[go: up one dir, main page]

CN1685687B - 确定目标节点对于源节点的邻近性的方法 - Google Patents

确定目标节点对于源节点的邻近性的方法 Download PDF

Info

Publication number
CN1685687B
CN1685687B CN038232685A CN03823268A CN1685687B CN 1685687 B CN1685687 B CN 1685687B CN 038232685 A CN038232685 A CN 038232685A CN 03823268 A CN03823268 A CN 03823268A CN 1685687 B CN1685687 B CN 1685687B
Authority
CN
China
Prior art keywords
response
node
query
target
target node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CN038232685A
Other languages
English (en)
Other versions
CN1685687A (zh
Inventor
M·罗斯纳
R·克拉辛斯基
M·A·埃普斯泰因
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Koninklijke Philips NV
Original Assignee
Koninklijke Philips Electronics NV
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninklijke Philips Electronics NV filed Critical Koninklijke Philips Electronics NV
Priority to CN201310140077.4A priority Critical patent/CN103354543B/zh
Publication of CN1685687A publication Critical patent/CN1685687A/zh
Application granted granted Critical
Publication of CN1685687B publication Critical patent/CN1685687B/zh
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/22Arrangements for preventing the taking of data from a data transmission channel without authorisation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0492Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload by using a location-limited connection, e.g. near-field communication or limited proximity of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/104Grouping of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

一种系统和方法根据在节点验证协议中传送消息所需要的时间来确定目标节点对源节点的邻近性。该节点验证协议包括查询响应序列,其中源节点将查询传送给目标节点,并且目标节点将相应的响应传送给源节点。目标节点被配置为传送两个对该查询的响应:一旦接收到该查询时立即发送的第一响应,和基于该查询的内容的第二响应。根据在源节点上该查询的传送和第一响应的接收之间的持续时间来确定通信时间,并比较第二响应与该查询的对应性,以验证目标节点的可靠性。

Description

确定目标节点对于源节点的邻近性的方法
技术领域
本发明涉及通信安全领域,并且尤其涉及验证网络上节点的邻近性的系统和方法。 
背景技术
网络安全通常可以通过区分网络上的“本地”节点和“远程”节点来提高。通过类似的方式,可以根据节点是本地的还是远程的,对于分配资料给节点施加不同的权力或限制。本地节点例如通常位于特定的物理环境内,并且可以假定在该物理环境内的用户被授权访问该网络和/或被授权接收来自其它本地节点的文件。另一方面,远程节点易受未授权物理访问的影响。另外,网络上未授权的入侵者通常通过电话或其它通信信道来远程地访问网络。因为网络对通过远程节点的未授权访问的敏感性,通过在远程节点上采取严格的安全措施和/或访问限制,可以提高网络安全性和/或复制保护,同时不使用这些相同的限制来阻碍本地节点。 
发明内容
本发明的一个目的是提供一种有助于确定网络上的节点是本地的还是远程的系统和方法。本发明的另一个目的是使这一确定与验证网络上节点的可靠性的系统或方法相结合。 
通过一种有助于确定在诸如开放复制保护系统(OCPS)的节点验证协议内的源节点和目标节点之间通信时间的系统和方法来实现这些目的和其它目的。根据与询问响应协议相关的通信延时来确定目标节点对源节点的邻近性。节点验证协议包括查询响应序列,其中源节点向目标节点传送查询,而目标节点向源节点传送相应响应。为了区分实际通信时间和生成与该查询对应的响应所需要的时间,将目标节点配置为传送两个对该查询的响应:一旦接收到该查询立即发送的第一响应和基于该查询的内容的第二响应。根据在源节点上该查询的发送和第一响应的接收之间的持续时间来确定通信时间。比较第二响应与该查询的对应性,以验证目标节点的可靠性,并且比较通信时间与阈值,以确定目标节点相对于源节点是本地的还是远程的。 
附图说明
图1图示节点网络的示例方框图; 
图2图示根据本发明执行查询响应协议的源节点和目标节点的示例方框图。 
在所有的附图中,相同的标号是指相同的单元或者执行基本上相同功能的单元。 
具体实施方式
图1图示节点110的网络150的示例方框图。将节点之一即节点D110图示为远离其它节点110。根据本发明,每个节点110被配置为能够确定每个其它节点110的邻近性。在本发明的典型实施例中,邻近性确定限制于确定另一节点是“本地的”还是“远程的”,尽管使用在此公开的技术可以实现更加具体的距离确定。 
图2图示根据本发明的执行查询响应协议以确定目标节点110T对源节点110S的邻近性的源节点110S和目标节点110T的示例方框图。源节点110S包括启动查询的处理器210和将查询发送给目标节点110T的通信设备220。目标节点110T通过其通信设备230接收查询并返回相应响应。为了保证第一响应对应于所传送的查询,该协议要求目标节点110T通过处理器240处理该查询的至少一部分,并在第二响应中包括该处理的结果。 
源节点110S被配置为测量查询响应处理所消耗的时间,并根据该测量结果来确定目标节点110T的邻近性。在常规的查询响应协议中,查询响应时间包括传送查询与响应的时间以及在目标节点110T上处理该查询并生成响应的时间,并因而常规查询响应协议中的查询响应时间通常并不适合于确定通信时间。 
根据本发明,将目标节点110T配置为提供对该查询的两个响应。目标节点110T接收到查询之后提供立即响应,并且随后在处理过查询之后提供后续响应。源节点110S被配置为测量发送查询和接收到来自目标节点110T的第一响应之间的持续时间,以确定目标节点110T到源节点110S的相对邻近性。源节点还被配置为根据来自目标节点110T的第二响应验证目标节点110T的可靠性。在优选实施例中,通过第一响应或第二响应的内容,可以将第一响应的可靠性验证为始发自目标节点110T。 
使用公知的技术,可以利用所确定的从源节点110S发送查询和从目标节点110T接收第一响应之间的通信时间来计算源110S和目标110T之间的距离。如上面指出的,在典型的实施例中,使用通信时间来确定目标110T是本地的还是远离源110S。在本发明的优选实施例中通过比较通信时间与标称阈值来进行这一确定,通常不超过若干毫秒。如果通信时间低于阈值,则将目标110T确定为本地的,反之,将其确定为远程的。也可以使用多个阈值来提供目标110T距离源110S的远程度的相对测量。 
在典型的实施例中,源110S使用远程/本地邻近性确定来控制随后与目标110T的通信,和/或根据邻近性来控制目标节点对诸如数据和处理的系统资源的访问。例如,一些文件可以被允许仅传送给本地节点,可以要求加密与远程节点的所有通信,可以禁止一些文件的洲际传输,等等。 
在本发明的优选实施例中,上面的查询响应处理被合并在例如密钥交换处理的节点鉴别处理内,其通常包括一个或多个查询响应序列。 
OCPS协议例如包括鉴别阶段、密钥交换阶段、密钥生成阶段和随后的数据传输阶段。通过如在Menezes等人的“应用加密手册(Handbook of Applied Cryptography)”中描述的改进的Needham-Schroeder密钥交换协议来执行密钥交换阶段。 
在鉴别阶段,源节点110S和目标节点110T中的每个节点使用相应的数字证书来验证彼此的公用密钥。 
在密钥交换阶段开始时,源110S生成包括随机数和随机密钥的消息。源110S随后使用目标110T的公用密钥来加密该消息,并将加密后的消息作为上述查询发送给目标110T。根据本发明,源节点110S在将这些加密内容发送给目标110T时启动定时器。 
在常规的OCPS协议中,目标110T使用目标110T的专用密钥来解密来自源110S的随机数和随机密钥。目标110T生成包括新的随机数、新的随机密钥和解密的来自源110S的随机数的消息,并使用源110S的公用密钥加密该消息,以形成将要传送给源110S的响应。目标110T也使用目标的专用密钥来签名该响应。 
根据本发明,一旦接收到查询,在上述随机数和随机密钥的解密 之前,目标110T将第一响应发送给源110S。在本发明的一种优选实施例中,目标110T将新的随机数作为第一响应发送给源110S,并随后通过作为第二响应发送的常规OCPS响应的附录来验证这个新的随机数。在另一种优选实施例中,目标110T将常规OCPS响应的一部分包括在第一响应内,该第一响应包括加密的和签名的新随机数,随后是常规OCPS响应的其余部分。 
在第一优选实施例中,第二响应包括使用源110S的公用密钥加密的和使用目标110T的专用密钥签名的资料(material)内的第一响应的随机数。 
在第二优选实施例中,第一响应包括使用源110S的公用密钥加密的和使用目标110T的专用密钥签名的新随机数。在鉴别阶段之后立即执行新随机数的加密和签名,以便这个加密的和签名的响应在从源110S接收到查询之后立即可用于从目标110T发送给源110S。在发送第一响应之后,目标110T使用目标110T的专用密钥解密来自源110S的查询,并生成包括新随机密钥和解密的随机密钥的新消息。随后,目标使用源110S的公用密钥加密该新消息,使用其专用密钥签名该消息,并将该查询内包含的加密的和签名的响应发回给源110S,从而对于源110S验证目标110T的身份。 
当源节点110S接收第一响应时,它结束上述定时器,从而建立在源110S和目标110T之间往返通信时间的测量。一旦接收到第二响应,源节点110S使用目标110T的公用密钥验证签名的消息,并使用源110S的专用密钥来解密来自该响应的随机数和随机密钥。 
为了确认密钥交换,源110S将解密的新随机数发回给目标110T。源110S和目标110T二者根据合适解密的随机数的接收来控制后续通信。根据本发明,源110S也根据确定的通信时间来控制后续通信。 
如果验证两个节点,则源110S和目标110T之间的后续通信使用作为随机密钥、公用密钥和对话索引的组合的对话密钥来加密通信。 
上文仅仅描述本发明的原理。因而,对于本领域的技术人员来说,显然将能够设计出各种安排,这些安排尽管在此未明确描述或图示,但是实施了本发明的原理,并因而落在随后的权利要求书的精神和范畴之内。 

Claims (9)

1.一种确定目标节点对于源节点的邻近性的方法,包括:
在目标节点与源节点使用相应的数字证书来验证彼此的公用密钥的鉴别阶段之后,立即在目标节点上准备第一响应,其中第一响应包括使用源节点的公用密钥加密的并使用目标节点的专用密钥签名的随机数,其中在鉴别阶段之后立即执行随机数的加密和签名,以便这个加密的和签名的响应在从源节点接收到查询之后立即可用于从目标节点发送给源节点;
将查询从源节点传送给目标节点;
在目标节点上接收到该查询之后且在解密该查询之前,立即将第一响应从目标节点传送给源节点;
在源节点上接收第一响应;
在目标节点上处理该查询,以便据此生成有助于目标节点及其第一响应的验证的第二响应;
将第二响应从目标节点传送给源节点;
确定在传送该查询和接收到第一响应之间的通信时间的测量;和
根据通信时间的测量,确定目标节点的邻近性。
2.权利要求1的方法,其中:
该查询以及至少第一响应和第二响应之一对应于密码的密钥交换协议的至少一部分。
3.权利要求2的方法,其中:
该密钥交换协议对应于Needham-Schroeder密钥交换协议。
4.权利要求1的方法,其中:
该查询以及至少第一响应和第二响应之一对应于OCPS协议的至少一部分。
5.权利要求1的方法,其中:
该查询包括基于目标节点的公用密钥对项的加密;和
该查询的处理包括根据目标节点的专用密钥来解密该项,以便包括在第二响应中。
6.权利要求5的方法,其中:
该查询的处理还包括使用源节点的公用密钥来加密该项和随机数,以形成第二响应的至少一部分。
7.权利要求1的方法,其中:
确定邻近性包括将通信时间与区分本地节点和远程节点的阈值进行比较。
8.权利要求1的方法,还包括:
根据邻近性,限制与目标节点的通信。
9.权利要求1的方法,还包括:
根据邻近性,限制目标节点对系统资源的访问。
CN038232685A 2002-09-30 2003-09-22 确定目标节点对于源节点的邻近性的方法 Expired - Lifetime CN1685687B (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310140077.4A CN103354543B (zh) 2002-09-30 2003-09-22 确定目标节点对于源节点的邻近性的方法和相应的节点

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US41494202P 2002-09-30 2002-09-30
US60/414,942 2002-09-30
US44526503P 2003-02-05 2003-02-05
US60/445,265 2003-02-05
PCT/IB2003/004110 WO2004030311A1 (en) 2002-09-30 2003-09-22 Secure proximity verification of a node on a network

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN201310140077.4A Division CN103354543B (zh) 2002-09-30 2003-09-22 确定目标节点对于源节点的邻近性的方法和相应的节点

Publications (2)

Publication Number Publication Date
CN1685687A CN1685687A (zh) 2005-10-19
CN1685687B true CN1685687B (zh) 2013-10-30

Family

ID=32045302

Family Applications (2)

Application Number Title Priority Date Filing Date
CN038232685A Expired - Lifetime CN1685687B (zh) 2002-09-30 2003-09-22 确定目标节点对于源节点的邻近性的方法
CN201310140077.4A Expired - Lifetime CN103354543B (zh) 2002-09-30 2003-09-22 确定目标节点对于源节点的邻近性的方法和相应的节点

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201310140077.4A Expired - Lifetime CN103354543B (zh) 2002-09-30 2003-09-22 确定目标节点对于源节点的邻近性的方法和相应的节点

Country Status (7)

Country Link
US (2) US7991998B2 (zh)
EP (1) EP1550284A1 (zh)
JP (1) JP2006501789A (zh)
KR (1) KR100994937B1 (zh)
CN (2) CN1685687B (zh)
AU (1) AU2003260880A1 (zh)
WO (1) WO2004030311A1 (zh)

Families Citing this family (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3801559B2 (ja) * 2002-12-26 2006-07-26 ソニー株式会社 通信装置および方法、記録媒体、並びにプログラム
AP2005003476A0 (en) * 2003-06-05 2005-12-31 Intertrust Tech Corp Interoperable systems and methods for peer-to-peerservice orchestration.
US7908479B2 (en) 2003-07-28 2011-03-15 Sony Corporation Information processing device and method, recording medium and program
US7437771B2 (en) * 2004-04-19 2008-10-14 Woodcock Washburn Llp Rendering protected digital content within a network of computing devices or the like
JP4270033B2 (ja) * 2004-06-11 2009-05-27 ソニー株式会社 通信システムおよび通信方法
AU2005273532B2 (en) * 2004-06-28 2011-04-07 Acano (Uk) Limited System for proximity determination
CN101023651A (zh) * 2004-09-17 2007-08-22 皇家飞利浦电子股份有限公司 邻近性检查服务器
US7519181B2 (en) * 2004-12-16 2009-04-14 International Business Machines Corporation System and method for enforcing network cluster proximity requirements using a proxy
KR100694104B1 (ko) * 2005-02-23 2007-03-12 삼성전자주식회사 라운드 트립 시간을 측정하는 방법 및 이를 이용한 인접성검사 방법
US20060212535A1 (en) * 2005-03-21 2006-09-21 Marvell World Trade Ltd. Network system for distributing protected content
WO2006112631A1 (en) * 2005-04-22 2006-10-26 Samsung Electronics Co., Ltd. Method of measuring round trip time and proximity checking method using the same
KR100636232B1 (ko) 2005-04-29 2006-10-18 삼성전자주식회사 해시 체인을 이용하여 디바이스들간의 인접성을 검사하는방법 및 장치
US7684566B2 (en) 2005-05-27 2010-03-23 Microsoft Corporation Encryption scheme for streamed multimedia content protected by rights management system
US8321690B2 (en) 2005-08-11 2012-11-27 Microsoft Corporation Protecting digital media of various content types
CN101288288A (zh) 2005-10-14 2008-10-15 皇家飞利浦电子股份有限公司 改进的接近度检测方法
EP2124164A3 (en) * 2005-10-18 2010-04-07 Intertrust Technologies Corporation Digital rights management engine system and method
US9626667B2 (en) 2005-10-18 2017-04-18 Intertrust Technologies Corporation Digital rights management engine systems and methods
US20070204078A1 (en) * 2006-02-09 2007-08-30 Intertrust Technologies Corporation Digital rights management engine systems and methods
JP4843449B2 (ja) 2005-12-02 2011-12-21 ソニー株式会社 コンテンツ送受再生方法および受信再生端末
JP4509955B2 (ja) * 2006-03-13 2010-07-21 株式会社東芝 Vpn通信検出方法及び装置
US20100281261A1 (en) * 2007-11-21 2010-11-04 Nxp B.V. Device and method for near field communications using audio transducers
US20090284600A1 (en) * 2008-05-14 2009-11-19 Chuan Wang Remote-control door viewer surveillance system
US8489732B1 (en) 2009-08-07 2013-07-16 Google Inc. System and method of using spatial and temporal signals to identify and prevent attacks
US8423791B1 (en) 2009-08-07 2013-04-16 Google Inc. Location data quarantine system
US8401354B2 (en) * 2010-02-23 2013-03-19 US Seismic Systems, Inc. Fiber optic security systems and methods of using the same
AU2012242895B2 (en) 2011-04-11 2015-07-02 Intertrust Technologies Corporation Information security systems and methods
US8634322B2 (en) * 2012-02-18 2014-01-21 Bank Of America Corporation Apparatus and methods for adaptive network throttling
US10749772B1 (en) * 2013-09-16 2020-08-18 Amazon Technologies, Inc. Data reconciliation in a distributed data storage network
US9195821B2 (en) * 2013-11-24 2015-11-24 Truly Protect Oy System and methods for remote software authentication of a computing device
US9471511B2 (en) 2013-11-24 2016-10-18 Truly Protect Oy System and methods for CPU copy protection of a computing device
US9775034B2 (en) * 2015-02-06 2017-09-26 Nxp B.V. Communications with distance authentication
US10547449B2 (en) * 2017-05-30 2020-01-28 Nxp B.V. Protection against relay attacks in a white-box implementation
WO2020083750A1 (en) * 2018-10-22 2020-04-30 Dormakaba Schweiz Ag Uwb access rights update
CN110213242B (zh) * 2019-05-09 2020-09-08 浙江大学 一种多路路由背景下的高效路径验证方法

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000069111A2 (en) * 1999-05-10 2000-11-16 Rienzo Andrew L Di Authentication
WO2001093434A2 (en) * 2000-05-26 2001-12-06 Xtremespectrum, Inc. Method and system for enabling device functions based on distance information
WO2002035036A1 (en) * 2000-10-23 2002-05-02 Volvo Technological Development Corporation A method for controlling authorization to an object and a computer program product for the authorization control

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6088450A (en) * 1996-04-17 2000-07-11 Intel Corporation Authentication system based on periodic challenge/response protocol
US6069896A (en) * 1996-10-15 2000-05-30 Motorola, Inc. Capability addressable network and method therefor
US7296088B1 (en) * 2000-11-17 2007-11-13 Microsoft Corporation System and method for determining the geographic location of internet hosts
US7117264B2 (en) * 2002-01-10 2006-10-03 International Business Machines Corporation Method and system for peer to peer communication in a network environment
US6978023B2 (en) * 2003-03-25 2005-12-20 Sony Corporation Apparatus and method for location based wireless client authentication
AU2005273532B2 (en) * 2004-06-28 2011-04-07 Acano (Uk) Limited System for proximity determination

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000069111A2 (en) * 1999-05-10 2000-11-16 Rienzo Andrew L Di Authentication
WO2001093434A2 (en) * 2000-05-26 2001-12-06 Xtremespectrum, Inc. Method and system for enabling device functions based on distance information
WO2002035036A1 (en) * 2000-10-23 2002-05-02 Volvo Technological Development Corporation A method for controlling authorization to an object and a computer program product for the authorization control

Also Published As

Publication number Publication date
US20110258449A1 (en) 2011-10-20
CN103354543B (zh) 2016-10-19
US20060041642A1 (en) 2006-02-23
EP1550284A1 (en) 2005-07-06
US7991998B2 (en) 2011-08-02
US8239676B2 (en) 2012-08-07
KR20050070005A (ko) 2005-07-05
WO2004030311A1 (en) 2004-04-08
AU2003260880A1 (en) 2004-04-19
CN103354543A (zh) 2013-10-16
KR100994937B1 (ko) 2010-11-19
CN1685687A (zh) 2005-10-19
JP2006501789A (ja) 2006-01-12

Similar Documents

Publication Publication Date Title
CN1685687B (zh) 确定目标节点对于源节点的邻近性的方法
US7584505B2 (en) Inspected secure communication protocol
US6732270B1 (en) Method to authenticate a network access server to an authentication server
US7688975B2 (en) Method and apparatus for dynamic generation of symmetric encryption keys and exchange of dynamic symmetric key infrastructure
KR100979576B1 (ko) 새로운 패스워드를 실현하기 위한 방법 및 컴퓨터 판독가능 매체
US9008312B2 (en) System and method of creating and sending broadcast and multicast data
KR20010004791A (ko) 인터넷 환경의 이동통신시스템에서 사용자 정보 보안 장치 및그 방법
CN100579111C (zh) 确定目标节点到源节点的邻近程度的方法以及网络节点
EP1493243B1 (en) Secure file transfer
JP2005503717A (ja) Usb認証インタフェース
CN111080299B (zh) 一种交易信息的防抵赖方法及客户端、服务器
JP2004274134A (ja) 通信方法並びにこの通信方法を用いた通信システム、サーバおよびクライアント
CN120582913A (zh) 基于量子局域网的邮件传输方法
JP2007074761A (ja) データ暗号化方法、データ復号化方法、不正アクセス防止機能を有するlan制御装置、及び情報処理装置
JP2005217665A (ja) 通信システム、送信装置、受信装置及び通信方法
Arnold et al. Network Security Issues Case Study: Secure Talk

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CX01 Expiry of patent term
CX01 Expiry of patent term

Granted publication date: 20131030