DE69842122D1 - Verfahren und Vorrichtung zur sicheren Kryptoschlüsselspeicherung und -Nutzung. - Google Patents
Verfahren und Vorrichtung zur sicheren Kryptoschlüsselspeicherung und -Nutzung.Info
- Publication number
- DE69842122D1 DE69842122D1 DE69842122T DE69842122T DE69842122D1 DE 69842122 D1 DE69842122 D1 DE 69842122D1 DE 69842122 T DE69842122 T DE 69842122T DE 69842122 T DE69842122 T DE 69842122T DE 69842122 D1 DE69842122 D1 DE 69842122D1
- Authority
- DE
- Germany
- Prior art keywords
- key
- pin
- valid
- correct
- pseudo
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/02—Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1025—Identification of user by a PIN code
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2127—Bluffing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/20—Manipulating the length of blocks of bits, e.g. padding or block truncation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US08/996,758 US6170058B1 (en) | 1997-12-23 | 1997-12-23 | Method and apparatus for cryptographically camouflaged cryptographic key storage, certification and use |
PCT/US1998/027751 WO1999033222A1 (en) | 1997-12-23 | 1998-12-22 | Method and apparatus for secure cryptographic key storage, certification and use |
Publications (1)
Publication Number | Publication Date |
---|---|
DE69842122D1 true DE69842122D1 (de) | 2011-03-17 |
Family
ID=25543275
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DE69842122T Expired - Lifetime DE69842122D1 (de) | 1997-12-23 | 1998-12-22 | Verfahren und Vorrichtung zur sicheren Kryptoschlüsselspeicherung und -Nutzung. |
Country Status (11)
Country | Link |
---|---|
US (2) | US6170058B1 (de) |
EP (2) | EP2302833B1 (de) |
JP (1) | JP4463979B2 (de) |
AT (1) | ATE497658T1 (de) |
AU (1) | AU746966B2 (de) |
CA (1) | CA2314349C (de) |
DE (1) | DE69842122D1 (de) |
ES (1) | ES2359205T3 (de) |
HK (1) | HK1032306A1 (de) |
NO (1) | NO20003310L (de) |
WO (1) | WO1999033222A1 (de) |
Families Citing this family (158)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
NO305420B1 (no) * | 1997-09-02 | 1999-05-25 | Ericsson Telefon Ab L M | Anordning ved datakommunikasjonssystem, spesielt ved kommunikasjon via brannmurer |
US7328350B2 (en) * | 2001-03-29 | 2008-02-05 | Arcot Systems, Inc. | Method and apparatus for secure cryptographic key generation, certification and use |
US7454782B2 (en) * | 1997-12-23 | 2008-11-18 | Arcot Systems, Inc. | Method and system for camouflaging access-controlled data |
US6574733B1 (en) * | 1999-01-25 | 2003-06-03 | Entrust Technologies Limited | Centralized secure backup system and method |
JP2002536706A (ja) | 1999-02-12 | 2002-10-29 | マック ヒックス | 証明書関連その他のサービスを提供するシステム及び方法 |
FR2791203A1 (fr) * | 1999-03-17 | 2000-09-22 | Schlumberger Systems & Service | Dispositif d'authentification d'un message lors d'une operation de traitement cryptographique dudit message |
US6697948B1 (en) | 1999-05-05 | 2004-02-24 | Michael O. Rabin | Methods and apparatus for protecting information |
US6629150B1 (en) * | 1999-06-18 | 2003-09-30 | Intel Corporation | Platform and method for creating and using a digital container |
US7111172B1 (en) * | 1999-07-19 | 2006-09-19 | Rsa Security Inc. | System and methods for maintaining and distributing personal security devices |
US20020029200A1 (en) | 1999-09-10 | 2002-03-07 | Charles Dulin | System and method for providing certificate validation and other services |
CA2384242A1 (en) * | 1999-09-24 | 2001-04-05 | Mary Mckenney | System and method for providing payment services in electronic commerce |
US6708049B1 (en) | 1999-09-28 | 2004-03-16 | Nellcor Puritan Bennett Incorporated | Sensor with signature of data relating to sensor |
US6895391B1 (en) * | 1999-11-09 | 2005-05-17 | Arcot Systems, Inc. | Method and system for secure authenticated payment on a computer network |
US6704868B1 (en) * | 1999-11-12 | 2004-03-09 | International Business Machines Corporation | Method for associating a pass phase with a secured public/private key pair |
US6718468B1 (en) * | 1999-11-12 | 2004-04-06 | International Business Machines Corporation | Method for associating a password with a secured public/private key pair |
WO2001061659A1 (en) * | 2000-02-16 | 2001-08-23 | Mastercard International Incorporated | System and method for conducting electronic commerce with a remote wallet server |
WO2001092989A2 (en) * | 2000-05-26 | 2001-12-06 | Interchecks, Llc | Methods and systems for network based electronic purchasing system |
US20020112156A1 (en) * | 2000-08-14 | 2002-08-15 | Gien Peter H. | System and method for secure smartcard issuance |
WO2002017553A2 (en) * | 2000-08-18 | 2002-02-28 | United States Postal Service | Apparatus and methods for the secure transfer of electronic data |
US7072870B2 (en) | 2000-09-08 | 2006-07-04 | Identrus, Llc | System and method for providing authorization and other services |
WO2002021409A1 (en) * | 2000-09-08 | 2002-03-14 | Tallent Guy S | System and method for transparently providing certificate validation and other services within an electronic transaction |
US6889209B1 (en) * | 2000-11-03 | 2005-05-03 | Shieldip, Inc. | Method and apparatus for protecting information and privacy |
US20020091929A1 (en) * | 2000-12-19 | 2002-07-11 | Jakob Ehrensvard | Secure digital signing of data |
US20020106085A1 (en) * | 2001-01-05 | 2002-08-08 | Sandeep Jain | Security breach management |
CA2436608A1 (en) * | 2001-01-26 | 2002-08-01 | Accenture Llp | Method for an escrow function during a transaction using an electronic/physical mail address database framework |
US7711122B2 (en) | 2001-03-09 | 2010-05-04 | Arcot Systems, Inc. | Method and apparatus for cryptographic key storage wherein key servers are authenticated by possession and secure distribution of stored keys |
GB2373074B (en) * | 2001-03-10 | 2004-10-13 | Ibm | A method and apparatus for storage of security keys and certificates |
JP4064647B2 (ja) * | 2001-08-24 | 2008-03-19 | 富士通株式会社 | 情報処理装置及び入力操作装置 |
US7376625B2 (en) * | 2001-11-15 | 2008-05-20 | Nokia Corporation | System and method for activating individualized software modules in a digital broadcast environment |
JP4157709B2 (ja) * | 2002-01-31 | 2008-10-01 | 富士通株式会社 | アクセス制御方法及び記憶装置 |
US7529944B2 (en) * | 2002-02-07 | 2009-05-05 | Activcard Ireland Limited | Support for multiple login method |
US7660988B2 (en) * | 2002-03-18 | 2010-02-09 | Cognomina, Inc. | Electronic notary |
US7899753B1 (en) | 2002-03-25 | 2011-03-01 | Jpmorgan Chase Bank, N.A | Systems and methods for time variable financial authentication |
EP1509830A2 (de) * | 2002-05-02 | 2005-03-02 | Shieldip, Inc. | Verfahren und vorrichtung zum schutz von informationen und privatsphäre |
US7418099B2 (en) * | 2002-05-03 | 2008-08-26 | Certicom Corp. | Method and apparatus for performing elliptic curve arithmetic |
EP1429224A1 (de) * | 2002-12-10 | 2004-06-16 | Texas Instruments Incorporated | Firmware Laufzeit Authentisierung |
AU2003900413A0 (en) * | 2003-01-31 | 2003-02-13 | Mckeon, Brian Bernard | Regulated issuance of digital certificates |
US20060276414A1 (en) * | 2003-05-22 | 2006-12-07 | Coelingh Bennink Herman Jan Ti | Use of compositions comprising an estrogenic component for the treatment and prevention of musculoskeletal pain |
US7581100B2 (en) * | 2003-09-02 | 2009-08-25 | Authernative, Inc. | Key generation method for communication session encryption and authentication system |
US7506161B2 (en) * | 2003-09-02 | 2009-03-17 | Authernative, Inc. | Communication session encryption and authentication system |
US7299356B2 (en) * | 2003-09-02 | 2007-11-20 | Authernative, Inc. | Key conversion method for communication session encryption and authentication system |
US7596704B2 (en) * | 2003-10-10 | 2009-09-29 | Jing-Jang Hwang | Partition and recovery of a verifiable digital secret |
US7562230B2 (en) * | 2003-10-14 | 2009-07-14 | Intel Corporation | Data security |
US20050154906A1 (en) * | 2003-11-05 | 2005-07-14 | Patrick Kriech | BIOS locked application media |
US20050131835A1 (en) * | 2003-12-12 | 2005-06-16 | Howell James A.Jr. | System for pre-trusting of applications for firewall implementations |
US20050201555A1 (en) * | 2004-02-09 | 2005-09-15 | I-Ling Yen | System, method and apparatus for secure computation on encrypted data |
US20050203843A1 (en) * | 2004-03-12 | 2005-09-15 | Wood George L. | Internet debit system |
US7418728B2 (en) * | 2004-03-17 | 2008-08-26 | Arcot Systems, Inc. | Auditing secret key cryptographic operations |
US7287159B2 (en) | 2004-04-01 | 2007-10-23 | Shieldip, Inc. | Detection and identification methods for software |
US7711965B2 (en) * | 2004-10-20 | 2010-05-04 | Intel Corporation | Data security |
US7620187B1 (en) * | 2005-03-30 | 2009-11-17 | Rockwell Collins, Inc. | Method and apparatus for ad hoc cryptographic key transfer |
US20070118735A1 (en) * | 2005-11-10 | 2007-05-24 | Jeff Cherrington | Systems and methods for trusted information exchange |
US7921304B2 (en) * | 2005-12-06 | 2011-04-05 | Microsoft Corporation | Securing data set images |
US8230487B2 (en) * | 2005-12-21 | 2012-07-24 | International Business Machines Corporation | Method and system for controlling access to a secondary system |
DE102006015212B4 (de) * | 2006-03-30 | 2017-05-04 | Bundesdruckerei Gmbh | Verfahren zum Schutz eines beweglichen Gutes, insbesondere eines Fahrzeugs, gegen unberechtigte Nutzung |
US7992203B2 (en) * | 2006-05-24 | 2011-08-02 | Red Hat, Inc. | Methods and systems for secure shared smartcard access |
US8098829B2 (en) * | 2006-06-06 | 2012-01-17 | Red Hat, Inc. | Methods and systems for secure key delivery |
US8495380B2 (en) | 2006-06-06 | 2013-07-23 | Red Hat, Inc. | Methods and systems for server-side key generation |
US8364952B2 (en) | 2006-06-06 | 2013-01-29 | Red Hat, Inc. | Methods and system for a key recovery plan |
US8332637B2 (en) * | 2006-06-06 | 2012-12-11 | Red Hat, Inc. | Methods and systems for nonce generation in a token |
US8180741B2 (en) | 2006-06-06 | 2012-05-15 | Red Hat, Inc. | Methods and systems for providing data objects on a token |
US8707024B2 (en) | 2006-06-07 | 2014-04-22 | Red Hat, Inc. | Methods and systems for managing identity management security domains |
US8099765B2 (en) * | 2006-06-07 | 2012-01-17 | Red Hat, Inc. | Methods and systems for remote password reset using an authentication credential managed by a third party |
US8412927B2 (en) * | 2006-06-07 | 2013-04-02 | Red Hat, Inc. | Profile framework for token processing system |
US8589695B2 (en) | 2006-06-07 | 2013-11-19 | Red Hat, Inc. | Methods and systems for entropy collection for server-side key generation |
US9769158B2 (en) | 2006-06-07 | 2017-09-19 | Red Hat, Inc. | Guided enrollment and login for token users |
US8787566B2 (en) * | 2006-08-23 | 2014-07-22 | Red Hat, Inc. | Strong encryption |
US8806219B2 (en) * | 2006-08-23 | 2014-08-12 | Red Hat, Inc. | Time-based function back-off |
US9038154B2 (en) | 2006-08-31 | 2015-05-19 | Red Hat, Inc. | Token Registration |
US8074265B2 (en) | 2006-08-31 | 2011-12-06 | Red Hat, Inc. | Methods and systems for verifying a location factor associated with a token |
US8977844B2 (en) | 2006-08-31 | 2015-03-10 | Red Hat, Inc. | Smartcard formation with authentication keys |
US8356342B2 (en) | 2006-08-31 | 2013-01-15 | Red Hat, Inc. | Method and system for issuing a kill sequence for a token |
JP4551380B2 (ja) * | 2006-10-04 | 2010-09-29 | 株式会社日立製作所 | 認証システムおよびその方法 |
US8693690B2 (en) | 2006-12-04 | 2014-04-08 | Red Hat, Inc. | Organizing an extensible table for storing cryptographic objects |
US20080178252A1 (en) * | 2007-01-18 | 2008-07-24 | General Instrument Corporation | Password Installation in Home Networks |
US8813243B2 (en) | 2007-02-02 | 2014-08-19 | Red Hat, Inc. | Reducing a size of a security-related data object stored on a token |
US8639940B2 (en) | 2007-02-28 | 2014-01-28 | Red Hat, Inc. | Methods and systems for assigning roles on a token |
US8832453B2 (en) | 2007-02-28 | 2014-09-09 | Red Hat, Inc. | Token recycling |
US9081948B2 (en) | 2007-03-13 | 2015-07-14 | Red Hat, Inc. | Configurable smartcard |
US20090003588A1 (en) * | 2007-06-26 | 2009-01-01 | John Gordon Ross | Counter Sealing Archives of Electronic Seals |
US20090006860A1 (en) * | 2007-06-26 | 2009-01-01 | John Gordon Ross | Generating multiple seals for electronic data |
US20090006258A1 (en) * | 2007-06-26 | 2009-01-01 | John Gordon Ross | Registration Process |
US20090006842A1 (en) * | 2007-06-26 | 2009-01-01 | John Gordon Ross | Sealing Electronic Data Associated With Multiple Electronic Documents |
CA2712242C (en) * | 2008-01-18 | 2017-03-28 | Identrust, Inc. | Binding a digital certificate to multiple trust domains |
US9444622B2 (en) * | 2008-09-15 | 2016-09-13 | Hewlett Packard Enterprise Development Lp | Computing platform with system key |
US8520855B1 (en) * | 2009-03-05 | 2013-08-27 | University Of Washington | Encapsulation and decapsulation for data disintegration |
US8572394B2 (en) | 2009-09-04 | 2013-10-29 | Computer Associates Think, Inc. | OTP generation using a camouflaged key |
IT1398518B1 (it) * | 2009-09-25 | 2013-03-01 | Colombo | Safe milano |
US8533460B2 (en) * | 2009-11-06 | 2013-09-10 | Computer Associates Think, Inc. | Key camouflaging method using a machine identifier |
JP4656458B1 (ja) * | 2009-11-09 | 2011-03-23 | Necインフロンティア株式会社 | ハンディターミナル、及びハンディターミナルによる決済方法 |
US8843757B2 (en) * | 2009-11-12 | 2014-09-23 | Ca, Inc. | One time PIN generation |
US8719587B2 (en) | 2009-12-18 | 2014-05-06 | CompuGroup Medical AG | Computer implemented method for generating a pseudonym, computer readable storage medium and computer system |
ATE554454T1 (de) | 2009-12-18 | 2012-05-15 | CompuGroup Medical AG | Computerimplementiertes verfahren zur erzeugung eines pseudonyms, computerlesbares speichermedium und computersystem |
EP2348449A3 (de) | 2009-12-18 | 2013-07-10 | CompuGroup Medical AG | Computerimplementiertes Verfahren zur Erzeugung eines Pseudonyms, computerlesbares Speichermedium und Computersystem |
EP2348452B1 (de) | 2009-12-18 | 2014-07-02 | CompuGroup Medical AG | Computerimplementiertes Verfahren zur Erzeugung eines Pseudonyms, computerlesbares Speichermedium und Computersystem |
EP2348446B1 (de) * | 2009-12-18 | 2015-04-15 | CompuGroup Medical AG | Computerimplementiertes Verfahren zur Erzeugung eines Pseudonyms, computerlesbares Speichermedium und Computersystem |
US9532222B2 (en) | 2010-03-03 | 2016-12-27 | Duo Security, Inc. | System and method of notifying mobile devices to complete transactions after additional agent verification |
US9544143B2 (en) | 2010-03-03 | 2017-01-10 | Duo Security, Inc. | System and method of notifying mobile devices to complete transactions |
EP2365456B1 (de) | 2010-03-11 | 2016-07-20 | CompuGroup Medical SE | Computerimplementiertes Verfahren zur Erzeugung eines Pseudonyms, computerlesbares Speichermedium und Computersystem |
US9282085B2 (en) * | 2010-12-20 | 2016-03-08 | Duo Security, Inc. | System and method for digital user authentication |
US8931069B2 (en) * | 2011-03-09 | 2015-01-06 | Ca, Inc. | Authentication with massively pre-generated one-time passwords |
US9467463B2 (en) | 2011-09-02 | 2016-10-11 | Duo Security, Inc. | System and method for assessing vulnerability of a mobile device |
US8763077B2 (en) | 2011-10-07 | 2014-06-24 | Duo Security, Inc. | System and method for enforcing a policy for an authenticator device |
US9524388B2 (en) | 2011-10-07 | 2016-12-20 | Duo Security, Inc. | System and method for enforcing a policy for an authenticator device |
US10979226B1 (en) * | 2011-10-12 | 2021-04-13 | Cybrsecurity Corporation | Soft-token authentication system with token blocking after entering the wrong PIN |
US8924712B2 (en) * | 2011-11-14 | 2014-12-30 | Ca, Inc. | Using QR codes for authenticating users to ATMs and other secure machines for cardless transactions |
CN103975333B (zh) * | 2011-12-01 | 2016-10-12 | 国际商业机器公司 | 跨系统安全登录 |
US20140068247A1 (en) * | 2011-12-12 | 2014-03-06 | Moose Loop Holdings, LLC | Security device access |
CN104254452B (zh) | 2012-03-20 | 2017-07-07 | 阿佩利亚科技公司 | 轮胎充注系统 |
US9887989B2 (en) | 2012-06-23 | 2018-02-06 | Pomian & Corella, Llc | Protecting passwords and biometrics against back-end security breaches |
US20140006781A1 (en) | 2012-06-23 | 2014-01-02 | Pomian & Corella, Llc | Encapsulating the complexity of cryptographic authentication in black-boxes |
US9361619B2 (en) * | 2012-08-06 | 2016-06-07 | Ca, Inc. | Secure and convenient mobile authentication techniques |
US9165130B2 (en) | 2012-11-21 | 2015-10-20 | Ca, Inc. | Mapping biometrics to a unique key |
US9607156B2 (en) | 2013-02-22 | 2017-03-28 | Duo Security, Inc. | System and method for patching a device through exploitation |
US9443073B2 (en) | 2013-08-08 | 2016-09-13 | Duo Security, Inc. | System and method for verifying status of an authentication device |
US8893230B2 (en) | 2013-02-22 | 2014-11-18 | Duo Security, Inc. | System and method for proxying federated authentication protocols |
US9338156B2 (en) | 2013-02-22 | 2016-05-10 | Duo Security, Inc. | System and method for integrating two-factor authentication in a device |
US9037865B1 (en) | 2013-03-04 | 2015-05-19 | Ca, Inc. | Method and system to securely send secrets to users |
US9325499B1 (en) * | 2013-06-24 | 2016-04-26 | Emc Corporation | Message encryption and decryption utilizing low-entropy keys |
US9053310B2 (en) | 2013-08-08 | 2015-06-09 | Duo Security, Inc. | System and method for verifying status of an authentication device through a biometric profile |
US9608814B2 (en) | 2013-09-10 | 2017-03-28 | Duo Security, Inc. | System and method for centralized key distribution |
US9092302B2 (en) | 2013-09-10 | 2015-07-28 | Duo Security, Inc. | System and method for determining component version compatibility across a device ecosystem |
CN103763103B (zh) * | 2013-12-31 | 2017-02-01 | 飞天诚信科技股份有限公司 | 一种智能卡生成脱机认证凭据的方法 |
US9762590B2 (en) | 2014-04-17 | 2017-09-12 | Duo Security, Inc. | System and method for an integrity focused authentication service |
US9231925B1 (en) * | 2014-09-16 | 2016-01-05 | Keypasco Ab | Network authentication method for secure electronic transactions |
US9838205B2 (en) | 2014-09-16 | 2017-12-05 | Keypasco Ab | Network authentication method for secure electronic transactions |
GB2531770A (en) * | 2014-10-30 | 2016-05-04 | Ibm | Confidential Extracting System Internal Data |
US9979719B2 (en) | 2015-01-06 | 2018-05-22 | Duo Security, Inc. | System and method for converting one-time passcodes to app-based authentication |
US20160260091A1 (en) * | 2015-03-04 | 2016-09-08 | THC Farmaceuticals, Inc. | Universal wallet for digital currency |
US9641341B2 (en) | 2015-03-31 | 2017-05-02 | Duo Security, Inc. | Method for distributed trust authentication |
GB2538052B (en) * | 2015-04-27 | 2019-07-03 | Gurulogic Microsystems Oy | Encoder, decoder, encryption system, encryption key wallet and method |
US20160335627A1 (en) * | 2015-05-11 | 2016-11-17 | Gemalto Sa | Method, device and a server for signing data |
US10009324B2 (en) * | 2015-06-29 | 2018-06-26 | American Express Travel Related Services Company, Inc. | Host card emulation systems and methods |
US9774579B2 (en) | 2015-07-27 | 2017-09-26 | Duo Security, Inc. | Method for key rotation |
EP3365732A4 (de) | 2015-10-23 | 2019-09-11 | XIVIX Holdings LLC | System und verfahren zur authentifizierung mit einer mobilen vorrichtung |
US10277569B1 (en) * | 2015-12-03 | 2019-04-30 | Amazon Technologies, Inc. | Cross-region cache of regional sessions |
US9900160B1 (en) | 2015-12-03 | 2018-02-20 | Amazon Technologies, Inc. | Asymmetric session credentials |
US9894067B1 (en) | 2015-12-03 | 2018-02-13 | Amazon Technologies, Inc. | Cross-region roles |
US10182044B1 (en) | 2015-12-03 | 2019-01-15 | Amazon Technologies, Inc. | Personalizing global session identifiers |
EP3430563B1 (de) * | 2016-03-15 | 2020-09-09 | Visa International Service Association | Validierungskryptogramm für interaktion |
WO2017201406A1 (en) * | 2016-05-19 | 2017-11-23 | Arris Enterprises Llc | Implicit rsa certificates |
SG11201811009VA (en) * | 2016-07-29 | 2019-02-27 | Nchain Holdings Ltd | Blockchain-implemented method and system |
GB201617620D0 (en) * | 2016-10-18 | 2016-11-30 | Cybernetica As | Composite digital signatures |
US10607017B2 (en) * | 2017-01-04 | 2020-03-31 | Ca, Inc. | Restricting access to sensitive data using tokenization |
AT519755B1 (de) * | 2017-02-14 | 2018-10-15 | Avl List Gmbh | Zylindergehäuse einer brennkraftmaschine |
US10665047B1 (en) | 2017-04-28 | 2020-05-26 | 1 Micro, LLC | Methods and apparatus for accessing secured physical assets |
CN107508686B (zh) * | 2017-10-18 | 2020-07-03 | 克洛斯比尔有限公司 | 身份认证方法和系统以及计算设备和存储介质 |
US10412113B2 (en) | 2017-12-08 | 2019-09-10 | Duo Security, Inc. | Systems and methods for intelligently configuring computer security |
US10680820B2 (en) * | 2018-03-09 | 2020-06-09 | Coolbitx Ltd. | Method of creating and recovering digital wallet |
US10693648B2 (en) * | 2018-03-26 | 2020-06-23 | Ca, Inc. | System and method for dynamic grid authentication |
US11941610B2 (en) | 2018-07-13 | 2024-03-26 | Circle Internet Financial, Ltd | Cryptocurrency securing system and method |
US20200036527A1 (en) * | 2018-07-24 | 2020-01-30 | Ca, Inc. | User authentication based on password-specific cryptographic keys |
WO2020046786A1 (en) * | 2018-08-27 | 2020-03-05 | Fireblocks Ltd. | System and method for securing crypto-asset transactions |
US11386429B2 (en) * | 2018-10-12 | 2022-07-12 | Cybavo Pte. Ltd. | Cryptocurrency securing method and device thereof |
US11316668B2 (en) * | 2018-11-16 | 2022-04-26 | Safetech Bv | Methods and systems for cryptographic private key management for secure multiparty storage and transfer of information |
US11658962B2 (en) | 2018-12-07 | 2023-05-23 | Cisco Technology, Inc. | Systems and methods of push-based verification of a transaction |
WO2021159052A1 (en) * | 2020-02-08 | 2021-08-12 | Cameron Laghaeian | Method and apparatus for managing encryption keys and encrypted electronic information on a network server |
US11915242B2 (en) * | 2021-12-30 | 2024-02-27 | The Adt Security Corporation | Premises security system with secure embedded cryptocurrency storage |
Family Cites Families (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3798605A (en) | 1971-06-30 | 1974-03-19 | Ibm | Centralized verification system |
US5206905A (en) * | 1989-05-15 | 1993-04-27 | Dallas Semiconductor Corp. | Password protected device using incorrect passwords as seed values for pseudo-random number generator for outputting random data to thwart unauthorized accesses |
JP2606419B2 (ja) * | 1989-08-07 | 1997-05-07 | 松下電器産業株式会社 | 暗号通信システムと暗号通信方法 |
US5142578A (en) * | 1991-08-22 | 1992-08-25 | International Business Machines Corporation | Hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors |
US6408388B1 (en) | 1993-05-05 | 2002-06-18 | Addison M. Fischer | Personal date/time notary device |
US5651066A (en) * | 1994-04-28 | 1997-07-22 | Nippon Telegraph And Telephone Corporation | Cipher key distribution system effectively preventing illegitimate use and charging of enciphered information |
US5668876A (en) | 1994-06-24 | 1997-09-16 | Telefonaktiebolaget Lm Ericsson | User authentication method and apparatus |
US5535276A (en) * | 1994-11-09 | 1996-07-09 | Bell Atlantic Network Services, Inc. | Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography |
DE69529663T2 (de) * | 1994-07-18 | 2003-10-16 | Koninkl Philips Electronics Nv | Dünne anzeigevorrichtung |
CA2194475A1 (en) | 1994-07-19 | 1996-02-01 | Frank W. Sudia | Method for securely using digital signatures in a commercial cryptographic system |
US5694471A (en) * | 1994-08-03 | 1997-12-02 | V-One Corporation | Counterfeit-proof identification card |
US5604801A (en) * | 1995-02-03 | 1997-02-18 | International Business Machines Corporation | Public key data communications system under control of a portable security device |
US5606615A (en) * | 1995-05-16 | 1997-02-25 | Lapointe; Brian K. | Computer security system |
EP0753816A1 (de) * | 1995-07-07 | 1997-01-15 | Thomson Consumer Electronics, Inc. | Verfahren und Vorrichtung zur sicheren Speicherung emfindlicher Informationen in einem relativen unsicheren Datenträger |
US5745574A (en) * | 1995-12-15 | 1998-04-28 | Entegrity Solutions Corporation | Security infrastructure for electronic transactions |
US5761306A (en) * | 1996-02-22 | 1998-06-02 | Visa International Service Association | Key replacement in a public key cryptosystem |
US5818936A (en) * | 1996-03-15 | 1998-10-06 | Novell, Inc. | System and method for automically authenticating a user in a distributed network system |
FR2747208B1 (fr) * | 1996-04-09 | 1998-05-15 | Clemot Olivier | Procede de dissimulation d'un code secret dans un dispositif d'authentification informatique |
US5815573A (en) * | 1996-04-10 | 1998-09-29 | International Business Machines Corporation | Cryptographic key recovery system |
US6002768A (en) * | 1996-05-07 | 1999-12-14 | International Computer Science Institute | Distributed registration and key distribution system and method |
-
1997
- 1997-12-23 US US08/996,758 patent/US6170058B1/en not_active Expired - Lifetime
-
1998
- 1998-12-22 EP EP10010031.2A patent/EP2302833B1/de not_active Expired - Lifetime
- 1998-12-22 JP JP2000526008A patent/JP4463979B2/ja not_active Expired - Lifetime
- 1998-12-22 ES ES98965522T patent/ES2359205T3/es not_active Expired - Lifetime
- 1998-12-22 AU AU20973/99A patent/AU746966B2/en not_active Expired
- 1998-12-22 CA CA002314349A patent/CA2314349C/en not_active Expired - Lifetime
- 1998-12-22 AT AT98965522T patent/ATE497658T1/de not_active IP Right Cessation
- 1998-12-22 WO PCT/US1998/027751 patent/WO1999033222A1/en active IP Right Grant
- 1998-12-22 DE DE69842122T patent/DE69842122D1/de not_active Expired - Lifetime
- 1998-12-22 EP EP98965522A patent/EP1048143B1/de not_active Expired - Lifetime
-
2000
- 2000-06-23 NO NO20003310A patent/NO20003310L/no not_active Application Discontinuation
- 2000-12-27 US US09/750,511 patent/US6956950B2/en not_active Expired - Lifetime
-
2001
- 2001-04-23 HK HK01102851.3A patent/HK1032306A1/xx not_active IP Right Cessation
Also Published As
Publication number | Publication date |
---|---|
EP1048143A1 (de) | 2000-11-02 |
WO1999033222A1 (en) | 1999-07-01 |
NO20003310L (no) | 2000-08-22 |
ES2359205T3 (es) | 2011-05-19 |
CA2314349C (en) | 2005-09-06 |
HK1032306A1 (en) | 2001-07-13 |
NO20003310D0 (no) | 2000-06-23 |
EP2302833A3 (de) | 2011-12-07 |
EP2302833A2 (de) | 2011-03-30 |
JP4463979B2 (ja) | 2010-05-19 |
ATE497658T1 (de) | 2011-02-15 |
CA2314349A1 (en) | 1999-07-01 |
US6956950B2 (en) | 2005-10-18 |
AU2097399A (en) | 1999-07-12 |
AU746966B2 (en) | 2002-05-09 |
US20010008012A1 (en) | 2001-07-12 |
EP1048143A4 (de) | 2006-02-01 |
EP2302833B1 (de) | 2018-02-14 |
US6170058B1 (en) | 2001-01-02 |
EP1048143B1 (de) | 2011-02-02 |
JP2001527325A (ja) | 2001-12-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE69842122D1 (de) | Verfahren und Vorrichtung zur sicheren Kryptoschlüsselspeicherung und -Nutzung. | |
GB2339518B (en) | Method for secure key management using a biometric | |
WO2003041324A3 (en) | Biometrics template | |
WO1999003277A3 (en) | Arrangement for independently requesting a playing authorization for a reproduced encrypted information signal | |
ATE355671T1 (de) | Vorrichtung und verfahren zur informationsverarbeitung | |
EP0997808A2 (de) | Verfahren und Vorrichtung zur Steuerung des Zugriffs auf gespeicherte Information | |
DE60207223D1 (de) | Verfahren und system zur bereitstellung von busverschlüsselung basierend auf einem kryptographischen schlüsselaustausch | |
ATE190147T1 (de) | Methode zur programdatensicherung | |
WO1999016031A3 (en) | Method and apparatus for asymmetric key management in a cryptographic system | |
CA2130531A1 (en) | Method and Apparatus for Verification of Classes of Documents | |
ATE199608T1 (de) | System und verfahren zur beglaubigung von informationsträgern | |
WO1996008093B1 (en) | Biometric controlled key generation | |
EP0998073A3 (de) | Verfahren und Vorrichtung zur Authentifikation und zum Schlüsselaustausch zwischen verschiedenen Komponenten | |
EP1025677A1 (de) | Erzeugung eines kryptografischen schlüssels unter verwendung biometrischer daten | |
CA2174299A1 (en) | Method and Apparatus for Securing Executable Programs Against Copying | |
GB2289965A (en) | Secure personal indentification instument and method for creating same | |
ATE225542T1 (de) | Verfahren zur echtheitsprüfung eines datenträgers | |
RU2004109811A (ru) | Способ инициализации чип-карты | |
ATE312450T1 (de) | System und verfahren zum verteilen von kryptographischen schlüsseln, zugangspunkt und system zum verteilen eines authentifizierungskodes | |
NO20012463L (no) | Fremgangsmåte og apparat for sikker fordeling av autentiseringsakkreditiver til omstreifende brukere | |
JP3904964B2 (ja) | ネットワーク印刷システム | |
WO2000054208A3 (en) | Methods and apparatus for authenticating the download of information onto a smart card | |
KR20020034457A (ko) | 해쉬 함수와 워터 마크 기술을 응용한 디지털 저작물의생성 및 인증 방법과 전송되는 디지털 저작물의 구조 | |
JPH0664635B2 (ja) | Icカ−ドシステム | |
JP2003150556A (ja) | 個人認証システム、クライアント側認証装置、サーバ、サーバ側認証装置、バイオメトリクス情報管理方法 |