[go: up one dir, main page]

AU2002213284A1 - Method and apparatus for providing a key distribution center - Google Patents

Method and apparatus for providing a key distribution center

Info

Publication number
AU2002213284A1
AU2002213284A1 AU2002213284A AU1328402A AU2002213284A1 AU 2002213284 A1 AU2002213284 A1 AU 2002213284A1 AU 2002213284 A AU2002213284 A AU 2002213284A AU 1328402 A AU1328402 A AU 1328402A AU 2002213284 A1 AU2002213284 A1 AU 2002213284A1
Authority
AU
Australia
Prior art keywords
providing
key distribution
distribution center
key
center
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU2002213284A
Inventor
Stephen Hanna
Radia Perlman
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sun Microsystems Inc
Original Assignee
Sun Microsystems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sun Microsystems Inc filed Critical Sun Microsystems Inc
Publication of AU2002213284A1 publication Critical patent/AU2002213284A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3265Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate chains, trees or paths; Hierarchical trust model

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
AU2002213284A 2000-10-17 2001-10-17 Method and apparatus for providing a key distribution center Abandoned AU2002213284A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US09/691,278 2000-10-17
US09/691,278 US7395549B1 (en) 2000-10-17 2000-10-17 Method and apparatus for providing a key distribution center without storing long-term server secrets
PCT/US2001/032307 WO2002033884A2 (en) 2000-10-17 2001-10-17 Method and apparatus for providing a key distribution center

Publications (1)

Publication Number Publication Date
AU2002213284A1 true AU2002213284A1 (en) 2002-04-29

Family

ID=24775885

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2002213284A Abandoned AU2002213284A1 (en) 2000-10-17 2001-10-17 Method and apparatus for providing a key distribution center

Country Status (3)

Country Link
US (1) US7395549B1 (en)
AU (1) AU2002213284A1 (en)
WO (1) WO2002033884A2 (en)

Families Citing this family (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7237257B1 (en) * 2001-04-11 2007-06-26 Aol Llc Leveraging a persistent connection to access a secured service
US8010800B2 (en) * 2001-06-26 2011-08-30 Sealedmedia Limited Search engine and digital rights management
GB2378856A (en) * 2001-08-17 2003-02-19 Nokia Corp Security in communication networks
US7234158B1 (en) 2002-04-01 2007-06-19 Microsoft Corporation Separate client state object and user interface domains
US7523490B2 (en) * 2002-05-15 2009-04-21 Microsoft Corporation Session key security protocol
US7356711B1 (en) 2002-05-30 2008-04-08 Microsoft Corporation Secure registration
US7930412B2 (en) * 2003-09-30 2011-04-19 Bce Inc. System and method for secure access
US20050183120A1 (en) * 2004-01-13 2005-08-18 Saurabh Jain Multi-user personalized digital multimedia distribution methods and systems
US7636941B2 (en) 2004-03-10 2009-12-22 Microsoft Corporation Cross-domain authentication
US7437551B2 (en) 2004-04-02 2008-10-14 Microsoft Corporation Public key infrastructure scalability certificate revocation status validation
US7379551B2 (en) 2004-04-02 2008-05-27 Microsoft Corporation Method and system for recovering password protected private data via a communication network without exposing the private data
JP4243862B2 (en) * 2004-10-26 2009-03-25 ソニー株式会社 Content utilization apparatus and content utilization method
EP1836792A1 (en) * 2004-12-30 2007-09-26 BCE Inc. System and method for secure access
JP4247626B2 (en) * 2005-01-20 2009-04-02 ソニー株式会社 Playback apparatus and playback method
JP4595555B2 (en) * 2005-01-20 2010-12-08 ソニー株式会社 Content playback apparatus and content playback method
JP4741267B2 (en) * 2005-03-28 2011-08-03 ソニー株式会社 Content recommendation system, communication terminal, and content recommendation method
JP2007011928A (en) * 2005-07-04 2007-01-18 Sony Corp Content providing system, content providing device, content distribution server, content receiving terminal, and content providing method
JP5133508B2 (en) 2005-07-21 2013-01-30 ソニー株式会社 Content providing system, content providing device, content distribution server, content receiving terminal, and content providing method
JP4403415B2 (en) * 2005-09-20 2010-01-27 ソニー株式会社 Content reproduction method and content reproduction apparatus
EP1950683A1 (en) * 2005-11-18 2008-07-30 Matsushita Electric Industrial Co., Ltd. Recording/reproducing device, communication device, program, system lsi
US20070130462A1 (en) * 2005-12-06 2007-06-07 Law Eric C W Asynchronous encryption for secured electronic communications
JP4811046B2 (en) 2006-02-17 2011-11-09 ソニー株式会社 Content playback apparatus, audio playback device, and content playback method
US9055107B2 (en) 2006-12-01 2015-06-09 Microsoft Technology Licensing, Llc Authentication delegation based on re-verification of cryptographic evidence
CN101374042B (en) * 2007-08-21 2011-03-02 联想(北京)有限公司 Auxiliary display system, apparatus and method
US9178696B2 (en) * 2007-11-30 2015-11-03 Telefonaktiebolaget L M Ericsson (Publ) Key management for secure communication
US20110131640A1 (en) * 2008-02-18 2011-06-02 Microelectronica Espanola S.A.U. Secure transfer of data
CN102160357B (en) 2008-09-16 2014-03-12 艾利森电话股份有限公司 Key Management in Communication Networks
US20110041167A1 (en) * 2009-08-17 2011-02-17 Samsung Electronics Co. Ltd. Techniques for providing secure communications among clients with efficient credentials management
US8806192B2 (en) 2011-05-04 2014-08-12 Microsoft Corporation Protected authorization for untrusted clients
WO2014166546A1 (en) 2013-04-12 2014-10-16 Nec Europe Ltd. Method and system for accessing device by a user
US9531679B2 (en) * 2014-02-06 2016-12-27 Palo Alto Research Center Incorporated Content-based transport security for distributed producers
US9954678B2 (en) * 2014-02-06 2018-04-24 Cisco Technology, Inc. Content-based transport security
CN104917604B (en) * 2014-03-12 2018-05-11 北京信威通信技术股份有限公司 A kind of method for distributing key
US10212136B1 (en) 2014-07-07 2019-02-19 Microstrategy Incorporated Workstation log-in
US10231128B1 (en) 2016-02-08 2019-03-12 Microstrategy Incorporated Proximity-based device access
US10855664B1 (en) 2016-02-08 2020-12-01 Microstrategy Incorporated Proximity-based logical access
US11140157B1 (en) 2017-04-17 2021-10-05 Microstrategy Incorporated Proximity-based access
US10657242B1 (en) 2017-04-17 2020-05-19 Microstrategy Incorporated Proximity-based access
US10771458B1 (en) 2017-04-17 2020-09-08 MicoStrategy Incorporated Proximity-based user authentication
EP3993310A1 (en) 2020-10-28 2022-05-04 Koninklijke Philips N.V. Middlebox with decapsulation
CN116707837A (en) * 2022-02-24 2023-09-05 华为技术有限公司 Session secret key generation method, control device and device cluster system

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB8704920D0 (en) 1987-03-03 1987-04-08 Hewlett Packard Co Secure messaging system
US5455953A (en) * 1993-11-03 1995-10-03 Wang Laboratories, Inc. Authorization system for obtaining in single step both identification and access rights of client to server directly from encrypted authorization ticket
US5724425A (en) 1994-06-10 1998-03-03 Sun Microsystems, Inc. Method and apparatus for enhancing software security and distributing software
US5809144A (en) 1995-08-24 1998-09-15 Carnegie Mellon University Method and apparatus for purchasing and delivering digital goods over a network
US5923756A (en) 1997-02-12 1999-07-13 Gte Laboratories Incorporated Method for providing secure remote command execution over an insecure computer network

Also Published As

Publication number Publication date
WO2002033884A2 (en) 2002-04-25
US7395549B1 (en) 2008-07-01
WO2002033884A3 (en) 2002-11-28

Similar Documents

Publication Publication Date Title
AU2002213284A1 (en) Method and apparatus for providing a key distribution center
AU2001224723A1 (en) Method and apparatus for automatically selecting a rule
AU2002213025A1 (en) Method and apparatus for providing additional information about a broadcast
AU2001241524A1 (en) Method and apparatus for a three-dimensional web-navigator
AU2001232771A1 (en) Method and apparatus for providing access to a secure region
AU2002224448A1 (en) Method and apparatus for large payload distribution in a network
AU2001264771A1 (en) Well reference apparatus and method
AU5059701A (en) A communication method and apparatus
AU2001256933A1 (en) Apparatus and method
AU2001263028A1 (en) Stream-cipher method and apparatus
AU2001247753A1 (en) Method and apparatus for integrated-battery devices
AU2002234183A1 (en) Method and apparatus for providing rights for event tickets
AU2000263270A1 (en) Apparatus and a method for supplying information
AU2001277270A1 (en) Method and apparatus for a morphology-preserving smoothing
ZA200208608B (en) Method and apparatus for distribution of bandwidth in a switch.
AU2002225798A1 (en) Method and apparatus for providing computer-based help
AU2001273562A1 (en) Method and apparatus for identifying a subject
AU2001256982A1 (en) Apparatus and method for a vertically integrated construction business
AU6015999A (en) Method and apparatus for centralized encryption key calculation
AU2001264986A1 (en) Method and apparatus for facilitating relocation
AU2001267018A1 (en) A method and apparatus for power management
AU4695499A (en) Method and apparatus for providing cross-benefits via a central authority
AU2001241911A1 (en) Method and apparatus for a pipelined network
AU2001231261A1 (en) Key measurement apparatus and method
AU2001286338A1 (en) Method and apparatus for continuously forming a concrete structure