New! View global litigation for patent families

DE69704684D1 - Vorrichtung und Verfahren zur Authentifizierung von Zugangsrechten eines Benutzers zu Betriebsmitteln nach dem Challenge-Response-Prinzip - Google Patents

Vorrichtung und Verfahren zur Authentifizierung von Zugangsrechten eines Benutzers zu Betriebsmitteln nach dem Challenge-Response-Prinzip

Info

Publication number
DE69704684D1
DE69704684D1 DE1997604684 DE69704684A DE69704684D1 DE 69704684 D1 DE69704684 D1 DE 69704684D1 DE 1997604684 DE1997604684 DE 1997604684 DE 69704684 A DE69704684 A DE 69704684A DE 69704684 D1 DE69704684 D1 DE 69704684D1
Authority
DE
Grant status
Grant
Patent type
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
DE1997604684
Other languages
English (en)
Other versions
DE69704684T2 (de )
Inventor
Kil-Ho Shin
Kenichi Kobayashi
Toru Aratani
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fuji Xerox Co Ltd
Original Assignee
Fuji Xerox Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Grant date

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2139Recurrent verification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/603Digital right managament [DRM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
DE1997604684 1996-02-23 1997-02-20 Vorrichtung und Verfahren zur Authentifizierung von Zugangsrechten eines Benutzers zu Betriebsmitteln nach dem Challenge-Response-Prinzip Expired - Lifetime DE69704684D1 (de)

Priority Applications (2)

Application Number Priority Date Filing Date Title
JP6207696 1996-02-23
JP41897 1997-01-06

Publications (1)

Publication Number Publication Date
DE69704684D1 true DE69704684D1 (de) 2001-06-07

Family

ID=26333401

Family Applications (2)

Application Number Title Priority Date Filing Date
DE1997604684 Expired - Lifetime DE69704684D1 (de) 1996-02-23 1997-02-20 Vorrichtung und Verfahren zur Authentifizierung von Zugangsrechten eines Benutzers zu Betriebsmitteln nach dem Challenge-Response-Prinzip
DE1997604684 Expired - Lifetime DE69704684T2 (de) 1996-02-23 1997-02-20 Vorrichtung und Verfahren zur Authentifizierung von Zugangsrechten eines Benutzers zu Betriebsmitteln nach dem Challenge-Response-Prinzip

Family Applications After (1)

Application Number Title Priority Date Filing Date
DE1997604684 Expired - Lifetime DE69704684T2 (de) 1996-02-23 1997-02-20 Vorrichtung und Verfahren zur Authentifizierung von Zugangsrechten eines Benutzers zu Betriebsmitteln nach dem Challenge-Response-Prinzip

Country Status (4)

Country Link
US (1) USRE42762E1 (de)
EP (1) EP0792044B1 (de)
JP (2) JP3613921B2 (de)
DE (2) DE69704684D1 (de)

Families Citing this family (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7290288B2 (en) 1997-06-11 2007-10-30 Prism Technologies, L.L.C. Method and system for controlling access, by an authentication server, to protected computer resources provided via an internet protocol network
JPH11122240A (ja) 1997-10-17 1999-04-30 Fuji Xerox Co Ltd 復号装置および方法ならびにアクセス資格認証装置および方法
US5974550A (en) * 1997-12-12 1999-10-26 Intel Corporation Method for strongly authenticating another process in a different address space
JP4113274B2 (ja) 1998-02-05 2008-07-09 富士ゼロックス株式会社 認証装置および方法
US6296071B1 (en) 1998-06-30 2001-10-02 Harley-Davidson Motor Company Group, Inc. Motorcycle rocker assembly
CN1322700C (zh) 1999-01-27 2007-06-20 法国电信公司 利用非对称密钥证明真实性或完整性的方法和计算机系统
FR2788911A1 (fr) * 1999-01-27 2000-07-28 France Telecom Procede, systeme, dispositif pour diminuer la charge de travail pendant une session destinee a prouver l'authenticite d'une entite et/ou l'origine et l'integrite d'un message
JP2003511899A (ja) 1999-10-01 2003-03-25 テレディフュジオン・ドゥ・フランス エンティティの真正性及びメッセージの完全性を証明するための特定のキーのセット
GB2348584B (en) 1999-02-18 2004-02-04 Nds Ltd Identification protocols
JP3389186B2 (ja) 1999-04-27 2003-03-24 松下電器産業株式会社 半導体メモリカード及び読み出し装置
KR100844546B1 (ko) 1999-10-01 2008-07-08 마드 리즈크 엔티티의 진정성 또는 메시지의 무결성 검증방법, 시스템 및 장치
JP2001117823A (ja) 1999-10-15 2001-04-27 Fuji Xerox Co Ltd アクセス資格認証機能付きデータ記憶装置
JP2003518283A (ja) * 1999-12-21 2003-06-03 ネットスケープ コミュニケーションズ コーポレーション ハードウェア・トークン自己登録処理
US7302703B2 (en) 2000-12-20 2007-11-27 Aol, Llc A Delaware Limited Liability Company Hardware token self enrollment process
WO2001075604A1 (en) * 2000-04-03 2001-10-11 Juergen Stark Method of controlling access to personal resources
US7984104B1 (en) 2000-04-03 2011-07-19 West Corporation Method and system for content driven electronic messaging
US7062535B1 (en) 2000-04-03 2006-06-13 Centerpost Communications, Inc. Individual XML message processing platform
WO2001076119A3 (en) 2000-04-03 2004-02-19 Craig Goren Method and system for content driven electronic messaging
JP2002278839A (ja) * 2001-03-15 2002-09-27 Sony Corp データアクセス管理システム、メモリ搭載デバイス、およびデータアクセス管理方法、並びにプログラム記憶媒体
JP2002278838A (ja) 2001-03-15 2002-09-27 Sony Corp メモリアクセス制御システム、デバイス管理装置、パーティション管理装置、メモリ搭載デバイス、およびメモリアクセス制御方法、並びにプログラム記憶媒体
US7110858B2 (en) 2001-04-09 2006-09-19 Koninklijke Philips Electronics N.V. Object identification uses prediction of data in distributed network
US20040255134A1 (en) * 2002-02-27 2004-12-16 Harutoshi Miyamoto Host device
KR20050099495A (ko) 2003-01-31 2005-10-13 마츠시타 덴끼 산교 가부시키가이샤 반도체 메모리카드, 및 이 반도체 메모리카드를 제어하기위한 프로그램
US6883505B1 (en) 2004-04-02 2005-04-26 Midwest Motorcycle Supply Rocker box assembly with reed valve
JP4742682B2 (ja) 2005-06-01 2011-08-10 富士ゼロックス株式会社 コンテンツ保護装置及びコンテンツ保護解除装置
JP4435084B2 (ja) 2005-12-27 2010-03-17 フェリカネットワークス株式会社 通信システム,リーダライタ,認証方法,およびコンピュータプログラム
DE102007009212A1 (de) * 2007-02-26 2008-08-28 Giesecke & Devrient Gmbh Tragbarer Datenträger
US8850549B2 (en) * 2009-05-01 2014-09-30 Beyondtrust Software, Inc. Methods and systems for controlling access to resources and privileges per process
JP5990927B2 (ja) * 2012-02-17 2016-09-14 富士電機株式会社 制御システム、制御装置及びプログラム実行制御方法
US8843739B2 (en) * 2012-04-04 2014-09-23 Lockheed Martin Corporation Anti-tamper device, system, method, and computer-readable medium
DE102015119140A1 (de) * 2015-11-06 2017-05-11 Océ Printing Systems GmbH & Co. KG Verfahren zum Steuern des Zugriffs auf verschlüsselte Dateien und Computersystem

Family Cites Families (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4218738A (en) * 1978-05-05 1980-08-19 International Business Machines Corporation Method for authenticating the identity of a user of an information system
US4926480A (en) 1983-08-22 1990-05-15 David Chaum Card-computer moderated systems
US4672572A (en) * 1984-05-21 1987-06-09 Gould Inc. Protector system for computer access and use
US4856062A (en) * 1984-11-30 1989-08-08 Kenneth Weiss Computing and indicating device
GB8431381D0 (en) * 1984-12-12 1985-01-23 Ibm Security module
JPH0762854B2 (ja) * 1985-03-05 1995-07-05 カシオ計算機株式会社 Icカードシステム
US4757533A (en) * 1985-09-11 1988-07-12 Computer Security Corporation Security system for microcomputers
US5050213A (en) * 1986-10-14 1991-09-17 Electronic Publishing Resources, Inc. Database usage metering and protection system and method
US4827508A (en) * 1986-10-14 1989-05-02 Personal Library Software, Inc. Database usage metering and protection system and method
US4977594A (en) * 1986-10-14 1990-12-11 Electronic Publishing Resources, Inc. Database usage metering and protection system and method
US5191611A (en) 1989-04-03 1993-03-02 Lang Gerald S Method and apparatus for protecting material on storage media and for transferring material on storage media to various recipients
FR2649748B1 (fr) * 1989-07-17 1991-10-11 Axyval Sa Systeme de protection de documents ou d'objets de valeur enfermes dans un contenant inviolable physiquement, qui passe par ailleurs par une succession d'etats logiques authentifies en nombre restreint
JP2989200B2 (ja) 1989-09-13 1999-12-13 富士通株式会社 個人識別装置
US5029207A (en) * 1990-02-01 1991-07-02 Scientific-Atlanta, Inc. External security module for a television signal decoder
US5237610A (en) * 1990-02-01 1993-08-17 Scientific-Atlanta, Inc. Independent external security module for a digitally upgradeable television signal decoder
JPH0575135A (ja) 1991-08-16 1993-03-26 Rohm Co Ltd 半導体記憶装置
JPH0568727A (ja) 1991-09-11 1993-03-23 Tonen Corp スキー板
JPH05274269A (ja) * 1991-11-18 1993-10-22 Internatl Business Mach Corp <Ibm> コンピュータ・システムにおけるアクセスの正当性検証のための方法及びシステム
US5157726A (en) * 1991-12-19 1992-10-20 Xerox Corporation Document copy authentication
EP0560714B1 (de) * 1992-03-10 1999-01-13 Frama Ag Frankiermaschine
FR2700430B1 (fr) * 1992-12-30 1995-02-10 Jacques Stern Procédé d'authentification d'au moins un dispositif d'identification par un dispositif de vérification et dispositif pour sa mise en Óoeuvre.
NL9301348A (nl) * 1993-08-02 1995-03-01 Stefanus Alfonsus Brands Elektronisch betalingssysteem.
WO1995005712A3 (en) * 1993-08-13 1995-04-27 Frank Thomson Leighton Secret key exchange
US5467396A (en) * 1993-10-27 1995-11-14 The Titan Corporation Tamper-proof data storage
US5499298A (en) * 1994-03-17 1996-03-12 National University Of Singapore Controlled dissemination of digital information
US5517567A (en) * 1994-08-23 1996-05-14 Daq Electronics Inc. Key distribution system
US5913025A (en) * 1996-11-14 1999-06-15 Novell, Inc. Method and apparatus for proxy authentication
US6061740A (en) * 1996-12-09 2000-05-09 Novell, Inc. Method and apparatus for heterogeneous network management

Also Published As

Publication number Publication date Type
JP3614057B2 (ja) 2005-01-26 grant
EP0792044A3 (de) 1998-05-27 application
DE69704684T2 (de) 2004-07-15 grant
USRE42762E1 (en) 2011-09-27 grant
JPH10247905A (ja) 1998-09-14 application
JP3613921B2 (ja) 2005-01-26 grant
EP0792044A2 (de) 1997-08-27 application
EP0792044B1 (de) 2001-05-02 grant
JP2000151583A (ja) 2000-05-30 application

Similar Documents

Publication Publication Date Title
DE69417929T2 (de) Verfahren und vorrichtung zur atmosphärkontrolle eines im wesentlich geschlossenen raumes
DE69426958T2 (de) Verfahren und Vorrichtung zum Anziehen von Schraubverbindungen
DE69610550T2 (de) Verfahren und vorrichtung zum pressgissen
DE69611606T2 (de) Vorrichtung und verfahren zum orienieren und positionieren von gegenständen
DE69326880T2 (de) Frequenzselektives Verfahren und Vorrichtung
DE69308052T2 (de) Verfahren und Vorrichtung zum Lagern
DE9309524U1 (de) Verschließbare Vorrichtung zur Sicherung von Geräten gegen unbefugtes Benutzen
DE69710356T2 (de) Verfahren und vorrichtung zur erkennung von löcher und verstopften stellen
DE69314802T2 (de) Verfahren und vorrichtung zum verdichten
DE69616613T2 (de) Verfahren und Vorrichtung zum Tiefziehen
DE69605159T2 (de) Verfahren und Vorrichtung zum Sterilisieren von Oberflächen
DE69625872T2 (de) Vorrichtung und Verfahren zum Verhindern der Ausbreitung von Mikroben
DE69427954T2 (de) Verfahren und vorrichtung zum flüssigkeitsauftrag
DE69713157T2 (de) Verfahren und vorrichtung zum sterilisieren von gegenständen
DE69519866T2 (de) Vorrichtung und verfahren zum spielen von computerspielen uber ein telekommunikationsnetz
DE9401332U1 (de) Vorrichtung zum Ziehen von Schloßkernen
DE69125742T2 (de) Verfahren und Vorrichtung zum Kontrollieren und zum Gewähren des Zugangs zu einem Gelände oder einer Dienstleistung
DE69326626T2 (de) Verfahren und Vorrichtung zum Auffinden und Schützen von Personen und Objekten
DE69616409T2 (de) Verbinder, dessen Herstellungsverfahren, Vorrichtung zum Formen eines derartigen Verbinders und Verfahren zum Montieren von einer Haltevorrichtung
DE69426362T2 (de) Verfahren und vorrichtung zum doppelbandgiessen
DE69206157T2 (de) Verfahren und vorrichtung zum erhalten kathodischen schutzes gegen korrosion.
DE69415715T2 (de) Verfahren und Vorrichtung zum Herstellen von Isolatoren
DE69525985T2 (de) Vorrichtung und Verfahren zum Spritzstreckblasfromen
DE69412889T2 (de) Vorrichtung zur Dämpfung von Vibrationen und Verfahren zu dessen Herstellung
DE69405221T2 (de) Vorrichtung und verfahren zum behandeln eines abfallpapierstoffbreis

Legal Events

Date Code Title Description
8332 No legal effect for de
8370 Indication of lapse of patent is to be deleted