number
- DE60315726D1 DE60315726D1 DE60315726T DE60315726T DE60315726D1 DE 60315726 D1 DE60315726 D1 DE 60315726D1 DE 60315726 T DE60315726 T DE 60315726T DE 60315726 T DE60315726 T DE 60315726T DE 60315726 D1 DE60315726 D1 DE 60315726D1
- Authority
- DE
- Germany
- Prior art keywords
- server
- encrypted
- transaction
- anonymity
- subscribers
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
- 238000000034 method Methods 0.000 title abstract 3
- 238000004590 computer program Methods 0.000 abstract 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/02—Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3823—Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/383—Anonymous user system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/102—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/335,433 US20040128259A1 (en) | 2002-12-31 | 2002-12-31 | Method for ensuring privacy in electronic transactions with session key blocks |
US335433 | 2002-12-31 | ||
PCT/EP2003/015040 WO2004059588A1 (en) | 2002-12-31 | 2003-12-19 | Method for ensuring privacy in electronic transactions with session key blocks |
Publications (2)
Publication Number | Publication Date |
---|---|
DE60315726D1 true DE60315726D1 (de) | 2007-09-27 |
DE60315726T2 DE60315726T2 (de) | 2008-06-05 |
Family
ID=32655350
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DE60315726T Expired - Lifetime DE60315726T2 (de) | 2002-12-31 | 2003-12-19 | Verfahren zum sicherstellen von anonymität in einer elektronischen transaktion mittels sitzungsschlüsselblöcken |
Country Status (9)
Country | Link |
---|---|
US (1) | US20040128259A1 (de) |
EP (1) | EP1593100B1 (de) |
KR (1) | KR20050085233A (de) |
CN (1) | CN100382112C (de) |
AT (1) | ATE370479T1 (de) |
AU (1) | AU2003300244A1 (de) |
CA (1) | CA2511061A1 (de) |
DE (1) | DE60315726T2 (de) |
WO (1) | WO2004059588A1 (de) |
Families Citing this family (60)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9520993B2 (en) * | 2001-01-26 | 2016-12-13 | International Business Machines Corporation | Renewable traitor tracing |
US20040162780A1 (en) * | 2003-02-19 | 2004-08-19 | General Instrument Corporation | Methods and apparatus for integrating one-way and two-way security systems to enable secure distribution of encrypted services |
US7661128B2 (en) * | 2005-03-31 | 2010-02-09 | Google Inc. | Secure login credentials for substantially anonymous users |
KR100765750B1 (ko) * | 2005-05-09 | 2007-10-15 | 삼성전자주식회사 | 브로드캐스트 암호화 방식에 따라 효율적으로암호화/복호화하는 방법 및 장치 |
KR100708134B1 (ko) | 2005-05-25 | 2007-04-17 | 삼성전자주식회사 | 브로드캐스트 암호화 방식에 따라 효율적으로암호화/복호화하는 방법 및 장치 |
KR100708133B1 (ko) | 2005-05-25 | 2007-04-17 | 삼성전자주식회사 | 브로드캐스트 암호화 방식에 따라 효율적으로암호화/복호화하는 방법 및 장치 |
US7630497B2 (en) * | 2005-09-19 | 2009-12-08 | International Business Machines Corporation | System and method for assigning sequence keys to a media player to enable hybrid traitor tracing |
US7711114B2 (en) * | 2005-09-19 | 2010-05-04 | International Business Machines Corporation | System and method for assigning sequence keys to a media player to enable flexible traitor tracing |
EP2022207B1 (de) * | 2006-05-31 | 2018-10-10 | Orange | Kryptografisches verfahren mit integrierter verschlüsselung und aufhebung, system, verfahren und programme zur implementierung dieses verfahrens |
US7958544B2 (en) * | 2006-07-21 | 2011-06-07 | Google Inc. | Device authentication |
US20080109553A1 (en) * | 2006-11-08 | 2008-05-08 | Brian Fowler | System and method for reducing click fraud |
KR20080058833A (ko) * | 2006-12-22 | 2008-06-26 | 삼성전자주식회사 | 개인 정보 보호 장치 및 방법 |
US8108928B2 (en) * | 2008-06-20 | 2012-01-31 | International Business Machines Corporation | Adaptive traitor tracing |
US8122501B2 (en) * | 2008-06-20 | 2012-02-21 | International Business Machines Corporation | Traitor detection for multilevel assignment |
US8422684B2 (en) * | 2008-08-15 | 2013-04-16 | International Business Machines Corporation | Security classes in a media key block |
US8112262B1 (en) * | 2008-09-30 | 2012-02-07 | Interactive TKO, Inc. | Service modeling and virtualization |
US8571209B2 (en) | 2009-01-19 | 2013-10-29 | International Business Machines | Recording keys in a broadcast-encryption-based system |
US20110113038A1 (en) * | 2009-11-12 | 2011-05-12 | International Business Machines Corporation | Search term security |
US8285698B2 (en) * | 2009-11-17 | 2012-10-09 | International Business Machines Corporation | Securing search queries |
EP2502192A2 (de) * | 2009-11-18 | 2012-09-26 | Magid Joseph Mina | Zahlungssysteme und -verfahren bei anonymen transaktionen |
WO2011101040A1 (en) * | 2010-02-22 | 2011-08-25 | Borislav Gajanovic | Method and internet platform for providing a communication connection |
US8646059B1 (en) | 2010-12-17 | 2014-02-04 | Google Inc. | Wallet application for interacting with a secure element application without a trusted server for authentication |
US8352749B2 (en) | 2010-12-17 | 2013-01-08 | Google Inc. | Local trusted services manager for a contactless smart card |
US8335921B2 (en) | 2010-12-17 | 2012-12-18 | Google, Inc. | Writing application data to a secure element |
US9691055B2 (en) | 2010-12-17 | 2017-06-27 | Google Inc. | Digital wallet |
US8171525B1 (en) | 2011-09-15 | 2012-05-01 | Google Inc. | Enabling users to select between secure service providers using a central trusted service manager |
US8255687B1 (en) | 2011-09-15 | 2012-08-28 | Google Inc. | Enabling users to select between secure service providers using a key escrow service |
US8313036B1 (en) | 2011-09-16 | 2012-11-20 | Google Inc. | Secure application directory |
US8385553B1 (en) | 2012-02-28 | 2013-02-26 | Google Inc. | Portable secure element |
US8429409B1 (en) | 2012-04-06 | 2013-04-23 | Google Inc. | Secure reset of personal and service provider information on mobile devices |
CN103780386B (zh) * | 2012-10-23 | 2017-02-15 | 航天信息股份有限公司 | 基于身份的盲签名方法和装置 |
US8898681B1 (en) | 2013-02-22 | 2014-11-25 | Ca, Inc. | Mainframe virtualization |
US9558105B2 (en) | 2013-03-15 | 2017-01-31 | Ca, Inc. | Transactional boundaries for virtual model generation |
US10025839B2 (en) | 2013-11-29 | 2018-07-17 | Ca, Inc. | Database virtualization |
US9727314B2 (en) | 2014-03-21 | 2017-08-08 | Ca, Inc. | Composite virtual services |
US9531609B2 (en) | 2014-03-23 | 2016-12-27 | Ca, Inc. | Virtual service automation |
US9477454B2 (en) | 2015-02-12 | 2016-10-25 | Ca, Inc. | Automated software deployment |
EP3113501A1 (de) | 2015-06-29 | 2017-01-04 | Nagravision SA | Inhaltsschutz |
US10296445B2 (en) | 2015-09-13 | 2019-05-21 | Ca, Inc. | Automated system documentation generation |
US10628420B2 (en) | 2015-12-18 | 2020-04-21 | Ca, Inc. | Dynamic virtual service |
US9886365B2 (en) | 2016-01-07 | 2018-02-06 | Ca, Inc. | Transactional boundaries for software system debugging |
US10154098B2 (en) | 2016-01-07 | 2018-12-11 | Ca, Inc. | Transactional boundaries for software system profiling |
US9983856B2 (en) | 2016-01-08 | 2018-05-29 | Ca, Inc. | Transaction flow visualization |
US10650154B2 (en) | 2016-02-12 | 2020-05-12 | Sophos Limited | Process-level control of encrypted content |
US9984248B2 (en) | 2016-02-12 | 2018-05-29 | Sophos Limited | Behavioral-based control of access to encrypted content by a process |
US10628597B2 (en) | 2016-04-14 | 2020-04-21 | Sophos Limited | Just-in-time encryption |
US10681078B2 (en) | 2016-06-10 | 2020-06-09 | Sophos Limited | Key throttling to mitigate unauthorized file access |
US10791097B2 (en) | 2016-04-14 | 2020-09-29 | Sophos Limited | Portable encryption format |
US10263966B2 (en) | 2016-04-14 | 2019-04-16 | Sophos Limited | Perimeter enforcement of encryption rules |
US10686827B2 (en) | 2016-04-14 | 2020-06-16 | Sophos Limited | Intermediate encryption for exposed content |
US9946639B2 (en) | 2016-03-30 | 2018-04-17 | Ca, Inc. | Transactional boundaries for virtualization within a software system |
US9898390B2 (en) | 2016-03-30 | 2018-02-20 | Ca, Inc. | Virtual service localization |
US10341214B2 (en) | 2016-03-30 | 2019-07-02 | Ca, Inc. | Scenario coverage in test generation |
US10114736B2 (en) | 2016-03-30 | 2018-10-30 | Ca, Inc. | Virtual service data set generation |
US10394583B2 (en) | 2016-03-31 | 2019-08-27 | Ca, Inc. | Automated model generation for a software system |
GB2551983B (en) | 2016-06-30 | 2020-03-04 | Sophos Ltd | Perimeter encryption |
US10779163B2 (en) * | 2017-01-05 | 2020-09-15 | Huawei Technologies Co., Ltd. | Network architecture having multicast and broadcast multimedia subsystem capabilities |
US11611442B1 (en) | 2019-12-18 | 2023-03-21 | Wells Fargo Bank, N.A. | Systems and applications for semi-anonymous communication tagging |
US11509484B1 (en) | 2019-12-18 | 2022-11-22 | Wells Fargo Bank, N.A. | Security settlement using group signatures |
US11398916B1 (en) | 2019-12-18 | 2022-07-26 | Wells Fargo Bank, N.A. | Systems and methods of group signature management with consensus |
Family Cites Families (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5978482A (en) * | 1995-08-21 | 1999-11-02 | International Business Machines Corporation | Method and system for protection of digital information |
US5812670A (en) * | 1995-12-28 | 1998-09-22 | Micali; Silvio | Traceable anonymous transactions |
US6061789A (en) * | 1996-01-12 | 2000-05-09 | International Business Machines Corporation | Secure anonymous information exchange in a network |
US5961593A (en) * | 1997-01-22 | 1999-10-05 | Lucent Technologies, Inc. | System and method for providing anonymous personalized browsing by a proxy system in a network |
GB9800854D0 (en) * | 1998-01-16 | 1998-03-11 | Nexus Corp | A material and device for terminal transaction |
US6118873A (en) * | 1998-04-24 | 2000-09-12 | International Business Machines Corporation | System for encrypting broadcast programs in the presence of compromised receiver devices |
US6006200A (en) * | 1998-05-22 | 1999-12-21 | International Business Machines Corporation | Method of providing an identifier for transactions |
WO2000001108A2 (en) * | 1998-06-30 | 2000-01-06 | Privada, Inc. | Bi-directional, anonymous electronic transactions |
EP1028401A3 (de) * | 1999-02-12 | 2003-06-25 | Citibank, N.A. | Verfahren und System zum Durchführen einer Bankkartentransaktion |
US6289450B1 (en) * | 1999-05-28 | 2001-09-11 | Authentica, Inc. | Information security architecture for encrypting documents for remote access while maintaining access control |
WO2001048674A1 (en) * | 1999-12-24 | 2001-07-05 | Link Plus, Inc. | Method and system for authenticating identity on internet |
US20010044787A1 (en) * | 2000-01-13 | 2001-11-22 | Gil Shwartz | Secure private agent for electronic transactions |
US20010029485A1 (en) * | 2000-02-29 | 2001-10-11 | E-Scoring, Inc. | Systems and methods enabling anonymous credit transactions |
US7177848B2 (en) * | 2000-04-11 | 2007-02-13 | Mastercard International Incorporated | Method and system for conducting secure payments over a computer network without a pseudo or proxy account number |
US20020022967A1 (en) * | 2000-08-18 | 2002-02-21 | International Business Machines Corporation | Goods delivery method, online shopping method, online shopping system, server, and vender server |
US20020035694A1 (en) * | 2000-09-15 | 2002-03-21 | Global E-Cash Inc. | Method and apparatus for anonymous remote transactions |
US20020077885A1 (en) * | 2000-12-06 | 2002-06-20 | Jared Karro | Electronic voting system |
US7010125B2 (en) * | 2001-01-26 | 2006-03-07 | Interntional Business Machines Corporation | Method for tracing traitor receivers in a broadcast encryption system |
US7039803B2 (en) * | 2001-01-26 | 2006-05-02 | International Business Machines Corporation | Method for broadcast encryption and key revocation of stateless receivers |
US7421083B2 (en) * | 2001-04-05 | 2008-09-02 | General Instrument Corporation | System for seamlessly updating service keys with automatic recovery |
-
2002
- 2002-12-31 US US10/335,433 patent/US20040128259A1/en not_active Abandoned
-
2003
- 2003-12-19 KR KR1020057009827A patent/KR20050085233A/ko not_active Application Discontinuation
- 2003-12-19 CN CNB2003801081082A patent/CN100382112C/zh not_active Expired - Fee Related
- 2003-12-19 CA CA002511061A patent/CA2511061A1/en not_active Abandoned
- 2003-12-19 DE DE60315726T patent/DE60315726T2/de not_active Expired - Lifetime
- 2003-12-19 AU AU2003300244A patent/AU2003300244A1/en not_active Abandoned
- 2003-12-19 EP EP03799521A patent/EP1593100B1/de not_active Expired - Lifetime
- 2003-12-19 WO PCT/EP2003/015040 patent/WO2004059588A1/en active IP Right Grant
- 2003-12-19 AT AT03799521T patent/ATE370479T1/de not_active IP Right Cessation
Also Published As
Publication number | Publication date |
---|---|
CA2511061A1 (en) | 2004-07-15 |
WO2004059588A1 (en) | 2004-07-15 |
ATE370479T1 (de) | 2007-09-15 |
EP1593100A1 (de) | 2005-11-09 |
DE60315726T2 (de) | 2008-06-05 |
US20040128259A1 (en) | 2004-07-01 |
EP1593100B1 (de) | 2007-08-15 |
CN100382112C (zh) | 2008-04-16 |
AU2003300244A1 (en) | 2004-07-22 |
CN1732485A (zh) | 2006-02-08 |
KR20050085233A (ko) | 2005-08-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE60315726D1 (de) | Verfahren zum sicherstellen von anonymität in einer elektronischen transaktion mittels sitzungsschlüsselblöcken | |
CN112417510B (zh) | 一种基于区块链保护政务隐私数据的可信共享方法 | |
Neuman et al. | Kerberos: An authentication service for computer networks | |
CN102457507B (zh) | 云计算资源安全共享方法、装置及系统 | |
CN110022217B (zh) | 一种基于区块链的广告传媒业务数据可信存证系统 | |
CN107347068A (zh) | 单点登录方法及系统、电子设备 | |
CN108537046A (zh) | 一种基于区块链技术的在线合同签署系统及方法 | |
CN109474430B (zh) | 一种集群密钥生成方法、装置及其存储介质 | |
DK1108308T3 (da) | System og fremgangsmåde til afviklingskontrol ved netværksanvendelser | |
Yan et al. | Context-aware verifiable cloud computing | |
CN100365974C (zh) | 一种控制计算机登录的设备及方法 | |
JP7376727B2 (ja) | 暗号学的に安全な要求の検証 | |
CN103618737A (zh) | 一种云计算环境下的虚拟机vnc控制台优化方案 | |
CN102821093A (zh) | 一种支持跨终端应用的内容保护授权系统和方法 | |
Han et al. | IP2DM: integrated privacy‐preserving data management architecture for smart grid V2G networks | |
WO2012176506A1 (ja) | シングルサインオンシステム、シングルサインオン方法および認証サーバ連携プログラム | |
CN105553979A (zh) | 一种智能电网中隐私信息的加密发布方法 | |
CN105072138A (zh) | 一种云系统安全访问方法、装置及系统 | |
CN103368918A (zh) | 一种动态口令认证方法、装置及系统 | |
JP2008287673A (ja) | コンテンツ配信サービスシステム | |
CN106131605A (zh) | 基于时间轮盘和用户行为的活跃用户集维护系统及方法 | |
JP2012195733A (ja) | 秘匿分析処理方法、プログラム及び装置 | |
Chen et al. | A secure mobile DRM system based on cloud architecture | |
KR20100130467A (ko) | 사용자 중심의 아이덴터티 관리 시스템 및 그 방법 | |
Hojabri | Ensuring data storage security in cloud computing with effect of kerberos |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
8364 | No opposition during term of opposition | ||
8320 | Willingness to grant licences declared (paragraph 23) |