SE539271C2 - Mutual authentication - Google Patents
Mutual authentication Download PDFInfo
- Publication number
- SE539271C2 SE539271C2 SE1451211A SE1451211A SE539271C2 SE 539271 C2 SE539271 C2 SE 539271C2 SE 1451211 A SE1451211 A SE 1451211A SE 1451211 A SE1451211 A SE 1451211A SE 539271 C2 SE539271 C2 SE 539271C2
- Authority
- SE
- Sweden
- Prior art keywords
- terminal
- server
- authentication token
- authentication
- key
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3215—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a plurality of channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3273—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Claims (7)
1. Ett system (300) innefattande en första terminal (100a), enandra terminal (1l0b) och en server (340), varvid den första terminalen (100a) äranordnad att autentisera servern (340) genom att: generera en första autentiseringstoken (AT), vilken är en datastruktur föranvändning för att autentisera en första datoranordning (100a, 100b, 340), såsom enterminal (100), till en andra datoranordning (100a, 100b, 340), såsom en server (340),och skicka nämnda första autentiseringstoken (AT) till servem (3 40), varvid servern (340) är anordnad att: ta emot nämnda första autentiseringstoken (AT) och autentisera den; generera en andra autentiseringstoken (AT) för den första terminalen(100a) och skicka nämnda andra autentiseringstoken (AT) till den första terminalen(100a); varmed den första terminalen (100a) är anordnad att:ta emot nämnda andra autentiseringstoken (AT) och autentisera den ochdärigenom utföra en ömsesidig autentisering av den första terminalen (100a) och servern (340), varvid servern (340) vidare är anordnad att: generera en tredje autentiseringstoken (AT) för den andra terminalen(100b) och skicka nämnda tredje autentiseringstoken (AT) till den första terminalen(100a), varmed den första terminalen (100a) vidare är anordnad att:ta emot nämnda tredje autentiseringstoken (AT) och skicka den till den andra terminalen (100b), varmed den andra terminalen (100b) är anordnad att: 5 33 ta emot och autentisera nämnda tredje autentiseringstoken (AT) och därigenom utföra en autentisering av servem (3 40) och den första terminalen (100a), varvid den andra terminalen (l00b) är anordnad att vidare autentiseraservern (3 40) genom att:generera en fjärde autentiseringstoken (AT); och skicka nämnda fjärde autentiseringstoken (AT) till servern (3 40); varvid servern (340) vidare är anordnad att: ta emot nämnda fjärde autentiseringstoken (AT) och autentisera den; generera en femte autentiseringstoken (AT) för den andra terminalen(100b); och skicka nämnda femte autentiseringstoken (AT) till den andra terminalen (l00b), och varmed den andra terminalen (l00b) är anordnad att:ta emot nämnda femte autentiseringstoken (AT) och autentisera den ochdärigenom utföra en ömsesidig autentisering av den andra terminalen (l00b) och servern (340).
2. Systemet (300) enligt krav 1, varvid seivem (340) vidare äranordnad att generera nämnda tredje autentiseringstoken (AT) för den andra terminalen(l00b) och skicka den till den första terminalen (100a) tillsammans med nämnda andra autentiseringstoken (AT).
3. Systemet (300) enligt krav 1 eller 2, varvid servern (340)vidare är anordnad att generera en sjätte autentiseringstoken (AT) för den förstaterminalen (100a) och skicka den till den andra terminalen (l00b), varvid den andraterminalen (l00b) vidare är anordnad att ta emot nämnda sjätte autentiseringstoken(AT) och skicka den till den första terminalen (100a), varvid den första terminalen(100a) är anordnad att ta emot och autentisera nämnda sjätte autentiseringstoken (AT) och därigenom utföra en autentisering av servern (340) och den andra terminalen 34 (l00b).
4. Systemet (300) enligt krav 3, varvid servern (340) vidare äranordnad att generera nämnda sjätte autentiseringstoken (AT) for den första terminalen(100a) och skicka den till den andra terminalen (l00b) tillsammans med nämnda femte autentiseringstoken (AT).
5. Systemet (300) enligt något av föregående krav, varvidsystemet (300) är en apparat (100) och den första terminalen (100a) är en externanordning (245) som installeras i apparaten (100) och apparaten är anordnad att exekvera servern (340) eller kommunicera med servern (340).
6. En metod för användning i ett system (300) innefattande enförsta terminal (100a), en andra terminal (1 10b) och en server (340), varvid metoden ärför autentisering av servern (3 40) genom att: den forsta terminalen (l00a) genererar en första autentiseringstoken (AT),vilken är en datastruktur för användning för autentisering av en första datoranordning(l00a, 100b, 340), såsom en terminal (100), till en andra datoranordning (l00a, 100b,340), såsom en server (340); och den forsta terminalen (l00a) skickar nämnda första autentiseringstoken(AT) till servem (340); servern (340) tar emot nämnda första autentiseringstoken (AT) ochautentiserar den; servern (340) genererar en andra autentiseringstoken (AT) för den förstaterminalen (l00a); servern (340) skickar nämnda andra autentiseringstoken (AT) till denförsta terminalen (100a), den första terminalen (100a) tar emot nämnda andra autentiseringstoken(AT) och autentiserar den och därigenom utförs en ömsesidig autentisering av den första terminalen (100a) och servern (340); servern (340) genererar en tredje autentiseringstoken (AT) för den andraterminalen (100b) och skickar nämnda tredje autentiseringstoken (AT) till den förstaterminalen (100a); den första terminalen (100a) tar emot nämnda tredje autentiseringstoken(AT) och skickar nämnda tredje autentiseringstoken (AT) till den andra terminalen(100b); och den andra terminalen (100b) tar emot och autentiserar nämnda tredjeautentiseringstoken (AT) och därigenom utförs en autentisering av servern (340) påuppdrag av den första terminalen (100a); den andra terminalen (100b) genererar en fjärde autentiseringstoken (AT)och skickar nämnda fjärde autentiseringstoken (AT) till servern (340); servern (340) tar emot nämnda fjärde autentiseringstoken (AT) ochautentiserar den; servern (340) genererar en femte autentiseringstoken (AT) för den andraterminalen (100b) och skickar nämnda femte autentiseringstoken (AT) till den andraterminalen (100b), och den andra terminalen (100b) tar emot nämnda femte autentiseringstoken(AT) och autentiserar den och därigenom utförs en ömsesidig autentisering av den andra terminalen (100b) och servem (340).
7. Ett datorläsbart lagringsmedium (40) kodat med instruktioner (41) som, när de exekveras på en processor, utför metoden enligt krav 6.
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SE1451211A SE539271C2 (sv) | 2014-10-09 | 2014-10-09 | Mutual authentication |
TW104133309A TW201626775A (zh) | 2014-10-09 | 2015-10-08 | 交互驗證 |
CN201580054852.1A CN107210915A (zh) | 2014-10-09 | 2015-10-08 | 相互认证 |
US15/516,942 US10511596B2 (en) | 2014-10-09 | 2015-10-08 | Mutual authentication |
EP15849042.5A EP3205051A4 (en) | 2014-10-09 | 2015-10-08 | Mutual authentication |
PCT/SE2015/051067 WO2016056988A1 (en) | 2014-10-09 | 2015-10-08 | Mutual authentication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SE1451211A SE539271C2 (sv) | 2014-10-09 | 2014-10-09 | Mutual authentication |
Publications (2)
Publication Number | Publication Date |
---|---|
SE1451211A1 SE1451211A1 (sv) | 2016-04-10 |
SE539271C2 true SE539271C2 (sv) | 2017-06-07 |
Family
ID=55653454
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SE1451211A SE539271C2 (sv) | 2014-10-09 | 2014-10-09 | Mutual authentication |
Country Status (6)
Country | Link |
---|---|
US (1) | US10511596B2 (sv) |
EP (1) | EP3205051A4 (sv) |
CN (1) | CN107210915A (sv) |
SE (1) | SE539271C2 (sv) |
TW (1) | TW201626775A (sv) |
WO (1) | WO2016056988A1 (sv) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
SE538279C2 (sv) | 2014-09-23 | 2016-04-19 | Kelisec Ab | Förfarande och system för att fastställa förekomst av |
SE539602C2 (sv) | 2014-10-09 | 2017-10-17 | Kelisec Ab | Generating a symmetric encryption key |
SE540133C2 (sv) | 2014-10-09 | 2018-04-10 | Kelisec Ab | Improved system for establishing a secure communication channel |
SE542460C2 (sv) | 2014-10-09 | 2020-05-12 | Kelisec Ab | Improved security through authenticaton tokens |
SE538304C2 (sv) | 2014-10-09 | 2016-05-03 | Kelisec Ab | Improved installation of a terminal in a secure system |
US10601814B2 (en) * | 2017-07-26 | 2020-03-24 | Secret Double Octopus Ltd. | System and method for temporary password management |
WO2019040983A1 (en) * | 2017-08-29 | 2019-03-07 | Future Pass Pty Ltd | PLATFORM METHODS AND SYSTEMS OF TRUSTED BROKER |
CN113647051B (zh) * | 2019-01-28 | 2024-08-20 | 康奈尔克有限公司 | 用于安全电子数据传输的系统和方法 |
Family Cites Families (66)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4578531A (en) | 1982-06-09 | 1986-03-25 | At&T Bell Laboratories | Encryption system key distribution method and apparatus |
US7298851B1 (en) | 1992-12-09 | 2007-11-20 | Discovery Communications, Inc. | Electronic book security and copyright protection system |
US6125186A (en) | 1996-11-28 | 2000-09-26 | Fujitsu Limited | Encryption communication system using an agent and a storage medium for storing that agent |
US20020159598A1 (en) | 1997-10-31 | 2002-10-31 | Keygen Corporation | System and method of dynamic key generation for digital communications |
US7079653B2 (en) | 1998-02-13 | 2006-07-18 | Tecsec, Inc. | Cryptographic key split binding process and apparatus |
AU7182701A (en) | 2000-07-06 | 2002-01-21 | David Paul Felsher | Information record infrastructure, system and method |
US7043633B1 (en) | 2000-08-28 | 2006-05-09 | Verizon Corporation Services Group Inc. | Method and apparatus for providing adaptive self-synchronized dynamic address translation |
US7149308B1 (en) | 2000-11-13 | 2006-12-12 | Stealthkey, Inc. | Cryptographic communications using in situ generated cryptographic keys for conditional access |
IL144369A (en) | 2001-07-17 | 2009-06-15 | Eli Yanovsky | Secure communication system and method using shared random source for key changing |
US20030145203A1 (en) | 2002-01-30 | 2003-07-31 | Yves Audebert | System and method for performing mutual authentications between security tokens |
US7424115B2 (en) | 2003-01-30 | 2008-09-09 | Nokia Corporation | Generating asymmetric keys in a telecommunications system |
CN100583758C (zh) * | 2003-04-16 | 2010-01-20 | 艾利森电话股份有限公司 | 认证方法 |
US7979707B2 (en) | 2003-07-10 | 2011-07-12 | Emc Corporation | Secure seed generation protocol |
US7350079B2 (en) | 2003-11-20 | 2008-03-25 | International Business Machines Corporation | Apparatus and method for inter-program authentication using dynamically-generated public/private key pairs |
US20070186099A1 (en) | 2004-03-04 | 2007-08-09 | Sweet Spot Solutions, Inc. | Token based two factor authentication and virtual private networking system for network management and security and online third party multiple network management method |
WO2006012058A1 (en) | 2004-06-28 | 2006-02-02 | Japan Communications, Inc. | Systems and methods for mutual authentication of network |
BRPI0519861A2 (pt) * | 2005-01-28 | 2009-03-24 | Ericsson Telefon Ab L M | métodos para autenticar um cliente, e para operar servidor de autenticação dentro de um sistema de comunicações, servidor de autenticação, método para operar um cliente acoplado a uma rede de comunicação, terminal de cliente, e, método para autenticar equipamento de usuário |
US8086853B2 (en) * | 2005-03-18 | 2011-12-27 | Microsoft Corporation | Automatic centralized authentication challenge response generation |
KR20060131536A (ko) | 2005-06-16 | 2006-12-20 | 삼성전자주식회사 | BE 시스템에서의 홈 디바이스의 통합적 키(key) 관리방법 및 그 시스템 |
US7676676B2 (en) * | 2005-11-14 | 2010-03-09 | Motorola, Inc. | Method and apparatus for performing mutual authentication within a network |
EP1865656A1 (en) * | 2006-06-08 | 2007-12-12 | BRITISH TELECOMMUNICATIONS public limited company | Provision of secure communications connection using third party authentication |
JP2008065696A (ja) * | 2006-09-08 | 2008-03-21 | Toshiba Corp | コンテンツ共有システム及びコンテンツ共有方法 |
JP5424008B2 (ja) | 2006-12-19 | 2014-02-26 | 日本電気株式会社 | 共有情報の管理方法およびシステム |
CN101267301A (zh) * | 2007-03-15 | 2008-09-17 | 上海贝尔阿尔卡特股份有限公司 | 通信网络中基于身份的认证和密钥协商方法及装置 |
US20080235513A1 (en) | 2007-03-19 | 2008-09-25 | Microsoft Corporation | Three Party Authentication |
US8527764B2 (en) * | 2007-05-07 | 2013-09-03 | Lg Electronics Inc. | Method and system for secure communication |
WO2009060283A1 (en) | 2007-11-05 | 2009-05-14 | Synaptic Laboratories Limited | Method and apparatus for secure communication |
US20100318802A1 (en) * | 2007-11-20 | 2010-12-16 | Ajit Balakrishnan | Systems and methods for establishing a secure communication channel using a browser component |
EP2106642A4 (en) | 2008-01-07 | 2015-12-02 | Security First Corp | SYSTEMS AND METHODS FOR SECURING DATA USING A KEY OR MULTI-FACTOR DISPERSION |
US8302167B2 (en) | 2008-03-11 | 2012-10-30 | Vasco Data Security, Inc. | Strong authentication token generating one-time passwords and signatures upon server credential verification |
FR2928798B1 (fr) | 2008-03-14 | 2011-09-09 | Centre Nat Rech Scient | Procede d'authentification, systeme d'authentification, terminal serveur, terminal client et programmes d'ordinateur correspondants |
US8422687B2 (en) | 2008-05-30 | 2013-04-16 | Lantiq Deutschland Gmbh | Key management for communication networks |
US9344438B2 (en) | 2008-12-22 | 2016-05-17 | Qualcomm Incorporated | Secure node identifier assignment in a distributed hash table for peer-to-peer networks |
KR20100086677A (ko) * | 2009-01-23 | 2010-08-02 | 삼성전자주식회사 | 커뮤니티 위젯 제공 방법 및 장치 |
US8752153B2 (en) | 2009-02-05 | 2014-06-10 | Wwpass Corporation | Accessing data based on authenticated user, provider and system |
US8751829B2 (en) | 2009-02-05 | 2014-06-10 | Wwpass Corporation | Dispersed secure data storage and retrieval |
US8588410B2 (en) | 2009-04-06 | 2013-11-19 | Elster Electricity, Llc | Simplified secure symmetrical key management |
US20100312810A1 (en) | 2009-06-09 | 2010-12-09 | Christopher Horton | Secure identification of music files |
EP2446579B1 (fr) | 2009-06-26 | 2020-12-09 | Orange | Procédé d'authentification mutuelle d'un lecteur et d'une étiquette radio |
SE534384C2 (sv) | 2009-07-03 | 2011-08-02 | Kelisec Ab | Förfarande för att alstra en krypterings-/dekrypteringsnyckel |
EP2927836B1 (en) | 2010-01-12 | 2016-10-05 | Visa International Service Association | Anytime validation for verification tokens |
WO2011128183A2 (en) * | 2010-04-13 | 2011-10-20 | Telefonaktiebolaget L M Ericsson (Publ) | Method and apparatus for interworking with single sign-on authentication architecture |
CN103609059B (zh) | 2010-09-20 | 2016-08-17 | 安全第一公司 | 用于安全数据共享的系统和方法 |
US8984610B2 (en) | 2011-04-18 | 2015-03-17 | Bank Of America Corporation | Secure network cloud architecture |
US9270453B2 (en) | 2011-06-30 | 2016-02-23 | Verizon Patent And Licensing Inc. | Local security key generation |
US8990554B2 (en) * | 2011-06-30 | 2015-03-24 | Verizon Patent And Licensing Inc. | Network optimization for secure connection establishment or secure messaging |
KR101800659B1 (ko) | 2011-07-08 | 2017-11-23 | 삼성전자 주식회사 | 이동 통신 시스템에서 단말 설정 방법 |
US8914635B2 (en) | 2011-07-25 | 2014-12-16 | Grey Heron Technologies, Llc | Method and system for establishing secure communications using composite key cryptography |
CN103096307A (zh) | 2011-10-27 | 2013-05-08 | 中兴通讯股份有限公司 | 密钥验证方法及装置 |
FR2983374B1 (fr) | 2011-11-29 | 2015-04-10 | Oberthur Technologies | Protocole d'authentification mutuelle |
US8656180B2 (en) | 2011-12-06 | 2014-02-18 | Wwpass Corporation | Token activation |
WO2013122869A1 (en) | 2012-02-13 | 2013-08-22 | Eugene Shablygin | Sharing secure data |
US20130219481A1 (en) | 2012-02-16 | 2013-08-22 | Robert Matthew Voltz | Cyberspace Trusted Identity (CTI) Module |
CN103391545B (zh) | 2012-05-07 | 2016-12-28 | 财团法人工业技术研究院 | 装置间通信的认证系统及认证方法 |
US20150134960A1 (en) | 2012-05-21 | 2015-05-14 | Koninklijke Philips N.V. | Determination of cryptographic keys |
US20140149742A1 (en) | 2012-11-28 | 2014-05-29 | Arnold Yau | Method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors |
JP6018511B2 (ja) | 2013-01-31 | 2016-11-02 | 株式会社東芝 | サーバ装置、グループ鍵通知方法及びそのプログラム |
EP2956887A1 (en) | 2013-02-13 | 2015-12-23 | Security First Corp. | Systems and methods for a cryptographic file system layer |
US9397836B2 (en) | 2014-08-11 | 2016-07-19 | Fisher-Rosemount Systems, Inc. | Securing devices to process control systems |
CN103795545B (zh) | 2014-02-14 | 2017-01-18 | 飞天诚信科技股份有限公司 | 一种安全通信的方法和系统 |
US11178131B2 (en) * | 2014-03-14 | 2021-11-16 | Telefonaktiebolaget Lm Ericsson (Publ) | Systems and methods related to establishing a temporary trust relationship between a network-based media service and a digital media renderer |
SE538279C2 (sv) | 2014-09-23 | 2016-04-19 | Kelisec Ab | Förfarande och system för att fastställa förekomst av |
SE540133C2 (sv) | 2014-10-09 | 2018-04-10 | Kelisec Ab | Improved system for establishing a secure communication channel |
SE542460C2 (sv) | 2014-10-09 | 2020-05-12 | Kelisec Ab | Improved security through authenticaton tokens |
SE538304C2 (sv) | 2014-10-09 | 2016-05-03 | Kelisec Ab | Improved installation of a terminal in a secure system |
SE539602C2 (sv) | 2014-10-09 | 2017-10-17 | Kelisec Ab | Generating a symmetric encryption key |
-
2014
- 2014-10-09 SE SE1451211A patent/SE539271C2/sv not_active IP Right Cessation
-
2015
- 2015-10-08 WO PCT/SE2015/051067 patent/WO2016056988A1/en active Application Filing
- 2015-10-08 CN CN201580054852.1A patent/CN107210915A/zh active Pending
- 2015-10-08 US US15/516,942 patent/US10511596B2/en not_active Expired - Fee Related
- 2015-10-08 TW TW104133309A patent/TW201626775A/zh unknown
- 2015-10-08 EP EP15849042.5A patent/EP3205051A4/en not_active Withdrawn
Also Published As
Publication number | Publication date |
---|---|
WO2016056988A1 (en) | 2016-04-14 |
SE1451211A1 (sv) | 2016-04-10 |
EP3205051A1 (en) | 2017-08-16 |
EP3205051A4 (en) | 2018-05-16 |
US10511596B2 (en) | 2019-12-17 |
TW201626775A (zh) | 2016-07-16 |
US20180063131A1 (en) | 2018-03-01 |
CN107210915A (zh) | 2017-09-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10693848B2 (en) | Installation of a terminal in a secure system | |
EP3205048B1 (en) | Generating a symmetric encryption key | |
US10356090B2 (en) | Method and system for establishing a secure communication channel | |
US10511596B2 (en) | Mutual authentication | |
US10733309B2 (en) | Security through authentication tokens | |
JP2017521934A (ja) | クライアントとサーバとの間の相互検証の方法 | |
TWI689223B (zh) | 節點對多節點通訊 | |
US20160359822A1 (en) | Sovereign share encryption protocol | |
JP2022549671A (ja) | ブラウザアプリケーション用の暗号化サービス | |
Dimeo et al. | SoK: Multi-Device Secure Instant Messaging | |
Attia et al. | E-mail systems in cloud computing environment privacy, trust and security challenges | |
Geetha et al. | Introduction To Cryptography And Network Security | |
US20240195639A1 (en) | Digital-asset authentication with anonymity | |
Clarke et al. | Multi-channel overlay protocols: Implementing ad-hoc message authentication in social media platforms | |
US20240171378A1 (en) | Sharing access to data | |
Singh et al. | Enhancing the Security of JSON Web Token Using Signal Protocol and Ratchet System | |
Khan | Secure message encryption using N th prime. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
NUG | Patent has lapsed |