WO2007103906A3 - Secure data transmission using undiscoverable or black data - Google Patents
Secure data transmission using undiscoverable or black data Download PDFInfo
- Publication number
- WO2007103906A3 WO2007103906A3 PCT/US2007/063361 US2007063361W WO2007103906A3 WO 2007103906 A3 WO2007103906 A3 WO 2007103906A3 US 2007063361 W US2007063361 W US 2007063361W WO 2007103906 A3 WO2007103906 A3 WO 2007103906A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- key
- undiscoverable
- black
- white
- Prior art date
Links
- 230000005540 biological transmission Effects 0.000 title 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3823—Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/067—Network architectures or network communication protocols for network security for supporting key management in a packet data network using one-time keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2115—Third party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Technology Law (AREA)
- Health & Medical Sciences (AREA)
- Multimedia (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Storage Device Security (AREA)
Abstract
Methods and systems of encrypting data. One method includes establishing data that includes discoverable or 'white' data and undiscoverable or 'black' data. Black data is generally unrecognizable. For example, it may be random data. White data generally has recognizable content or is transmitted in a recognizable format. A first key and a second key are created or established, such that the second key is substantially underivable from the first key. The discoverable or white data is encrypted with the first key and the undiscoverable or black data is encrypted with the second key. In subsequent communications or transactions, at least one of the first key and the second key is mutated.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2008558500A JP2009529832A (en) | 2006-03-06 | 2007-03-06 | Undiscoverable, ie secure data communication using black data |
EP07757959A EP1992101A2 (en) | 2006-03-06 | 2007-03-06 | Secure data transmission using undiscoverable or black data |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/368,959 | 2006-03-06 | ||
US11/368,959 US20060195402A1 (en) | 2002-02-27 | 2006-03-06 | Secure data transmission using undiscoverable or black data |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2007103906A2 WO2007103906A2 (en) | 2007-09-13 |
WO2007103906A3 true WO2007103906A3 (en) | 2008-02-21 |
Family
ID=38475788
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2007/063361 WO2007103906A2 (en) | 2006-03-06 | 2007-03-06 | Secure data transmission using undiscoverable or black data |
Country Status (4)
Country | Link |
---|---|
US (1) | US20060195402A1 (en) |
EP (1) | EP1992101A2 (en) |
JP (1) | JP2009529832A (en) |
WO (1) | WO2007103906A2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8923513B2 (en) | 2008-08-11 | 2014-12-30 | Assa Abloy Ab | Secure wiegand communications |
Families Citing this family (44)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8050272B2 (en) | 2004-06-29 | 2011-11-01 | Damaka, Inc. | System and method for concurrent sessions in a peer-to-peer hybrid communications network |
US7570636B2 (en) | 2004-06-29 | 2009-08-04 | Damaka, Inc. | System and method for traversing a NAT device for peer-to-peer hybrid communications |
US7933260B2 (en) | 2004-06-29 | 2011-04-26 | Damaka, Inc. | System and method for routing and communicating in a heterogeneous network environment |
US8009586B2 (en) | 2004-06-29 | 2011-08-30 | Damaka, Inc. | System and method for data transfer in a peer-to peer hybrid communication network |
US8468359B2 (en) * | 2006-06-30 | 2013-06-18 | Novell, Inc. | Credentials for blinded intended audiences |
US8522042B2 (en) * | 2006-10-31 | 2013-08-27 | Hewlett-Packard Development Company, L.P. | Method and apparatus for enforcement of software licence protection |
KR101580879B1 (en) * | 2007-05-22 | 2015-12-30 | 이르데토 비.브이. | System for and method of updating cryptographic key data server system method of providing cryptographic key updates and computer-readable recording medium |
WO2009018513A1 (en) * | 2007-08-02 | 2009-02-05 | Imagineer Software, Inc. | Systems and methods for implementing a mutating lock box |
WO2009018510A1 (en) * | 2007-08-02 | 2009-02-05 | Imagineer Software, Inc. | Systems and methods for implementing a mutating internet protocol security |
CA2701894C (en) | 2007-09-03 | 2015-11-17 | Damaka, Inc. | Device and method for maintaining a communication session during a network transition |
WO2009043016A2 (en) | 2007-09-28 | 2009-04-02 | Damaka, Inc. | System and method for transitioning a communication session between networks that are not commonly controlled |
US8380859B2 (en) | 2007-11-28 | 2013-02-19 | Damaka, Inc. | System and method for endpoint handoff in a hybrid peer-to-peer networking environment |
US7987363B2 (en) * | 2007-12-21 | 2011-07-26 | Harris Corporation | Secure wireless communications system and related method |
US8848904B2 (en) * | 2008-10-24 | 2014-09-30 | University Of Maryland, College Park | Method and implementation for information exchange using Markov models |
EP2284491B1 (en) * | 2009-08-14 | 2013-04-03 | Harman Becker Automotive Systems GmbH | Key of a vehicle and a navigation device |
US8725895B2 (en) | 2010-02-15 | 2014-05-13 | Damaka, Inc. | NAT traversal by concurrently probing multiple candidates |
US8874785B2 (en) | 2010-02-15 | 2014-10-28 | Damaka, Inc. | System and method for signaling and data tunneling in a peer-to-peer environment |
US8892646B2 (en) | 2010-08-25 | 2014-11-18 | Damaka, Inc. | System and method for shared session appearance in a hybrid peer-to-peer environment |
US8689307B2 (en) | 2010-03-19 | 2014-04-01 | Damaka, Inc. | System and method for providing a virtual peer-to-peer environment |
US9043488B2 (en) | 2010-03-29 | 2015-05-26 | Damaka, Inc. | System and method for session sweeping between devices |
US9191416B2 (en) | 2010-04-16 | 2015-11-17 | Damaka, Inc. | System and method for providing enterprise voice call continuity |
US8352563B2 (en) | 2010-04-29 | 2013-01-08 | Damaka, Inc. | System and method for peer-to-peer media routing using a third party instant messaging system for signaling |
US8446900B2 (en) | 2010-06-18 | 2013-05-21 | Damaka, Inc. | System and method for transferring a call between endpoints in a hybrid peer-to-peer network |
US8611540B2 (en) * | 2010-06-23 | 2013-12-17 | Damaka, Inc. | System and method for secure messaging in a hybrid peer-to-peer network |
US8468010B2 (en) | 2010-09-24 | 2013-06-18 | Damaka, Inc. | System and method for language translation in a hybrid peer-to-peer environment |
US8743781B2 (en) | 2010-10-11 | 2014-06-03 | Damaka, Inc. | System and method for a reverse invitation in a hybrid peer-to-peer environment |
US8407314B2 (en) | 2011-04-04 | 2013-03-26 | Damaka, Inc. | System and method for sharing unsupported document types between communication devices |
US8694587B2 (en) | 2011-05-17 | 2014-04-08 | Damaka, Inc. | System and method for transferring a call bridge between communication devices |
US8478890B2 (en) | 2011-07-15 | 2013-07-02 | Damaka, Inc. | System and method for reliable virtual bi-directional data stream communications with single socket point-to-multipoint capability |
US8792637B2 (en) * | 2011-11-22 | 2014-07-29 | Combined Conditional Access Development & Support, LLC | Downloading of data to secure devices |
US9027032B2 (en) | 2013-07-16 | 2015-05-05 | Damaka, Inc. | System and method for providing additional functionality to existing software in an integrated manner |
US9357016B2 (en) | 2013-10-18 | 2016-05-31 | Damaka, Inc. | System and method for virtual parallel resource management |
US9405919B2 (en) * | 2014-03-11 | 2016-08-02 | Qualcomm Incorporated | Dynamic encryption keys for use with XTS encryption systems employing reduced-round ciphers |
US9407437B1 (en) * | 2014-03-25 | 2016-08-02 | Amazon Technologies, Inc. | Secure initialization vector generation |
WO2016022574A1 (en) | 2014-08-05 | 2016-02-11 | Damaka, Inc. | System and method for providing unified communications and collaboration (ucc) connectivity between incompatible systems |
CN108293223B (en) * | 2015-11-30 | 2020-11-17 | 华为技术有限公司 | Data transmission method, user equipment and network side equipment |
US10091025B2 (en) | 2016-03-31 | 2018-10-02 | Damaka, Inc. | System and method for enabling use of a single user identifier across incompatible networks for UCC functionality |
US10797722B2 (en) * | 2016-06-10 | 2020-10-06 | The Boeing Company | System and method for providing hardware based fast and secure expansion and compression functions |
US10452877B2 (en) | 2016-12-16 | 2019-10-22 | Assa Abloy Ab | Methods to combine and auto-configure wiegand and RS485 |
CN111052670B (en) * | 2017-09-01 | 2024-02-09 | 三菱电机株式会社 | Encryption device, decryption device, encryption method, decryption method, and computer-readable storage medium |
US11157645B2 (en) * | 2018-11-01 | 2021-10-26 | International Business Machines Corporation | Data masking with isomorphic functions |
US11290472B2 (en) * | 2019-09-25 | 2022-03-29 | International Business Machines Corporation | Threat intelligence information access via a DNS protocol |
US20230328055A1 (en) * | 2022-04-11 | 2023-10-12 | Sap Se | Password Reset Using an Asymmetric Encryption Key Pair |
US20240129127A1 (en) * | 2022-10-18 | 2024-04-18 | Dell Products, L.P. | Systems and methods for dual hash rolling patch secure authentication |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030120926A1 (en) * | 2001-12-25 | 2003-06-26 | Hitachi, Ltd. | Data encryption method, recording medium, data transfer apparatus, and encrypted data decryption method |
Family Cites Families (66)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4182933A (en) * | 1969-02-14 | 1980-01-08 | The United States Of America As Represented By The Secretary Of The Army | Secure communication system with remote key setting |
US4661980A (en) * | 1982-06-25 | 1987-04-28 | The United States Of America As Represented By The Secretary Of The Navy | Intercept resistant data transmission system |
US4568914A (en) * | 1983-09-26 | 1986-02-04 | The United States Of America As Represented By The Secretary Of The Army | Expanded multilevel noise code generator employing butting |
US4731840A (en) * | 1985-05-06 | 1988-03-15 | The United States Of America As Represented By The United States Department Of Energy | Method for encryption and transmission of digital keying data |
USH1586H (en) * | 1990-01-30 | 1996-09-03 | The United States Of America As Represented By The Secretary Of The Army | Methods of and systems for encoding and decoding a beam of light utilizing nonlinear organic signal processors |
US5351293A (en) * | 1993-02-01 | 1994-09-27 | Wave Systems Corp. | System method and apparatus for authenticating an encrypted signal |
US5689641A (en) * | 1993-10-01 | 1997-11-18 | Vicor, Inc. | Multimedia collaboration system arrangement for routing compressed AV signal through a participant site without decompressing the AV signal |
US6611607B1 (en) * | 1993-11-18 | 2003-08-26 | Digimarc Corporation | Integrating digital watermarks in multimedia content |
JPH07295800A (en) * | 1994-04-22 | 1995-11-10 | Advance Co Ltd | Software protecting system |
US7904722B2 (en) * | 1994-07-19 | 2011-03-08 | Certco, Llc | Method for securely using digital signatures in a commercial cryptographic system |
US6002772A (en) * | 1995-09-29 | 1999-12-14 | Mitsubishi Corporation | Data management system |
JPH08263438A (en) * | 1994-11-23 | 1996-10-11 | Xerox Corp | Distribution and use control system of digital work and access control method to digital work |
CN101359350B (en) * | 1995-02-13 | 2012-10-03 | 英特特拉斯特技术公司 | Methods for secure transaction management and electronic rights protection |
US5943422A (en) * | 1996-08-12 | 1999-08-24 | Intertrust Technologies Corp. | Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels |
US6157721A (en) * | 1996-08-12 | 2000-12-05 | Intertrust Technologies Corp. | Systems and methods using cryptography to protect secure computing environments |
US7124302B2 (en) * | 1995-02-13 | 2006-10-17 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5892900A (en) * | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US6252964B1 (en) * | 1995-04-03 | 2001-06-26 | Scientific-Atlanta, Inc. | Authorization of services in a conditional access system |
US5717756A (en) * | 1995-10-12 | 1998-02-10 | International Business Machines Corporation | System and method for providing masquerade protection in a computer network using hardware and timestamp-specific single use keys |
US5673316A (en) * | 1996-03-29 | 1997-09-30 | International Business Machines Corporation | Creation and distribution of cryptographic envelope |
US6085320A (en) * | 1996-05-15 | 2000-07-04 | Rsa Security Inc. | Client/server protocol for proving authenticity |
US5745575A (en) * | 1996-05-20 | 1998-04-28 | The United States Of America As Represented By The Secretary Of The Army | Identification-friend-or-foe (IFF) system using variable codes |
US5889860A (en) * | 1996-11-08 | 1999-03-30 | Sunhawk Corporation, Inc. | Encryption system with transaction coded decryption key |
US6192131B1 (en) * | 1996-11-15 | 2001-02-20 | Securities Industry Automation Corporation | Enabling business transactions in computer networks |
US5915021A (en) * | 1997-02-07 | 1999-06-22 | Nokia Mobile Phones Limited | Method for secure communications in a telecommunications system |
US5872848A (en) * | 1997-02-18 | 1999-02-16 | Arcanvs | Method and apparatus for witnessed authentication of electronic documents |
US5920630A (en) * | 1997-02-25 | 1999-07-06 | United States Of America | Method of public key cryptography that includes key escrow |
US7272625B1 (en) * | 1997-03-10 | 2007-09-18 | Sonicwall, Inc. | Generalized policy server |
US6178505B1 (en) * | 1997-03-10 | 2001-01-23 | Internet Dynamics, Inc. | Secure delivery of information in a network |
US6014688A (en) * | 1997-04-25 | 2000-01-11 | Postx Corporation | E-mail program capable of transmitting, opening and presenting a container having digital content using embedded executable software |
US5999285A (en) * | 1997-05-23 | 1999-12-07 | The United States Of America As Represented By The Secretary Of The Army | Positive-operator-valued-measure receiver for quantum cryptography |
US6125185A (en) * | 1997-05-27 | 2000-09-26 | Cybercash, Inc. | System and method for encryption key generation |
JP3595109B2 (en) * | 1997-05-28 | 2004-12-02 | 日本ユニシス株式会社 | Authentication device, terminal device, authentication method in those devices, and storage medium |
US5847677A (en) * | 1997-07-07 | 1998-12-08 | The United States Of America As Represented By The Secretary Of The Army | Random number generator for jittered pulse repetition interval radar systems |
US6233685B1 (en) * | 1997-08-29 | 2001-05-15 | Sean William Smith | Establishing and employing the provable untampered state of a device |
US5991399A (en) * | 1997-12-18 | 1999-11-23 | Intel Corporation | Method for securely distributing a conditional use private key to a trusted entity on a remote system |
US6226750B1 (en) * | 1998-01-20 | 2001-05-01 | Proact Technologies Corp. | Secure session tracking method and system for client-server environment |
US6230269B1 (en) * | 1998-03-04 | 2001-05-08 | Microsoft Corporation | Distributed authentication system and method |
US6315195B1 (en) * | 1998-04-17 | 2001-11-13 | Diebold, Incorporated | Transaction apparatus and method |
US6938821B2 (en) * | 2000-09-18 | 2005-09-06 | E-Micro Corporation | Method and apparatus for associating identification and personal data for multiple magnetic stripe cards or other sources |
US6330670B1 (en) * | 1998-10-26 | 2001-12-11 | Microsoft Corporation | Digital rights management operating system |
US6382357B1 (en) * | 1998-12-14 | 2002-05-07 | Ncr Corporation | Retail system for allowing a customer to perform a retail transaction and associated method |
US6477647B1 (en) * | 1999-02-08 | 2002-11-05 | Postx Corporation | System and method for providing trade confirmations |
US6801999B1 (en) * | 1999-05-20 | 2004-10-05 | Microsoft Corporation | Passive and active software objects containing bore resistant watermarking |
US6367010B1 (en) * | 1999-07-02 | 2002-04-02 | Postx Corporation | Method for generating secure symmetric encryption and decryption |
US6647417B1 (en) * | 2000-02-10 | 2003-11-11 | World Theatre, Inc. | Music distribution systems |
CN1296846C (en) * | 1999-08-27 | 2007-01-24 | 索尼公司 | Information transmission system, transmitter, and transmission method as well as information reception system, receiver and reception method |
US7080037B2 (en) * | 1999-09-28 | 2006-07-18 | Chameleon Network Inc. | Portable electronic authorization system and method |
CA2287871C (en) * | 1999-11-01 | 2007-07-31 | Ibm Canada Limited-Ibm Canada Limitee | Secure document management system |
US6996720B1 (en) * | 1999-12-17 | 2006-02-07 | Microsoft Corporation | System and method for accessing protected content in a rights-management architecture |
US7152047B1 (en) * | 2000-05-24 | 2006-12-19 | Esecure.Biz, Inc. | System and method for production and authentication of original documents |
US7171558B1 (en) * | 2000-09-22 | 2007-01-30 | International Business Machines Corporation | Transparent digital rights management for extendible content viewers |
JP2002183125A (en) * | 2000-12-14 | 2002-06-28 | Hitachi Ltd | Method and device for document information management |
US6957384B2 (en) * | 2000-12-27 | 2005-10-18 | Tractmanager, Llc | Document management system |
US7246240B2 (en) * | 2001-04-26 | 2007-07-17 | Massachusetts Institute Of Technology | Quantum digital signatures |
US7113967B2 (en) * | 2001-05-29 | 2006-09-26 | Magiq Technologies, Inc | Efficient quantum computing operations |
US7581103B2 (en) * | 2001-06-13 | 2009-08-25 | Intertrust Technologies Corporation | Software self-checking systems and methods |
US7243366B2 (en) * | 2001-11-15 | 2007-07-10 | General Instrument Corporation | Key management protocol and authentication system for secure internet protocol rights management architecture |
AU2003210625A1 (en) * | 2002-01-22 | 2003-09-02 | Digimarc Corporation | Digital watermarking and fingerprinting including symchronization, layering, version control, and compressed embedding |
US7567721B2 (en) * | 2002-01-22 | 2009-07-28 | Digimarc Corporation | Digital watermarking of low bit rate video |
US7210617B2 (en) * | 2002-02-20 | 2007-05-01 | David Chaum | Secret-ballot systems with voter-verifiable integrity |
US6996544B2 (en) * | 2002-02-27 | 2006-02-07 | Imagineer Software, Inc. | Multiple party content distribution system and method with rights management features |
KR100755631B1 (en) * | 2002-04-29 | 2007-09-04 | 콘텐트가드 홀딩즈 인코포레이티드 | System and method for specifying and processing legality expressions |
US20050065876A1 (en) * | 2003-05-12 | 2005-03-24 | Pulkit Kumar | Airbank, pay to anyone from the mobile phone |
US7273168B2 (en) * | 2003-10-10 | 2007-09-25 | Xilidev, Inc. | Point-of-sale billing via hand-held devices |
US7255264B2 (en) * | 2004-04-24 | 2007-08-14 | De Leon Hilary Laing | Cellular phone-based automatic payment system |
-
2006
- 2006-03-06 US US11/368,959 patent/US20060195402A1/en not_active Abandoned
-
2007
- 2007-03-06 EP EP07757959A patent/EP1992101A2/en not_active Withdrawn
- 2007-03-06 JP JP2008558500A patent/JP2009529832A/en active Pending
- 2007-03-06 WO PCT/US2007/063361 patent/WO2007103906A2/en active Application Filing
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030120926A1 (en) * | 2001-12-25 | 2003-06-26 | Hitachi, Ltd. | Data encryption method, recording medium, data transfer apparatus, and encrypted data decryption method |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8923513B2 (en) | 2008-08-11 | 2014-12-30 | Assa Abloy Ab | Secure wiegand communications |
US8943562B2 (en) | 2008-08-11 | 2015-01-27 | Assa Abloy Ab | Secure Wiegand communications |
Also Published As
Publication number | Publication date |
---|---|
EP1992101A2 (en) | 2008-11-19 |
JP2009529832A (en) | 2009-08-20 |
US20060195402A1 (en) | 2006-08-31 |
WO2007103906A2 (en) | 2007-09-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2007103906A3 (en) | Secure data transmission using undiscoverable or black data | |
MXPA02009771A (en) | Authentication of data transmitted in a digital transmission system. | |
TW200701722A (en) | Context limited shared secret | |
CA2576622A1 (en) | System and method for controlling data communications between a server and a client device | |
WO2007149977A3 (en) | Location-based security, privacy, access control and monitoring system | |
WO2005053209A3 (en) | Tokens/keys for wireless communications | |
EP1775879A3 (en) | Method and Apparatus for Securely Transmitting and Receiving Data in Peer-to-Peer Manner | |
WO2007081588A3 (en) | Token-based distributed generation of security keying material | |
WO2006099540A3 (en) | System and method for distributing keys in a wireless network | |
WO2007034497A3 (en) | Secure data transmission | |
WO2008008856A3 (en) | System, method and apparatus for securely exchanging security keys and monitoring links in an ip communications network | |
WO2009031140A3 (en) | Information protection device | |
EP2317457A3 (en) | User authentication system and method | |
WO2008033590A3 (en) | A method and apparatus to provide authentication and privacy with low complexity devices | |
TW200601773A (en) | System and method for security key transmission with strong pairing to destination client | |
TW200518516A (en) | Communication system, communication device, communication method, and communication program for realizing the same | |
EP1734686A3 (en) | Cipher communication system using device authentication keys | |
WO2009031112A3 (en) | Node for a network and method for establishing a distributed security architecture for a network | |
WO2008127436A3 (en) | Messaging security device | |
WO2007104691A3 (en) | Method and communication system for the computer-aided detection and identification of copyrighted contents | |
ATE426298T1 (en) | METHOD FOR DATA TRANSMISSION BETWEEN A LOCAL SERVER AND LOCAL CLIENTS | |
WO2007111713A3 (en) | Method for device authentication | |
WO2009056463A3 (en) | Method for protection of a chip card from unauthorized use, chip card and chip card terminal | |
WO2009056679A3 (en) | End-to-end encrypted communication | |
WO2008096078A3 (en) | Portable electronic device and method for securing such device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 3611/KOLNP/2008 Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2008558500 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007757959 Country of ref document: EP |