HUE051270T2 - Eljárás és berendezés egy készülék üzemeltetésénél kriptográfiai biztonsági függvény biztosítására - Google Patents
Eljárás és berendezés egy készülék üzemeltetésénél kriptográfiai biztonsági függvény biztosításáraInfo
- Publication number
- HUE051270T2 HUE051270T2 HUE17710849A HUE17710849A HUE051270T2 HU E051270 T2 HUE051270 T2 HU E051270T2 HU E17710849 A HUE17710849 A HU E17710849A HU E17710849 A HUE17710849 A HU E17710849A HU E051270 T2 HUE051270 T2 HU E051270T2
- Authority
- HU
- Hungary
- Prior art keywords
- providing
- security function
- cryptographic security
- cryptographic
- function
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/72—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2103—Challenge-response
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2151—Time stamp
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2153—Using hardware token as a secondary aspect
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Mathematical Physics (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102016204684.5A DE102016204684A1 (de) | 2016-03-22 | 2016-03-22 | Verfahren und Einrichtung zum Bereitstellen einer kryptographischen Sicherheitsfunktion für den Betrieb eines Geräts |
Publications (1)
Publication Number | Publication Date |
---|---|
HUE051270T2 true HUE051270T2 (hu) | 2021-03-01 |
Family
ID=58314169
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
HUE17710849A HUE051270T2 (hu) | 2016-03-22 | 2017-03-07 | Eljárás és berendezés egy készülék üzemeltetésénél kriptográfiai biztonsági függvény biztosítására |
Country Status (7)
Country | Link |
---|---|
US (1) | US11106828B2 (hu) |
EP (1) | EP3403214B1 (hu) |
CN (1) | CN109196507B (hu) |
DE (1) | DE102016204684A1 (hu) |
ES (1) | ES2805423T3 (hu) |
HU (1) | HUE051270T2 (hu) |
WO (1) | WO2017162424A1 (hu) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020162878A1 (en) * | 2019-02-04 | 2020-08-13 | Hewlett-Packard Development Company, L.P. | Control of access to hierarchical nodes |
EP3722983A1 (de) | 2019-04-09 | 2020-10-14 | Siemens Aktiengesellschaft | Sicherheitsvorrichtung und verfahren zur überwachung eines zugriffs eines gerätes auf eine sicherheitsvorrichtung |
DE102020212143A1 (de) | 2020-09-28 | 2022-03-31 | Robert Bosch Gesellschaft mit beschränkter Haftung | Verfahren und Vorrichtung zum Bereitstellen von Diensten |
CN115225308B (zh) * | 2022-05-17 | 2024-03-12 | 国家计算机网络与信息安全管理中心 | 大规模群体攻击流量的攻击团伙识别方法及相关设备 |
Family Cites Families (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5956505A (en) * | 1991-12-24 | 1999-09-21 | Pitney Bowes Inc. | Remote activation of software features in a data processing device |
US6721888B1 (en) | 1999-11-22 | 2004-04-13 | Sun Microsystems, Inc. | Mechanism for merging multiple policies |
US8876608B2 (en) * | 2000-04-07 | 2014-11-04 | Igt | Virtually tracking un-carded or anonymous patron session data |
EP1436693A2 (en) | 2001-08-29 | 2004-07-14 | Globespanvirata, Inc. | Key interface for secure object manipulation |
JP3950010B2 (ja) | 2002-05-17 | 2007-07-25 | 株式会社エヌ・ティ・ティ・ドコモ | データ処理装置、プログラムおよび記録媒体 |
US7369657B2 (en) * | 2002-11-14 | 2008-05-06 | Broadcom Corporation | Cryptography accelerator application program interface |
US7472286B2 (en) * | 2003-08-29 | 2008-12-30 | Microsoft Corporation | Selectively authorizing software functionality after installation of the software |
CN1992596A (zh) * | 2005-12-27 | 2007-07-04 | 国际商业机器公司 | 用户验证设备和用户验证方法 |
US8539225B2 (en) * | 2008-04-30 | 2013-09-17 | Motorola Solutions, Inc. | Method and device for dynamic deployment of trust bridges in an ad hoc wireless network |
US10241752B2 (en) * | 2011-09-30 | 2019-03-26 | Apple Inc. | Interface for a virtual digital assistant |
CN101958913B (zh) * | 2010-10-29 | 2013-05-08 | 四川长虹电器股份有限公司 | 基于动态口令和数字证书的双向身份认证方法 |
EP2506175B1 (en) * | 2011-03-30 | 2019-01-30 | Irdeto B.V. | Enabling a software application to be executed on a mobile station |
CN102393890B (zh) * | 2011-10-09 | 2014-07-16 | 广州大学 | 一种抗物理入侵和旁路攻击的密码芯片系统及其实现方法 |
US9374369B2 (en) * | 2012-12-28 | 2016-06-21 | Lookout, Inc. | Multi-factor authentication and comprehensive login system for client-server networks |
CN104021335B (zh) * | 2014-06-05 | 2015-04-22 | 中国人民解放军国防科学技术大学 | 基于可扩展密码服务框架的密码服务方法 |
US9773432B2 (en) * | 2015-06-27 | 2017-09-26 | Intel Corporation | Lightweight cryptographic engine |
-
2016
- 2016-03-22 DE DE102016204684.5A patent/DE102016204684A1/de not_active Withdrawn
-
2017
- 2017-03-07 EP EP17710849.5A patent/EP3403214B1/de active Active
- 2017-03-07 CN CN201780019138.8A patent/CN109196507B/zh active Active
- 2017-03-07 WO PCT/EP2017/055244 patent/WO2017162424A1/de active Application Filing
- 2017-03-07 ES ES17710849T patent/ES2805423T3/es active Active
- 2017-03-07 US US16/085,603 patent/US11106828B2/en active Active
- 2017-03-07 HU HUE17710849A patent/HUE051270T2/hu unknown
Also Published As
Publication number | Publication date |
---|---|
CN109196507A (zh) | 2019-01-11 |
DE102016204684A1 (de) | 2017-09-28 |
WO2017162424A1 (de) | 2017-09-28 |
ES2805423T3 (es) | 2021-02-12 |
EP3403214A1 (de) | 2018-11-21 |
EP3403214B1 (de) | 2020-07-01 |
US20190095648A1 (en) | 2019-03-28 |
CN109196507B (zh) | 2022-06-07 |
US11106828B2 (en) | 2021-08-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB201903575D0 (en) | Apparatus and method for monitoring a field | |
PL3236630T3 (pl) | Sposób i aparatura do uwierzytelniania urządzenia | |
GB201413836D0 (en) | Device security apparatus and methods | |
EP3397828A4 (en) | SAFETY APPARATUS FOR PORTABLE ELECTRONIC DEVICE | |
SG11202000571RA (en) | Key management method, apparatus, and device | |
HK1223462A1 (zh) | 用戶身份識別方法、安全保護問題生成方法及裝置 | |
EP3211560A4 (en) | Fingerprint decryption method and device | |
EP3373186A4 (en) | DEVICE AND METHOD FOR GENERATING AN IDENTIFICATION KEY | |
EP3531614A4 (en) | METHOD AND DEVICE FOR ENCRYPTION AND DECRYPTION | |
GB201708492D0 (en) | Security device and method | |
GB201716365D0 (en) | Tool device apparatus and method | |
PL3493948T3 (pl) | Urządzenie szlifierskie i sposób eksploatowania urządzenia szlifierskiego | |
HUE051270T2 (hu) | Eljárás és berendezés egy készülék üzemeltetésénél kriptográfiai biztonsági függvény biztosítására | |
EP3407535A4 (en) | IDENTIFICATION KEY GENERATION APPARATUS AND METHOD FOR MANAGING THE SAME | |
SG11202010938QA (en) | Calculation device for encryption using public key and encryption method | |
EP3373188A4 (en) | SAFETY DEVICE AND OPERATING METHOD THEREFOR | |
HK1207495A1 (en) | Secret key negotiating method and device | |
GB2602895B (en) | A method and system for authenticating a device | |
PL3515711T3 (pl) | Urządzenie do nadruku na puszkach i powiązany sposób | |
HK1215765A1 (zh) | 安全驗證方法和裝置 | |
GB201712422D0 (en) | Method for authenticating a user at a security device | |
GB201821077D0 (en) | Security apparatus for atm | |
GB201611054D0 (en) | Device control apparatus and method | |
GB2595836B (en) | A method and system for authenticating a device | |
GB2548132B (en) | Method and apparatus for securing peripheral devices |