ES2153197T3 - Procedimiento para la negociacion de una politica de seguridad entre una primera unidad de ordenador y una segunda unidad de ordenador. - Google Patents
Procedimiento para la negociacion de una politica de seguridad entre una primera unidad de ordenador y una segunda unidad de ordenador.Info
- Publication number
- ES2153197T3 ES2153197T3 ES97924894T ES97924894T ES2153197T3 ES 2153197 T3 ES2153197 T3 ES 2153197T3 ES 97924894 T ES97924894 T ES 97924894T ES 97924894 T ES97924894 T ES 97924894T ES 2153197 T3 ES2153197 T3 ES 2153197T3
- Authority
- ES
- Spain
- Prior art keywords
- computer unit
- negotiation
- procedure
- security policy
- phases
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
- Computer And Data Communications (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Hardware Redundancy (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
EL PROCEDIMIENTO ESTA SUBDIVIDIDO EN FASES MODULARES INDIVIDUALES. DURANTE UNA AUTENTIFICACION DE LA PRIMERA UNIDAD DE ORDENADOR (C1) Y DE LA SEGUNDA UNIDAD DE ORDENADOR (C2) SE INTERCAMBIAN REFERENCIAS DE AUTENTIFICACION (AR A , AR B ), QUE SE UTILIZAN EN LAS SIGUIENTES FASES CRIPTOGRAFICAS (SP, SA). DE ESTA MANERA Y GRACIAS A LA ESTRUCTURA MODULAR YA NO SE PRECISA UNA NUEVA AUTENTIFICACION, QUE EN REALIDAD SE NECESITARIA EN LAS RESTANTES FASES CRIPTOGRAFICAS (SP, SA), Y TAMPOCO SE LLEVA YA A CABO.
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| DE19622631 | 1996-06-05 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| ES2153197T3 true ES2153197T3 (es) | 2001-02-16 |
Family
ID=7796260
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| ES97924894T Expired - Lifetime ES2153197T3 (es) | 1996-06-05 | 1997-05-16 | Procedimiento para la negociacion de una politica de seguridad entre una primera unidad de ordenador y una segunda unidad de ordenador. |
Country Status (13)
| Country | Link |
|---|---|
| US (1) | US6401204B1 (es) |
| EP (1) | EP0903026B1 (es) |
| JP (1) | JP2000511382A (es) |
| KR (1) | KR100363607B1 (es) |
| CN (1) | CN1175615C (es) |
| AT (1) | ATE198114T1 (es) |
| BR (1) | BR9709534A (es) |
| CA (1) | CA2257477C (es) |
| DE (1) | DE59702763D1 (es) |
| ES (1) | ES2153197T3 (es) |
| RU (1) | RU2213367C2 (es) |
| UA (1) | UA53651C2 (es) |
| WO (1) | WO1997047109A1 (es) |
Families Citing this family (40)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE19850665A1 (de) * | 1998-11-03 | 2000-05-04 | Siemens Ag | Verfahren und Anordnung zur Authentifikation von einer ersten Instanz und einer zweiten Instanz |
| FR2788649A1 (fr) * | 1999-01-18 | 2000-07-21 | Schlumberger Systems & Service | Procede de chargement securise de donnees entre des modules de securite |
| FR2789536B1 (fr) * | 1999-02-08 | 2001-03-09 | Bull Sa | Dispositif et procede d'authentification d'un utilisateur a distance |
| GB9903123D0 (en) | 1999-02-11 | 1999-04-07 | Nokia Telecommunications Oy | Method of securing communication |
| US6289450B1 (en) * | 1999-05-28 | 2001-09-11 | Authentica, Inc. | Information security architecture for encrypting documents for remote access while maintaining access control |
| US7024690B1 (en) * | 2000-04-28 | 2006-04-04 | 3Com Corporation | Protected mutual authentication over an unsecured wireless communication channel |
| KR100470915B1 (ko) * | 2001-12-28 | 2005-03-08 | 한국전자통신연구원 | Ip계층에서의 패킷 보안을 위한 인터넷 정보보호시스템의 제어 방법 |
| US20040006701A1 (en) * | 2002-04-13 | 2004-01-08 | Advanced Decisions Inc. | Method and apparatus for authentication of recorded audio |
| JP3801559B2 (ja) * | 2002-12-26 | 2006-07-26 | ソニー株式会社 | 通信装置および方法、記録媒体、並びにプログラム |
| EP1673898A1 (en) * | 2003-09-22 | 2006-06-28 | Impsys Digital Security AB | Data communication security arrangement and method |
| US7631181B2 (en) * | 2003-09-22 | 2009-12-08 | Canon Kabushiki Kaisha | Communication apparatus and method, and program for applying security policy |
| US7650509B1 (en) | 2004-01-28 | 2010-01-19 | Gordon & Howard Associates, Inc. | Encoding data in a password |
| RU2329605C2 (ru) * | 2004-02-09 | 2008-07-20 | Корпорация "Самсунг Электроникс" | Система распределения ключей и способ ее функционирования |
| US7814320B2 (en) * | 2005-07-19 | 2010-10-12 | Ntt Docomo, Inc. | Cryptographic authentication, and/or establishment of shared cryptographic keys, using a signing key encrypted with a non-one-time-pad encryption, including (but not limited to) techniques with improved security against malleability attacks |
| RU2285948C1 (ru) * | 2005-10-07 | 2006-10-20 | Закрытое акционерное общество "Аладдин Р. Д." | Способ обеспечения безопасного доступа пользователя к базам данных oracle |
| US8122240B2 (en) * | 2005-10-13 | 2012-02-21 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for establishing a security association |
| DE102006004237A1 (de) | 2006-01-30 | 2007-08-16 | Siemens Ag | Verfahren und Vorrichtung zur Vereinbarung eines gemeinsamen Schlüssels zwischen einem ersten Kommunikationsgerät und einem zweiten Kommunikationsgerät |
| US20070194881A1 (en) | 2006-02-07 | 2007-08-23 | Schwarz Stanley G | Enforcing payment schedules |
| RU2448365C2 (ru) * | 2006-04-10 | 2012-04-20 | Траст Интегрейшн Сервисиз Б.В. | Устройство и способ защищенной передачи данных |
| GB2442044B8 (en) * | 2006-05-11 | 2011-02-23 | Ericsson Telefon Ab L M | Addressing and routing mechanism for web server clusters. |
| US9026267B2 (en) | 2007-03-09 | 2015-05-05 | Gordon*Howard Associates, Inc. | Methods and systems of selectively enabling a vehicle by way of a portable wireless device |
| FR2916592B1 (fr) * | 2007-05-25 | 2017-04-14 | Groupe Des Ecoles De Telecommunications(Get)-Ecole Nat Superieure Des Telecommunications(Enst) | Procede de securisation d'echange d'information,dispositif, et produit programme d'ordinateur correspondant |
| EP2043015B1 (en) * | 2007-09-27 | 2014-04-23 | Sap Ag | Secure logical vector clocks |
| US8018329B2 (en) | 2008-12-12 | 2011-09-13 | Gordon * Howard Associates, Inc. | Automated geo-fence boundary configuration and activation |
| US8581712B2 (en) | 2008-12-12 | 2013-11-12 | Gordon * Howard Associates, Inc . | Methods and systems related to establishing geo-fence boundaries |
| US8686841B2 (en) | 2008-12-12 | 2014-04-01 | Gordon*Howard Associates, Inc. | Methods and systems related to activating geo-fence boundaries and collecting location data |
| US8659404B2 (en) | 2008-12-12 | 2014-02-25 | Gordon Howard Associates, Inc. | Methods and systems related to establishing geo-fence boundaries and collecting data |
| CN101662465B (zh) * | 2009-08-26 | 2013-03-27 | 深圳市腾讯计算机系统有限公司 | 一种动态口令验证的方法及装置 |
| CN102428474B (zh) * | 2009-11-19 | 2015-05-06 | 株式会社日立制作所 | 计算机系统、管理系统和记录介质 |
| US8581711B2 (en) | 2011-03-22 | 2013-11-12 | Gordon*Howard Associates, Inc. | Methods and systems of rule-based intoxicating substance testing associated with vehicles |
| US8781900B2 (en) | 2011-09-09 | 2014-07-15 | Gordon*Howard Associates, Inc. | Method and system of providing information to an occupant of a vehicle |
| US9665997B2 (en) | 2013-01-08 | 2017-05-30 | Gordon*Howard Associates, Inc. | Method and system for providing feedback based on driving behavior |
| US8928471B2 (en) | 2013-03-14 | 2015-01-06 | Gordon*Howard Associates, Inc. | Methods and systems related to remote tamper detection |
| US9840229B2 (en) | 2013-03-14 | 2017-12-12 | Gordon*Howard Associates, Inc. | Methods and systems related to a remote tamper detection |
| US9378480B2 (en) | 2013-03-14 | 2016-06-28 | Gordon*Howard Associates, Inc. | Methods and systems related to asset identification triggered geofencing |
| US9035756B2 (en) | 2013-03-14 | 2015-05-19 | Gordon*Howard Associates, Inc. | Methods and systems related to remote tamper detection |
| US9013333B2 (en) | 2013-06-24 | 2015-04-21 | Gordon*Howard Associates, Inc. | Methods and systems related to time triggered geofencing |
| US9701279B1 (en) | 2016-01-12 | 2017-07-11 | Gordon*Howard Associates, Inc. | On board monitoring device |
| CN107040367B (zh) * | 2016-02-04 | 2020-11-20 | 宁波巨博信息科技有限公司 | 会话密钥协商的方法、装置和系统 |
| US11075949B2 (en) * | 2017-02-02 | 2021-07-27 | Nicira, Inc. | Systems and methods for allocating SPI values |
Family Cites Families (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO1988001120A1 (fr) * | 1986-07-31 | 1988-02-11 | Kabushiki Kaisya Advance | Systeme de generation d'une cle cryptographique partagee et systeme de communications utilisant la cle cryptographique partagee |
| DE3915262A1 (de) * | 1988-05-18 | 1989-11-30 | Asea Brown Boveri | Verfahren zur erzeugung von authentifizierten geheimschluesseln |
| CA2011396C (en) * | 1989-03-03 | 1995-01-03 | Kazue Tanaka | Cipher-key distribution system |
| US4956863A (en) * | 1989-04-17 | 1990-09-11 | Trw Inc. | Cryptographic method and apparatus for public key exchange with authentication |
| US5003593A (en) * | 1989-06-05 | 1991-03-26 | Motorola, Inc. | Teleconferencing method for a secure key management system |
| US5224163A (en) | 1990-09-28 | 1993-06-29 | Digital Equipment Corporation | Method for delegating authorization from one entity to another through the use of session encryption keys |
| RU2030836C1 (ru) * | 1991-12-26 | 1995-03-10 | Борис Владимирович Березин | Способ шифрования цифровой подписи двоичного сообщения (албер-подпись) |
| US5341426A (en) * | 1992-12-15 | 1994-08-23 | Motorola, Inc. | Cryptographic key management apparatus and method |
| US5491750A (en) * | 1993-12-30 | 1996-02-13 | International Business Machines Corporation | Method and apparatus for three-party entity authentication and key distribution using message authentication codes |
| US5416842A (en) * | 1994-06-10 | 1995-05-16 | Sun Microsystems, Inc. | Method and apparatus for key-management scheme for use with internet protocols at site firewalls |
| DE19514084C1 (de) * | 1995-04-13 | 1996-07-11 | Siemens Ag | Verfahren zum rechnergestützten Austausch kryptographischer Schlüssel zwischen einer Benutzercomputereinheit U und einer Netzcomputereinheit N |
| US6081508A (en) * | 1998-02-25 | 2000-06-27 | Indus River Networks, Inc. | Remote computer communication |
| US6182226B1 (en) * | 1998-03-18 | 2001-01-30 | Secure Computing Corporation | System and method for controlling interactions between networks |
| US6182142B1 (en) * | 1998-07-10 | 2001-01-30 | Encommerce, Inc. | Distributed access management of information resources |
-
1997
- 1997-05-16 UA UA98126427A patent/UA53651C2/uk unknown
- 1997-05-16 AT AT97924894T patent/ATE198114T1/de active
- 1997-05-16 US US09/194,678 patent/US6401204B1/en not_active Expired - Lifetime
- 1997-05-16 ES ES97924894T patent/ES2153197T3/es not_active Expired - Lifetime
- 1997-05-16 CN CNB971970882A patent/CN1175615C/zh not_active Expired - Lifetime
- 1997-05-16 WO PCT/DE1997/001002 patent/WO1997047109A1/de not_active Ceased
- 1997-05-16 RU RU99100287/09A patent/RU2213367C2/ru active
- 1997-05-16 EP EP97924894A patent/EP0903026B1/de not_active Expired - Lifetime
- 1997-05-16 DE DE59702763T patent/DE59702763D1/de not_active Expired - Lifetime
- 1997-05-16 KR KR10-1998-0709952A patent/KR100363607B1/ko not_active Expired - Fee Related
- 1997-05-16 CA CA002257477A patent/CA2257477C/en not_active Expired - Fee Related
- 1997-05-16 BR BR9709534-6A patent/BR9709534A/pt not_active IP Right Cessation
- 1997-05-16 JP JP10500076A patent/JP2000511382A/ja active Pending
Also Published As
| Publication number | Publication date |
|---|---|
| EP0903026B1 (de) | 2000-12-13 |
| UA53651C2 (uk) | 2003-02-17 |
| DE59702763D1 (de) | 2001-01-18 |
| CN1227686A (zh) | 1999-09-01 |
| WO1997047109A1 (de) | 1997-12-11 |
| KR100363607B1 (ko) | 2003-01-24 |
| RU2213367C2 (ru) | 2003-09-27 |
| BR9709534A (pt) | 2000-05-09 |
| CN1175615C (zh) | 2004-11-10 |
| JP2000511382A (ja) | 2000-08-29 |
| CA2257477A1 (en) | 1997-12-11 |
| KR20000016378A (ko) | 2000-03-25 |
| CA2257477C (en) | 2006-10-03 |
| EP0903026A1 (de) | 1999-03-24 |
| ATE198114T1 (de) | 2000-12-15 |
| US6401204B1 (en) | 2002-06-04 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| ES2153197T3 (es) | Procedimiento para la negociacion de una politica de seguridad entre una primera unidad de ordenador y una segunda unidad de ordenador. | |
| AU3199399A (en) | Encryption key management system and method | |
| HUP9902892A2 (hu) | Eljárás és berendezés rejtjelkulcs visszafejtésére | |
| AU6434298A (en) | Secure file archive through encryption key management | |
| EP0576224A3 (en) | Device and method for administering cryptographic keys. | |
| ES2132764T3 (es) | Procedimiento para la aplicacion de un protocolo de comunicacion con clave privada entre dos dispositivos de tratamiento. | |
| DE69529635D1 (de) | Gemeinsame Benutzung eines Dateiedierungssystems mit geheimem Dateiinhalt, Versionsverwaltung und asynchroner Edierung | |
| DE3766030D1 (de) | Mittel zum vermindern harmonischer drehmomente in elektrischen maschinen. | |
| DE69836450D1 (de) | Verschlüsselungs-, Entschlüsselungs- und Informationsverarbeitungsgerät und -verfahren | |
| DE69634220D1 (de) | System zur kryptographischen Schlüsselverwaltung und Echtheitsprüfung | |
| DK727088A (da) | Kort, isaer indrettet som informationsbaerer | |
| AU1061499A (en) | Method and apparatus for asymmetric key management in a cryptographic system | |
| CA2174260A1 (en) | Key agreement and transport protocol | |
| AU8068498A (en) | An apparatus for implementing virtual private networks | |
| EE200000467A (et) | Süsteem, meetod ja seadmed konfidentsiaalse informatsiooni turvaliseks edastamiseks | |
| AU2202092A (en) | Algorithm independent cryptographic key management | |
| DE69629738D1 (de) | Verwaltung kryptographischer Schlüssel | |
| DE69323016D1 (de) | Authentisierungsverfahren mit verbesserter Sicherheit der Geheimhaltung des Authentisierungsschlüssels | |
| DE69731025D1 (de) | Verschlüsselungsverfahren, Entschlüsselungsverfahren und Beglaubigungsverfahren | |
| AU6134098A (en) | Secure authentication key management | |
| AU8095087A (en) | Enciphering/deciphering method and arrangement for performing the method | |
| CA2257429A1 (en) | Method for group-based cryptographic code management between a first computer unit and group computer units | |
| NO974441L (no) | Fremgangsmåte for asymmetrisk, kryptografisk kommunikasjon, samt tilhörende bærbar gjenstand | |
| WO1997005720A3 (en) | Cryptographic system with concealed work factor | |
| AU1315100A (en) | System and method of securing a computer from unauthorized access |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| FG2A | Definitive protection |
Ref document number: 903026 Country of ref document: ES |