TWI563411B - Agent for providing security cloud service and security token device for security cloud service - Google Patents

Agent for providing security cloud service and security token device for security cloud service

Info

Publication number
TWI563411B
TWI563411B TW104115107A TW104115107A TWI563411B TW I563411 B TWI563411 B TW I563411B TW 104115107 A TW104115107 A TW 104115107A TW 104115107 A TW104115107 A TW 104115107A TW I563411 B TWI563411 B TW I563411B
Authority
TW
Taiwan
Prior art keywords
cloud service
security
agent
token device
security cloud
Prior art date
Application number
TW104115107A
Other languages
English (en)
Chinese (zh)
Other versions
TW201608412A (zh
Inventor
Jae Sik Choi
Won-Jang Son
Changhoon Kwon
Original Assignee
Saferzone Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Saferzone Co Ltd filed Critical Saferzone Co Ltd
Publication of TW201608412A publication Critical patent/TW201608412A/zh
Application granted granted Critical
Publication of TWI563411B publication Critical patent/TWI563411B/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0877Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
TW104115107A 2014-08-19 2015-05-12 Agent for providing security cloud service and security token device for security cloud service TWI563411B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020140107544A KR101479290B1 (ko) 2014-08-19 2014-08-19 보안 클라우드 서비스를 제공하기 위한 에이전트 및 보안 클라우드 서비스를위한 보안키장치

Publications (2)

Publication Number Publication Date
TW201608412A TW201608412A (zh) 2016-03-01
TWI563411B true TWI563411B (en) 2016-12-21

Family

ID=52587914

Family Applications (1)

Application Number Title Priority Date Filing Date
TW104115107A TWI563411B (en) 2014-08-19 2015-05-12 Agent for providing security cloud service and security token device for security cloud service

Country Status (7)

Country Link
JP (1) JP6172866B2 (ru)
KR (1) KR101479290B1 (ru)
AU (1) AU2015202697A1 (ru)
BR (1) BR102015011937A2 (ru)
CA (1) CA2891610C (ru)
RU (1) RU2660604C2 (ru)
TW (1) TWI563411B (ru)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20170001486A (ko) 2015-06-26 2017-01-04 안희태 보안 클라우드 서비스
KR101619286B1 (ko) 2015-11-19 2016-05-10 (주)세이퍼존 크로스 플랫폼 기반의 보안시스템
KR101810165B1 (ko) * 2016-01-15 2018-01-25 단국대학교 산학협력단 전자 화폐 단말 및 이를 이용하여 전자 화폐를 제공하는 방법
KR101834522B1 (ko) 2016-04-22 2018-03-06 단국대학교 산학협력단 데이터 확인 장치 및 이를 이용하여 데이터를 확인하는 방법
CN109873787B (zh) * 2017-12-01 2022-09-23 北京安云世纪科技有限公司 一种访问认证方法、装置、系统

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5796824A (en) * 1992-03-16 1998-08-18 Fujitsu Limited Storage medium for preventing an irregular use by a third party
US20050129243A1 (en) * 2002-03-20 2005-06-16 Koninklijke Philips Electronics N.V. Encryption key hiding and recovering method and system
TW201304575A (zh) * 2011-04-12 2013-01-16 Yahoo Inc 以簡訊啟動之行動式登錄
CN103488915A (zh) * 2013-09-24 2014-01-01 无锡德思普科技有限公司 一种软硬件相结合的双重密钥加密的资源加密解密方法

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3119494B2 (ja) * 1991-04-03 2000-12-18 日本電信電話株式会社 カード類の所有者確認方法
DE19629856A1 (de) * 1996-07-24 1998-01-29 Ibm Verfahren und System zum sicheren Übertragen und Speichern von schützbaren Informationen
JPH10260903A (ja) * 1997-03-19 1998-09-29 Hitachi Ltd グループ暗号方法、及びファイル暗号システム
US7475241B2 (en) * 2002-11-22 2009-01-06 Cisco Technology, Inc. Methods and apparatus for dynamic session key generation and rekeying in mobile IP
JP4242682B2 (ja) * 2003-03-26 2009-03-25 パナソニック株式会社 メモリデバイス
US20130227286A1 (en) * 2006-04-25 2013-08-29 Andre Jacques Brisson Dynamic Identity Verification and Authentication, Dynamic Distributed Key Infrastructures, Dynamic Distributed Key Systems and Method for Identity Management, Authentication Servers, Data Security and Preventing Man-in-the-Middle Attacks, Side Channel Attacks, Botnet Attacks, and Credit Card and Financial Transaction Fraud, Mitigating Biometric False Positives and False Negatives, and Controlling Life of Accessible Data in the Cloud
JP2009015471A (ja) * 2007-07-03 2009-01-22 Dainippon Printing Co Ltd Usbストレージデバイス
US20100318782A1 (en) * 2009-06-12 2010-12-16 Microsoft Corporation Secure and private backup storage and processing for trusted computing and data services
KR100988198B1 (ko) * 2010-05-31 2010-10-18 주식회사 아이넵 분산 컴퓨팅 기반 유틸리티 컴퓨팅 환경에서의 정보유출 방지를 위한 암호화 방법 및 이를 위한 시스템
WO2013132462A1 (en) * 2012-03-08 2013-09-12 Oltio (Proprietary) Limited A method of authenticating a device and encrypting data transmitted between the device and a server

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5796824A (en) * 1992-03-16 1998-08-18 Fujitsu Limited Storage medium for preventing an irregular use by a third party
US20050129243A1 (en) * 2002-03-20 2005-06-16 Koninklijke Philips Electronics N.V. Encryption key hiding and recovering method and system
TW201304575A (zh) * 2011-04-12 2013-01-16 Yahoo Inc 以簡訊啟動之行動式登錄
CN103488915A (zh) * 2013-09-24 2014-01-01 无锡德思普科技有限公司 一种软硬件相结合的双重密钥加密的资源加密解密方法

Also Published As

Publication number Publication date
TW201608412A (zh) 2016-03-01
RU2015120264A (ru) 2016-12-20
RU2660604C2 (ru) 2018-07-06
CA2891610A1 (en) 2016-02-19
CA2891610C (en) 2018-08-28
AU2015202697A1 (en) 2016-03-10
BR102015011937A2 (pt) 2016-07-05
KR101479290B1 (ko) 2015-01-05
JP2016046799A (ja) 2016-04-04
JP6172866B2 (ja) 2017-08-02

Similar Documents

Publication Publication Date Title
HK1250414A1 (zh) 檢查系統和檢查裝置
IL249875B (en) Apparatus and system for creating a spray
SG11201607031SA (en) Verification methods and verification devices
GB2533500B (en) Security device
PL3114884T3 (pl) Uwierzytelnianie i identyfikacja urządzenia w chmurze
GB201413836D0 (en) Device security apparatus and methods
SG10201508121WA (en) Ride-share fare calculation device and method
GB2553136B (en) Device and system
GB201405246D0 (en) System and apparatus
PL3548660T3 (pl) Urządzenie oraz system dozujący
GB2534177B (en) Removable security device
GB2541000B (en) Security Device
HK1258768A1 (zh) 安全裝置
GB201620264D0 (en) Dosind device and system
HK1224448A1 (zh) 種校驗方法和裝置
TWI563411B (en) Agent for providing security cloud service and security token device for security cloud service
EP3341620C0 (en) SAFETY DEVICE
PL3073405T3 (pl) Sposób i urządzenie zapewniające bezpieczny dostęp do usługi dostawcy
EP2988245A4 (en) METHOD AND DEVICE FOR INDICATING SECURITY MODE
GB2557202B (en) Dosing device and system
GB201704040D0 (en) Vehicle-mounted device and fault determination method
GB201514427D0 (en) Security device
GB201406031D0 (en) An energy dispensing device and system
GB201612040D0 (en) Security device
GB201607946D0 (en) Security device