TWI563411B - Agent for providing security cloud service and security token device for security cloud service - Google Patents

Agent for providing security cloud service and security token device for security cloud service

Info

Publication number
TWI563411B
TWI563411B TW104115107A TW104115107A TWI563411B TW I563411 B TWI563411 B TW I563411B TW 104115107 A TW104115107 A TW 104115107A TW 104115107 A TW104115107 A TW 104115107A TW I563411 B TWI563411 B TW I563411B
Authority
TW
Taiwan
Prior art keywords
cloud service
security
agent
token device
security cloud
Prior art date
Application number
TW104115107A
Other languages
Chinese (zh)
Other versions
TW201608412A (en
Inventor
Jae Sik Choi
Won-Jang Son
Changhoon Kwon
Original Assignee
Saferzone Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Saferzone Co Ltd filed Critical Saferzone Co Ltd
Publication of TW201608412A publication Critical patent/TW201608412A/en
Application granted granted Critical
Publication of TWI563411B publication Critical patent/TWI563411B/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0877Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
TW104115107A 2014-08-19 2015-05-12 Agent for providing security cloud service and security token device for security cloud service TWI563411B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020140107544A KR101479290B1 (en) 2014-08-19 2014-08-19 Agent for providing security cloud service, security token device for security cloud service

Publications (2)

Publication Number Publication Date
TW201608412A TW201608412A (en) 2016-03-01
TWI563411B true TWI563411B (en) 2016-12-21

Family

ID=52587914

Family Applications (1)

Application Number Title Priority Date Filing Date
TW104115107A TWI563411B (en) 2014-08-19 2015-05-12 Agent for providing security cloud service and security token device for security cloud service

Country Status (7)

Country Link
JP (1) JP6172866B2 (en)
KR (1) KR101479290B1 (en)
AU (1) AU2015202697A1 (en)
BR (1) BR102015011937A2 (en)
CA (1) CA2891610C (en)
RU (1) RU2660604C2 (en)
TW (1) TWI563411B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20170001486A (en) 2015-06-26 2017-01-04 안희태 Security cloud service
KR101619286B1 (en) 2015-11-19 2016-05-10 (주)세이퍼존 Cross-platform based security system
KR101810165B1 (en) * 2016-01-15 2018-01-25 단국대학교 산학협력단 Electronic money terminal and method for providing elecronic money using the same
KR101834522B1 (en) * 2016-04-22 2018-03-06 단국대학교 산학협력단 Apparatus for confirming data and method for confirming data using the same
CN109873787B (en) * 2017-12-01 2022-09-23 北京安云世纪科技有限公司 Access authentication method, device and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5796824A (en) * 1992-03-16 1998-08-18 Fujitsu Limited Storage medium for preventing an irregular use by a third party
US20050129243A1 (en) * 2002-03-20 2005-06-16 Koninklijke Philips Electronics N.V. Encryption key hiding and recovering method and system
TW201304575A (en) * 2011-04-12 2013-01-16 Yahoo Inc SMS-initiated mobile registration
CN103488915A (en) * 2013-09-24 2014-01-01 无锡德思普科技有限公司 Double-secret-key-encryption resource encryption and decryption method with combination of software and hardware

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3119494B2 (en) * 1991-04-03 2000-12-18 日本電信電話株式会社 How to verify card ownership
DE19629856A1 (en) * 1996-07-24 1998-01-29 Ibm Method and system for the secure transmission and storage of protectable information
JPH10260903A (en) * 1997-03-19 1998-09-29 Hitachi Ltd Group ciphering method and file ciphering system
US7475241B2 (en) * 2002-11-22 2009-01-06 Cisco Technology, Inc. Methods and apparatus for dynamic session key generation and rekeying in mobile IP
JP4242682B2 (en) * 2003-03-26 2009-03-25 パナソニック株式会社 Memory device
US20130227286A1 (en) * 2006-04-25 2013-08-29 Andre Jacques Brisson Dynamic Identity Verification and Authentication, Dynamic Distributed Key Infrastructures, Dynamic Distributed Key Systems and Method for Identity Management, Authentication Servers, Data Security and Preventing Man-in-the-Middle Attacks, Side Channel Attacks, Botnet Attacks, and Credit Card and Financial Transaction Fraud, Mitigating Biometric False Positives and False Negatives, and Controlling Life of Accessible Data in the Cloud
JP2009015471A (en) * 2007-07-03 2009-01-22 Dainippon Printing Co Ltd Usb storage device
US20100318782A1 (en) * 2009-06-12 2010-12-16 Microsoft Corporation Secure and private backup storage and processing for trusted computing and data services
KR100988198B1 (en) * 2010-05-31 2010-10-18 주식회사 아이넵 Coding method
WO2013132462A1 (en) * 2012-03-08 2013-09-12 Oltio (Proprietary) Limited A method of authenticating a device and encrypting data transmitted between the device and a server

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5796824A (en) * 1992-03-16 1998-08-18 Fujitsu Limited Storage medium for preventing an irregular use by a third party
US20050129243A1 (en) * 2002-03-20 2005-06-16 Koninklijke Philips Electronics N.V. Encryption key hiding and recovering method and system
TW201304575A (en) * 2011-04-12 2013-01-16 Yahoo Inc SMS-initiated mobile registration
CN103488915A (en) * 2013-09-24 2014-01-01 无锡德思普科技有限公司 Double-secret-key-encryption resource encryption and decryption method with combination of software and hardware

Also Published As

Publication number Publication date
AU2015202697A1 (en) 2016-03-10
BR102015011937A2 (en) 2016-07-05
JP2016046799A (en) 2016-04-04
KR101479290B1 (en) 2015-01-05
RU2015120264A (en) 2016-12-20
RU2660604C2 (en) 2018-07-06
CA2891610C (en) 2018-08-28
JP6172866B2 (en) 2017-08-02
TW201608412A (en) 2016-03-01
CA2891610A1 (en) 2016-02-19

Similar Documents

Publication Publication Date Title
IL249875A0 (en) Aerosol-generating device and system
HK1250414A1 (en) Inspection system and inspection device
SG11201607031SA (en) Verification methods and verification devices
GB2533500B (en) Security device
LT3114884T (en) Cloud device identification and authentication
GB201413836D0 (en) Device security apparatus and methods
SG10201508121WA (en) Ride-share fare calculation device and method
GB201405246D0 (en) System and apparatus
PL3548660T3 (en) Dosing device and system
GB2534177B (en) Removable security device
GB2553136B (en) Device and system
HK1258768A1 (en) Security device
GB2541000B (en) Security Device
HK1224448A1 (en) Verification method and device
TWI563411B (en) Agent for providing security cloud service and security token device for security cloud service
GB201620264D0 (en) Dosind device and system
EP3341620C0 (en) Security device
PL3073405T3 (en) Method and device providing secure vendor service access
GB2557202B (en) Dosing device and system
GB201514427D0 (en) Security device
GB201704040D0 (en) Vehicle-mounted device and fault determination method
GB201406031D0 (en) An energy dispensing device and system
GB201612040D0 (en) Security device
GB201607946D0 (en) Security device
GB201522237D0 (en) Security device