AU2002213284A1 - Method and apparatus for providing a key distribution center - Google Patents
Method and apparatus for providing a key distribution centerInfo
- Publication number
- AU2002213284A1 AU2002213284A1 AU2002213284A AU1328402A AU2002213284A1 AU 2002213284 A1 AU2002213284 A1 AU 2002213284A1 AU 2002213284 A AU2002213284 A AU 2002213284A AU 1328402 A AU1328402 A AU 1328402A AU 2002213284 A1 AU2002213284 A1 AU 2002213284A1
- Authority
- AU
- Australia
- Prior art keywords
- providing
- key distribution
- distribution center
- key
- center
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3265—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate chains, trees or paths; Hierarchical trust model
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US09/691,278 | 2000-10-17 | ||
| US09/691,278 US7395549B1 (en) | 2000-10-17 | 2000-10-17 | Method and apparatus for providing a key distribution center without storing long-term server secrets |
| PCT/US2001/032307 WO2002033884A2 (en) | 2000-10-17 | 2001-10-17 | Method and apparatus for providing a key distribution center |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| AU2002213284A1 true AU2002213284A1 (en) | 2002-04-29 |
Family
ID=24775885
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| AU2002213284A Abandoned AU2002213284A1 (en) | 2000-10-17 | 2001-10-17 | Method and apparatus for providing a key distribution center |
Country Status (3)
| Country | Link |
|---|---|
| US (1) | US7395549B1 (en) |
| AU (1) | AU2002213284A1 (en) |
| WO (1) | WO2002033884A2 (en) |
Families Citing this family (41)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7237257B1 (en) * | 2001-04-11 | 2007-06-26 | Aol Llc | Leveraging a persistent connection to access a secured service |
| US8010800B2 (en) * | 2001-06-26 | 2011-08-30 | Sealedmedia Limited | Search engine and digital rights management |
| GB2378856A (en) * | 2001-08-17 | 2003-02-19 | Nokia Corp | Security in communication networks |
| US7234158B1 (en) | 2002-04-01 | 2007-06-19 | Microsoft Corporation | Separate client state object and user interface domains |
| US7523490B2 (en) * | 2002-05-15 | 2009-04-21 | Microsoft Corporation | Session key security protocol |
| US7356711B1 (en) | 2002-05-30 | 2008-04-08 | Microsoft Corporation | Secure registration |
| US7930412B2 (en) * | 2003-09-30 | 2011-04-19 | Bce Inc. | System and method for secure access |
| US20050183120A1 (en) * | 2004-01-13 | 2005-08-18 | Saurabh Jain | Multi-user personalized digital multimedia distribution methods and systems |
| US7636941B2 (en) | 2004-03-10 | 2009-12-22 | Microsoft Corporation | Cross-domain authentication |
| US7437551B2 (en) | 2004-04-02 | 2008-10-14 | Microsoft Corporation | Public key infrastructure scalability certificate revocation status validation |
| US7379551B2 (en) | 2004-04-02 | 2008-05-27 | Microsoft Corporation | Method and system for recovering password protected private data via a communication network without exposing the private data |
| JP4243862B2 (en) * | 2004-10-26 | 2009-03-25 | ソニー株式会社 | Content utilization apparatus and content utilization method |
| EP1836792A1 (en) * | 2004-12-30 | 2007-09-26 | BCE Inc. | System and method for secure access |
| JP4247626B2 (en) * | 2005-01-20 | 2009-04-02 | ソニー株式会社 | Playback apparatus and playback method |
| JP4595555B2 (en) * | 2005-01-20 | 2010-12-08 | ソニー株式会社 | Content playback apparatus and content playback method |
| JP4741267B2 (en) * | 2005-03-28 | 2011-08-03 | ソニー株式会社 | Content recommendation system, communication terminal, and content recommendation method |
| JP2007011928A (en) * | 2005-07-04 | 2007-01-18 | Sony Corp | Content providing system, content providing device, content distribution server, content receiving terminal, and content providing method |
| JP5133508B2 (en) | 2005-07-21 | 2013-01-30 | ソニー株式会社 | Content providing system, content providing device, content distribution server, content receiving terminal, and content providing method |
| JP4403415B2 (en) * | 2005-09-20 | 2010-01-27 | ソニー株式会社 | Content reproduction method and content reproduction apparatus |
| EP1950683A1 (en) * | 2005-11-18 | 2008-07-30 | Matsushita Electric Industrial Co., Ltd. | Recording/reproducing device, communication device, program, system lsi |
| US20070130462A1 (en) * | 2005-12-06 | 2007-06-07 | Law Eric C W | Asynchronous encryption for secured electronic communications |
| JP4811046B2 (en) | 2006-02-17 | 2011-11-09 | ソニー株式会社 | Content playback apparatus, audio playback device, and content playback method |
| US9055107B2 (en) | 2006-12-01 | 2015-06-09 | Microsoft Technology Licensing, Llc | Authentication delegation based on re-verification of cryptographic evidence |
| CN101374042B (en) * | 2007-08-21 | 2011-03-02 | 联想(北京)有限公司 | Auxiliary display system, apparatus and method |
| US9178696B2 (en) * | 2007-11-30 | 2015-11-03 | Telefonaktiebolaget L M Ericsson (Publ) | Key management for secure communication |
| US20110131640A1 (en) * | 2008-02-18 | 2011-06-02 | Microelectronica Espanola S.A.U. | Secure transfer of data |
| CN102160357B (en) | 2008-09-16 | 2014-03-12 | 艾利森电话股份有限公司 | Key Management in Communication Networks |
| US20110041167A1 (en) * | 2009-08-17 | 2011-02-17 | Samsung Electronics Co. Ltd. | Techniques for providing secure communications among clients with efficient credentials management |
| US8806192B2 (en) | 2011-05-04 | 2014-08-12 | Microsoft Corporation | Protected authorization for untrusted clients |
| WO2014166546A1 (en) | 2013-04-12 | 2014-10-16 | Nec Europe Ltd. | Method and system for accessing device by a user |
| US9531679B2 (en) * | 2014-02-06 | 2016-12-27 | Palo Alto Research Center Incorporated | Content-based transport security for distributed producers |
| US9954678B2 (en) * | 2014-02-06 | 2018-04-24 | Cisco Technology, Inc. | Content-based transport security |
| CN104917604B (en) * | 2014-03-12 | 2018-05-11 | 北京信威通信技术股份有限公司 | A kind of method for distributing key |
| US10212136B1 (en) | 2014-07-07 | 2019-02-19 | Microstrategy Incorporated | Workstation log-in |
| US10231128B1 (en) | 2016-02-08 | 2019-03-12 | Microstrategy Incorporated | Proximity-based device access |
| US10855664B1 (en) | 2016-02-08 | 2020-12-01 | Microstrategy Incorporated | Proximity-based logical access |
| US11140157B1 (en) | 2017-04-17 | 2021-10-05 | Microstrategy Incorporated | Proximity-based access |
| US10657242B1 (en) | 2017-04-17 | 2020-05-19 | Microstrategy Incorporated | Proximity-based access |
| US10771458B1 (en) | 2017-04-17 | 2020-09-08 | MicoStrategy Incorporated | Proximity-based user authentication |
| EP3993310A1 (en) | 2020-10-28 | 2022-05-04 | Koninklijke Philips N.V. | Middlebox with decapsulation |
| CN116707837A (en) * | 2022-02-24 | 2023-09-05 | 华为技术有限公司 | Session secret key generation method, control device and device cluster system |
Family Cites Families (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB8704920D0 (en) | 1987-03-03 | 1987-04-08 | Hewlett Packard Co | Secure messaging system |
| US5455953A (en) * | 1993-11-03 | 1995-10-03 | Wang Laboratories, Inc. | Authorization system for obtaining in single step both identification and access rights of client to server directly from encrypted authorization ticket |
| US5724425A (en) | 1994-06-10 | 1998-03-03 | Sun Microsystems, Inc. | Method and apparatus for enhancing software security and distributing software |
| US5809144A (en) | 1995-08-24 | 1998-09-15 | Carnegie Mellon University | Method and apparatus for purchasing and delivering digital goods over a network |
| US5923756A (en) | 1997-02-12 | 1999-07-13 | Gte Laboratories Incorporated | Method for providing secure remote command execution over an insecure computer network |
-
2000
- 2000-10-17 US US09/691,278 patent/US7395549B1/en not_active Expired - Lifetime
-
2001
- 2001-10-17 AU AU2002213284A patent/AU2002213284A1/en not_active Abandoned
- 2001-10-17 WO PCT/US2001/032307 patent/WO2002033884A2/en not_active Ceased
Also Published As
| Publication number | Publication date |
|---|---|
| WO2002033884A2 (en) | 2002-04-25 |
| US7395549B1 (en) | 2008-07-01 |
| WO2002033884A3 (en) | 2002-11-28 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| AU2002213284A1 (en) | Method and apparatus for providing a key distribution center | |
| AU2001224723A1 (en) | Method and apparatus for automatically selecting a rule | |
| AU2002213025A1 (en) | Method and apparatus for providing additional information about a broadcast | |
| AU2001241524A1 (en) | Method and apparatus for a three-dimensional web-navigator | |
| AU2001232771A1 (en) | Method and apparatus for providing access to a secure region | |
| AU2002224448A1 (en) | Method and apparatus for large payload distribution in a network | |
| AU2001264771A1 (en) | Well reference apparatus and method | |
| AU5059701A (en) | A communication method and apparatus | |
| AU2001256933A1 (en) | Apparatus and method | |
| AU2001263028A1 (en) | Stream-cipher method and apparatus | |
| AU2001247753A1 (en) | Method and apparatus for integrated-battery devices | |
| AU2002234183A1 (en) | Method and apparatus for providing rights for event tickets | |
| AU2000263270A1 (en) | Apparatus and a method for supplying information | |
| AU2001277270A1 (en) | Method and apparatus for a morphology-preserving smoothing | |
| ZA200208608B (en) | Method and apparatus for distribution of bandwidth in a switch. | |
| AU2002225798A1 (en) | Method and apparatus for providing computer-based help | |
| AU2001273562A1 (en) | Method and apparatus for identifying a subject | |
| AU2001256982A1 (en) | Apparatus and method for a vertically integrated construction business | |
| AU6015999A (en) | Method and apparatus for centralized encryption key calculation | |
| AU2001264986A1 (en) | Method and apparatus for facilitating relocation | |
| AU2001267018A1 (en) | A method and apparatus for power management | |
| AU4695499A (en) | Method and apparatus for providing cross-benefits via a central authority | |
| AU2001241911A1 (en) | Method and apparatus for a pipelined network | |
| AU2001231261A1 (en) | Key measurement apparatus and method | |
| AU2001286338A1 (en) | Method and apparatus for continuously forming a concrete structure |