JP7077394B2 - デバイスに匿名性を与えるキー認証ステートメントの生成 - Google Patents
デバイスに匿名性を与えるキー認証ステートメントの生成 Download PDFInfo
- Publication number
- JP7077394B2 JP7077394B2 JP2020501161A JP2020501161A JP7077394B2 JP 7077394 B2 JP7077394 B2 JP 7077394B2 JP 2020501161 A JP2020501161 A JP 2020501161A JP 2020501161 A JP2020501161 A JP 2020501161A JP 7077394 B2 JP7077394 B2 JP 7077394B2
- Authority
- JP
- Japan
- Prior art keywords
- computing device
- authentication
- private key
- key pair
- public
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 claims description 57
- 230000008859 change Effects 0.000 claims description 2
- 230000008569 process Effects 0.000 description 15
- 230000009471 action Effects 0.000 description 12
- 230000006870 function Effects 0.000 description 12
- 238000012545 processing Methods 0.000 description 11
- 238000012795 verification Methods 0.000 description 11
- 238000004891 communication Methods 0.000 description 7
- 230000005291 magnetic effect Effects 0.000 description 6
- 230000007246 mechanism Effects 0.000 description 5
- 238000013475 authorization Methods 0.000 description 3
- 230000006399 behavior Effects 0.000 description 3
- 230000036541 health Effects 0.000 description 3
- 230000003862 health status Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 239000004065 semiconductor Substances 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 230000001788 irregular Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 238000010200 validation analysis Methods 0.000 description 2
- 241000699670 Mus sp. Species 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000003190 augmentative effect Effects 0.000 description 1
- 239000000969 carrier Substances 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 239000011521 glass Substances 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 230000008054 signal transmission Effects 0.000 description 1
- 229910052710 silicon Inorganic materials 0.000 description 1
- 239000010703 silicon Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/72—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/73—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/006—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving public key infrastructure [PKI] trust models
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0827—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving distinctive intermediate devices or communication paths
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
- H04L9/0897—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3265—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate chains, trees or paths; Hierarchical trust model
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/42—Anonymization, e.g. involving pseudonyms
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Medicines Containing Antibodies Or Antigens For Use As Internal Diagnostic Agents (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Mobile Radio Communication Systems (AREA)
Description
[0058]非対称キーの集合から非対称キーペアが選択される(動作406)。キーの集合における非対称キーの各々は公開/秘密キーペアであり、キーペアのうちの1つは、ランダムまたは疑似ランダムなどの前述のような様々な様式で選択される。
Claims (20)
- 認証サービスにおいてデバイスが実施する方法であって、
第1のコンピューティングデバイスから、前記第1のコンピューティングデバイスに対応する第1の認証証明書要求を受信するステップであって、前記第1の認証証明書要求は、第1のコンピューティングデバイスのハードウェアおよびソフトウェアのうちの一方または双方を記述する情報を含む、受信するステップと、
受信した前記情報を検証するステップと、
非対称キーペアの集合から非対称キーペアを選択するステップであって、選択された前記非対称キーペアは複数の追加のコンピューティングデバイスの各々にも同時に関連付けられ、該複数の追加のコンピューティングデバイスは、選択された前記非対称キーペアの暗号化された秘密キーとともに提供される、選択するステップと、
第1の認証証明書を生成するステップであって、該第1の認証証明書は、前記第1のコンピューティングデバイスに対応し、選択された前記キーペアの公開キーを該第1の認証証明書に関連付ける、生成するステップと、
前記第1のコンピューティングデバイスに対し前記秘密キーを暗号化するステップと、
暗号化された前記秘密キーおよび前記第1の認証証明書を、前記第1のコンピューティングデバイスに戻すステップと
を含む方法。 - 請求項1に記載の方法であって、前記第1のコンピューティングデバイスに対し前記秘密キーを暗号化するステップは、第1のコンピューティングデバイスの信頼できるセキュアなコンポーネントの公開/秘密キーペアの公開キーを使用して、選択された前記キーペアの前記秘密キーを暗号化するステップを含む、方法。
- 請求項1または2に記載の方法であって、前記非対称キーペアを選択するステップは、前記非対称キーペアの集合から前記非対称キーペアをランダムまたは疑似ランダムに選択するステップを含む、方法。
- 請求項1から3のいずれか一項に記載の方法であって、前記第1の認証証明書要求を受信する前に、前記非対称キーペアの集合において前記非対称キーペアを生成するステップをさらに含む方法。
- 請求項1から4のいずれか一項に記載の方法であって、前記非対称キーペアの集合において前記非対称キーペアを1つまたは複数の間隔で変更するステップをさらに含む方法。
- 請求項1から5のいずれか一項に記載の方法であって、
第2のコンピューティングデバイスから、前記第2のコンピューティングデバイスに対応する第2の認証証明書要求を受信するステップであって、前記第2の認証証明書要求は、第2のコンピューティングデバイスのハードウェアおよびソフトウェアのうちの一方または双方を記述する追加の情報を含む、受信するステップと、
受信した前記追加の情報を検証するステップと、
前記非対称キーペアの集合から、前記第1のコンピューティングデバイスについて以前に選択された前記非対称キーペアを選択するステップと、
第2の認証証明書を生成するステップであって、該第2の認証証明書は、前記第2のコンピューティングデバイスに対応し、前記公開キーを該第2の認証証明書に関連付ける、生成するステップと、
前記第2のコンピューティングデバイスに対し前記秘密キーを暗号化して別の暗号化された秘密キーを生成するステップと、
前記別の暗号化された秘密キーおよび前記第2の認証証明書を、前記第2のコンピューティングデバイスに戻すステップと
をさらに含む方法。 - 請求項1から6のいずれか一項に記載の方法であって、前記第1の認証証明書は、前記第1のコンピューティングデバイスの名前または識別子を有さない、方法。
- デバイスが実施する方法であって、
認証サービスに、該デバイスに対応する認証証明書要求を送信するステップであって、該要求は、デバイスのハードウェアおよびソフトウェアのうちの一方又は双方を記述する情報を含む、送信するステップと、
前記認証サービスから公開/秘密キーペアを受信するステップであって、該公開/秘密キーペアは、秘密キーと、該公開/秘密キーペアをデバイスの信頼できるセキュアなコンポーネントに関連付ける認証証明書とを含む、受信するステップと、
前記信頼できるセキュアなコンポーネントのセキュアなストア内に、前記秘密キーを記憶するステップと、
前記認証サービスにアクセスすることなく、1つまたは複数の追加の公開/秘密キーペアおよび1つまたは複数の追加の認証証明書を生成するステップであって、前記追加の認証証明書の各々は前記認証サービスまで連鎖する、生成するステップと
を含む方法。 - 請求項8に記載の方法であって、受信した前記公開/秘密キーペアは、前記認証サービスによって複数の他のコンピューティングデバイスに提供される公開/秘密キーペアと同じである、方法。
- 請求項8または9に記載の方法であって、前記デバイスにおいて動作するウェブブラウザによってアクセスされる各ウェブサイトについて、前記1つまたは複数の追加の公開/秘密キーペアおよび1つまたは複数の追加の認証証明書のうちの1つを生成するステップをさらに含む方法。
- 請求項8から10のいずれか一項に記載の方法であって、前記デバイスによってアクセスされる複数の異なる信頼パーティシステムの各々について、前記1つまたは複数の追加の公開/秘密キーペアおよび1つまたは複数の追加の認証証明書のうちの1つを生成するステップをさらに含む方法。
- 請求項8から11のいずれか一項に記載の方法であって、前記デバイスの信頼できるセキュアなコンポーネントの秘密キーを使用して、前記認証サービスから受信した前記公開/秘密キーペアを復号するステップをさらに含む方法。
- 請求項8から12のいずれか一項に記載の方法であって、前記デバイスの信頼できるセキュアなコンポーネントは信頼できるプラットフォームモジュールを含む、方法。
- 1つまたは複数のプロセッサと、
複数の命令を記憶しているコンピュータ可読記憶媒体と、
を備えるシステムであって、
前記複数の命令は、前記1つまたは複数のプロセッサによる実行に応答して、
第1のコンピューティングデバイスから、前記第1のコンピューティングデバイスに対応する第1の認証証明書要求を受信するステップであって、前記第1の認証証明書要求は、第1のコンピューティングデバイスのハードウェアおよびソフトウェアのうちの一方または双方を記述する情報を含む、受信するステップと、
受信した前記情報を検証するステップと、
非対称キーペアの集合から非対称キーペアを選択するステップであって、選択された前記非対称キーペアは複数の追加のコンピューティングデバイスの各々にも同時に関連付けられ、該複数の追加のコンピューティングデバイスは、選択された前記非対称キーペアの暗号化された秘密キーとともに提供される、選択するステップと、
第1の認証証明書を生成するステップであって、該第1の認証証明書は、前記第1のコンピューティングデバイスに対応し、選択された前記キーペアの公開キーを該第1の認証証明書に関連付ける、生成するステップと、
前記第1のコンピューティングデバイスに対し前記秘密キーを暗号化するステップと、
暗号化された前記秘密キーおよび前記第1の認証証明書を、前記第1のコンピューティングデバイスに戻すステップと
を、前記1つまたは複数のプロセッサに実行させる、
システム。 - 請求項14に記載のシステムであって、前記第1のコンピューティングデバイスに対し前記秘密キーを暗号化するステップは、第1のコンピューティングデバイスの信頼できるセキュアなコンポーネントの公開/秘密キーペアの公開キーを使用して、選択された前記キーペアの前記秘密キーを暗号化するステップを含む、システム。
- 請求項14または15に記載のシステムであって、前記第1のコンピューティングデバイスの信頼できるセキュアなコンポーネントは信頼できるプラットフォームモジュールを含む、システム。
- 請求項14から16の何れか一項に記載のシステムであって、前記非対称キーペアを選択するステップは、前記非対称キーペアの集合から前記非対称キーペアをランダムまたは疑似ランダムに選択するステップを含む、システム。
- 請求項14から17のいずれか一項に記載のシステムであって、前記複数の命令は、前記非対称キーペアの集合において前記非対称キーペアを1つまたは複数の間隔で変更するステップを前記1つまたは複数のプロセッサにさらに実行させる、システム。
- 請求項14から18のいずれか一項に記載のシステムであって、前記複数の命令は、
第2のコンピューティングデバイスから、前記第2のコンピューティングデバイスに対応する第2の認証証明書要求を受信するステップであって、前記第2の認証証明書要求は、第2のコンピューティングデバイスのハードウェアおよびソフトウェアのうちの一方または双方を記述する追加の情報を含む、受信するステップと、
受信した前記追加の情報を検証するステップと、
前記非対称キーペアの集合から、前記第1のコンピューティングデバイスについて以前に選択された前記非対称キーペアを選択するステップと、
第2の認証証明書を生成するステップであって、該第2の認証証明書は、前記第2のコンピューティングデバイスに対応し、前記公開キーを該第2の認証証明書に関連付ける、生成するステップと、
前記第2のコンピューティングデバイスに対し前記秘密キーを暗号化して別の暗号化された秘密キーを生成するステップと、
前記別の暗号化された秘密キーおよび前記第2の認証証明書を、前記第2のコンピューティングデバイスに戻すステップと
を、前記1つまたは複数のプロセッサにさらに実行させる、システム。 - 請求項14から19のいずれか一項に記載のシステムであって、前記第1の認証証明書は、前記第1のコンピューティングデバイスの名前または識別子を有さない、システム。
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/649,085 US10819696B2 (en) | 2017-07-13 | 2017-07-13 | Key attestation statement generation providing device anonymity |
US15/649,085 | 2017-07-13 | ||
PCT/US2018/034795 WO2019013886A1 (en) | 2017-07-13 | 2018-05-28 | GENERATION OF KEY CERTIFICATION DECLARATION PROVIDING DEVICE ANONYMAT |
Publications (3)
Publication Number | Publication Date |
---|---|
JP2020527305A JP2020527305A (ja) | 2020-09-03 |
JP2020527305A5 JP2020527305A5 (ja) | 2021-07-26 |
JP7077394B2 true JP7077394B2 (ja) | 2022-05-30 |
Family
ID=62621070
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2020501161A Active JP7077394B2 (ja) | 2017-07-13 | 2018-05-28 | デバイスに匿名性を与えるキー認証ステートメントの生成 |
Country Status (17)
Country | Link |
---|---|
US (2) | US10819696B2 (ja) |
EP (1) | EP3652882A1 (ja) |
JP (1) | JP7077394B2 (ja) |
KR (1) | KR102451109B1 (ja) |
CN (1) | CN110892672B (ja) |
AU (1) | AU2018299716B2 (ja) |
BR (1) | BR112020000220A2 (ja) |
CA (1) | CA3067540A1 (ja) |
CL (1) | CL2020000081A1 (ja) |
CO (1) | CO2020000162A2 (ja) |
IL (1) | IL271812B2 (ja) |
MX (1) | MX2020000328A (ja) |
PH (1) | PH12020550006A1 (ja) |
RU (1) | RU2763516C2 (ja) |
SG (1) | SG11201912738WA (ja) |
WO (1) | WO2019013886A1 (ja) |
ZA (1) | ZA201908494B (ja) |
Families Citing this family (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11310050B2 (en) | 2018-09-17 | 2022-04-19 | Microsoft Technology Licensing, Llc | Verifying a computing device after transport |
US10423791B2 (en) * | 2017-04-27 | 2019-09-24 | Microsoft Technology Licensing, Llc | Enabling offline restart of shielded virtual machines using key caching |
US10819696B2 (en) * | 2017-07-13 | 2020-10-27 | Microsoft Technology Licensing, Llc | Key attestation statement generation providing device anonymity |
US10447486B2 (en) * | 2017-07-19 | 2019-10-15 | Spyrus, Inc. | Remote attestation of a security module's assurance level |
EP3688948A1 (en) * | 2017-09-25 | 2020-08-05 | Telefonaktiebolaget LM Ericsson (PUBL) | Provisioning of vendor credentials |
GB2578628B (en) * | 2018-11-01 | 2021-09-15 | Trustonic Ltd | Device attestation techniques |
WO2020151831A1 (en) * | 2019-01-25 | 2020-07-30 | Huawei Technologies Co., Ltd. | Method for end entity attestation |
US11374771B2 (en) | 2019-03-08 | 2022-06-28 | Ares Technologies, Inc. | Methods and systems for implementing mixed protocol certificates |
US10742421B1 (en) | 2019-03-08 | 2020-08-11 | Ares Technologies, Inc. | Methods and systems for anonymous hardware attestation |
US10735205B1 (en) | 2019-03-08 | 2020-08-04 | Ares Technologies, Inc. | Methods and systems for implementing an anonymized attestation chain |
US11394565B2 (en) * | 2019-06-18 | 2022-07-19 | Intel Corporation | Asymmetric device attestation using physically unclonable functions |
KR20210017083A (ko) * | 2019-08-06 | 2021-02-17 | 삼성전자주식회사 | 퓨즈된 키에 기반하여 증명 인증서를 생성하는 전자 장치 및 방법 |
US11539678B2 (en) * | 2019-08-16 | 2022-12-27 | Red Hat, Inc. | Asymmetric key management for cloud computing services |
US11265721B1 (en) * | 2019-08-20 | 2022-03-01 | Facebook Technologies, Llc | Secure device attestation and mutual authentication of artificial reality devices |
US11431689B2 (en) * | 2020-01-10 | 2022-08-30 | Lennox Industries Inc. | Secure payload delivery |
WO2022006574A1 (en) * | 2020-06-29 | 2022-01-06 | Arm Cloud Technology, Inc. | Device attestation |
US11595213B2 (en) * | 2020-06-29 | 2023-02-28 | Izuma Tech, Inc. | Methods and apparatus for performing attestation |
CN111953675B (zh) * | 2020-08-10 | 2022-10-25 | 四川阵风科技有限公司 | 一种基于硬件设备的密钥管理方法 |
KR102318947B1 (ko) * | 2020-08-21 | 2021-10-27 | 세종대학교산학협력단 | 개인 정보 보호 방법과 이를 수행하기 위한 컴퓨팅 장치 및 시스템 |
WO2022115200A2 (en) | 2020-10-28 | 2022-06-02 | Ares Technologies, Inc. | Systems and methods for a cryptographic agile bootloader for upgradable secure environment |
US11665148B2 (en) * | 2021-03-22 | 2023-05-30 | Cisco Technology, Inc. | Systems and methods for addressing cryptoprocessor hardware scaling limitations |
US20220337431A1 (en) * | 2021-04-19 | 2022-10-20 | Apple Inc. | Privacy proofing of secure element generated certificates |
US11750384B2 (en) * | 2021-05-27 | 2023-09-05 | Microsoft Technology Licensing, Llc | Binding with cryptographic key attestation |
US20230388110A1 (en) * | 2022-05-31 | 2023-11-30 | Microsoft Technology Licensing, Llc | Using attestation client code to attest health of a computing device |
US20240007354A1 (en) * | 2022-06-30 | 2024-01-04 | Amazon Technologies, Inc. | Automatic onboarding of heterogeneous devices onto a client network |
CN117056948B (zh) * | 2023-07-28 | 2024-09-27 | 威艾特科技(深圳)有限公司 | 一种收据凭证加密方法及装置 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100131765A1 (en) | 2008-11-26 | 2010-05-27 | Microsoft Corporation | Anonymous verifiable public key certificates |
KR101019006B1 (ko) | 2005-12-12 | 2011-03-07 | 퀄컴 인코포레이티드 | 암호 키들의 대체를 위한 인증 및 분할 시스템 및 방법 |
JP2014207510A (ja) | 2013-04-11 | 2014-10-30 | 富士通株式会社 | 証明書生成方法、証明書生成装置、情報処理装置、通信機器、及びプログラム |
US20160057134A1 (en) | 2013-03-21 | 2016-02-25 | Siemens Akitiengesellschaft | Updating of a Digital Device Certificate of an Automation Device |
Family Cites Families (136)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7165174B1 (en) * | 1995-02-13 | 2007-01-16 | Intertrust Technologies Corp. | Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management |
US7631188B2 (en) * | 1997-05-16 | 2009-12-08 | Tvworks, Llc | Hierarchical open security information delegation and acquisition |
US6233685B1 (en) * | 1997-08-29 | 2001-05-15 | Sean William Smith | Establishing and employing the provable untampered state of a device |
JP2000049766A (ja) * | 1998-07-27 | 2000-02-18 | Hitachi Ltd | 鍵管理サーバシステム |
US7194620B1 (en) * | 1999-09-24 | 2007-03-20 | Verizon Business Global Llc | Method for real-time data authentication |
US6996710B1 (en) * | 2000-03-31 | 2006-02-07 | Intel Corporation | Platform and method for issuing and certifying a hardware-protected attestation key |
US20020019938A1 (en) * | 2000-08-04 | 2002-02-14 | Aarons Michael Thomas | Method and apparatus for secure identification for networked environments |
US20020078347A1 (en) * | 2000-12-20 | 2002-06-20 | International Business Machines Corporation | Method and system for using with confidence certificates issued from certificate authorities |
US20020129261A1 (en) * | 2001-03-08 | 2002-09-12 | Cromer Daryl Carvis | Apparatus and method for encrypting and decrypting data recorded on portable cryptographic tokens |
US7925878B2 (en) * | 2001-10-03 | 2011-04-12 | Gemalto Sa | System and method for creating a trusted network capable of facilitating secure open network transactions using batch credentials |
GB2382419B (en) * | 2001-11-22 | 2005-12-14 | Hewlett Packard Co | Apparatus and method for creating a trusted environment |
US6963873B2 (en) * | 2002-01-02 | 2005-11-08 | Intel Corporation | Method and system for automatic association of a signed certificate with a certificate signing request |
WO2004008282A2 (en) | 2002-07-12 | 2004-01-22 | Privaris, Inc. | Personal authentication software and systems for travel privilege assignation and verification |
US7181016B2 (en) * | 2003-01-27 | 2007-02-20 | Microsoft Corporation | Deriving a symmetric key from an asymmetric key for file encryption or decryption |
US20040193917A1 (en) * | 2003-03-26 | 2004-09-30 | Drews Paul C | Application programming interface to securely manage different execution environments |
US7797544B2 (en) * | 2003-12-11 | 2010-09-14 | Microsoft Corporation | Attesting to establish trust between computer entities |
US7263608B2 (en) | 2003-12-12 | 2007-08-28 | Lenovo (Singapore) Pte. Ltd. | System and method for providing endorsement certificate |
US7424610B2 (en) * | 2003-12-23 | 2008-09-09 | Intel Corporation | Remote provisioning of secure systems for mandatory control |
US7350072B2 (en) * | 2004-03-30 | 2008-03-25 | Intel Corporation | Remote management and provisioning of a system across a network based connection |
US20050251857A1 (en) * | 2004-05-03 | 2005-11-10 | International Business Machines Corporation | Method and device for verifying the security of a computing platform |
US20050278253A1 (en) * | 2004-06-15 | 2005-12-15 | Microsoft Corporation | Verifying human interaction to a computer entity by way of a trusted component on a computing device or the like |
US7055742B2 (en) * | 2004-06-29 | 2006-06-06 | Microsoft Corporation | Method for secure on-line voting |
US8356175B2 (en) * | 2005-06-29 | 2013-01-15 | Intel Corporation | Methods and apparatus to perform associated security protocol extensions |
US8417640B2 (en) * | 2005-10-31 | 2013-04-09 | Research In Motion Limited | Secure license key method and system |
US7600123B2 (en) * | 2005-12-22 | 2009-10-06 | Microsoft Corporation | Certificate registration after issuance for secure communication |
US8145917B2 (en) * | 2005-12-30 | 2012-03-27 | Nokia Corporation | Security bootstrapping for distributed architecture devices |
US9135444B2 (en) * | 2006-10-19 | 2015-09-15 | Novell, Inc. | Trusted platform module (TPM) assisted data center management |
US8281389B2 (en) * | 2006-12-21 | 2012-10-02 | Seagate Technology Llc | System and method for tamper evident certification |
US8984280B2 (en) * | 2007-02-16 | 2015-03-17 | Tibco Software Inc. | Systems and methods for automating certification authority practices |
US7975290B2 (en) * | 2007-06-07 | 2011-07-05 | Alcatel Lucent | Verifying authenticity of instant messaging messages |
US7971261B2 (en) * | 2007-06-12 | 2011-06-28 | Microsoft Corporation | Domain management for digital media |
CN100566251C (zh) * | 2007-08-01 | 2009-12-02 | 西安西电捷通无线网络通信有限公司 | 一种增强安全性的可信网络连接方法 |
DE102007044905A1 (de) * | 2007-09-19 | 2009-04-09 | InterDigital Patent Holdings, Inc., Wilmington | Verfahren und Vorrichtung zur Ermöglichung einer Dienstnutzung und Feststellung der Teilnehmeridentität in Kommunikationsnetzen mittels softwarebasierten Zugangsberechtigungsausweisen (vSIM) |
US20090125996A1 (en) * | 2007-09-19 | 2009-05-14 | Interdigital Patent Holdings, Inc. | Virtual subscriber identity module |
US8862874B2 (en) * | 2008-05-09 | 2014-10-14 | International Business Machines Corporation | Certificate distribution using secure handshake |
FR2932229B1 (fr) | 2008-06-05 | 2011-06-24 | Renault Sas | Pilotage de l'alimentation electrique d'une bougie d'allumage d'un moteur a combustion interne |
US9122895B2 (en) * | 2008-06-25 | 2015-09-01 | Microsoft Technology Licensing, Llc | Authorization for transient storage devices with multiple authentication silos |
US8538890B2 (en) * | 2008-08-28 | 2013-09-17 | Motorola Mobility Llc | Encrypting a unique cryptographic entity |
US8751791B2 (en) * | 2008-09-17 | 2014-06-10 | Motorola Solutions, Inc. | Method and device for confirming authenticity of a public key infrastructure (PKI) transaction event |
US20120137364A1 (en) | 2008-10-07 | 2012-05-31 | Mocana Corporation | Remote attestation of a mobile device |
US8738932B2 (en) * | 2009-01-16 | 2014-05-27 | Teleputers, Llc | System and method for processor-based security |
CN101807998A (zh) | 2009-02-13 | 2010-08-18 | 英飞凌科技股份有限公司 | 认证 |
US8544092B2 (en) | 2009-03-12 | 2013-09-24 | International Business Machines Corporation | Integrity verification using a peripheral device |
US8509448B2 (en) * | 2009-07-29 | 2013-08-13 | Motorola Solutions, Inc. | Methods and device for secure transfer of symmetric encryption keys |
US9490984B2 (en) * | 2009-09-14 | 2016-11-08 | Interdigital Patent Holdings, Inc. | Method and apparatus for trusted authentication and logon |
CN101699891B (zh) * | 2009-10-21 | 2012-07-25 | 西安西电捷通无线网络通信股份有限公司 | 一种传感器网络密钥管理和节点鉴别方法 |
US8700893B2 (en) * | 2009-10-28 | 2014-04-15 | Microsoft Corporation | Key certification in one round trip |
US8327424B2 (en) * | 2009-12-22 | 2012-12-04 | Motorola Solutions, Inc. | Method and apparatus for selecting a certificate authority |
MY151315A (en) | 2010-05-07 | 2014-05-15 | Mimos Berhad | System and method for issuing endorsement key credential in trusted computing environment using local certificate authority |
US8788811B2 (en) | 2010-05-28 | 2014-07-22 | Red Hat, Inc. | Server-side key generation for non-token clients |
US20120174196A1 (en) * | 2010-12-30 | 2012-07-05 | Suresh Bhogavilli | Active validation for ddos and ssl ddos attacks |
US8806196B2 (en) * | 2011-11-04 | 2014-08-12 | Motorola Solutions, Inc. | Method and apparatus for authenticating a digital certificate status and authorization credentials |
US9754253B1 (en) * | 2011-11-28 | 2017-09-05 | Amazon Technologies, Inc. | Conditioned use of certificates |
US9413538B2 (en) * | 2011-12-12 | 2016-08-09 | Microsoft Technology Licensing, Llc | Cryptographic certification of secure hosted execution environments |
US9054871B2 (en) * | 2012-02-21 | 2015-06-09 | California Institute Of Technology | Physical key-protected one time pad |
US8782423B2 (en) | 2012-06-19 | 2014-07-15 | Microsoft Corporation | Network based management of protected data sets |
US20140006776A1 (en) * | 2012-06-29 | 2014-01-02 | Mark Scott-Nash | Certification of a virtual trusted platform module |
US9411962B2 (en) * | 2012-07-18 | 2016-08-09 | Sequitur Labs Inc. | System and methods for secure utilization of attestation in policy-based decision making for mobile device management and security |
US8782401B2 (en) | 2012-09-26 | 2014-07-15 | Intel Corporation | Enhanced privacy ID based platform attestation |
US9374228B2 (en) * | 2012-10-12 | 2016-06-21 | International Business Machines Corporation | Verifying a geographic location of a virtual disk image executing at a data center server within a data center |
US9794602B2 (en) * | 2012-10-29 | 2017-10-17 | Echostar Technologies L.L.C. | Systems and methods for securely providing streaming media content on-demand |
US9935953B1 (en) * | 2012-11-06 | 2018-04-03 | Behaviometrics Ab | Secure authenticating an user of a device during a session with a connected server |
US9124637B2 (en) * | 2013-01-18 | 2015-09-01 | Apple Inc. | Data protection for keychain syncing |
US9594567B2 (en) * | 2013-02-21 | 2017-03-14 | Dell Products, Lp | Configuring a trusted platform module |
WO2014137338A1 (en) * | 2013-03-06 | 2014-09-12 | Intel Corporation | Roots-of-trust for measurement of virtual machines |
US20140259132A1 (en) * | 2013-03-06 | 2014-09-11 | Go Daddy Operating Company, LLC | System for creating a security certificate |
US20140281497A1 (en) * | 2013-03-13 | 2014-09-18 | General Instrument Corporation | Online personalization update system for externally acquired keys |
US9332002B1 (en) * | 2013-03-14 | 2016-05-03 | Amazon Technologies, Inc. | Authenticating and authorizing a user by way of a digital certificate |
US9219607B2 (en) * | 2013-03-14 | 2015-12-22 | Arris Technology, Inc. | Provisioning sensitive data into third party |
EP2973168A1 (en) * | 2013-03-15 | 2016-01-20 | Ologn Technologies AG | Systems, methods and apparatuses for remote attestation |
US9094377B2 (en) * | 2013-08-16 | 2015-07-28 | Netflix, Inc. | Key generation and broadcasting |
US9998438B2 (en) | 2013-10-23 | 2018-06-12 | Microsoft Technology Licensing, Llc | Verifying the security of a remote server |
US9391980B1 (en) | 2013-11-11 | 2016-07-12 | Google Inc. | Enterprise platform verification |
EP4027576B1 (en) * | 2014-01-13 | 2023-11-22 | Visa International Service Association | Efficient methods for protecting identity in authenticated transmissions |
US10049202B1 (en) * | 2014-03-25 | 2018-08-14 | Amazon Technologies, Inc. | Strong authentication using authentication objects |
US10050787B1 (en) * | 2014-03-25 | 2018-08-14 | Amazon Technologies, Inc. | Authentication objects with attestation |
US9652604B1 (en) * | 2014-03-25 | 2017-05-16 | Amazon Technologies, Inc. | Authentication objects with delegation |
US9680872B1 (en) * | 2014-03-25 | 2017-06-13 | Amazon Technologies, Inc. | Trusted-code generated requests |
US20160344725A1 (en) * | 2014-04-02 | 2016-11-24 | William B. SEVERIN | Signal haystacks |
EP2937806A1 (en) * | 2014-04-22 | 2015-10-28 | ALSTOM Renewable Technologies | Method and system for securing electronic data exchange between an industrial programmable device and a portable programmable device |
US9652631B2 (en) * | 2014-05-05 | 2017-05-16 | Microsoft Technology Licensing, Llc | Secure transport of encrypted virtual machines with continuous owner access |
US9692599B1 (en) * | 2014-09-16 | 2017-06-27 | Google Inc. | Security module endorsement |
US9716716B2 (en) * | 2014-09-17 | 2017-07-25 | Microsoft Technology Licensing, Llc | Establishing trust between two devices |
US9705879B2 (en) * | 2014-09-17 | 2017-07-11 | Microsoft Technology Licensing, Llc | Efficient and reliable attestation |
US9331989B2 (en) | 2014-10-06 | 2016-05-03 | Micron Technology, Inc. | Secure shared key sharing systems and methods |
US9900295B2 (en) * | 2014-11-05 | 2018-02-20 | Microsoft Technology Licensing, Llc | Roaming content wipe actions across devices |
US10348727B2 (en) * | 2015-02-13 | 2019-07-09 | International Business Machines Corporation | Automatic key management using enterprise user identity management |
US10015173B1 (en) * | 2015-03-10 | 2018-07-03 | Symantec Corporation | Systems and methods for location-aware access to cloud data stores |
US20160275461A1 (en) | 2015-03-20 | 2016-09-22 | Rivetz Corp. | Automated attestation of device integrity using the block chain |
US20160323736A1 (en) * | 2015-04-15 | 2016-11-03 | Melrok, Llc | Secure broadcast systems and methods for internet of things devices |
US10230696B2 (en) * | 2015-06-09 | 2019-03-12 | Intel Corporation | System, apparatus and method for managing lifecycle of secure publish-subscribe system |
US20160364553A1 (en) * | 2015-06-09 | 2016-12-15 | Intel Corporation | System, Apparatus And Method For Providing Protected Content In An Internet Of Things (IOT) Network |
US10511587B2 (en) * | 2015-06-11 | 2019-12-17 | Siemens Aktiengesellschaft | Authorization apparatus and method for an authorized issuing of an authentication token for a device |
US10333903B1 (en) * | 2015-06-16 | 2019-06-25 | Amazon Technologies, Inc. | Provisioning network keys to devices to allow them to provide their identity |
US9923721B2 (en) * | 2015-06-22 | 2018-03-20 | Intel IP Corporation | Key agreement and authentication for wireless communication |
CN105141593A (zh) | 2015-08-10 | 2015-12-09 | 刘澄宇 | 一种私有云平台安全计算方法 |
US10397255B1 (en) * | 2015-09-23 | 2019-08-27 | StackRox, Inc. | System and method for providing security in a distributed computation system utilizing containers |
US20170093586A1 (en) * | 2015-09-25 | 2017-03-30 | Qualcomm Incorporated | Techniques for managing certificates on a computing device |
US9906513B2 (en) * | 2015-09-28 | 2018-02-27 | Bank Of America Corporation | Network authorization system |
US9917687B2 (en) * | 2015-10-12 | 2018-03-13 | Microsoft Technology Licensing, Llc | Migrating secrets using hardware roots of trust for devices |
US9832024B2 (en) * | 2015-11-13 | 2017-11-28 | Visa International Service Association | Methods and systems for PKI-based authentication |
US9740867B2 (en) * | 2015-11-16 | 2017-08-22 | Dell Products, L.P. | Securely passing user authentication data between a pre-boot authentication environment and an operating system |
US10009179B2 (en) * | 2015-11-30 | 2018-06-26 | Microsoft Technology Licensing, Llc | Trusted platform module (TPM) protected device |
US10169591B2 (en) * | 2015-12-07 | 2019-01-01 | Amazon Technologies, Inc. | Chained security systems |
US10536271B1 (en) * | 2016-01-10 | 2020-01-14 | Apple Inc. | Silicon key attestation |
US10341325B2 (en) * | 2016-01-29 | 2019-07-02 | Vmware, Inc. | System and method for transferring device identifying information |
US10169602B2 (en) * | 2016-02-22 | 2019-01-01 | Dell Products, L.P. | Method for local key management setup and recovery |
US10412191B1 (en) * | 2016-03-30 | 2019-09-10 | Amazon Technologies, Inc. | Hardware validation |
US10277407B2 (en) * | 2016-04-19 | 2019-04-30 | Microsoft Technology Licensing, Llc | Key-attestation-contingent certificate issuance |
US11256746B2 (en) * | 2016-04-25 | 2022-02-22 | Oracle International Corporation | Hash-based efficient secondary indexing for graph data stored in non-relational data stores |
GB201607476D0 (en) * | 2016-04-29 | 2016-06-15 | Eitc Holdings Ltd | Operating system for blockchain IOT devices |
US10447467B2 (en) * | 2016-05-04 | 2019-10-15 | International Business Machines Corporation | Revocable PKI signatures |
US9916452B2 (en) * | 2016-05-18 | 2018-03-13 | Microsoft Technology Licensing, Llc | Self-contained cryptographic boot policy validation |
US10115250B2 (en) * | 2016-05-23 | 2018-10-30 | Fuji Xerox Co., Ltd. | Systems and methods for location enabled electronic lock controls |
US10135622B2 (en) * | 2016-06-03 | 2018-11-20 | Intel Corporation | Flexible provisioning of attestation keys in secure enclaves |
US10601787B2 (en) * | 2016-06-06 | 2020-03-24 | Cisco Technology, Inc. | Root of trust of geolocation |
US10708067B2 (en) * | 2016-06-18 | 2020-07-07 | Intel Corporation | Platform attestation and registration for servers |
US20180007037A1 (en) * | 2016-07-01 | 2018-01-04 | Kenneth Wade Reese | Transaction-specific shared secret in one-time password device |
US10135921B2 (en) * | 2016-09-20 | 2018-11-20 | Keir Finlow-Bates | System and method for announcing cryptographic keys on a blockchain |
US10733284B2 (en) * | 2016-10-06 | 2020-08-04 | Samsung Electronics Co., Ltd. | Trusted execution environment secure element communication |
US10498712B2 (en) * | 2016-11-10 | 2019-12-03 | Ernest Brickell | Balancing public and personal security needs |
US10469478B2 (en) * | 2016-12-07 | 2019-11-05 | Vmware, Inc. | Inter-application secure data sharing workflow |
US10574648B2 (en) * | 2016-12-22 | 2020-02-25 | Dashlane SAS | Methods and systems for user authentication |
US10229270B2 (en) * | 2016-12-23 | 2019-03-12 | Amazon Technologies, Inc. | Host attestation |
US20180183578A1 (en) * | 2016-12-27 | 2018-06-28 | Intel Corporation | Provisioning keys for virtual machine scaling |
US20180183586A1 (en) * | 2016-12-28 | 2018-06-28 | Intel Corporation | Assigning user identity awareness to a cryptographic key |
US11405177B2 (en) * | 2017-01-24 | 2022-08-02 | Microsoft Technology Licensing, Llc | Nested enclave identity |
US11443033B2 (en) * | 2017-01-24 | 2022-09-13 | Microsoft Technology Licensing, Llc | Abstract enclave identity |
US10530777B2 (en) * | 2017-01-24 | 2020-01-07 | Microsoft Technology Licensing, Llc | Data unsealing with a sealing enclave |
US11036875B2 (en) * | 2017-01-24 | 2021-06-15 | Microsoft Technology Licensing, Llc | Dependent enclave binaries |
US20180241572A1 (en) * | 2017-02-22 | 2018-08-23 | Intel Corporation | Techniques for remote sgx enclave authentication |
US10341864B2 (en) * | 2017-03-03 | 2019-07-02 | Verizon Patent And Licensing Inc. | Network-based device registration for content distribution platforms |
US20180287920A1 (en) * | 2017-03-30 | 2018-10-04 | Ca, Inc. | Intercepting application traffic monitor and analyzer |
US10397005B2 (en) * | 2017-03-31 | 2019-08-27 | Intel Corporation | Using a trusted execution environment as a trusted third party providing privacy for attestation |
US10440006B2 (en) * | 2017-06-21 | 2019-10-08 | Microsoft Technology Licensing, Llc | Device with embedded certificate authority |
US10819696B2 (en) * | 2017-07-13 | 2020-10-27 | Microsoft Technology Licensing, Llc | Key attestation statement generation providing device anonymity |
-
2017
- 2017-07-13 US US15/649,085 patent/US10819696B2/en active Active
-
2018
- 2018-05-28 JP JP2020501161A patent/JP7077394B2/ja active Active
- 2018-05-28 AU AU2018299716A patent/AU2018299716B2/en active Active
- 2018-05-28 BR BR112020000220-8A patent/BR112020000220A2/pt unknown
- 2018-05-28 SG SG11201912738WA patent/SG11201912738WA/en unknown
- 2018-05-28 MX MX2020000328A patent/MX2020000328A/es unknown
- 2018-05-28 CN CN201880046669.0A patent/CN110892672B/zh active Active
- 2018-05-28 KR KR1020207000801A patent/KR102451109B1/ko active IP Right Grant
- 2018-05-28 IL IL271812A patent/IL271812B2/en unknown
- 2018-05-28 WO PCT/US2018/034795 patent/WO2019013886A1/en unknown
- 2018-05-28 EP EP18731699.7A patent/EP3652882A1/en active Pending
- 2018-05-28 RU RU2020106575A patent/RU2763516C2/ru active
- 2018-05-28 CA CA3067540A patent/CA3067540A1/en active Pending
-
2019
- 2019-12-19 ZA ZA2019/08494A patent/ZA201908494B/en unknown
-
2020
- 2020-01-02 PH PH12020550006A patent/PH12020550006A1/en unknown
- 2020-01-08 CO CONC2020/0000162A patent/CO2020000162A2/es unknown
- 2020-01-10 CL CL2020000081A patent/CL2020000081A1/es unknown
- 2020-08-27 US US17/004,929 patent/US11750591B2/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101019006B1 (ko) | 2005-12-12 | 2011-03-07 | 퀄컴 인코포레이티드 | 암호 키들의 대체를 위한 인증 및 분할 시스템 및 방법 |
US20100131765A1 (en) | 2008-11-26 | 2010-05-27 | Microsoft Corporation | Anonymous verifiable public key certificates |
US20160057134A1 (en) | 2013-03-21 | 2016-02-25 | Siemens Akitiengesellschaft | Updating of a Digital Device Certificate of an Automation Device |
JP2014207510A (ja) | 2013-04-11 | 2014-10-30 | 富士通株式会社 | 証明書生成方法、証明書生成装置、情報処理装置、通信機器、及びプログラム |
Also Published As
Publication number | Publication date |
---|---|
IL271812B2 (en) | 2024-01-01 |
CN110892672A (zh) | 2020-03-17 |
JP2020527305A (ja) | 2020-09-03 |
KR20200027500A (ko) | 2020-03-12 |
US10819696B2 (en) | 2020-10-27 |
MX2020000328A (es) | 2020-07-13 |
IL271812A (en) | 2020-02-27 |
US20190020647A1 (en) | 2019-01-17 |
NZ759830A (en) | 2023-10-27 |
PH12020550006A1 (en) | 2020-10-12 |
CO2020000162A2 (es) | 2020-01-17 |
RU2763516C2 (ru) | 2021-12-30 |
CN110892672B (zh) | 2023-10-20 |
CL2020000081A1 (es) | 2020-07-31 |
AU2018299716B2 (en) | 2023-09-21 |
KR102451109B1 (ko) | 2022-10-07 |
US11750591B2 (en) | 2023-09-05 |
BR112020000220A2 (pt) | 2020-07-07 |
US20200396217A1 (en) | 2020-12-17 |
WO2019013886A1 (en) | 2019-01-17 |
IL271812B1 (en) | 2023-09-01 |
EP3652882A1 (en) | 2020-05-20 |
RU2020106575A3 (ja) | 2021-08-13 |
RU2020106575A (ru) | 2021-08-13 |
ZA201908494B (en) | 2021-03-31 |
AU2018299716A1 (en) | 2020-01-02 |
CA3067540A1 (en) | 2019-01-17 |
SG11201912738WA (en) | 2020-01-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7077394B2 (ja) | デバイスに匿名性を与えるキー認証ステートメントの生成 | |
US10721080B2 (en) | Key-attestation-contingent certificate issuance | |
EP3265950B1 (en) | Device attestation through security hardened management agent | |
CN107431924B (zh) | 将设备标识符和用户标识符相关联的设备盗窃防护 | |
CN112187803B (zh) | 使用服务器的tpm的远程密码服务 | |
CN107077567B (zh) | 标识计算设备上的安全边界 | |
EP3195555A1 (en) | Secure key management for roaming protected content | |
US10229272B2 (en) | Identifying security boundaries on computing devices | |
CN116756780B (zh) | 基于cp-abe算法的联盟链数据访问控制方法及相关设备 | |
NZ759830B2 (en) | Key attestation statement generation providing device anonymity |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20200722 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20210528 |
|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20210528 |
|
A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20220328 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20220419 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20220518 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 7077394 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |