CA2054582A1 - Non-repudiation in computer networks - Google Patents

Non-repudiation in computer networks

Info

Publication number
CA2054582A1
CA2054582A1 CA2054582A CA2054582A CA2054582A1 CA 2054582 A1 CA2054582 A1 CA 2054582A1 CA 2054582 A CA2054582 A CA 2054582A CA 2054582 A CA2054582 A CA 2054582A CA 2054582 A1 CA2054582 A1 CA 2054582A1
Authority
CA
Canada
Prior art keywords
message
repudiation
nrv
data processor
sent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA2054582A
Other languages
French (fr)
Other versions
CA2054582C (en
Inventor
Christopher James George Holloway
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
Christopher James George Holloway
International Business Machines Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Christopher James George Holloway, International Business Machines Corporation filed Critical Christopher James George Holloway
Publication of CA2054582A1 publication Critical patent/CA2054582A1/en
Application granted granted Critical
Publication of CA2054582C publication Critical patent/CA2054582C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1016Devices or methods for securing the PIN and other transaction-data, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Abstract

The invention supplements the use of a conventional authentication token such as a MAC or DSG, to provide very strong evidence of the origin of an electronic message. A
new type of authentication token, known as the Non-Repudiation Vector (NRV) is attached to each message sent across a data network. The NRV cryptographically links each message sent or received by a particular data processor on the network to previous and subsequent messages handled by that data processor, to create a chain of cryptographically linked messages. The burden of proof for the repudiation of a message is transferred to the sender of a message, who must demonstrate how the sending data processor could have moved through the time period during which the disputed message was sent, without generating the NRV corresponding to the disputed message.
CA002054582A 1990-11-09 1991-10-31 Non-repudiation in computer networks Expired - Fee Related CA2054582C (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP90312300.8 1990-11-09
EP90312300A EP0484603B1 (en) 1990-11-09 1990-11-09 Non-repudiation in computer networks

Publications (2)

Publication Number Publication Date
CA2054582A1 true CA2054582A1 (en) 1992-05-10
CA2054582C CA2054582C (en) 1998-05-05

Family

ID=8205607

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002054582A Expired - Fee Related CA2054582C (en) 1990-11-09 1991-10-31 Non-repudiation in computer networks

Country Status (5)

Country Link
US (1) US5226079A (en)
EP (1) EP0484603B1 (en)
JP (1) JPH07123256B2 (en)
CA (1) CA2054582C (en)
DE (1) DE69022424T2 (en)

Families Citing this family (43)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU675816B2 (en) * 1992-12-14 1997-02-20 Commonwealth Of Australia, The Message document security
JPH07177142A (en) * 1993-10-27 1995-07-14 Hitachi Ltd Message guarantee system
US5799087A (en) * 1994-04-28 1998-08-25 Citibank, N.A. Electronic-monetary system
US5544322A (en) * 1994-05-09 1996-08-06 International Business Machines Corporation System and method for policy-based inter-realm authentication within a distributed processing system
US5706349A (en) * 1995-03-06 1998-01-06 International Business Machines Corporation Authenticating remote users in a distributed environment
US5774670A (en) * 1995-10-06 1998-06-30 Netscape Communications Corporation Persistent client state in a hypertext transfer protocol based client-server system
US5757916A (en) * 1995-10-06 1998-05-26 International Series Research, Inc. Method and apparatus for authenticating the location of remote users of networked computing systems
JPH09252323A (en) * 1996-01-11 1997-09-22 Sony Corp Communication system and communication equipment
US5768526A (en) * 1996-03-08 1998-06-16 Glenayre Electronics, Inc. Method and apparatus for validating data packets in a paging system
EP0795844A1 (en) * 1996-03-11 1997-09-17 Koninklijke KPN N.V. Method of securely modifying data on a smart card
US5790669A (en) * 1996-07-01 1998-08-04 Sun Microsystems, Inc. Lightweight non-repudiation system and method
US5784463A (en) * 1996-12-04 1998-07-21 V-One Corporation Token distribution, registration, and dynamic configuration of user entitlement for an application level security system and method
US6122631A (en) * 1997-03-28 2000-09-19 International Business Machines Corporation Dynamic server-managed access control for a distributed file system
US6330608B1 (en) 1997-03-31 2001-12-11 Stiles Inventions L.L.C. Method and system of a computer system for establishing communications between a service provider and a central service factory and registry in a computer system
US7225463B2 (en) 1997-10-24 2007-05-29 Dusenbury Jr Richard G Secure network architecture method and apparatus
US6189101B1 (en) 1997-10-24 2001-02-13 Richard G. Dusenbury, Jr. Secure network architecture method and apparatus
US6681315B1 (en) 1997-11-26 2004-01-20 International Business Machines Corporation Method and apparatus for bit vector array
RU2153191C2 (en) * 1998-09-29 2000-07-20 Закрытое акционерное общество "Алкорсофт" Method for blind production of digital rsa signature and device which implements said method
RU2157001C2 (en) 1998-11-25 2000-09-27 Закрытое акционерное общество "Алкорсофт" Method for conducting transactions
US6401110B1 (en) * 1998-11-30 2002-06-04 International Business Machines Corporation Method for managing concurrent processes using dual locking
AU5935400A (en) * 1999-07-14 2001-01-30 Recourse Technologies, Inc. System and method for protecting a computer network against denial of service attacks
EP1094424A3 (en) * 1999-10-22 2004-06-16 Hitachi, Ltd. Digital signing method
US7134021B2 (en) * 1999-10-22 2006-11-07 Hitachi, Ltd. Method and system for recovering the validity of cryptographically signed digital data
US6968364B1 (en) * 2000-03-30 2005-11-22 Microsoft Corporation System and method to facilitate selection and programming of an associated audio/visual system
US20020083010A1 (en) * 2000-12-11 2002-06-27 Namsuk Kim Electronic identification system
US7051093B1 (en) * 2001-01-24 2006-05-23 Lockheed Martin Corporation QNX operation system network auto configuration
US20030190046A1 (en) * 2002-04-05 2003-10-09 Kamerman Matthew Albert Three party signing protocol providing non-linkability
US7356516B2 (en) * 2002-06-13 2008-04-08 Visa U.S.A. Inc. Method and system for facilitating electronic dispute resolution
US20030236992A1 (en) * 2002-06-19 2003-12-25 Sameer Yami Method and system for providing secure logging for intrusion detection
US8190893B2 (en) * 2003-10-27 2012-05-29 Jp Morgan Chase Bank Portable security transaction protocol
US9021529B2 (en) 2004-07-15 2015-04-28 Microsoft Technology Licensing, Llc Content recordation techniques
US8180834B2 (en) 2004-10-07 2012-05-15 Computer Associates Think, Inc. System, method, and computer program product for filtering messages and training a classification module
EP1650923B1 (en) * 2004-10-22 2011-05-18 Software AG Authentication method and devices
JP2009506405A (en) * 2005-08-09 2009-02-12 ネクサン テクノロジーズ カナダ インコーポレイテッド Data archiving system
US9258125B2 (en) 2005-10-06 2016-02-09 International Business Machines Corporation Generating evidence of web services transactions
US8171293B2 (en) 2005-12-30 2012-05-01 Apple Inc. Receiver non-repudiation via a secure device
US8458477B2 (en) 2008-12-01 2013-06-04 Novell, Inc. Communication with non-repudiation
US8806214B2 (en) 2008-12-01 2014-08-12 Novell, Inc. Communication with non-repudiation and blind signatures
US8886166B2 (en) * 2012-06-04 2014-11-11 Avago Technologies General Ip (Singapore) Pte. Ltd. System to identify whether a text message is from a trusted source
US9391968B2 (en) 2013-09-24 2016-07-12 At&T Intellectual Property I, L.P. Scored factor-based authentication
US10037329B2 (en) * 2015-11-18 2018-07-31 American Express Travel Related Services Company, Inc. System and method for automatically capturing and recording lineage data for big data records
US11146402B2 (en) 2017-11-17 2021-10-12 Monkton, Inc. Non-repudiation method and system
RU2697953C2 (en) 2018-02-06 2019-08-21 Акционерное общество "Лаборатория Касперского" System and method of deciding on data compromising

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4264782A (en) * 1979-06-29 1981-04-28 International Business Machines Corporation Method and apparatus for transaction and identity verification
US4326098A (en) * 1980-07-02 1982-04-20 International Business Machines Corporation High security system for electronic signature verification
US4393269A (en) * 1981-01-29 1983-07-12 International Business Machines Corporation Method and apparatus incorporating a one-way sequence for transaction and identity verification
EP0246823A3 (en) * 1986-05-22 1989-10-04 Racal-Guardata Limited Data communication systems and methods
US4926478A (en) * 1988-12-30 1990-05-15 Gruenberg Elliot Method and apparatus for continuously acknowledged link encrypting
US4918728A (en) * 1989-08-30 1990-04-17 International Business Machines Corporation Data cryptography operations using control vectors

Also Published As

Publication number Publication date
US5226079A (en) 1993-07-06
EP0484603B1 (en) 1995-09-13
DE69022424D1 (en) 1995-10-19
JPH04227154A (en) 1992-08-17
CA2054582C (en) 1998-05-05
JPH07123256B2 (en) 1995-12-25
EP0484603A1 (en) 1992-05-13
DE69022424T2 (en) 1996-03-28

Similar Documents

Publication Publication Date Title
CA2054582A1 (en) Non-repudiation in computer networks
US7496686B2 (en) Localizing a remote event timestamp from a network device with an independent clock method and apparatus
NO951184L (en) Method and apparatus for delivering messages
MXPA02004608A (en) Sip-based feature control.
IL155108A0 (en) A telecommunication systems, for example an ip telecommunication system, and equipment units for use in the system
TW348348B (en) Method and apparatus for source rate pacing in an ATM network
GB2316588A (en) Rules based electronic message management system
HK1039189A1 (en) Bi-directional process-to-process byte stream protocol
AU2001280051A1 (en) Interface for intelligent network services
WO1998052323A1 (en) Packet transmitter
ES2009055A6 (en) Fast packetized data delivery for digital networks.
HK1016375A1 (en) Decryption of retransmitted date in an encrypted communication system
AU2003264906A1 (en) System and method for guaranteeing software integrity
TW364242B (en) Wireless message delivery system
EP0719007A3 (en) Small size product cipher apparatus
CA2097958A1 (en) Voice Message Recovery System and Method
GB2257603B (en) SDH data transmission timing
CA2249810A1 (en) Pseudo-random number generating method and apparatus therefor
WO2003028289A3 (en) Method for transmitting real time data messages in a cyclic communications system
SE0300973D0 (en) Improvements in or relating to compression of messages in telecommunication services
CA2154507A1 (en) Data Processing System
EP0952708A3 (en) Token passing network system
GR3017635T3 (en) Adjustable-parameter coding method for a field of movement in a sequence of moving images.
CA2327895A1 (en) Method and system for generating messages including a verifiable assertion that a variable is within predetermined limits
WO2000052551A3 (en) Method and apparatus for communicating graphics data between a source and a recipient over a network

Legal Events

Date Code Title Description
EEER Examination request
MKLA Lapsed