DE60318058D1 - Verfahren und Vorrichtung zum Wiederauffinden von in einem Schlüsselverwaltungssystem gesicherten Werten - Google Patents

Verfahren und Vorrichtung zum Wiederauffinden von in einem Schlüsselverwaltungssystem gesicherten Werten

Info

Publication number
DE60318058D1
DE60318058D1 DE60318058T DE60318058T DE60318058D1 DE 60318058 D1 DE60318058 D1 DE 60318058D1 DE 60318058 T DE60318058 T DE 60318058T DE 60318058 T DE60318058 T DE 60318058T DE 60318058 D1 DE60318058 D1 DE 60318058D1
Authority
DE
Germany
Prior art keywords
key management
management system
values saved
retrieving values
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
DE60318058T
Other languages
English (en)
Inventor
Chui-Shan Teresa Lam
Jameel Ur Rahman Syed
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Schlumberger Omnes Inc
Original Assignee
Schlumberger Omnes Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Schlumberger Omnes Inc filed Critical Schlumberger Omnes Inc
Application granted granted Critical
Publication of DE60318058D1 publication Critical patent/DE60318058D1/de
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • G06Q20/027Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP] involving a payment switch or gateway
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Strategic Management (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Engineering & Computer Science (AREA)
  • Tourism & Hospitality (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Data Mining & Analysis (AREA)
  • Finance (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Lock And Its Accessories (AREA)
DE60318058T 2002-02-25 2003-02-25 Verfahren und Vorrichtung zum Wiederauffinden von in einem Schlüsselverwaltungssystem gesicherten Werten Expired - Lifetime DE60318058D1 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/082,758 US7251635B2 (en) 2002-02-25 2002-02-25 Method and apparatus for managing a key management system
PCT/US2003/005767 WO2003073690A2 (en) 2002-02-25 2003-02-25 Method and apparatus for managing a key management system

Publications (1)

Publication Number Publication Date
DE60318058D1 true DE60318058D1 (de) 2008-01-24

Family

ID=27753169

Family Applications (1)

Application Number Title Priority Date Filing Date
DE60318058T Expired - Lifetime DE60318058D1 (de) 2002-02-25 2003-02-25 Verfahren und Vorrichtung zum Wiederauffinden von in einem Schlüsselverwaltungssystem gesicherten Werten

Country Status (6)

Country Link
US (3) US7251635B2 (de)
EP (1) EP1522167B1 (de)
AT (1) ATE381168T1 (de)
AU (1) AU2003213289A1 (de)
DE (1) DE60318058D1 (de)
WO (1) WO2003073690A2 (de)

Families Citing this family (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7660421B2 (en) * 2002-06-28 2010-02-09 Hewlett-Packard Development Company, L.P. Method and system for secure storage, transmission and control of cryptographic keys
US7461260B2 (en) * 2002-12-31 2008-12-02 Intel Corporation Methods and apparatus for finding a shared secret without compromising non-shared secrets
US8045714B2 (en) * 2005-02-07 2011-10-25 Microsoft Corporation Systems and methods for managing multiple keys for file encryption and decryption
US9088551B2 (en) * 2005-06-29 2015-07-21 International Business Machines Corporation Method and system for easily and securely managing multiple keys used to have access to multiple computing resources
US8352999B1 (en) * 2006-07-21 2013-01-08 Cadence Design Systems, Inc. Method for managing data in a shared computing environment
US8290152B2 (en) * 2007-08-30 2012-10-16 Microsoft Corporation Management system for web service developer keys
US8254577B2 (en) * 2008-02-20 2012-08-28 International Business Machines Corporation Validation of encryption key
US8205098B2 (en) 2008-02-25 2012-06-19 Microsoft Corporation Secure and usable protection of a roamable credentials store
US20100115261A1 (en) * 2008-11-06 2010-05-06 International Business Machines Corporation Extensible seal management for encrypted data
KR20110128567A (ko) * 2010-05-24 2011-11-30 삼성전자주식회사 사용자 인터페이스에 포함되는 오브젝트의 제어 방법 및 상기 방법이 채용된 장치
US9432342B1 (en) 2011-03-08 2016-08-30 Ciphercloud, Inc. System and method to anonymize data transmitted to a destination computing device
US9667741B1 (en) 2011-03-08 2017-05-30 Ciphercloud, Inc. System and method to anonymize data transmitted to a destination computing device
US9292696B1 (en) 2011-03-08 2016-03-22 Ciphercloud, Inc. System and method to anonymize data transmitted to a destination computing device
US9300637B1 (en) * 2011-03-08 2016-03-29 Ciphercloud, Inc. System and method to anonymize data transmitted to a destination computing device
US9338220B1 (en) 2011-03-08 2016-05-10 Ciphercloud, Inc. System and method to anonymize data transmitted to a destination computing device
US9852311B1 (en) 2011-03-08 2017-12-26 Ciphercloud, Inc. System and method to anonymize data transmitted to a destination computing device
US11228566B1 (en) 2011-03-08 2022-01-18 Ciphercloud, Inc. System and method to anonymize data transmitted to a destination computing device
US9356993B1 (en) 2011-03-08 2016-05-31 Ciphercloud, Inc. System and method to anonymize data transmitted to a destination computing device
US8726398B1 (en) 2011-12-13 2014-05-13 Ciphercloud, Inc. System and method to anonymize data transmitted to a destination computing device
US9413526B1 (en) * 2011-03-08 2016-08-09 Ciphercloud, Inc. System and method to anonymize data transmitted to a destination computing device
US9264230B2 (en) 2011-03-14 2016-02-16 International Business Machines Corporation Secure key management
US8619990B2 (en) 2011-04-27 2013-12-31 International Business Machines Corporation Secure key creation
US8566913B2 (en) 2011-05-04 2013-10-22 International Business Machines Corporation Secure key management
US8789210B2 (en) 2011-05-04 2014-07-22 International Business Machines Corporation Key usage policies for cryptographic keys
US8634561B2 (en) * 2011-05-04 2014-01-21 International Business Machines Corporation Secure key management
US8755527B2 (en) 2011-05-04 2014-06-17 International Business Machines Corporation Key management policies for cryptographic keys
US8738908B2 (en) 2011-05-10 2014-05-27 Softlayer Technologies, Inc. System and method for web-based security authentication
US9449183B2 (en) * 2012-01-28 2016-09-20 Jianqing Wu Secure file drawer and safe
US8925059B2 (en) 2012-06-08 2014-12-30 Lockheed Martin Corporation Dynamic trust connection
US9092427B2 (en) 2012-06-08 2015-07-28 Lockheed Martin Corporation Dynamic trust session
US10372935B1 (en) 2015-11-13 2019-08-06 Google Llc Selectively encrypting commit log entries
US11392724B2 (en) * 2017-12-21 2022-07-19 City University Of Hong Kong Method for accelerating execution of application in a trusted execution environment
US10833857B2 (en) * 2018-01-29 2020-11-10 International Business Machines Corporation Encryption key management in a data storage system communicating with asynchronous key servers
CN110598440B (zh) * 2019-08-08 2023-05-09 中腾信金融信息服务(上海)有限公司 一种分布式自动加解密系统
US11184160B2 (en) 2020-02-26 2021-11-23 International Business Machines Corporation Channel key loading in a computing environment
US11502834B2 (en) 2020-02-26 2022-11-15 International Business Machines Corporation Refreshing keys in a computing environment that provides secure data transfer
US11652616B2 (en) * 2020-02-26 2023-05-16 International Business Machines Corporation Initializing a local key manager for providing secure data transfer in a computing environment
US11489821B2 (en) 2020-02-26 2022-11-01 International Business Machines Corporation Processing a request to initiate a secure data transfer in a computing environment
US11546137B2 (en) 2020-02-26 2023-01-03 International Business Machines Corporation Generation of a request to initiate a secure data transfer in a computing environment
US11405215B2 (en) 2020-02-26 2022-08-02 International Business Machines Corporation Generation of a secure key exchange authentication response in a computing environment
US11750566B1 (en) * 2020-03-31 2023-09-05 Amazon Technologies, Inc. Configuring virtual computer systems with a web service interface to perform operations in cryptographic devices

Family Cites Families (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5373561A (en) * 1992-12-21 1994-12-13 Bell Communications Research, Inc. Method of extending the validity of a cryptographic certificate
AP626A (en) * 1994-01-13 1998-01-16 Certco Llc Cryptographic system and method with key escrow feature.
US5499298A (en) 1994-03-17 1996-03-12 National University Of Singapore Controlled dissemination of digital information
US5495533A (en) * 1994-04-29 1996-02-27 International Business Machines Corporation Personal key archive
US5646997A (en) * 1994-12-14 1997-07-08 Barton; James M. Method and apparatus for embedding authentication information within digital data
US5892900A (en) 1996-08-30 1999-04-06 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US6658568B1 (en) 1995-02-13 2003-12-02 Intertrust Technologies Corporation Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management
US5673316A (en) 1996-03-29 1997-09-30 International Business Machines Corporation Creation and distribution of cryptographic envelope
US6035402A (en) * 1996-12-20 2000-03-07 Gte Cybertrust Solutions Incorporated Virtual certificate authority
US6157723A (en) * 1997-03-03 2000-12-05 Motorola, Inc. Method and apparatus for secure communications with encryption key scheduling
US7263497B1 (en) * 1998-02-06 2007-08-28 Microsoft Corporation Secure online music distribution system
US6351812B1 (en) * 1998-09-04 2002-02-26 At&T Corp Method and apparatus for authenticating participants in electronic commerce
WO2000019652A1 (en) 1998-10-01 2000-04-06 University Of Maryland Distributed shared key generation and management using fractional keys
US6442690B1 (en) 1998-10-23 2002-08-27 L3-Communications Corporation Apparatus and methods for managing key material in heterogeneous cryptographic assets
US6370250B1 (en) * 1998-10-29 2002-04-09 International Business Machines Corporation Method of authentication and storage of private keys in a public key cryptography system (PKCS)
US6301585B1 (en) 1999-03-17 2001-10-09 Sun Microsystems, Inc. Redundancy elimination in the persistence of object graphs
JP2000286836A (ja) * 1999-03-30 2000-10-13 Fujitsu Ltd 認証装置および記録媒体
US6757903B1 (en) 1999-04-05 2004-06-29 Gateway, Inc. Object driven software architecture method and apparatus
US6792424B1 (en) * 1999-04-23 2004-09-14 International Business Machines Corporation System and method for managing authentication and coherency in a storage area network
WO2001017160A1 (en) 1999-08-31 2001-03-08 Motorola Inc. Key management methods for secure communication systems
US7362868B2 (en) 2000-10-20 2008-04-22 Eruces, Inc. Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data
US6735582B2 (en) * 2000-12-15 2004-05-11 International Business Machines Corporation Pre-load cursor in a database method and system
GB0114317D0 (en) * 2001-06-13 2001-08-01 Kean Thomas A Method of protecting intellectual property cores on field programmable gate array

Also Published As

Publication number Publication date
WO2003073690A2 (en) 2003-09-04
US7603322B2 (en) 2009-10-13
WO2003073690A3 (en) 2004-03-11
EP1522167B1 (de) 2007-12-12
US20030163433A1 (en) 2003-08-28
US20070217613A1 (en) 2007-09-20
US7251635B2 (en) 2007-07-31
AU2003213289A1 (en) 2003-09-09
ATE381168T1 (de) 2007-12-15
EP1522167A2 (de) 2005-04-13
US20070127722A1 (en) 2007-06-07

Similar Documents

Publication Publication Date Title
DE60318058D1 (de) Verfahren und Vorrichtung zum Wiederauffinden von in einem Schlüsselverwaltungssystem gesicherten Werten
ATE453157T1 (de) Verfahren und vorrichtung zum sammeln und anzeigen von netzwerkgeräteinformationen
TW200502802A (en) Method, device and system for intelligent right data search management as well as the storage medium storing and executing computer program of this method
DE60006845D1 (de) Verfahren und vorrichtung zur zusammenarbeit bei multimediaerzeugung über einem netzwerk
DE60009489D1 (de) Vorrichtung und verfahren zum verwalten der verteilung von inhalten zu einem gerät
DE602004025515D1 (de) Verfahren und vorrichtung zum durchsuchen von backup-daten auf der basis von inhalt und attributen
DE69927027T2 (de) Netzwerkverfahrensverwaltung und wirksamkeits system
ATE555584T1 (de) System, verfahren und computerprogrammprodukt zur garantie elektronischer transaktionen
ATE418759T1 (de) Verfahren und vorrichtungen zum verifizieren von kontextteilnehmern in einem kontextverwaltungssystem in einer vernetzten umgebung
ATE539534T1 (de) Vorrichtung, system und verfahren zur datenspeicherung auf grid-basis
GB0303490D0 (en) System and method for checking data stored in database system used for part management
DE60314060D1 (de) Verfahren und Vorrichtung zur Schlüsselverwaltung für gesicherte Datenübertragung
WO2004003911A3 (en) Removable memory information management
IL164143A0 (en) Method and system for enterprise business process management
CN110888932A (zh) 基于区块链的城市建筑废弃物监管方法、系统及存储介质
ATE390796T1 (de) Vorrichtung und verfahren zum zugriff von kontaktinformationen in einem kommunikationsgerät
ATE434329T1 (de) Inhaltsverwaltungssystem
DE60336946D1 (de) System, Verfahren und Computerprogram zur Cachespeicherung von Domain-Name-System-Information in einem Netzwerkgateway
CN103287135A (zh) 一种物联网号牌压制和云计算远程网络信息化号牌生产装置
CN110532293B (zh) 一种基于区块链技术的数据流生命周期管理方法及系统
ATE422074T1 (de) Wiederherstellungsverfahren für eine tragbare datenverarbeitungsvorrichtung
CN112241541A (zh) 基于区块链和人像识别技术的社区安防应用方法
ATE537508T1 (de) Verfahren zum recherchieren in kommunikationsnetzwerken
GB2401458A (en) Lot trade managing method, device, program and recording medium
DE602004009193D1 (de) Verfahren, Zugangspunkt, Telekommunikationsvorrichtung, Server und Informationssystem zur Herstellung und zum Auffinden von, in einem Telekommunikationsnetzwerk, verfügbaren Netzverbindungssorten

Legal Events

Date Code Title Description
8332 No legal effect for de