IN2014DN03111A - - Google Patents
Info
- Publication number
- IN2014DN03111A IN2014DN03111A IN3111DEN2014A IN2014DN03111A IN 2014DN03111 A IN2014DN03111 A IN 2014DN03111A IN 3111DEN2014 A IN3111DEN2014 A IN 3111DEN2014A IN 2014DN03111 A IN2014DN03111 A IN 2014DN03111A
- Authority
- IN
- India
- Prior art keywords
- keys
- key
- function
- message
- invocations
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
- G06F21/335—User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0884—Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/108—Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Power Engineering (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Information Transfer Between Computers (AREA)
- Input From Keyboards Or The Like (AREA)
- User Interface Of Digital Computer (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/248,973 US9197409B2 (en) | 2011-09-29 | 2011-09-29 | Key derivation techniques |
US13/248,953 US9203613B2 (en) | 2011-09-29 | 2011-09-29 | Techniques for client constructed sessions |
US13/248,962 US9178701B2 (en) | 2011-09-29 | 2011-09-29 | Parameter based key derivation |
PCT/US2012/058083 WO2013049689A1 (en) | 2011-09-29 | 2012-09-28 | Parameter based key derivation |
Publications (1)
Publication Number | Publication Date |
---|---|
IN2014DN03111A true IN2014DN03111A (de) | 2015-05-15 |
Family
ID=47996473
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
IN3111DEN2014 IN2014DN03111A (de) | 2011-09-29 | 2012-09-28 |
Country Status (10)
Country | Link |
---|---|
EP (3) | EP3742300A1 (de) |
JP (3) | JP6082015B2 (de) |
CN (2) | CN103842984B (de) |
AU (3) | AU2012315674B9 (de) |
BR (2) | BR112014007665B1 (de) |
CA (1) | CA2847713C (de) |
IN (1) | IN2014DN03111A (de) |
RU (6) | RU2582540C2 (de) |
SG (3) | SG10201903265PA (de) |
WO (1) | WO2013049689A1 (de) |
Families Citing this family (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101837150B1 (ko) * | 2016-06-30 | 2018-03-09 | (주)넷비젼텔레콤 | 프록시 서비스 제공을 위한 프록시 인증시스템 및 인증방법 |
US20180019986A1 (en) * | 2016-07-12 | 2018-01-18 | Qualcomm Incorporated | User privacy protected location-based authentication on mobile devices |
DE102017201891A1 (de) * | 2017-02-07 | 2018-08-09 | Siemens Aktiengesellschaft | Programmierbares Hardware-Sicherheitsmodul und Verfahren auf einem programmierbaren Hardware-Sicherheitsmodul |
US10873450B2 (en) | 2017-11-16 | 2020-12-22 | Intuit Inc. | Cryptographic key generation for logically sharded data stores |
US10586057B2 (en) | 2017-11-16 | 2020-03-10 | Intuit Inc. | Processing data queries in a logically sharded data store |
CA3065767C (en) * | 2017-11-16 | 2021-12-21 | Intuit Inc. | Cryptographic key generation for logically sharded data stores |
EP3599737A1 (de) * | 2018-07-24 | 2020-01-29 | Gemalto Sa | Verfahren zum erstellen eines primären kryptographischen schlüssels mit benutzerdefinierten transformationsregeln |
CN111768304A (zh) | 2018-08-06 | 2020-10-13 | 阿里巴巴集团控股有限公司 | 区块链交易方法及装置、电子设备 |
PL3552158T3 (pl) * | 2018-11-27 | 2021-07-26 | Advanced New Technologies Co., Ltd. | System i sposób ochrony informacji |
US10700850B2 (en) | 2018-11-27 | 2020-06-30 | Alibaba Group Holding Limited | System and method for information protection |
CA3040791C (en) | 2018-11-27 | 2020-12-15 | Alibaba Group Holding Limited | System and method for information protection |
SG11201903438TA (en) | 2018-11-27 | 2019-05-30 | Alibaba Group Holding Ltd | System and method for information protection |
WO2019072277A2 (en) | 2018-11-27 | 2019-04-18 | Alibaba Group Holding Limited | SYSTEM AND METHOD FOR INFORMATION PROTECTION |
JP6724249B2 (ja) | 2018-11-27 | 2020-07-15 | アリババ・グループ・ホールディング・リミテッドAlibaba Group Holding Limited | 情報保護用のシステム及び方法 |
WO2020239179A1 (en) * | 2019-05-28 | 2020-12-03 | Kamstrup A/S | Distributed access control |
CN114531302A (zh) * | 2021-12-28 | 2022-05-24 | 中国电信股份有限公司 | 数据加密方法、装置及存储介质 |
Family Cites Families (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5956404A (en) * | 1996-09-30 | 1999-09-21 | Schneier; Bruce | Digital signature with auditing bits |
US5917911A (en) * | 1997-01-23 | 1999-06-29 | Motorola, Inc. | Method and system for hierarchical key access and recovery |
US6097817A (en) * | 1997-12-10 | 2000-08-01 | Omnipoint Corporation | Encryption and decryption in communication system with wireless trunk |
US6601172B1 (en) * | 1997-12-31 | 2003-07-29 | Philips Electronics North America Corp. | Transmitting revisions with digital signatures |
GB2342195A (en) * | 1998-09-30 | 2000-04-05 | Xerox Corp | Secure token-based document server |
US6711679B1 (en) * | 1999-03-31 | 2004-03-23 | International Business Machines Corporation | Public key infrastructure delegation |
US6643774B1 (en) * | 1999-04-08 | 2003-11-04 | International Business Machines Corporation | Authentication method to enable servers using public key authentication to obtain user-delegated tickets |
US20030041110A1 (en) * | 2000-07-28 | 2003-02-27 | Storymail, Inc. | System, Method and Structure for generating and using a compressed digital certificate |
US20020194483A1 (en) * | 2001-02-25 | 2002-12-19 | Storymail, Inc. | System and method for authorization of access to a resource |
US7308431B2 (en) * | 2000-09-11 | 2007-12-11 | Nokia Corporation | System and method of secure authentication and billing for goods and services using a cellular telecommunication and an authorization infrastructure |
JP4301482B2 (ja) * | 2001-06-26 | 2009-07-22 | インターナショナル・ビジネス・マシーンズ・コーポレーション | サーバ、情報処理装置及びそのアクセス制御システム並びにその方法 |
JP2003058657A (ja) * | 2001-08-09 | 2003-02-28 | Matsushita Electric Ind Co Ltd | ライセンス管理サーバ及びライセンス管理方法 |
AU2002332671A1 (en) * | 2001-08-13 | 2003-03-03 | Board Of Trustees Of The Leland Stanford Junior University | Systems and methods for identity-based encryption and related cryptographic techniques |
US7617542B2 (en) | 2001-12-21 | 2009-11-10 | Nokia Corporation | Location-based content protection |
EP1472816A4 (de) * | 2002-01-30 | 2010-01-27 | Tecsec Inc | Zugangssystem mit mehrfachfaktoridentifikation und authentisierung |
NO318842B1 (no) * | 2002-03-18 | 2005-05-09 | Telenor Asa | Autentisering og tilgangskontroll |
US6971017B2 (en) * | 2002-04-16 | 2005-11-29 | Xerox Corporation | Ad hoc secure access to documents and services |
WO2004051585A2 (en) * | 2002-11-27 | 2004-06-17 | Rsa Security Inc | Identity authentication system and method |
EP1515507A1 (de) * | 2003-09-09 | 2005-03-16 | Axalto S.A. | Authentifizierung für Datenkommunikation |
JP2006120089A (ja) * | 2004-10-25 | 2006-05-11 | Ntt Docomo Inc | データ管理システム及びデータ管理方法 |
JP4701733B2 (ja) * | 2005-02-04 | 2011-06-15 | パナソニック株式会社 | 管理サーバ、機器、およびライセンス管理システム |
US20090199009A1 (en) * | 2005-06-07 | 2009-08-06 | Pei Yen Chia | Systems, methods and computer program products for authorising ad-hoc access |
JP4792944B2 (ja) * | 2005-11-30 | 2011-10-12 | 日本電気株式会社 | 権限管理システム、トークン検証方法、トークン検証プログラム |
JP4823704B2 (ja) * | 2006-02-01 | 2011-11-24 | Kddi株式会社 | 認証システムおよび同システムにおける認証情報委譲方法ならびにセキュリティデバイス |
JP4766249B2 (ja) * | 2006-03-01 | 2011-09-07 | 日本電気株式会社 | トークン譲渡方法、トークン譲渡システム及び権限認証許可サーバ |
US8312523B2 (en) * | 2006-03-31 | 2012-11-13 | Amazon Technologies, Inc. | Enhanced security for electronic communications |
US8112794B2 (en) * | 2006-07-17 | 2012-02-07 | Research In Motion Limited | Management of multiple connections to a security token access device |
JP2008172728A (ja) * | 2007-01-15 | 2008-07-24 | Megachips System Solutions Inc | セキュリティシステム |
BRPI0806197A2 (pt) * | 2007-01-26 | 2011-08-30 | Interdigital Tech Corp | método e aparelho de garantia da segurança de informações de localização e controle de acesso utilizando as informações de localização |
JP4982215B2 (ja) * | 2007-03-14 | 2012-07-25 | 株式会社トヨタIt開発センター | 暗号通信システム、暗号通信方法、暗号通信プログラム、車載端末およびサーバ |
US9106426B2 (en) * | 2008-11-26 | 2015-08-11 | Red Hat, Inc. | Username based authentication and key generation |
JP5446650B2 (ja) * | 2009-09-17 | 2014-03-19 | 沖電気工業株式会社 | 通信データ新規性確認システム並びに送信端末及び受信端末 |
-
2012
- 2012-09-28 CN CN201280047625.2A patent/CN103842984B/zh active Active
- 2012-09-28 BR BR112014007665-0A patent/BR112014007665B1/pt active IP Right Grant
- 2012-09-28 SG SG10201903265PA patent/SG10201903265PA/en unknown
- 2012-09-28 RU RU2014117153/08A patent/RU2582540C2/ru active
- 2012-09-28 AU AU2012315674A patent/AU2012315674B9/en active Active
- 2012-09-28 CN CN201710265201.8A patent/CN107017984B/zh active Active
- 2012-09-28 CA CA2847713A patent/CA2847713C/en active Active
- 2012-09-28 RU RU2016110793A patent/RU2636105C1/ru active
- 2012-09-28 SG SG10201608067QA patent/SG10201608067QA/en unknown
- 2012-09-28 EP EP20186781.9A patent/EP3742300A1/de active Pending
- 2012-09-28 BR BR122015024906-6A patent/BR122015024906B1/pt active IP Right Grant
- 2012-09-28 EP EP18200502.5A patent/EP3493070B1/de active Active
- 2012-09-28 IN IN3111DEN2014 patent/IN2014DN03111A/en unknown
- 2012-09-28 JP JP2014533431A patent/JP6082015B2/ja active Active
- 2012-09-28 WO PCT/US2012/058083 patent/WO2013049689A1/en active Application Filing
- 2012-09-28 SG SG2014012264A patent/SG2014012264A/en unknown
- 2012-09-28 EP EP12835045.1A patent/EP2761487B1/de active Active
-
2017
- 2017-01-19 JP JP2017007876A patent/JP6527179B2/ja active Active
- 2017-10-09 RU RU2017135822A patent/RU2670778C9/ru active
- 2017-10-09 RU RU2017135821A patent/RU2671052C1/ru active
-
2018
- 2018-03-29 AU AU2018202251A patent/AU2018202251B2/en active Active
- 2018-10-22 RU RU2018137062A patent/RU2709162C1/ru active
-
2019
- 2019-05-09 JP JP2019089153A patent/JP6895478B2/ja active Active
- 2019-11-21 RU RU2019137439A patent/RU2019137439A/ru unknown
-
2020
- 2020-01-28 AU AU2020200584A patent/AU2020200584B2/en active Active
Also Published As
Similar Documents
Publication | Publication Date | Title |
---|---|---|
IN2014DN03111A (de) | ||
WO2016057086A3 (en) | Common modulus rsa key pairs for signature generation and encryption/decryption | |
PH12018501745A1 (en) | Personal device security using elliptic curve cryptography for secret sharing | |
AU2018256568A1 (en) | Systems and methods for software based encryption | |
MY176966A (en) | Biometric template security and key generation | |
WO2012172832A3 (en) | Authenticator, authenticatee and authentication method | |
WO2013068843A8 (en) | Multi-key cryptography for encrypting file system acceleration | |
WO2009158086A3 (en) | Techniques for ensuring authentication and integrity of communications | |
SG10201406849RA (en) | Strong authentication token usable with a plurality of independent application providers | |
JP2016527844A5 (de) | ||
IN2015DN04037A (de) | ||
GB2512249A (en) | Secure peer discovery and authentication using a shared secret | |
WO2012023122A3 (en) | Authentication device and system | |
EP3694143A3 (de) | Ermöglichung des zugriffs auf daten | |
Yoon et al. | New ID-based proxy signature scheme with message recovery | |
CN102594824A (zh) | 基于多重安全保护机制的电子文档安全分发方法 | |
RU2014126582A (ru) | Упрощенное управление секретными ключами группы участниками группы | |
Shim | Security models for certificateless signature schemes revisited | |
MY171259A (en) | System and method for identity-based entity authentication for client-server communications | |
KR101382626B1 (ko) | Id 기반의 강한 지정된 검증자 서명 시스템 및 방법 | |
SG10201805187WA (en) | Entity authentication in network | |
MX2021008680A (es) | Tecnicas para autenticacion de llamadas. | |
Tiwari | On the security of pairing-free certificateless digital signature schemes using ECC | |
GB201222212D0 (en) | Malware detection | |
RU2008133888A (ru) | Способ хранения и использования криптографического ключа |