TW200610340A - Device authentication - Google Patents

Device authentication

Info

Publication number
TW200610340A
TW200610340A TW094114064A TW94114064A TW200610340A TW 200610340 A TW200610340 A TW 200610340A TW 094114064 A TW094114064 A TW 094114064A TW 94114064 A TW94114064 A TW 94114064A TW 200610340 A TW200610340 A TW 200610340A
Authority
TW
Taiwan
Prior art keywords
authentication
devices
values
communication
device authentication
Prior art date
Application number
TW094114064A
Other languages
English (en)
Other versions
TWI298980B (en
Inventor
Michael K Brown
Herbert A Little
Dinah L M Davis
Original Assignee
Research In Motion Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Research In Motion Ltd filed Critical Research In Motion Ltd
Publication of TW200610340A publication Critical patent/TW200610340A/zh
Application granted granted Critical
Publication of TWI298980B publication Critical patent/TWI298980B/zh

Links

Classifications

    • AHUMAN NECESSITIES
    • A01AGRICULTURE; FORESTRY; ANIMAL HUSBANDRY; HUNTING; TRAPPING; FISHING
    • A01BSOIL WORKING IN AGRICULTURE OR FORESTRY; PARTS, DETAILS, OR ACCESSORIES OF AGRICULTURAL MACHINES OR IMPLEMENTS, IN GENERAL
    • A01B1/00Hand tools
    • A01B1/02Spades; Shovels
    • A01B1/04Spades; Shovels with teeth
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • EFIXED CONSTRUCTIONS
    • E01CONSTRUCTION OF ROADS, RAILWAYS, OR BRIDGES
    • E01HSTREET CLEANING; CLEANING OF PERMANENT WAYS; CLEANING BEACHES; DISPERSING OR PREVENTING FOG IN GENERAL CLEANING STREET OR RAILWAY FURNITURE OR TUNNEL WALLS
    • E01H5/00Removing snow or ice from roads or like surfaces; Grading or roughening snow or ice
    • E01H5/02Hand implements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3273Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Civil Engineering (AREA)
  • Mechanical Engineering (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Architecture (AREA)
  • Algebra (AREA)
  • Structural Engineering (AREA)
  • Physics & Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Soil Sciences (AREA)
  • Environmental Sciences (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Lock And Its Accessories (AREA)
  • Enzymes And Modification Thereof (AREA)
  • Vehicle Body Suspensions (AREA)
  • Small-Scale Networks (AREA)
  • Communication Control (AREA)
  • Transceivers (AREA)
  • Bidet-Like Cleaning Device And Other Flush Toilet Accessories (AREA)
TW094114064A 2004-04-30 2005-04-29 System and method for device authentication TWI298980B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP04101879A EP1596529B1 (en) 2004-04-30 2004-04-30 Cryptographic device authentication

Publications (2)

Publication Number Publication Date
TW200610340A true TW200610340A (en) 2006-03-16
TWI298980B TWI298980B (en) 2008-07-11

Family

ID=34929049

Family Applications (1)

Application Number Title Priority Date Filing Date
TW094114064A TWI298980B (en) 2004-04-30 2005-04-29 System and method for device authentication

Country Status (13)

Country Link
EP (1) EP1596529B1 (zh)
JP (2) JP4324128B2 (zh)
KR (1) KR100720910B1 (zh)
CN (1) CN1694402B (zh)
AT (1) ATE380420T1 (zh)
AU (2) AU2005201782B2 (zh)
BR (1) BRPI0501453B1 (zh)
CA (1) CA2505460C (zh)
DE (1) DE602004010494T2 (zh)
ES (1) ES2297338T3 (zh)
HK (1) HK1083958A1 (zh)
SG (1) SG116650A1 (zh)
TW (1) TWI298980B (zh)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1596529B1 (en) * 2004-04-30 2007-12-05 Research In Motion Limited Cryptographic device authentication
GB2453383A (en) * 2007-10-05 2009-04-08 Iti Scotland Ltd Authentication method using a third party
KR101337877B1 (ko) * 2009-12-11 2013-12-06 한국전자통신연구원 인증된 무선 채널을 이용한 데이터 통신 장치 및 방법
CA2830283C (en) 2011-03-25 2016-11-01 Certicom Corp. Interrogating an authentication device
US9369290B2 (en) * 2012-11-30 2016-06-14 Certicom Corp. Challenge-response authentication using a masked response value
US9727720B2 (en) 2012-11-30 2017-08-08 Certicom Corp. Challenge-response authentication using a masked response value
WO2015126398A1 (en) * 2014-02-20 2015-08-27 Empire Technology Development, Llc Device authentication in ad-hoc networks
WO2015156795A1 (en) 2014-04-09 2015-10-15 Empire Technology Development, Llc Sensor data anomaly detector
WO2018081583A1 (en) * 2016-10-27 2018-05-03 Infinitekey, Inc. System and method for authenticating and authorizing devices
CN111698225B (zh) * 2020-05-28 2022-08-19 国家电网有限公司 一种适用于电力调度控制系统的应用服务认证加密方法

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3308561B2 (ja) * 1990-11-14 2002-07-29 株式会社東芝 電子メール通信方法および送信側端末
US5491750A (en) * 1993-12-30 1996-02-13 International Business Machines Corporation Method and apparatus for three-party entity authentication and key distribution using message authentication codes
CN1181641C (zh) * 2001-11-13 2004-12-22 杭州中正生物认证技术有限公司 使用随机数的通信安全认证方法
US7194765B2 (en) * 2002-06-12 2007-03-20 Telefonaktiebolaget Lm Ericsson (Publ) Challenge-response user authentication
AU2003252817A1 (en) * 2002-03-13 2003-09-22 Koninklijke Philips Electronics N.V. Polynomial-based multi-user key generation and authentication method and system
EP1596529B1 (en) * 2004-04-30 2007-12-05 Research In Motion Limited Cryptographic device authentication

Also Published As

Publication number Publication date
DE602004010494T2 (de) 2008-11-27
AU2005201782B2 (en) 2008-06-19
CA2505460A1 (en) 2005-10-30
CN1694402B (zh) 2011-09-14
JP2005323371A (ja) 2005-11-17
AU2008221589A1 (en) 2008-10-16
CN1694400A (zh) 2005-11-09
EP1596529B1 (en) 2007-12-05
TWI298980B (en) 2008-07-11
HK1083958A1 (en) 2006-07-14
EP1596529A1 (en) 2005-11-16
ES2297338T3 (es) 2008-05-01
KR100720910B1 (ko) 2007-05-25
BRPI0501453B1 (pt) 2017-05-23
AU2005201782A1 (en) 2005-11-17
ATE380420T1 (de) 2007-12-15
JP2009165176A (ja) 2009-07-23
JP4324128B2 (ja) 2009-09-02
DE602004010494D1 (de) 2008-01-17
SG116650A1 (en) 2005-11-28
AU2008221589B2 (en) 2010-09-16
JP5139362B2 (ja) 2013-02-06
BRPI0501453A (pt) 2006-01-10
CA2505460C (en) 2010-11-02
KR20060047665A (ko) 2006-05-18

Similar Documents

Publication Publication Date Title
TW200610340A (en) Device authentication
TW429721B (en) Method for two party authentication and key agreement
HK1062243A1 (en) A system and method for supporting multiple certificate authorities on a mobile communication device
WO2004046844A3 (en) Faster authentication with parallel message processing
WO2005053209A3 (en) Tokens/keys for wireless communications
WO2006130616A3 (en) Augmented single factor split key asymmetric cryptography-key generation and distributor
PL1889503T3 (pl) Sposób uzgodnienia klucza zabezpieczającego między co najmniej jednym pierwszym i jednym drugim uczestnikiem komunikacji w celu zabezpieczenia połączenia komunikacyjnego
HK1095950A1 (en) Deploying and provisioning wireless handheld devices
TW428409B (en) Method for updating secret shared data in a wireless communication system
GB2473351A (en) Two-way authentication between two communication endpoints using a one-way out-of-band (OOB) channel
MY142729A (en) Bootstrapping authentication using distinguished random challenges
WO2008030523A3 (en) Real privacy management authentication system
EP1836798A4 (en) METHOD AND APPARATUS PROVIDING A POLICY-BASED REVOCATION OF NETWORK SECURITY IDENTIFICATION GUIDELINES
WO2008019194A3 (en) Mutual authentication and secure channel establichment between two parties using consecutive one-time passwords
WO2007095240A3 (en) Flexible and adjustable authentication in cyberspace
MX2009013529A (es) Configuracion de informacion de calidad de servicio.
WO2007127637A3 (en) Method and system for providing cellular assisted secure communications of a plurality of ad hoc devices
WO2008078101A3 (en) Method and device for mutual authentication
DE60310437D1 (de) Sichere kommunikation
WO2005089120A3 (en) Secure authentication and network management system for wireless lan applications
WO2003039094A3 (en) Methods and apparatus for securely communicating a message
WO2004051964A3 (en) Tunneled authentication protocol for preventing man-in-the-middle attacks
WO2009048574A3 (en) Secure wireless communication
WO2006128481A3 (en) Method for auto-configuration of a network terminal address
TW200629854A (en) Pseudo-secret key generation in a communications system