[go: up one dir, main page]

DE60318058D1 - Verfahren und Vorrichtung zum Wiederauffinden von in einem Schlüsselverwaltungssystem gesicherten Werten - Google Patents

Verfahren und Vorrichtung zum Wiederauffinden von in einem Schlüsselverwaltungssystem gesicherten Werten

Info

Publication number
DE60318058D1
DE60318058D1 DE60318058T DE60318058T DE60318058D1 DE 60318058 D1 DE60318058 D1 DE 60318058D1 DE 60318058 T DE60318058 T DE 60318058T DE 60318058 T DE60318058 T DE 60318058T DE 60318058 D1 DE60318058 D1 DE 60318058D1
Authority
DE
Germany
Prior art keywords
key management
management system
values saved
retrieving values
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
DE60318058T
Other languages
English (en)
Inventor
Chui-Shan Teresa Lam
Jameel Ur Rahman Syed
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Schlumberger Omnes Inc
Original Assignee
Schlumberger Omnes Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Schlumberger Omnes Inc filed Critical Schlumberger Omnes Inc
Application granted granted Critical
Publication of DE60318058D1 publication Critical patent/DE60318058D1/de
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • G06Q20/027Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP] involving a payment switch or gateway
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Strategic Management (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Human Resources & Organizations (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Economics (AREA)
  • Tourism & Hospitality (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Marketing (AREA)
  • Data Mining & Analysis (AREA)
  • Finance (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)
  • Lock And Its Accessories (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
DE60318058T 2002-02-25 2003-02-25 Verfahren und Vorrichtung zum Wiederauffinden von in einem Schlüsselverwaltungssystem gesicherten Werten Expired - Lifetime DE60318058D1 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/082,758 US7251635B2 (en) 2002-02-25 2002-02-25 Method and apparatus for managing a key management system
PCT/US2003/005767 WO2003073690A2 (en) 2002-02-25 2003-02-25 Method and apparatus for managing a key management system

Publications (1)

Publication Number Publication Date
DE60318058D1 true DE60318058D1 (de) 2008-01-24

Family

ID=27753169

Family Applications (1)

Application Number Title Priority Date Filing Date
DE60318058T Expired - Lifetime DE60318058D1 (de) 2002-02-25 2003-02-25 Verfahren und Vorrichtung zum Wiederauffinden von in einem Schlüsselverwaltungssystem gesicherten Werten

Country Status (6)

Country Link
US (3) US7251635B2 (de)
EP (1) EP1522167B1 (de)
AT (1) ATE381168T1 (de)
AU (1) AU2003213289A1 (de)
DE (1) DE60318058D1 (de)
WO (1) WO2003073690A2 (de)

Families Citing this family (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7660421B2 (en) * 2002-06-28 2010-02-09 Hewlett-Packard Development Company, L.P. Method and system for secure storage, transmission and control of cryptographic keys
US7461260B2 (en) * 2002-12-31 2008-12-02 Intel Corporation Methods and apparatus for finding a shared secret without compromising non-shared secrets
US8045714B2 (en) * 2005-02-07 2011-10-25 Microsoft Corporation Systems and methods for managing multiple keys for file encryption and decryption
US9088551B2 (en) * 2005-06-29 2015-07-21 International Business Machines Corporation Method and system for easily and securely managing multiple keys used to have access to multiple computing resources
US8352999B1 (en) * 2006-07-21 2013-01-08 Cadence Design Systems, Inc. Method for managing data in a shared computing environment
US8290152B2 (en) * 2007-08-30 2012-10-16 Microsoft Corporation Management system for web service developer keys
US8254577B2 (en) * 2008-02-20 2012-08-28 International Business Machines Corporation Validation of encryption key
US8205098B2 (en) 2008-02-25 2012-06-19 Microsoft Corporation Secure and usable protection of a roamable credentials store
US20100115261A1 (en) * 2008-11-06 2010-05-06 International Business Machines Corporation Extensible seal management for encrypted data
KR20110128567A (ko) * 2010-05-24 2011-11-30 삼성전자주식회사 사용자 인터페이스에 포함되는 오브젝트의 제어 방법 및 상기 방법이 채용된 장치
US9356993B1 (en) 2011-03-08 2016-05-31 Ciphercloud, Inc. System and method to anonymize data transmitted to a destination computing device
US9300637B1 (en) * 2011-03-08 2016-03-29 Ciphercloud, Inc. System and method to anonymize data transmitted to a destination computing device
US9292696B1 (en) 2011-03-08 2016-03-22 Ciphercloud, Inc. System and method to anonymize data transmitted to a destination computing device
US9338220B1 (en) 2011-03-08 2016-05-10 Ciphercloud, Inc. System and method to anonymize data transmitted to a destination computing device
US9667741B1 (en) 2011-03-08 2017-05-30 Ciphercloud, Inc. System and method to anonymize data transmitted to a destination computing device
US11228566B1 (en) 2011-03-08 2022-01-18 Ciphercloud, Inc. System and method to anonymize data transmitted to a destination computing device
US8726398B1 (en) 2011-12-13 2014-05-13 Ciphercloud, Inc. System and method to anonymize data transmitted to a destination computing device
US9413526B1 (en) * 2011-03-08 2016-08-09 Ciphercloud, Inc. System and method to anonymize data transmitted to a destination computing device
US9852311B1 (en) 2011-03-08 2017-12-26 Ciphercloud, Inc. System and method to anonymize data transmitted to a destination computing device
US9432342B1 (en) 2011-03-08 2016-08-30 Ciphercloud, Inc. System and method to anonymize data transmitted to a destination computing device
US9264230B2 (en) 2011-03-14 2016-02-16 International Business Machines Corporation Secure key management
US8619990B2 (en) 2011-04-27 2013-12-31 International Business Machines Corporation Secure key creation
US8634561B2 (en) * 2011-05-04 2014-01-21 International Business Machines Corporation Secure key management
US8789210B2 (en) 2011-05-04 2014-07-22 International Business Machines Corporation Key usage policies for cryptographic keys
US8566913B2 (en) 2011-05-04 2013-10-22 International Business Machines Corporation Secure key management
US8755527B2 (en) 2011-05-04 2014-06-17 International Business Machines Corporation Key management policies for cryptographic keys
US8738908B2 (en) 2011-05-10 2014-05-27 Softlayer Technologies, Inc. System and method for web-based security authentication
US9449183B2 (en) * 2012-01-28 2016-09-20 Jianqing Wu Secure file drawer and safe
US8925059B2 (en) 2012-06-08 2014-12-30 Lockheed Martin Corporation Dynamic trust connection
US9092427B2 (en) 2012-06-08 2015-07-28 Lockheed Martin Corporation Dynamic trust session
US10372935B1 (en) * 2015-11-13 2019-08-06 Google Llc Selectively encrypting commit log entries
US11392724B2 (en) * 2017-12-21 2022-07-19 City University Of Hong Kong Method for accelerating execution of application in a trusted execution environment
US10833857B2 (en) * 2018-01-29 2020-11-10 International Business Machines Corporation Encryption key management in a data storage system communicating with asynchronous key servers
EP3694142A1 (de) * 2019-02-07 2020-08-12 Tomes GmbH Verwaltung und verteilung von schlüsseln in verteilten umgebungen
CN110598440B (zh) * 2019-08-08 2023-05-09 中腾信金融信息服务(上海)有限公司 一种分布式自动加解密系统
US11489821B2 (en) 2020-02-26 2022-11-01 International Business Machines Corporation Processing a request to initiate a secure data transfer in a computing environment
US11546137B2 (en) 2020-02-26 2023-01-03 International Business Machines Corporation Generation of a request to initiate a secure data transfer in a computing environment
US11502834B2 (en) 2020-02-26 2022-11-15 International Business Machines Corporation Refreshing keys in a computing environment that provides secure data transfer
US11184160B2 (en) 2020-02-26 2021-11-23 International Business Machines Corporation Channel key loading in a computing environment
US11652616B2 (en) * 2020-02-26 2023-05-16 International Business Machines Corporation Initializing a local key manager for providing secure data transfer in a computing environment
US11405215B2 (en) 2020-02-26 2022-08-02 International Business Machines Corporation Generation of a secure key exchange authentication response in a computing environment
CN111539713B (zh) * 2020-03-19 2023-11-03 上海讯联数据服务有限公司 移动支付账户端用户凭证生成转换方法、系统及存储介质
US11750566B1 (en) * 2020-03-31 2023-09-05 Amazon Technologies, Inc. Configuring virtual computer systems with a web service interface to perform operations in cryptographic devices
US20250141672A1 (en) * 2023-10-31 2025-05-01 Jpmorgan Chase Bank, N.A. Systems and methods for providing and maintaining secure client-based permission lists

Family Cites Families (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5373561A (en) * 1992-12-21 1994-12-13 Bell Communications Research, Inc. Method of extending the validity of a cryptographic certificate
CZ197896A3 (en) * 1994-01-13 1997-03-12 Bankers Trust Co Encryption method with safekeeping of a key in a third person and a cryptographic system for making the same
US5499298A (en) 1994-03-17 1996-03-12 National University Of Singapore Controlled dissemination of digital information
US5495533A (en) * 1994-04-29 1996-02-27 International Business Machines Corporation Personal key archive
US5646997A (en) * 1994-12-14 1997-07-08 Barton; James M. Method and apparatus for embedding authentication information within digital data
US5892900A (en) 1996-08-30 1999-04-06 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US6658568B1 (en) 1995-02-13 2003-12-02 Intertrust Technologies Corporation Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management
US5673316A (en) 1996-03-29 1997-09-30 International Business Machines Corporation Creation and distribution of cryptographic envelope
US6035402A (en) * 1996-12-20 2000-03-07 Gte Cybertrust Solutions Incorporated Virtual certificate authority
US6157723A (en) * 1997-03-03 2000-12-05 Motorola, Inc. Method and apparatus for secure communications with encryption key scheduling
US7263497B1 (en) * 1998-02-06 2007-08-28 Microsoft Corporation Secure online music distribution system
US6351812B1 (en) * 1998-09-04 2002-02-26 At&T Corp Method and apparatus for authenticating participants in electronic commerce
AU6278299A (en) 1998-10-01 2000-04-17 University Of Maryland Distributed shared key generation and management using fractional keys
EP1131912A4 (de) 1998-10-23 2004-05-12 L 3 Comm Corp Vorrichtungen und verfahren zur schlüsselverwaltung in heterogenen krypto-einrichtungen
US6370250B1 (en) * 1998-10-29 2002-04-09 International Business Machines Corporation Method of authentication and storage of private keys in a public key cryptography system (PKCS)
US6301585B1 (en) 1999-03-17 2001-10-09 Sun Microsystems, Inc. Redundancy elimination in the persistence of object graphs
JP2000286836A (ja) * 1999-03-30 2000-10-13 Fujitsu Ltd 認証装置および記録媒体
US6757903B1 (en) 1999-04-05 2004-06-29 Gateway, Inc. Object driven software architecture method and apparatus
US6792424B1 (en) * 1999-04-23 2004-09-14 International Business Machines Corporation System and method for managing authentication and coherency in a storage area network
ES2222922T3 (es) 1999-08-31 2005-02-16 Motorola, Inc. Metodos de gestion de claves para sistemas seguros de comunicacion.
US7362868B2 (en) 2000-10-20 2008-04-22 Eruces, Inc. Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data
US6735582B2 (en) * 2000-12-15 2004-05-11 International Business Machines Corporation Pre-load cursor in a database method and system
GB0114317D0 (en) * 2001-06-13 2001-08-01 Kean Thomas A Method of protecting intellectual property cores on field programmable gate array

Also Published As

Publication number Publication date
WO2003073690A3 (en) 2004-03-11
WO2003073690A2 (en) 2003-09-04
US7251635B2 (en) 2007-07-31
US7603322B2 (en) 2009-10-13
AU2003213289A1 (en) 2003-09-09
US20070127722A1 (en) 2007-06-07
US20070217613A1 (en) 2007-09-20
EP1522167A2 (de) 2005-04-13
EP1522167B1 (de) 2007-12-12
US20030163433A1 (en) 2003-08-28
ATE381168T1 (de) 2007-12-15

Similar Documents

Publication Publication Date Title
DE60318058D1 (de) Verfahren und Vorrichtung zum Wiederauffinden von in einem Schlüsselverwaltungssystem gesicherten Werten
ATE453157T1 (de) Verfahren und vorrichtung zum sammeln und anzeigen von netzwerkgeräteinformationen
TW200502802A (en) Method, device and system for intelligent right data search management as well as the storage medium storing and executing computer program of this method
DE60006845D1 (de) Verfahren und vorrichtung zur zusammenarbeit bei multimediaerzeugung über einem netzwerk
CN110888932A (zh) 基于区块链的城市建筑废弃物监管方法、系统及存储介质
WO2003075633A3 (en) Method and system for managing software licenses
ATE457493T1 (de) Verfahren und vorrichtung zum durchsuchen von backup-daten auf der basis von inhalt und attributen
ATE539534T1 (de) Vorrichtung, system und verfahren zur datenspeicherung auf grid-basis
DE69927027T2 (de) Netzwerkverfahrensverwaltung und wirksamkeits system
GB0303490D0 (en) System and method for checking data stored in database system used for part management
DE602004018651D1 (de) Verfahren und vorrichtungen zum verifizieren von kontextteilnehmern in einem kontextverwaltungssystem in einer vernetzten umgebung
DE60314060D1 (de) Verfahren und Vorrichtung zur Schlüsselverwaltung für gesicherte Datenübertragung
IL145993A0 (en) A system and method for managing distribution of content to a device
ATE476694T1 (de) Systemeinrichtung und verfahren zur verwaltung von dateisicherheitsattributen in einem computerdatei-speichersystem
IL164143A0 (en) Method and system for enterprise business process management
WO2003063056A3 (en) Apparatus and method for managing prescription benefits
ATE450010T1 (de) Verfahren und gerät zur datenarchivierung
ATE390796T1 (de) Vorrichtung und verfahren zum zugriff von kontaktinformationen in einem kommunikationsgerät
DE60328037D1 (de) Inhaltsverwaltungssystem
GB2401458A (en) Lot trade managing method, device, program and recording medium
TW200519679A (en) Integrated network element management system and method
CN105069338A (zh) 采用虹膜加密的信息存储方法
TW200500905A (en) Logistics quotation maintaining system and method
CN112687032B (zh) 一种利用机械锁的工作任务监控方法及系统
CN105069368A (zh) 具有隐私保护功能的信息存储方法

Legal Events

Date Code Title Description
8332 No legal effect for de