[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

DK3704829T3 - Kryptografisk nøglegenereringssystem og -fremgangsmåde - Google Patents

Kryptografisk nøglegenereringssystem og -fremgangsmåde Download PDF

Info

Publication number
DK3704829T3
DK3704829T3 DK17930228.6T DK17930228T DK3704829T3 DK 3704829 T3 DK3704829 T3 DK 3704829T3 DK 17930228 T DK17930228 T DK 17930228T DK 3704829 T3 DK3704829 T3 DK 3704829T3
Authority
DK
Denmark
Prior art keywords
generation system
key generation
cryptographic key
cryptographic
key
Prior art date
Application number
DK17930228.6T
Other languages
English (en)
Inventor
Quan Wang
Original Assignee
Visa Int Service Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Visa Int Service Corporation filed Critical Visa Int Service Corporation
Application granted granted Critical
Publication of DK3704829T3 publication Critical patent/DK3704829T3/da

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/2807Exchanging configuration information on appliance services in a home automation network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/2816Controlling appliance services of a home automation network by calling their functionalities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/065Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/068Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0872Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0433Key management protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/20Services signaling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Automation & Control Theory (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Selective Calling Equipment (AREA)
DK17930228.6T 2017-10-31 2017-10-31 Kryptografisk nøglegenereringssystem og -fremgangsmåde DK3704829T3 (da)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2017/059371 WO2019089013A1 (en) 2017-10-31 2017-10-31 Cryptographic key generation system and method

Publications (1)

Publication Number Publication Date
DK3704829T3 true DK3704829T3 (da) 2022-09-05

Family

ID=66333574

Family Applications (1)

Application Number Title Priority Date Filing Date
DK17930228.6T DK3704829T3 (da) 2017-10-31 2017-10-31 Kryptografisk nøglegenereringssystem og -fremgangsmåde

Country Status (4)

Country Link
US (2) US11387994B2 (da)
EP (2) EP4099613A1 (da)
DK (1) DK3704829T3 (da)
WO (1) WO2019089013A1 (da)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10990683B2 (en) * 2018-05-25 2021-04-27 At&T Intellectual Property I, L.P. Virtual reality for security augmentation in home and office environments
US12047387B2 (en) * 2018-10-09 2024-07-23 Northwestern University Distributed digital currency mining to perform network tasks
US11150888B2 (en) * 2018-12-22 2021-10-19 Daniel Ivan Beard Software bill of materials validation systems and methods
GB201912132D0 (en) * 2019-08-23 2019-10-09 Angoka Ltd Symmetric key generation, authentication and communication betwenn a plurality of entities in a network
US11509463B2 (en) * 2020-05-31 2022-11-22 Daniel Chien Timestamp-based shared key generation
EP4033694B1 (de) 2021-01-26 2023-08-16 Hochschule Ruhr West Verfahren und vorrichtung zur vereinheitlichung von blockchain adressen
WO2023229649A1 (en) * 2022-05-25 2023-11-30 Google Llc Time-limited key derivation

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7370202B2 (en) 2004-11-02 2008-05-06 Voltage Security, Inc. Security device for cryptographic communications
US8051489B1 (en) * 2005-03-18 2011-11-01 Oracle America, Inc. Secure configuration of a wireless sensor network
US8824684B2 (en) * 2007-12-08 2014-09-02 International Business Machines Corporation Dynamic, selective obfuscation of information for multi-party transmission
US20090239500A1 (en) * 2008-03-20 2009-09-24 Tzero Technologies, Inc. Maintaining secure communication of a network device
US8140884B2 (en) * 2008-07-18 2012-03-20 Verisign, Inc. Efficient time-based memory counters
CA2774079A1 (en) * 2009-09-15 2011-03-24 Cassidian Limited Key generation for multi-party encryption
EP2348447B1 (en) * 2009-12-18 2014-07-16 CompuGroup Medical AG A computer implemented method for generating a set of identifiers from a private key, computer implemented method and computing device
EP2363977B1 (en) 2010-02-26 2012-10-24 Research In Motion Limited Methods and devices for computing a shared encryption key
US8948391B2 (en) * 2012-11-13 2015-02-03 Lenovo Enterprise Solutions (Singapore) Pte. Ltd. Secure communication method
US9258117B1 (en) * 2014-06-26 2016-02-09 Amazon Technologies, Inc. Mutual authentication with symmetric secrets and signatures
US10248783B2 (en) * 2015-12-22 2019-04-02 Thomson Reuters (Grc) Llc Methods and systems for identity creation, verification and management
US10108812B2 (en) 2016-01-28 2018-10-23 Nasdaq, Inc. Systems and methods for securing and disseminating time sensitive information using a blockchain
WO2017152150A1 (en) * 2016-03-04 2017-09-08 ShoCard, Inc. Method and system for authenticated login using static or dynamic codes
US11032078B2 (en) * 2019-02-04 2021-06-08 Mastercard International Incorporated Method and system for blockchain wallet dynamic private key

Also Published As

Publication number Publication date
US20200287715A1 (en) 2020-09-10
EP3704829A1 (en) 2020-09-09
US11387994B2 (en) 2022-07-12
EP4099613A1 (en) 2022-12-07
WO2019089013A1 (en) 2019-05-09
US20220286279A1 (en) 2022-09-08
EP3704829A4 (en) 2020-11-11
EP3704829B1 (en) 2022-07-27
US11824978B2 (en) 2023-11-21
EP3704829B8 (en) 2023-04-05

Similar Documents

Publication Publication Date Title
IL253742B (en) Method and system for managing encryption keys
HK1244921A1 (zh) 加密和解密系統和方法
PL3622663T3 (pl) Sposób i urządzenia do uzgadniania klucza
ES2858435T8 (es) Dispositivos y método de intercambio de claves
DK3704829T3 (da) Kryptografisk nøglegenereringssystem og -fremgangsmåde
EP3361469B8 (en) Secret search system, management device, secret search method, and secret search program
EP3255914A4 (en) Key generation method, device and system
EP3531732A4 (en) METHOD, DEVICE AND SYSTEM FOR GENERATING ANCHORING KEYS
EP2947810A4 (en) ENCRYPTION SYSTEM, RECYPTION KEY GENERATION DEVICE, RECYPTION DEVICE, ENCRYPTION METHOD, AND ENCRYPTION PROGRAM
EP3208967A4 (en) Entity authentication method and device based on pre-shared key
IL255223A0 (en) System and method for cryptographically oriented database management
GB201703301D0 (en) Password-based generation and management of secret cryptographic keys
EP3096488A4 (en) Hypersphere-based multivariable public key encryption/decryption system and method
EP3584731C0 (en) AUTHENTICATION MANAGEMENT PROCEDURE AND SYSTEM
DK3191997T3 (da) Systemer og fremgangsmåder til hybridhardware-autentificering
SG10201406291WA (en) Key generation method and device
EP3570487A4 (en) PRIVATE KEY GENERATION METHOD, DEVICE AND SYSTEM
EP3282437A4 (en) Encryption system and key generating device
GB201902689D0 (en) Multivariable public key signature system and method
EP3586258C0 (fr) Système d'authentification à clé segmentée
IL258926B (en) A system and method for authentication and encryption immunity from absorption
GB201714491D0 (en) Space information generating device, space information generating method, and program
SG11202010938QA (en) Calculation device for encryption using public key and encryption method
ZA201406940B (en) System and method for authenticating public keys
EP3425613A4 (en) KEY GENERATING DEVICE, COMPUTER SYSTEM AND STATISTICAL ENCRYPTION METHOD