[go: up one dir, main page]

BRPI1011232A2 - autenticando um nó em uma rede de comunicação - Google Patents

autenticando um nó em uma rede de comunicação

Info

Publication number
BRPI1011232A2
BRPI1011232A2 BRPI1011232A BRPI1011232A BRPI1011232A2 BR PI1011232 A2 BRPI1011232 A2 BR PI1011232A2 BR PI1011232 A BRPI1011232 A BR PI1011232A BR PI1011232 A BRPI1011232 A BR PI1011232A BR PI1011232 A2 BRPI1011232 A2 BR PI1011232A2
Authority
BR
Brazil
Prior art keywords
authenticating
node
communication network
network
communication
Prior art date
Application number
BRPI1011232A
Other languages
English (en)
Inventor
Jarno Niemelä
Original Assignee
F Secure Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by F Secure Corp filed Critical F Secure Corp
Publication of BRPI1011232A2 publication Critical patent/BRPI1011232A2/pt

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
BRPI1011232A 2009-04-07 2010-04-07 autenticando um nó em uma rede de comunicação BRPI1011232A2 (pt)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB0906002.1A GB2469287B (en) 2009-04-07 2009-04-07 Authenticating a node in a communication network
PCT/EP2010/054571 WO2010115913A2 (en) 2009-04-07 2010-04-07 Authenticating a node in a communication network

Publications (1)

Publication Number Publication Date
BRPI1011232A2 true BRPI1011232A2 (pt) 2016-03-15

Family

ID=40750233

Family Applications (1)

Application Number Title Priority Date Filing Date
BRPI1011232A BRPI1011232A2 (pt) 2009-04-07 2010-04-07 autenticando um nó em uma rede de comunicação

Country Status (5)

Country Link
US (1) US9490986B2 (pt)
EP (1) EP2417747B1 (pt)
BR (1) BRPI1011232A2 (pt)
GB (1) GB2469287B (pt)
WO (1) WO2010115913A2 (pt)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9374244B1 (en) * 2012-02-27 2016-06-21 Amazon Technologies, Inc. Remote browsing session management
US8910280B2 (en) * 2012-04-30 2014-12-09 At&T Intellectual Property I, L.P. Detecting and blocking domain name system cache poisoning attacks
US8966659B2 (en) * 2013-03-14 2015-02-24 Microsoft Technology Licensing, Llc Automatic fraudulent digital certificate detection
US20150006887A1 (en) * 2013-06-28 2015-01-01 Entersekt (Pty) Ltd. System and method for authenticating public keys
WO2015092953A1 (ja) * 2013-12-16 2015-06-25 パナソニックIpマネジメント株式会社 認証システムおよび認証方法
GB2537154B (en) 2015-04-09 2021-09-08 Wandera Ltd Detecting "man-in-the-middle" attacks
US10447485B2 (en) 2015-11-05 2019-10-15 International Business Machines Corporation Determining trustworthiness of a cryptographic certificate
US10009336B2 (en) * 2016-05-18 2018-06-26 Cisco Technology, Inc. Network security system to validate a server certificate
US20190044950A1 (en) * 2017-08-02 2019-02-07 Qualcomm Incorporated Detection of Compromised Access Points
JP7113269B2 (ja) * 2018-08-28 2022-08-05 パナソニックIpマネジメント株式会社 通信システムおよび通信方法

Family Cites Families (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7305550B2 (en) * 2000-12-29 2007-12-04 Intel Corporation System and method for providing authentication and verification services in an enhanced media gateway
US8601566B2 (en) * 2001-10-23 2013-12-03 Intel Corporation Mechanism supporting wired and wireless methods for client and server side authentication
JP4304362B2 (ja) 2002-06-25 2009-07-29 日本電気株式会社 Pki対応の証明書確認処理方法及びその装置、並びにpki対応の証明書確認処理プログラム
US7739494B1 (en) 2003-04-25 2010-06-15 Symantec Corporation SSL validation and stripping using trustworthiness factors
DE602004025699D1 (de) 2003-06-24 2010-04-08 Ibm Verfahren und system zur authentifizierung der server in einer verteilten anwendungsumgebung
US7500100B1 (en) * 2003-09-10 2009-03-03 Cisco Technology, Inc. Method and apparatus for verifying revocation status of a digital certificate
KR20050064119A (ko) * 2003-12-23 2005-06-29 한국전자통신연구원 인터넷접속을 위한 확장인증프로토콜 인증시 단말에서의서버인증서 유효성 검증 방법
US7321970B2 (en) * 2003-12-30 2008-01-22 Nokia Siemens Networks Oy Method and system for authentication using infrastructureless certificates
US7444509B2 (en) * 2004-05-27 2008-10-28 International Business Machines Corporation Method and system for certification path processing
US7587676B2 (en) * 2004-08-31 2009-09-08 Sap Ag System and method for inhibiting interaction with malicious software
US7886344B2 (en) * 2004-09-13 2011-02-08 Cisco Technology, Inc. Secure fallback network device
US8327131B1 (en) 2004-11-29 2012-12-04 Harris Corporation Method and system to issue trust score certificates for networked devices using a trust scoring service
CN101136748B (zh) * 2006-08-31 2012-03-07 普天信息技术研究院 一种身份认证方法及系统
US7814315B2 (en) * 2006-11-30 2010-10-12 Red Hat, Inc. Propagation of certificate revocation information
US8683195B2 (en) * 2006-12-19 2014-03-25 Sandisk Technologies Inc. System and method for reducing fraud
US8429734B2 (en) * 2007-07-31 2013-04-23 Symantec Corporation Method for detecting DNS redirects or fraudulent local certificates for SSL sites in pharming/phishing schemes by remote validation and using a credential manager and recorded certificate attributes
US8533463B2 (en) * 2007-08-30 2013-09-10 Red Hat, Inc. Reduced computation for generation of certificate revocation information
CN101272616B (zh) * 2008-05-07 2012-05-30 广州杰赛科技股份有限公司 一种无线城域网的安全接入方法
US20100138907A1 (en) * 2008-12-01 2010-06-03 Garret Grajek Method and system for generating digital certificates and certificate signing requests
US8032742B2 (en) 2008-12-05 2011-10-04 Unisys Corporation Dynamic updating of trusted certificates and certificate revocation lists in a computing system
US8677466B1 (en) * 2009-03-10 2014-03-18 Trend Micro Incorporated Verification of digital certificates used for encrypted computer communications
US8181019B2 (en) * 2009-06-22 2012-05-15 Citrix Systems, Inc. Systems and methods for managing CRLS for a multi-core system
US8839397B2 (en) 2010-08-24 2014-09-16 Verizon Patent And Licensing Inc. End point context and trust level determination
RU2514138C1 (ru) 2012-09-28 2014-04-27 Закрытое акционерное общество "Лаборатория Касперского" Система и способ верификации сертификата открытого ключа с целью противодействия атакам типа "человек посередине"

Also Published As

Publication number Publication date
EP2417747B1 (en) 2018-10-17
WO2010115913A3 (en) 2011-02-24
US9490986B2 (en) 2016-11-08
GB2469287A (en) 2010-10-13
US20120079584A1 (en) 2012-03-29
GB2469287B (en) 2013-08-21
EP2417747A2 (en) 2012-02-15
WO2010115913A2 (en) 2010-10-14
GB0906002D0 (en) 2009-05-20

Similar Documents

Publication Publication Date Title
BRPI0819099A2 (pt) rede de comunicações
BRPI1011232A2 (pt) autenticando um nó em uma rede de comunicação
BRPI0907142A2 (pt) sincronização de rede sem fio
GB2471438B (en) Telecommunications network
BRPI1013357A2 (pt) retransmissão de anúncios em uma rede social
BRPI0818416A2 (pt) acesso móvel em uma rede de ponto de acesso diverso
BRPI0721942A2 (pt) Segurança transacional através de uma rede
EP2586180A4 (en) SECURE NODE REGISTRATION IN A COMMUNICATION NETWORK
BRPI0919845A2 (pt) procedimentos de anexação de rede retransmissora de celula
DK3473093T3 (da) Biomimetisk vaskulært netværk
BRPI0913090A2 (pt) dinâmica de grupo de contato em dispositivos de comunicação de rede
GB201015219D0 (en) Telecommunication network
BRPI0817575A2 (pt) Conjunto de rede de termocura de policicloolefina
BR112013014295A2 (pt) permutar informações de presença em uma rede de comunicações
BRPI0815575A2 (pt) Método de comunicação dentro de uma rede mesh.
EP2260402A4 (en) CONFIGURING COMMUNICATIONS BETWEEN COMPUTING NUDS
GB2471057B (en) Telecommunications network
GB0919398D0 (en) Telecommunications network security
DK2215803T3 (da) Netværksadgang-autorisering
BRPI1015343A2 (pt) comunicação de enlace reverso em uma rede de comunicação sem fio
BRPI0914237A2 (pt) rede de carga
EP2497031A4 (en) NETWORK SWITCH
BRPI0822638A2 (pt) Acesso de rede seletivo de célula
DK2340651T3 (da) Gruppestyring i et kommunikationsnetværk
FR2942090B1 (fr) Reseau de telecommunication

Legal Events

Date Code Title Description
B06F Objections, documents and/or translations needed after an examination request according [chapter 6.6 patent gazette]
B06U Preliminary requirement: requests with searches performed by other patent offices: procedure suspended [chapter 6.21 patent gazette]
B15K Others concerning applications: alteration of classification

Free format text: AS CLASSIFICACOES ANTERIORES ERAM: H04L 29/06 , H04L 9/32

Ipc: H04L 9/32 (2006.01), H04L 29/06 (2006.01)

B11B Dismissal acc. art. 36, par 1 of ipl - no reply within 90 days to fullfil the necessary requirements