DE10248006B8 - Verfahren und Vorrichtung zum Verschlüsseln von Daten - Google Patents

Verfahren und Vorrichtung zum Verschlüsseln von Daten Download PDF

Info

Publication number
DE10248006B8
DE10248006B8 DE10248006A DE10248006A DE10248006B8 DE 10248006 B8 DE10248006 B8 DE 10248006B8 DE 10248006 A DE10248006 A DE 10248006A DE 10248006 A DE10248006 A DE 10248006A DE 10248006 B8 DE10248006 B8 DE 10248006B8
Authority
DE
Germany
Prior art keywords
encrypting data
encrypting
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
DE10248006A
Other languages
English (en)
Other versions
DE10248006A1 (de
DE10248006B4 (de
Inventor
Keith Alexander Woodcroft Chepstow Harrison
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hewlett Packard Enterprise Development LP
Original Assignee
Hewlett Packard Development Co LP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hewlett Packard Development Co LP filed Critical Hewlett Packard Development Co LP
Publication of DE10248006A1 publication Critical patent/DE10248006A1/de
Application granted granted Critical
Publication of DE10248006B4 publication Critical patent/DE10248006B4/de
Publication of DE10248006B8 publication Critical patent/DE10248006B8/de
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/068Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/104Grouping of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/3033Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters details relating to pseudo-prime or prime number generation, e.g. primality test
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/101Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management
DE10248006A 2001-10-15 2002-10-15 Verfahren und Vorrichtung zum Verschlüsseln von Daten Expired - Lifetime DE10248006B8 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB01246818 2001-10-15
GBGB0124681.8A GB0124681D0 (en) 2001-10-15 2001-10-15 Method and apparatus for encrypting data

Publications (3)

Publication Number Publication Date
DE10248006A1 DE10248006A1 (de) 2003-04-30
DE10248006B4 DE10248006B4 (de) 2008-01-17
DE10248006B8 true DE10248006B8 (de) 2008-05-15

Family

ID=9923831

Family Applications (1)

Application Number Title Priority Date Filing Date
DE10248006A Expired - Lifetime DE10248006B8 (de) 2001-10-15 2002-10-15 Verfahren und Vorrichtung zum Verschlüsseln von Daten

Country Status (3)

Country Link
US (2) US7219226B2 (de)
DE (1) DE10248006B8 (de)
GB (2) GB0124681D0 (de)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB0215911D0 (en) 2002-07-10 2002-08-21 Hewlett Packard Co Method and apparatus for encrypting data
GB0313666D0 (en) 2003-06-13 2003-07-16 Hewlett Packard Development Co RSA cryptographic method and system
US7930412B2 (en) * 2003-09-30 2011-04-19 Bce Inc. System and method for secure access
US20050177510A1 (en) * 2004-02-09 2005-08-11 Visa International Service Association, A Delaware Corporation Buyer initiated payment
US7030041B2 (en) * 2004-03-15 2006-04-18 Applied Materials Inc. Adhesion improvement for low k dielectrics
GB2415112B (en) 2004-06-11 2007-04-25 Hewlett Packard Development Co Cryptographic method and apparatus
EP1836792A1 (de) 2004-12-30 2007-09-26 BCE Inc. System und verfahren für sicheren zugang
US20090164804A1 (en) * 2007-12-25 2009-06-25 Sandisk Il Ltd. Secured storage device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5740246A (en) * 1994-12-13 1998-04-14 Mitsubishi Corporation Crypt key system
JPH11136230A (ja) * 1997-08-22 1999-05-21 Internatl Business Mach Corp <Ibm> 時間制約暗号システム
JP2000090039A (ja) * 1998-09-14 2000-03-31 Sony Corp 音楽配信方法、送信装置および方法、ならびに、再生装置および方法
WO2001024080A1 (en) * 1999-09-27 2001-04-05 Gte Internetworking Incorporated Secure play of performance data
JP2001244924A (ja) * 2000-03-01 2001-09-07 Mizuno Junya 情報暗号化方式

Family Cites Families (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE68926200T2 (de) * 1988-08-11 1996-10-17 Ibm Geheime Datenübertragung mittels Steuervektoren
US5199070A (en) * 1990-12-18 1993-03-30 Matsushita Electric Industrial Co., Ltd. Method for generating a public key
JPH10511471A (ja) 1994-08-12 1998-11-04 リートン,フランク、タムスン フェイルセイフキィ捺印システム
US5625692A (en) 1995-01-23 1997-04-29 International Business Machines Corporation Method and system for a public key cryptosystem having proactive, robust, and recoverable distributed threshold secret sharing
US6410690B1 (en) * 1995-06-07 2002-06-25 Medarex, Inc. Therapeutic compounds comprised of anti-Fc receptor antibodies
US5794210A (en) * 1995-12-11 1998-08-11 Cybergold, Inc. Attention brokerage
JPH10198272A (ja) 1996-12-27 1998-07-31 Canon Inc 階層を有する鍵管理方法及び暗号システム、分散デジタル署名システム
US6389534B1 (en) * 1997-06-30 2002-05-14 Taher Elgamal Cryptographic policy filters and policy control method and apparatus
US6901145B1 (en) 1999-04-08 2005-05-31 Lucent Technologies Inc. Generation of repeatable cryptographic key based on varying parameters
US6895507B1 (en) * 1999-07-02 2005-05-17 Time Certain, Llc Method and system for determining and maintaining trust in digital data files with certifiable time
CA2277633C (en) 1999-07-19 2009-10-20 Certicom Corp. Split-key key-agreement protocol
WO2001011527A2 (en) * 1999-08-10 2001-02-15 Yeda Research And Development Co. Ltd. Honesty preserving negotiation and computation
US6853988B1 (en) * 1999-09-20 2005-02-08 Security First Corporation Cryptographic server with provisions for interoperability between cryptographic systems
GB9923804D0 (en) * 1999-10-08 1999-12-08 Hewlett Packard Co Electronic commerce system
JP3565265B2 (ja) * 2000-07-19 2004-09-15 日本電気株式会社 優先度別クラス選択型通信システム及び通信方法
DE10044139A1 (de) * 2000-09-06 2002-04-18 Giesecke & Devrient Gmbh Verfahren zum Sichern von digitalen Waren beim Verkauf über ein Computernetzwerk
GB2368755A (en) * 2000-11-01 2002-05-08 Content Technologies Ltd Distributing public keys using 2D barcodes
US6937731B2 (en) * 2001-03-13 2005-08-30 Mitake Information Corporation End to end real-time encrypting process of a mobile commerce WAP data transmission section and the module of the same
CA2386491A1 (en) * 2001-05-16 2002-11-16 Kasten Chase Applied Research Limited System for secure electronic information transmission
EP2429116B1 (de) * 2001-08-13 2013-07-10 The Board of Trustees of the Leland Stanford Junior University Verfahren zur Verschlüsselung auf Identitätsbasis und damit zusammenhängende kryptografische Techniken
US20030051129A1 (en) * 2001-09-10 2003-03-13 Ravi Razdan Protecting confidential digital information at application service providers
US6583988B1 (en) * 2002-02-05 2003-06-24 Whelen Engineering Company, Inc. Encapsulated power supply

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5740246A (en) * 1994-12-13 1998-04-14 Mitsubishi Corporation Crypt key system
JPH11136230A (ja) * 1997-08-22 1999-05-21 Internatl Business Mach Corp <Ibm> 時間制約暗号システム
US20010052071A1 (en) * 1997-08-22 2001-12-13 Michiharu Kudo Encryption system with time-dependent decryption
JP2000090039A (ja) * 1998-09-14 2000-03-31 Sony Corp 音楽配信方法、送信装置および方法、ならびに、再生装置および方法
WO2001024080A1 (en) * 1999-09-27 2001-04-05 Gte Internetworking Incorporated Secure play of performance data
JP2001244924A (ja) * 2000-03-01 2001-09-07 Mizuno Junya 情報暗号化方式

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
SCHNECK, P.: Persistent Access Control to Prevent Piracy of Digital Information. In: Proceedings of the IEEE, Vol. 87, 1999, S. 1239-1250 *

Also Published As

Publication number Publication date
GB2381173A (en) 2003-04-23
GB0222978D0 (en) 2002-11-13
GB2381173B (en) 2004-06-30
DE10248006A1 (de) 2003-04-30
GB0124681D0 (en) 2001-12-05
US7219226B2 (en) 2007-05-15
US20030095661A1 (en) 2003-05-22
DE10248006B4 (de) 2008-01-17
US20070180267A1 (en) 2007-08-02

Similar Documents

Publication Publication Date Title
DE60316861D1 (de) Verfahren und Vorrichtung zur Verschlüsselung/Entschlüsselung von Daten
DE60137162D1 (de) Vorrichtung, Verfahren und Aufzeichnungsdatenträger zum Vergleichen von Bildern
DE60238117D1 (de) Vorrichtung und verfahren zum rotationsdruckschneiden
DE60209262D1 (de) Verfahren und vorrichtung zum bildvergleich
DE10391476D2 (de) Verfahren und Vorrichtung zum Auftragen von Fluiden
DE60134383D1 (de) Vorrichtung und Verfahren zum Sammeln von Datenverkehrsinformationen
DE60311200D1 (de) Vorrichtung und Verfahren zum Bereitstellen von Authentifizierungsinformationen für eine sichere Gruppenkommunikation
DE60223200D1 (de) Verfahren und Vorrichtung zum Verwalten von Netzwerkgeräten
DE60029347D1 (de) Vorrichtung und verfahren zum lokalisieren von lateralbohrungen
DE69906037D1 (de) Verfahren und Vorrichtung zur Datenverschlüsselung
DE60222730D1 (de) Verfahren und Vorrichtung zum Ausführen von Aufgaben
DE10193220T1 (de) Verfahren und System zum Verteilen von Positionsdaten
DE60200880D1 (de) Verfahren und vorrichtung zum aufnehmen und abstellen von behältern
DE60119403D1 (de) Vorrichtung und Verfahren zum Ändern von Karteninformationen
DE60221850D1 (de) Verfahren und vorrichtung zur datenverschlüsselung
DE60230111D1 (de) Verfahren und Vorrichtung zum Routen von Datenrahmen
DE60142335D1 (de) Verfahren und vorrichtung zum sichten und zugreifen nachgeladener kontextabhängiger informationen
DE50109140D1 (de) Verfahren und Vorrichtung zum Temperieren von Proben
DE60207534T2 (de) Verfahren und vorrichtung zum verpacken von gegenständen
DE60208033D1 (de) Verfahren und vorrichtung zur übertragung von synchronen daten
DE60102762D1 (de) Verfahren und Vorrichtung zum Etikettieren
DE60029039D1 (de) Verfahren, Vorrichtung und Computerprogramm zur Verschlüsselung von Computertelefonie
DE60010672D1 (de) Vorrichtung und Verfahren zum Bedrucken von Drähten
DE50104127D1 (de) Verfahren und vorrichtung zum thermischen behandeln von objekten
DE69931329D1 (de) Verfahren und vorrichtung zum empfang von daten

Legal Events

Date Code Title Description
OP8 Request for examination as to paragraph 44 patent law
8127 New person/name/address of the applicant

Owner name: HEWLETT-PACKARD DEVELOPMENT CO., L.P., HOUSTON, TE

8396 Reprint of erroneous front page
8364 No opposition during term of opposition
R081 Change of applicant/patentee

Owner name: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP, HOU, US

Free format text: FORMER OWNER: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., HOUSTON, TEX., US

R082 Change of representative

Representative=s name: SCHOPPE, ZIMMERMANN, STOECKELER, ZINKLER, SCHE, DE

R071 Expiry of right