DK3704829T3 - Kryptografisk nøglegenereringssystem og -fremgangsmåde - Google Patents
Kryptografisk nøglegenereringssystem og -fremgangsmåde Download PDFInfo
- Publication number
- DK3704829T3 DK3704829T3 DK17930228.6T DK17930228T DK3704829T3 DK 3704829 T3 DK3704829 T3 DK 3704829T3 DK 17930228 T DK17930228 T DK 17930228T DK 3704829 T3 DK3704829 T3 DK 3704829T3
- Authority
- DK
- Denmark
- Prior art keywords
- generation system
- key generation
- cryptographic key
- cryptographic
- key
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
- H04L12/2807—Exchanging configuration information on appliance services in a home automation network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
- H04L12/2816—Controlling appliance services of a home automation network by calling their functionalities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/068—Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0872—Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0433—Key management protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/20—Services signaling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/70—Services for machine-to-machine communication [M2M] or machine type communication [MTC]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Automation & Control Theory (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
- Selective Calling Equipment (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2017/059371 WO2019089013A1 (en) | 2017-10-31 | 2017-10-31 | Cryptographic key generation system and method |
Publications (1)
Publication Number | Publication Date |
---|---|
DK3704829T3 true DK3704829T3 (da) | 2022-09-05 |
Family
ID=66333574
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DK17930228.6T DK3704829T3 (da) | 2017-10-31 | 2017-10-31 | Kryptografisk nøglegenereringssystem og -fremgangsmåde |
Country Status (4)
Country | Link |
---|---|
US (2) | US11387994B2 (da) |
EP (2) | EP4099613A1 (da) |
DK (1) | DK3704829T3 (da) |
WO (1) | WO2019089013A1 (da) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10990683B2 (en) * | 2018-05-25 | 2021-04-27 | At&T Intellectual Property I, L.P. | Virtual reality for security augmentation in home and office environments |
US12047387B2 (en) * | 2018-10-09 | 2024-07-23 | Northwestern University | Distributed digital currency mining to perform network tasks |
US11150888B2 (en) * | 2018-12-22 | 2021-10-19 | Daniel Ivan Beard | Software bill of materials validation systems and methods |
GB201912132D0 (en) * | 2019-08-23 | 2019-10-09 | Angoka Ltd | Symmetric key generation, authentication and communication betwenn a plurality of entities in a network |
US11509463B2 (en) * | 2020-05-31 | 2022-11-22 | Daniel Chien | Timestamp-based shared key generation |
EP4033694B1 (de) | 2021-01-26 | 2023-08-16 | Hochschule Ruhr West | Verfahren und vorrichtung zur vereinheitlichung von blockchain adressen |
WO2023229649A1 (en) * | 2022-05-25 | 2023-11-30 | Google Llc | Time-limited key derivation |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7370202B2 (en) | 2004-11-02 | 2008-05-06 | Voltage Security, Inc. | Security device for cryptographic communications |
US8051489B1 (en) * | 2005-03-18 | 2011-11-01 | Oracle America, Inc. | Secure configuration of a wireless sensor network |
US8824684B2 (en) * | 2007-12-08 | 2014-09-02 | International Business Machines Corporation | Dynamic, selective obfuscation of information for multi-party transmission |
US20090239500A1 (en) * | 2008-03-20 | 2009-09-24 | Tzero Technologies, Inc. | Maintaining secure communication of a network device |
US8140884B2 (en) * | 2008-07-18 | 2012-03-20 | Verisign, Inc. | Efficient time-based memory counters |
CA2774079A1 (en) * | 2009-09-15 | 2011-03-24 | Cassidian Limited | Key generation for multi-party encryption |
EP2348447B1 (en) * | 2009-12-18 | 2014-07-16 | CompuGroup Medical AG | A computer implemented method for generating a set of identifiers from a private key, computer implemented method and computing device |
EP2363977B1 (en) | 2010-02-26 | 2012-10-24 | Research In Motion Limited | Methods and devices for computing a shared encryption key |
US8948391B2 (en) * | 2012-11-13 | 2015-02-03 | Lenovo Enterprise Solutions (Singapore) Pte. Ltd. | Secure communication method |
US9258117B1 (en) * | 2014-06-26 | 2016-02-09 | Amazon Technologies, Inc. | Mutual authentication with symmetric secrets and signatures |
US10248783B2 (en) * | 2015-12-22 | 2019-04-02 | Thomson Reuters (Grc) Llc | Methods and systems for identity creation, verification and management |
US10108812B2 (en) | 2016-01-28 | 2018-10-23 | Nasdaq, Inc. | Systems and methods for securing and disseminating time sensitive information using a blockchain |
WO2017152150A1 (en) * | 2016-03-04 | 2017-09-08 | ShoCard, Inc. | Method and system for authenticated login using static or dynamic codes |
US11032078B2 (en) * | 2019-02-04 | 2021-06-08 | Mastercard International Incorporated | Method and system for blockchain wallet dynamic private key |
-
2017
- 2017-10-31 EP EP22187037.1A patent/EP4099613A1/en active Pending
- 2017-10-31 DK DK17930228.6T patent/DK3704829T3/da active
- 2017-10-31 WO PCT/US2017/059371 patent/WO2019089013A1/en unknown
- 2017-10-31 EP EP17930228.6A patent/EP3704829B8/en active Active
- 2017-10-31 US US16/756,095 patent/US11387994B2/en active Active
-
2022
- 2022-05-24 US US17/752,767 patent/US11824978B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
US20200287715A1 (en) | 2020-09-10 |
EP3704829A1 (en) | 2020-09-09 |
US11387994B2 (en) | 2022-07-12 |
EP4099613A1 (en) | 2022-12-07 |
WO2019089013A1 (en) | 2019-05-09 |
US20220286279A1 (en) | 2022-09-08 |
EP3704829A4 (en) | 2020-11-11 |
EP3704829B1 (en) | 2022-07-27 |
US11824978B2 (en) | 2023-11-21 |
EP3704829B8 (en) | 2023-04-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
IL253742B (en) | Method and system for managing encryption keys | |
HK1244921A1 (zh) | 加密和解密系統和方法 | |
PL3622663T3 (pl) | Sposób i urządzenia do uzgadniania klucza | |
ES2858435T8 (es) | Dispositivos y método de intercambio de claves | |
DK3704829T3 (da) | Kryptografisk nøglegenereringssystem og -fremgangsmåde | |
EP3361469B8 (en) | Secret search system, management device, secret search method, and secret search program | |
EP3255914A4 (en) | Key generation method, device and system | |
EP3531732A4 (en) | METHOD, DEVICE AND SYSTEM FOR GENERATING ANCHORING KEYS | |
EP2947810A4 (en) | ENCRYPTION SYSTEM, RECYPTION KEY GENERATION DEVICE, RECYPTION DEVICE, ENCRYPTION METHOD, AND ENCRYPTION PROGRAM | |
EP3208967A4 (en) | Entity authentication method and device based on pre-shared key | |
IL255223A0 (en) | System and method for cryptographically oriented database management | |
GB201703301D0 (en) | Password-based generation and management of secret cryptographic keys | |
EP3096488A4 (en) | Hypersphere-based multivariable public key encryption/decryption system and method | |
EP3584731C0 (en) | AUTHENTICATION MANAGEMENT PROCEDURE AND SYSTEM | |
DK3191997T3 (da) | Systemer og fremgangsmåder til hybridhardware-autentificering | |
SG10201406291WA (en) | Key generation method and device | |
EP3570487A4 (en) | PRIVATE KEY GENERATION METHOD, DEVICE AND SYSTEM | |
EP3282437A4 (en) | Encryption system and key generating device | |
GB201902689D0 (en) | Multivariable public key signature system and method | |
EP3586258C0 (fr) | Système d'authentification à clé segmentée | |
IL258926B (en) | A system and method for authentication and encryption immunity from absorption | |
GB201714491D0 (en) | Space information generating device, space information generating method, and program | |
SG11202010938QA (en) | Calculation device for encryption using public key and encryption method | |
ZA201406940B (en) | System and method for authenticating public keys | |
EP3425613A4 (en) | KEY GENERATING DEVICE, COMPUTER SYSTEM AND STATISTICAL ENCRYPTION METHOD |