DE69531264D1 - Verfahren zur Erzeugung und Aktualisierung eines Sitzungsschlüssels in einen verteilten Kommunikationsnetzwerk - Google Patents

Verfahren zur Erzeugung und Aktualisierung eines Sitzungsschlüssels in einen verteilten Kommunikationsnetzwerk

Info

Publication number
DE69531264D1
DE69531264D1 DE69531264T DE69531264T DE69531264D1 DE 69531264 D1 DE69531264 D1 DE 69531264D1 DE 69531264 T DE69531264 T DE 69531264T DE 69531264 T DE69531264 T DE 69531264T DE 69531264 D1 DE69531264 D1 DE 69531264D1
Authority
DE
Germany
Prior art keywords
updating
generating
communication network
session key
distributed communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
DE69531264T
Other languages
English (en)
Other versions
DE69531264T2 (de
Inventor
Ran Canetti
Amir Herzberg
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Application granted granted Critical
Publication of DE69531264D1 publication Critical patent/DE69531264D1/de
Publication of DE69531264T2 publication Critical patent/DE69531264T2/de
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0827Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving distinctive intermediate devices or communication paths
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
DE69531264T 1994-03-01 1995-02-21 Verfahren zur Erzeugung und Aktualisierung eines Sitzungsschlüssels in einen verteilten Kommunikationsnetzwerk Expired - Fee Related DE69531264T2 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US203973 1994-03-01
US08/203,973 US5412723A (en) 1994-03-01 1994-03-01 Mechanism for keeping a key secret from mobile eavesdroppers

Publications (2)

Publication Number Publication Date
DE69531264D1 true DE69531264D1 (de) 2003-08-21
DE69531264T2 DE69531264T2 (de) 2004-06-09

Family

ID=22756057

Family Applications (1)

Application Number Title Priority Date Filing Date
DE69531264T Expired - Fee Related DE69531264T2 (de) 1994-03-01 1995-02-21 Verfahren zur Erzeugung und Aktualisierung eines Sitzungsschlüssels in einen verteilten Kommunikationsnetzwerk

Country Status (4)

Country Link
US (1) US5412723A (de)
EP (1) EP0670645B1 (de)
JP (1) JP3024053B2 (de)
DE (1) DE69531264T2 (de)

Families Citing this family (53)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5625692A (en) * 1995-01-23 1997-04-29 International Business Machines Corporation Method and system for a public key cryptosystem having proactive, robust, and recoverable distributed threshold secret sharing
US6035041A (en) * 1997-04-28 2000-03-07 Certco, Inc. Optimal-resilience, proactive, public-key cryptographic system and method
US6021496A (en) * 1997-07-07 2000-02-01 International Business Machines Corporation User authentication from non-native server domains in a computer network
EP1018231B1 (de) * 1997-09-25 2006-05-24 John Wolfgang Halpern Datenverschlüsselungssystem für internet-kommunikation
US6084967A (en) * 1997-10-29 2000-07-04 Motorola, Inc. Radio telecommunication device and method of authenticating a user with a voice authentication token
US6084968A (en) * 1997-10-29 2000-07-04 Motorola, Inc. Security token and method for wireless applications
US7587044B2 (en) * 1998-01-02 2009-09-08 Cryptography Research, Inc. Differential power analysis method and apparatus
WO1999035782A1 (en) * 1998-01-02 1999-07-15 Cryptography Research, Inc. Leak-resistant cryptographic method and apparatus
US6349289B1 (en) 1998-01-16 2002-02-19 Ameritech Corporation Method and system for tracking computer system usage through a remote access security device
US6799224B1 (en) 1998-03-10 2004-09-28 Quad Research High speed fault tolerant mass storage network information server
US6260155B1 (en) 1998-05-01 2001-07-10 Quad Research Network information server
CA2333095C (en) * 1998-06-03 2005-05-10 Cryptography Research, Inc. Improved des and other cryptographic processes with leak minimization for smartcards and other cryptosystems
DE69935913T2 (de) * 1998-07-02 2008-01-10 Cryptography Research Inc., San Francisco Leckresistente aktualisierung eines indexierten kryptographischen schlüssels
JP4071870B2 (ja) * 1998-08-20 2008-04-02 インターナショナル・ビジネス・マシーンズ・コーポレーション 秘密鍵生成方法
US6732277B1 (en) * 1998-10-08 2004-05-04 Entrust Technologies Ltd. Method and apparatus for dynamically accessing security credentials and related information
US6675297B1 (en) * 1999-03-01 2004-01-06 Sigma Designs, Inc. Method and apparatus for generating and using a tamper-resistant encryption key
EP1050991A1 (de) * 1999-04-27 2000-11-08 Sientescom Developments Limited Dynamisches System zur Gültigkeitserklärung
US7203834B1 (en) * 1999-12-02 2007-04-10 International Business Machines Corporation Method of updating encryption keys in a data communication system
US7792745B2 (en) * 2000-02-25 2010-09-07 Ipass Inc. Method and system to facilitate financial settlement of service access transactions between multiple parties
US20010034693A1 (en) * 2000-02-25 2001-10-25 Jay Farhat Method and system to broker a service access transaction
WO2001080479A1 (en) * 2000-04-14 2001-10-25 Wu Wen Delayed commitment scheme to prevent attacks based on compromised certificates
US7240112B2 (en) * 2000-05-26 2007-07-03 Ipass Inc. Service quality monitoring process
US6985945B2 (en) * 2000-12-07 2006-01-10 Ipass, Inc. Service quality monitoring process
US7519695B2 (en) * 2000-05-26 2009-04-14 Ipass Inc. Service quality monitoring process
US7263476B1 (en) * 2000-06-12 2007-08-28 Quad Research High speed information processing and mass storage system and method, particularly for information and application servers
FR2810480B1 (fr) * 2000-06-20 2002-11-15 Gemplus Card Int Traitement de donnees avec une cle
WO2002010932A1 (en) 2000-08-02 2002-02-07 Ipass, Inc. A method and system to customize and update a network connection application for distribution to mulitple end users
US7921290B2 (en) 2001-04-18 2011-04-05 Ipass Inc. Method and system for securely authenticating network access credentials for users
US20030065919A1 (en) * 2001-04-18 2003-04-03 Albert Roy David Method and system for identifying a replay attack by an access device to a computer system
US7469341B2 (en) * 2001-04-18 2008-12-23 Ipass Inc. Method and system for associating a plurality of transaction data records generated in a service access system
US7761606B2 (en) * 2001-08-02 2010-07-20 Ipass Inc. Method and system to secure a connection application for distribution to multiple end-users
US20030188160A1 (en) * 2001-08-02 2003-10-02 Singam Sunder Method and system to securely update files via a network
US7032244B2 (en) * 2001-10-02 2006-04-18 International Business Machines Corporation Identifying potential intruders on a server
PL370305A1 (en) * 2001-11-06 2005-05-16 The Procter & Gamble Company Multi-motion toothbrush
US20030099362A1 (en) * 2001-11-27 2003-05-29 Doug Rollins Method and apparatus for WEP key management and propagation in a wireless system
US7477748B2 (en) * 2002-03-18 2009-01-13 Colin Martin Schmidt Session key distribution methods using a hierarchy of key servers
US7961884B2 (en) * 2002-08-13 2011-06-14 Ipass Inc. Method and system for changing security information in a computer network
US20040088539A1 (en) * 2002-11-01 2004-05-06 Infante Steven D. System and method for securing digital messages
US8606885B2 (en) * 2003-06-05 2013-12-10 Ipass Inc. Method and system of providing access point data associated with a network access point
US20050055371A1 (en) * 2003-06-05 2005-03-10 Singam Sunder Method and system to manage a network connection application
US20050134523A1 (en) * 2003-12-17 2005-06-23 International Business Machines Corporation Creating an encrypted channel to a wireless video display
EP1787199A2 (de) * 2004-02-18 2007-05-23 Ipass, Inc. Verfahren und system zur verwaltung von trasaktionen in einem fernnetzzugangssystem
US7539862B2 (en) * 2004-04-08 2009-05-26 Ipass Inc. Method and system for verifying and updating the configuration of an access device during authentication
US7971070B2 (en) * 2005-01-11 2011-06-28 International Business Machines Corporation Read/write media key block
US8791822B2 (en) * 2008-02-07 2014-07-29 International Business Machines Corporation Embedded RFID verifiable currency
US8122501B2 (en) * 2008-06-20 2012-02-21 International Business Machines Corporation Traitor detection for multilevel assignment
US8108928B2 (en) * 2008-06-20 2012-01-31 International Business Machines Corporation Adaptive traitor tracing
US8422684B2 (en) * 2008-08-15 2013-04-16 International Business Machines Corporation Security classes in a media key block
US8571209B2 (en) 2009-01-19 2013-10-29 International Business Machines Recording keys in a broadcast-encryption-based system
US8788842B2 (en) 2010-04-07 2014-07-22 Apple Inc. System and method for content protection based on a combination of a user PIN and a device specific identifier
US8510552B2 (en) * 2010-04-07 2013-08-13 Apple Inc. System and method for file-level data protection
US10742414B1 (en) 2019-10-18 2020-08-11 Capital One Services, Llc Systems and methods for data access control of secure memory using a short-range transceiver
CN113163402B (zh) * 2020-01-23 2022-10-28 华为技术有限公司 一种通信方法、装置及系统

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4182933A (en) * 1969-02-14 1980-01-08 The United States Of America As Represented By The Secretary Of The Army Secure communication system with remote key setting
US4972472A (en) * 1985-03-15 1990-11-20 Tandem Computers Incorporated Method and apparatus for changing the master key in a cryptographic system
EP0257585B1 (de) * 1986-08-22 1992-11-25 Nec Corporation Schlüsselverteilungsverfahren
JPH0292127A (ja) * 1988-09-29 1990-03-30 Nec Corp 暗号化方式
US4956863A (en) * 1989-04-17 1990-09-11 Trw Inc. Cryptographic method and apparatus for public key exchange with authentication
US5081677A (en) * 1990-08-31 1992-01-14 International Business Machines Corp. Crypotographic key version control facility
US5146498A (en) * 1991-01-10 1992-09-08 Motorola, Inc. Remote key manipulations for over-the-air re-keying
US5208859A (en) * 1991-03-15 1993-05-04 Motorola, Inc. Method for rekeying secure communication units by group
US5177791A (en) * 1991-08-30 1993-01-05 International Business Machines Corp. Secure translation of usage-control values for cryptographic keys
US5325432A (en) * 1993-02-04 1994-06-28 Motorola, Inc. Method for updating encryption key information in communication units

Also Published As

Publication number Publication date
DE69531264T2 (de) 2004-06-09
EP0670645B1 (de) 2003-07-16
US5412723A (en) 1995-05-02
EP0670645A1 (de) 1995-09-06
JP3024053B2 (ja) 2000-03-21
JPH07250060A (ja) 1995-09-26

Similar Documents

Publication Publication Date Title
DE69531264D1 (de) Verfahren zur Erzeugung und Aktualisierung eines Sitzungsschlüssels in einen verteilten Kommunikationsnetzwerk
DE69918818D1 (de) Verfahren zur Erzeugung eines öffentlichen Schlüssels in einem sicheren digitalen Kommunikationssystem und implizites Zertifikat
DE69816128D1 (de) Verfahren und vorrichtung zur erzeugung von hintergrundrauschen in einem kommunikationssystem
DE69230489T2 (de) Verfahren zur Aufstellung und Durchführung eines geheimen Netzwerksicherheitsverfahrens in einem Kryptosystem mit öffentlichem Schlüssel
DE69635143D1 (de) Verfahren und Vorrichtung zur Erzeugung und Verwaltung eines privaten Schlüssels in einem kryptografischen System mit öffentlichem Schlüssel
DE69429034T2 (de) Verfahren und Gerät zur Erstellung und zum Erhalten der Rahmensynchronisation in einer Satelliten Kommunikationsanordnung
DE69616517T2 (de) Vorrichtung und verfahren zur kompensation von akustischen echos einschliesslich nicht-linearen verzerrungen in lautsprechertelefonen
DE69532254D1 (de) Verfahren und Gerät zur Kommunikationsverschlüsselung in einem Datennetz
DE69331183D1 (de) Verfahren und Vorrichtung zur Authentifizierung unter Verwendung eines Null-Kenntnis-Protokolls
DE69527911D1 (de) Verfahren und Vorrichtung zur freien Vorschau von Diensten eines Kommunikationsnetzwerkens
DE69533230D1 (de) Verfahren und vorrichtung zur verbesserung der fehlertoleranz eines netzwerkes
DE69836234D1 (de) Verfahren und Vorrichtung zur Kommunikation in einem Hausnetz
DE69634318D1 (de) Verfahren und Vorrichtung zur Gebührenerfassung von Benutzern in einem Geheimübertragungssystem
DE69510226T2 (de) Verfahren und vorrichtung zur aktualisierung oder änderung eines netzwerkverzeichnisses
DE69421324D1 (de) Verfahren und Vorrichtung zur Sprachkommunikation
DE69710505D1 (de) Verfahren und Vorrichtung zur Erzeugung eines Vektorquantisierungs-Codebuchs
DE69630331D1 (de) Verfahren zur gesicherten Sitzungsschlüsselerzeugung und zur Authentifizierung
GB9804677D0 (en) Method and apparatus for updating distributed databases in a telecommunications network
DE69431426T2 (de) System und Verfahren zur Nachrichtenauthentisierung in einem nicht-schmiedbaren Kryptosystem mit öffentlichen Schlüssel
EE03628B1 (et) Sidevõrgus kasutatav aparatuur ja meetod
DE69636631D1 (de) Verfahren zur Erzeugung und Registrierung von Grundschlüsseln
DE69925219D1 (de) Verfahren zur Erzeugung eines IEEE 1394 virtuellen Netzes und dessen Steurungseinrichtung
DE59510322D1 (de) Verfahren zur Nutzung von Diensten durch Netzteilnehmer eines Kommunikationsnetzes
DE69939585D1 (de) Verfahren und vorrichtung zur verwaltung von objekten in einem kommunikationsnetz
DE69430162D1 (de) System und Verfahren zur passiven Sprachverifizierung in einem Fernsprechnetzwerk

Legal Events

Date Code Title Description
8364 No opposition during term of opposition
8339 Ceased/non-payment of the annual fee