JP2023514826A - コンピューティング環境内での安全な鍵交換 - Google Patents
コンピューティング環境内での安全な鍵交換 Download PDFInfo
- Publication number
- JP2023514826A JP2023514826A JP2022548799A JP2022548799A JP2023514826A JP 2023514826 A JP2023514826 A JP 2023514826A JP 2022548799 A JP2022548799 A JP 2022548799A JP 2022548799 A JP2022548799 A JP 2022548799A JP 2023514826 A JP2023514826 A JP 2023514826A
- Authority
- JP
- Japan
- Prior art keywords
- lkm
- node
- message
- ske
- channel
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000004044 response Effects 0.000 claims abstract description 184
- 230000000977 initiatory effect Effects 0.000 claims abstract description 112
- 238000000034 method Methods 0.000 claims abstract description 100
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 54
- 238000004891 communication Methods 0.000 claims abstract description 52
- 238000010200 validation analysis Methods 0.000 claims abstract description 29
- 238000012545 processing Methods 0.000 claims description 88
- 230000008569 process Effects 0.000 claims description 83
- 239000003999 initiator Substances 0.000 claims description 34
- 238000004590 computer program Methods 0.000 claims description 18
- 238000005192 partition Methods 0.000 claims description 18
- 230000009471 action Effects 0.000 claims description 6
- 238000010586 diagram Methods 0.000 description 37
- 230000006870 function Effects 0.000 description 28
- 239000000835 fiber Substances 0.000 description 22
- 230000008929 regeneration Effects 0.000 description 18
- 238000011069 regeneration method Methods 0.000 description 18
- 238000003491 array Methods 0.000 description 16
- 238000012546 transfer Methods 0.000 description 14
- 150000003839 salts Chemical class 0.000 description 9
- 230000003287 optical effect Effects 0.000 description 7
- 238000007726 management method Methods 0.000 description 6
- 239000000463 material Substances 0.000 description 6
- 230000005540 biological transmission Effects 0.000 description 5
- 238000013475 authorization Methods 0.000 description 4
- 230000008901 benefit Effects 0.000 description 4
- 230000007246 mechanism Effects 0.000 description 4
- 238000010899 nucleation Methods 0.000 description 4
- 230000003213 activating effect Effects 0.000 description 3
- 238000009795 derivation Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000008520 organization Effects 0.000 description 3
- KUVIULQEHSCUHY-XYWKZLDCSA-N Beclometasone Chemical compound C1CC2=CC(=O)C=C[C@]2(C)[C@]2(Cl)[C@@H]1[C@@H]1C[C@H](C)[C@@](C(=O)COC(=O)CC)(OC(=O)CC)[C@@]1(C)C[C@@H]2O KUVIULQEHSCUHY-XYWKZLDCSA-N 0.000 description 2
- 230000004913 activation Effects 0.000 description 2
- 238000006243 chemical reaction Methods 0.000 description 2
- 238000010276 construction Methods 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 230000001902 propagating effect Effects 0.000 description 2
- 238000011084 recovery Methods 0.000 description 2
- 101150008563 spir gene Proteins 0.000 description 2
- 230000001052 transient effect Effects 0.000 description 2
- 230000007704 transition Effects 0.000 description 2
- 238000012384 transportation and delivery Methods 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- RYGMFSIKBFXOCR-UHFFFAOYSA-N Copper Chemical compound [Cu] RYGMFSIKBFXOCR-UHFFFAOYSA-N 0.000 description 1
- 230000002411 adverse Effects 0.000 description 1
- 230000003466 anti-cipated effect Effects 0.000 description 1
- 230000003139 buffering effect Effects 0.000 description 1
- 230000009172 bursting Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 239000002131 composite material Substances 0.000 description 1
- 229910052802 copper Inorganic materials 0.000 description 1
- 239000010949 copper Substances 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 238000000802 evaporation-induced self-assembly Methods 0.000 description 1
- 239000004744 fabric Substances 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 230000000670 limiting effect Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000013439 planning Methods 0.000 description 1
- 230000002829 reductive effect Effects 0.000 description 1
- 230000001172 regenerating effect Effects 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 210000003813 thumb Anatomy 0.000 description 1
- 238000013519 translation Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/141—Setup of application sessions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/146—Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/28—Timers or timing mechanisms used in protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3273—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
- Computer And Data Communications (AREA)
- Lock And Its Accessories (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
{SK_d | SK_ei | Salt_ei | SK_er | Salt_er | SK_pi | SK_pr} =
prf+ (SKEYSEED, Ni | Nr | SPIi | SPIr)
ここで、
入力
・Ni、Nrは、それぞれのSKE_SA_Initメッセージからの16バイトのノンスであることができる。
・SPIiおよびSPIrは、それぞれのSKE_SA_InitメッセージのSKEヘッダーからの8バイトの親SA SPI値であることができ、認証に使用されることができる。
出力
・SK_dは、第3のステップで(子SAの)データ転送鍵を生成するために使用される別のシーディング鍵である。
・SK_ei、Salt_ei、SK_er、およびSalt_erは、SKE_Authメッセージおよび親SAの下のその後のすべてのメッセージを暗号化するために使用される鍵およびソルトである。
・SK_piおよびSK_prは、SKE_Authメッセージ内のAUTHペイロードの認証データを生成するために使用される鍵である。
Claims (20)
- コンピューティング環境内の処理を容易にするためのコンピュータ・プログラム製品であって、前記コンピュータ・プログラム製品が、
1つまたは複数の処理回路によって読み取り可能な、動作を実行するための命令を格納しているコンピュータ可読ストレージ媒体を備え、前記動作が、
応答ノード上の応答チャネルから、開始ノード上の開始チャネルで認証応答メッセージを受信して、安全な通信を確立することであって、ローカル鍵マネージャ(LKM)での前記受信が前記開始ノード上で実行される、前記確立することと、
前記開始ノードおよび前記応答ノードのセキュリティ・アソシエーションに基づいて状態チェックを実行することと、
前記認証応答メッセージの妥当性確認を実行することと、
選択された暗号化アルゴリズムの識別子を、前記認証応答メッセージから抽出することと、
前記開始チャネルに対して、状態チェックの成功、妥当性確認の成功、および前記選択された暗号化アルゴリズムに少なくとも部分的に基づいて、前記応答チャネルと通信するよう要求することとを含む、コンピュータ・プログラム製品。 - 前記応答チャネルと前記開始チャネルとの間の通信がストレージ・エリア・ネットワーク(SAN)を介する、請求項1に記載のコンピュータ・プログラム製品。
- 前記動作が、
以前に受信された初期化メッセージから抽出された1つまたは複数のパラメータに少なくとも部分的に基づいて応答側の署名を計算することと、
さらなる妥当性確認として、前記応答側の署名を、前記認証応答メッセージから抽出された署名と比較することとをさらに含む、請求項1に記載のコンピュータ・プログラム製品。 - 前記応答側の署名が、開始側のノンス、共有鍵、応答側の識別子、および暗号鍵のセットからの少なくとも1つの鍵に基づいて計算される、請求項3に記載のコンピュータ・プログラム製品。
- 前記動作が、前記認証応答メッセージのペイロードを復号することをさらに含み、前記認証応答メッセージの妥当性確認が、前記ペイロードを復号することに基づいて1つまたは複数のメッセージ・ヘッダー・パラメータおよび前記ペイロードの識別子をチェックすることを含む、請求項1に記載のコンピュータ・プログラム製品。
- 前記状態チェックが、前記開始ノードのセキュリティ・アソシエーション状態を検証することをさらに含む、請求項1に記載のコンピュータ・プログラム製品。
- 前記状態チェックが、前記LKMの最後に受信されたメッセージの状態および最後に送信されたメッセージの状態を検証することをさらに含む、請求項1に記載のコンピュータ・プログラム製品。
- 前記動作が、失敗した妥当性確認結果に基づいて、または前記認証応答メッセージが、前記応答ノードでのエラー条件を示す通知タイプ・メッセージを含むということの決定に基づいて、前記認証応答メッセージを拒否することをさらに含む、請求項1に記載のコンピュータ・プログラム製品。
- 前記LKMがコンピュータ・システムの論理パーティションを実行する、請求項1に記載のコンピュータ・プログラム製品。
- 前記応答ノードがホスト・コンピュータまたはストレージ・アレイである、請求項1に記載のコンピュータ・プログラム製品。
- 前記動作が、前記選択された暗号化アルゴリズムを使用して前記開始チャネルと応答チャネルとの間の暗号化された通信を可能にするために、1つまたは複数のセッション鍵、開始側のセキュリティ・パラメータ・インデックス(SPI)、および応答側のSPIを含んでいるLKM完了メッセージを構築することをさらに含む、請求項1に記載のコンピュータ・プログラム製品。
- 前記動作が、外部鍵マネージャに対して鍵再生成プロセスをトリガーする鍵再生成タイマを開始することをさらに含む、請求項11に記載のコンピュータ・プログラム製品。
- 前記動作が、セキュリティ・アソシエーション状態を完了に設定することと、前記鍵再生成タイマの開始後に、前記LKM完了メッセージを前記開始チャネルに送信することとをさらに含む、請求項12に記載のコンピュータ・プログラム製品。
- コンピューティング環境内の処理を容易にするコンピュータ実装方法であって、前記コンピュータ実装方法が、
応答ノード上の応答チャネルから、開始ノード上の開始チャネルで認証応答メッセージを受信して、安全な通信を確立することであって、ローカル鍵マネージャ(LKM)での前記受信が前記開始ノード上で実行される、前記確立することと、
前記開始ノードおよび前記応答ノードのセキュリティ・アソシエーションに基づいて状態チェックを実行することと、
前記認証応答メッセージの妥当性確認を実行することと、
選択された暗号化アルゴリズムの識別子を、前記認証応答メッセージから抽出することと、
前記開始チャネルに対して、状態チェックの成功、妥当性確認の成功、および前記選択された暗号化アルゴリズムに少なくとも部分的に基づいて、前記応答チャネルと通信するよう要求することとを含む、コンピュータ実装方法。 - 以前に受信された初期化メッセージから抽出された1つまたは複数のパラメータに少なくとも部分的に基づいて応答側の署名を計算することであって、前記応答側の署名が、開始側のノンス、共有鍵、応答側の識別子、および暗号鍵のセットからの少なくとも1つの鍵に基づいて計算される、前記計算することと、
さらなる妥当性確認として、前記応答側の署名を、前記認証応答メッセージから抽出された署名と比較することとをさらに含む、請求項14に記載のコンピュータ実装方法。 - 前記認証応答メッセージのペイロードを復号することをさらに含み、前記認証応答メッセージの妥当性確認が、前記ペイロードを復号することに基づいて1つまたは複数のメッセージ・ヘッダー・パラメータおよび前記ペイロードの識別子をチェックすることを含む、請求項14に記載のコンピュータ実装方法。
- 前記状態チェックが、前記開始ノードのセキュリティ・アソシエーション状態を検証することをさらに含み、前記状態チェックが、前記LKMの最後に受信されたメッセージの状態および最後に送信されたメッセージの状態を検証することをさらに含む、請求項14に記載のコンピュータ実装方法。
- 前記選択された暗号化アルゴリズムを使用して前記開始チャネルと応答チャネルとの間の暗号化された通信を可能にするために、1つまたは複数のセッション鍵、開始側のセキュリティ・パラメータ・インデックス(SPI)、および応答側のSPIを含んでいるLKM完了メッセージを構築することと、
外部鍵マネージャに対して鍵再生成プロセスをトリガーする鍵再生成タイマを開始することとをさらに含む、請求項14に記載のコンピュータ実装方法。 - コンピューティング環境内の処理を容易にするためのコンピュータ・システムであって、前記コンピュータ・システムが、
開始ノードと、
前記開始ノードに結合された複数のチャネルとを備えており、前記コンピュータ・システムが動作を実行するように構成されており、前記動作が、
応答ノード上の応答チャネルから、前記開始ノード上の開始チャネルで認証応答メッセージを受信して、安全な通信を確立することであって、ローカル鍵マネージャ(LKM)での前記受信が前記開始ノード上で実行される、前記確立することと、
前記開始ノードおよび前記応答ノードのセキュリティ・アソシエーションに基づいて状態チェックを実行することと、
前記認証応答メッセージの妥当性確認を実行することと、
選択された暗号化アルゴリズムの識別子を、前記認証応答メッセージから抽出することと、
前記開始チャネルに対して、状態チェックの成功、妥当性確認の成功、および前記選択された暗号化アルゴリズムに少なくとも部分的に基づいて、前記応答チャネルと通信するよう要求することとを含む、コンピュータ・システム。 - 前記開始ノードがホスト・コンピュータであり、前記LKMが、前記ホスト・コンピュータの論理パーティション内で実行され、前記応答ノードがストレージ・アレイである、請求項19に記載のコンピュータ・システム。
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/801,319 | 2020-02-26 | ||
US16/801,319 US11184160B2 (en) | 2020-02-26 | 2020-02-26 | Channel key loading in a computing environment |
PCT/IB2021/051287 WO2021171134A1 (en) | 2020-02-26 | 2021-02-16 | Secure key exchange in a computing environment |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2023514826A true JP2023514826A (ja) | 2023-04-11 |
JP7523556B2 JP7523556B2 (ja) | 2024-07-26 |
Family
ID=77366403
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2022548799A Active JP7523556B2 (ja) | 2020-02-26 | 2021-02-16 | コンピューティング環境内での安全な鍵交換 |
Country Status (10)
Country | Link |
---|---|
US (2) | US11184160B2 (ja) |
JP (1) | JP7523556B2 (ja) |
KR (1) | KR20220132557A (ja) |
CN (1) | CN115039389B (ja) |
AU (1) | AU2021225416B2 (ja) |
CA (1) | CA3162797A1 (ja) |
DE (1) | DE112021001270T5 (ja) |
GB (1) | GB2608530A (ja) |
IL (1) | IL294779A (ja) |
WO (1) | WO2021171134A1 (ja) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11502834B2 (en) | 2020-02-26 | 2022-11-15 | International Business Machines Corporation | Refreshing keys in a computing environment that provides secure data transfer |
US11546137B2 (en) | 2020-02-26 | 2023-01-03 | International Business Machines Corporation | Generation of a request to initiate a secure data transfer in a computing environment |
US11184160B2 (en) | 2020-02-26 | 2021-11-23 | International Business Machines Corporation | Channel key loading in a computing environment |
US11405215B2 (en) * | 2020-02-26 | 2022-08-02 | International Business Machines Corporation | Generation of a secure key exchange authentication response in a computing environment |
US11652616B2 (en) | 2020-02-26 | 2023-05-16 | International Business Machines Corporation | Initializing a local key manager for providing secure data transfer in a computing environment |
US11310036B2 (en) | 2020-02-26 | 2022-04-19 | International Business Machines Corporation | Generation of a secure key exchange authentication request in a computing environment |
US11489821B2 (en) | 2020-02-26 | 2022-11-01 | International Business Machines Corporation | Processing a request to initiate a secure data transfer in a computing environment |
WO2024040146A2 (en) * | 2022-08-17 | 2024-02-22 | Board Regents Of The University Nebraska | Strainer insert for matrix separation within a centrifuge tube |
CN116743413B (zh) * | 2022-10-26 | 2024-04-12 | 荣耀终端有限公司 | 一种物联网设备认证方法及电子设备 |
WO2024136890A1 (en) * | 2022-12-19 | 2024-06-27 | Visa International Service Association | Method and systems for improving computer network security |
Family Cites Families (223)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4881263A (en) | 1987-09-25 | 1989-11-14 | Digital Equipment Corporation | Apparatus and method for secure transmission of data over an unsecure transmission channel |
US5293029A (en) | 1989-01-17 | 1994-03-08 | Kabushiki Kaisha Toshiba | System for mutually certifying an IC card and an IC card terminal |
GB8916489D0 (en) | 1989-07-19 | 1989-09-06 | British Telecomm | Data communication method and system |
US5235644A (en) | 1990-06-29 | 1993-08-10 | Digital Equipment Corporation | Probabilistic cryptographic processing method |
US6182215B1 (en) | 1997-02-28 | 2001-01-30 | Matsushita Electric Industrial Co., Ltd. | Information devices which select and use one out of plurality of encryption utilization protocols for protecting copyrights of digital productions |
US6490680B1 (en) | 1997-12-04 | 2002-12-03 | Tecsec Incorporated | Access control and authorization system |
US6263437B1 (en) | 1998-02-19 | 2001-07-17 | Openware Systems Inc | Method and apparatus for conducting crypto-ignition processes between thin client devices and server devices over data networks |
US6178511B1 (en) | 1998-04-30 | 2001-01-23 | International Business Machines Corporation | Coordinating user target logons in a single sign-on (SSO) environment |
US6243816B1 (en) | 1998-04-30 | 2001-06-05 | International Business Machines Corporation | Single sign-on (SSO) mechanism personal key manager |
US6240512B1 (en) | 1998-04-30 | 2001-05-29 | International Business Machines Corporation | Single sign-on (SSO) mechanism having master key synchronization |
US6275944B1 (en) | 1998-04-30 | 2001-08-14 | International Business Machines Corporation | Method and system for single sign on using configuration directives with respect to target types |
US7174457B1 (en) | 1999-03-10 | 2007-02-06 | Microsoft Corporation | System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party |
JP2000181803A (ja) | 1998-12-18 | 2000-06-30 | Fujitsu Ltd | 鍵管理機能付電子データ保管装置および電子データ保管方法 |
US6661896B1 (en) | 1998-12-30 | 2003-12-09 | Howard S. Barnett | Computer network security system and method |
US6636968B1 (en) | 1999-03-25 | 2003-10-21 | Koninklijke Philips Electronics N.V. | Multi-node encryption and key delivery |
US6886095B1 (en) | 1999-05-21 | 2005-04-26 | International Business Machines Corporation | Method and apparatus for efficiently initializing secure communications among wireless devices |
US6263435B1 (en) | 1999-07-06 | 2001-07-17 | Matsushita Electric Industrial Co., Ltd. | Dual encryption protocol for scalable secure group communication |
US7089211B1 (en) | 2000-01-12 | 2006-08-08 | Cisco Technology, Inc. | Directory enabled secure multicast group communications |
GB2365153A (en) | 2000-01-28 | 2002-02-13 | Simon William Moore | Microprocessor resistant to power analysis with an alarm state |
US7362868B2 (en) | 2000-10-20 | 2008-04-22 | Eruces, Inc. | Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data |
US7181762B2 (en) | 2001-01-17 | 2007-02-20 | Arcot Systems, Inc. | Apparatus for pre-authentication of users using one-time passwords |
US7266687B2 (en) | 2001-02-16 | 2007-09-04 | Motorola, Inc. | Method and apparatus for storing and distributing encryption keys |
US7765329B2 (en) | 2002-06-05 | 2010-07-27 | Silicon Graphics International | Messaging between heterogeneous clients of a storage area network |
US7181015B2 (en) | 2001-07-31 | 2007-02-20 | Mcafee, Inc. | Method and apparatus for cryptographic key establishment using an identity based symmetric keying technique |
US7879111B2 (en) | 2006-11-02 | 2011-02-01 | Sony Corporation | System and method for RFID transfer of MAC, keys |
CN1184833C (zh) | 2001-12-21 | 2005-01-12 | 华为技术有限公司 | 一种基于移动国家码确定保密通信中加密算法的方法 |
US7965843B1 (en) | 2001-12-27 | 2011-06-21 | Cisco Technology, Inc. | Methods and apparatus for security over fibre channel |
JP3629237B2 (ja) | 2001-12-28 | 2005-03-16 | 株式会社東芝 | ノード装置及び通信制御方法 |
US7251635B2 (en) | 2002-02-25 | 2007-07-31 | Schlumberger Omnes, Inc. | Method and apparatus for managing a key management system |
US7362865B2 (en) | 2002-04-15 | 2008-04-22 | Hewlett-Packard Development Company, L.P. | Wireless network system |
US7246232B2 (en) | 2002-05-31 | 2007-07-17 | Sri International | Methods and apparatus for scalable distributed management of wireless virtual private networks |
US7565537B2 (en) | 2002-06-10 | 2009-07-21 | Microsoft Corporation | Secure key exchange with mutual authentication |
US7773754B2 (en) | 2002-07-08 | 2010-08-10 | Broadcom Corporation | Key management system and method |
US20040103220A1 (en) | 2002-10-21 | 2004-05-27 | Bill Bostick | Remote management system |
EP1416665A2 (en) | 2002-10-31 | 2004-05-06 | Matsushita Electric Industrial Co., Ltd. | Communication device, communication system, and cryptographic algorithm selection method |
US20060005237A1 (en) | 2003-01-30 | 2006-01-05 | Hiroshi Kobata | Securing computer network communication using a proxy server |
TW200421813A (en) | 2003-04-03 | 2004-10-16 | Admtek Inc | Encryption/decryption device of WLAN and method thereof |
US20060129812A1 (en) | 2003-07-07 | 2006-06-15 | Mody Sachin S | Authentication for admitting parties into a network |
US7356587B2 (en) | 2003-07-29 | 2008-04-08 | International Business Machines Corporation | Automatically detecting malicious computer network reconnaissance by updating state codes in a histogram |
US20050135622A1 (en) | 2003-12-18 | 2005-06-23 | Fors Chad M. | Upper layer security based on lower layer keying |
US7548744B2 (en) | 2003-12-19 | 2009-06-16 | General Motors Corporation | WIFI authentication method |
US7697501B2 (en) | 2004-02-06 | 2010-04-13 | Qualcomm Incorporated | Methods and apparatus for separating home agent functionality |
US7624269B2 (en) | 2004-07-09 | 2009-11-24 | Voltage Security, Inc. | Secure messaging system with derived keys |
US20060047601A1 (en) | 2004-08-25 | 2006-03-02 | General Instrument Corporation | Method and apparatus for providing channel key data |
US7899189B2 (en) | 2004-12-09 | 2011-03-01 | International Business Machines Corporation | Apparatus, system, and method for transparent end-to-end security of storage data in a client-server environment |
CN101120569B (zh) | 2004-12-28 | 2011-07-27 | 意大利电信股份公司 | 用户从用户终端远程访问终端设备的远程访问系统和方法 |
CN1838590B (zh) | 2005-03-21 | 2011-01-19 | 松下电器产业株式会社 | 在会话起始协议信号过程提供因特网密钥交换的方法及系统 |
JP2006270363A (ja) * | 2005-03-23 | 2006-10-05 | Matsushita Electric Ind Co Ltd | 秘密通信設定方法、および秘密通信設定システム |
KR100749846B1 (ko) | 2005-06-22 | 2007-08-16 | 한국전자통신연구원 | 무선 휴대 인터넷 시스템의 mac 계층에서 보안 기능을 구현하기 위한 장치 및 이를 이용한 인증 방법 |
US20070038679A1 (en) | 2005-08-15 | 2007-02-15 | Mcdata Corporation | Dynamic configuration updating in a storage area network |
JP4647479B2 (ja) | 2005-12-14 | 2011-03-09 | 日本電信電話株式会社 | IPsec回路及びIPsec処理方法 |
WO2007091002A1 (en) | 2006-02-07 | 2007-08-16 | Nextenders (India) Private Limited | Document security management system |
US7809354B2 (en) | 2006-03-16 | 2010-10-05 | Cisco Technology, Inc. | Detecting address spoofing in wireless network environments |
US9002018B2 (en) | 2006-05-09 | 2015-04-07 | Sync Up Technologies Corporation | Encryption key exchange system and method |
JP2008011512A (ja) | 2006-06-01 | 2008-01-17 | Canon Inc | データ処理装置、データ記憶装置およびそれらのデータ処理方法 |
US20080063209A1 (en) | 2006-09-07 | 2008-03-13 | International Business Machines Corporation | Distributed key store |
KR20090067178A (ko) | 2006-09-21 | 2009-06-24 | 인터디지탈 테크날러지 코포레이션 | 그룹 단위 비밀키 발생 |
US20080095114A1 (en) | 2006-10-21 | 2008-04-24 | Toshiba America Research, Inc. | Key Caching, QoS and Multicast Extensions to Media-Independent Pre-Authentication |
CN101212293B (zh) | 2006-12-31 | 2010-04-14 | 普天信息技术研究院 | 一种身份认证方法及系统 |
US20080165973A1 (en) | 2007-01-09 | 2008-07-10 | Miranda Gavillan Jose G | Retrieval and Display of Encryption Labels From an Encryption Key Manager |
US7805566B2 (en) | 2007-03-29 | 2010-09-28 | Hewlett-Packard Development Company, L.P. | Replication in storage systems using a target port mimicking a host initiator port |
US8635461B2 (en) | 2007-05-22 | 2014-01-21 | International Business Machines Corporation | Retrieval and display of encryption labels from an encryption key manager certificate ID attached to key certificate |
JP5288087B2 (ja) | 2007-06-11 | 2013-09-11 | 日本電気株式会社 | 秘匿通信ネットワークにおける暗号鍵管理方法および装置 |
EP2037652A3 (en) * | 2007-06-19 | 2009-05-27 | Panasonic Corporation | Methods and apparatuses for detecting whether user equipment resides in a trusted or a non-trusted access network |
US9384777B2 (en) | 2007-08-17 | 2016-07-05 | International Business Machines Corporation | Efficient elimination of access to data on a writable storage media |
US9299385B2 (en) | 2007-08-17 | 2016-03-29 | International Business Machines Corporation | Efficient elimination of access to data on a writable storage media |
US9111568B2 (en) | 2007-08-20 | 2015-08-18 | International Business Machines Corporation | Bulk data erase utilizing an encryption technique |
US9774445B1 (en) | 2007-09-04 | 2017-09-26 | Netapp, Inc. | Host based rekeying |
US8645715B2 (en) | 2007-09-11 | 2014-02-04 | International Business Machines Corporation | Configuring host settings to specify an encryption setting and a key label referencing a key encryption key to use to encrypt an encryption key provided to a storage drive to use to encrypt data from the host |
US8249256B2 (en) | 2007-11-06 | 2012-08-21 | Motorola Solutions, Inc. | Method for providing fast secure handoff in a wireless mesh network |
CN101436930A (zh) | 2007-11-16 | 2009-05-20 | 华为技术有限公司 | 一种密钥分发的方法、系统和设备 |
US8498417B1 (en) | 2007-12-27 | 2013-07-30 | Emc Corporation | Automation of coordination of encryption keys in a SAN based environment where an encryption engine, device management, and key management are not co-located |
US9495561B2 (en) | 2008-01-08 | 2016-11-15 | International Business Machines Corporation | Target of opportunity recognition during an encryption related process |
US9830278B1 (en) | 2008-03-06 | 2017-11-28 | EMC IP Holding Company LLC | Tracking replica data using key management |
EP2272235B1 (en) | 2008-03-25 | 2018-05-30 | Alcatel Lucent | Methods and entities using ipsec esp to support security functionality for udp-based oma enablers |
US8855318B1 (en) | 2008-04-02 | 2014-10-07 | Cisco Technology, Inc. | Master key generation and distribution for storage area network devices |
US20100031045A1 (en) | 2008-07-30 | 2010-02-04 | Lakshmi Narasimham Gade | Methods and system and computer medium for loading a set of keys |
CN101662360B (zh) | 2008-08-29 | 2011-09-14 | 公安部第三研究所 | 一种基于短信消息服务的可认证对称密钥协商方法 |
US8401195B2 (en) | 2008-09-22 | 2013-03-19 | Motorola Solutions, Inc. | Method of automatically populating a list of managed secure communications group members |
US20100154053A1 (en) | 2008-12-17 | 2010-06-17 | David Dodgson | Storage security using cryptographic splitting |
CN101409619B (zh) | 2008-11-25 | 2011-06-01 | 普天信息技术研究院有限公司 | 闪存卡及虚拟专用网密钥交换的实现方法 |
US20100157889A1 (en) | 2008-12-18 | 2010-06-24 | Motorola, Inc. | System and method for improving efficiency of broadcast communications in a multi-hop wireless mesh network |
US8391494B1 (en) | 2009-02-26 | 2013-03-05 | Symantec Corporation | Systems and methods for protecting enterprise rights management keys |
JP2012520027A (ja) * | 2009-03-06 | 2012-08-30 | インターデイジタル パテント ホールディングス インコーポレイテッド | 無線装置のプラットフォームの検証と管理 |
US20110320706A1 (en) | 2009-03-12 | 2011-12-29 | Hitachi, Ltd. | Storage apparatus and method for controlling the same |
US9355267B2 (en) | 2009-03-26 | 2016-05-31 | The University Of Houston System | Integrated file level cryptographical access control |
US8798034B2 (en) | 2009-03-31 | 2014-08-05 | Motorola Solutions, Inc. | System and method for selecting a route based on link metrics incorporating channel bandwidth, spatial streams and/or guard interval in a multiple-input multiple-output (MIMO) network |
US8266433B1 (en) | 2009-04-30 | 2012-09-11 | Netapp, Inc. | Method and system for automatically migrating encryption keys between key managers in a network storage system |
WO2010141375A2 (en) | 2009-06-01 | 2010-12-09 | Phatak Dhananjay S | System, method, and apparata for secure communications using an electrical grid network |
US8296567B2 (en) | 2009-07-15 | 2012-10-23 | Research In Motion Limited | System and method for exchanging key generation parameters for secure communications |
US8195956B2 (en) | 2009-08-17 | 2012-06-05 | Brocade Communications Systems, Inc. | Re-keying data in place |
CN102014381B (zh) | 2009-09-08 | 2012-12-12 | 华为技术有限公司 | 加密算法协商方法、网元及移动台 |
US8630416B2 (en) | 2009-12-21 | 2014-01-14 | Intel Corporation | Wireless device and method for rekeying with reduced packet loss for high-throughput wireless communications |
KR101706117B1 (ko) | 2010-01-15 | 2017-02-14 | 삼성전자주식회사 | 휴대용 단말기에서 다른 휴대용 단말기를 인증하는 장치 및 방법 |
CN102236939B (zh) | 2010-05-05 | 2012-12-26 | 国民技术股份有限公司 | 一种带低频磁通信的射频通信接入方法 |
US9350708B2 (en) | 2010-06-01 | 2016-05-24 | Good Technology Corporation | System and method for providing secured access to services |
US9147081B2 (en) | 2010-07-27 | 2015-09-29 | Infinidat Ltd. | Method of access control to stored information and system thereof |
CN101917272B (zh) | 2010-08-12 | 2012-07-18 | 西安西电捷通无线网络通信股份有限公司 | 一种邻居用户终端间保密通信方法及系统 |
CN102006294B (zh) | 2010-11-25 | 2014-08-20 | 中兴通讯股份有限公司 | Ims多媒体通信方法和系统、终端及ims核心网 |
US8200868B1 (en) | 2010-12-30 | 2012-06-12 | Google Inc. | Peripheral device detection with short-range communication |
US8701169B2 (en) | 2011-02-11 | 2014-04-15 | Certicom Corp. | Using a single certificate request to generate credentials with multiple ECQV certificates |
US8838550B1 (en) | 2011-06-27 | 2014-09-16 | Amazon Technologies, Inc. | Readable text-based compression of resource identifiers |
US8943318B2 (en) | 2012-05-11 | 2015-01-27 | Verizon Patent And Licensing Inc. | Secure messaging by key generation information transfer |
EP2733885A4 (en) | 2011-07-15 | 2015-06-17 | Hitachi Ltd | METHOD FOR DETERMINING AN ENCRYPTION ALGORITHM USED FOR A SIGNATURE AND VERIFICATION SERVER AND PROGRAM THEREFOR |
US8798273B2 (en) | 2011-08-19 | 2014-08-05 | International Business Machines Corporation | Extending credential type to group Key Management Interoperability Protocol (KMIP) clients |
JP5624526B2 (ja) | 2011-08-26 | 2014-11-12 | 株式会社東芝 | 鍵共有装置、鍵共有方法および鍵共有プログラム |
US8769310B2 (en) | 2011-10-21 | 2014-07-01 | International Business Machines Corporation | Encrypting data objects to back-up |
US9390228B2 (en) | 2011-10-31 | 2016-07-12 | Reid Consulting Group, Inc. | System and method for securely storing and sharing information |
KR101388724B1 (ko) | 2011-11-11 | 2014-04-25 | 닛본 덴끼 가부시끼가이샤 | 데이터베이스 암호화 시스템과 방법 및 컴퓨터 판독가능 기록 매체 |
US9553725B2 (en) | 2011-11-21 | 2017-01-24 | Combined Conditional Access Development And Support, Llc | System and method for authenticating data |
CN103166931A (zh) | 2011-12-15 | 2013-06-19 | 华为技术有限公司 | 一种安全传输数据方法,装置和系统 |
CN102546154B (zh) | 2011-12-19 | 2015-09-16 | 上海顶竹通讯技术有限公司 | 移动通信网络中终端的切换方法 |
CN102572314B (zh) | 2011-12-22 | 2015-01-14 | 格科微电子(上海)有限公司 | 图像传感器以及支付认证方法 |
US9065637B2 (en) | 2012-01-25 | 2015-06-23 | CertiVox Ltd. | System and method for securing private keys issued from distributed private key generator (D-PKG) nodes |
US9449183B2 (en) | 2012-01-28 | 2016-09-20 | Jianqing Wu | Secure file drawer and safe |
CN102821096B (zh) | 2012-07-17 | 2014-10-29 | 华中科技大学 | 一种分布式存储系统及其文件共享方法 |
US9501646B2 (en) | 2012-09-26 | 2016-11-22 | Mitsubishi Electric Corporation | Program verification apparatus, program verification method, and computer readable medium |
US20190335551A1 (en) | 2012-11-08 | 2019-10-31 | Applied Biophotonics Ltd. | Distributed Photobiomodulation Therapy Devices And Methods, Biofeedback, And Communication Protocols Therefor |
US20140185805A1 (en) | 2013-01-03 | 2014-07-03 | Neuropace, Inc. | Securely Exchanging Cipher Keys |
US9882713B1 (en) | 2013-01-30 | 2018-01-30 | vIPtela Inc. | Method and system for key generation, distribution and management |
US9608813B1 (en) | 2013-06-13 | 2017-03-28 | Amazon Technologies, Inc. | Key rotation techniques |
US9185088B1 (en) | 2013-02-19 | 2015-11-10 | Amazon Technologies, Inc. | Secure and efficient communication through an intermediary |
US9152578B1 (en) | 2013-03-12 | 2015-10-06 | Emc Corporation | Securing data replication, backup and mobility in cloud storage |
US9467283B2 (en) | 2013-06-24 | 2016-10-11 | Blackberry Limited | Securing method for lawful interception |
US9558358B2 (en) | 2013-06-27 | 2017-01-31 | Visa International Service Association | Random number generator in a virtualized environment |
KR102124413B1 (ko) | 2013-12-30 | 2020-06-19 | 삼성에스디에스 주식회사 | 아이디 기반 키 관리 시스템 및 방법 |
US9432838B2 (en) | 2013-08-09 | 2016-08-30 | Paypal, Inc. | System and methods for account creation using a feature phone |
US9124564B2 (en) | 2013-08-22 | 2015-09-01 | Cisco Technology, Inc. | Context awareness during first negotiation of secure key exchange |
RU2663476C2 (ru) | 2013-09-20 | 2018-08-06 | Виза Интернэшнл Сервис Ассосиэйшн | Защищенная обработка удаленных платежных транзакций, включающая в себя аутентификацию потребителей |
US20150117639A1 (en) | 2013-10-25 | 2015-04-30 | IdentaChip, LLC | Secure and privacy friendly data encryption |
KR101447554B1 (ko) | 2013-11-08 | 2014-10-08 | 한국전자통신연구원 | 암호화된 파일을 복호화하는 장치 및 그 방법 |
US9519696B1 (en) | 2014-01-07 | 2016-12-13 | Amazon Technologies, Inc. | Data transformation policies |
US10331895B1 (en) | 2014-01-07 | 2019-06-25 | Amazon Technologies, Inc. | Forced data transformation policy |
US20150281185A1 (en) | 2014-03-26 | 2015-10-01 | Cisco Technology, Inc. | Cloud Collaboration System With External Cryptographic Key Management |
US10043029B2 (en) | 2014-04-04 | 2018-08-07 | Zettaset, Inc. | Cloud storage encryption |
US9654469B1 (en) | 2014-05-02 | 2017-05-16 | Nok Nok Labs, Inc. | Web-based user authentication techniques and applications |
US10318754B2 (en) | 2014-06-02 | 2019-06-11 | Robert Bosch Gmbh | System and method for secure review of audit logs |
US9258117B1 (en) | 2014-06-26 | 2016-02-09 | Amazon Technologies, Inc. | Mutual authentication with symmetric secrets and signatures |
US20190018968A1 (en) | 2014-07-17 | 2019-01-17 | Venafi, Inc. | Security reliance scoring for cryptographic material and processes |
GB2528874A (en) | 2014-08-01 | 2016-02-10 | Bae Systems Plc | Improvements in and relating to secret communications |
CN106797311B (zh) | 2014-08-29 | 2020-07-14 | 维萨国际服务协会 | 用于安全密码生成的系统、方法和存储介质 |
EP3189618B1 (en) | 2014-09-04 | 2020-06-17 | Koninklijke Philips N.V. | Cryptographic system arranged for key sharing |
US9331989B2 (en) | 2014-10-06 | 2016-05-03 | Micron Technology, Inc. | Secure shared key sharing systems and methods |
US10333696B2 (en) | 2015-01-12 | 2019-06-25 | X-Prime, Inc. | Systems and methods for implementing an efficient, scalable homomorphic transformation of encrypted data with minimal data expansion and improved processing efficiency |
WO2016131056A1 (en) | 2015-02-13 | 2016-08-18 | Visa International Service Association | Confidential communication management |
US9531536B2 (en) | 2015-03-04 | 2016-12-27 | Ssh Communications Oyj | Shared keys in a computerized system |
TWI566121B (zh) | 2015-03-05 | 2017-01-11 | Intelligent components to achieve a logical dual - channel system and its methods | |
KR101675088B1 (ko) | 2015-04-30 | 2016-11-10 | 성균관대학교산학협력단 | Mtc에서의 네트워크와의 상호 인증 방법 및 시스템 |
US20200204991A1 (en) | 2018-12-21 | 2020-06-25 | Micron Technology, Inc. | Memory device and managed memory system with wireless debug communication port and methods for operating the same |
US10708236B2 (en) | 2015-10-26 | 2020-07-07 | Secturion Systems, Inc. | Multi-independent level secure (MILS) storage encryption |
US10382409B2 (en) | 2015-11-25 | 2019-08-13 | Visa International Service Association | Secure multi-party protocol |
US10412098B2 (en) | 2015-12-11 | 2019-09-10 | Amazon Technologies, Inc. | Signed envelope encryption |
BR112018012417A2 (pt) | 2015-12-21 | 2018-12-18 | Koninklijke Philips N.V. | dispositivo de registrando, método de registrando, método de configurador, dispositivo de configurador, e produto de programa de computador |
WO2017132136A1 (en) | 2016-01-26 | 2017-08-03 | Google Inc. | Secure connections for low-power devices |
US10382206B2 (en) | 2016-03-10 | 2019-08-13 | Futurewei Technologies, Inc. | Authentication mechanism for 5G technologies |
RU2018137847A (ru) | 2016-03-29 | 2020-04-29 | Конинклейке Филипс Н.В. | Система и способ для распространения основанного на идентификационной информации ключевого материала и сертификата |
US10255201B2 (en) | 2016-05-18 | 2019-04-09 | Dell Products, L.P. | Local key management for storage devices |
US10129219B1 (en) | 2016-05-31 | 2018-11-13 | Cavium, Llc | Methods and systems for securing data stored at a storage area network |
US10097544B2 (en) | 2016-06-01 | 2018-10-09 | International Business Machines Corporation | Protection and verification of user authentication credentials against server compromise |
CN107682891B (zh) | 2016-08-02 | 2019-08-23 | 电信科学技术研究院 | 一种确定资源占用状态的方法和装置 |
WO2018027059A1 (en) | 2016-08-03 | 2018-02-08 | KryptCo, Inc. | Systems and methods for delegated cryptography |
US10742628B2 (en) | 2016-08-11 | 2020-08-11 | Unisys Corporation | Secured cloud storage broker with enhanced security |
US20180063141A1 (en) | 2016-08-30 | 2018-03-01 | Verisign, Inc. | Integrated dns service provider services using token-based authentication |
US20180083958A1 (en) | 2016-09-18 | 2018-03-22 | Dmitriy Avilov | System and method for network user's authentication and registration by way of third party computing device |
US10505729B2 (en) | 2016-11-09 | 2019-12-10 | Sap Se | Secure database featuring separate operating system user |
WO2018096449A1 (en) | 2016-11-23 | 2018-05-31 | Telefonaktiebolaget Lm Ericsson (Publ) | User identity privacy protection in public wireless local access network, wlan, access |
US11140547B2 (en) | 2016-11-26 | 2021-10-05 | Huawei Technologies Co., Ltd. | Method for securely controlling smart home, and terminal device |
US10972265B2 (en) | 2017-01-26 | 2021-04-06 | Microsoft Technology Licensing, Llc | Addressing a trusted execution environment |
US11082418B2 (en) | 2017-02-13 | 2021-08-03 | Avalanche Cloud Corporation | Privacy ensured brokered identity federation |
US10594481B2 (en) | 2017-02-21 | 2020-03-17 | International Business Machines Corporation | Replicated encrypted data management |
US10546130B1 (en) | 2017-02-24 | 2020-01-28 | United States Of America As Represented By The Secretary Of The Air Force | Timed attestation process |
US10503427B2 (en) | 2017-03-10 | 2019-12-10 | Pure Storage, Inc. | Synchronously replicating datasets and other managed objects to cloud-based storage systems |
JP2018182665A (ja) | 2017-04-20 | 2018-11-15 | 富士通株式会社 | 通信装置、通信システム及び暗号化通信制御方法 |
CN109246053B (zh) | 2017-05-26 | 2022-05-24 | 阿里巴巴集团控股有限公司 | 一种数据通信方法、装置、设备和存储介质 |
US11604879B2 (en) | 2017-07-12 | 2023-03-14 | Nec Corporation | Attestation system, attestation method, and attestation program |
US11196711B2 (en) | 2017-07-21 | 2021-12-07 | Fisher-Rosemount Systems, Inc. | Firewall for encrypted traffic in a process control system |
US10841089B2 (en) | 2017-08-25 | 2020-11-17 | Nutanix, Inc. | Key managers for distributed computing systems |
CN109429232A (zh) | 2017-09-04 | 2019-03-05 | 华为技术有限公司 | 网络接入和接入控制方法、装置 |
US10361859B2 (en) | 2017-10-06 | 2019-07-23 | Stealthpath, Inc. | Methods for internet communication security |
US11108751B2 (en) | 2017-10-27 | 2021-08-31 | Nicira, Inc. | Segmentation of encrypted segments in networks |
US10785199B1 (en) | 2017-11-27 | 2020-09-22 | Amazon Technologies, Inc. | Distribution of derived authentication keys to authentication servers based on trust level |
KR102456579B1 (ko) | 2017-12-07 | 2022-10-20 | 삼성전자주식회사 | 암호화 관련 취약점 공격에 강인한 전자 장치 및 그 방법 |
US11095638B2 (en) | 2017-12-11 | 2021-08-17 | Ssh Communications Security Oyj | Access security in computer networks |
US10749667B2 (en) | 2017-12-29 | 2020-08-18 | Hughes Network Systems, Llc | System and method for providing satellite GTP acceleration for secure cellular backhaul over satellite |
EP3732599A4 (en) | 2017-12-29 | 2021-09-01 | Idee Limited | SINGLE SIGN-ON (SSO) USING CONTINUOUS AUTHENTICATION |
US20190238323A1 (en) | 2018-01-31 | 2019-08-01 | Nutanix, Inc. | Key managers for distributed computing systems using key sharing techniques |
US10637858B2 (en) | 2018-02-23 | 2020-04-28 | T-Mobile Usa, Inc. | Key-derivation verification in telecommunications network |
US10678938B2 (en) | 2018-03-30 | 2020-06-09 | Intel Corporation | Trustworthy peripheral transfer of ownership |
US11347868B2 (en) | 2018-04-17 | 2022-05-31 | Domo, Inc | Systems and methods for securely managing data in distributed systems |
US10715511B2 (en) * | 2018-05-03 | 2020-07-14 | Honeywell International Inc. | Systems and methods for a secure subscription based vehicle data service |
US10820197B2 (en) | 2018-05-08 | 2020-10-27 | At&T Intellectual Property I, L.P. | Selective disablement of SIP encryption for lawful intercept |
KR102626319B1 (ko) | 2018-05-23 | 2024-01-17 | 삼성전자주식회사 | 디지털 키를 저장하기 위한 방법 및 전자 디바이스 |
CN112513857A (zh) | 2018-07-27 | 2021-03-16 | 百可德罗德公司 | 可信执行环境中的个性化密码安全访问控制 |
US11057366B2 (en) | 2018-08-21 | 2021-07-06 | HYPR Corp. | Federated identity management with decentralized computing platforms |
US10833860B2 (en) | 2018-09-04 | 2020-11-10 | International Business Machines Corporation | Shared key processing by a host to secure links |
US11991273B2 (en) | 2018-09-04 | 2024-05-21 | International Business Machines Corporation | Storage device key management for encrypted host data |
US10756887B2 (en) | 2018-10-12 | 2020-08-25 | EMC IP Holding Company LLC | Method and system for securely replicating encrypted deduplicated storages |
US11153085B2 (en) | 2018-10-30 | 2021-10-19 | EMC IP Holding Company LLC | Secure distributed storage of encryption keys |
US11233790B2 (en) | 2019-02-22 | 2022-01-25 | Crowd Strike, Inc. | Network-based NT LAN manager (NTLM) relay attack detection and prevention |
KR20200104043A (ko) | 2019-02-26 | 2020-09-03 | 삼성전자주식회사 | 사용자 식별 정보를 저장하기 위한 전자 장치 및 그에 관한 방법 |
US11196726B2 (en) | 2019-03-01 | 2021-12-07 | Cisco Technology, Inc. | Scalable IPSec services |
US11228434B2 (en) | 2019-03-20 | 2022-01-18 | Zettaset, Inc. | Data-at-rest encryption and key management in unreliably connected environments |
WO2019120326A2 (en) | 2019-03-29 | 2019-06-27 | Alibaba Group Holding Limited | Managing sensitive data elements in a blockchain network |
US11212264B1 (en) | 2019-05-30 | 2021-12-28 | Wells Fargo Bank, N.A. | Systems and methods for third party data protection |
CN110690960B (zh) | 2019-09-01 | 2022-02-22 | 成都量安区块链科技有限公司 | 一种中继节点的路由服务方法与装置 |
US11206144B2 (en) * | 2019-09-11 | 2021-12-21 | International Business Machines Corporation | Establishing a security association and authentication to secure communication between an initiator and a responder |
US11201749B2 (en) * | 2019-09-11 | 2021-12-14 | International Business Machines Corporation | Establishing a security association and authentication to secure communication between an initiator and a responder |
US11245521B2 (en) * | 2019-09-25 | 2022-02-08 | International Business Machines Corporation | Reverting from a new security association to a previous security association in response to an error during a rekey operation |
US11303441B2 (en) * | 2019-09-25 | 2022-04-12 | International Business Machines Corporation | Reverting from a new security association to a previous security association in response to an error during a rekey operation |
US11245697B2 (en) | 2019-11-29 | 2022-02-08 | Juniper Networks, Inc. | Application-based network security |
US11500969B2 (en) | 2020-01-03 | 2022-11-15 | Microsoft Technology Licensing, Llc | Protecting commercial off-the-shelf program binaries from piracy using hardware enclaves |
US11469885B2 (en) | 2020-01-09 | 2022-10-11 | Western Digital Technologies, Inc. | Remote grant of access to locked data storage device |
US11502834B2 (en) | 2020-02-26 | 2022-11-15 | International Business Machines Corporation | Refreshing keys in a computing environment that provides secure data transfer |
US11489821B2 (en) | 2020-02-26 | 2022-11-01 | International Business Machines Corporation | Processing a request to initiate a secure data transfer in a computing environment |
US11652616B2 (en) | 2020-02-26 | 2023-05-16 | International Business Machines Corporation | Initializing a local key manager for providing secure data transfer in a computing environment |
US11184160B2 (en) | 2020-02-26 | 2021-11-23 | International Business Machines Corporation | Channel key loading in a computing environment |
US11405215B2 (en) | 2020-02-26 | 2022-08-02 | International Business Machines Corporation | Generation of a secure key exchange authentication response in a computing environment |
US11546137B2 (en) | 2020-02-26 | 2023-01-03 | International Business Machines Corporation | Generation of a request to initiate a secure data transfer in a computing environment |
US11310036B2 (en) | 2020-02-26 | 2022-04-19 | International Business Machines Corporation | Generation of a secure key exchange authentication request in a computing environment |
US11658984B2 (en) | 2020-04-24 | 2023-05-23 | Citrix Systems, Inc. | Authenticating access to computing resources |
US11277381B2 (en) | 2020-04-30 | 2022-03-15 | Kyndryl, Inc. | Multi-channel based just-in-time firewall control |
US11356418B2 (en) | 2020-05-07 | 2022-06-07 | Citrix Systems, Inc. | Systems and methods for using unencrypted communication tunnels |
LT6793B (lt) | 2020-05-18 | 2020-12-28 | Timofey Mochalov | Duomenų perdavimo apsaugos būdas naudojant dirbtinį neuroninį tinklą |
-
2020
- 2020-02-26 US US16/801,319 patent/US11184160B2/en active Active
-
2021
- 2021-02-16 IL IL294779A patent/IL294779A/en unknown
- 2021-02-16 CN CN202180011721.0A patent/CN115039389B/zh active Active
- 2021-02-16 CA CA3162797A patent/CA3162797A1/en active Pending
- 2021-02-16 WO PCT/IB2021/051287 patent/WO2021171134A1/en active Application Filing
- 2021-02-16 KR KR1020227027946A patent/KR20220132557A/ko not_active Application Discontinuation
- 2021-02-16 AU AU2021225416A patent/AU2021225416B2/en active Active
- 2021-02-16 JP JP2022548799A patent/JP7523556B2/ja active Active
- 2021-02-16 GB GB2213463.9A patent/GB2608530A/en active Pending
- 2021-02-16 DE DE112021001270.3T patent/DE112021001270T5/de active Pending
- 2021-09-16 US US17/476,677 patent/US11824974B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
AU2021225416B2 (en) | 2023-02-09 |
US20220006626A1 (en) | 2022-01-06 |
GB2608530A (en) | 2023-01-04 |
KR20220132557A (ko) | 2022-09-30 |
JP7523556B2 (ja) | 2024-07-26 |
CN115039389B (zh) | 2024-02-06 |
DE112021001270T5 (de) | 2023-02-09 |
US20210266156A1 (en) | 2021-08-26 |
US11184160B2 (en) | 2021-11-23 |
IL294779A (en) | 2022-09-01 |
GB202213463D0 (en) | 2022-10-26 |
CA3162797A1 (en) | 2021-09-02 |
WO2021171134A1 (en) | 2021-09-02 |
CN115039389A (zh) | 2022-09-09 |
US11824974B2 (en) | 2023-11-21 |
AU2021225416A1 (en) | 2022-07-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7523556B2 (ja) | コンピューティング環境内での安全な鍵交換 | |
US10764291B2 (en) | Controlling access between nodes by a key server | |
US11405215B2 (en) | Generation of a secure key exchange authentication response in a computing environment | |
US11310036B2 (en) | Generation of a secure key exchange authentication request in a computing environment | |
US11652616B2 (en) | Initializing a local key manager for providing secure data transfer in a computing environment | |
US11502834B2 (en) | Refreshing keys in a computing environment that provides secure data transfer | |
US11563588B2 (en) | Securing a path at a selected node | |
US11489821B2 (en) | Processing a request to initiate a secure data transfer in a computing environment | |
US11546137B2 (en) | Generation of a request to initiate a secure data transfer in a computing environment | |
US10833860B2 (en) | Shared key processing by a host to secure links | |
US11991273B2 (en) | Storage device key management for encrypted host data | |
US10833856B2 (en) | Automatic re-authentication of links using a key server | |
US11025413B2 (en) | Securing a storage network using key server authentication | |
US11522681B2 (en) | Securing a path at a node | |
US9509692B2 (en) | Secured access to resources using a proxy | |
US11038671B2 (en) | Shared key processing by a storage device to secure links |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20221223 |
|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20230721 |
|
A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20240619 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20240702 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20240716 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 7523556 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |