WO2006078560A3 - Roaming utilizing an asymmetric key pair - Google Patents

Roaming utilizing an asymmetric key pair Download PDF

Info

Publication number
WO2006078560A3
WO2006078560A3 PCT/US2006/001261 US2006001261W WO2006078560A3 WO 2006078560 A3 WO2006078560 A3 WO 2006078560A3 US 2006001261 W US2006001261 W US 2006001261W WO 2006078560 A3 WO2006078560 A3 WO 2006078560A3
Authority
WO
WIPO (PCT)
Prior art keywords
generated
key
symmetric key
symmetric
network location
Prior art date
Application number
PCT/US2006/001261
Other languages
French (fr)
Other versions
WO2006078560A2 (en
Inventor
Ravinderpal Singh Sandhu
Brett Jason Schoppert
Ravi Ganesan
Mihir Bellare
Colin Joseph Desa
Original Assignee
Tricipher Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US11/056,116 external-priority patent/US20060182277A1/en
Application filed by Tricipher Inc filed Critical Tricipher Inc
Publication of WO2006078560A2 publication Critical patent/WO2006078560A2/en
Publication of WO2006078560A3 publication Critical patent/WO2006078560A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0872Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Abstract

Techniques for generating a portion of a split private key are provided. A first symmetric key and a second symmetric key different than the first symmetric key are generated at a first location. The generated second symmetric key and a first one of multiple factors for generating the private key portion encrypted with the generated first symmetric key are transmitted. Then, at a second network location, the symmetric keys are again generated. The encrypted first factor is received at the second network location subsequent to a user authentication based upon the second symmetric key generated at the second network location. The received encrypted first factor is then decrypted with the first symmetric key generated at the second network location, the decrypted first factor usable to generate the portion of the split private key of the asymmetric key pair.
PCT/US2006/001261 2005-01-18 2006-01-13 Roaming utilizing an asymmetric key pair WO2006078560A2 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US64402805P 2005-01-18 2005-01-18
US60/644,028 2005-01-18
US11/056,116 US20060182277A1 (en) 2005-02-14 2005-02-14 Roaming utilizing an asymmetric key pair
US11/056,116 2005-02-14

Publications (2)

Publication Number Publication Date
WO2006078560A2 WO2006078560A2 (en) 2006-07-27
WO2006078560A3 true WO2006078560A3 (en) 2007-11-22

Family

ID=36692749

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2006/001261 WO2006078560A2 (en) 2005-01-18 2006-01-13 Roaming utilizing an asymmetric key pair

Country Status (1)

Country Link
WO (1) WO2006078560A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110650160B (en) * 2019-10-29 2022-01-04 北京天威诚信电子商务服务有限公司 Identity authentication method and system

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102006045352B4 (en) 2006-09-26 2015-02-12 Nokia Solutions And Networks Gmbh & Co. Kg Procedure for single sign-on when using a set-top box
CN110149209B (en) * 2019-04-15 2022-06-28 深圳奇迹智慧网络有限公司 Internet of things equipment and method and device for improving data transmission safety of Internet of things equipment

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020078345A1 (en) * 2000-12-19 2002-06-20 Ravi Sandhu System and method for authentication in a crypto-system utilizing symmetric and asymmetric crypto-keys

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020078345A1 (en) * 2000-12-19 2002-06-20 Ravi Sandhu System and method for authentication in a crypto-system utilizing symmetric and asymmetric crypto-keys

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110650160B (en) * 2019-10-29 2022-01-04 北京天威诚信电子商务服务有限公司 Identity authentication method and system

Also Published As

Publication number Publication date
WO2006078560A2 (en) 2006-07-27

Similar Documents

Publication Publication Date Title
WO2006130616A3 (en) Augmented single factor split key asymmetric cryptography-key generation and distributor
WO2007011991A3 (en) Hybrid symmetric/asymmetric cryptography with user authentication
WO2008080800A3 (en) Securing communication
WO2008121157A3 (en) Cryptographic key management system facilitating secure access of data portions to corresponding groups of users
WO2010141445A3 (en) Workgroup key wrapping for community of interest membership authentication
WO2008021855A3 (en) Ad-hoc network key management
WO2006119184A3 (en) Protecting one-time-passwords against man-in-the-middle attacks
WO2004102918A3 (en) Key agreement and transport protocol
WO2006078558A3 (en) Multiple factor private portion of an asymmetric key
WO2010105915A3 (en) Method for providing a cryptic pair of keys
WO2011033259A3 (en) Key generation for multi-party encryption
WO2012044855A3 (en) Secure multi-party communication with quantum key distribution managed by trusted authority
WO2014176046A3 (en) Community of interest-based secured communications over ipsec
HK1095950A1 (en) Deploying and provisioning wireless handheld devices
WO2006133413A3 (en) Method and apparatus for establishing a key agreement protocol
WO2011094096A3 (en) Establishing, at least in part, secure communication channel between nodes so as to permit inspection, at least in part, of encrypted communication carried out, at least in part, between the nodes
WO2016144257A3 (en) Method and system for facilitating authentication
TWI264912B (en) Method and apparatus for building operational radio firmware using incrementally certified modules
WO2011163044A3 (en) A method and apparatus for key revocation in an attribute-based encryption scheme
WO2006078572A3 (en) Asymmetric crypto-graphy with rolling key security
WO2006116061A3 (en) Wireless device discovery and configuration
WO2007075156A3 (en) Cryptography related to keys
DE60326092D1 (en) SAVING AND AUTHENTICATION OF DATA TRANSACTIONS
WO2006086721A3 (en) Context limited shared secret
WO2006115996A3 (en) Mediated key exchange between source and target of communication

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 06718348

Country of ref document: EP

Kind code of ref document: A2