WO2002050631A3 - A method and system for authorizing generation of asymmetric crypto-keys - Google Patents
A method and system for authorizing generation of asymmetric crypto-keys Download PDFInfo
- Publication number
- WO2002050631A3 WO2002050631A3 PCT/US2001/048454 US0148454W WO0250631A3 WO 2002050631 A3 WO2002050631 A3 WO 2002050631A3 US 0148454 W US0148454 W US 0148454W WO 0250631 A3 WO0250631 A3 WO 0250631A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- sponsor
- user
- key
- crypto
- user identification
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0827—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving distinctive intermediate devices or communication paths
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Abstract
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP01986532A EP1350356B1 (en) | 2000-12-19 | 2001-12-18 | A method and system for authorizing generation of asymmetric crypto-keys |
DE60124011T DE60124011T2 (en) | 2000-12-19 | 2001-12-18 | METHOD AND SYSTEM FOR AUTHORIZING THE PRODUCTION OF ASYMMETRIC CRYPTOSKLE |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/739,119 | 2000-12-19 | ||
US09/739,119 US7149310B2 (en) | 2000-12-19 | 2000-12-19 | Method and system for authorizing generation of asymmetric crypto-keys |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2002050631A2 WO2002050631A2 (en) | 2002-06-27 |
WO2002050631A3 true WO2002050631A3 (en) | 2003-03-20 |
Family
ID=24970900
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2001/048454 WO2002050631A2 (en) | 2000-12-19 | 2001-12-18 | A method and system for authorizing generation of asymmetric crypto-keys |
Country Status (5)
Country | Link |
---|---|
US (1) | US7149310B2 (en) |
EP (2) | EP1350356B1 (en) |
AT (1) | ATE343271T1 (en) |
DE (1) | DE60124011T2 (en) |
WO (1) | WO2002050631A2 (en) |
Families Citing this family (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8156223B2 (en) * | 2001-03-20 | 2012-04-10 | Microsoft Corporation | Distribution of binary executables and content from peer locations/machines |
US7333616B1 (en) * | 2001-11-14 | 2008-02-19 | Omniva Corp. | Approach for managing access to messages using encryption key management policies |
US20030174841A1 (en) * | 2002-03-15 | 2003-09-18 | Novell Inc. | Methods, systems, and data structures for secure data content presentation |
US7356147B2 (en) * | 2002-04-18 | 2008-04-08 | International Business Machines Corporation | Method, system and program product for attaching a title key to encrypted content for synchronized transmission to a recipient |
US7263619B1 (en) | 2002-06-26 | 2007-08-28 | Chong-Lim Kim | Method and system for encrypting electronic message using secure ad hoc encryption key |
GB0215524D0 (en) * | 2002-07-05 | 2002-08-14 | Hewlett Packard Co | Method and apparatus for generating a cryptographic key |
US8393001B1 (en) * | 2002-07-26 | 2013-03-05 | Mcafee, Inc. | Secure signature server system and associated method |
US7275156B2 (en) * | 2002-08-30 | 2007-09-25 | Xerox Corporation | Method and apparatus for establishing and using a secure credential infrastructure |
US20040088576A1 (en) * | 2002-10-31 | 2004-05-06 | Foster Ward Scott | Secure resource access |
US7549159B2 (en) * | 2004-05-10 | 2009-06-16 | Liquidware Labs, Inc. | System, apparatuses, methods and computer-readable media for determining the security status of a computer before establishing connection thereto |
US7591001B2 (en) * | 2004-05-14 | 2009-09-15 | Liquidware Labs, Inc. | System, apparatuses, methods and computer-readable media for determining the security status of a computer before establishing a network connection |
US7660980B2 (en) * | 2002-11-18 | 2010-02-09 | Liquidware Labs, Inc. | Establishing secure TCP/IP communications using embedded IDs |
US7386889B2 (en) * | 2002-11-18 | 2008-06-10 | Trusted Network Technologies, Inc. | System and method for intrusion prevention in a communications network |
US20040230817A1 (en) * | 2003-05-14 | 2004-11-18 | Kenneth Ma | Method and system for disaster recovery of data from a storage device |
US8190893B2 (en) * | 2003-10-27 | 2012-05-29 | Jp Morgan Chase Bank | Portable security transaction protocol |
WO2005057352A2 (en) * | 2003-12-02 | 2005-06-23 | Melodeo, Inc. | Secure digital content trading systems and methods |
US20050129244A1 (en) * | 2003-12-16 | 2005-06-16 | International Business Machines Corporation | System and method for mitigating denial of service attacks on trusted platform |
KR101042745B1 (en) * | 2004-01-30 | 2011-06-20 | 삼성전자주식회사 | System and method for reestablishing the session between terminal and server |
DE102005018676B4 (en) * | 2005-04-21 | 2008-09-25 | Wincor Nixdorf International Gmbh | Key management procedure for cryptographic modules |
US20070143626A1 (en) * | 2005-12-20 | 2007-06-21 | Kyocera Mita Corporation | Data forming apparatus and method for data security |
CA2571891C (en) * | 2006-12-21 | 2015-11-24 | Bce Inc. | Device authentication and secure channel management for peer-to-peer initiated communications |
US20080208624A1 (en) * | 2007-02-22 | 2008-08-28 | General Electric Company | Methods and systems for providing clinical display and search of electronic medical record data from a variety of information systems |
US20090119475A1 (en) * | 2007-11-01 | 2009-05-07 | Microsoft Corporation | Time based priority modulus for security challenges |
US8254571B1 (en) | 2007-12-21 | 2012-08-28 | Voltage Security, Inc. | Cryptographic system with halting key derivation function capabilities |
US7522723B1 (en) * | 2008-05-29 | 2009-04-21 | Cheman Shaik | Password self encryption method and system and encryption by keys generated from personal secret information |
US9515836B2 (en) * | 2013-03-28 | 2016-12-06 | Xerox Corporation | System and method for location assurance using passive computational tags |
US9240982B2 (en) * | 2013-12-27 | 2016-01-19 | Canon Information And Imaging Solutions, Inc. | Method for associating an image-forming device, a mobile device, and a user |
US10320758B2 (en) * | 2017-04-25 | 2019-06-11 | International Business Machines Corporation | Cryptography using multi-factor key system and finite state machine |
US10541954B1 (en) * | 2018-08-05 | 2020-01-21 | Gideon Samid | Cyber companion: attaching a secondary message to a primary one |
CN111314074A (en) * | 2020-02-25 | 2020-06-19 | 南京如般量子科技有限公司 | Secret sharing and timestamp based quantum secret communication key distribution and negotiation system |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5799086A (en) * | 1994-01-13 | 1998-08-25 | Certco Llc | Enhanced cryptographic system and method with key escrow feature |
Family Cites Families (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5241599A (en) * | 1991-10-02 | 1993-08-31 | At&T Bell Laboratories | Cryptographic protocol for secure communications |
US5440635A (en) * | 1993-08-23 | 1995-08-08 | At&T Corp. | Cryptographic protocol for remote authentication |
US5557678A (en) * | 1994-07-18 | 1996-09-17 | Bell Atlantic Network Services, Inc. | System and method for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem |
US5748735A (en) * | 1994-07-18 | 1998-05-05 | Bell Atlantic Network Services, Inc. | Securing E-mail communications and encrypted file storage using yaksha split private key asymmetric cryptography |
US5588061A (en) * | 1994-07-20 | 1996-12-24 | Bell Atlantic Network Services, Inc. | System and method for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem |
US5737419A (en) * | 1994-11-09 | 1998-04-07 | Bell Atlantic Network Services, Inc. | Computer system for securing communications using split private key asymmetric cryptography |
US6212634B1 (en) * | 1996-11-15 | 2001-04-03 | Open Market, Inc. | Certifying authorization in computer networks |
US5923756A (en) * | 1997-02-12 | 1999-07-13 | Gte Laboratories Incorporated | Method for providing secure remote command execution over an insecure computer network |
US5982898A (en) * | 1997-03-07 | 1999-11-09 | At&T Corp. | Certification process |
US6275941B1 (en) * | 1997-03-28 | 2001-08-14 | Hiatchi, Ltd. | Security management method for network system |
US6370249B1 (en) * | 1997-07-25 | 2002-04-09 | Entrust Technologies, Ltd. | Method and apparatus for public key management |
US6073237A (en) * | 1997-11-06 | 2000-06-06 | Cybercash, Inc. | Tamper resistant method and apparatus |
US6185685B1 (en) * | 1997-12-11 | 2001-02-06 | International Business Machines Corporation | Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same |
US6553493B1 (en) * | 1998-04-28 | 2003-04-22 | Verisign, Inc. | Secure mapping and aliasing of private keys used in public key cryptography |
CA2291920A1 (en) * | 1998-12-11 | 2000-06-11 | Karuna Ganesan | Technique for conducting secure transactions over a network |
US6704867B1 (en) * | 1999-03-30 | 2004-03-09 | Bitney Bowes, Inc. | Method for publishing certification information representative of selectable subsets of rights and apparatus and portable data storage media used to practice said method |
-
2000
- 2000-12-19 US US09/739,119 patent/US7149310B2/en not_active Expired - Lifetime
-
2001
- 2001-12-18 WO PCT/US2001/048454 patent/WO2002050631A2/en active IP Right Grant
- 2001-12-18 EP EP01986532A patent/EP1350356B1/en not_active Expired - Lifetime
- 2001-12-18 DE DE60124011T patent/DE60124011T2/en not_active Expired - Fee Related
- 2001-12-18 EP EP05015259A patent/EP1605625A3/en not_active Withdrawn
- 2001-12-18 AT AT01986532T patent/ATE343271T1/en not_active IP Right Cessation
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5799086A (en) * | 1994-01-13 | 1998-08-25 | Certco Llc | Enhanced cryptographic system and method with key escrow feature |
Also Published As
Publication number | Publication date |
---|---|
EP1605625A3 (en) | 2006-01-11 |
DE60124011T2 (en) | 2007-05-31 |
EP1605625A2 (en) | 2005-12-14 |
DE60124011D1 (en) | 2006-11-30 |
US20020078354A1 (en) | 2002-06-20 |
US7149310B2 (en) | 2006-12-12 |
EP1350356A2 (en) | 2003-10-08 |
ATE343271T1 (en) | 2006-11-15 |
EP1350356B1 (en) | 2006-10-18 |
WO2002050631A2 (en) | 2002-06-27 |
EP1350356A4 (en) | 2004-12-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2002050631A3 (en) | A method and system for authorizing generation of asymmetric crypto-keys | |
MacKenzie | The PAK suite: Protocols for password-authenticated key exchange | |
CA2284330A1 (en) | Method and apparatus for generating a complex scrambling code sequence | |
GB2296413A (en) | A method of messaging in a communciation system | |
MY126535A (en) | Access technique of channel hopping communications system | |
WO2001091366A3 (en) | Cryptographic communications using pseudo-randomly generated cryptography keys | |
WO1996018257A3 (en) | Systems and methods for work assignment and distribution from a server to remote/mobile nodes | |
AU4624696A (en) | Receiver, and method for generating spreading codes in a receiver | |
WO1998028926A3 (en) | Access technique of channel hopping communications system | |
WO2002082825A3 (en) | Method and apparatus for authentication using remote multiple access sim technology | |
GB2368747B (en) | Method and system for determining the popularity of a subject | |
WO2002097572A3 (en) | System and method for scheduling an event over a network | |
HUP9902892A2 (en) | Method and apparatus for providing for the recovery of a cryptographic key | |
MY139028A (en) | Secure two-message synchronization in wireless networks | |
CA2277761A1 (en) | Method for two party authentication and key agreement | |
AU7794301A (en) | Digital receipt for a transaction | |
EP1247188A4 (en) | Method and apparatus for anonymous subject-based addressing | |
TW325619B (en) | Minicell decoupling | |
AU1207600A (en) | System and method of authenticating a key and transmitting secure data | |
HK1072143A1 (en) | Method and system for simplifying activation of a device and a device activated according to such method | |
WO2005002166A3 (en) | Method for distributing passwords | |
TW342546B (en) | A method and device for temperature dependent current generation | |
WO2001060014A3 (en) | Information distribution in a network | |
DK1183847T3 (en) | Procedure for secure transfer of protected data | |
Pande et al. | Freezing of Random and Designed Heteropolymers: Replica Solution Without Replicas |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): JP |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2001986532 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2001986532 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: JP |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: JP |
|
WWG | Wipo information: grant in national office |
Ref document number: 2001986532 Country of ref document: EP |