Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

135 results about "Key distribution center" patented technology

In cryptography, a key distribution center (KDC) is part of a cryptosystem intended to reduce the risks inherent in exchanging keys. KDCs often operate in systems within which some users may have permission to use certain services at some times and not at others.

System for ensuring data privacy and user differentiation in a distributed file system

In accordance with an embodiment of the present invention, a security module may be configured to provide an owner the capability to differentiate between users. In particular, the security module may be configured to generate an asymmetric read/write key pair for respectively decrypting/encrypting data for storage on a disk. The owner of the file may distribute the read key of the asymmetric key pair to a group of users that the owner has assigned read-permission for the encrypted data, i.e., a group that has read-only access. Moreover, the owner of the file may distribute the write key of the asymmetric pair to another group of users that the owner has assigned write-permission for the encrypted data, i.e., users in the write-permission group may modify the data. Alternatively, the security module may be configured to throw away the write key and not allow further re-use of the key. The security modules may also be configured to encrypt the read key for with a further key for additional protection while stored. The security module may be also configured to generate a first set of read/write key pairs for fragments of a file. Each file fragment is encrypted with a different write key from the set of read/write key pairs. The respective read keys may then be encrypted with a second long-lived key pair chosen by the owner of the file. The security module may then configured to store the encrypted file fragment and the associated encrypted read key in a storage area of a shared computer system accessible to the users of the shared computer system. The security module may also be configured to provide distribution of the required keys-either the read/write keys for direct use, or the long-lived keys for indirect use-either by means of the data owners themselves, or through use of a key distribution center.
Owner:MATSUSHITA KOTOBUKI ELECTRONICS IND LTD +1

Method and apparatus for providing a key distribution center without storing long-term server secrets

One embodiment of the present invention provides a system for operating a key distribution center (KDC) that provides keys to facilitate secure communications between clients and servers across a computer network, wherein the system operates without having to store long-term server secrets. The system operates by receiving a communication from a server at the KDC. This communication includes an identifier for the server, as well as a temporary secret key to be used in communications between a client and the server for a limited time period. In response the communication, the system attempts to authenticate the server. If the server is successfully authenticated, the system stores the temporary secret key at the KDC, so that the temporary secret key can be subsequently used to facilitate communications with the server. Upon subsequently receiving a request at the KDC from a client that desires to communicate with the server, the system produces a session key to be used in communications between the client and server, and then creates a ticket to the server by encrypting an identifier for the client and the session key with the temporary secret key for the server. Next, the system assembles a message that includes the identifier for the server, the session key and the ticket to the server, and sends the message to the client in a secure manner. The system subsequently allows the client to forward the ticket to the server in order to initiate communications between the client and the server.
Owner:ORACLE INT CORP

Methods and apparatus for authenticating mobility entities using kerberos

Methods and apparatus for generating and transmitting dynamically generated session keys are disclosed. A key distribution center generates a session key between the key distribution center and a first mobility entity (e.g., an access point). Once the session key between the key distribution center and the access point is transmitted to the access point, the access point retrieves a shared session key between the access point and a Mobile Node from the key distribution center, which is then transmitted to the Mobile Node, enabling the Mobile Node to connect to the network. Similarly, either the Mobile Node or its Home Agent retrieves a session key between the key distribution center and the access point from the key distribution center, enabling a shared session key between the Home Agent and the Mobile Node to be obtained from the key distribution center. The Mobile Node (or Home Agent) then transmits the shared session key to the Home Agent (or Mobile Node). Once the shared session key is obtained by both the Home Agent and the Mobile Node, the shared session key is used to authenticate registration messages (e.g., including registration request and reply packets). In this manner, dynamically generated session keys may be used to securely transmit registration messages in a Mobile IP environment.
Owner:CISCO TECH INC

Method for distributing key using public key cryptographic technique and on-line updating of the public key

The invention relates to a method for the distribution of an encryption key and the online innovation of a public key, which comprises the steps that: (1) a first entity produces a temporary public and private key pair; (2) a communication conversation encryption key exists between the first entity and a second entity; (3) an encryption key distribution center locally stored is utilized to carry out the signature verification of the public key; (4) the second entity produces a temporary public and private key pair; (5) a encryption key response message is formed and returned to the second entity; (6) the encryption key distribution center locally stored is utilized to carry out the signature verification of the public key; (7) the communication conversation encryption key is utilized by the first entity and the second entity to serve as a conversation encryption key to carry out secret communication. The method proposes a method that safely distributes communication encryption key to each pair of entity, causes the encryption key to have PFS property and lowers the complexity of the encryption key management of the system, and also supports the online innovation function of a public key of the encryption key distribution center which is the trusted third party.
Owner:CHINA IWNCOMM

Space-ground integrated network anonymous access authentication method based on identity encryption system

The invention discloses a space-ground integrated network anonymous access authentication method based on an identity encryption system. Belonging to the field of information network security, according to the method, offline registration is carried out on a key distribution center by terminal equipment and a satellite respectively; the terminal device sends an access authentication request to thesatellite, the satellite receives an access authentication request and an identity authentication message of the terminal equipment, after verifying the legality of the terminal equipment, replying aterminal equipment access authentication response message; completing access authentication procedures, the terminal device sends a connection recovery authentication request to the satellite, according to the method, the terminal equipment does not need to be re-authenticated, the connection recovery authentication process is completed, the legality of the terminal equipment can be effectively verified, multiple access authentication mode selections are provided for users with different security requirements, the privacy security of the terminal equipment is ensured, and the complexity of access authentication is greatly reduced.
Owner:四川九强通信科技有限公司

Cloud storage integrity detection method for recovering lost secret keys and system applying cloud storage integrity detection method

ActiveCN104954390AAvoid regeneratingPrevent dishonestyTransmissionCloud storageKey distribution center
The invention provides a cloud storage integrity detection method for recovering lost secret keys, and a system applying the cloud storage integrity detection method. The system comprises a parameter generation center module, a cloud module, a secret key distribution center module, a group member module and an audit center module. Through the adoption of the system, when the secrete keys of members in a group are lost, the conditions that new secrete keys are regenerated and signatures are regenerated for part of data can be avoided; the secrete keys can be verified, namely, each member in the group can verify whether the secrete key sent by a secrete key distribution center is correct or not, and the user of which the secrete key is lost can also verify whether the share, sent by other t+1 members in the group, is correct or not, so as to avoid the condition that the secret key distribution center or the user distributing the share to the user of which the secrete key is lost is dishonest; when the secrete keys are recovered, the secrete keys of the members are blinded, so that all the members do not know the secrete keys of the others. Therefore, the secrete key recovering safety is improved, and a cloud is prevented from being framed by malicious users.
Owner:建投数据科技(山东)有限公司

Authentication method based on public key encryption system

The invention relates to an authentication method based on a public key encryption system, applied to an environment of instant message communication, network telephone and the like. The authentication method comprises identity authentication and shared session key generation. The authentication method mainly consists of three roles: a sender A, a receiver B, and a key distribution center. In a protocol execution process, the sender A and the receiver B complete the mutual identity authentication with the key distribution center and the mutual authentication between the sender A and the receiver B through the interaction with the secret key distribution center, in the period, the sender A and the receiver B respectively receive a shared session key generated by the secret key distributioncenter, and the authentication party also receives the shared session key so as to use the shared session key to encrypt and decrypt communication contents in the next stage of information interaction. By adoption of the authentication method provided by the invention, the security requirements of the authentication protocol are fully met, the old message playback can be prevented, and the identity impersonation attacks are defended.
Owner:中国科学院沈阳计算技术研究所有限公司

Internet of Things terminal card binding, network access authentication and service authentication method and device

The invention discloses an Internet of Things terminal card binding, network access authentication and service authentication method and device, which are used for solving the problems of a complex authentication process and a high cost of Internet of Things equipment in the prior art. The Internet of Things terminal card binding method comprises the following steps: receiving a card writing request sent by an Internet of Things terminal, wherein the card writing request carries an international mobile equipment identifier (IMEI) of the Internet of Things terminal, distributing the IMSI for the Internet of Things card, carrying the distributed IMSI in a key request, sending the key request to a key distribution center, receiving a private key which is sent by the key distribution center and is calculated and generated by utilizing a preset algorithm according to the IMSI, storing the corresponding relationship between the IMEI and the IMSI in an authentication server, sending the IMSIand the private key to the Internet of Things terminal, and enabling the Internet of Things terminal to write the IMSI, the IMEI and the private key into the Internet of Things card for machine-card binding.
Owner:CHINA MOBILEHANGZHOUINFORMATION TECH CO LTD +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products