SE1451209A1 - Improved installation of a terminal in a secure system - Google Patents
Improved installation of a terminal in a secure system Download PDFInfo
- Publication number
- SE1451209A1 SE1451209A1 SE1451209A SE1451209A SE1451209A1 SE 1451209 A1 SE1451209 A1 SE 1451209A1 SE 1451209 A SE1451209 A SE 1451209A SE 1451209 A SE1451209 A SE 1451209A SE 1451209 A1 SE1451209 A1 SE 1451209A1
- Authority
- SE
- Sweden
- Prior art keywords
- data
- terminal
- server
- key
- terrninal
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3273—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/081—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying self-generating credentials, e.g. instead of receiving credentials from an authority or from another peer, the credentials are generated at the entity itself
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Information Transfer Between Computers (AREA)
Claims (8)
1. l. Ett system (300) innefattande en terminal (100) och en server (340), i vilketterminalen (100) är installerad i systemet (3 00) av servern (340) som är konfigureradatt: identifiera terminalen (100), generera nyckelgenereringsdata, innefattande åtminstone ett datafrö, distribuera det åtminstone ena datafröet till terminalen (100) , generera nyckeldata, för användning till generering av en symmetriskkrypteringsnyckel, och metadata, för användning till generering av ettautentiseringsigenkänningstecken, baserat på det åtminstone ena datafröet och enfunktion, t ex en kryptohashfunktion, lagra en identifierare för terminalen (100) tillsammans med nyckeldata ochmetadata för terminalen (100), varvid terminalen (100) är anordnad att: mottaga det åtminstone ena datafröet från servern (3 40), generera nyckeldata och metadata baserat på det åtminstone ena datafröet ochsamma funktion, lagra nyckeldata och metadata, varvid det nyckeldata och metadata som ärlagrat i terminalen (100) är samma som det nyckeldata och metadata som är lagrat i servern (340).
2. Systemet (300) enligt patentkrav l, i vilket terminalen (100) är konfigureradatt generera en symmetrisk krypteringsnyckel baserat på nyckeldata för terminalen(100) samt även nyckeldata för en andra terminal (l00b) med vilken en säkerkommunikationskanal skall etableras, såsom en kombination av nyckeldata för terminalen (100) och nyckeldata för den andra terminalen.
3. Systemet (300) enligt patentkrav 1 eller 2, i vilket servem (340) ärkonfigurerad att generera en identifierare för terminalen (100), distribuera identifierarentill terminalen (100) och sedan mottaga identifieraren från tenninalen (100) och identifiera terminalen baserat på denna identifierare.
4. Systemet (300) enligt patentkrav 1, 2 eller 3, ivilket servern (340) årkonfigurerad att: generera en slumpartad krypteringsnyckel, distribuera den slumpartade krypteringsnyckeln till terminalen (100) och kryptera det åtminstone ena datafröet med den slumpartadekrypteringsnyckeln, och varvid terminalen (100) år konfigurerad att: mottaga den slumpartade kiypteringsnyckeln, mottaga det krypterade åtminstone ena datafröet från servem (3 40), och dekryptera det åtminstone ena datafröet med den slumpartade krypteringsnyckeln.
5. Systemet (300) enligt något av föregående patentkrav, i vilket terminalen(100) år konfigurerad att: generera ett autentiseringsigenkånningstecken baserat på metadatat, och skicka autentiseringsigenkånningstecknet till servern (340), varvid servern(3 40) år konfigurerad att: mottaga autentiseringsigenkånningstecknet och autentisera autentiseringsigenkånningstecknet genom att jåmföra det med metadata lagrat för terminalen (100).
6. Systemet (100, 300) enligt något av föregående patentkrav 1, i vilketsystemet (100, 300) år en apparat (100) och den första terminalen (1 10a) år en externanordning (245) som skall installeras i apparaten (3 00) och apparaten år konfigurerad att exekvera servem (34) eller kommunicera med servem (340).
7. Ett förfarande för anvåndning i ett system (300) innefattande en terminal(100) och en server (340), varvid förfarandet anvånds för att installera terminalen (100)i systemet (3 00), förfarandet innefattar: att servern (340) identifierar terminalen (100), att servern (3 40) genererar nyckelgenereringsdata, innefattande åtminstone ett datafrö, att servern (3 40) distribuerar det åtminstone ena datafröet till terminalen (100) , att servern (340) genererar nyckeldata, för användning till generering av ensymmetrisk krypteringsnyckel, och metadata, for användning till generering av ettautentiseringsigenkänningstecken, baserat på det åtminstone ena datafröet och enfunktion, t ex en kryptohashfunktion, att servern (340) lagrar en identifierare for terminalen (100) tillsammans mednyckeldata och metadata för terminalen (100), att terminalen (100) mottager det åtminstone ena datafröet från servern (340), att terminalen (100) genererar nyckeldata och metadata baserat på detåtminstone ena datafröet och samma funktion, att terminalen lagrar nyckeldata och metadata, varvid det nyckeldata ochmetadata som är lagrat i terminalen (100) är samma som det nyckeldata och metadata som är lagrat i servern (340).
8. Ett datorlåsbart lagringsmedia (40) kodat med instruktioner (41) som, när de exekveras på en processor, utfor förfarandet enligt patentkrav 7.
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SE1451209A SE538304C2 (sv) | 2014-10-09 | 2014-10-09 | Improved installation of a terminal in a secure system |
EP15849138.1A EP3205047A4 (en) | 2014-10-09 | 2015-10-08 | Improved installation of a terminal in a secure system |
CN201580054854.0A CN107210911A (zh) | 2014-10-09 | 2015-10-08 | 安全系统中终端的改进安装 |
PCT/SE2015/051065 WO2016056986A1 (en) | 2014-10-09 | 2015-10-08 | Improved installation of a terminal in a secure system |
US15/516,932 US10291596B2 (en) | 2014-10-09 | 2015-10-08 | Installation of a terminal in a secure system |
TW104133307A TW201618492A (zh) | 2014-10-09 | 2015-10-08 | 在安全系統中終端的改良式安裝 |
US16/410,389 US10693848B2 (en) | 2014-10-09 | 2019-05-13 | Installation of a terminal in a secure system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SE1451209A SE538304C2 (sv) | 2014-10-09 | 2014-10-09 | Improved installation of a terminal in a secure system |
Publications (2)
Publication Number | Publication Date |
---|---|
SE1451209A1 true SE1451209A1 (sv) | 2016-04-10 |
SE538304C2 SE538304C2 (sv) | 2016-05-03 |
Family
ID=55653452
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SE1451209A SE538304C2 (sv) | 2014-10-09 | 2014-10-09 | Improved installation of a terminal in a secure system |
Country Status (6)
Country | Link |
---|---|
US (2) | US10291596B2 (sv) |
EP (1) | EP3205047A4 (sv) |
CN (1) | CN107210911A (sv) |
SE (1) | SE538304C2 (sv) |
TW (1) | TW201618492A (sv) |
WO (1) | WO2016056986A1 (sv) |
Families Citing this family (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
SE538279C2 (sv) | 2014-09-23 | 2016-04-19 | Kelisec Ab | Förfarande och system för att fastställa förekomst av |
SE542460C2 (sv) | 2014-10-09 | 2020-05-12 | Kelisec Ab | Improved security through authenticaton tokens |
SE539271C2 (sv) | 2014-10-09 | 2017-06-07 | Kelisec Ab | Mutual authentication |
SE540133C2 (sv) | 2014-10-09 | 2018-04-10 | Kelisec Ab | Improved system for establishing a secure communication channel |
SE538304C2 (sv) | 2014-10-09 | 2016-05-03 | Kelisec Ab | Improved installation of a terminal in a secure system |
US10353689B2 (en) * | 2015-08-28 | 2019-07-16 | Ncr Corporation | Method for transferring a file via a mobile device and mobile device for performing same |
WO2018036633A1 (en) * | 2016-08-25 | 2018-03-01 | Telefonaktiebolaget Lm Ericsson (Publ) | A gateway, a cms, a system and methods therein, for assisting a server with collecting data from a capillary device |
CN108712390B (zh) * | 2018-04-23 | 2021-08-31 | 深圳和而泰数据资源与云技术有限公司 | 数据处理方法、服务器、智能设备及存储介质 |
US11038698B2 (en) * | 2018-09-04 | 2021-06-15 | International Business Machines Corporation | Securing a path at a selected node |
US11025413B2 (en) | 2018-09-04 | 2021-06-01 | International Business Machines Corporation | Securing a storage network using key server authentication |
US11088829B2 (en) | 2018-09-04 | 2021-08-10 | International Business Machines Corporation | Securing a path at a node |
US11991273B2 (en) | 2018-09-04 | 2024-05-21 | International Business Machines Corporation | Storage device key management for encrypted host data |
US11038671B2 (en) | 2018-09-04 | 2021-06-15 | International Business Machines Corporation | Shared key processing by a storage device to secure links |
AU2020260951A1 (en) * | 2019-01-28 | 2021-09-09 | Knectiq Inc. | System and method for secure electronic data transfer |
US10735189B2 (en) | 2019-07-01 | 2020-08-04 | Alibaba Group Holding Limited | Data exchange for multi-party computation |
CN110460435B (zh) * | 2019-07-01 | 2021-01-01 | 创新先进技术有限公司 | 数据交互方法、装置、服务器和电子设备 |
EP3863316A1 (en) * | 2020-02-07 | 2021-08-11 | Continental Teves AG & Co. OHG | Authentication method |
Family Cites Families (70)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4578531A (en) | 1982-06-09 | 1986-03-25 | At&T Bell Laboratories | Encryption system key distribution method and apparatus |
US7298851B1 (en) | 1992-12-09 | 2007-11-20 | Discovery Communications, Inc. | Electronic book security and copyright protection system |
US6125186A (en) | 1996-11-28 | 2000-09-26 | Fujitsu Limited | Encryption communication system using an agent and a storage medium for storing that agent |
US20020159598A1 (en) | 1997-10-31 | 2002-10-31 | Keygen Corporation | System and method of dynamic key generation for digital communications |
US7079653B2 (en) * | 1998-02-13 | 2006-07-18 | Tecsec, Inc. | Cryptographic key split binding process and apparatus |
US6985583B1 (en) * | 1999-05-04 | 2006-01-10 | Rsa Security Inc. | System and method for authentication seed distribution |
US7587368B2 (en) | 2000-07-06 | 2009-09-08 | David Paul Felsher | Information record infrastructure, system and method |
US7043633B1 (en) | 2000-08-28 | 2006-05-09 | Verizon Corporation Services Group Inc. | Method and apparatus for providing adaptive self-synchronized dynamic address translation |
US7149308B1 (en) | 2000-11-13 | 2006-12-12 | Stealthkey, Inc. | Cryptographic communications using in situ generated cryptographic keys for conditional access |
US6931128B2 (en) * | 2001-01-16 | 2005-08-16 | Microsoft Corporation | Methods and systems for generating encryption keys using random bit generators |
IL144369A (en) | 2001-07-17 | 2009-06-15 | Eli Yanovsky | Secure communication system and method using shared random source for key changing |
US20030145203A1 (en) | 2002-01-30 | 2003-07-31 | Yves Audebert | System and method for performing mutual authentications between security tokens |
US7424115B2 (en) * | 2003-01-30 | 2008-09-09 | Nokia Corporation | Generating asymmetric keys in a telecommunications system |
JP4546262B2 (ja) | 2003-04-16 | 2010-09-15 | テレフオンアクチーボラゲット エル エム エリクソン(パブル) | 認証方法 |
US7979707B2 (en) | 2003-07-10 | 2011-07-12 | Emc Corporation | Secure seed generation protocol |
US7350079B2 (en) | 2003-11-20 | 2008-03-25 | International Business Machines Corporation | Apparatus and method for inter-program authentication using dynamically-generated public/private key pairs |
US20070186099A1 (en) | 2004-03-04 | 2007-08-09 | Sweet Spot Solutions, Inc. | Token based two factor authentication and virtual private networking system for network management and security and online third party multiple network management method |
WO2006012058A1 (en) | 2004-06-28 | 2006-02-02 | Japan Communications, Inc. | Systems and methods for mutual authentication of network |
US8086853B2 (en) | 2005-03-18 | 2011-12-27 | Microsoft Corporation | Automatic centralized authentication challenge response generation |
KR20060131536A (ko) | 2005-06-16 | 2006-12-20 | 삼성전자주식회사 | BE 시스템에서의 홈 디바이스의 통합적 키(key) 관리방법 및 그 시스템 |
US7676676B2 (en) | 2005-11-14 | 2010-03-09 | Motorola, Inc. | Method and apparatus for performing mutual authentication within a network |
EP1865656A1 (en) | 2006-06-08 | 2007-12-12 | BRITISH TELECOMMUNICATIONS public limited company | Provision of secure communications connection using third party authentication |
JP2008065696A (ja) | 2006-09-08 | 2008-03-21 | Toshiba Corp | コンテンツ共有システム及びコンテンツ共有方法 |
JP5424008B2 (ja) | 2006-12-19 | 2014-02-26 | 日本電気株式会社 | 共有情報の管理方法およびシステム |
US20080235513A1 (en) | 2007-03-19 | 2008-09-25 | Microsoft Corporation | Three Party Authentication |
WO2008136639A1 (en) | 2007-05-07 | 2008-11-13 | Lg Electronics Inc. | Method and system for secure communication |
CN101132281A (zh) * | 2007-09-18 | 2008-02-27 | 刘亚梅 | 一种防止密钥被窃取的网络安全认证系统 |
WO2009060283A1 (en) | 2007-11-05 | 2009-05-14 | Synaptic Laboratories Limited | Method and apparatus for secure communication |
CN101897166A (zh) | 2007-11-20 | 2010-11-24 | 雷迪夫.Com印度有限公司 | 用于使用浏览器组件建立安全通信信道的系统和方法 |
BRPI0906863A8 (pt) | 2008-01-07 | 2018-10-30 | Security First Corp | sistemas e métodos para proteção de dados com o uso de dispersão chaveada por multifatorial |
CN101511084B (zh) * | 2008-02-15 | 2011-05-04 | 中国移动通信集团公司 | 一种移动通信系统的鉴权和密钥协商方法 |
US8302167B2 (en) | 2008-03-11 | 2012-10-30 | Vasco Data Security, Inc. | Strong authentication token generating one-time passwords and signatures upon server credential verification |
FR2928798B1 (fr) | 2008-03-14 | 2011-09-09 | Centre Nat Rech Scient | Procede d'authentification, systeme d'authentification, terminal serveur, terminal client et programmes d'ordinateur correspondants |
US8422687B2 (en) | 2008-05-30 | 2013-04-16 | Lantiq Deutschland Gmbh | Key management for communication networks |
US9344438B2 (en) | 2008-12-22 | 2016-05-17 | Qualcomm Incorporated | Secure node identifier assignment in a distributed hash table for peer-to-peer networks |
KR20100086677A (ko) | 2009-01-23 | 2010-08-02 | 삼성전자주식회사 | 커뮤니티 위젯 제공 방법 및 장치 |
US8752153B2 (en) | 2009-02-05 | 2014-06-10 | Wwpass Corporation | Accessing data based on authenticated user, provider and system |
US8751829B2 (en) | 2009-02-05 | 2014-06-10 | Wwpass Corporation | Dispersed secure data storage and retrieval |
US20100205448A1 (en) * | 2009-02-11 | 2010-08-12 | Tolga Tarhan | Devices, systems and methods for secure verification of user identity |
CN101500232A (zh) * | 2009-03-13 | 2009-08-05 | 北京华大智宝电子系统有限公司 | 实现动态身份认证的方法及系统 |
US8588410B2 (en) | 2009-04-06 | 2013-11-19 | Elster Electricity, Llc | Simplified secure symmetrical key management |
US20100312810A1 (en) | 2009-06-09 | 2010-12-09 | Christopher Horton | Secure identification of music files |
WO2010149937A1 (fr) | 2009-06-26 | 2010-12-29 | France Telecom | Procédé d'authentification mutuelle d'un lecteur et d'une étiquette radio |
SE534384C2 (sv) * | 2009-07-03 | 2011-08-02 | Kelisec Ab | Förfarande för att alstra en krypterings-/dekrypteringsnyckel |
BR112012017000A2 (pt) | 2010-01-12 | 2016-04-05 | Visa Int Service Ass | método |
WO2011128183A2 (en) | 2010-04-13 | 2011-10-20 | Telefonaktiebolaget L M Ericsson (Publ) | Method and apparatus for interworking with single sign-on authentication architecture |
CN103609059B (zh) | 2010-09-20 | 2016-08-17 | 安全第一公司 | 用于安全数据共享的系统和方法 |
US8984610B2 (en) | 2011-04-18 | 2015-03-17 | Bank Of America Corporation | Secure network cloud architecture |
US8990554B2 (en) | 2011-06-30 | 2015-03-24 | Verizon Patent And Licensing Inc. | Network optimization for secure connection establishment or secure messaging |
US9270453B2 (en) | 2011-06-30 | 2016-02-23 | Verizon Patent And Licensing Inc. | Local security key generation |
KR101800659B1 (ko) | 2011-07-08 | 2017-11-23 | 삼성전자 주식회사 | 이동 통신 시스템에서 단말 설정 방법 |
US8914635B2 (en) | 2011-07-25 | 2014-12-16 | Grey Heron Technologies, Llc | Method and system for establishing secure communications using composite key cryptography |
FR2983374B1 (fr) | 2011-11-29 | 2015-04-10 | Oberthur Technologies | Protocole d'authentification mutuelle |
US8656180B2 (en) | 2011-12-06 | 2014-02-18 | Wwpass Corporation | Token activation |
WO2013122869A1 (en) | 2012-02-13 | 2013-08-22 | Eugene Shablygin | Sharing secure data |
US20130219481A1 (en) | 2012-02-16 | 2013-08-22 | Robert Matthew Voltz | Cyberspace Trusted Identity (CTI) Module |
CN102651743B (zh) * | 2012-05-02 | 2014-07-30 | 飞天诚信科技股份有限公司 | 一种令牌种子的生成方法 |
EP2663051A1 (en) | 2012-05-07 | 2013-11-13 | Industrial Technology Research Institute | Authentication system for device-to-device communication and authentication method therefore |
WO2013175324A1 (en) * | 2012-05-21 | 2013-11-28 | Koninklijke Philips N.V. | Determination of cryptographic keys |
US20140149742A1 (en) | 2012-11-28 | 2014-05-29 | Arnold Yau | Method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors |
JP6018511B2 (ja) | 2013-01-31 | 2016-11-02 | 株式会社東芝 | サーバ装置、グループ鍵通知方法及びそのプログラム |
EP2956887A1 (en) | 2013-02-13 | 2015-12-23 | Security First Corp. | Systems and methods for a cryptographic file system layer |
US9397836B2 (en) * | 2014-08-11 | 2016-07-19 | Fisher-Rosemount Systems, Inc. | Securing devices to process control systems |
US11178131B2 (en) | 2014-03-14 | 2021-11-16 | Telefonaktiebolaget Lm Ericsson (Publ) | Systems and methods related to establishing a temporary trust relationship between a network-based media service and a digital media renderer |
SE538279C2 (sv) | 2014-09-23 | 2016-04-19 | Kelisec Ab | Förfarande och system för att fastställa förekomst av |
SE540133C2 (sv) | 2014-10-09 | 2018-04-10 | Kelisec Ab | Improved system for establishing a secure communication channel |
SE542460C2 (sv) | 2014-10-09 | 2020-05-12 | Kelisec Ab | Improved security through authenticaton tokens |
SE539602C2 (sv) | 2014-10-09 | 2017-10-17 | Kelisec Ab | Generating a symmetric encryption key |
SE538304C2 (sv) | 2014-10-09 | 2016-05-03 | Kelisec Ab | Improved installation of a terminal in a secure system |
SE539271C2 (sv) | 2014-10-09 | 2017-06-07 | Kelisec Ab | Mutual authentication |
-
2014
- 2014-10-09 SE SE1451209A patent/SE538304C2/sv not_active IP Right Cessation
-
2015
- 2015-10-08 EP EP15849138.1A patent/EP3205047A4/en not_active Withdrawn
- 2015-10-08 US US15/516,932 patent/US10291596B2/en not_active Expired - Fee Related
- 2015-10-08 CN CN201580054854.0A patent/CN107210911A/zh active Pending
- 2015-10-08 WO PCT/SE2015/051065 patent/WO2016056986A1/en active Application Filing
- 2015-10-08 TW TW104133307A patent/TW201618492A/zh unknown
-
2019
- 2019-05-13 US US16/410,389 patent/US10693848B2/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
US20170257352A1 (en) | 2017-09-07 |
WO2016056986A1 (en) | 2016-04-14 |
US20190268313A1 (en) | 2019-08-29 |
EP3205047A1 (en) | 2017-08-16 |
US10693848B2 (en) | 2020-06-23 |
CN107210911A (zh) | 2017-09-26 |
EP3205047A4 (en) | 2018-06-13 |
US10291596B2 (en) | 2019-05-14 |
TW201618492A (zh) | 2016-05-16 |
SE538304C2 (sv) | 2016-05-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10693848B2 (en) | Installation of a terminal in a secure system | |
EP3205048B1 (en) | Generating a symmetric encryption key | |
US10511596B2 (en) | Mutual authentication | |
US10356090B2 (en) | Method and system for establishing a secure communication channel | |
US8275984B2 (en) | TLS key and CGI session ID pairing | |
US10733309B2 (en) | Security through authentication tokens | |
JP2017521934A (ja) | クライアントとサーバとの間の相互検証の方法 | |
Al Barghouthy et al. | Social Networks IM Forensics: Encryption Analysis. | |
US10958630B2 (en) | System and method for securely exchanging data between devices | |
US20160359822A1 (en) | Sovereign share encryption protocol | |
JP2022549671A (ja) | ブラウザアプリケーション用の暗号化サービス | |
CN109246124B (zh) | 一种加密信息的主动防御方法 | |
Jung et al. | Securing RTP Packets Using Per‐Packet Key Exchange for Real‐Time Multimedia | |
Will et al. | Anonymous data sharing between organisations with elliptic curve cryptography | |
Singh et al. | Enhancing the Security of JSON Web Token Using Signal Protocol and Ratchet System | |
Zeb | Enhancement in TLS authentication with RIPEMD-160 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
NUG | Patent has lapsed |