JP2006115502A - ポータブルセキュリティトークン使用型認証機関間相互認証方法及び装置 - Google Patents
ポータブルセキュリティトークン使用型認証機関間相互認証方法及び装置 Download PDFInfo
- Publication number
- JP2006115502A JP2006115502A JP2005295832A JP2005295832A JP2006115502A JP 2006115502 A JP2006115502 A JP 2006115502A JP 2005295832 A JP2005295832 A JP 2005295832A JP 2005295832 A JP2005295832 A JP 2005295832A JP 2006115502 A JP2006115502 A JP 2006115502A
- Authority
- JP
- Japan
- Prior art keywords
- pst
- certificate
- pki
- domain
- mutual
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/02—Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4097—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
- G06Q20/40975—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1016—Devices or methods for securing the PIN and other transaction-data, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/006—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving public key infrastructure [PKI] trust models
- H04L9/007—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving public key infrastructure [PKI] trust models involving hierarchical structures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- General Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Finance (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
Abstract
【解決手段】PST(ポータブルセキュリティトークン)130を用いCA(認証機関)102,112間で相互認証を行う。CA102は加入者デバイス104〜107と共にPKIドメイン110を、CA112は加入者デバイス114〜117と共にPKIドメイン120を形成している。動作時には、CA102,112と場所限定型通信チャネルを介して通信するPST130を用いCA102とCA112の間で認証情報をやりとりし、CA112により署名されたCA102宛の相互認証状を認証情報を用いて発行し、この相互認証状をCA102からPKIドメイン110内加入者デバイス104〜107に頒布する。これによりPKIドメイン110内加入者デバイスはPKIドメイン120内デバイスに対し自分の身元を証明できることとなる。
【選択図】図1
Description
Claims (11)
- 対応する加入者デバイスと共に第1PKI(public-key infrastructure)ドメインを形成している第1CA(certification authority)と、対応する加入者デバイスと共に第2PKIドメインを形成している第2CAとの間で、第1及び第2CAと場所限定型通信チャネルを介して通信するPST(portable security token)を用い、認証情報をやりとりするステップと、
第2CAにより署名された第1CA宛の相互認証状を認証情報を用いて発行するステップと、
第1PKIドメイン内加入者デバイスが第2PKIドメイン内デバイスに対し自分の身元を証明できることとなるよう、この相互認証状を第1CAから第1PKIドメイン内加入者デバイスに頒布するステップと、
を有し、PSTを用い第1CAと第2CAの間で相互認証を行う方法。 - 請求項1記載の方法において、更に、
第1CAにより署名された第2CA宛の相互認証状を認証情報を用いて発行するステップと、
第2PKIドメイン内加入者デバイスが第1PKIドメイン内デバイスに対し自分の身元を証明できることとなるよう、この相互認証状を第2CAから第2PKIドメイン内加入者デバイスに頒布するステップと、
を有する方法。 - 請求項1記載の方法において、第1CA宛に発行された相互認証状によって、第2PKIドメイン内デバイスとのやりとりの間、第1PKIドメイン内デバイスに対し制限付きアクセス権が与えられる方法。
- 請求項1記載の方法において、
PSTを用い第1CAと第2CAの間で認証情報をやりとりするステップが、PST上に第1CAの公開鍵をインストールするサブステップと、PSTを第2CAに物理的に近づけるサブステップと、第1CAの公開鍵を場所限定型通信チャネルを介し第2CAに送るサブステップと、を含み、
第1CA宛の相互認証状を認証情報を用いて発行するステップが、自分の秘密鍵を用い第1CAの公開鍵に署名することによって第2CAにて相互認証状を作成するサブステップと、この相互認証状を第2CAから第1CAに送るサブステップと、を含む方法。 - 請求項1記載の方法において、
PSTを用い第1CAと第2CAの間で認証情報をやりとりするステップが、PST上に第2CAの秘密鍵をインストールするサブステップと、PSTを第1CAに物理的に近づけるサブステップと、を含み、
第1CA宛の相互認証状を認証情報を用いて発行するステップが、場所限定型通信チャネルを介しPSTにて第1CAの公開鍵を受け取るサブステップと、第2CAの秘密鍵を用い第1CAの公開鍵に署名することによってPSTにて相互認証状を作成するサブステップと、この相互認証状をPSTから第1CAに送るサブステップと、を含む方法。 - コンピュータプログラムとして実現された請求項1記載の方法。
- 対応する加入者デバイスと共に第1PKI(public-key infrastructure)ドメインを形成している第1CA(certification authority)と、対応する加入者デバイスと共に第2PKIドメインを形成している第2CAとの間で認証情報をやりとりできるよう、第1及び第2CAと場所限定型通信チャネルを介して通信するPST(portable security token)と、
第2CAにより署名された第1CA宛の相互認証状を認証情報を用いて発行する認証状発行機構と、
第1PKIドメイン内加入者デバイスが第2PKIドメイン内デバイスに対し自分の身元を証明できることとなるよう、この相互認証状を第1CAから第1PKIドメイン内加入者デバイスに頒布する第1PKIドメイン内頒布機構と、
を備え、PSTを用い第1CAと第2CAの間で相互認証を行う装置。 - 請求項7記載の装置において、
PSTを、共通鍵に関し第2CAと合意を形成し、場所限定型通信チャネルを介して第1CA用認証子を受け取るよう構成し、
認証状発行機構を、PSTと第2CAとの間で合意済の共通鍵を用い第1CA用認証子に署名することによりチケットを作成し、そのチケットをPSTから第1CAに送るよう構成することによって、
PSTから送られたチケットを第2CAに示すことで第1CAが自分は第2CAから相互認証状を受け取る権限を有していると証明できるようにした装置。 - 請求項7記載の装置において、
PSTを、第2CAにより発行されたディジタル証明書を受け取り、場所限定型通信チャネルを介して第1CA用認証子を受け取るよう構成し、
認証状発行機構を、PSTの鍵であってこのディジタル証明書に関連付けられている秘密鍵を用い第1CA用認証子に署名することによりチケットを作成し、そのチケットをPSTから第1CAに送るよう構成することによって、
PSTから送られたチケットを第2CAに示すことで第1CAが自分は第2CAから相互認証状を受け取る権限を有していると証明できるようにした装置。 - 請求項7記載の装置において、認証状発行機構が更に、第2CA用ルート証明書を第1CAに送るよう構成された装置。
- 請求項7記載の装置において、第1CAを、第2PKIドメイン内デバイスからアクセス可能にCRL(certificate revocation list)を保持するよう構成することによって、第1CAが第1PKIドメイン内デバイス用の証明書又は認証状を無効化できるよう且つ第2PKIドメイン内デバイスがこの無効化を察知できるようにした装置。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/966,749 US7130998B2 (en) | 2004-10-14 | 2004-10-14 | Using a portable security token to facilitate cross-certification between certification authorities |
US10/966,749 | 2004-10-14 |
Publications (3)
Publication Number | Publication Date |
---|---|
JP2006115502A true JP2006115502A (ja) | 2006-04-27 |
JP2006115502A5 JP2006115502A5 (ja) | 2008-11-20 |
JP4851767B2 JP4851767B2 (ja) | 2012-01-11 |
Family
ID=35892360
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2005295832A Expired - Fee Related JP4851767B2 (ja) | 2004-10-14 | 2005-10-11 | ポータブルセキュリティトークン使用型認証機関間相互認証方法及びコンピュータシステム |
Country Status (3)
Country | Link |
---|---|
US (1) | US7130998B2 (ja) |
EP (1) | EP1653656A3 (ja) |
JP (1) | JP4851767B2 (ja) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100853448B1 (ko) | 2007-02-06 | 2008-08-21 | 성균관대학교산학협력단 | 도메인 기반 이동에이전트 인증 시스템 및 그 인증 방법 |
JP2009177262A (ja) * | 2008-01-22 | 2009-08-06 | Softbank Mobile Corp | 携帯情報処理装置、携帯情報処理方法及び携帯情報処理プログラム |
Families Citing this family (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1203332A4 (en) | 1999-02-12 | 2002-09-25 | Mack Hicks | SYSTEM AND METHOD FOR PROVIDING CERTIFICATION-RELATED AND OTHER SERVICES |
US20020029200A1 (en) | 1999-09-10 | 2002-03-07 | Charles Dulin | System and method for providing certificate validation and other services |
CA2384242A1 (en) | 1999-09-24 | 2001-04-05 | Mary Mckenney | System and method for providing payment services in electronic commerce |
EP1325599A1 (en) | 2000-09-08 | 2003-07-09 | Guy S. Tallent | System and method for providing authorization and other services |
US7000105B2 (en) | 2000-09-08 | 2006-02-14 | Identrus, Llc | System and method for transparently providing certificate validation and other services within an electronic transaction |
US7443807B2 (en) * | 2003-06-16 | 2008-10-28 | Microsoft Corporation | System and process for discovery of network-connected devices |
GB0428596D0 (en) * | 2004-12-24 | 2005-08-10 | Qinetiq Ltd | Public key infrastructures |
US8046579B2 (en) * | 2005-10-04 | 2011-10-25 | Neopost Technologies | Secure gateway with redundent servers |
US8117453B2 (en) * | 2005-11-23 | 2012-02-14 | Proton World International N.V. | Customization of an electronic circuit |
EP1801720A1 (en) * | 2005-12-22 | 2007-06-27 | Microsoft Corporation | Authorisation and authentication |
EP1826695A1 (en) * | 2006-02-28 | 2007-08-29 | Microsoft Corporation | Secure content descriptions |
JP4800377B2 (ja) * | 2006-02-28 | 2011-10-26 | パナソニック株式会社 | 認証システム、ce機器、携帯端末、鍵証明発行局および鍵証明取得方法 |
JP5513410B2 (ja) | 2008-01-18 | 2014-06-04 | アイデントラスト, インコーポレイテッド | 複数の信頼ドメインへのデジタル証明書のバインディング |
JP5265016B2 (ja) * | 2008-10-29 | 2013-08-14 | ドルビー ラボラトリーズ ライセンシング コーポレイション | インターネットワーキングドメインとキーシステム |
US8904169B2 (en) * | 2009-09-15 | 2014-12-02 | Symantec Corporation | Just in time trust establishment and propagation |
US9137236B2 (en) * | 2010-11-09 | 2015-09-15 | Zaplox Ab | Method and system for reducing the impact of an undesired event using event-based distribution of certificates |
AU2012210978B2 (en) * | 2011-01-28 | 2015-11-26 | Royal Canadian Mint/Monnaie Royal Canadienne | Controlled security domains |
US8990557B2 (en) * | 2011-02-17 | 2015-03-24 | Ebay Inc. | Identity assertion framework |
US9491620B2 (en) * | 2012-02-10 | 2016-11-08 | Qualcomm Incorporated | Enabling secure access to a discovered location server for a mobile device |
US20130268755A1 (en) * | 2012-04-06 | 2013-10-10 | Microsoft Corporation | Cross-provider cross-certification content protection |
US9173085B2 (en) * | 2012-07-06 | 2015-10-27 | Blackberry Limited | Methods and apparatus for use in transferring an assignment of a secure chip subscription managers |
WO2014074865A2 (en) * | 2012-11-09 | 2014-05-15 | Timothy Mossbarger | Entity network translation (ent) |
DE102014201234A1 (de) * | 2014-01-23 | 2015-07-23 | Siemens Aktiengesellschaft | Verfahren, Verwaltungsvorrichtung und Gerät zur Zertifikat-basierten Authentifizierung von Kommunikationspartnern in einem Gerät |
US10205598B2 (en) * | 2015-05-03 | 2019-02-12 | Ronald Francis Sulpizio, JR. | Temporal key generation and PKI gateway |
US10057067B2 (en) * | 2015-05-27 | 2018-08-21 | International Business Machines Corporation | Automatic root key rollover during digital signature verification |
ES2687717A1 (es) * | 2017-04-26 | 2018-10-26 | Universidad Carlos Iii De Madrid | Método y dispositivo móvil para emitir certificados digitales a dispositivos electrónicos |
US11374754B2 (en) * | 2017-09-07 | 2022-06-28 | Visa International Service Association | System and method for generating trust tokens |
US11102005B2 (en) | 2020-01-23 | 2021-08-24 | Bank Of America Corporation | Intelligent decryption based on user and data profiling |
US11425143B2 (en) | 2020-01-23 | 2022-08-23 | Bank Of America Corporation | Sleeper keys |
US11483147B2 (en) | 2020-01-23 | 2022-10-25 | Bank Of America Corporation | Intelligent encryption based on user and data properties |
CN111934870B (zh) * | 2020-09-22 | 2020-12-29 | 腾讯科技(深圳)有限公司 | 区块链网络中的根证书更新方法、装置、设备以及介质 |
CN114218558A (zh) * | 2021-12-21 | 2022-03-22 | 联想(北京)有限公司 | 安全多方计算中的跨域身份验证方法及服务器 |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002288569A (ja) * | 2001-03-28 | 2002-10-04 | Ntt Leasing Co Ltd | 取引遂行装置、方法、プログラムおよび該プログラムを記録した記録媒体 |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2774120B1 (fr) * | 1998-01-29 | 2000-04-07 | Siemens Automotive Sa | Systeme de verrouillage pour vehicule automobile a code evolutif et identification |
EP1024626A1 (en) * | 1999-01-27 | 2000-08-02 | International Business Machines Corporation | Method, apparatus, and communication system for exchange of information in pervasive environments |
DE60234573D1 (de) * | 2001-01-30 | 2010-01-14 | Broadcom Corp | Verfahren zum hinzufügen eines neuen Gerätes zu einem drahtlosen Netz |
US20030093663A1 (en) * | 2001-11-09 | 2003-05-15 | Walker Jesse R. | Technique to bootstrap cryptographic keys between devices |
JP3915481B2 (ja) * | 2001-11-14 | 2007-05-16 | セイコーエプソン株式会社 | 無線通信装置 |
US20060083378A1 (en) * | 2002-07-29 | 2006-04-20 | Koninklijke Philips Electronics, N.V. | Security system for apparatuses in a network |
-
2004
- 2004-10-14 US US10/966,749 patent/US7130998B2/en not_active Expired - Fee Related
-
2005
- 2005-10-11 JP JP2005295832A patent/JP4851767B2/ja not_active Expired - Fee Related
- 2005-10-14 EP EP05109586A patent/EP1653656A3/en not_active Withdrawn
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002288569A (ja) * | 2001-03-28 | 2002-10-04 | Ntt Leasing Co Ltd | 取引遂行装置、方法、プログラムおよび該プログラムを記録した記録媒体 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100853448B1 (ko) | 2007-02-06 | 2008-08-21 | 성균관대학교산학협력단 | 도메인 기반 이동에이전트 인증 시스템 및 그 인증 방법 |
JP2009177262A (ja) * | 2008-01-22 | 2009-08-06 | Softbank Mobile Corp | 携帯情報処理装置、携帯情報処理方法及び携帯情報処理プログラム |
Also Published As
Publication number | Publication date |
---|---|
JP4851767B2 (ja) | 2012-01-11 |
US7130998B2 (en) | 2006-10-31 |
EP1653656A3 (en) | 2006-05-10 |
US20060085633A1 (en) | 2006-04-20 |
EP1653656A2 (en) | 2006-05-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4851767B2 (ja) | ポータブルセキュリティトークン使用型認証機関間相互認証方法及びコンピュータシステム | |
KR100860404B1 (ko) | 다중 도메인 홈네트워크 환경에서의 디바이스 인증 방법 및장치 | |
EP1610202B1 (en) | Using a portable security token to facilitate public key certification for devices in a network | |
US10764040B2 (en) | Dynamic domain key exchange for authenticated device to device communications | |
US10567370B2 (en) | Certificate authority | |
US7386722B2 (en) | Certificate management system and method | |
US9800554B2 (en) | Method for establishing secure communication between nodes in a network, network node, key manager, installation device and computer program product | |
US20060126848A1 (en) | Key authentication/service system and method using one-time authentication code | |
US20050100166A1 (en) | Systems and methods for authenticating communications in a network medium | |
JP2003309558A (ja) | ネットワーク媒体上で通信を認証するための方法 | |
JP2009086802A (ja) | 認証仲介方法およびシステム | |
US20090010438A1 (en) | Security mechanism for wireless video area networks | |
WO2008002081A1 (en) | Method and apparatus for authenticating device in multi domain home network environment | |
KR101495722B1 (ko) | 홈 네트워크에서의 통신 보안성을 보장하는 방법 및 이를위한 장치 | |
KR100979205B1 (ko) | 디바이스 인증방법 및 그 시스템 | |
JP4499575B2 (ja) | ネットワークセキュリティ方法およびネットワークセキュリティシステム | |
JP2007019755A (ja) | 分散認証アクセス制御システム | |
KR101165350B1 (ko) | 유비쿼터스 컴퓨팅 네트워크 환경에서 커뮤니티 컴퓨팅을 위한 디바이스 멤버 인증방법 | |
KR102416562B1 (ko) | 블록체인을 기반으로 한 IoT 디바이스의 인증 및 해지 방법 | |
Moon et al. | A user authentication model for the OSGi service platform | |
WO2010024287A1 (ja) | 端末認証システム、無線端末、認証装置および端末認証方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A521 | Written amendment |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20081007 |
|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20081007 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20110531 |
|
A521 | Written amendment |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20110825 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20110927 |
|
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20111021 |
|
R150 | Certificate of patent or registration of utility model |
Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20141028 Year of fee payment: 3 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
S111 | Request for change of ownership or part of ownership |
Free format text: JAPANESE INTERMEDIATE CODE: R313113 |
|
R350 | Written notification of registration of transfer |
Free format text: JAPANESE INTERMEDIATE CODE: R350 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
LAPS | Cancellation because of no payment of annual fees |