IL135246A0 - Methods and systems for efficient chained certification - Google Patents

Methods and systems for efficient chained certification

Info

Publication number
IL135246A0
IL135246A0 IL13524600A IL13524600A IL135246A0 IL 135246 A0 IL135246 A0 IL 135246A0 IL 13524600 A IL13524600 A IL 13524600A IL 13524600 A IL13524600 A IL 13524600A IL 135246 A0 IL135246 A0 IL 135246A0
Authority
IL
Israel
Prior art keywords
systems
methods
efficient
certification
chained certification
Prior art date
Application number
IL13524600A
Other languages
English (en)
Original Assignee
Cipherit Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cipherit Ltd filed Critical Cipherit Ltd
Priority to IL13524600A priority Critical patent/IL135246A0/xx
Priority to PCT/IL2001/000273 priority patent/WO2001071970A2/en
Priority to AU44501/01A priority patent/AU4450101A/en
Priority to US09/816,159 priority patent/US20020044648A1/en
Publication of IL135246A0 publication Critical patent/IL135246A0/xx

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3265Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate chains, trees or paths; Hierarchical trust model
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/3013Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the discrete logarithm problem, e.g. ElGamal or Diffie-Hellman systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
IL13524600A 2000-03-23 2000-03-23 Methods and systems for efficient chained certification IL135246A0 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
IL13524600A IL135246A0 (en) 2000-03-23 2000-03-23 Methods and systems for efficient chained certification
PCT/IL2001/000273 WO2001071970A2 (en) 2000-03-23 2001-03-22 Methods and systems for efficient chained certification
AU44501/01A AU4450101A (en) 2000-03-23 2001-03-22 Methods and systems for efficient chained certification
US09/816,159 US20020044648A1 (en) 2000-03-23 2001-03-22 Methods and systems for efficient chained certification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
IL13524600A IL135246A0 (en) 2000-03-23 2000-03-23 Methods and systems for efficient chained certification

Publications (1)

Publication Number Publication Date
IL135246A0 true IL135246A0 (en) 2003-06-24

Family

ID=11073972

Family Applications (1)

Application Number Title Priority Date Filing Date
IL13524600A IL135246A0 (en) 2000-03-23 2000-03-23 Methods and systems for efficient chained certification

Country Status (4)

Country Link
US (1) US20020044648A1 (xx)
AU (1) AU4450101A (xx)
IL (1) IL135246A0 (xx)
WO (1) WO2001071970A2 (xx)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7353384B2 (en) * 2002-04-17 2008-04-01 Microsoft Corporation Collapsing chained credentials
BRPI0315078B1 (pt) * 2002-10-07 2019-08-20 Telefonaktiebolaget Lm Ericsson (Publ) Dispositivo de segurança resistente à violação, e, terminal de usuário
BRPI0315450B1 (pt) * 2002-10-31 2019-12-17 Ericsson Telefon Ab L M circuito eletrônico à prova de violação para implementação em um dispositivo, dispositivo implementado com um circuito eletrônico à prova de violação, e, método de gerenciamento de dados de segurança para um dispositivo
JP4218760B2 (ja) * 2005-07-01 2009-02-04 インターナショナル・ビジネス・マシーンズ・コーポレーション トレーサビリティ検証システム、方法、プログラム
US7890763B1 (en) * 2007-09-14 2011-02-15 The United States Of America As Represented By The Director, National Security Agency Method of identifying invalid digital signatures involving batch verification
CN101188616B (zh) * 2007-12-12 2010-07-21 四川长虹电器股份有限公司 终端申请证书的方法
US10680810B2 (en) * 2016-10-26 2020-06-09 Nxp B.V. Method of generating an elliptic curve cryptographic key pair
US10447486B2 (en) * 2017-07-19 2019-10-15 Spyrus, Inc. Remote attestation of a security module's assurance level

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
IL125222A0 (en) * 1998-07-06 1999-03-12 L P K Information Integrity Lt A key-agreement system and method

Also Published As

Publication number Publication date
AU4450101A (en) 2001-10-03
WO2001071970A3 (en) 2002-04-25
WO2001071970A2 (en) 2001-09-27
US20020044648A1 (en) 2002-04-18

Similar Documents

Publication Publication Date Title
AU2001267174A1 (en) Heat-treating methods and systems
GB0006721D0 (en) Assessment methods and systems
AU8741101A (en) Marketing systems and methods
EP1159605A4 (en) METHODS, DEVICES AND SYSTEMS FOR PROTEIN CHARACTERIZATION
GB0022444D0 (en) Positioning system and method
AU2001248163A1 (en) Systems and methods for enhancing connectivity
AU2002322877A8 (en) Multi-constraint routine system and method
AU2001250058A1 (en) Methods and devices for achieving long incubation times in high-throughput systems
AU2001286956A1 (en) Software development systems and methods
GB0128323D0 (en) Trailer and simulator
HK1040119A1 (zh) 用於函授課程和函授課程系統的業務系統
GB0022736D0 (en) Optimization method and system
HK1048870A1 (en) Device environment configuration system and deviceenvironment configuration method
GB2368951B (en) Authentication methods and systems
GB2376073B (en) Fluid-gauging systems and methods
AU2001253314A1 (en) Positioning systems and related methods
GB2352523B (en) Fluid-gauging systems and methods
GB2374706B (en) Systems and methods for secure printing
HK1044395A1 (zh) 零件管理系統及其方法
IL135246A0 (en) Methods and systems for efficient chained certification
WO2001067357A8 (en) Systems and methods for polling
AU2002221405A1 (en) Heat-treating methods and systems
AU2001294685A1 (en) Web-style pad conditioning system and methods for implementing the same
AU2002227019A1 (en) Cashcalling and voicemining system
GB0013007D0 (en) Characterization system and method