[go: up one dir, main page]

BRPI0409844A - dynamic datagram key-enabled occupant central user network security and a coding and authentication scheme accessible on demand through mobile intelligent data bearers - Google Patents

dynamic datagram key-enabled occupant central user network security and a coding and authentication scheme accessible on demand through mobile intelligent data bearers

Info

Publication number
BRPI0409844A
BRPI0409844A BRPI0409844-7A BRPI0409844A BRPI0409844A BR PI0409844 A BRPI0409844 A BR PI0409844A BR PI0409844 A BRPI0409844 A BR PI0409844A BR PI0409844 A BRPI0409844 A BR PI0409844A
Authority
BR
Brazil
Prior art keywords
intelligent data
mobile intelligent
authentication
occupant
user network
Prior art date
Application number
BRPI0409844-7A
Other languages
Portuguese (pt)
Inventor
Jimi T Jorgensen
Craig L Damon
Jan Pathuel
Christopher L Aralaud
Original Assignee
Giritech As
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US10/428,895 external-priority patent/US7103772B2/en
Application filed by Giritech As filed Critical Giritech As
Publication of BRPI0409844A publication Critical patent/BRPI0409844A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Biomedical Technology (AREA)
  • Computer And Data Communications (AREA)
  • Storage Device Security (AREA)
  • Telephonic Communication Services (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

"SEGURANçA DE REDE DE USUáRIO CENTRAL OCUPANTE HABILITADA POR CHAVE DE DATAGRAMA DINáMICA E UM ESQUEMA DE CODIFICAçãO E DE AUTENTICAçãO ACESSìVEL à DEMANDA ATRAVéS DE PORTADORES DE DADOS INTELIGENTES MóVEIS". Métodos e sistemas são fornecidos para aperfeiçoar controle de acesso, monitoramento administrativo, confiabilidade, bem como flexibilidade de transmissão de dados e compartilhamento de aplicação remota por uma rede. Conexões de rede estável, seguras e transações de rede eficientes entre múltiplos usuários são suportadas por uma arquitetura cliente-servidor distribuída. Um esquema de datagrama é adaptado para habilitar chaveamento de datagrama dinâmico em suporte de uma multidão de aplicações e serviços de rede. Portadores de dados inteligentes móveis são fornecidos para permitir a implementação de um esquema de autenticação e de codificação. Os portadores de dados inteligentes são adaptados para mirar aplicações de entrega para usuários autorizados, desse modo alcançando controle de acesso a não somente dados mas também aplicações. O esquema de autenticação e de codificação em uma modalidade é baseado em biométricas de performance e físicas. Os métodos e sistemas dessa descoberta podem ser vantajosamente desenvolvidos em um ambiente de rede de empresa para suportar um amplo espectro de negócios, pesquisa, e operações administrativas."OCCUPANT CENTRAL USER NETWORK SECURITY ENABLED BY A DYNAMIC DATAGRAM KEY AND A CODE OF CODING AND AUTHENTICATION ACCESSIBLE ON DEMAND BY MOBILE INTELLIGENT DATA CARRIERS". Methods and systems are provided to enhance access control, administrative monitoring, reliability, as well as data transmission flexibility and remote application sharing across a network. Stable, secure network connections and efficient multi-user network transactions are supported by a distributed client-server architecture. A datagram scheme is tailored to enable dynamic datagram switching in support of a multitude of network applications and services. Mobile intelligent data bearers are provided to enable the implementation of an authentication and encryption scheme. Intelligent data carriers are tailored to target delivery applications to authorized users, thereby achieving access control to not only data but also applications. The authentication and encryption scheme in one embodiment is based on performance and physical biometrics. The methods and systems of this discovery can be advantageously developed in an enterprise network environment to support a broad spectrum of business, research, and administrative operations.

BRPI0409844-7A 2003-05-02 2004-01-28 dynamic datagram key-enabled occupant central user network security and a coding and authentication scheme accessible on demand through mobile intelligent data bearers BRPI0409844A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US10/428,895 US7103772B2 (en) 2003-05-02 2003-05-02 Pervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers
US10/759,789 US7360087B2 (en) 2003-05-02 2004-01-16 Pervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers
PCT/US2004/002438 WO2004099940A2 (en) 2003-05-02 2004-01-28 Pervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers

Publications (1)

Publication Number Publication Date
BRPI0409844A true BRPI0409844A (en) 2006-05-16

Family

ID=35432873

Family Applications (1)

Application Number Title Priority Date Filing Date
BRPI0409844-7A BRPI0409844A (en) 2003-05-02 2004-01-28 dynamic datagram key-enabled occupant central user network security and a coding and authentication scheme accessible on demand through mobile intelligent data bearers

Country Status (9)

Country Link
EP (1) EP1620773A4 (en)
JP (1) JP4430666B2 (en)
KR (1) KR100825241B1 (en)
AU (1) AU2004237046B2 (en)
BR (1) BRPI0409844A (en)
CA (1) CA2525490C (en)
NO (1) NO335789B1 (en)
RU (1) RU2308080C2 (en)
WO (1) WO2004099940A2 (en)

Families Citing this family (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8255223B2 (en) * 2004-12-03 2012-08-28 Microsoft Corporation User authentication by combining speaker verification and reverse turing test
FR2882506B1 (en) 2005-02-25 2007-05-18 Oreal MAKE-UP PROCESS USING A VIBRANT APPLICATOR
JP4138808B2 (en) 2006-01-10 2008-08-27 株式会社エヌ・ティ・ティ・ドコモ Communication system and communication method
US7933881B2 (en) * 2006-03-17 2011-04-26 Microsoft Corporation Concurrency control within an enterprise resource planning system
US20080208806A1 (en) * 2007-02-28 2008-08-28 Microsoft Corporation Techniques for a web services data access layer
US20090099827A1 (en) * 2007-10-16 2009-04-16 Sony Corporation System and method for effectively performing a network simulation procedure
CN100488099C (en) 2007-11-08 2009-05-13 西安西电捷通无线网络通信有限公司 Bidirectional access authentication method
CN101222328B (en) * 2007-12-14 2010-11-03 西安西电捷通无线网络通信股份有限公司 Entity bidirectional identification method
US20100263022A1 (en) * 2008-10-13 2010-10-14 Devicescape Software, Inc. Systems and Methods for Enhanced Smartclient Support
US9094721B2 (en) 2008-10-22 2015-07-28 Rakuten, Inc. Systems and methods for providing a network link between broadcast content and content located on a computer network
US8160064B2 (en) 2008-10-22 2012-04-17 Backchannelmedia Inc. Systems and methods for providing a network link between broadcast content and content located on a computer network
RU2390839C1 (en) * 2008-10-23 2010-05-27 ООО "НеоБИТ" Method for centralised automatic setup, monitoring and analysing security of information systems and system for implementing said method
RU2484531C2 (en) * 2009-01-22 2013-06-10 Государственное научное учреждение центральный научно-исследовательский и опытно-конструкторский институт робототехники и технической кибернетики (ЦНИИ РТК) Apparatus for processing video information of security alarm system
US8140621B2 (en) 2009-03-27 2012-03-20 T-Mobile, Usa, Inc. Providing event data to a group of contacts
US8676626B1 (en) 2009-03-27 2014-03-18 T-Mobile Usa, Inc. Event notification and organization utilizing a communication network
US8631070B2 (en) 2009-03-27 2014-01-14 T-Mobile Usa, Inc. Providing event data to a group of contacts
US8428561B1 (en) 2009-03-27 2013-04-23 T-Mobile Usa, Inc. Event notification and organization utilizing a communication network
FR2947404B1 (en) * 2009-06-30 2011-12-16 Sagem Securite CRYPTOGRAPHY BY PARAMETRISATION ON AN ELLIPTICAL CURVE
CN101808096B (en) * 2010-03-22 2012-11-07 北京大用科技有限责任公司 Method for sharing and controlling large screen among local area networks in different positions
RU2457535C2 (en) * 2010-05-25 2012-07-27 Федеральное государственное бюджетное образовательное учреждение высшего профессионального образования "Санкт-Петербургский государственный политехнический университет" (ФГБОУ ВПО "СПбГПУ") Method of generating and verifying electronic digital signature based on elliptic or hyperelliptic curve
CN101931626B (en) * 2010-08-25 2012-10-10 深圳市傲冠软件股份有限公司 Service terminal realizing safe auditing function in remote control process
WO2012035451A1 (en) * 2010-09-16 2012-03-22 International Business Machines Corporation Method, secure device, system and computer program product for securely managing files
CN103154965B (en) * 2010-10-29 2016-06-29 国际商业机器公司 Method, apparatus and system for securely managing user access to a file system
CA2846406C (en) 2011-09-09 2018-05-08 Rakuten, Inc. Systems and methods for consumer control over interactive television exposure
US9549024B2 (en) * 2012-12-07 2017-01-17 Remote Media, Llc Routing and synchronization system, method, and manager
KR101881926B1 (en) * 2012-12-13 2018-07-26 삼성전자주식회사 Device Control Method for Registering Device Information of Peripheral Device, Device and System Thereof
WO2014092441A1 (en) 2012-12-13 2014-06-19 Samsung Electronics Co., Ltd. Device control method for registering device information of peripheral device, and device and system thereof
US10326734B2 (en) 2013-07-15 2019-06-18 University Of Florida Research Foundation, Incorporated Adaptive identity rights management system for regulatory compliance and privacy protection
US9424443B2 (en) * 2013-08-20 2016-08-23 Janus Technologies, Inc. Method and apparatus for securing computer mass storage data
RU2589861C2 (en) 2014-06-20 2016-07-10 Закрытое акционерное общество "Лаборатория Касперского" System and method of user data encryption
KR101655448B1 (en) * 2014-12-24 2016-09-07 주식회사 파수닷컴 Apparatus and method for authenticating user by using authentication proxy
RU2683184C2 (en) * 2015-11-03 2019-03-26 Общество с ограниченной ответственностью "ДОМКОР" Software-hardware complex of electronic real estate system and method of data exchange in it
US10262164B2 (en) * 2016-01-15 2019-04-16 Blockchain Asics Llc Cryptographic ASIC including circuitry-encoded transformation function
US20170332395A1 (en) * 2016-05-11 2017-11-16 Sharp Laboratories Of America, Inc. Systems and methods for physical uplink shared channel (pusch) format signaling and contention access
KR102128303B1 (en) * 2016-06-20 2020-06-30 시너지시티 주식회사 Valet parking system and the method utilizing parking location map
RU2638779C1 (en) * 2016-08-05 2017-12-15 Общество С Ограниченной Ответственностью "Яндекс" Method and server for executing authorization of application on electronic device
RU2653231C1 (en) * 2016-12-16 2018-05-07 Общество с ограниченной ответственностью "Иридиум" Method and system of communication of components for management of objects of automation
CN106730835A (en) * 2016-12-16 2017-05-31 青岛蘑菇网络技术有限公司 A kind of network game accelerated method and system based on router and vpn server
US10404454B1 (en) 2018-04-25 2019-09-03 Blockchain Asics Llc Cryptographic ASIC for derivative key hierarchy
RU2697646C1 (en) * 2018-10-26 2019-08-15 Самсунг Электроникс Ко., Лтд. Method of biometric authentication of a user and a computing device implementing said method
RU2714856C1 (en) * 2019-03-22 2020-02-19 Общество с ограниченной ответственностью "Ак Барс Цифровые Технологии" User identification system for performing electronic transaction for provision of service or purchase of goods
RU2738823C1 (en) * 2020-03-13 2020-12-17 Сергей Станиславович Чайковский Peripheral device with integrated safety system using artificial intelligence
CN111951783B (en) * 2020-08-12 2023-08-18 北京工业大学 A Speaker Recognition Method Based on Phoneme Filtering
CN116633568A (en) * 2022-02-11 2023-08-22 全球能源互联网研究院有限公司 A method and method for power service access control system under zero trust architecture

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH06282527A (en) * 1993-03-29 1994-10-07 Hitachi Software Eng Co Ltd Network control system
US5550984A (en) * 1994-12-07 1996-08-27 Matsushita Electric Corporation Of America Security system for preventing unauthorized communications between networks by translating communications received in ip protocol to non-ip protocol to remove address and routing services information
US5958010A (en) * 1997-03-20 1999-09-28 Firstsense Software, Inc. Systems and methods for monitoring distributed applications including an interface running in an operating system kernel
RU2137185C1 (en) * 1998-01-09 1999-09-10 Насыпный Владимир Владимирович Method for complex protection of information processing in computer against unauthorized acs, inspection bookmarks and viruses
DE19812215A1 (en) * 1998-03-19 1999-09-23 Siemens Ag Controlling link related security functions
US6405203B1 (en) * 1999-04-21 2002-06-11 Research Investment Network, Inc. Method and program product for preventing unauthorized users from using the content of an electronic storage medium
RU2163745C2 (en) * 1999-04-29 2001-02-27 Щеглов Андрей Юрьевич Protective system for virtual channel of corporate network using authentication router and built around shared communication network channels and switching facilities
EP1094682B1 (en) * 1999-10-22 2005-06-08 Telefonaktiebolaget LM Ericsson (publ) Mobile phone incorporating security firmware
KR100376618B1 (en) * 2000-12-05 2003-03-17 주식회사 싸이버텍홀딩스 Intelligent security system for network based on agent
US7941669B2 (en) * 2001-01-03 2011-05-10 American Express Travel Related Services Company, Inc. Method and apparatus for enabling a user to select an authentication method
US6732278B2 (en) * 2001-02-12 2004-05-04 Baird, Iii Leemon C. Apparatus and method for authenticating access to a network resource
KR20020075319A (en) * 2002-07-19 2002-10-04 주식회사 싸이버텍홀딩스 Intelligent Security Engine and Intelligent and Integrated Security System Employing the Same

Also Published As

Publication number Publication date
WO2004099940A8 (en) 2006-08-03
AU2004237046B2 (en) 2008-02-28
RU2005137570A (en) 2006-06-10
NO20055067D0 (en) 2005-10-31
NO335789B1 (en) 2015-02-16
NO20055067L (en) 2006-02-02
KR20060041165A (en) 2006-05-11
JP2007524892A (en) 2007-08-30
AU2004237046A1 (en) 2004-11-18
EP1620773A4 (en) 2011-11-23
CA2525490C (en) 2012-01-24
CA2525490A1 (en) 2004-11-18
KR100825241B1 (en) 2008-04-25
WO2004099940A2 (en) 2004-11-18
WO2004099940A3 (en) 2006-05-18
JP4430666B2 (en) 2010-03-10
EP1620773A2 (en) 2006-02-01
RU2308080C2 (en) 2007-10-10

Similar Documents

Publication Publication Date Title
BRPI0409844A (en) dynamic datagram key-enabled occupant central user network security and a coding and authentication scheme accessible on demand through mobile intelligent data bearers
US20240267727A1 (en) Quorum-based secure authentication
Kortesniemi et al. Improving the privacy of iot with decentralised identifiers (dids)
BR0109231A (en) Integrated security and communications system with secure communications link
JP5430654B2 (en) Personal security manager for ubiquitous patient monitoring
CA2541639A1 (en) System and method for application authorization
BRPI0515818A (en) a dynamic password authentication system and method for it
BR0305140A (en) Secure-processing client credentials used for network-based access to resources.
WO2002079921A3 (en) Messaging infrastructure for identity-centric data access
JP2009540443A (en) Method, system, and computer program for securely storing data
CN110611662A (en) Attribute-based encryption-based fog collaborative cloud data sharing method
CN110430047B (en) Anti-quantum computing energy-saving equipment key negotiation method and system based on asymmetric key and MQV
CN207458147U (en) Multimode identification gate control system based on cloud security
Al-Muhtadi et al. Wearable security services
Chien et al. Secure and efficient MQTT group communication design
Chenchev et al. Security and performance considerations of improved password authentication algorithm, based on OTP and hash-chains
Anwar Data security issues in the realm of mobile cloud computing: A survey
Esiner et al. Layered security for storage at the edge: On decentralized multi-factor access control
Griffin Adaptive weak secrets for authenticated key exchange
Zakaria et al. FADETPM: Novel approach of file assured deletion based on trusted platform module
CN101715189A (en) Novel method of uniform and high safety service for mobile users and internet access card device
AL SHERIFY et al. A scalable and secure attribute-based access control method in internet of things with efficient revocation
Park et al. An interoperable authentication system using zigbee-enabled tiny portable device and pki
Elmannai et al. A Highly Secure Platform that Supports Smart Locks
Ganorkar et al. Review Paper on Privacy Preservation Techniques in Cloud

Legal Events

Date Code Title Description
B15K Others concerning applications: alteration of classification

Free format text: A CLASSIFICACAO ANTERIOR ERA: G06F 1/00

Ipc: G06F 21/34 (2013.01), G06F 21/41 (2013.01), G06F 2

B09A Decision: intention to grant [chapter 9.1 patent gazette]
B11D Dismissal acc. art. 38, par 2 of ipl - failure to pay fee after grant in time