IN2014DN09022A - - Google Patents
Download PDFInfo
- Publication number
- IN2014DN09022A IN2014DN09022A IN9022DEN2014A IN2014DN09022A IN 2014DN09022 A IN2014DN09022 A IN 2014DN09022A IN 9022DEN2014 A IN9022DEN2014 A IN 9022DEN2014A IN 2014DN09022 A IN2014DN09022 A IN 2014DN09022A
- Authority
- IN
- India
- Prior art keywords
- trusted relationship
- established
- locking
- key
- trusted
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
- H04L12/2816—Controlling appliance services of a home automation network by calling their functionalities
- H04L12/2818—Controlling appliance services of a home automation network by calling their functionalities from a device located outside both the home and the home network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4641—Virtual LANs, VLANs, e.g. virtual private networks [VPN]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Automation & Control Theory (AREA)
- Lock And Its Accessories (AREA)
- Selective Calling Equipment (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
In the method and system of establishing a trusted relationship first a virtual private network is established between a key device and at least one locking device. Thereafter in order to establish a trusted relationship the key device sends a message encrypted with its private cryptographic key to at least one locking device. The message comprises the certificate of the trusted key device and the certificate of some other device with which the locking device that received the message shall establish a new trusted relationship. By using the established trusted relationship either a trusted relationship between the locking device and a new key device or a trusted relationship between two or more locking devices is established whereby a virtual private network can be established between the locking devices.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FI20120110A FI124237B (en) | 2012-04-05 | 2012-04-05 | Data-safe procedure for granting the right of operation carried out via remote connection |
PCT/FI2013/050362 WO2013150186A1 (en) | 2012-04-05 | 2013-04-03 | Secure method for remote grant of operating rights |
Publications (1)
Publication Number | Publication Date |
---|---|
IN2014DN09022A true IN2014DN09022A (en) | 2015-05-22 |
Family
ID=49300050
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
IN9022DEN2014 IN2014DN09022A (en) | 2012-04-05 | 2013-04-03 |
Country Status (15)
Country | Link |
---|---|
US (1) | US9385870B2 (en) |
EP (1) | EP2834938B1 (en) |
JP (1) | JP5795696B2 (en) |
KR (1) | KR101524659B1 (en) |
CN (1) | CN104365056B (en) |
AU (1) | AU2013244872B2 (en) |
BR (1) | BR112014024934A2 (en) |
CA (1) | CA2869110C (en) |
DK (1) | DK2834938T3 (en) |
ES (1) | ES2635556T3 (en) |
FI (1) | FI124237B (en) |
IN (1) | IN2014DN09022A (en) |
MX (1) | MX352041B (en) |
PL (1) | PL2834938T3 (en) |
WO (1) | WO2013150186A1 (en) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9124434B2 (en) * | 2013-02-01 | 2015-09-01 | Microsoft Technology Licensing, Llc | Securing a computing device accessory |
WO2016031414A1 (en) * | 2014-08-25 | 2016-03-03 | 株式会社リコー | Electronic device and connection method |
EP3197101B1 (en) * | 2014-09-19 | 2021-11-03 | Panasonic Intellectual Property Management Co., Ltd. | Connection method, connection system, portable terminal, and program |
WO2017073189A1 (en) * | 2015-10-27 | 2017-05-04 | ソニー株式会社 | Information processing device, information processing method, and program |
CN105931331A (en) * | 2016-04-20 | 2016-09-07 | 上海斐讯数据通信技术有限公司 | Intelligent lock based on optical communication and unlocking method |
CN108667780B (en) * | 2017-03-31 | 2021-05-14 | 华为技术有限公司 | Identity authentication method, system, server and terminal |
JP7157146B2 (en) * | 2017-09-27 | 2022-10-19 | ユービキティ インコーポレイテッド | System for automatically secured remote access to local networks |
US10796029B2 (en) | 2017-11-30 | 2020-10-06 | International Business Machines Corporation | Software controlled port locking mechanisms |
CN109949461B (en) * | 2019-03-15 | 2021-01-01 | 北京深思数盾科技股份有限公司 | Unlocking method and device |
CN113347168B (en) * | 2021-05-26 | 2022-10-11 | 北京威努特技术有限公司 | Protection method and system based on zero trust model |
Family Cites Families (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
NO314530B1 (en) * | 2000-02-25 | 2003-03-31 | Ericsson Telefon Ab L M | Wireless reservation, check-in, access control, check-out and payment |
JP4389366B2 (en) * | 2000-08-11 | 2009-12-24 | 株式会社デンソー | Electronic control unit |
CA2324679A1 (en) | 2000-10-26 | 2002-04-26 | Lochisle Inc. | Method and system for physical access control using wireless connection to a network |
US6854010B1 (en) * | 2001-04-05 | 2005-02-08 | Bluecube Software, Inc. | Multi-location management system |
US7389530B2 (en) * | 2003-09-12 | 2008-06-17 | International Business Machines Corporation | Portable electronic door opener device and method for secure door opening |
JP2005123996A (en) | 2003-10-17 | 2005-05-12 | National Institute Of Information & Communication Technology | Information processing method for transferring authentication-use information between devices, and information processing system therefor |
US20050120204A1 (en) | 2003-12-01 | 2005-06-02 | Gary Kiwimagi | Secure network connection |
JP4648148B2 (en) | 2005-09-30 | 2011-03-09 | 富士通株式会社 | Connection support device |
US20080048826A1 (en) * | 2006-08-10 | 2008-02-28 | Kavita Agrawal | System and method for controlling, configuring, and disabling devices in a healthcare system |
US20080103813A1 (en) * | 2006-10-12 | 2008-05-01 | Kavita Agrawal | System and method for portable safeguard context in a patient's room |
US8387124B2 (en) | 2007-03-15 | 2013-02-26 | Palo Alto Research Center Incorporated | Wormhole devices for usable secure access to remote resource |
US7391298B1 (en) | 2007-05-09 | 2008-06-24 | Gewa, Llc | Wireless system for monitoring and reacting to events at a remote location |
US20090030718A1 (en) * | 2007-09-28 | 2009-01-29 | Rick Robert Bengson | System and method for automatic acquisition and distribution of information in a real estate context |
EP2235886B1 (en) | 2007-12-31 | 2012-09-26 | Schlage Lock Company | Method and system for remotely controlling access to an access point |
JP2010086175A (en) | 2008-09-30 | 2010-04-15 | Dainippon Printing Co Ltd | Remote access management system and method |
US20100125894A1 (en) * | 2008-11-19 | 2010-05-20 | At&T Intellectual Property I, L.P. | Systems, methods and computer program products that facilitate remote access of devices in a subscriber network |
JP2010134749A (en) | 2008-12-05 | 2010-06-17 | Mitsubishi Electric Corp | Access control system and access control method |
GB2466071B (en) * | 2008-12-15 | 2013-11-13 | Hewlett Packard Development Co | Associating a signing key with a software component of a computing platform |
US8120460B1 (en) * | 2009-01-05 | 2012-02-21 | Sprint Communications Company L.P. | Electronic key provisioning |
US11042816B2 (en) * | 2009-10-30 | 2021-06-22 | Getaround, Inc. | Vehicle access control services and platform |
EP2393266A1 (en) * | 2010-06-02 | 2011-12-07 | Deutsche Telekom AG | Method and system for providing a user equipment with acces control to a remotely controllable device |
WO2011159921A1 (en) * | 2010-06-16 | 2011-12-22 | Delphian Systems, LLC | Wireless device enabled locking system |
US8670752B2 (en) * | 2010-09-24 | 2014-03-11 | At&T Intellectual Property I, L.P. | Providing integrated service-entity premium communication services |
US8972746B2 (en) * | 2010-12-17 | 2015-03-03 | Intel Corporation | Technique for supporting multiple secure enclaves |
CN102255730A (en) * | 2011-07-11 | 2011-11-23 | 吴沙林 | Digital certificate safety lock device and digital certificate authentication system and method |
US8947200B2 (en) * | 2011-11-17 | 2015-02-03 | Utc Fire & Security Corporation | Method of distributing stand-alone locks |
US9710982B2 (en) * | 2011-12-23 | 2017-07-18 | Microsoft Technology Licensing, Llc | Hub key service |
-
2012
- 2012-04-05 FI FI20120110A patent/FI124237B/en active IP Right Grant
-
2013
- 2013-04-03 KR KR1020147031032A patent/KR101524659B1/en active IP Right Grant
- 2013-04-03 JP JP2015503907A patent/JP5795696B2/en active Active
- 2013-04-03 CN CN201380018278.5A patent/CN104365056B/en active Active
- 2013-04-03 US US14/390,153 patent/US9385870B2/en active Active
- 2013-04-03 MX MX2014012002A patent/MX352041B/en active IP Right Grant
- 2013-04-03 BR BR112014024934A patent/BR112014024934A2/en not_active Application Discontinuation
- 2013-04-03 CA CA2869110A patent/CA2869110C/en not_active Expired - Fee Related
- 2013-04-03 EP EP13772027.2A patent/EP2834938B1/en active Active
- 2013-04-03 WO PCT/FI2013/050362 patent/WO2013150186A1/en active Application Filing
- 2013-04-03 DK DK13772027.2T patent/DK2834938T3/en active
- 2013-04-03 AU AU2013244872A patent/AU2013244872B2/en active Active
- 2013-04-03 ES ES13772027.2T patent/ES2635556T3/en active Active
- 2013-04-03 IN IN9022DEN2014 patent/IN2014DN09022A/en unknown
- 2013-04-03 PL PL13772027T patent/PL2834938T3/en unknown
Also Published As
Publication number | Publication date |
---|---|
FI20120110A (en) | 2013-10-06 |
DK2834938T3 (en) | 2017-08-28 |
KR20140138351A (en) | 2014-12-03 |
JP5795696B2 (en) | 2015-10-14 |
AU2013244872A1 (en) | 2014-10-23 |
CN104365056A (en) | 2015-02-18 |
US20150341177A1 (en) | 2015-11-26 |
AU2013244872B2 (en) | 2014-12-11 |
WO2013150186A1 (en) | 2013-10-10 |
MX2014012002A (en) | 2014-12-05 |
CA2869110C (en) | 2015-11-03 |
EP2834938A1 (en) | 2015-02-11 |
MX352041B (en) | 2017-11-07 |
BR112014024934A2 (en) | 2017-07-11 |
FI124237B (en) | 2014-05-15 |
EP2834938B1 (en) | 2017-05-31 |
CA2869110A1 (en) | 2013-10-10 |
CN104365056B (en) | 2017-11-24 |
JP2015518316A (en) | 2015-06-25 |
ES2635556T3 (en) | 2017-10-04 |
EP2834938A4 (en) | 2015-12-02 |
PL2834938T3 (en) | 2017-11-30 |
KR101524659B1 (en) | 2015-06-01 |
US9385870B2 (en) | 2016-07-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
IN2014DN09022A (en) | ||
SG10201901366WA (en) | Key exchange through partially trusted third party | |
GB2512249A (en) | Secure peer discovery and authentication using a shared secret | |
GB2533727A (en) | Registry apparatus, agent device, application providing apparatus and corresponding methods | |
MX2016002262A (en) | Secure installation of encryption enabling software onto electronic devices. | |
BR112017002747A2 (en) | computer implemented method, and, computer system. | |
WO2015179849A3 (en) | Network authentication system with dynamic key generation | |
BR112017020122A2 (en) | establishment of a secure nan data link | |
BR112017003018A2 (en) | secure provision of an authentication credential | |
MX2019008945A (en) | Origin certificate based online certificate issuance. | |
WO2014182727A3 (en) | Selectively performing man in the middle decryption | |
IN2014DN09465A (en) | ||
WO2014116956A3 (en) | System and method for differential encryption | |
WO2014059136A3 (en) | Techniqued for secure data exchange | |
WO2015023341A3 (en) | Secure authorization systems and methods | |
PH12014501499A1 (en) | Secure data communications with network back end devices | |
BR112019001011A2 (en) | secure channel establishment | |
HK1144504A1 (en) | A method and device for verifying dynamic password | |
MX2014011953A (en) | Detecting network intrusion using a decoy cryptographic key. | |
GB2524198A (en) | Method and device for secure network access | |
SA114350627B1 (en) | Key agreement protocol | |
EP2574009A3 (en) | Network apparatus based on content name, method of generating and authenticating content name | |
GB2507213A (en) | Authenticating a rich client from within an existing browser session | |
AR081944A1 (en) | METHOD AND APPLIANCE TO UNITE THE AUTHENTICATION OF THE SUBSCRIBER AND THE AUTHENTICATION OF THE DEVICE IN COMMUNICATION SYSTEMS | |
WO2015023332A3 (en) | Incorruptible public key using quantum cryptography for secure wired and wireless communications |