BRPI0409844A - dynamic datagram key-enabled occupant central user network security and a coding and authentication scheme accessible on demand through mobile intelligent data bearers - Google Patents
dynamic datagram key-enabled occupant central user network security and a coding and authentication scheme accessible on demand through mobile intelligent data bearersInfo
- Publication number
- BRPI0409844A BRPI0409844A BRPI0409844-7A BRPI0409844A BRPI0409844A BR PI0409844 A BRPI0409844 A BR PI0409844A BR PI0409844 A BRPI0409844 A BR PI0409844A BR PI0409844 A BRPI0409844 A BR PI0409844A
- Authority
- BR
- Brazil
- Prior art keywords
- intelligent data
- mobile intelligent
- authentication
- occupant
- user network
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Biomedical Technology (AREA)
- Computer And Data Communications (AREA)
- Storage Device Security (AREA)
- Telephonic Communication Services (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
"SEGURANçA DE REDE DE USUáRIO CENTRAL OCUPANTE HABILITADA POR CHAVE DE DATAGRAMA DINáMICA E UM ESQUEMA DE CODIFICAçãO E DE AUTENTICAçãO ACESSìVEL à DEMANDA ATRAVéS DE PORTADORES DE DADOS INTELIGENTES MóVEIS". Métodos e sistemas são fornecidos para aperfeiçoar controle de acesso, monitoramento administrativo, confiabilidade, bem como flexibilidade de transmissão de dados e compartilhamento de aplicação remota por uma rede. Conexões de rede estável, seguras e transações de rede eficientes entre múltiplos usuários são suportadas por uma arquitetura cliente-servidor distribuída. Um esquema de datagrama é adaptado para habilitar chaveamento de datagrama dinâmico em suporte de uma multidão de aplicações e serviços de rede. Portadores de dados inteligentes móveis são fornecidos para permitir a implementação de um esquema de autenticação e de codificação. Os portadores de dados inteligentes são adaptados para mirar aplicações de entrega para usuários autorizados, desse modo alcançando controle de acesso a não somente dados mas também aplicações. O esquema de autenticação e de codificação em uma modalidade é baseado em biométricas de performance e físicas. Os métodos e sistemas dessa descoberta podem ser vantajosamente desenvolvidos em um ambiente de rede de empresa para suportar um amplo espectro de negócios, pesquisa, e operações administrativas."OCCUPANT CENTRAL USER NETWORK SECURITY ENABLED BY A DYNAMIC DATAGRAM KEY AND A CODE OF CODING AND AUTHENTICATION ACCESSIBLE ON DEMAND BY MOBILE INTELLIGENT DATA CARRIERS". Methods and systems are provided to enhance access control, administrative monitoring, reliability, as well as data transmission flexibility and remote application sharing across a network. Stable, secure network connections and efficient multi-user network transactions are supported by a distributed client-server architecture. A datagram scheme is tailored to enable dynamic datagram switching in support of a multitude of network applications and services. Mobile intelligent data bearers are provided to enable the implementation of an authentication and encryption scheme. Intelligent data carriers are tailored to target delivery applications to authorized users, thereby achieving access control to not only data but also applications. The authentication and encryption scheme in one embodiment is based on performance and physical biometrics. The methods and systems of this discovery can be advantageously developed in an enterprise network environment to support a broad spectrum of business, research, and administrative operations.
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US10/428,895 US7103772B2 (en) | 2003-05-02 | 2003-05-02 | Pervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers |
| US10/759,789 US7360087B2 (en) | 2003-05-02 | 2004-01-16 | Pervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers |
| PCT/US2004/002438 WO2004099940A2 (en) | 2003-05-02 | 2004-01-28 | Pervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| BRPI0409844A true BRPI0409844A (en) | 2006-05-16 |
Family
ID=35432873
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| BRPI0409844-7A BRPI0409844A (en) | 2003-05-02 | 2004-01-28 | dynamic datagram key-enabled occupant central user network security and a coding and authentication scheme accessible on demand through mobile intelligent data bearers |
Country Status (9)
| Country | Link |
|---|---|
| EP (1) | EP1620773A4 (en) |
| JP (1) | JP4430666B2 (en) |
| KR (1) | KR100825241B1 (en) |
| AU (1) | AU2004237046B2 (en) |
| BR (1) | BRPI0409844A (en) |
| CA (1) | CA2525490C (en) |
| NO (1) | NO335789B1 (en) |
| RU (1) | RU2308080C2 (en) |
| WO (1) | WO2004099940A2 (en) |
Families Citing this family (44)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8255223B2 (en) * | 2004-12-03 | 2012-08-28 | Microsoft Corporation | User authentication by combining speaker verification and reverse turing test |
| FR2882506B1 (en) | 2005-02-25 | 2007-05-18 | Oreal | MAKE-UP PROCESS USING A VIBRANT APPLICATOR |
| JP4138808B2 (en) | 2006-01-10 | 2008-08-27 | 株式会社エヌ・ティ・ティ・ドコモ | Communication system and communication method |
| US7933881B2 (en) * | 2006-03-17 | 2011-04-26 | Microsoft Corporation | Concurrency control within an enterprise resource planning system |
| US20080208806A1 (en) * | 2007-02-28 | 2008-08-28 | Microsoft Corporation | Techniques for a web services data access layer |
| US20090099827A1 (en) * | 2007-10-16 | 2009-04-16 | Sony Corporation | System and method for effectively performing a network simulation procedure |
| CN100488099C (en) | 2007-11-08 | 2009-05-13 | 西安西电捷通无线网络通信有限公司 | Bidirectional access authentication method |
| CN101222328B (en) * | 2007-12-14 | 2010-11-03 | 西安西电捷通无线网络通信股份有限公司 | Entity bidirectional identification method |
| US20100263022A1 (en) * | 2008-10-13 | 2010-10-14 | Devicescape Software, Inc. | Systems and Methods for Enhanced Smartclient Support |
| US9094721B2 (en) | 2008-10-22 | 2015-07-28 | Rakuten, Inc. | Systems and methods for providing a network link between broadcast content and content located on a computer network |
| US8160064B2 (en) | 2008-10-22 | 2012-04-17 | Backchannelmedia Inc. | Systems and methods for providing a network link between broadcast content and content located on a computer network |
| RU2390839C1 (en) * | 2008-10-23 | 2010-05-27 | ООО "НеоБИТ" | Method for centralised automatic setup, monitoring and analysing security of information systems and system for implementing said method |
| RU2484531C2 (en) * | 2009-01-22 | 2013-06-10 | Государственное научное учреждение центральный научно-исследовательский и опытно-конструкторский институт робототехники и технической кибернетики (ЦНИИ РТК) | Apparatus for processing video information of security alarm system |
| US8140621B2 (en) | 2009-03-27 | 2012-03-20 | T-Mobile, Usa, Inc. | Providing event data to a group of contacts |
| US8676626B1 (en) | 2009-03-27 | 2014-03-18 | T-Mobile Usa, Inc. | Event notification and organization utilizing a communication network |
| US8631070B2 (en) | 2009-03-27 | 2014-01-14 | T-Mobile Usa, Inc. | Providing event data to a group of contacts |
| US8428561B1 (en) | 2009-03-27 | 2013-04-23 | T-Mobile Usa, Inc. | Event notification and organization utilizing a communication network |
| FR2947404B1 (en) * | 2009-06-30 | 2011-12-16 | Sagem Securite | CRYPTOGRAPHY BY PARAMETRISATION ON AN ELLIPTICAL CURVE |
| CN101808096B (en) * | 2010-03-22 | 2012-11-07 | 北京大用科技有限责任公司 | Method for sharing and controlling large screen among local area networks in different positions |
| RU2457535C2 (en) * | 2010-05-25 | 2012-07-27 | Федеральное государственное бюджетное образовательное учреждение высшего профессионального образования "Санкт-Петербургский государственный политехнический университет" (ФГБОУ ВПО "СПбГПУ") | Method of generating and verifying electronic digital signature based on elliptic or hyperelliptic curve |
| CN101931626B (en) * | 2010-08-25 | 2012-10-10 | 深圳市傲冠软件股份有限公司 | Service terminal realizing safe auditing function in remote control process |
| WO2012035451A1 (en) * | 2010-09-16 | 2012-03-22 | International Business Machines Corporation | Method, secure device, system and computer program product for securely managing files |
| CN103154965B (en) * | 2010-10-29 | 2016-06-29 | 国际商业机器公司 | Method, apparatus and system for securely managing user access to a file system |
| CA2846406C (en) | 2011-09-09 | 2018-05-08 | Rakuten, Inc. | Systems and methods for consumer control over interactive television exposure |
| US9549024B2 (en) * | 2012-12-07 | 2017-01-17 | Remote Media, Llc | Routing and synchronization system, method, and manager |
| KR101881926B1 (en) * | 2012-12-13 | 2018-07-26 | 삼성전자주식회사 | Device Control Method for Registering Device Information of Peripheral Device, Device and System Thereof |
| WO2014092441A1 (en) | 2012-12-13 | 2014-06-19 | Samsung Electronics Co., Ltd. | Device control method for registering device information of peripheral device, and device and system thereof |
| US10326734B2 (en) | 2013-07-15 | 2019-06-18 | University Of Florida Research Foundation, Incorporated | Adaptive identity rights management system for regulatory compliance and privacy protection |
| US9424443B2 (en) * | 2013-08-20 | 2016-08-23 | Janus Technologies, Inc. | Method and apparatus for securing computer mass storage data |
| RU2589861C2 (en) | 2014-06-20 | 2016-07-10 | Закрытое акционерное общество "Лаборатория Касперского" | System and method of user data encryption |
| KR101655448B1 (en) * | 2014-12-24 | 2016-09-07 | 주식회사 파수닷컴 | Apparatus and method for authenticating user by using authentication proxy |
| RU2683184C2 (en) * | 2015-11-03 | 2019-03-26 | Общество с ограниченной ответственностью "ДОМКОР" | Software-hardware complex of electronic real estate system and method of data exchange in it |
| US10262164B2 (en) * | 2016-01-15 | 2019-04-16 | Blockchain Asics Llc | Cryptographic ASIC including circuitry-encoded transformation function |
| US20170332395A1 (en) * | 2016-05-11 | 2017-11-16 | Sharp Laboratories Of America, Inc. | Systems and methods for physical uplink shared channel (pusch) format signaling and contention access |
| KR102128303B1 (en) * | 2016-06-20 | 2020-06-30 | 시너지시티 주식회사 | Valet parking system and the method utilizing parking location map |
| RU2638779C1 (en) * | 2016-08-05 | 2017-12-15 | Общество С Ограниченной Ответственностью "Яндекс" | Method and server for executing authorization of application on electronic device |
| RU2653231C1 (en) * | 2016-12-16 | 2018-05-07 | Общество с ограниченной ответственностью "Иридиум" | Method and system of communication of components for management of objects of automation |
| CN106730835A (en) * | 2016-12-16 | 2017-05-31 | 青岛蘑菇网络技术有限公司 | A kind of network game accelerated method and system based on router and vpn server |
| US10404454B1 (en) | 2018-04-25 | 2019-09-03 | Blockchain Asics Llc | Cryptographic ASIC for derivative key hierarchy |
| RU2697646C1 (en) * | 2018-10-26 | 2019-08-15 | Самсунг Электроникс Ко., Лтд. | Method of biometric authentication of a user and a computing device implementing said method |
| RU2714856C1 (en) * | 2019-03-22 | 2020-02-19 | Общество с ограниченной ответственностью "Ак Барс Цифровые Технологии" | User identification system for performing electronic transaction for provision of service or purchase of goods |
| RU2738823C1 (en) * | 2020-03-13 | 2020-12-17 | Сергей Станиславович Чайковский | Peripheral device with integrated safety system using artificial intelligence |
| CN111951783B (en) * | 2020-08-12 | 2023-08-18 | 北京工业大学 | A Speaker Recognition Method Based on Phoneme Filtering |
| CN116633568A (en) * | 2022-02-11 | 2023-08-22 | 全球能源互联网研究院有限公司 | A method and method for power service access control system under zero trust architecture |
Family Cites Families (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH06282527A (en) * | 1993-03-29 | 1994-10-07 | Hitachi Software Eng Co Ltd | Network control system |
| US5550984A (en) * | 1994-12-07 | 1996-08-27 | Matsushita Electric Corporation Of America | Security system for preventing unauthorized communications between networks by translating communications received in ip protocol to non-ip protocol to remove address and routing services information |
| US5958010A (en) * | 1997-03-20 | 1999-09-28 | Firstsense Software, Inc. | Systems and methods for monitoring distributed applications including an interface running in an operating system kernel |
| RU2137185C1 (en) * | 1998-01-09 | 1999-09-10 | Насыпный Владимир Владимирович | Method for complex protection of information processing in computer against unauthorized acs, inspection bookmarks and viruses |
| DE19812215A1 (en) * | 1998-03-19 | 1999-09-23 | Siemens Ag | Controlling link related security functions |
| US6405203B1 (en) * | 1999-04-21 | 2002-06-11 | Research Investment Network, Inc. | Method and program product for preventing unauthorized users from using the content of an electronic storage medium |
| RU2163745C2 (en) * | 1999-04-29 | 2001-02-27 | Щеглов Андрей Юрьевич | Protective system for virtual channel of corporate network using authentication router and built around shared communication network channels and switching facilities |
| EP1094682B1 (en) * | 1999-10-22 | 2005-06-08 | Telefonaktiebolaget LM Ericsson (publ) | Mobile phone incorporating security firmware |
| KR100376618B1 (en) * | 2000-12-05 | 2003-03-17 | 주식회사 싸이버텍홀딩스 | Intelligent security system for network based on agent |
| US7941669B2 (en) * | 2001-01-03 | 2011-05-10 | American Express Travel Related Services Company, Inc. | Method and apparatus for enabling a user to select an authentication method |
| US6732278B2 (en) * | 2001-02-12 | 2004-05-04 | Baird, Iii Leemon C. | Apparatus and method for authenticating access to a network resource |
| KR20020075319A (en) * | 2002-07-19 | 2002-10-04 | 주식회사 싸이버텍홀딩스 | Intelligent Security Engine and Intelligent and Integrated Security System Employing the Same |
-
2004
- 2004-01-28 EP EP04706073A patent/EP1620773A4/en not_active Withdrawn
- 2004-01-28 KR KR1020057020870A patent/KR100825241B1/en not_active Expired - Fee Related
- 2004-01-28 CA CA2525490A patent/CA2525490C/en not_active Expired - Fee Related
- 2004-01-28 WO PCT/US2004/002438 patent/WO2004099940A2/en not_active Ceased
- 2004-01-28 AU AU2004237046A patent/AU2004237046B2/en not_active Ceased
- 2004-01-28 BR BRPI0409844-7A patent/BRPI0409844A/en active Search and Examination
- 2004-01-28 RU RU2005137570/09A patent/RU2308080C2/en not_active IP Right Cessation
- 2004-01-28 JP JP2006508631A patent/JP4430666B2/en not_active Expired - Lifetime
-
2005
- 2005-10-31 NO NO20055067A patent/NO335789B1/en not_active IP Right Cessation
Also Published As
| Publication number | Publication date |
|---|---|
| WO2004099940A8 (en) | 2006-08-03 |
| AU2004237046B2 (en) | 2008-02-28 |
| RU2005137570A (en) | 2006-06-10 |
| NO20055067D0 (en) | 2005-10-31 |
| NO335789B1 (en) | 2015-02-16 |
| NO20055067L (en) | 2006-02-02 |
| KR20060041165A (en) | 2006-05-11 |
| JP2007524892A (en) | 2007-08-30 |
| AU2004237046A1 (en) | 2004-11-18 |
| EP1620773A4 (en) | 2011-11-23 |
| CA2525490C (en) | 2012-01-24 |
| CA2525490A1 (en) | 2004-11-18 |
| KR100825241B1 (en) | 2008-04-25 |
| WO2004099940A2 (en) | 2004-11-18 |
| WO2004099940A3 (en) | 2006-05-18 |
| JP4430666B2 (en) | 2010-03-10 |
| EP1620773A2 (en) | 2006-02-01 |
| RU2308080C2 (en) | 2007-10-10 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| BRPI0409844A (en) | dynamic datagram key-enabled occupant central user network security and a coding and authentication scheme accessible on demand through mobile intelligent data bearers | |
| US20240267727A1 (en) | Quorum-based secure authentication | |
| Kortesniemi et al. | Improving the privacy of iot with decentralised identifiers (dids) | |
| BR0109231A (en) | Integrated security and communications system with secure communications link | |
| JP5430654B2 (en) | Personal security manager for ubiquitous patient monitoring | |
| CA2541639A1 (en) | System and method for application authorization | |
| BRPI0515818A (en) | a dynamic password authentication system and method for it | |
| BR0305140A (en) | Secure-processing client credentials used for network-based access to resources. | |
| WO2002079921A3 (en) | Messaging infrastructure for identity-centric data access | |
| JP2009540443A (en) | Method, system, and computer program for securely storing data | |
| CN110611662A (en) | Attribute-based encryption-based fog collaborative cloud data sharing method | |
| CN110430047B (en) | Anti-quantum computing energy-saving equipment key negotiation method and system based on asymmetric key and MQV | |
| CN207458147U (en) | Multimode identification gate control system based on cloud security | |
| Al-Muhtadi et al. | Wearable security services | |
| Chien et al. | Secure and efficient MQTT group communication design | |
| Chenchev et al. | Security and performance considerations of improved password authentication algorithm, based on OTP and hash-chains | |
| Anwar | Data security issues in the realm of mobile cloud computing: A survey | |
| Esiner et al. | Layered security for storage at the edge: On decentralized multi-factor access control | |
| Griffin | Adaptive weak secrets for authenticated key exchange | |
| Zakaria et al. | FADETPM: Novel approach of file assured deletion based on trusted platform module | |
| CN101715189A (en) | Novel method of uniform and high safety service for mobile users and internet access card device | |
| AL SHERIFY et al. | A scalable and secure attribute-based access control method in internet of things with efficient revocation | |
| Park et al. | An interoperable authentication system using zigbee-enabled tiny portable device and pki | |
| Elmannai et al. | A Highly Secure Platform that Supports Smart Locks | |
| Ganorkar et al. | Review Paper on Privacy Preservation Techniques in Cloud |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| B15K | Others concerning applications: alteration of classification |
Free format text: A CLASSIFICACAO ANTERIOR ERA: G06F 1/00 Ipc: G06F 21/34 (2013.01), G06F 21/41 (2013.01), G06F 2 |
|
| B09A | Decision: intention to grant [chapter 9.1 patent gazette] | ||
| B11D | Dismissal acc. art. 38, par 2 of ipl - failure to pay fee after grant in time |