JP7389235B2 - 匿名イベント認証 - Google Patents
匿名イベント認証 Download PDFInfo
- Publication number
- JP7389235B2 JP7389235B2 JP2022514565A JP2022514565A JP7389235B2 JP 7389235 B2 JP7389235 B2 JP 7389235B2 JP 2022514565 A JP2022514565 A JP 2022514565A JP 2022514565 A JP2022514565 A JP 2022514565A JP 7389235 B2 JP7389235 B2 JP 7389235B2
- Authority
- JP
- Japan
- Prior art keywords
- device integrity
- client device
- public key
- request
- integrity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 claims description 77
- 238000012795 verification Methods 0.000 claims description 64
- 238000003860 storage Methods 0.000 claims description 33
- 238000001514 detection method Methods 0.000 claims description 20
- 230000015654 memory Effects 0.000 claims description 15
- 238000009826 distribution Methods 0.000 description 26
- 230000008569 process Effects 0.000 description 21
- 238000004891 communication Methods 0.000 description 20
- 238000013459 approach Methods 0.000 description 17
- 238000010586 diagram Methods 0.000 description 16
- 238000004590 computer program Methods 0.000 description 13
- 230000006870 function Effects 0.000 description 12
- 238000012545 processing Methods 0.000 description 12
- 230000009471 action Effects 0.000 description 6
- 230000008901 benefit Effects 0.000 description 6
- 230000004044 response Effects 0.000 description 6
- 238000010200 validation analysis Methods 0.000 description 6
- 230000003993 interaction Effects 0.000 description 4
- 238000013515 script Methods 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 230000008859 change Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000000644 propagated effect Effects 0.000 description 3
- 238000004904 shortening Methods 0.000 description 3
- 230000003442 weekly effect Effects 0.000 description 3
- 238000010923 batch production Methods 0.000 description 2
- 230000001010 compromised effect Effects 0.000 description 2
- 230000007423 decrease Effects 0.000 description 2
- 238000012217 deletion Methods 0.000 description 2
- 230000037430 deletion Effects 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 238000000926 separation method Methods 0.000 description 2
- 239000013589 supplement Substances 0.000 description 2
- 208000033748 Device issues Diseases 0.000 description 1
- 241000700605 Viruses Species 0.000 description 1
- 230000002776 aggregation Effects 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000003542 behavioural effect Effects 0.000 description 1
- 238000004422 calculation algorithm Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000001953 sensory effect Effects 0.000 description 1
- 239000000758 substrate Substances 0.000 description 1
- 230000002123 temporal effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3257—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using blind signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3249—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3255—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
Description
110 クライアントデバイス
111 アプリケーション
112 秘密鍵
113 公開鍵
114 信用できるプログラム
115 セキュアなストレージ
120 要求
122 認証トークン
129 デジタルコンポーネント
130 パブリッシャー
140 ウェブサイト
145 リソース
150 デジタルコンポーネントシステム、デジタルコンポーネント配信システム
152 デジタルコンポーネントパートナー
160 デジタルコンポーネントプロバイダ
170 デバイス完全性システム
200 クライアントデバイス
211 公開鍵
220 デバイス完全性コンピューティングシステム、デバイス完全性サーバ、デバイス完全性システム
300 クライアントデバイス
311 要求
312 デジタルコンポーネント
320 コンピューティングシステム、受信側コンピューティングシステム
400 クライアントデバイス
411 ブラインド署名検証鍵、公開鍵
412 要求
413 ブラインド署名
420 デバイス完全性コンピューティングシステム
500 クライアントデバイス
511 要求
512 デジタルコンポーネント
520 コンピューティングシステム、受信側コンピューティングシステム
540 デバイス完全性コンピューティングシステム
600 クライアントデバイス
611 匿名証明書
620 デバイス完全性コンピューティングシステム、デバイス完全性サーバ
700 クライアントデバイス
711 要求
712 デジタルコンポーネント
720 コンピューティングシステム、受信側コンピューティングシステム
740 デバイス完全性コンピューティングシステム
800 クライアントデバイス
810 アプリケーション
820 信用できるプログラム、信用できるオペレーティングシステム
830 スロットラー
850 認証トークン受信側
900 コンピュータシステム、システム
910 プロセッサ
920 メモリ
930 記憶デバイス
940 入出力デバイス
950 システムバス
960 外部デバイス
Claims (14)
- コンピュータ実装方法であって、
デバイス完全性コンピューティングシステムによって、およびクライアントデバイスから、N個のデバイス完全性要素についての要求を受信するステップであって、
Nは2以上の整数であり、
前記要求は、前記クライアントデバイスについてのデバイスレベル不正検出信号を含み、
前記N個のデバイス完全性要素の各々について、公開鍵データが、(i)前記デバイス完全性要素用のそれぞれの公開鍵、または(ii)前記デバイス完全性要素用の前記それぞれの公開鍵の派生物のうちの少なくとも1つを含む、ステップと、
前記デバイス完全性コンピューティングシステムによって、および前記デバイスレベル不正検出信号に少なくとも基づいて、前記クライアントデバイスの信用性の判断を判定するステップと、
前記N個のデバイス完全性要素の各々について、前記デバイス完全性コンピューティングシステムによって、少なくとも前記デバイス完全性要素についての前記公開鍵データを使用して前記デバイス完全性要素を生成するステップであって、
前記デバイス完全性要素は、前記デバイス完全性要素についての前記公開鍵データを含む内容のセットに基づいて生成されたデジタル署名を含む、ステップと、
前記デバイス完全性コンピューティングシステムによって、前記N個のデバイス完全性要素を前記クライアントデバイスへ送信するステップと
を含むコンピュータ実装方法。 - 各デバイス完全性要素は、前記デバイス完全性要素についての前記内容のセットを含むそれぞれのデバイス完全性トークンを含み、
前記デバイス完全性要素についての前記内容のセットは、信用性の前記判断が判定された時間を示すタイムスタンプ、および前記デバイス完全性要素についての前記公開鍵データを含み、
各デバイス完全性要素を生成するステップは、前記デバイス完全性コンピューティングシステムの秘密鍵を使用して、前記デバイス完全性要素についての前記内容のセットにデジタル署名するステップを含む、請求項1に記載のコンピュータ実装方法。 - 前記デバイス完全性要素についての前記内容のセットは、信用性の前記判断をさらに含む、請求項2に記載のコンピュータ実装方法。
- 各デバイス完全性要素を生成するステップは、ブラインド署名方式を使用して、前記デバイス完全性要素についての前記公開鍵データのブラインド署名を生成するステップを含み、
前記デバイス完全性要素は前記ブラインド署名である、請求項1に記載のコンピュータ実装方法。 - クライアントデバイスについてのM個の信用性レベルに対応するM個のブラインド署名検証鍵を公開し、前記M個のブラインド署名検証鍵に対応するM個のそれぞれの署名鍵を保持するステップをさらに含む、請求項4に記載のコンピュータ実装方法。
- 信用性の前記判断の前記判定は、前記M個の信用性レベルから選択された信用性のレベルを前記クライアントデバイスに割り当てることを含む、請求項5に記載のコンピュータ実装方法。
- 各デバイス完全性要素についての前記公開鍵データは、前記デバイス完全性要素用の前記公開鍵の前記派生物を含み、
前記デバイス完全性要素用の前記公開鍵の前記派生物は、前記ブラインド署名方式を使用してブラインドされたブラインド化公開鍵を含む、請求項6に記載のコンピュータ実装方法。 - 前記デバイス完全性要素用の前記公開鍵の前記派生物は、前記デバイス完全性要素用の前記公開鍵のブラインド化短縮暗号学的ハッシュを含む、請求項7に記載のコンピュータ実装方法。
- 前記ブラインド署名方式は非公開検証可能ブラインド署名方式を含む、請求項4から8のいずれか一項に記載のコンピュータ実装方法。
- 前記非公開検証可能ブラインド署名方式はIETF VOPRFブラインド署名方式である、請求項9に記載のコンピュータ実装方法。
- 前記ブラインド署名方式は公開検証可能ブラインド署名方式を含む、請求項4から8のいずれか一項に記載のコンピュータ実装方法。
- 前記公開検証可能ブラインド署名方式はブラインドRSA署名方式である、請求項11に記載のコンピュータ実装方法。
- 1つまたは複数のプロセッサと、
前記1つまたは複数のプロセッサに、請求項1から12のいずれか一項に記載の方法を実践させるように構成されたコンピュータ可読命令を記憶した1つまたは複数のメモリと
を備えるシステム。 - 命令を記憶した非一時的コンピュータ可読記録媒体であって、前記命令は、1つまたは複数のコンピュータによって実行されると、前記1つまたは複数のコンピュータに、請求項1から12のいずれか一項に記載の方法の動作を実施させる、非一時的コンピュータ可読記録媒体。
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IL275947 | 2020-07-09 | ||
IL275947A IL275947A (en) | 2020-07-09 | 2020-07-09 | Anonymous Event Confirmation |
PCT/US2021/022495 WO2022010548A1 (en) | 2020-07-09 | 2021-03-16 | Anonymous event attestation |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2022551389A JP2022551389A (ja) | 2022-12-09 |
JP7389235B2 true JP7389235B2 (ja) | 2023-11-29 |
Family
ID=79553657
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2022514565A Active JP7389235B2 (ja) | 2020-07-09 | 2021-03-16 | 匿名イベント認証 |
Country Status (7)
Country | Link |
---|---|
US (1) | US20220417034A1 (ja) |
EP (1) | EP4008088A1 (ja) |
JP (1) | JP7389235B2 (ja) |
KR (1) | KR102639228B1 (ja) |
CN (1) | CN114391242B (ja) |
IL (1) | IL275947A (ja) |
WO (1) | WO2022010548A1 (ja) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20230247268A1 (en) * | 2022-01-31 | 2023-08-03 | Roku, Inc. | Computing System with Device Attestation Feature |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080270786A1 (en) | 2007-04-30 | 2008-10-30 | Brickell Ernest F | Apparatus and method for direct anonymous attestation from bilinear maps |
JP2009027708A (ja) | 2007-07-17 | 2009-02-05 | Intel Corp | 双線形マップからの直接匿名認証のための装置および方法 |
JP2009539172A (ja) | 2006-06-30 | 2009-11-12 | ポスデータ カンパニー リミテッド | ネットワーク基盤のdvrシステムにおけるdvrサーバー及びモニタリング対象端末接近制御方法 |
JP2013175040A (ja) | 2012-02-24 | 2013-09-05 | Nippon Telegr & Teleph Corp <Ntt> | 認証権限移譲システム、情報端末、トークン発行局、サービス提供装置、認証権限移譲方法、及びプログラム |
US20170289185A1 (en) | 2016-03-31 | 2017-10-05 | Qualcomm Incorporated | Device assisted traffic anomaly detection |
US10154061B1 (en) | 2018-05-04 | 2018-12-11 | INTEGRITY Security Services, Inc. | Cloaking authority system |
US20190312730A1 (en) | 2018-04-05 | 2019-10-10 | T-Mobile Usa, Inc. | Authentication token request with referred application instance public key |
JP2020042691A (ja) | 2018-09-13 | 2020-03-19 | 株式会社東芝 | 情報処理装置、リソース提供装置、情報処理方法、情報処理プログラム、リソース提供方法、リソース提供プログラム |
US20200162251A1 (en) | 2018-11-09 | 2020-05-21 | Ares Technologies, Inc. | Systems and methods for distributed key storage |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2744818B1 (fr) * | 1996-02-12 | 1998-03-27 | Bull Sa | Procede de verification de la conservation de l'integrite d'une requete emise sans protection par un client vers un serveur au moyen de l'integrite de la reponse |
US6871276B1 (en) * | 2000-04-05 | 2005-03-22 | Microsoft Corporation | Controlled-content recoverable blinded certificates |
US8356181B2 (en) * | 2007-11-15 | 2013-01-15 | Intel Corporation | Apparatus and method for a direct anonymous attestation scheme from short-group signatures |
EP2558972A1 (en) * | 2010-04-12 | 2013-02-20 | InterDigital Patent Holdings, Inc. | Staged control release in boot process |
US9208318B2 (en) * | 2010-08-20 | 2015-12-08 | Fujitsu Limited | Method and system for device integrity authentication |
US8832447B2 (en) * | 2011-08-10 | 2014-09-09 | Sony Corporation | System and method for using digital signatures to assign permissions |
EP2798778A4 (en) * | 2011-12-27 | 2015-08-19 | Intel Corp | METHOD AND SYSTEM FOR SECURE CALCULATION OF A BASE POINT IN A DIRECT ANONYMOUS CERTIFICATE |
US9515832B2 (en) * | 2013-06-24 | 2016-12-06 | Microsoft Technology Licensing, Llc | Process authentication and resource permissions |
ES2695245T3 (es) * | 2013-12-04 | 2019-01-02 | Telefonica Digital Espana Slu | Método implementado por ordenador y un sistema informático para evitar problemas de seguridad en el uso de certificados digitales en la firma de códigos y un producto de programa informático de los mismos |
US9807610B2 (en) * | 2015-03-26 | 2017-10-31 | Intel Corporation | Method and apparatus for seamless out-of-band authentication |
US10397005B2 (en) * | 2017-03-31 | 2019-08-27 | Intel Corporation | Using a trusted execution environment as a trusted third party providing privacy for attestation |
CN110771091B (zh) * | 2017-06-14 | 2022-10-18 | 哈曼国际工业有限公司 | 用于网络连接式装置的安全的***和方法 |
US10313133B2 (en) * | 2017-06-21 | 2019-06-04 | Visa International Service Association | Secure communications providing forward secrecy |
US10505978B2 (en) * | 2017-08-24 | 2019-12-10 | Visa International Service Association | Utilizing trust tokens to conduct secure message exchanges |
CN107800688B (zh) * | 2017-09-28 | 2020-04-10 | 南京理工大学 | 一种基于收敛加密的云端数据去重和完整性审计方法 |
CN107948143B (zh) * | 2017-11-15 | 2021-03-30 | 安徽大学 | 一种云存储中基于身份的隐私保护完整性检测方法和*** |
CN109788482B (zh) * | 2019-02-26 | 2021-09-03 | 武汉大学 | 一种车联网环境下车辆间的消息匿名认证方法及*** |
US11580321B2 (en) * | 2019-04-08 | 2023-02-14 | Ares Technologies, Inc. | Systems, devices, and methods for machine learning using a distributed framework |
CN110782252B (zh) * | 2019-10-24 | 2022-09-16 | 福建福链科技有限公司 | 一种基于区块链的监控视频数据交易方法及*** |
-
2020
- 2020-07-09 IL IL275947A patent/IL275947A/en unknown
-
2021
- 2021-03-16 EP EP21717664.3A patent/EP4008088A1/en active Pending
- 2021-03-16 WO PCT/US2021/022495 patent/WO2022010548A1/en unknown
- 2021-03-16 CN CN202180005216.5A patent/CN114391242B/zh active Active
- 2021-03-16 JP JP2022514565A patent/JP7389235B2/ja active Active
- 2021-03-16 KR KR1020227006853A patent/KR102639228B1/ko active IP Right Grant
- 2021-03-16 US US17/633,291 patent/US20220417034A1/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009539172A (ja) | 2006-06-30 | 2009-11-12 | ポスデータ カンパニー リミテッド | ネットワーク基盤のdvrシステムにおけるdvrサーバー及びモニタリング対象端末接近制御方法 |
US20080270786A1 (en) | 2007-04-30 | 2008-10-30 | Brickell Ernest F | Apparatus and method for direct anonymous attestation from bilinear maps |
JP2009027708A (ja) | 2007-07-17 | 2009-02-05 | Intel Corp | 双線形マップからの直接匿名認証のための装置および方法 |
JP2013175040A (ja) | 2012-02-24 | 2013-09-05 | Nippon Telegr & Teleph Corp <Ntt> | 認証権限移譲システム、情報端末、トークン発行局、サービス提供装置、認証権限移譲方法、及びプログラム |
US20170289185A1 (en) | 2016-03-31 | 2017-10-05 | Qualcomm Incorporated | Device assisted traffic anomaly detection |
US20190312730A1 (en) | 2018-04-05 | 2019-10-10 | T-Mobile Usa, Inc. | Authentication token request with referred application instance public key |
US10154061B1 (en) | 2018-05-04 | 2018-12-11 | INTEGRITY Security Services, Inc. | Cloaking authority system |
JP2020042691A (ja) | 2018-09-13 | 2020-03-19 | 株式会社東芝 | 情報処理装置、リソース提供装置、情報処理方法、情報処理プログラム、リソース提供方法、リソース提供プログラム |
US20200162251A1 (en) | 2018-11-09 | 2020-05-21 | Ares Technologies, Inc. | Systems and methods for distributed key storage |
Also Published As
Publication number | Publication date |
---|---|
CN114391242A (zh) | 2022-04-22 |
CN114391242B (zh) | 2024-02-23 |
WO2022010548A1 (en) | 2022-01-13 |
KR20220042192A (ko) | 2022-04-04 |
IL275947A (en) | 2022-02-01 |
US20220417034A1 (en) | 2022-12-29 |
KR102639228B1 (ko) | 2024-02-21 |
JP2022551389A (ja) | 2022-12-09 |
EP4008088A1 (en) | 2022-06-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7319380B2 (ja) | ブラウザクッキーを保護する | |
US20230050222A1 (en) | Cryptographically secure request verification | |
JP2023096089A (ja) | グループ署名による匿名イベント証明 | |
JP7189372B2 (ja) | デバイスおよびアプリケーションの完全性の検証 | |
KR102608325B1 (ko) | 클라이언트 장치에서 통신의 무결성 보호 | |
JP7389235B2 (ja) | 匿名イベント認証 | |
EP4162647B1 (en) | Anonymous authentication with token redemption | |
US20230163978A1 (en) | Privacy-preserving activity aggregation mechanism | |
CN116348874B (zh) | 使用鉴证令牌的安全归因的方法、***以及介质 | |
US20220300643A1 (en) | Cryptographically secure data protection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20220413 |
|
A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20230428 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20230605 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20230720 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20231023 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20231116 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 7389235 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |