DK3076583T3 - Central certifikathåndtering - Google Patents
Central certifikathåndtering Download PDFInfo
- Publication number
- DK3076583T3 DK3076583T3 DK15162466.5T DK15162466T DK3076583T3 DK 3076583 T3 DK3076583 T3 DK 3076583T3 DK 15162466 T DK15162466 T DK 15162466T DK 3076583 T3 DK3076583 T3 DK 3076583T3
- Authority
- DK
- Denmark
- Prior art keywords
- certificate management
- central certificate
- central
- management
- certificate
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/006—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving public key infrastructure [PKI] trust models
- H04L9/007—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving public key infrastructure [PKI] trust models involving hierarchical structures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3265—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate chains, trees or paths; Hierarchical trust model
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP15162466.5A EP3076583B1 (en) | 2015-04-02 | 2015-04-02 | Central certificate management |
Publications (1)
Publication Number | Publication Date |
---|---|
DK3076583T3 true DK3076583T3 (da) | 2020-01-20 |
Family
ID=52814858
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DK15162466.5T DK3076583T3 (da) | 2015-04-02 | 2015-04-02 | Central certifikathåndtering |
Country Status (4)
Country | Link |
---|---|
US (1) | US10122536B2 (da) |
EP (1) | EP3076583B1 (da) |
DK (1) | DK3076583T3 (da) |
ES (1) | ES2764377T3 (da) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160315777A1 (en) * | 2015-04-24 | 2016-10-27 | Citrix Systems, Inc. | Certificate updating |
US10439825B1 (en) * | 2018-11-13 | 2019-10-08 | INTEGRITY Security Services, Inc. | Providing quality of service for certificate management systems |
WO2020229586A1 (en) * | 2019-05-14 | 2020-11-19 | Volkswagen Aktiengesellschaft | Implementation of a butterfly key expansion scheme |
US20200394651A1 (en) * | 2019-06-13 | 2020-12-17 | Gridplus, Inc. | Dynamic off-chain digital currency transaction processing |
US11870917B2 (en) * | 2020-03-26 | 2024-01-09 | Issam ANDONI | Systems and methods for facilitating policy-compliant end-to-end encryption for individuals between organizations |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020147905A1 (en) * | 2001-04-05 | 2002-10-10 | Sun Microsystems, Inc. | System and method for shortening certificate chains |
GB2385955A (en) * | 2002-02-28 | 2003-09-03 | Ibm | Key certification using certificate chains |
ATE405077T1 (de) * | 2003-11-26 | 2008-08-15 | Totemo Ag | Verfahren und vorrichtung zur verschlüsselung von elektronischer post |
US7844816B2 (en) * | 2005-06-08 | 2010-11-30 | International Business Machines Corporation | Relying party trust anchor based public key technology framework |
WO2008153456A1 (en) * | 2007-06-11 | 2008-12-18 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and arrangement for certificate handling |
-
2015
- 2015-04-02 DK DK15162466.5T patent/DK3076583T3/da active
- 2015-04-02 ES ES15162466T patent/ES2764377T3/es active Active
- 2015-04-02 EP EP15162466.5A patent/EP3076583B1/en active Active
-
2016
- 2016-04-01 US US15/088,339 patent/US10122536B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
US10122536B2 (en) | 2018-11-06 |
US20160294564A1 (en) | 2016-10-06 |
EP3076583A1 (en) | 2016-10-05 |
ES2764377T3 (es) | 2020-06-03 |
EP3076583B1 (en) | 2019-10-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
FR3033439B1 (fr) | Resource management | |
DK3283625T3 (da) | Nukleasemedieret genomeditering | |
DK3278159T3 (da) | Telekommunikationsfordelingselementer | |
DK3331869T3 (da) | Muscarinagonister | |
DK3305788T3 (da) | Janus-kinase-hæmmer | |
DK3390753T3 (da) | Telekommunikationsfordelingselementer | |
DK3277719T3 (da) | Polypeptider | |
DK3331528T3 (da) | Muskarinagonister | |
DK3360890T3 (da) | Genterapi | |
DK3310450T3 (da) | Olie-vand-separator | |
DK3331529T3 (da) | Muskarinagonister | |
DK3270930T3 (da) | Præeklampsi | |
DK3292136T3 (da) | Penicillin-g-acylaser | |
DK3179695T3 (da) | Netværksautentifikation | |
DK3394281T3 (da) | Gærcelle | |
DK3076583T3 (da) | Central certifikathåndtering | |
DE112015006486A5 (de) | Inkubationsrinne | |
DK3318308T3 (da) | Badmintonketsjer | |
DK3274482T3 (da) | Stenborsknop | |
DE112016005599A5 (de) | Strahlungsgrill | |
DE112015005904A5 (de) | Gurtschlossbringer | |
ES1140083Y (es) | Descompatactador tetrafunción | |
DE102015206660A8 (de) | Plattenaufteilanlage | |
DK3094119T3 (da) | Sessionshåndtering | |
DE112016001124A5 (de) | Spannschutz |