JP7232816B2 - 資産を認証する認証システム及び認証方法 - Google Patents
資産を認証する認証システム及び認証方法 Download PDFInfo
- Publication number
- JP7232816B2 JP7232816B2 JP2020508316A JP2020508316A JP7232816B2 JP 7232816 B2 JP7232816 B2 JP 7232816B2 JP 2020508316 A JP2020508316 A JP 2020508316A JP 2020508316 A JP2020508316 A JP 2020508316A JP 7232816 B2 JP7232816 B2 JP 7232816B2
- Authority
- JP
- Japan
- Prior art keywords
- nfc
- authentication
- authentication server
- nfc tag
- tag
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0492—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload by using a location-limited connection, e.g. near-field communication or limited proximity of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0884—Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/008—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3252—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/40—Security arrangements using identity modules
- H04W12/47—Security arrangements using identity modules using near field communication [NFC] or radio frequency identification [RFID] modules
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
Description
1)HASHは例えばSHA-2などの暗号ハッシュ関数であるとして、e=HASH(m)を計算するステップと、
2)Lnはeの最も左側のビットであり、群の位数nのビット長であるとして、z=Lnを計算するステップと、
3)インターバル[1,n-1]から暗号的に安全な乱整数kを選択するステップと、
4)曲線点(x1,y1)=k×Gを計算するステップと、
5)r=x1 mod nを計算するステップであり、r=0の場合にステップ3)が繰り返される、ステップと、
6)s=k-1(z+rdA) mod nを計算するステップであり、s=0の場合にステップ3)が繰り返される、ステップと、
7)ペア(r,s)によって署名を決定するステップと、
を含み得る。
Claims (19)
- 資産を認証する認証システムであって、当該認証システムは、
プロセッシング装置であり、
近距離無線通信(NFC)インタフェース回路、
メモリ、及び
前記メモリに結合されたプロセッサ、
を有するプロセッシング装置と、
前記プロセッシング装置と通信する認証サーバであり、共有鍵のコピーが当該認証サーバに格納される認証サーバと、
を有し、
前記プロセッシング装置は、
NFCインタフェース回路を使用してNFCタグとのNFC接続を確立し、前記NFCタグは、前記資産と関連付けられ、且つ固有識別子、及び前記NFCインタフェース回路を使用してデジタル署名によって署名された前記共有鍵の暗号化された出力、を含んだタグデータを含み、
前記NFCタグの前記タグデータを読み取り、
前記固有識別子を検証し、且つ、
前記固有識別子が先ず検証された場合にのみ、前記NFCタグからの前記暗号化された出力を前記認証サーバに転送する、
ように構成され、
前記プロセッシング装置又は前記認証サーバのいずれかが、前記デジタル署名を検証するように構成され、
前記認証サーバは、
前記暗号化された出力を、解読されたデータへと解読し、且つ、
前記解読されたデータを、前記認証サーバに格納された前記共有鍵と比較する、
ように構成される、
認証システム。 - 前記プロセッシング装置は、前記デジタル署名を検証するためのルート証明書を含む、請求項1に記載の認証システム。
- 前記プロセッシング装置は、前記NFCタグと前記認証サーバとの間で1つ以上のメッセージを転送するように構成される、請求項1又は2に記載の認証システム。
- 前記メッセージのうちの1つ以上は、前記NFCタグと前記認証サーバとの間で実行されるチャレンジ/レスポンス認証プロトコルのメッセージを含む、請求項3に記載の認証システム。
- 前記プロセッシング装置は、NFC対応のスマートフォン又はタブレットである、請求項1乃至4のいずれかに記載の認証システム。
- 当該認証システムは更に、前記認証サーバと通信するステークホルダーサーバを有し、前記認証サーバは、前記ステークホルダーサーバに情報を送信するように構成される、請求項1乃至5のいずれかに記載の認証システム。
- 前記NFCタグと組み合わされた請求項1乃至6のいずれかに記載の認証システム。
- 前記暗号化された出力はスペック暗号アルゴリズムを含む、請求項7に記載の認証システム。
- 前記デジタル署名は楕円曲線DSA(ECDSA)を含む、請求項7又は8に記載の認証システム。
- 前記固有識別子はシリアル番号である、請求項1乃至9のいずれか一項に記載の認証システム。
- 前記暗号化された出力及び前記固有識別子は、前記デジタル署名で署名されている、請求項1乃至10のいずれか一項に記載の認証システム。
- 近距離無線通信(NFC)タグを有する資産を認証する方法であって、
共有鍵のコピーを認証サーバに格納し、
NFC対応のユーザ装置を使用して前記NFCタグを認証し、該認証は、
タグデータを読み取ることを含む前記NFCタグを読み取ることであり、前記タグデータは、固有識別子、及びデジタル署名によって署名された前記共有鍵の暗号化された出力を含む、読み取ることと、
前記固有識別子及び前記デジタル署名を検証することと、
を含み、且つ、
前記認証サーバを使用して前記NFCタグを認証し、該認証は、
前記固有識別子及び前記デジタル署名が先ず検証された場合にのみ、前記暗号化された出力を、解読されたデータへと解読することと、
前記解読されたデータを、前記認証サーバに格納された前記共有鍵と比較することと、
を含む、
ことを有する方法。 - 前記NFC対応のユーザ装置を使用して、前記NFCタグからの前記暗号化された出力を前記認証サーバに転送する、ことを更に有する請求項12に記載の方法。
- 前記NFC対応のユーザ装置にルート証明書を格納することによって、前記NFC対応のユーザ装置を設定する、ことを更に有する請求項12又は13に記載の方法。
- 前記固有識別子は、前記デジタル署名によって署名されている、請求項12乃至14のいずれかに記載の方法。
- 前記NFC対応のユーザ装置を使用して前記NFCタグを認証することは、前記NFCタグから前記認証サーバに、チャレンジ/レスポンス認証プロトコルの少なくとも1つのメッセージを転送することを含む、請求項12乃至15のいずれかに記載の方法。
- 前記解読されたデータと前記共有鍵とが同じである場合に、前記資産が真正であると判定すること、又は
前記解読されたデータと前記共有鍵とが同じでないと前記認証サーバが判定した場合に、ステークホルダーサーバに通知を送信すること、
を更に有する請求項12乃至16のいずれかに記載の方法。 - 前記認証サーバを使用して前記NFCタグを設定することであり、
前記共有鍵の前記コピーを前記認証サーバに格納することと、
前記共有鍵の前記暗号化された出力で前記NFCタグをプログラミングすることと、
前記暗号化された出力にデジタル署名で署名することと、
を含む設定すること、
を更に有する請求項12乃至17のいずれかに記載の方法。 - 前記暗号化された出力で前記NFCタグをプログラミングすることは、スペック暗号アルゴリズムを使用することを含み、前記暗号化された出力に前記デジタル署名で署名することは、ECDSAを使用することを含む、請求項18に記載の方法。
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/676,094 | 2017-08-14 | ||
US15/676,094 US10397000B2 (en) | 2017-08-14 | 2017-08-14 | Multi-level authentication for secure supply chain asset management |
PCT/US2018/029712 WO2019036073A1 (en) | 2017-08-14 | 2018-04-27 | NFC LABEL AUTHENTICATION ON A REMOTE SERVER WITH APPLICATIONS TO SECURE SUPPLY CHAIN ASSET MANAGEMENT |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2020530726A JP2020530726A (ja) | 2020-10-22 |
JP7232816B2 true JP7232816B2 (ja) | 2023-03-03 |
Family
ID=62152687
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2020508316A Active JP7232816B2 (ja) | 2017-08-14 | 2018-04-27 | 資産を認証する認証システム及び認証方法 |
Country Status (7)
Country | Link |
---|---|
US (1) | US10397000B2 (ja) |
EP (1) | EP3669294A1 (ja) |
JP (1) | JP7232816B2 (ja) |
KR (1) | KR102444402B1 (ja) |
IL (1) | IL272662B (ja) |
TW (1) | TWI691195B (ja) |
WO (1) | WO2019036073A1 (ja) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10958424B1 (en) * | 2017-11-02 | 2021-03-23 | Amazon Technologies, Inc. | Mechanism to allow third party to use a shared secret between two parties without revealing the secret |
US10756887B2 (en) * | 2018-10-12 | 2020-08-25 | EMC IP Holding Company LLC | Method and system for securely replicating encrypted deduplicated storages |
JP2022523959A (ja) * | 2019-03-04 | 2022-04-27 | シール・ネットワーク・ベー・フェー | 電子認証手段を伴うプレイングカード |
EP3751878A1 (en) * | 2019-06-13 | 2020-12-16 | Nerudia Limited | A method for managing a system with a smoking substitute device |
CN113780016B (zh) * | 2020-05-21 | 2024-03-12 | 鉴正科技股份有限公司 | 防止商品及其所标示商标被仿造的验证系统及验证方法 |
US11582607B2 (en) | 2020-07-10 | 2023-02-14 | Western Digital Technologies, Inc. | Wireless security protocol |
CN112637837B (zh) * | 2020-12-03 | 2023-01-10 | 深圳大学 | 智能电网中的轻量级被动式跨层认证方法 |
US11784990B2 (en) | 2021-12-13 | 2023-10-10 | Intel Corporation | Protecting data transfer between a secure application and networked devices |
CN114449504B (zh) * | 2022-03-08 | 2022-09-06 | 芯电智联(北京)科技有限公司 | 一种nfc标签的验证方法、电子设备及存储介质 |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014207890A1 (ja) | 2013-06-28 | 2014-12-31 | 株式会社日立システムズ | 真贋判定システム、真贋判定方法、およびicチップ装着部材 |
Family Cites Families (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4680489B2 (ja) * | 2003-10-21 | 2011-05-11 | 三菱電機株式会社 | 情報記録読取システム |
KR100556828B1 (ko) * | 2003-12-27 | 2006-03-10 | 한국전자통신연구원 | 디지털 케이블방송 시스템에서 공개키 암호 알고리즘을이용한 서비스 신청 및 암호화 키 분배 방법 |
US7614546B2 (en) * | 2005-02-03 | 2009-11-10 | Yottamark, Inc. | Method and system for deterring product counterfeiting, diversion and piracy |
KR100728636B1 (ko) | 2005-08-09 | 2007-06-15 | (주)한창시스템 | 다양한 보안 모듈을 지원하는 보안 nfc 통신 장치 및방법 |
JP2007272283A (ja) * | 2006-03-30 | 2007-10-18 | Nec Corp | 偽造検出システムおよび偽造検出方法 |
US20080177665A1 (en) | 2006-10-25 | 2008-07-24 | Pieter Noordam | System and method for secure asset management |
CA2698000C (en) | 2007-09-04 | 2015-10-27 | Certicom Corp. | Signatures with confidential message recovery |
US9208293B1 (en) * | 2008-01-28 | 2015-12-08 | Sprint Communications Company L.P. | Authentication for tag-based content delivery |
EP2254461A4 (en) | 2008-03-19 | 2012-12-26 | Ericsson Telefon Ab L M | NFC COMMUNICATIONS FOR IMPLANTED DEVICES FOR RECORDING MEDICAL DATA |
EP2131317A1 (en) | 2008-06-04 | 2009-12-09 | Alcatel Lucent | Method for providing a service based on tag information and corresponding tag and tag reading device |
KR101508794B1 (ko) | 2008-07-09 | 2015-04-06 | 삼성전자주식회사 | Ndef 메시지에서 선택적으로 레코드들을 보안하기 위한 방법 |
EP2425281A4 (en) | 2009-04-30 | 2014-05-21 | Certicom Corp | SYSTEM AND METHOD FOR AUTHENTICATING RFID LABELS |
JP5337582B2 (ja) * | 2009-06-01 | 2013-11-06 | 株式会社日立製作所 | 正当性が保証されたidの生成方法及び正当性保証rfidタグ |
CN102725737B (zh) | 2009-12-04 | 2016-04-20 | 密码研究公司 | 可验证防泄漏的加密和解密 |
US20110291803A1 (en) * | 2010-05-27 | 2011-12-01 | Zeljko Bajic | Rfid security and mobility architecture |
EP2442600B1 (en) | 2010-10-14 | 2013-03-06 | Research In Motion Limited | Near-field communication (NFC) system providing nfc tag geographic position authentication and related methods |
US8750793B2 (en) | 2010-10-14 | 2014-06-10 | Blackberry Limited | Near-field communication (NFC) system with mobile wireless communications devices determining geographic positions of NFC tags and related methods |
US9443276B2 (en) | 2011-01-19 | 2016-09-13 | Walter Richard Barry, III | Event-based asset tracking, order adherence, and rewards management with NFC-enabled electronic devices |
EP2487629B1 (en) | 2011-02-10 | 2016-11-30 | Nxp B.V. | Secure smart poster |
WO2012126086A1 (en) | 2011-03-18 | 2012-09-27 | Certicom Corp. | Secure financial transactions |
EP2624612B1 (en) | 2012-02-03 | 2018-08-29 | Telia Company AB | A method for near field communication operation, a device and a system thereto |
US8478195B1 (en) | 2012-02-17 | 2013-07-02 | Google Inc. | Two-factor user authentication using near field communication |
TWI587166B (zh) | 2013-02-06 | 2017-06-11 | 廣達電腦股份有限公司 | 電腦系統 |
EP2973285A4 (en) * | 2013-03-12 | 2016-03-30 | Intertrust Tech Corp | SECURE TRANSACTION SYSTEMS AND METHODS |
BR112015027883B1 (pt) | 2013-05-06 | 2022-08-02 | Huru Systems Inc | Rastreamento e gerenciamento de ativo |
US9379894B1 (en) | 2013-06-13 | 2016-06-28 | Emc Corporation | Authentication using cryptographic value derived from a shared secret of a near field communication tag |
US9571164B1 (en) | 2013-06-21 | 2017-02-14 | EMC IP Holding Company LLC | Remote authentication using near field communication tag |
US9350550B2 (en) | 2013-09-10 | 2016-05-24 | M2M And Iot Technologies, Llc | Power management and security for wireless modules in “machine-to-machine” communications |
US9256881B2 (en) * | 2013-11-08 | 2016-02-09 | Vattaca, LLC | Authenticating and managing item ownership and authenticity |
US9419803B2 (en) | 2013-12-31 | 2016-08-16 | Nxp B.V. | Flexible data authentication |
US20150363790A1 (en) | 2014-06-13 | 2015-12-17 | Peter Collins | Asset tracking and counterfeit detection system |
WO2016109835A1 (en) | 2014-12-31 | 2016-07-07 | Dauntless Software Inc. | Supply chain management systems and methods |
-
2017
- 2017-08-14 US US15/676,094 patent/US10397000B2/en active Active
-
2018
- 2018-04-27 KR KR1020207006612A patent/KR102444402B1/ko active IP Right Grant
- 2018-04-27 WO PCT/US2018/029712 patent/WO2019036073A1/en unknown
- 2018-04-27 JP JP2020508316A patent/JP7232816B2/ja active Active
- 2018-04-27 EP EP18724428.0A patent/EP3669294A1/en not_active Withdrawn
- 2018-05-04 TW TW107115272A patent/TWI691195B/zh active
-
2020
- 2020-02-13 IL IL272662A patent/IL272662B/en active IP Right Grant
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014207890A1 (ja) | 2013-06-28 | 2014-12-31 | 株式会社日立システムズ | 真贋判定システム、真贋判定方法、およびicチップ装着部材 |
Also Published As
Publication number | Publication date |
---|---|
EP3669294A1 (en) | 2020-06-24 |
KR20200037847A (ko) | 2020-04-09 |
JP2020530726A (ja) | 2020-10-22 |
TWI691195B (zh) | 2020-04-11 |
US20190052468A1 (en) | 2019-02-14 |
IL272662B (en) | 2020-11-30 |
US10397000B2 (en) | 2019-08-27 |
TW201911806A (zh) | 2019-03-16 |
KR102444402B1 (ko) | 2022-09-20 |
IL272662A (en) | 2020-03-31 |
WO2019036073A1 (en) | 2019-02-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7232816B2 (ja) | 資産を認証する認証システム及び認証方法 | |
US11323276B2 (en) | Mutual authentication of confidential communication | |
CN108886468B (zh) | 用于分发基于身份的密钥资料和证书的系统和方法 | |
CN110050437B (zh) | 分布式证书注册的装置和方法 | |
US9166793B2 (en) | Efficient authentication for mobile and pervasive computing | |
CN110401615B (zh) | 一种身份认证方法、装置、设备、系统及可读存储介质 | |
US9531540B2 (en) | Secure token-based signature schemes using look-up tables | |
US10205598B2 (en) | Temporal key generation and PKI gateway | |
CN103339958A (zh) | 密钥传输协议 | |
KR20050084877A (ko) | 장치 특정 보안 데이터의 안전한 실시 및 이용 | |
WO2008033590A2 (en) | A method and apparatus to provide authentication and privacy with low complexity devices | |
CN111614621B (zh) | 物联网通信方法和系统 | |
EP3695561B1 (en) | Secure provisioning of data to client device | |
CN101296075A (zh) | 一种基于椭圆曲线的身份认证系统 | |
CN111970114B (zh) | 文件加密方法、系统、服务器和存储介质 | |
US20230032099A1 (en) | Physical unclonable function based mutual authentication and key exchange | |
CN109951276B (zh) | 基于tpm的嵌入式设备远程身份认证方法 | |
CN113556230A (zh) | 数据安全传输方法、证书相关方法、服务端、系统及介质 | |
CN109218251B (zh) | 一种防重放的认证方法及系统 | |
US11088835B1 (en) | Cryptographic module to generate cryptographic keys from cryptographic key parts | |
US7415110B1 (en) | Method and apparatus for the generation of cryptographic keys | |
Fasila et al. | Fast and Efficient Security Scheme for Blockchain-Based IoT Networks. | |
US20210119776A1 (en) | Proof-of-work based on block cipher |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20200213 |
|
A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20210319 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20210427 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20210712 |
|
A02 | Decision of refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A02 Effective date: 20220104 |
|
C60 | Trial request (containing other claim documents, opposition documents) |
Free format text: JAPANESE INTERMEDIATE CODE: C60 Effective date: 20220502 |
|
C22 | Notice of designation (change) of administrative judge |
Free format text: JAPANESE INTERMEDIATE CODE: C22 Effective date: 20220531 |
|
C22 | Notice of designation (change) of administrative judge |
Free format text: JAPANESE INTERMEDIATE CODE: C22 Effective date: 20220621 |
|
C13 | Notice of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: C13 Effective date: 20220920 |
|
C22 | Notice of designation (change) of administrative judge |
Free format text: JAPANESE INTERMEDIATE CODE: C22 Effective date: 20221011 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20221201 |
|
C23 | Notice of termination of proceedings |
Free format text: JAPANESE INTERMEDIATE CODE: C23 Effective date: 20221220 |
|
C03 | Trial/appeal decision taken |
Free format text: JAPANESE INTERMEDIATE CODE: C03 Effective date: 20230124 |
|
C30A | Notification sent |
Free format text: JAPANESE INTERMEDIATE CODE: C3012 Effective date: 20230124 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20230220 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 7232816 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |