ATE457609T1 - Überprüfung von drahtloser zugangssoftware mittels hashing von kennungen - Google Patents

Überprüfung von drahtloser zugangssoftware mittels hashing von kennungen

Info

Publication number
ATE457609T1
ATE457609T1 AT05257339T AT05257339T ATE457609T1 AT E457609 T1 ATE457609 T1 AT E457609T1 AT 05257339 T AT05257339 T AT 05257339T AT 05257339 T AT05257339 T AT 05257339T AT E457609 T1 ATE457609 T1 AT E457609T1
Authority
AT
Austria
Prior art keywords
hashing
identifiers
verification
wireless access
access software
Prior art date
Application number
AT05257339T
Other languages
English (en)
Inventor
George Baldwin Bumiller
Adrian Buckley
Original Assignee
Research In Motion Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Research In Motion Ltd filed Critical Research In Motion Ltd
Application granted granted Critical
Publication of ATE457609T1 publication Critical patent/ATE457609T1/de

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2153Using hardware token as a secondary aspect
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data
    • H04W8/245Transfer of terminal data from a network towards a terminal

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)
AT05257339T 2005-11-29 2005-11-29 Überprüfung von drahtloser zugangssoftware mittels hashing von kennungen ATE457609T1 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP05257339A EP1791378B1 (de) 2005-11-29 2005-11-29 Überprüfung von drahtloser Zugangssoftware mittels Hashing von Kennungen

Publications (1)

Publication Number Publication Date
ATE457609T1 true ATE457609T1 (de) 2010-02-15

Family

ID=36098959

Family Applications (1)

Application Number Title Priority Date Filing Date
AT05257339T ATE457609T1 (de) 2005-11-29 2005-11-29 Überprüfung von drahtloser zugangssoftware mittels hashing von kennungen

Country Status (5)

Country Link
EP (1) EP1791378B1 (de)
AT (1) ATE457609T1 (de)
CA (1) CA2630485C (de)
DE (1) DE602005019307D1 (de)
WO (1) WO2007062514A1 (de)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101216915B (zh) * 2008-01-21 2012-07-25 深圳市路通网络技术有限公司 安全移动支付方法
CN102291848A (zh) * 2011-08-10 2011-12-21 广州市动景计算机科技有限公司 塞班平台的wlan客户端接入方法及系统
US11366905B2 (en) * 2016-07-04 2022-06-21 Sew-Eurodrive Gmbh & Co. Kg Security device and method for operating a system

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6243468B1 (en) * 1998-04-29 2001-06-05 Microsoft Corporation Software anti-piracy system that adapts to hardware upgrades
GB2340344A (en) * 1998-07-29 2000-02-16 Nokia Mobile Phones Ltd Bilateral Data Transfer Verification for Programming a Cellular Phone
WO2001026400A1 (de) * 1999-10-01 2001-04-12 Swisscom Mobile Ag Verfahren, um die authentizität von durch eine zertifizierungsinstanz herausgegebenen elektronischen zertifikaten in einem mobilgerät zu verifizieren und entsprechendes identifizierungsmodul
ATE291807T1 (de) * 2001-05-08 2005-04-15 Ericsson Telefon Ab L M Sicherer zugang zu einem entfernten teilnehmermodul
CN100508448C (zh) * 2001-10-12 2009-07-01 松下电器产业株式会社 内容处理装置
US8041957B2 (en) * 2003-04-08 2011-10-18 Qualcomm Incorporated Associating software with hardware using cryptography
US7930553B2 (en) * 2003-04-11 2011-04-19 Intel Corporation System and method for extending secure authentication using unique session keys derived from entropy generated by authentication method
GB0315844D0 (en) * 2003-07-04 2003-08-13 Transitive Ltd Method and apparatus for performing adjustable precision exception handling

Also Published As

Publication number Publication date
WO2007062514A1 (en) 2007-06-07
EP1791378B1 (de) 2010-02-10
CA2630485C (en) 2012-07-10
EP1791378A1 (de) 2007-05-30
CA2630485A1 (en) 2007-06-07
DE602005019307D1 (de) 2010-03-25

Similar Documents

Publication Publication Date Title
ATE494693T1 (de) Authentifizierungsverfahren
NO20032947L (no) Fremgangsmåte og anordning for å tilveiebringe en sikker maskinvareidentifikator til bruk i forbindelse med et forvaltningssystem fordigitale rettigheter
DE602006013399D1 (de) System und Verfahren für den Vergleich von Privatwerten
EA200970201A1 (ru) Способ и система для обеспечения специфических для доступа ключей
DE60330627D1 (de) Verwendung eines Hash beim Starten eines sicheren Betriebssystems
NO20043285L (no) Projisering av troverdighet fra et klarert miljo til et ikke-klarert miljo
RU2014132923A (ru) Система и способ установки пользовательских настроек
TW200704100A (en) Encryption communication method and system
WO2007117315A3 (en) Methods and apparatus for power source authentication
EP1657662A3 (de) Effiziente Schutzliste benutzerseitig änderbarer Dateien
BRPI0710257A8 (pt) Método para autenticar uma aplicação com uma aplicação de servidor e terminal móvel para autenticação de uma aplicação
WO2007106687A3 (en) Role aware network security enforcement
DE60127415D1 (de) Techniken zur umts-authentifizierung mittels sip-nachrichten
GB2458979A (en) Method and system for authenticating internet user identity
FI20041638A0 (fi) Sisällön yhteiskäyttö kommunikaatiojärjestelmässä
ATE466321T1 (de) Antivirus-manifest für dokumentausdruck
ATE385374T1 (de) Web-anwendungsserver
RU2007147899A (ru) Модель доверия для активного контента
NO20042691L (no) Fremgangsmate for a generere og verifisere en elektronisk signatur
DE502005010833D1 (de) Kondensations-Wäschetrockner
TW200606861A (en) Information processor, information recording medium, information processing method, and computer program
DE602004017327D1 (de) Testvorrichtung, korrekturwert-verwaltungsverfahren und entsprechendes computerprogramm
ATE457609T1 (de) Überprüfung von drahtloser zugangssoftware mittels hashing von kennungen
TW200707279A (en) Task scheduling to devices with same connection address
DE602006000273D1 (de) Verfahren zur Authentifizierung von Zugangspunkten eines drahtlosen Netzes

Legal Events

Date Code Title Description
RER Ceased as to paragraph 5 lit. 3 law introducing patent treaties