WO2006078560A3 - Roaming utilizing an asymmetric key pair - Google Patents
Roaming utilizing an asymmetric key pair Download PDFInfo
- Publication number
- WO2006078560A3 WO2006078560A3 PCT/US2006/001261 US2006001261W WO2006078560A3 WO 2006078560 A3 WO2006078560 A3 WO 2006078560A3 US 2006001261 W US2006001261 W US 2006001261W WO 2006078560 A3 WO2006078560 A3 WO 2006078560A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- generated
- key
- symmetric key
- symmetric
- network location
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0872—Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
Abstract
Techniques for generating a portion of a split private key are provided. A first symmetric key and a second symmetric key different than the first symmetric key are generated at a first location. The generated second symmetric key and a first one of multiple factors for generating the private key portion encrypted with the generated first symmetric key are transmitted. Then, at a second network location, the symmetric keys are again generated. The encrypted first factor is received at the second network location subsequent to a user authentication based upon the second symmetric key generated at the second network location. The received encrypted first factor is then decrypted with the first symmetric key generated at the second network location, the decrypted first factor usable to generate the portion of the split private key of the asymmetric key pair.
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US64402805P | 2005-01-18 | 2005-01-18 | |
US60/644,028 | 2005-01-18 | ||
US11/056,116 US20060182277A1 (en) | 2005-02-14 | 2005-02-14 | Roaming utilizing an asymmetric key pair |
US11/056,116 | 2005-02-14 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2006078560A2 WO2006078560A2 (en) | 2006-07-27 |
WO2006078560A3 true WO2006078560A3 (en) | 2007-11-22 |
Family
ID=36692749
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2006/001261 WO2006078560A2 (en) | 2005-01-18 | 2006-01-13 | Roaming utilizing an asymmetric key pair |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2006078560A2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110650160B (en) * | 2019-10-29 | 2022-01-04 | 北京天威诚信电子商务服务有限公司 | Identity authentication method and system |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102006045352B4 (en) | 2006-09-26 | 2015-02-12 | Nokia Solutions And Networks Gmbh & Co. Kg | Procedure for single sign-on when using a set-top box |
CN110149209B (en) * | 2019-04-15 | 2022-06-28 | 深圳奇迹智慧网络有限公司 | Internet of things equipment and method and device for improving data transmission safety of Internet of things equipment |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020078345A1 (en) * | 2000-12-19 | 2002-06-20 | Ravi Sandhu | System and method for authentication in a crypto-system utilizing symmetric and asymmetric crypto-keys |
-
2006
- 2006-01-13 WO PCT/US2006/001261 patent/WO2006078560A2/en active Application Filing
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020078345A1 (en) * | 2000-12-19 | 2002-06-20 | Ravi Sandhu | System and method for authentication in a crypto-system utilizing symmetric and asymmetric crypto-keys |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110650160B (en) * | 2019-10-29 | 2022-01-04 | 北京天威诚信电子商务服务有限公司 | Identity authentication method and system |
Also Published As
Publication number | Publication date |
---|---|
WO2006078560A2 (en) | 2006-07-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2006130616A3 (en) | Augmented single factor split key asymmetric cryptography-key generation and distributor | |
WO2007011991A3 (en) | Hybrid symmetric/asymmetric cryptography with user authentication | |
WO2008080800A3 (en) | Securing communication | |
WO2008121157A3 (en) | Cryptographic key management system facilitating secure access of data portions to corresponding groups of users | |
WO2010141445A3 (en) | Workgroup key wrapping for community of interest membership authentication | |
WO2008021855A3 (en) | Ad-hoc network key management | |
WO2006119184A3 (en) | Protecting one-time-passwords against man-in-the-middle attacks | |
WO2004102918A3 (en) | Key agreement and transport protocol | |
WO2006078558A3 (en) | Multiple factor private portion of an asymmetric key | |
WO2010105915A3 (en) | Method for providing a cryptic pair of keys | |
WO2011033259A3 (en) | Key generation for multi-party encryption | |
WO2012044855A3 (en) | Secure multi-party communication with quantum key distribution managed by trusted authority | |
WO2014176046A3 (en) | Community of interest-based secured communications over ipsec | |
HK1095950A1 (en) | Deploying and provisioning wireless handheld devices | |
WO2006133413A3 (en) | Method and apparatus for establishing a key agreement protocol | |
WO2011094096A3 (en) | Establishing, at least in part, secure communication channel between nodes so as to permit inspection, at least in part, of encrypted communication carried out, at least in part, between the nodes | |
WO2016144257A3 (en) | Method and system for facilitating authentication | |
TWI264912B (en) | Method and apparatus for building operational radio firmware using incrementally certified modules | |
WO2011163044A3 (en) | A method and apparatus for key revocation in an attribute-based encryption scheme | |
WO2006078572A3 (en) | Asymmetric crypto-graphy with rolling key security | |
WO2006116061A3 (en) | Wireless device discovery and configuration | |
WO2007075156A3 (en) | Cryptography related to keys | |
DE60326092D1 (en) | SAVING AND AUTHENTICATION OF DATA TRANSACTIONS | |
WO2006086721A3 (en) | Context limited shared secret | |
WO2006115996A3 (en) | Mediated key exchange between source and target of communication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DPE1 | Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101) | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 06718348 Country of ref document: EP Kind code of ref document: A2 |