JP2008228309A - スローチャネル上の高速認証 - Google Patents
スローチャネル上の高速認証 Download PDFInfo
- Publication number
- JP2008228309A JP2008228309A JP2008065325A JP2008065325A JP2008228309A JP 2008228309 A JP2008228309 A JP 2008228309A JP 2008065325 A JP2008065325 A JP 2008065325A JP 2008065325 A JP2008065325 A JP 2008065325A JP 2008228309 A JP2008228309 A JP 2008228309A
- Authority
- JP
- Japan
- Prior art keywords
- user
- key
- receiving
- computer
- stamp
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/66—Arrangements for connecting between networks having differing types of switching systems, e.g. gateways
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
【解決手段】ネットワーク上で保護された通信を提供するための方法であって、受信側コンピュータにおいて、第1通信チャネル上で、送信側コンピュータの公開鍵、及び送信側ランダム番号のハッシュを受信し、前記受信側コンピュータから、前記第1通信チャネル上で、前記受信側コンピュータの公開鍵、及び、前記受信側コンピュータにより与えられる受信側ランダム番号を伝送し、前記受信側コンピュータにおいて、前記第1通信チャネル上で、前記送信側コンピュータにより与えられる前記送信側ランダム番号を受信するステップを含むことを特徴とする方法が提供される。
【選択図】図1
Description
ここで用いられる鍵刻印という用語は、公開/私用鍵の対を含む鍵又は鍵関連の情報、鍵のハッシュを含む鍵についての情報、ナンス、証明書、エラー修正を含む鍵をエンコードするのに用いられるあらゆる種類の方策を含むことができる。
である場合に、刻印生成が公開鍵の「ソルトされた」ハッシュを含むように修正することが可能である。値sは、鍵交換刻印プロトコルの修正形態において交換された
の連接によりもたらされる。
12:ユーザA
16:プロバイダ
22:プロバイダ
24:ユーザB
28:ルータA
30:ルータB
Claims (4)
- ネットワーク上で保護された通信を提供するための方法であって、
受信側コンピュータにおいて、第1通信チャネル上で、送信側コンピュータの公開鍵、及び送信側ランダム番号のハッシュを受信し、
前記受信側コンピュータから、前記第1通信チャネル上で、前記受信側コンピュータの公開鍵、及び、前記受信側コンピュータにより与えられる受信側ランダム番号を伝送し、
前記受信側コンピュータにおいて、前記第1通信チャネル上で、前記送信側コンピュータにより与えられる前記送信側ランダム番号を受信する
ステップを含むことを特徴とする方法。 - 前記受信側コンピュータにおいて、前記送信側コンピュータの前記公開鍵と、前記受信側及び送信側ランダム番号とを格納するステップを含むことを特徴とする請求項1に記載のコンピュータにより制御された方法。
- 前記受信側コンピュータにおいて、ソルトされたハッシュにより刻印された経験的ストリームを受信するステップを含み、前記ソルトされたハッシュは前記送信側コンピュータの前記公開鍵のハッシュと、前記受信側及び受信側ランダム番号とを含むことを特徴とする請求項1に記載のコンピュータにより制御された方法。
- 前記経験的ストリームをユーザに提示するステップを含むことを特徴とする請求項1に記載のコンピュータにより制御された方法。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/686,771 | 2007-03-15 | ||
US11/686,771 US8345871B2 (en) | 2007-03-15 | 2007-03-15 | Fast authentication over slow channels |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2008228309A true JP2008228309A (ja) | 2008-09-25 |
JP5306678B2 JP5306678B2 (ja) | 2013-10-02 |
Family
ID=39763878
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2008065325A Active JP5306678B2 (ja) | 2007-03-15 | 2008-03-14 | スローチャネル上の高速認証 |
Country Status (3)
Country | Link |
---|---|
US (1) | US8345871B2 (ja) |
JP (1) | JP5306678B2 (ja) |
KR (1) | KR101562833B1 (ja) |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8670564B1 (en) | 2006-08-14 | 2014-03-11 | Key Holdings, LLC | Data encryption system and method |
KR101412747B1 (ko) * | 2007-07-18 | 2014-07-01 | 삼성전자주식회사 | 데이터를 인증하는 방법 및 상기 방법을 수행하는 시스템 |
US7751450B2 (en) * | 2007-09-28 | 2010-07-06 | Verizon Patent And Licensing Inc. | Voice over internet protocol marker insertion |
US8681981B2 (en) * | 2010-12-03 | 2014-03-25 | Motorola Solutions, Inc. | Method and apparatus for transmitting voice communications related to a multimedia session |
US9438589B2 (en) * | 2012-04-19 | 2016-09-06 | Martin Tomlinson | Binding a digital file to a person's identity using biometrics |
US10122710B2 (en) | 2012-04-19 | 2018-11-06 | Pq Solutions Limited | Binding a data transaction to a person's identity using biometrics |
US10200350B2 (en) * | 2012-09-04 | 2019-02-05 | Nokia Technologies Oy | Methods and apparatuses for location-based access management |
US11127001B2 (en) | 2013-05-09 | 2021-09-21 | Wayne Fueling Systems Llc | Systems and methods for secure communication |
US10541979B2 (en) * | 2015-02-17 | 2020-01-21 | Synopsys, Inc. | Multiport content encryption engine |
KR102416979B1 (ko) * | 2015-06-17 | 2022-07-05 | 인텔 코포레이션 | 난수 발생기 |
US10333708B1 (en) * | 2017-02-03 | 2019-06-25 | Amazon Technologies, Inc. | Hybrid random-number generator |
US20230171099A1 (en) * | 2021-11-27 | 2023-06-01 | Oracle International Corporation | Methods, systems, and computer readable media for sharing key identification and public certificate data for access token verification |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH1028114A (ja) * | 1995-12-15 | 1998-01-27 | Lotus Dev Corp | 作業量低減方法、暗号化秘密キー供給方法、暗号システム実施方法、暗号化通信文データ構造及びコンピュータ用媒体 |
JP2003223101A (ja) * | 2001-09-10 | 2003-08-08 | Stmicroelectronics Sa | 安全保護されたマルチメディアデータ伝送方法 |
JP2005217665A (ja) * | 2004-01-28 | 2005-08-11 | Ntt Docomo Inc | 通信システム、送信装置、受信装置及び通信方法 |
WO2006087819A1 (ja) * | 2005-02-21 | 2006-08-24 | Fujitsu Limited | 通信装置 |
JP2008160839A (ja) * | 2006-12-18 | 2008-07-10 | Palo Alto Research Center Inc | ネットワーク上の人間対人間の通信を保護するためのコンピュータ制御方法 |
Family Cites Families (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5241599A (en) * | 1991-10-02 | 1993-08-31 | At&T Bell Laboratories | Cryptographic protocol for secure communications |
US5764772A (en) * | 1995-12-15 | 1998-06-09 | Lotus Development Coporation | Differential work factor cryptography method and system |
US6009176A (en) * | 1997-02-13 | 1999-12-28 | International Business Machines Corporation | How to sign digital streams |
US6427012B1 (en) * | 1997-05-19 | 2002-07-30 | Verance Corporation | Apparatus and method for embedding and extracting information in analog signals using replica modulation |
US6539479B1 (en) * | 1997-07-15 | 2003-03-25 | The Board Of Trustees Of The Leland Stanford Junior University | System and method for securely logging onto a remotely located computer |
US6393127B2 (en) * | 1998-03-02 | 2002-05-21 | Motorola, Inc. | Method for transferring an encryption key |
AU2000264222A1 (en) * | 2000-02-08 | 2001-08-20 | Swisscom Mobile Ag | Single sign-on process |
US7069590B1 (en) * | 2000-02-17 | 2006-06-27 | Microsoft Corporation | System and method for protecting data streams in hardware components |
US7424615B1 (en) * | 2001-07-30 | 2008-09-09 | Apple Inc. | Mutually authenticated secure key exchange (MASKE) |
US7260722B2 (en) | 2001-12-28 | 2007-08-21 | Itt Manufacturing Enterprises, Inc. | Digital multimedia watermarking for source identification |
US7142674B2 (en) * | 2002-06-18 | 2006-11-28 | Intel Corporation | Method of confirming a secure key exchange |
US7373509B2 (en) * | 2003-12-31 | 2008-05-13 | Intel Corporation | Multi-authentication for a computing device connecting to a network |
US20070121939A1 (en) * | 2004-01-13 | 2007-05-31 | Interdigital Technology Corporation | Watermarks for wireless communications |
US7773517B2 (en) * | 2004-11-19 | 2010-08-10 | Research In Motion Limited | Method and system for identifying degradation of a media service |
JP4665617B2 (ja) * | 2005-06-10 | 2011-04-06 | 沖電気工業株式会社 | メッセージ認証システム,メッセージ送信装置,メッセージ受信装置,メッセージ送信方法,メッセージ受信方法およびプログラム |
-
2007
- 2007-03-15 US US11/686,771 patent/US8345871B2/en active Active
-
2008
- 2008-03-14 KR KR1020080023750A patent/KR101562833B1/ko active IP Right Grant
- 2008-03-14 JP JP2008065325A patent/JP5306678B2/ja active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH1028114A (ja) * | 1995-12-15 | 1998-01-27 | Lotus Dev Corp | 作業量低減方法、暗号化秘密キー供給方法、暗号システム実施方法、暗号化通信文データ構造及びコンピュータ用媒体 |
JP2003223101A (ja) * | 2001-09-10 | 2003-08-08 | Stmicroelectronics Sa | 安全保護されたマルチメディアデータ伝送方法 |
JP2005217665A (ja) * | 2004-01-28 | 2005-08-11 | Ntt Docomo Inc | 通信システム、送信装置、受信装置及び通信方法 |
WO2006087819A1 (ja) * | 2005-02-21 | 2006-08-24 | Fujitsu Limited | 通信装置 |
JP2008160839A (ja) * | 2006-12-18 | 2008-07-10 | Palo Alto Research Center Inc | ネットワーク上の人間対人間の通信を保護するためのコンピュータ制御方法 |
Non-Patent Citations (1)
Title |
---|
JPN6012052156; D. W. Davies and W. L. Price 著/上園忠弘 監訳: "ネットワーク・セキュリティ" 1版1刷, 19851205, p.126-129, 日経マグロウヒル社 * |
Also Published As
Publication number | Publication date |
---|---|
US20080229110A1 (en) | 2008-09-18 |
JP5306678B2 (ja) | 2013-10-02 |
KR101562833B1 (ko) | 2015-10-23 |
US8345871B2 (en) | 2013-01-01 |
KR20080084716A (ko) | 2008-09-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5306678B2 (ja) | スローチャネル上の高速認証 | |
US10764043B2 (en) | Identity and content authentication for phone calls | |
US20070157026A1 (en) | Method and system for key management in voice over internet protocol | |
CN104486077B (zh) | 一种VoIP实时数据安全传输的端到端密钥协商方法 | |
CN103974241B (zh) | 一种面向Android系统移动终端的语音端到端加密方法 | |
CN108199835B (zh) | 一种多方联合私钥解密方法 | |
EP3178193B1 (en) | A method of providing real-time secure communication between end points in a network | |
Reaves et al. | {AuthLoop}:{End-to-End} Cryptographic Authentication for Telephony over Voice Channels | |
KR101556654B1 (ko) | 영상 통화 수행 방법 및 장치 | |
EP1981239B1 (en) | Securing multimedia network communication | |
CN106936788B (zh) | 一种适用于voip语音加密的密钥分发方法 | |
US8923279B2 (en) | Prevention of voice over IP spam | |
CN101764690A (zh) | 基于互联网的隐秘信息通信方法 | |
WO2016082401A1 (zh) | 通话方法、装置、用户终端及计算机存储介质 | |
CN110035083A (zh) | 基于会话密钥的通信方法、设备及计算机可读存储介质 | |
CN103401876B (zh) | 一种基于变尺度窗口机制的VoIP服务安全保障方法与系统 | |
US11329831B2 (en) | Practical end-to-end cryptographic authentication for telephony over voice channels | |
KR20120087550A (ko) | 암호 통신 방법 및 이를 이용한 암호 통신 시스템 | |
EP3313108B1 (en) | Method for encrypted call and terminal | |
Zhang et al. | Peer-to-peer VoIP communications using anonymisation overlay networks | |
Floroiu et al. | A comparative analysis of the security aspects of the multimedia key exchange protocols | |
CN105323235B (zh) | 一种安全加密型语音通信系统及方法 | |
Wu et al. | Secure human communications based on biometrics signals | |
KR20110080100A (ko) | 음성 특징에 기반한 암호키를 이용하여 음성 데이터 패킷을 송수신하기 위한 방법 및 장치 | |
KR101459237B1 (ko) | 단말기 간의 보안 통신 방법 및 그 장치 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20110311 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20130110 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20130410 |
|
A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20130415 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20130509 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20130527 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20130626 |
|
R150 | Certificate of patent or registration of utility model |
Free format text: JAPANESE INTERMEDIATE CODE: R150 Ref document number: 5306678 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
S111 | Request for change of ownership or part of ownership |
Free format text: JAPANESE INTERMEDIATE CODE: R313117 |
|
R350 | Written notification of registration of transfer |
Free format text: JAPANESE INTERMEDIATE CODE: R350 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |