CA2054582A1 - Non-repudiation in computer networks - Google Patents
Non-repudiation in computer networksInfo
- Publication number
- CA2054582A1 CA2054582A1 CA2054582A CA2054582A CA2054582A1 CA 2054582 A1 CA2054582 A1 CA 2054582A1 CA 2054582 A CA2054582 A CA 2054582A CA 2054582 A CA2054582 A CA 2054582A CA 2054582 A1 CA2054582 A1 CA 2054582A1
- Authority
- CA
- Canada
- Prior art keywords
- message
- repudiation
- nrv
- data processor
- sent
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1016—Devices or methods for securing the PIN and other transaction-data, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Abstract
The invention supplements the use of a conventional authentication token such as a MAC or DSG, to provide very strong evidence of the origin of an electronic message. A
new type of authentication token, known as the Non-Repudiation Vector (NRV) is attached to each message sent across a data network. The NRV cryptographically links each message sent or received by a particular data processor on the network to previous and subsequent messages handled by that data processor, to create a chain of cryptographically linked messages. The burden of proof for the repudiation of a message is transferred to the sender of a message, who must demonstrate how the sending data processor could have moved through the time period during which the disputed message was sent, without generating the NRV corresponding to the disputed message.
new type of authentication token, known as the Non-Repudiation Vector (NRV) is attached to each message sent across a data network. The NRV cryptographically links each message sent or received by a particular data processor on the network to previous and subsequent messages handled by that data processor, to create a chain of cryptographically linked messages. The burden of proof for the repudiation of a message is transferred to the sender of a message, who must demonstrate how the sending data processor could have moved through the time period during which the disputed message was sent, without generating the NRV corresponding to the disputed message.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP90312300A EP0484603B1 (en) | 1990-11-09 | 1990-11-09 | Non-repudiation in computer networks |
EP90312300.8 | 1990-11-09 |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2054582A1 true CA2054582A1 (en) | 1992-05-10 |
CA2054582C CA2054582C (en) | 1998-05-05 |
Family
ID=8205607
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002054582A Expired - Fee Related CA2054582C (en) | 1990-11-09 | 1991-10-31 | Non-repudiation in computer networks |
Country Status (5)
Country | Link |
---|---|
US (1) | US5226079A (en) |
EP (1) | EP0484603B1 (en) |
JP (1) | JPH07123256B2 (en) |
CA (1) | CA2054582C (en) |
DE (1) | DE69022424T2 (en) |
Families Citing this family (43)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2151738C (en) * | 1992-12-14 | 2003-01-21 | Mark Stephen Anderson | Message document security |
JPH07177142A (en) * | 1993-10-27 | 1995-07-14 | Hitachi Ltd | Message guarantee system |
US5799087A (en) * | 1994-04-28 | 1998-08-25 | Citibank, N.A. | Electronic-monetary system |
US5544322A (en) * | 1994-05-09 | 1996-08-06 | International Business Machines Corporation | System and method for policy-based inter-realm authentication within a distributed processing system |
US5706349A (en) * | 1995-03-06 | 1998-01-06 | International Business Machines Corporation | Authenticating remote users in a distributed environment |
US5757916A (en) * | 1995-10-06 | 1998-05-26 | International Series Research, Inc. | Method and apparatus for authenticating the location of remote users of networked computing systems |
US5774670A (en) | 1995-10-06 | 1998-06-30 | Netscape Communications Corporation | Persistent client state in a hypertext transfer protocol based client-server system |
JPH09252323A (en) * | 1996-01-11 | 1997-09-22 | Sony Corp | Communication system and communication equipment |
US5768526A (en) * | 1996-03-08 | 1998-06-16 | Glenayre Electronics, Inc. | Method and apparatus for validating data packets in a paging system |
EP0795844A1 (en) * | 1996-03-11 | 1997-09-17 | Koninklijke KPN N.V. | Method of securely modifying data on a smart card |
US5790669A (en) * | 1996-07-01 | 1998-08-04 | Sun Microsystems, Inc. | Lightweight non-repudiation system and method |
US5784463A (en) * | 1996-12-04 | 1998-07-21 | V-One Corporation | Token distribution, registration, and dynamic configuration of user entitlement for an application level security system and method |
US6122631A (en) * | 1997-03-28 | 2000-09-19 | International Business Machines Corporation | Dynamic server-managed access control for a distributed file system |
US6330608B1 (en) | 1997-03-31 | 2001-12-11 | Stiles Inventions L.L.C. | Method and system of a computer system for establishing communications between a service provider and a central service factory and registry in a computer system |
US6189101B1 (en) | 1997-10-24 | 2001-02-13 | Richard G. Dusenbury, Jr. | Secure network architecture method and apparatus |
US7225463B2 (en) | 1997-10-24 | 2007-05-29 | Dusenbury Jr Richard G | Secure network architecture method and apparatus |
US6681315B1 (en) | 1997-11-26 | 2004-01-20 | International Business Machines Corporation | Method and apparatus for bit vector array |
RU2153191C2 (en) * | 1998-09-29 | 2000-07-20 | Закрытое акционерное общество "Алкорсофт" | Method for blind production of digital rsa signature and device which implements said method |
RU2157001C2 (en) | 1998-11-25 | 2000-09-27 | Закрытое акционерное общество "Алкорсофт" | Method for conducting transactions |
US6401110B1 (en) * | 1998-11-30 | 2002-06-04 | International Business Machines Corporation | Method for managing concurrent processes using dual locking |
AU6107600A (en) * | 1999-07-14 | 2001-01-30 | Recourse Technologies, Inc. | System and method for computer security |
EP1094424A3 (en) * | 1999-10-22 | 2004-06-16 | Hitachi, Ltd. | Digital signing method |
US7134021B2 (en) * | 1999-10-22 | 2006-11-07 | Hitachi, Ltd. | Method and system for recovering the validity of cryptographically signed digital data |
US6968364B1 (en) * | 2000-03-30 | 2005-11-22 | Microsoft Corporation | System and method to facilitate selection and programming of an associated audio/visual system |
US20020083010A1 (en) * | 2000-12-11 | 2002-06-27 | Namsuk Kim | Electronic identification system |
US7051093B1 (en) * | 2001-01-24 | 2006-05-23 | Lockheed Martin Corporation | QNX operation system network auto configuration |
US20030190046A1 (en) * | 2002-04-05 | 2003-10-09 | Kamerman Matthew Albert | Three party signing protocol providing non-linkability |
US7356516B2 (en) | 2002-06-13 | 2008-04-08 | Visa U.S.A. Inc. | Method and system for facilitating electronic dispute resolution |
US20030236992A1 (en) * | 2002-06-19 | 2003-12-25 | Sameer Yami | Method and system for providing secure logging for intrusion detection |
US8190893B2 (en) | 2003-10-27 | 2012-05-29 | Jp Morgan Chase Bank | Portable security transaction protocol |
US9021529B2 (en) | 2004-07-15 | 2015-04-28 | Microsoft Technology Licensing, Llc | Content recordation techniques |
US8180834B2 (en) | 2004-10-07 | 2012-05-15 | Computer Associates Think, Inc. | System, method, and computer program product for filtering messages and training a classification module |
EP1650923B1 (en) * | 2004-10-22 | 2011-05-18 | Software AG | Authentication method and devices |
CA2618135C (en) * | 2005-08-09 | 2014-10-28 | Nexsan Technologies Canada Inc. | Data archiving system |
US9258125B2 (en) | 2005-10-06 | 2016-02-09 | International Business Machines Corporation | Generating evidence of web services transactions |
US8171293B2 (en) | 2005-12-30 | 2012-05-01 | Apple Inc. | Receiver non-repudiation via a secure device |
US8806214B2 (en) | 2008-12-01 | 2014-08-12 | Novell, Inc. | Communication with non-repudiation and blind signatures |
US8458477B2 (en) | 2008-12-01 | 2013-06-04 | Novell, Inc. | Communication with non-repudiation |
US8886166B2 (en) * | 2012-06-04 | 2014-11-11 | Avago Technologies General Ip (Singapore) Pte. Ltd. | System to identify whether a text message is from a trusted source |
US9391968B2 (en) | 2013-09-24 | 2016-07-12 | At&T Intellectual Property I, L.P. | Scored factor-based authentication |
US10037329B2 (en) * | 2015-11-18 | 2018-07-31 | American Express Travel Related Services Company, Inc. | System and method for automatically capturing and recording lineage data for big data records |
WO2019099818A1 (en) | 2017-11-17 | 2019-05-23 | Monkton, Inc. | Non-repudiation method and system |
RU2697953C2 (en) | 2018-02-06 | 2019-08-21 | Акционерное общество "Лаборатория Касперского" | System and method of deciding on data compromising |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4264782A (en) * | 1979-06-29 | 1981-04-28 | International Business Machines Corporation | Method and apparatus for transaction and identity verification |
US4326098A (en) * | 1980-07-02 | 1982-04-20 | International Business Machines Corporation | High security system for electronic signature verification |
US4393269A (en) * | 1981-01-29 | 1983-07-12 | International Business Machines Corporation | Method and apparatus incorporating a one-way sequence for transaction and identity verification |
EP0246823A3 (en) * | 1986-05-22 | 1989-10-04 | Racal-Guardata Limited | Data communication systems and methods |
US4926478A (en) * | 1988-12-30 | 1990-05-15 | Gruenberg Elliot | Method and apparatus for continuously acknowledged link encrypting |
US4918728A (en) * | 1989-08-30 | 1990-04-17 | International Business Machines Corporation | Data cryptography operations using control vectors |
-
1990
- 1990-11-09 EP EP90312300A patent/EP0484603B1/en not_active Expired - Lifetime
- 1990-11-09 DE DE69022424T patent/DE69022424T2/en not_active Expired - Fee Related
-
1991
- 1991-08-12 JP JP3226604A patent/JPH07123256B2/en not_active Expired - Lifetime
- 1991-10-16 US US07/777,848 patent/US5226079A/en not_active Expired - Lifetime
- 1991-10-31 CA CA002054582A patent/CA2054582C/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
DE69022424D1 (en) | 1995-10-19 |
JPH04227154A (en) | 1992-08-17 |
CA2054582C (en) | 1998-05-05 |
US5226079A (en) | 1993-07-06 |
EP0484603B1 (en) | 1995-09-13 |
JPH07123256B2 (en) | 1995-12-25 |
DE69022424T2 (en) | 1996-03-28 |
EP0484603A1 (en) | 1992-05-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2054582A1 (en) | Non-repudiation in computer networks | |
US7496686B2 (en) | Localizing a remote event timestamp from a network device with an independent clock method and apparatus | |
NO951184L (en) | Method and apparatus for delivering messages | |
MXPA02004608A (en) | Sip-based feature control. | |
IL155108A0 (en) | A telecommunication systems, for example an ip telecommunication system, and equipment units for use in the system | |
TW348348B (en) | Method and apparatus for source rate pacing in an ATM network | |
CA2220491A1 (en) | Rules based electronic message management system | |
HK1039189A1 (en) | Bi-directional process-to-process byte stream protocol | |
AU2001280051A1 (en) | Interface for intelligent network services | |
WO2000041357A8 (en) | Exchanging a secret over an unreliable network | |
WO1998052323A1 (en) | Packet transmitter | |
ES2009055A6 (en) | Fast packetized data delivery for digital networks. | |
HK1016375A1 (en) | Decryption of retransmitted date in an encrypted communication system | |
AU2003264906A1 (en) | System and method for guaranteeing software integrity | |
TW364242B (en) | Wireless message delivery system | |
EP0719007A3 (en) | Small size product cipher apparatus | |
AU1953592A (en) | Sdh data transmission timing | |
CA2249810A1 (en) | Pseudo-random number generating method and apparatus therefor | |
SE0300973D0 (en) | Improvements in or relating to compression of messages in telecommunication services | |
CA2154507A1 (en) | Data Processing System | |
EP0952708A3 (en) | Token passing network system | |
GR3017635T3 (en) | Adjustable-parameter coding method for a field of movement in a sequence of moving images. | |
KR960008427B1 (en) | Multi-terminal connecting apparatus of pbx | |
HK1018142A1 (en) | Distributed real-time communications system | |
JPS6423276A (en) | Enciphering system for digital data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKLA | Lapsed |