JP2021526328A - 格子メッシュ - Google Patents
格子メッシュ Download PDFInfo
- Publication number
- JP2021526328A JP2021526328A JP2020564319A JP2020564319A JP2021526328A JP 2021526328 A JP2021526328 A JP 2021526328A JP 2020564319 A JP2020564319 A JP 2020564319A JP 2020564319 A JP2020564319 A JP 2020564319A JP 2021526328 A JP2021526328 A JP 2021526328A
- Authority
- JP
- Japan
- Prior art keywords
- host
- key
- node
- asset
- message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 claims description 24
- 238000003860 storage Methods 0.000 claims description 9
- 238000004590 computer program Methods 0.000 claims description 5
- 238000010586 diagram Methods 0.000 abstract description 19
- 238000004891 communication Methods 0.000 description 36
- 230000004044 response Effects 0.000 description 26
- 230000008569 process Effects 0.000 description 18
- 230000001010 compromised effect Effects 0.000 description 11
- 230000007246 mechanism Effects 0.000 description 6
- 238000013507 mapping Methods 0.000 description 5
- 239000000463 material Substances 0.000 description 4
- 238000013475 authorization Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 3
- 230000008859 change Effects 0.000 description 3
- 230000006378 damage Effects 0.000 description 3
- 238000009826 distribution Methods 0.000 description 3
- 239000000428 dust Substances 0.000 description 3
- 238000001914 filtration Methods 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 238000012546 transfer Methods 0.000 description 3
- 230000001413 cellular effect Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000006266 hibernation Effects 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 238000003339 best practice Methods 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000009432 framing Methods 0.000 description 1
- 230000004927 fusion Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012913 prioritisation Methods 0.000 description 1
- 239000004557 technical material Substances 0.000 description 1
- 230000000699 topical effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/51—Discovery or management thereof, e.g. service location protocol [SLP] or web services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/55—Push-based network services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/009—Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0433—Key management protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/06—Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
- H04W4/08—User group management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Multimedia (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Small-Scale Networks (AREA)
- Storage Device Security (AREA)
Abstract
Description
本出願は、参照により本明細書に事実上組み込まれる、2018年6月11日に提出された、「AUTONOMOUS SENSOR SYSTEM ARCHITECTURE AND INTERFACE(自律センサ・システム・アーキテクチャおよびインタフェース)」と題する米国仮特許出願第62/683,533号明細書の優先権を主張する。
T2→T1
T2→T3
T1→T2
T1とT2の間のリンクは、T1とT2の両方が相互到達可能性についての表明に署名しているのでルーティング可能なエッジである。T3は候補エッジである。ルーティングテーブルは、従来のルーティングテーブルが有するような、いくつかのホストの順序のエントリではなく、ネットワーク内のいくつかのエッジの順序のエントリを含む。
Claims (21)
- 格子メッシュ用システムであって、
ホストから登録リクエストを受信するように構成されたインタフェースであって、前記登録リクエストは、鍵、および前記ホストが要求したいと望む1組の資産IDを含むインタフェースと、
プロセッサであって、
前記鍵に署名して、RA証明書を用いてRA証明書署名鍵を生成し、
前記RA証明書署名鍵を用いて資産データベースを更新し、
前記ネットワークを通して前記RA証明書署名鍵を分配し、
前記ホストに前記RA証明書署名鍵を提供する
ように構成されたプロセッサと
を備えるシステム。 - 請求項1に記載のシステムであって、グループ鍵、または、前記資産データベース内のホスト公開鍵を使用してメッセージが符号化され、前記メッセージを符号化することは、前記グループ鍵を使用して前記メッセージを暗号化すること、または前記ホスト公開鍵を使用して前記メッセージに署名すること、を備えるシステム。
- 請求項2に記載のシステムであって、前記メッセージは、別のノードに送信される、または符号化後に複数のノードに公開されるシステム。
- 請求項1に記載のシステムであって、メッセージが、鍵 グループ鍵または前記資産データベース内のホスト公開鍵を使用して復号されるシステム。
- 請求項4に記載のシステムであって、前記メッセージは、明確に1つのノードに送信された、または複数のノードに公開されたシステム。
- 請求項1に記載のシステムであって、前記インタフェースおよび前記プロセッサはハブに属するシステム。
- 請求項6に記載のシステムであって、前記ハブは資源局を含むシステム。
- 請求項7に記載のシステムであって、前記資源局は認証局を含むシステム。
- 請求項7に記載のシステムであって、前記資源局は鍵ストアを含むシステム。
- 請求項10に記載のシステムであって、前記鍵ストアは、ハードウェア・セキュリティ・モジュールに鍵を格納するシステム。
- 請求項7に記載のシステムであって、前記資源局は、資産データベースを含むシステム。
- 請求項7に記載のシステムであって、前記資源局は、ホストから要求へのマップを含むシステム。
- 請求項7に記載のシステムであって、前記資源局は、資産データベース共有者を含むシステム。
- 請求項1に記載のシステムであって、前記ホストは、ホストサービスを含むシステム。
- 請求項14に記載のシステムであって、前記ホストサービスは、登録要求元を含むシステム。
- 請求項14に記載のシステムであって、前記ホストサービスは、鍵ストアを含むシステム。
- 請求項16に記載のシステムであって、前記鍵ストアは、ハードウェア・セキュリティ・モジュールに鍵を格納するシステム。
- 請求項14に記載のシステムであって、前記ホストサービスは、資産データベースを含むシステム。
- 請求項14に記載のシステムであって、前記ホストサービスは、資産データベース共有者を含むシステム。
- 格子メッシュのための方法であって、
ホストから登録リクエストを受信するステップであって、前記登録リクエストは、ホスト公開鍵、および前記ホストが要求したいと望む1組の資産IDを含むステップと、
プロセッサを使用して、前記鍵に署名して、RA証明書を用いてRA証明書署名鍵を生成するステップと、
前記RA証明書署名鍵を用いて資産データベースを更新するステップと、
ネットワークを通して前記RA証明書署名鍵を分配するステップと、
前記ホストに前記RA証明書署名鍵を提供するステップと
を備える方法。 - 格子メッシュ用コンピュータプログラム製品であって、前記コンピュータプログラム製品は、有形のコンピュータ可読記憶媒体の中に具体化され、
ホストから登録リクエストを受信するステップであって、前記登録リクエストは、鍵、およびホストが要求したいと望む1組の資産IDを含むステップ、
前記鍵に署名して、RA証明書を用いてRA証明書署名鍵を生成するステップ、
前記RA証明書署名鍵を用いて資産データベースを更新するステップ、
前記ネットワークを通して前記RA証明書署名鍵を分配するステップ、ならびに
前記ホストに前記RA証明書署名鍵を提供するステップ
のためのコンピュータ命令を備えるコンピュータプログラム製品。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2023032354A JP2023065603A (ja) | 2018-06-11 | 2023-03-03 | 格子メッシュ |
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201862683533P | 2018-06-11 | 2018-06-11 | |
US62/683,533 | 2018-06-11 | ||
US16/201,873 | 2018-11-27 | ||
US16/201,873 US10506436B1 (en) | 2018-06-11 | 2018-11-27 | Lattice mesh |
PCT/US2018/063148 WO2019240836A1 (en) | 2018-06-11 | 2018-11-29 | Lattice mesh |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2023032354A Division JP2023065603A (ja) | 2018-06-11 | 2023-03-03 | 格子メッシュ |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2021526328A true JP2021526328A (ja) | 2021-09-30 |
JP7487114B2 JP7487114B2 (ja) | 2024-05-20 |
Family
ID=68764429
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2020564319A Active JP7487114B2 (ja) | 2018-06-11 | 2018-11-29 | 格子メッシュ |
JP2023032354A Pending JP2023065603A (ja) | 2018-06-11 | 2023-03-03 | 格子メッシュ |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2023032354A Pending JP2023065603A (ja) | 2018-06-11 | 2023-03-03 | 格子メッシュ |
Country Status (4)
Country | Link |
---|---|
US (5) | US10506436B1 (ja) |
EP (1) | EP3804260A4 (ja) |
JP (2) | JP7487114B2 (ja) |
WO (1) | WO2019240836A1 (ja) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10506436B1 (en) | 2018-06-11 | 2019-12-10 | Anduril Industries Inc. | Lattice mesh |
US11516725B1 (en) * | 2020-08-18 | 2022-11-29 | Synapse Wireless, Inc. | Rapid topology discovery through identification of mesh network edges |
US11973765B2 (en) * | 2021-05-07 | 2024-04-30 | Cisco Technology, Inc. | Group access control |
US11916279B1 (en) | 2022-05-20 | 2024-02-27 | Anduril Industries, Inc. | Modular system for detecting, tracking, and transmitting to identified objects |
WO2023225417A1 (en) | 2022-05-20 | 2023-11-23 | Anduril Industries, Inc. | Modular system for detecting, tracking, and transmitting to identified objects |
GB2620579A (en) * | 2022-07-11 | 2024-01-17 | Arqit Ltd | Systems and methods for encrypted gossip communication |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001237821A (ja) * | 2000-02-25 | 2001-08-31 | Nec Corp | 暗号化メッセージ配信システムおよびそのプログラム記録媒体 |
JP2005509366A (ja) * | 2001-11-06 | 2005-04-07 | インターナショナル・ビジネス・マシーンズ・コーポレーション | データ供給のための方法およびシステム、電子財産の所有権移転のための方法およびシステム、および電子投票のための方法およびシステム |
JP2007074393A (ja) * | 2005-09-07 | 2007-03-22 | Ntt Docomo Inc | 安全なアドホックネットワークを構築するシステム |
JP2007096919A (ja) * | 2005-09-29 | 2007-04-12 | Kddi Corp | 通信システムおよび通信端末 |
WO2007094036A1 (ja) * | 2006-02-13 | 2007-08-23 | Seiko Instruments Inc. | 情報処理システム |
JP2008236341A (ja) * | 2007-03-20 | 2008-10-02 | Global Sign Kk | サーバ証明書発行システム |
JP2008262564A (ja) * | 2007-04-12 | 2008-10-30 | Xerox Corp | コンピュータワークステーション、デジタル証明書管理方法及びリモートデバイス |
JP2012204897A (ja) * | 2011-03-24 | 2012-10-22 | Toshiba Corp | ルートノード及びプログラム |
JP2013541260A (ja) * | 2010-08-26 | 2013-11-07 | アップル インコーポレイテッド | 可変精細度のロケーション・シェアリング |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7103185B1 (en) * | 1999-12-22 | 2006-09-05 | Cisco Technology, Inc. | Method and apparatus for distributing and updating private keys of multicast group managers using directory replication |
WO2006014504A2 (en) | 2004-07-07 | 2006-02-09 | Sciencelogic, Llc | Self configuring network management system |
EP1892913A1 (de) | 2006-08-24 | 2008-02-27 | Siemens Aktiengesellschaft | Verfahren und Anordnung zum Bereitstellen eines drahtlosen Mesh-Netzwerks |
GB2466071B (en) | 2008-12-15 | 2013-11-13 | Hewlett Packard Development Co | Associating a signing key with a software component of a computing platform |
US20110307695A1 (en) * | 2010-06-14 | 2011-12-15 | Salesforce.Com, Inc. | Methods and systems for providing a secure online feed in a multi-tenant database environment |
EP2878112B1 (en) * | 2012-07-27 | 2015-10-21 | Telefonaktiebolaget L M Ericsson (PUBL) | Secure session for a group of network nodes |
US9060265B2 (en) | 2013-02-06 | 2015-06-16 | I-Shou University | Wireless sensor network and central node device thereof |
US9635014B2 (en) | 2014-02-21 | 2017-04-25 | Samsung Electronics Co., Ltd. | Method and apparatus for authenticating client credentials |
US10952051B2 (en) * | 2016-07-01 | 2021-03-16 | Qualcomm Incorporated | Core network connectionless small data transfer |
WO2018125989A2 (en) * | 2016-12-30 | 2018-07-05 | Intel Corporation | The internet of things |
WO2018152519A1 (en) * | 2017-02-20 | 2018-08-23 | AlphaPoint | Performance of distributed system functions using a trusted execution environment |
US11012428B1 (en) * | 2017-03-02 | 2021-05-18 | Apple Inc. | Cloud messaging system |
US10506436B1 (en) * | 2018-06-11 | 2019-12-10 | Anduril Industries Inc. | Lattice mesh |
-
2018
- 2018-11-27 US US16/201,873 patent/US10506436B1/en active Active
- 2018-11-29 WO PCT/US2018/063148 patent/WO2019240836A1/en unknown
- 2018-11-29 EP EP18922318.3A patent/EP3804260A4/en active Pending
- 2018-11-29 JP JP2020564319A patent/JP7487114B2/ja active Active
-
2019
- 2019-11-04 US US16/673,194 patent/US10812978B2/en active Active
-
2020
- 2020-09-16 US US17/023,184 patent/US11350277B2/en active Active
-
2022
- 2022-03-10 US US17/691,503 patent/US11770707B2/en active Active
-
2023
- 2023-03-03 JP JP2023032354A patent/JP2023065603A/ja active Pending
- 2023-08-11 US US18/448,812 patent/US20240031809A1/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001237821A (ja) * | 2000-02-25 | 2001-08-31 | Nec Corp | 暗号化メッセージ配信システムおよびそのプログラム記録媒体 |
JP2005509366A (ja) * | 2001-11-06 | 2005-04-07 | インターナショナル・ビジネス・マシーンズ・コーポレーション | データ供給のための方法およびシステム、電子財産の所有権移転のための方法およびシステム、および電子投票のための方法およびシステム |
JP2007074393A (ja) * | 2005-09-07 | 2007-03-22 | Ntt Docomo Inc | 安全なアドホックネットワークを構築するシステム |
JP2007096919A (ja) * | 2005-09-29 | 2007-04-12 | Kddi Corp | 通信システムおよび通信端末 |
WO2007094036A1 (ja) * | 2006-02-13 | 2007-08-23 | Seiko Instruments Inc. | 情報処理システム |
JP2008236341A (ja) * | 2007-03-20 | 2008-10-02 | Global Sign Kk | サーバ証明書発行システム |
JP2008262564A (ja) * | 2007-04-12 | 2008-10-30 | Xerox Corp | コンピュータワークステーション、デジタル証明書管理方法及びリモートデバイス |
JP2013541260A (ja) * | 2010-08-26 | 2013-11-07 | アップル インコーポレイテッド | 可変精細度のロケーション・シェアリング |
JP2012204897A (ja) * | 2011-03-24 | 2012-10-22 | Toshiba Corp | ルートノード及びプログラム |
Also Published As
Publication number | Publication date |
---|---|
US11350277B2 (en) | 2022-05-31 |
US20210037384A1 (en) | 2021-02-04 |
US20220256343A1 (en) | 2022-08-11 |
EP3804260A1 (en) | 2021-04-14 |
US20190380032A1 (en) | 2019-12-12 |
US20200068404A1 (en) | 2020-02-27 |
US10812978B2 (en) | 2020-10-20 |
US11770707B2 (en) | 2023-09-26 |
WO2019240836A1 (en) | 2019-12-19 |
US10506436B1 (en) | 2019-12-10 |
JP2023065603A (ja) | 2023-05-12 |
JP7487114B2 (ja) | 2024-05-20 |
US20240031809A1 (en) | 2024-01-25 |
EP3804260A4 (en) | 2022-03-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7487114B2 (ja) | 格子メッシュ | |
US11050724B2 (en) | IaaS-aided access control for information centric networking with Internet-of-Things | |
Misra et al. | Secure content delivery in information-centric networks: Design, implementation, and analyses | |
US8732462B2 (en) | Methods and apparatus for secure data sharing | |
EP3054648A1 (en) | Access control framework for information centric networking | |
US20120317655A1 (en) | Method for Flexible Data Protection with Dynamically Authorized Data Receivers in a Content Network or in Cloud Storage and Content Delivery Services | |
US10904219B2 (en) | Transport relay in communications network | |
Mehdizadeh et al. | Lightweight decentralized multicast–unicast key management method in wireless IPv6 networks | |
CN112352398A (zh) | 临时广播密钥协定 | |
Liyanage et al. | Securing virtual private LAN service by efficient key management | |
CN113973007A (zh) | 基于广播加密和洋葱路由的时控性加密匿名查询方法和系统 | |
Liyanage et al. | Secure hierarchical virtual private LAN services for provider provisioned networks | |
Zhu et al. | An edge re‐encryption‐based access control mechanism in NDN | |
Heimgaertner et al. | A security architecture for the publish/subscribe C-DAX middleware | |
Peng et al. | A secure publish/subscribe protocol for Internet of Things using identity-based cryptography | |
US20220038433A1 (en) | Method and apparatus for secure messaging between network functions | |
CN107135226B (zh) | 基于socks5的传输层代理通信方法 | |
Mohamed et al. | OMAC: a new access control architecture for overlay multicast communications | |
US20220400011A1 (en) | Anti-replay protection based on hashing encrypted temporal key in a secure peer-to-peer data network | |
Misra et al. | AccConF: An access control framework for leveraging in-network cached data in ICNs | |
Bhargava et al. | Fault-tolerant authentication and group key management in mobile computing | |
Li et al. | Hierarchical agent-based secure and reliable multicast in wireless mesh networks | |
US20230199001A1 (en) | Secure streaming media based on updating hypercontent in a secure peer-to-peer data network | |
US20230164121A1 (en) | Autonomic distribution of hyperlinked hypercontent in a secure peer-to-peer data network | |
Rajendran et al. | Secure anonymous routing in ad hoc networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20210108 |
|
A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20220112 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20220222 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20220509 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20220808 |
|
A02 | Decision of refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A02 Effective date: 20221122 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20230303 |
|
C60 | Trial request (containing other claim documents, opposition documents) |
Free format text: JAPANESE INTERMEDIATE CODE: C60 Effective date: 20230303 |
|
A911 | Transfer to examiner for re-examination before appeal (zenchi) |
Free format text: JAPANESE INTERMEDIATE CODE: A911 Effective date: 20230322 |
|
C21 | Notice of transfer of a case for reconsideration by examiners before appeal proceedings |
Free format text: JAPANESE INTERMEDIATE CODE: C21 Effective date: 20230328 |
|
A912 | Re-examination (zenchi) completed and case transferred to appeal board |
Free format text: JAPANESE INTERMEDIATE CODE: A912 Effective date: 20230512 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20231031 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20240227 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20240508 |