ATE381168T1 - Verfahren und vorrichtung zum wiederauffinden von in einem schlüsselverwaltungssystem gesicherten werten - Google Patents

Verfahren und vorrichtung zum wiederauffinden von in einem schlüsselverwaltungssystem gesicherten werten

Info

Publication number
ATE381168T1
ATE381168T1 AT03709340T AT03709340T ATE381168T1 AT E381168 T1 ATE381168 T1 AT E381168T1 AT 03709340 T AT03709340 T AT 03709340T AT 03709340 T AT03709340 T AT 03709340T AT E381168 T1 ATE381168 T1 AT E381168T1
Authority
AT
Austria
Prior art keywords
key management
management system
loving
key
values secured
Prior art date
Application number
AT03709340T
Other languages
English (en)
Inventor
Chui-Shan Lam
Jameel Ur Rahman Syed
Original Assignee
Schlumberger Omnes Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Schlumberger Omnes Inc filed Critical Schlumberger Omnes Inc
Application granted granted Critical
Publication of ATE381168T1 publication Critical patent/ATE381168T1/de

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • G06Q20/027Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP] involving a payment switch or gateway
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Strategic Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Computing Systems (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Marketing (AREA)
  • Data Mining & Analysis (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Lock And Its Accessories (AREA)
AT03709340T 2002-02-25 2003-02-25 Verfahren und vorrichtung zum wiederauffinden von in einem schlüsselverwaltungssystem gesicherten werten ATE381168T1 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US10/082,758 US7251635B2 (en) 2002-02-25 2002-02-25 Method and apparatus for managing a key management system

Publications (1)

Publication Number Publication Date
ATE381168T1 true ATE381168T1 (de) 2007-12-15

Family

ID=27753169

Family Applications (1)

Application Number Title Priority Date Filing Date
AT03709340T ATE381168T1 (de) 2002-02-25 2003-02-25 Verfahren und vorrichtung zum wiederauffinden von in einem schlüsselverwaltungssystem gesicherten werten

Country Status (6)

Country Link
US (3) US7251635B2 (de)
EP (1) EP1522167B1 (de)
AT (1) ATE381168T1 (de)
AU (1) AU2003213289A1 (de)
DE (1) DE60318058D1 (de)
WO (1) WO2003073690A2 (de)

Families Citing this family (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7660421B2 (en) * 2002-06-28 2010-02-09 Hewlett-Packard Development Company, L.P. Method and system for secure storage, transmission and control of cryptographic keys
US7461260B2 (en) * 2002-12-31 2008-12-02 Intel Corporation Methods and apparatus for finding a shared secret without compromising non-shared secrets
US8045714B2 (en) * 2005-02-07 2011-10-25 Microsoft Corporation Systems and methods for managing multiple keys for file encryption and decryption
US9088551B2 (en) * 2005-06-29 2015-07-21 International Business Machines Corporation Method and system for easily and securely managing multiple keys used to have access to multiple computing resources
US8352999B1 (en) * 2006-07-21 2013-01-08 Cadence Design Systems, Inc. Method for managing data in a shared computing environment
US8290152B2 (en) * 2007-08-30 2012-10-16 Microsoft Corporation Management system for web service developer keys
US8254577B2 (en) * 2008-02-20 2012-08-28 International Business Machines Corporation Validation of encryption key
US8205098B2 (en) * 2008-02-25 2012-06-19 Microsoft Corporation Secure and usable protection of a roamable credentials store
US20100115261A1 (en) * 2008-11-06 2010-05-06 International Business Machines Corporation Extensible seal management for encrypted data
KR20110128567A (ko) * 2010-05-24 2011-11-30 삼성전자주식회사 사용자 인터페이스에 포함되는 오브젝트의 제어 방법 및 상기 방법이 채용된 장치
US9432342B1 (en) 2011-03-08 2016-08-30 Ciphercloud, Inc. System and method to anonymize data transmitted to a destination computing device
US9413526B1 (en) * 2011-03-08 2016-08-09 Ciphercloud, Inc. System and method to anonymize data transmitted to a destination computing device
US9338220B1 (en) 2011-03-08 2016-05-10 Ciphercloud, Inc. System and method to anonymize data transmitted to a destination computing device
US11228566B1 (en) 2011-03-08 2022-01-18 Ciphercloud, Inc. System and method to anonymize data transmitted to a destination computing device
US9356993B1 (en) 2011-03-08 2016-05-31 Ciphercloud, Inc. System and method to anonymize data transmitted to a destination computing device
US9667741B1 (en) 2011-03-08 2017-05-30 Ciphercloud, Inc. System and method to anonymize data transmitted to a destination computing device
US9300637B1 (en) * 2011-03-08 2016-03-29 Ciphercloud, Inc. System and method to anonymize data transmitted to a destination computing device
US9852311B1 (en) 2011-03-08 2017-12-26 Ciphercloud, Inc. System and method to anonymize data transmitted to a destination computing device
US9292696B1 (en) 2011-03-08 2016-03-22 Ciphercloud, Inc. System and method to anonymize data transmitted to a destination computing device
US8726398B1 (en) 2011-12-13 2014-05-13 Ciphercloud, Inc. System and method to anonymize data transmitted to a destination computing device
US9264230B2 (en) 2011-03-14 2016-02-16 International Business Machines Corporation Secure key management
US8619990B2 (en) 2011-04-27 2013-12-31 International Business Machines Corporation Secure key creation
US8789210B2 (en) 2011-05-04 2014-07-22 International Business Machines Corporation Key usage policies for cryptographic keys
US8566913B2 (en) 2011-05-04 2013-10-22 International Business Machines Corporation Secure key management
US8634561B2 (en) * 2011-05-04 2014-01-21 International Business Machines Corporation Secure key management
US8755527B2 (en) 2011-05-04 2014-06-17 International Business Machines Corporation Key management policies for cryptographic keys
US8738908B2 (en) 2011-05-10 2014-05-27 Softlayer Technologies, Inc. System and method for web-based security authentication
US9449183B2 (en) * 2012-01-28 2016-09-20 Jianqing Wu Secure file drawer and safe
US8925059B2 (en) 2012-06-08 2014-12-30 Lockheed Martin Corporation Dynamic trust connection
US9092427B2 (en) 2012-06-08 2015-07-28 Lockheed Martin Corporation Dynamic trust session
US10372935B1 (en) 2015-11-13 2019-08-06 Google Llc Selectively encrypting commit log entries
US11392724B2 (en) * 2017-12-21 2022-07-19 City University Of Hong Kong Method for accelerating execution of application in a trusted execution environment
US10833857B2 (en) * 2018-01-29 2020-11-10 International Business Machines Corporation Encryption key management in a data storage system communicating with asynchronous key servers
EP3694142A1 (de) * 2019-02-07 2020-08-12 Tomes GmbH Verwaltung und verteilung von schlüsseln in verteilten umgebungen
CN110598440B (zh) * 2019-08-08 2023-05-09 中腾信金融信息服务(上海)有限公司 一种分布式自动加解密系统
US11546137B2 (en) 2020-02-26 2023-01-03 International Business Machines Corporation Generation of a request to initiate a secure data transfer in a computing environment
US11184160B2 (en) 2020-02-26 2021-11-23 International Business Machines Corporation Channel key loading in a computing environment
US11489821B2 (en) 2020-02-26 2022-11-01 International Business Machines Corporation Processing a request to initiate a secure data transfer in a computing environment
US11652616B2 (en) * 2020-02-26 2023-05-16 International Business Machines Corporation Initializing a local key manager for providing secure data transfer in a computing environment
US11502834B2 (en) 2020-02-26 2022-11-15 International Business Machines Corporation Refreshing keys in a computing environment that provides secure data transfer
US11405215B2 (en) 2020-02-26 2022-08-02 International Business Machines Corporation Generation of a secure key exchange authentication response in a computing environment
CN111539713B (zh) * 2020-03-19 2023-11-03 上海讯联数据服务有限公司 移动支付账户端用户凭证生成转换方法、系统及存储介质
US11750566B1 (en) * 2020-03-31 2023-09-05 Amazon Technologies, Inc. Configuring virtual computer systems with a web service interface to perform operations in cryptographic devices
US20250141672A1 (en) * 2023-10-31 2025-05-01 Jpmorgan Chase Bank, N.A. Systems and methods for providing and maintaining secure client-based permission lists

Family Cites Families (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5373561A (en) * 1992-12-21 1994-12-13 Bell Communications Research, Inc. Method of extending the validity of a cryptographic certificate
ATE202439T1 (de) * 1994-01-13 2001-07-15 Certco Inc Verschlüsselungseinrichtung und verfahren mit möglichkeit zur gesicherten zentralen schlüsselablage
US5499298A (en) 1994-03-17 1996-03-12 National University Of Singapore Controlled dissemination of digital information
US5495533A (en) * 1994-04-29 1996-02-27 International Business Machines Corporation Personal key archive
US5646997A (en) * 1994-12-14 1997-07-08 Barton; James M. Method and apparatus for embedding authentication information within digital data
US5892900A (en) 1996-08-30 1999-04-06 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US6658568B1 (en) 1995-02-13 2003-12-02 Intertrust Technologies Corporation Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management
US5673316A (en) 1996-03-29 1997-09-30 International Business Machines Corporation Creation and distribution of cryptographic envelope
US6035402A (en) * 1996-12-20 2000-03-07 Gte Cybertrust Solutions Incorporated Virtual certificate authority
US6157723A (en) * 1997-03-03 2000-12-05 Motorola, Inc. Method and apparatus for secure communications with encryption key scheduling
US7263497B1 (en) * 1998-02-06 2007-08-28 Microsoft Corporation Secure online music distribution system
US6351812B1 (en) * 1998-09-04 2002-02-26 At&T Corp Method and apparatus for authenticating participants in electronic commerce
WO2000019652A1 (en) 1998-10-01 2000-04-06 University Of Maryland Distributed shared key generation and management using fractional keys
JP2002529008A (ja) 1998-10-23 2002-09-03 エル3 コミュニケーションズ コーポレイション 異質の暗号資産におけるキイの資料を管理する装置および方法
US6370250B1 (en) * 1998-10-29 2002-04-09 International Business Machines Corporation Method of authentication and storage of private keys in a public key cryptography system (PKCS)
US6301585B1 (en) 1999-03-17 2001-10-09 Sun Microsystems, Inc. Redundancy elimination in the persistence of object graphs
JP2000286836A (ja) * 1999-03-30 2000-10-13 Fujitsu Ltd 認証装置および記録媒体
US6757903B1 (en) 1999-04-05 2004-06-29 Gateway, Inc. Object driven software architecture method and apparatus
US6792424B1 (en) * 1999-04-23 2004-09-14 International Business Machines Corporation System and method for managing authentication and coherency in a storage area network
ES2222922T3 (es) 1999-08-31 2005-02-16 Motorola, Inc. Metodos de gestion de claves para sistemas seguros de comunicacion.
US7362868B2 (en) 2000-10-20 2008-04-22 Eruces, Inc. Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data
US6735582B2 (en) * 2000-12-15 2004-05-11 International Business Machines Corporation Pre-load cursor in a database method and system
GB0114317D0 (en) * 2001-06-13 2001-08-01 Kean Thomas A Method of protecting intellectual property cores on field programmable gate array

Also Published As

Publication number Publication date
US20030163433A1 (en) 2003-08-28
WO2003073690A2 (en) 2003-09-04
US20070127722A1 (en) 2007-06-07
EP1522167B1 (de) 2007-12-12
EP1522167A2 (de) 2005-04-13
DE60318058D1 (de) 2008-01-24
AU2003213289A1 (en) 2003-09-09
US7603322B2 (en) 2009-10-13
US20070217613A1 (en) 2007-09-20
US7251635B2 (en) 2007-07-31
WO2003073690A3 (en) 2004-03-11

Similar Documents

Publication Publication Date Title
ATE381168T1 (de) Verfahren und vorrichtung zum wiederauffinden von in einem schlüsselverwaltungssystem gesicherten werten
ATE453157T1 (de) Verfahren und vorrichtung zum sammeln und anzeigen von netzwerkgeräteinformationen
DE60006845D1 (de) Verfahren und vorrichtung zur zusammenarbeit bei multimediaerzeugung über einem netzwerk
ATE418759T1 (de) Verfahren und vorrichtungen zum verifizieren von kontextteilnehmern in einem kontextverwaltungssystem in einer vernetzten umgebung
TW200502802A (en) Method, device and system for intelligent right data search management as well as the storage medium storing and executing computer program of this method
DE69927027T2 (de) Netzwerkverfahrensverwaltung und wirksamkeits system
TW200620036A (en) Hierarchical projects in a computer-enabled project management method and system
IL164143A0 (en) Method and system for enterprise business process management
ATE539534T1 (de) Vorrichtung, system und verfahren zur datenspeicherung auf grid-basis
ATE457493T1 (de) Verfahren und vorrichtung zum durchsuchen von backup-daten auf der basis von inhalt und attributen
ATE389910T1 (de) Verfahren und vorrichtung zur personalisierung und identitätsverwaltung
DE60314060D1 (de) Verfahren und Vorrichtung zur Schlüsselverwaltung für gesicherte Datenübertragung
DE60133648D1 (de) System und verfahren zum führen von laufzeitdaten in einem server-netzwerk
GB0303490D0 (en) System and method for checking data stored in database system used for part management
WO2004109470A3 (en) System and method for distribution of software licenses in a networked computing environment
EP1540500A4 (de) VERFAHREN UND VORRICHTUNG ZUM VERÖFFENTLICHEN UND ÜBERWACHEN VON ENTITûTEN, DIE DIENSTE IN EINEM VERTEILTEN DATENVERARBEITUNGSSYSTEM BEREITSTELLEN
ATE339573T1 (de) Verriegelungssystem, verriegelungssystemvorrichtung und verfahren zur konfiguration eines verriegelungssystems
ATE390796T1 (de) Vorrichtung und verfahren zum zugriff von kontaktinformationen in einem kommunikationsgerät
ATE434329T1 (de) Inhaltsverwaltungssystem
WO2007038327A3 (en) System and method for event log review
ATE461490T1 (de) Verfahren, system, datenverarbeitungseinrichtung und computerprogramm zum spezifizieren von knoten in einem einrichtungs-verwaltungssystem
WO2004042522A3 (en) Digital-rights management
ATE382229T1 (de) Verfahren und system zur authentifizierung in einem computernetzwerk
DE60336946D1 (de) System, Verfahren und Computerprogram zur Cachespeicherung von Domain-Name-System-Information in einem Netzwerkgateway
ATE521943T1 (de) Verfahren und vorrichtung zur zugriffssteuerung in wissensnetzen

Legal Events

Date Code Title Description
RER Ceased as to paragraph 5 lit. 3 law introducing patent treaties