CN1237803C - 传输机密数据的方法 - Google Patents
传输机密数据的方法 Download PDFInfo
- Publication number
- CN1237803C CN1237803C CNB021271658A CN02127165A CN1237803C CN 1237803 C CN1237803 C CN 1237803C CN B021271658 A CNB021271658 A CN B021271658A CN 02127165 A CN02127165 A CN 02127165A CN 1237803 C CN1237803 C CN 1237803C
- Authority
- CN
- China
- Prior art keywords
- key
- random
- access module
- equipment
- smart card
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/061—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/062—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/418—External card to be used in combination with the client device, e.g. for conditional access
- H04N21/4181—External card to be used in combination with the client device, e.g. for conditional access for conditional access
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Facsimile Transmission Control (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Mobile Radio Communication Systems (AREA)
- Communication Control (AREA)
Abstract
本发明提供一种传输机密数据的方法。为了传输机密数据,两个设备(D1,D2)通过一个传输通道相连,通过使用一个共享的秘密会话密钥对称加密来保证通道的安全。设备(D1,D2)都享有同一个秘密会话密钥(K),该秘密会话密钥(K)是由两个不同的设备分别产生的两个随机密钥(K1,K2)形成的。使用非对称加密在设备(D1,D2)之间交换这两个随机密钥。
Description
技术领域
本发明涉及一种在两个通信设备之间传输机密数据的方法,尤其涉及在付费电视环境中在一个芯片电路卡和一个条件接入模块(CAM)之间进行安全通信的方法。
技术背景
EP 0720326 A2公开了一种在两个相似的站之间建立一个安全的通信通道的方法。该通信过程采用了对称加密/解密,从而避免以前采用分布式主钥与修改器元素,比如时间戳、计数器等等,相连的系统所遇到的问题。在该对称过程中,保密的加密密钥对双方的通信设备都是已知的。这种方法只适用于成对通信设备工作的情况。
在WO 97/38530里公开了另一种方法,其中通过非对称加密在两个设备,比如一个CAM和一个芯片电路卡,之间实现安全通信。其中一个设备产生一个随机密钥,该随机密钥被一个公钥加密并发送给第二设备。第二设备用一个对应的私钥来解密被加密的密钥。两个设备都用该随机密钥来加密和解密设备之间交换的数据。这个方法依赖于仅在一个设备产生的一个随机数。
发明内容
本发明提供了一种在智能卡和条件接入模块两个通信设备之间传输机密数据的方法,其中:a)在智能卡处产生第一随机密钥;b)在条件接入模块处产生第二随机密钥和随机数;c)用智能卡的一个公钥加密第二随机密钥和随机数并将其从条件接入模块发送给智能卡;d)在智能卡处用对应的私钥解密发送来的第二随机密钥和随机数;e)在智能卡处将第一随机密钥和第二随机密钥连接并且使用随机数将其加密,并发送给条件接入模块;f)条件接入模块解密发送来的第一随机密钥和第二随机密钥,以及g)条件接入模块通过将解密的第二随机密钥与原始的第二随机数进行比较,检查解密的第二随机密钥的完整性。h)智能卡和条件接入模块都把随机密钥组合成一个秘密的会话密钥,每个设备都用该秘密的会话密钥对机密数据进行对称加密和解密。
本发明提供了一种在两个通信设备之间传输数据的安全方法。该方法依赖于一个公共秘密,该公共秘密是基于两个不同设备分别产生的两个数值,从而避免了可能的重现攻击。根据本发明,在两个通信设备之间传输数据的方法包括以下步骤:
步骤1:在第一通信设备处产生第一随机密钥。
步骤2:在第二通信设备处产生第二随机密钥。
步骤3:第二随机密钥被一个公钥加密并发送给第一通信设备。
步骤4:在第一通信设备处,被发送的第二随机密钥被一个对应的私钥解密。
步骤5:在第一通信设备处第一随机密钥被加密并被发送给第二通信设备。
步骤6:第二通信设备把发送来的第一随机密钥解密。
步骤7:每个通信设备都把随机密钥组合成一个秘密的会话密钥,并用它来加密和解密设备之间发送的数据。
步骤7以后,两个设备共享一个秘密的会话密钥,该会话密钥基于两个随机数,每一个随机数都是在不同的设备里独立于另一个而产生的,这样就排除了被成功地重现攻击的可能性。
通过在步骤5,步骤6使用一个特殊的加密密钥来加密第一随机密钥,可以得到本发明的进一步改进。即,在第二通信设备处,除了产生第二随机密钥之外,还产生一个随机数(一个“挑战”),该随机数也同样地被公钥加密并传输给第一通信设备。第一通信设备用它的私钥解密该随机数,并在第一随机密钥发送给第二通信设备之前用这个解密后的随机数来加密第一随机公钥。
附图说明
下面参考附图来公开本发明的一个优选实施例。该唯一的附图1例示了优选实施例的基本步骤。
具体实施方式
根据图1,第一通信装置D1是一个智能卡(SC),第二通信装置D2是一个付费数字电视环境(例如,数字视频广播DVB)中的条件接入模块(CAM),虽然本发明不仅限于这样的运行环境中的应用。设备D1和D2将交换机密数据,例如授权管理消息(EMMs)、授权控制消息(ECMs)以及控制字(CWs)。为了防止机密数据被窃听,在设备D1和D2之间建立起一个安全的通信信道。
第一设备D1拥有一个保密私钥PrK和一个对应的公钥PuK。设备D1还具有一个随机数发生器G1。
第二设备D2知道公钥PuK,是明白无误的从设备D1收到的。设备D2还具有一个随机数发生器G2。
初始时,设备D1、D2不共享任何秘密。为了给两个设备提供一个共享的机密会话密钥并用之加密/解密设备之间交换的信息,提出了一个足够安全的、能避免信息外泄的,并且足够强大的、能够交换足够长度的密钥的协议。该协议针对从D1到D2和从D2到D1的传输使用非对称密码。
设备D1里的随机数发生器G1在内部产生第一个随机数K1。设备D2里的随机数发生器G2在内部产生第二个随机数K2。D2进一步产生一个随机数,一个“挑战”CHLG。随机数K1和K2都足够长以避免密码分析的不择手段攻击。
设备D2用公钥PuK加密K2和CHLG并把结果发送给设备D1。设备D1接收该结果并用它的私钥PrK解密之。现在设备D1就知道K2和CHLG。设备D1把K2和自己的随机数K1串联起来,并用CHLG加密串联后的数。这个加密过的结果被从D1发送到D2。
现在设备D2用CHLG作为提取K1、K2的解密密钥来将接收到的结果解密为K1和K2。D2检验自己的K2与收到的K2是否一致。如果接收到正确的K2,设备D1和D2现在就共享随机数K1和K2。
最后,设备D1和D2以相同的方式把随机密钥K1和K2组合在一起,以使两个设备拥有一个秘密的会话密钥K。会话密钥K用于对设备之间交换的机密数据进行对称加密和解密。
使用本发明的另一个例子是把一个条件接入模块(CAM)作为第一设备D1,一个机顶盒(STB)内部的解码器作为第二通信设备。这里,同样的,用两个不同设备分别产生的两个随机数产生一个会话密钥来加密/解密交换的机密数据。
Claims (3)
1.一种在智能卡(D1)和条件接入模块(D2)之间传输机密数据的方法,其中:
a)在智能卡(D1)处产生第一随机密钥(K1);
b)在条件接入模块(D2)处产生第二随机密钥(K2)和随机数(CHLG);
c)用智能卡(D1)的一个公钥(PuK)加密第二随机密钥(K2)和随机数(CHLG)并将其从条件接入模块(D2)发送给智能卡(D1);
d)在智能卡(D1)处用对应的私钥(PrK)解密发送来的第二随机密钥(K2)和随机数(CHLG);
e)在智能卡(D1)处将第一随机密钥(K1)和第二随机密钥(K2)连接并且使用随机数(CHLG)将其加密,并发送给条件接入模块(D2);
f)条件接入模块(D2)解密发送来的第一随机密钥(K1)和第二随机密钥(K2),以及
g)条件接入模块(D2)通过将解密的第二随机密钥(K2)与原始的第二随机数(K2)进行比较,检查解密的第二随机密钥(K2)的完整性。
h)智能卡(D1)和条件接入模块(D2)都把随机密钥(K1,K2)组合成一个秘密的会话密钥(K),都用该秘密的会话密钥(K)对机密数据进行对称加密和解密。
2.根据权利要求1所述的方法,其中,展开会话密钥(K)从而使其长度和第一、第二随机密钥(K1,K2)中的每一个都相同。
3.根据权利要求1或2所述的方法,其中,第一和第二随机密钥(K1,K2)的每一个都是由智能卡(D1)和条件接入模块(D2)的各随机数发生器(G1,G2)产生的。
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| DE10137152.7 | 2001-07-30 | ||
| DE10137152A DE10137152A1 (de) | 2001-07-30 | 2001-07-30 | Verfahren zur Übertragung vertraulicher Daten |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN1400819A CN1400819A (zh) | 2003-03-05 |
| CN1237803C true CN1237803C (zh) | 2006-01-18 |
Family
ID=7693633
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CNB021271658A Expired - Fee Related CN1237803C (zh) | 2001-07-30 | 2002-07-30 | 传输机密数据的方法 |
Country Status (7)
| Country | Link |
|---|---|
| US (1) | US20030026428A1 (zh) |
| EP (1) | EP1282260B1 (zh) |
| KR (1) | KR20030011672A (zh) |
| CN (1) | CN1237803C (zh) |
| AT (1) | ATE314762T1 (zh) |
| DE (2) | DE10137152A1 (zh) |
| SG (1) | SG122761A1 (zh) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104641375A (zh) * | 2012-07-09 | 2015-05-20 | 生物技术公司 | 在医疗装置及其远程装置之间安全的通信 |
Families Citing this family (47)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7243232B2 (en) | 1995-04-21 | 2007-07-10 | Certicom Corp. | Key agreement and transport protocol |
| US7334127B2 (en) * | 1995-04-21 | 2008-02-19 | Certicom Corp. | Key agreement and transport protocol |
| US6487661B2 (en) | 1995-04-21 | 2002-11-26 | Certicom Corp. | Key agreement and transport protocol |
| US6785813B1 (en) | 1997-11-07 | 2004-08-31 | Certicom Corp. | Key agreement and transport protocol with implicit signatures |
| US8140859B1 (en) * | 2000-07-21 | 2012-03-20 | The Directv Group, Inc. | Secure storage and replay of media programs using a hard-paired receiver and storage device |
| US7457414B1 (en) | 2000-07-21 | 2008-11-25 | The Directv Group, Inc. | Super encrypted storage and retrieval of media programs with smartcard generated keys |
| US7203311B1 (en) * | 2000-07-21 | 2007-04-10 | The Directv Group, Inc. | Super encrypted storage and retrieval of media programs in a hard-paired receiver and storage device |
| US7409562B2 (en) * | 2001-09-21 | 2008-08-05 | The Directv Group, Inc. | Method and apparatus for encrypting media programs for later purchase and viewing |
| SG105005A1 (en) * | 2002-06-12 | 2004-07-30 | Contraves Ag | Device for firearms and firearm |
| KR100493885B1 (ko) * | 2003-01-20 | 2005-06-10 | 삼성전자주식회사 | 공개키 기반 구조(pki) 도메인간의 이동 사용자를 위한스마트카드 인증서 등록 및 검증 시스템 및 방법 |
| US20040250073A1 (en) * | 2003-06-03 | 2004-12-09 | Cukier Johnas I. | Protocol for hybrid authenticated key establishment |
| EP1544706A1 (en) * | 2003-12-18 | 2005-06-22 | Axalto S.A. | Method for protecting and using data files suitable for personalizing smart-cards |
| US7599494B2 (en) * | 2004-01-16 | 2009-10-06 | The Directv Group, Inc. | Distribution of video content using a trusted network key for sharing content |
| US7548624B2 (en) * | 2004-01-16 | 2009-06-16 | The Directv Group, Inc. | Distribution of broadcast content for remote decryption and viewing |
| US7580523B2 (en) * | 2004-01-16 | 2009-08-25 | The Directv Group, Inc. | Distribution of video content using client to host pairing of integrated receivers/decoders |
| CN100350816C (zh) * | 2005-05-16 | 2007-11-21 | 航天科工信息技术研究院 | 基于gsm网络实现无线身份认证和数据安全传输的方法 |
| US9325944B2 (en) * | 2005-08-11 | 2016-04-26 | The Directv Group, Inc. | Secure delivery of program content via a removable storage medium |
| US7698555B2 (en) * | 2005-08-29 | 2010-04-13 | Schweitzer Engineering Laboratories, Inc. | System and method for enabling secure access to a program of a headless server device |
| US7885412B2 (en) * | 2005-09-29 | 2011-02-08 | International Business Machines Corporation | Pre-generation of generic session keys for use in communicating within communications environments |
| US8775319B2 (en) | 2006-05-15 | 2014-07-08 | The Directv Group, Inc. | Secure content transfer systems and methods to operate the same |
| US9246687B2 (en) * | 2007-02-28 | 2016-01-26 | Broadcom Corporation | Method for authorizing and authenticating data |
| US8543831B2 (en) * | 2007-11-14 | 2013-09-24 | Qimonda Ag | System and method for establishing data connections between electronic devices |
| WO2009084806A1 (en) * | 2008-01-02 | 2009-07-09 | Sung-Man Lee | System and method for operating end-to-end security channel between server and ic card |
| EP2227014B1 (en) * | 2009-03-02 | 2019-10-02 | Irdeto B.V. | Securely providing secret data from a sender to a receiver |
| DE102009024604B4 (de) * | 2009-06-10 | 2011-05-05 | Infineon Technologies Ag | Erzeugung eines Session-Schlüssels zur Authentisierung und sicheren Datenübertragung |
| US9106628B2 (en) * | 2009-07-07 | 2015-08-11 | Alcatel Lucent | Efficient key management system and method |
| CN102082790B (zh) * | 2010-12-27 | 2014-03-05 | 北京握奇数据系统有限公司 | 一种数字签名的加/解密方法及装置 |
| CN102215106B (zh) * | 2011-05-31 | 2015-01-14 | 飞天诚信科技股份有限公司 | 无线智能密钥装置及其签名方法 |
| JP5779434B2 (ja) * | 2011-07-15 | 2015-09-16 | 株式会社ソシオネクスト | セキュリティ装置及びセキュリティシステム |
| AU2012327945A1 (en) | 2011-10-28 | 2014-05-01 | Debiotech S.A. | Communication secured between a medical device and its remote device |
| CN103095662B (zh) * | 2011-11-04 | 2016-08-03 | 阿里巴巴集团控股有限公司 | 一种网上交易安全认证方法及网上交易安全认证系统 |
| CN102510334B (zh) * | 2011-11-08 | 2014-02-12 | 北京博大光通国际半导体技术有限公司 | 基于wsn无线传感网射频技术的动态防伪保密系统和方法 |
| CN103546781A (zh) * | 2012-07-16 | 2014-01-29 | 航天信息股份有限公司 | 对机顶盒终端进行安全控制的方法和装置 |
| US9521130B2 (en) * | 2012-09-25 | 2016-12-13 | Virnetx, Inc. | User authenticated encrypted communication link |
| CN105635039B (zh) * | 2014-10-27 | 2019-01-04 | 阿里巴巴集团控股有限公司 | 一种网络安全通信方法及通信装置 |
| CN106817219B (zh) * | 2015-12-01 | 2020-11-03 | 阿里巴巴集团控股有限公司 | 一种协商会话秘钥的方法及装置 |
| CN107040369B (zh) * | 2016-10-26 | 2020-02-11 | 阿里巴巴集团控股有限公司 | 数据传输方法、装置及系统 |
| CN106533669B (zh) * | 2016-11-15 | 2018-07-13 | 百度在线网络技术(北京)有限公司 | 设备识别的方法、装置和系统 |
| CN107294714B (zh) * | 2017-07-31 | 2019-12-31 | 美的智慧家居科技有限公司 | 密钥协商方法、装置及其设备 |
| CN108551391B (zh) * | 2018-03-14 | 2021-04-27 | 深圳市中易通安全芯科技有限公司 | 一种基于USB-key的认证方法 |
| CN108848084B (zh) * | 2018-06-04 | 2019-04-23 | 珠海安联锐视科技股份有限公司 | 一种基于安全的安防监控网络通讯方法 |
| CN108921560B (zh) * | 2018-07-27 | 2021-04-30 | 广州天高软件科技有限公司 | 基于区块链的交易信息校验及结算方法 |
| WO2020140260A1 (en) | 2019-01-04 | 2020-07-09 | Baidu.Com Times Technology (Beijing) Co., Ltd. | Method and system to derive a session key to secure an information exchange channel between a host system and a data processing accelerator |
| GB201912132D0 (en) * | 2019-08-23 | 2019-10-09 | Angoka Ltd | Symmetric key generation, authentication and communication betwenn a plurality of entities in a network |
| US11610004B2 (en) | 2021-04-14 | 2023-03-21 | Bank Of America Corporation | System for implementing enhanced file encryption technique |
| CN115442063A (zh) * | 2021-09-30 | 2022-12-06 | 北京罗克维尔斯科技有限公司 | 充电数据的发送和接收方法、装置、充电桩和车辆终端 |
| TWI823536B (zh) * | 2022-08-26 | 2023-11-21 | 新唐科技股份有限公司 | 加密傳輸系統及加密傳輸方法 |
Family Cites Families (18)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5179591A (en) * | 1991-10-16 | 1993-01-12 | Motorola, Inc. | Method for algorithm independent cryptographic key management |
| AU671986B2 (en) * | 1992-03-30 | 1996-09-19 | Telstra Corporation Limited | A cryptographic communications method and system |
| US5371794A (en) * | 1993-11-02 | 1994-12-06 | Sun Microsystems, Inc. | Method and apparatus for privacy and authentication in wireless networks |
| US5515441A (en) * | 1994-05-12 | 1996-05-07 | At&T Corp. | Secure communication method and apparatus |
| IL113375A (en) * | 1995-04-13 | 1997-09-30 | Fortress U & T Ltd | Internationally regulated system for one to one cryptographic communications with national sovereignty without key escrow |
| US5761305A (en) * | 1995-04-21 | 1998-06-02 | Certicom Corporation | Key agreement and transport protocol with implicit signatures |
| US6487661B2 (en) * | 1995-04-21 | 2002-11-26 | Certicom Corp. | Key agreement and transport protocol |
| US5615266A (en) * | 1995-07-13 | 1997-03-25 | Motorola, Inc | Secure communication setup method |
| HRP970160A2 (en) * | 1996-04-03 | 1998-02-28 | Digco B V | Method for providing a secure communication between two devices and application of this method |
| US20010050990A1 (en) * | 1997-02-19 | 2001-12-13 | Frank Wells Sudia | Method for initiating a stream-oriented encrypted communication |
| US6125185A (en) * | 1997-05-27 | 2000-09-26 | Cybercash, Inc. | System and method for encryption key generation |
| US6148405A (en) * | 1997-11-10 | 2000-11-14 | Phone.Com, Inc. | Method and system for secure lightweight transactions in wireless data networks |
| US6185685B1 (en) * | 1997-12-11 | 2001-02-06 | International Business Machines Corporation | Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same |
| JPH11234259A (ja) * | 1998-02-13 | 1999-08-27 | Hitachi Ltd | 相手認証と鍵配送方法とそれを用いた装置、および、暗号通信方法と暗号通信システム |
| US6345098B1 (en) * | 1998-07-02 | 2002-02-05 | International Business Machines Corporation | Method, system and apparatus for improved reliability in generating secret cryptographic variables |
| CA2277633C (en) * | 1999-07-19 | 2009-10-20 | Certicom Corp. | Split-key key-agreement protocol |
| US7020773B1 (en) * | 2000-07-17 | 2006-03-28 | Citrix Systems, Inc. | Strong mutual authentication of devices |
| US7010689B1 (en) * | 2000-08-21 | 2006-03-07 | International Business Machines Corporation | Secure data storage and retrieval in a client-server environment |
-
2001
- 2001-07-30 DE DE10137152A patent/DE10137152A1/de not_active Withdrawn
-
2002
- 2002-07-24 SG SG200204502A patent/SG122761A1/en unknown
- 2002-07-26 DE DE60208273T patent/DE60208273T2/de not_active Expired - Fee Related
- 2002-07-26 EP EP02016814A patent/EP1282260B1/en not_active Expired - Lifetime
- 2002-07-26 AT AT02016814T patent/ATE314762T1/de not_active IP Right Cessation
- 2002-07-29 US US10/206,212 patent/US20030026428A1/en not_active Abandoned
- 2002-07-30 KR KR1020020044803A patent/KR20030011672A/ko not_active Withdrawn
- 2002-07-30 CN CNB021271658A patent/CN1237803C/zh not_active Expired - Fee Related
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104641375A (zh) * | 2012-07-09 | 2015-05-20 | 生物技术公司 | 在医疗装置及其远程装置之间安全的通信 |
| CN104641375B (zh) * | 2012-07-09 | 2018-01-02 | 生物技术公司 | 在医疗装置及其远程装置之间安全的通信 |
Also Published As
| Publication number | Publication date |
|---|---|
| EP1282260B1 (en) | 2005-12-28 |
| DE10137152A1 (de) | 2003-02-27 |
| DE60208273T2 (de) | 2006-08-17 |
| SG122761A1 (en) | 2006-06-29 |
| KR20030011672A (ko) | 2003-02-11 |
| CN1400819A (zh) | 2003-03-05 |
| ATE314762T1 (de) | 2006-01-15 |
| EP1282260A1 (en) | 2003-02-05 |
| DE60208273D1 (de) | 2006-02-02 |
| US20030026428A1 (en) | 2003-02-06 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN1237803C (zh) | 传输机密数据的方法 | |
| JP4633202B2 (ja) | 2つの装置間の安全な通信を提供するための方法およびこの方法の応用 | |
| CN1655503B (zh) | 安全密钥认证和等级系统 | |
| CN101005356B (zh) | 对加扰内容数据对象进行解扰的方法 | |
| KR101383738B1 (ko) | 디지털 영화를 위한 키 관리 시스템 | |
| CN1655495B (zh) | 用于以强配对将安全密钥传送到目标用户的系统和方法 | |
| KR100770485B1 (ko) | 암호 정보 수신 장치 및, 수신기와 송신기의 재동기화 방법 | |
| US20050033964A1 (en) | Method for secure communication between two devices | |
| EP1145480A1 (en) | Exchanging a secret over an unreliable network | |
| CN1984312A (zh) | 广播应用的条件访问系统的操作方法 | |
| CN1685660B (zh) | 在一个密码系统中增强鉴别的方法 | |
| CN101335579A (zh) | 一种实现条件接收的方法及条件接收装置 | |
| CN102075802A (zh) | 一种机顶盒和智能卡安全通信的方法 | |
| CN101505400B (zh) | 一种双向机顶盒及其认证方法、条件接收系统和认证系统 | |
| CN1111335C (zh) | 宽带数据广播中窄带条件接收方法 | |
| CN101902610B (zh) | 实现iptv机顶盒和智能卡间安全通信的方法 | |
| CN114449216A (zh) | 一种视频传输方法及系统 | |
| JPS6181043A (ja) | パケツト通信における暗号処理方式 | |
| CN121619150A (zh) | 视频会议系统中的数据加密方法、装置、设备及存储介质 | |
| CA2250833C (en) | Method for providing a secure communication between two devices and application of this method | |
| JPH11249558A (ja) | 暗号化装置 | |
| HK1019683B (zh) | 在两个设备之间提供安全通信的方法及该方法的设备 | |
| HK1108595A (zh) | 广播应用的条件访问系统的操作方法 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C14 | Grant of patent or utility model | ||
| GR01 | Patent grant | ||
| C19 | Lapse of patent right due to non-payment of the annual fee | ||
| CF01 | Termination of patent right due to non-payment of annual fee |