WO2004008676A2 - Network attached encryption - Google Patents

Network attached encryption Download PDF

Info

Publication number
WO2004008676A2
WO2004008676A2 PCT/US2003/021695 US0321695W WO2004008676A2 WO 2004008676 A2 WO2004008676 A2 WO 2004008676A2 US 0321695 W US0321695 W US 0321695W WO 2004008676 A2 WO2004008676 A2 WO 2004008676A2
Authority
WO
WIPO (PCT)
Prior art keywords
cryptographic
key server
services
recited
server
Prior art date
Application number
PCT/US2003/021695
Other languages
English (en)
French (fr)
Other versions
WO2004008676A3 (en
Inventor
Thomas Fountain
Alan Frindell
Original Assignee
Ingrian Networks, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ingrian Networks, Inc. filed Critical Ingrian Networks, Inc.
Priority to JP2004521666A priority Critical patent/JP2005533438A/ja
Priority to US10/519,239 priority patent/US20060149962A1/en
Priority to EP03764490A priority patent/EP1540628A4/en
Priority to AU2003251853A priority patent/AU2003251853A1/en
Priority to CN038165589A priority patent/CN1679066B/zh
Publication of WO2004008676A2 publication Critical patent/WO2004008676A2/en
Publication of WO2004008676A3 publication Critical patent/WO2004008676A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0485Networking architectures for enhanced packet encryption processing, e.g. offloading of IPsec packet processing or efficient security association look-up
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C3/00Typewriters for ciphering or deciphering cryptographic text
    • G09C3/04Typewriters for ciphering or deciphering cryptographic text wherein the operative connections between the keys and the type-bars are automatically and continuously permuted, during operation, by a coding or key member
    • G09C3/08Typewriters for ciphering or deciphering cryptographic text wherein the operative connections between the keys and the type-bars are automatically and continuously permuted, during operation, by a coding or key member the connections being electrical
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/166Implementing security features at a particular protocol layer at the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Definitions

  • the present invention relates generally to the field of data security, and more particularly to providing cryptographic network services and securing cryptographic keys in a network environment.
  • SSL and TLS protect data while in transit by encrypting the data using a session-key, (i.e., a cryptographic key), known only to the web server and the client computer.
  • a session-key i.e., a cryptographic key
  • the data is decrypted upon arrival at the receiving ' web server.
  • the receiving server processes the data (e.g., validating the credit card number) and then often stores the sensitive data
  • the cryptographic keys that are used to set up the SSL connection between Web clients and internal Web servers are stored in the same internal Web servers. Similarly, when encryption is performed on data to be stored on back-end application servers and databases, the cryptographic keys are stored in the same back-end application servers, which are usually
  • FIG. 1 illustrates a computer server environment 10 providing networked cryptographic services in accordance with one embodiment of the present invention
  • FIG. 2 diagrammatically illustrates a software architecture in accordance with one embodiment of the present invention
  • FIG. 3 A illustrates a hardware architecture suitable for a networked cryptographic key server in accordance with one embodiment of the present invention
  • FIG. 3B illustrates an operation 150 for backup and restoring of the private keys with respect to a cryptographic server that supports k-out-of-n secret sharing of the group key in accordance with certain embodiments of the present invention
  • FIG. 4 is a flowchart that illustrates a computer-implemented method by which a networked cryptographic key server may provide cryptographic services in accordance with one embodiment of the present invention
  • FIG. 5 is a flowchart that illustrates a computer-implemented method for performing authentication and authorization analysis of a cryptographic request in accordance with one aspect of the present invention
  • FIG. 6 is a flowchart that illustrates a computer-implemented method for enabling applications instantiated on an application server to access remote and local cryptographic services through a standard cryptographic API;
  • FIG. 7 illustrates a distributed cryptographic services computing environment in accordance with certain embodiments of the present invention.
  • FIG. 8 is a block diagram that illustrates a system architecture in which a network security appliance provides networked cryptographic key services in accordance with certain embodiments of the invention.
  • FIG. 9 is a block diagram that illustrates a network architecture including a transparent encryption network security appliance and a cryptographic key server.
  • FIG. 1 illustrates a computer server environment 10 providing networked cryptographic services in accordance with one embodiment of the present invention.
  • the computer server environment 10 includes a plurality of clients 12, an application server 14, and a cryptographic key server 16, all bi-directionally coupled via a computer network 18.
  • the computer network 18 may take the form of any suitable network such as the Internet or a local area network.
  • Bi- directionally coupled to the application server 14 is a network database 20.
  • the application server 14 provides requested services to the clients 12 via the computer network 18. Services requested by the clients 12 may specifically involve cryptographic services, or may precipitate the need for cryptographic services. For example, the client requested services may require the storage of sensitive data on the network database 20, or the retrieval of encrypted data from the network database 20.
  • the cryptographic key server 16 is available to the application server 14 to perform cryptographic services, thus offloading the computational intensities of cryptographic services from the application server 14.
  • the cryptographic key server referred to herein is also known as a Networked Attached
  • Encryption device The nature of the cryptographic services as well as a variety of mechanisms implementing such functionality are described below in more detail.
  • FIG. 2 diagrammatically illustrates a software architecture 50 for an application server 52 and a cryptographic key server 54 in accordance with one embodiment of the present invention.
  • the software architecture of FIG. 2 is not limited to application servers and may vary from implementation to implementation. Any number of computer devices and systems may be a client of cryptographic key server 54.
  • the application server 52 and the cryptographic key server 54 are bi-directionally coupled via a secure network communications channel 56.
  • the secure network communications channel 56 may be effectuated through any suitable secure communications technique such as the secure communications protocols SSL or TLS. Alternatively, a secure channel may be effectuated via a direct physical link or by any means known to those skilled in the art.
  • Software-based application server 52 is only one example of a client that needs the cryptographic services of a cryptographic key server.
  • the application server 52 of FIG. 2 includes a plurality of applications 60, a cryptographic application program interface (API) 62, and a secure network interface engine 64.
  • the applications 60 are software programs instantiated and executing on the application server 52. These applications 60 may provide services to local users of the application server 52, and may provide network services to remote clients via a network connection.
  • the cryptographic API 62 provides a set of standards by which the plurality of applications 60 can invoke a plurality of cryptographic services. According to the present invention, at least one of this plurality of cryptographic services is performed remotely by the cryptographic key server 54. To effectuate networked cryptographic key services, the cryptographic API 62 is responsive to a request for a remote cryptographic service to utilize the secure network interface engine 64 to request the cryptographic services.
  • the cryptographic API 62 is preferably a standardized software cryptographic API which applications developers can easily integrate into their software. Thus, the cryptographic API 62 would take on a specific form relating to the underlying computing environment.
  • underlying computing environments include Java, Microsoft, PKCS #l l/Cryptoki
  • the cryptographic API 62 could be exposed to applications as Java Cryptography Extensions (JCE).
  • JCE Java Cryptography Extensions
  • the JCE could be used or invoked by a variety of sources, including Java Server Pages (JSP), Java servlets, or Enterprise Java Beans (EJB). Java applications capable of using JCE may also be invoked by Active Server Pages (ASP).
  • ASP Active Server Pages
  • applications 60 may directly access the cryptographic key server 54 without the aid of cryptographic API 62.
  • the cryptographic functionality may be exposed, e.g., using VBScript, via a Crypto Service Provider (CSP) that VBScript communicates with using Microsoft Cryptographic API (MS-CAPI).
  • CSP Crypto Service Provider
  • MS-CAPI Microsoft Cryptographic API
  • the CSP or cryptographic API would be implemented as a Dynamic Linked Library that exposes a number of cryptographic operations to the applications 60.
  • the foregoing descriptions of the cryptographic functionality and cryptographic API are in the context of web application servers. However, the cryptographic functionality and cryptographic API are equally applicable for application servers that are non-web-based, such as non-web-based Java applications using JCE and non-web-based Windows applications invoking MS-CAPI, etc.
  • the secure network interface engine 64 is operable to establish the secure network communications channel 56 with the remote cryptographic key server 54.
  • the remote cryptographic key server 54 is operable to establish the secure network communications channel 56 with the secure network interface engine 64.
  • the secure network interface engine is operable, for example, to marshal and transmit secure requests for cryptographic services to the remote cryptographic key server 54, receive and unmarshal secure responses to requests for cryptographic services, and forward such response back to the cryptographic API 62.
  • the cryptographic API 62 provides a response to the requesting application 60.
  • the secure network interface engine 64 could expose secure network services to the applications 60 for use in providing secure communications channels between the applications 60 and clients of the application server 52.
  • the cryptographic API 62 and the secure network interface engine 64 appear as two distinct processes, each instantiated on the application server 52. This allows separate modification of each of these processes.
  • another embodiment of the present invention teaches that the functionality of the cryptographic API 62 and the secure network interface engine 64 are provided as a single process or are included in an application 60.
  • the cryptographic key server 54 includes a cryptographic service engine 70, a secure network interface engine 72, and a private key engine 74.
  • the cryptographic key server 54 is suitable for providing cryptographic services to the application server 52 coupled to said cryptographic key server via the secure network communications channel 56.
  • the secure network interface engine 72 is operable to establish the secure network communications channel 56 with the application server 52.
  • the application server 52 is operable to establish the secure network communications channel 56 with the secure network interface engine 72.
  • the secure network interface engine 72 is operable to unmarshal secured cryptographic service requests received from the application server 52, and marshal and transmit secure cryptographic service responses to the application server 52.
  • the cryptographic service engine 70 executing on the cryptographic key server 54 is bi- directionally coupled with the secure network interface engine 72.
  • the cryptographic service engine 70 is operable to provide cryptographic services requested by the application server 52 via the secure network interface engine 72.
  • Cryptographic services may include: 1) hashing operations, and 2) signing and verification operations such as RSA and DSA.
  • the cryptographic functions exposed to the applications 60 would include those most likely desired by the remote clients. These cryptographic functions must be performed either at the application server 52, or more preferably at the cryptographic key server 54 in order to offload from the application server 52 the burden of performing cryptographic services. Thus, it is preferred that the cryptographic service engine 70 be capable of performing any exposed cryptographic services not provided at the application server 52. Typical exposed functionality would include, but is not limited to, functions such as encryption and decryption (e.g. DES, 3DES, AES, RSA, DSA, ECC, etc.), signing and verification (e.g. RSA, DSA, etc.), and hashing and verification (e.g. SHA-1, HMAC, etc.).
  • encryption and decryption e.g. DES, 3DES, AES, RSA, DSA, ECC, etc.
  • signing and verification e.g. RSA, DSA, etc.
  • hashing and verification e.g. SHA-1, HMAC, etc.
  • encryption and decryption functions include: symmetric block ciphers, generic cipher modes, stream cipher modes, public-key cryptography, padding schemes for public-key systems, key agreement schemes, elliptic curve cryptography, one-way hash functions, message authentication codes, cipher constructions based on hash functions, pseudo random number generators, password based key derivation functions,
  • the private key engine 74 provides the cryptographic service engine 70 the private keys required for performing cryptographic operations.
  • Such private keys can be generated and stored through a variety of mechanisms known in the art, as well as by several methods contemplated by the present invention. One preferred embodiment for generating and handling the private keys is described below with reference to FIG. 3.
  • the cryptographic service engine 70 and the secure network interface engine 72 appear as two distinct processes each instantiated on the cryptographic service engine 70. This allows separate modification of each of these processes.
  • another embodiment of the present invention teaches that the functionality of cryptographic service engine 70 and the secure network interface engine 72 are provided as a single process.
  • FIG. 3 A illustrates a hardware architecture 100 suitable for a networked cryptographic key server such as cryptographic key server 54 of FIG. 2 in accordance with one embodiment of the present invention.
  • the hardware architecture 100 includes a central processing unit (CPU) 104, a persistent storage device 106 such as a hard disk, a transient storage device 108 such as random access memory (RAM), a network I/O device 110, an encryption device 112 such as a cryptographic accelerator card, a hardware security module (HSM) 114, and a smart card interface 116, all bi-directionally coupled via a databus 102.
  • Other additional components may be part of the hardware architecture 100.
  • the private keys 120 are loaded into HSM 114 and stored in an encrypted format.
  • the HSM 114 is a tamper resistant device.
  • the private keys 120 are encrypted using a group key known only to a small, predefined group of cryptographic key servers. These group keys are protected by smart cards. When a backup operation is performed on one member of the predefined group of cryptographic servers, an encrypted form of the original cryptographic key is created as a backup file. Only cryptographic servers that are part of the predefined group of devices are able to decrypt the encrypted key using a separate cryptographic key.
  • the cryptographic server also supports k-out-of-n secret sharing of the group key for increased security. This means that the cryptographic server requires smart cards for backup and restoring of the private keys. For example, if the group key information is distributed across a group of five smart cards (n), preferences can be set so that group data can be accessed only after inserting three smart cards (k) into the smart card reader 116. Any attempt to access the data with less than three smart cards will fail. Using a k of n schema ensures data safety; if a single card is stolen, the thief will not be able to access the configuration data stored on the HSM 114 because the thief does not have enough cards to meet the k of n criteria set forth above.
  • FIG. 3B illustrates an operation 150 for backup and restoring of the private keys with respect to a cryptographic server that supports k-out-of-n secret sharing of the group key.
  • step 152 a request for backup and restoring of the private keys is received.
  • step 154 in response to the request for backup, it is determined whether at least k- out-of-n smart cards has been inserted, is a smart card interface device associated with cryptographic server at which the request for backup was made. If it is determined that at least k- out-of-n smart cards has not been inserted, then at step 156, the request for backup and restoring is denied.
  • a networked cryptographic key server such as cryptographic key server 16 or 54 may provide cryptographic services in accordance with one embodiment of the present invention
  • a set of private keys is established on the networked key server. These private keys may be generated and maintained according to any suitable mechanism.
  • the private keys are stored within a tamper-resistant hardware device and are not distributed across the network, but rather are managed through a process such as that described above with reference to the HSM 114 of FIG. 3. Subsequent requests for cryptographic services by a given application server for which a set of private keys is already established on the networked key server do not involve step 202.
  • a secure network communications channel is established between the application server and the cryptographic key server.
  • a connection pool is established between the application server and the key server prior to the client's request of any specific cryptographic services.
  • the connection pool can be maintained indefinitely or may be closed due to inactivity. Establishing a secure connection is processing intensive, so once the secure connection is established it is efficient to maintain the secure connection.
  • the secure channel may be established with SSL or TLS, or any suitable method known in the art. In many situations, HTTPS with server and client certificates might be used.
  • the identity of the requesting entity is verified, i.e., authenticated.
  • step 216 performs housekeeping functions related to a failed request for services as explained below.
  • the cryptographic key server may be used to provide cryptographic services.
  • the key server receives a request for cryptographic services via the secure channel.
  • the key server will unmarshal the request from encrypted network format. As described above with reference to FIG. 2, in certain embodiments this may be performed by a secure network interface engine.
  • the key server will perform an authorization analysis of the cryptographic service request. The authorization analysis of step 208 determines whether the requested services should be provided to the requesting client.
  • One embodiment of step 208 is described below in more detail with reference to FIG. 4.
  • step 208 determines that the request may be performed
  • process control flows from step 208 to a step 210 that performs the requested cryptographic services.
  • the application server may be requesting that certain data be encrypted or decrypted.
  • the cryptographic key server will respond to the application server via the secure channel. This includes marshalling the data into secure format for transmission across the network.
  • a variety of housekeeping functions related to satisfaction of an authorized request are performed. In certain embodiments, these include maintaining a database related to cryptographic requests (time, client identity, service requested, satisfactory completion, etc.)
  • a step 216 performs housekeeping functions related to a failed request for services. In certain embodiments, this includes include maintaining a database related to cryptographic requests (time, client identity, service requested, etc.). This database can be used to evaluate whether an attack is being made, or to determine errors in the system.
  • a computer-implemented method 208 for performing authorization analysis of a cryptographic request in accordance with one aspect of the present invention will now be described in more detail.
  • the method 208 is invoked when a remote application server requests that a cryptographic key server perform certain cryptographic functions for the application server, likely on behalf of a client of the application server.
  • a first step 250 the authorization privileges granted to the application server, the application, and the client are determined. If the authorization privileges granted to the application server, the application, and the client cannot be determined, then the authorization test of step 250 is deemed to have failed. When the authorization test of step 250 fails, then the request is denied in a step 252.
  • a step 254 determines whether the specific request is within the rights of the requesting entity. For example, a certain application running on the application server may not be entitled to decrypt certain data, or simply may not be entitled to decrypt data whatsoever, even though that same application may be entitled to encrypt data. In any event, when the request is not within the rights of the requesting entity, the request is denied in step 252. When the request is within the rights of the requesting entity, the request is approved in a step 256 and process control proceeds to implement the requested cryptographic services.
  • Steps 302 and 304 are initialization steps to make the cryptographic services available to applications.
  • a standardized software cryptographic API is integrated within the application server.
  • the cryptographic API can be designed for the specific computing environment (Java, Microsoft, etc.) of the application server.
  • the cryptographic services are exposed to an application instantiated on the application server so that service requests may be made within executing applications.
  • Cryptographic providers allow programmers to develop application software utilizing standard cryptography made available by the cryptographic API.
  • an application calls a cryptographic function and the cryptographic API receives this request for service.
  • This request is processed by the cryptographic API to determine whether the request should be passed along to the remote cryptographic server, or performed locally or perhaps the application server performs some authentication and authorization locally prior to allowing a request for cryptographic services to be passed along.
  • a step 308 attends to marshalling and transmitting the request.
  • the marshalling and transmission is performed by a secure network interface engine via a previously established secure network transmission channel.
  • the application server receives and unmarshals a response to a cryptographic service request.
  • the receipt and unmarshalling of responses is performed by a secure network interface engine via a previously established secure network transmission channel. The response is provided to the cryptographic API and in a step
  • the cryptographic API provides a response to the requesting application in a suitable format.
  • FIG. 7 illustrates a distributed cryptographic services computing environment 400 in accordance with certain embodiments of the present invention.
  • the computing environment 400 includes a plurality of cryptographic key servers 402, a plurality of application servers 404, and a plurality of clients 406, all bi-directionally coupled with a wide area network 408 such as the
  • the cryptographic key servers 402 and application servers 404 may take any suitable form. For example, the embodiments described above with reference to FIGS. 1 - 3 would be suitable.
  • the plurality of cryptographic key servers 402 may operate in an independent fashion, each providing services in an independent fashion.
  • a specific cryptographic key server 402 could act as a manager of all services, directing all requests from the application servers 404 to the other cryptographic key servers 402 based on a predetermined load balancing scheme.
  • FIG. 8 shows a block diagram of a system architecture 500 in which a network security appliance provides networked cryptographic key services.
  • the system architecture 500 includes a plurality of clients 502, a wide area network 504 such as the Internet, a network security appliance 506, and an application server 508.
  • a network security appliance 506 provides networked cryptographic key services.
  • the system architecture 500 includes a plurality of clients 502, a wide area network 504 such as the Internet, a network security appliance 506, and an application server 508.
  • the network security appliance 506 all other elements of FIG. 8 will be readily understood by referring to the above description of FIGS. 1 - 7.
  • the network security appliance 506 physically resides between the application server 508 and the network 504. Those skilled in the art will be familiar with network security appliances and their general operation. Some of the services which may be provided by the network security appliance 506 include secure transmission between the clients 502 and the application server 508, secure caching reducing strain upon the application server 508 and improving response time to users, SSL and TLS acceleration, transparent encryption services, client authentication, etc. According to the embodiment of FIG. 8, the network security appliance 506 further provides cryptographic key services to the application server 508.
  • the network security appliance 506 may have a software architecture as described above with reference to cryptographic key server 54 of FIG. 2. Likewise, the network security appliance 506 may have a hardware architecture 100 as described above with reference to cryptographic key server of FIG. 3. The methods described above with reference to FIGS. 4 - 6 may well apply to the operation of the network security appliance 506 and the application server 508.
  • FIG. 9 is a block diagram that illustrates a network architecture 600 including a plurality of clients 602, a wide area network 604 such as the Internet, a transparent encryption appliance 606, a plurality of application servers 608, a local area network 610, at least one cryptographic key server 612, two or more network databases 614, and a plurality of back-end servers 616.
  • the transparent encryption appliance 606 is configured to inspect all requests entering the site via the network 604, and encrypts sensitive data using one of the installed private keys 120.
  • the transparent encryption appliance 606 and the cryptographic key server 612 are both members of a predefined group of TE Appliances that share a group key, and are loaded with the same private keys 120.
  • Multiple application servers 608 are able to request cryptographic services from the cryptographic key server 612, as are back-end servers 616, via the local area network 610.
  • appli ⁇ ation server 608 is a web server, and the client 602 provides a credit card number to web server 608 over the network 604 via a secure session.
  • TE Appliance 606 detects that the credit card number is sensitive information and encrypts this data using one of the installed private keys 120, so that web server 608 does not manage the sensitive information in the clear.
  • the credit card number is stored in network database 614 only in encrypted form.
  • Back-end server 616 needs to access the client credit card number to retrieve account information, and make a request to cryptographic key server 612 to decrypt the credit card number.
  • back-end server 616 is authorized to access the client credit card number, and therefore cryptographic key server 612 decrypts the credit card number as requested.
  • aspects of the invention can be embodied in a special purpose computer or data processor that is specifically programmed, configured or constructed to perform one or more of the computer-executable instructions explained in detail below.
  • the term "computer,” as used generally herein, refers to any of the above devices, as well as any data processor.
  • processor as generally used herein refers to any logic processing unit, such as one or more central processing units (CPUs), digital signal processors (DSPs), application-specific integrated circuits (ASIC), etc.
  • CPUs central processing units
  • DSPs digital signal processors
  • ASIC application-specific integrated circuits
PCT/US2003/021695 2002-07-12 2003-07-11 Network attached encryption WO2004008676A2 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
JP2004521666A JP2005533438A (ja) 2002-07-12 2003-07-11 ネットワークに付随する暗号化
US10/519,239 US20060149962A1 (en) 2003-07-11 2003-07-11 Network attached encryption
EP03764490A EP1540628A4 (en) 2002-07-12 2003-07-11 NETWORK CLOSED ENCRYPTION
AU2003251853A AU2003251853A1 (en) 2002-07-12 2003-07-11 Network attached encryption
CN038165589A CN1679066B (zh) 2002-07-12 2003-07-11 加密密钥服务器

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US39568502P 2002-07-12 2002-07-12
US60/395,685 2002-07-12

Publications (2)

Publication Number Publication Date
WO2004008676A2 true WO2004008676A2 (en) 2004-01-22
WO2004008676A3 WO2004008676A3 (en) 2004-04-01

Family

ID=30115910

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2003/021695 WO2004008676A2 (en) 2002-07-12 2003-07-11 Network attached encryption

Country Status (6)

Country Link
EP (1) EP1540628A4 (ja)
JP (1) JP2005533438A (ja)
KR (1) KR20050026478A (ja)
CN (1) CN1679066B (ja)
AU (1) AU2003251853A1 (ja)
WO (1) WO2004008676A2 (ja)

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2429117A2 (en) 2010-09-14 2012-03-14 Hitachi Ltd. Cryptographic device management method, cryptographic device management server, and program
WO2013101731A1 (en) * 2011-12-29 2013-07-04 Imation Corp. Cloud-based hardware security modules
US20140229739A1 (en) 2013-02-12 2014-08-14 Amazon Technologies, Inc. Delayed data access
US9118665B2 (en) 2007-04-18 2015-08-25 Imation Corp. Authentication system and method
US9197407B2 (en) 2011-07-19 2015-11-24 Cyberlink Corp. Method and system for providing secret-less application framework
CN105409159A (zh) * 2013-07-18 2016-03-16 日本电信电话株式会社 密钥保管装置、密钥保管方法、以及其程序
US10055594B2 (en) 2012-06-07 2018-08-21 Amazon Technologies, Inc. Virtual service provider zones
US10075295B2 (en) 2013-02-12 2018-09-11 Amazon Technologies, Inc. Probabilistic key rotation
US10075471B2 (en) 2012-06-07 2018-09-11 Amazon Technologies, Inc. Data loss prevention techniques
US10084818B1 (en) 2012-06-07 2018-09-25 Amazon Technologies, Inc. Flexibly configurable data modification services
EP3382612A1 (de) * 2017-03-31 2018-10-03 Siemens Aktiengesellschaft Verfahren und vorrichtung zum rechnergestützten bereitstellen sicherheitsgeschützter satellitennavigationsdatensätze
US10211977B1 (en) 2013-02-12 2019-02-19 Amazon Technologies, Inc. Secure management of information using a security module
US10313312B2 (en) 2013-06-13 2019-06-04 Amazon Technologies, Inc. Key rotation techniques
US10404670B2 (en) 2013-02-12 2019-09-03 Amazon Technologies, Inc. Data security service
US10467422B1 (en) 2013-02-12 2019-11-05 Amazon Technologies, Inc. Automatic key rotation
US10587405B2 (en) 2014-06-27 2020-03-10 Amazon Technologies, Inc. Supporting a fixed transaction rate with a variably-backed logical cryptographic key
US10666436B2 (en) 2013-02-12 2020-05-26 Amazon Technologies, Inc. Federated key management
US10721075B2 (en) 2014-05-21 2020-07-21 Amazon Technologies, Inc. Web of trust management in a distributed system
US11036869B2 (en) 2013-02-12 2021-06-15 Amazon Technologies, Inc. Data security with a security module
US11626996B2 (en) 2014-09-15 2023-04-11 Amazon Technologies, Inc. Distributed system web of trust provisioning

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4961798B2 (ja) * 2005-05-20 2012-06-27 株式会社日立製作所 暗号化通信方法及びシステム
CN101141251B (zh) * 2006-09-08 2012-05-23 华为技术有限公司 通信系统中消息加密签名的方法及系统和设备
US20080178010A1 (en) 2007-01-18 2008-07-24 Vaterlaus Robert K Cryptographic web service
JP4902633B2 (ja) * 2008-12-17 2012-03-21 日本電信電話株式会社 Webシステムおよびリクエスト処理方法
KR101008896B1 (ko) * 2009-04-16 2011-01-17 동서대학교산학협력단 에이티에이 기반 가상 저장 시스템을 위한 안전한 데이터 전송 방법
US9992190B2 (en) * 2013-08-22 2018-06-05 Nippon Telegraph And Telephone Corporation Multi-party secure authentication system, authentication server, intermediate server, multi-party secure authentication method, and program
CN103532964B (zh) * 2013-10-22 2016-09-07 邱文乔 一种验证tcp连接安全性的方法
CN104717195A (zh) * 2013-12-17 2015-06-17 中国移动通信集团福建有限公司 业务系统密码管理方法和装置
JP6287282B2 (ja) * 2014-02-04 2018-03-07 日本電気株式会社 情報処理装置及び情報処理方法、情報処理システム、並びにコンピュータ・プログラム
CN103916233B (zh) * 2014-03-28 2018-05-29 小米科技有限责任公司 一种信息加密方法及装置
JP6792133B2 (ja) * 2014-08-07 2020-11-25 キヤノンマーケティングジャパン株式会社 サーバと、その処理方法及びプログラム
CN105991622A (zh) * 2015-03-05 2016-10-05 阿里巴巴集团控股有限公司 一种报文验证方法及设备
CN106157028B (zh) * 2015-04-15 2021-03-26 航天信息股份有限公司 一种基于可信平台的金融ic卡多次发卡系统及方法
KR101610182B1 (ko) 2015-06-18 2016-04-08 (주)가바플러스 원격서비스 시스템의 클라이언트 단말기 보안장치 및 그 방법
KR101693249B1 (ko) * 2015-09-08 2017-01-06 충북대학교 산학협력단 어플리케이션 관리 시스템 및 방법
CN105516083A (zh) * 2015-11-25 2016-04-20 上海华为技术有限公司 一种数据安全管理的方法、装置及系统
CN105704148A (zh) * 2016-03-24 2016-06-22 广州三星通信技术研究有限公司 安全传输信息的方法和设备
CN106027646B (zh) * 2016-05-19 2019-06-21 北京云钥网络科技有限公司 一种加速https的方法及装置
CN109005187A (zh) * 2018-08-21 2018-12-14 广州飞硕信息科技股份有限公司 一种通信信息保护方法及装置
CN110912852B (zh) * 2018-09-14 2022-04-08 阿里巴巴集团控股有限公司 获取密钥的方法、装置和系统,存储介质和计算机终端
JP7041650B2 (ja) * 2019-07-31 2022-03-24 株式会社Sbi Bits 秘密鍵を再製するためのシステム

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5828832A (en) * 1996-07-30 1998-10-27 Itt Industries, Inc. Mixed enclave operation in a computer network with multi-level network security
US6073242A (en) * 1998-03-19 2000-06-06 Agorics, Inc. Electronic authority server
US6202157B1 (en) * 1997-12-08 2001-03-13 Entrust Technologies Limited Computer network security system and method having unilateral enforceable security policy provision
US6397330B1 (en) * 1997-06-30 2002-05-28 Taher Elgamal Cryptographic policy filters and policy control method and apparatus

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH07170280A (ja) * 1993-12-15 1995-07-04 Ricoh Co Ltd ローカルエリアネットワーク
JPH1188321A (ja) * 1997-09-02 1999-03-30 Kiyadeitsukusu:Kk ディジタル署名生成サーバ
US6484259B1 (en) * 1999-07-23 2002-11-19 Microsoft Corporation Methods and arrangements for mapping widely disparate portable tokens to a static machine concentric cryptographic environment
DE60040612D1 (de) * 1999-11-10 2008-12-04 Unisys Corp Dundanten und flexibelen diensten
US7373656B2 (en) * 2000-10-27 2008-05-13 Sandisk Il Ltd. Automatic configuration for portable devices

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5828832A (en) * 1996-07-30 1998-10-27 Itt Industries, Inc. Mixed enclave operation in a computer network with multi-level network security
US6397330B1 (en) * 1997-06-30 2002-05-28 Taher Elgamal Cryptographic policy filters and policy control method and apparatus
US6202157B1 (en) * 1997-12-08 2001-03-13 Entrust Technologies Limited Computer network security system and method having unilateral enforceable security policy provision
US6073242A (en) * 1998-03-19 2000-06-06 Agorics, Inc. Electronic authority server

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP1540628A2 *

Cited By (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9118665B2 (en) 2007-04-18 2015-08-25 Imation Corp. Authentication system and method
US9736150B2 (en) 2007-04-18 2017-08-15 Datalocker Inc. Authentication system and method
EP2429117A3 (en) * 2010-09-14 2012-10-24 Hitachi Ltd. Cryptographic device management method, cryptographic device management server, and program
EP2429117A2 (en) 2010-09-14 2012-03-14 Hitachi Ltd. Cryptographic device management method, cryptographic device management server, and program
US9197407B2 (en) 2011-07-19 2015-11-24 Cyberlink Corp. Method and system for providing secret-less application framework
WO2013101731A1 (en) * 2011-12-29 2013-07-04 Imation Corp. Cloud-based hardware security modules
US10075471B2 (en) 2012-06-07 2018-09-11 Amazon Technologies, Inc. Data loss prevention techniques
US10834139B2 (en) 2012-06-07 2020-11-10 Amazon Technologies, Inc. Flexibly configurable data modification services
US10474829B2 (en) 2012-06-07 2019-11-12 Amazon Technologies, Inc. Virtual service provider zones
US10055594B2 (en) 2012-06-07 2018-08-21 Amazon Technologies, Inc. Virtual service provider zones
US10084818B1 (en) 2012-06-07 2018-09-25 Amazon Technologies, Inc. Flexibly configurable data modification services
US10075295B2 (en) 2013-02-12 2018-09-11 Amazon Technologies, Inc. Probabilistic key rotation
US10666436B2 (en) 2013-02-12 2020-05-26 Amazon Technologies, Inc. Federated key management
US11036869B2 (en) 2013-02-12 2021-06-15 Amazon Technologies, Inc. Data security with a security module
US10210341B2 (en) 2013-02-12 2019-02-19 Amazon Technologies, Inc. Delayed data access
US10211977B1 (en) 2013-02-12 2019-02-19 Amazon Technologies, Inc. Secure management of information using a security module
US11372993B2 (en) 2013-02-12 2022-06-28 Amazon Technologies, Inc. Automatic key rotation
US10382200B2 (en) 2013-02-12 2019-08-13 Amazon Technologies, Inc. Probabilistic key rotation
US10404670B2 (en) 2013-02-12 2019-09-03 Amazon Technologies, Inc. Data security service
US10467422B1 (en) 2013-02-12 2019-11-05 Amazon Technologies, Inc. Automatic key rotation
US11695555B2 (en) 2013-02-12 2023-07-04 Amazon Technologies, Inc. Federated key management
US20140229739A1 (en) 2013-02-12 2014-08-14 Amazon Technologies, Inc. Delayed data access
US10313312B2 (en) 2013-06-13 2019-06-04 Amazon Technologies, Inc. Key rotation techniques
US10601789B2 (en) 2013-06-13 2020-03-24 Amazon Technologies, Inc. Session negotiations
US11470054B2 (en) 2013-06-13 2022-10-11 Amazon Technologies, Inc. Key rotation techniques
US11323479B2 (en) 2013-07-01 2022-05-03 Amazon Technologies, Inc. Data loss prevention techniques
EP3010173A4 (en) * 2013-07-18 2017-03-08 Nippon Telegraph And Telephone Corporation Key storage device, key storage method, and program therefor
CN105409159A (zh) * 2013-07-18 2016-03-16 日本电信电话株式会社 密钥保管装置、密钥保管方法、以及其程序
US10721075B2 (en) 2014-05-21 2020-07-21 Amazon Technologies, Inc. Web of trust management in a distributed system
US10587405B2 (en) 2014-06-27 2020-03-10 Amazon Technologies, Inc. Supporting a fixed transaction rate with a variably-backed logical cryptographic key
US11368300B2 (en) 2014-06-27 2022-06-21 Amazon Technologies, Inc. Supporting a fixed transaction rate with a variably-backed logical cryptographic key
US11626996B2 (en) 2014-09-15 2023-04-11 Amazon Technologies, Inc. Distributed system web of trust provisioning
EP3382612A1 (de) * 2017-03-31 2018-10-03 Siemens Aktiengesellschaft Verfahren und vorrichtung zum rechnergestützten bereitstellen sicherheitsgeschützter satellitennavigationsdatensätze

Also Published As

Publication number Publication date
EP1540628A2 (en) 2005-06-15
AU2003251853A1 (en) 2004-02-02
CN1679066B (zh) 2011-08-31
KR20050026478A (ko) 2005-03-15
JP2005533438A (ja) 2005-11-04
WO2004008676A3 (en) 2004-04-01
CN1679066A (zh) 2005-10-05
AU2003251853A8 (en) 2004-02-02
EP1540628A4 (en) 2010-08-04

Similar Documents

Publication Publication Date Title
US20060149962A1 (en) Network attached encryption
WO2004008676A2 (en) Network attached encryption
CN111066286B (zh) 使用高可用性的可信执行环境检索区块链网络的公共数据
US20200329041A1 (en) Cross-region requests
US10680827B2 (en) Asymmetric session credentials
US9584517B1 (en) Transforms within secure execution environments
US8261087B2 (en) Digipass for web-functional description
US8719572B2 (en) System and method for managing authentication cookie encryption keys
US9673984B2 (en) Session key cache to maintain session keys
US9425958B2 (en) System, method and apparatus for cryptography key management for mobile devices
US8989390B2 (en) Certify and split system and method for replacing cryptographic keys
US10182044B1 (en) Personalizing global session identifiers
US11675922B2 (en) Secure storage of and access to files through a web application
US20060291664A1 (en) Automated key management system
US20020150243A1 (en) Method and system for controlled distribution of application code and content data within a computer network
US20020107804A1 (en) System and method for managing trust between clients and servers
CN110489996B (zh) 一种数据库数据安全管理方法及系统
US9509504B2 (en) Cryptographic key manager for application servers
CN114244508A (zh) 数据加密方法、装置、设备及存储介质
CN113312576A (zh) 一种页面跳转方法、系统及装置
CN116049802B (zh) 应用单点登陆方法、系统、计算机设备和存储介质
Sarhan et al. Secure android-based mobile banking scheme
AU2012101560B4 (en) Transaction verification
WO2003067850A1 (en) Verifying digital content integrity
Fernando et al. Information Security

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2004521666

Country of ref document: JP

Ref document number: 1020057000614

Country of ref document: KR

Ref document number: 20038165589

Country of ref document: CN

WWE Wipo information: entry into national phase

Ref document number: 2003764490

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 1020057000614

Country of ref document: KR

WWP Wipo information: published in national office

Ref document number: 2003764490

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2006149962

Country of ref document: US

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 10519239

Country of ref document: US

WWP Wipo information: published in national office

Ref document number: 10519239

Country of ref document: US