WO2001097443A3 - Method and apparatus for enhancing network security protection server performance - Google Patents
Method and apparatus for enhancing network security protection server performance Download PDFInfo
- Publication number
- WO2001097443A3 WO2001097443A3 PCT/US2001/018878 US0118878W WO0197443A3 WO 2001097443 A3 WO2001097443 A3 WO 2001097443A3 US 0118878 W US0118878 W US 0118878W WO 0197443 A3 WO0197443 A3 WO 0197443A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- public key
- prime numbers
- efficiency
- network security
- establishing
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
- G06F7/723—Modular exponentiation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/166—Implementing security features at a particular protocol layer at the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
- G06F7/721—Modular inversion, reciprocal or quotient calculation
Abstract
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2001269794A AU2001269794A1 (en) | 2000-06-12 | 2001-06-12 | Method and apparatus for enhancing network security protection server performance |
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US21103100P | 2000-06-12 | 2000-06-12 | |
US21102300P | 2000-06-12 | 2000-06-12 | |
US60/211,023 | 2000-06-12 | ||
US60/211,031 | 2000-06-12 | ||
US09/877,302 US20020039420A1 (en) | 2000-06-12 | 2001-06-08 | Method and apparatus for batched network security protection server performance |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2001097443A2 WO2001097443A2 (en) | 2001-12-20 |
WO2001097443A3 true WO2001097443A3 (en) | 2003-05-08 |
Family
ID=27395582
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2001/018825 WO2001097442A2 (en) | 2000-06-12 | 2001-06-12 | Method and apparatus for batched network security protection server performance |
PCT/US2001/018878 WO2001097443A2 (en) | 2000-06-12 | 2001-06-12 | Method and apparatus for enhancing network security protection server performance |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2001/018825 WO2001097442A2 (en) | 2000-06-12 | 2001-06-12 | Method and apparatus for batched network security protection server performance |
Country Status (3)
Country | Link |
---|---|
US (1) | US20020039420A1 (en) |
AU (2) | AU2001268325A1 (en) |
WO (2) | WO2001097442A2 (en) |
Families Citing this family (44)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7509486B1 (en) * | 1999-07-08 | 2009-03-24 | Broadcom Corporation | Encryption processor for performing accelerated computations to establish secure network sessions connections |
US20020087884A1 (en) * | 2000-06-12 | 2002-07-04 | Hovav Shacham | Method and apparatus for enhancing network security protection server performance |
US7137143B2 (en) | 2000-08-07 | 2006-11-14 | Ingrian Systems Inc. | Method and system for caching secure web content |
US20040015725A1 (en) * | 2000-08-07 | 2004-01-22 | Dan Boneh | Client-side inspection and processing of secure content |
US7757278B2 (en) * | 2001-01-04 | 2010-07-13 | Safenet, Inc. | Method and apparatus for transparent encryption |
WO2004019182A2 (en) * | 2002-08-24 | 2004-03-04 | Ingrian Networks, Inc. | Selective feature activation |
US20060149962A1 (en) * | 2003-07-11 | 2006-07-06 | Ingrian Networks, Inc. | Network attached encryption |
US20080270494A1 (en) * | 2004-03-04 | 2008-10-30 | Koninklijke Philips Electronics N.V. | Method for the Exponentiation or Scalar Multiplication of Elements |
US7519835B2 (en) * | 2004-05-20 | 2009-04-14 | Safenet, Inc. | Encrypted table indexes and searching encrypted tables |
JP4162237B2 (en) * | 2004-06-24 | 2008-10-08 | インターナショナル・ビジネス・マシーンズ・コーポレーション | ENCRYPTED COMMUNICATION SYSTEM, ENCRYPTION DEVICE, DECRYPTION DEVICE, ENCRYPTION METHOD, DECRYPTION METHOD, ENCRYPTION PROGRAM, AND DECRYPTION PROGRAM |
US20070180228A1 (en) * | 2005-02-18 | 2007-08-02 | Ulf Mattsson | Dynamic loading of hardware security modules |
US20070038703A1 (en) * | 2005-07-14 | 2007-02-15 | Yahoo! Inc. | Content router gateway |
US7623515B2 (en) * | 2005-07-14 | 2009-11-24 | Yahoo! Inc. | Content router notification |
US20070016636A1 (en) * | 2005-07-14 | 2007-01-18 | Yahoo! Inc. | Methods and systems for data transfer and notification mechanisms |
US20070014307A1 (en) * | 2005-07-14 | 2007-01-18 | Yahoo! Inc. | Content router forwarding |
US7849199B2 (en) * | 2005-07-14 | 2010-12-07 | Yahoo ! Inc. | Content router |
US20070014277A1 (en) * | 2005-07-14 | 2007-01-18 | Yahoo! Inc. | Content router repository |
US7631045B2 (en) * | 2005-07-14 | 2009-12-08 | Yahoo! Inc. | Content router asynchronous exchange |
US20070079386A1 (en) * | 2005-09-26 | 2007-04-05 | Brian Metzger | Transparent encryption using secure encryption device |
US20070079140A1 (en) * | 2005-09-26 | 2007-04-05 | Brian Metzger | Data migration |
US7725927B2 (en) * | 2005-10-28 | 2010-05-25 | Yahoo! Inc. | Low code-footprint security solution |
US8024290B2 (en) | 2005-11-14 | 2011-09-20 | Yahoo! Inc. | Data synchronization and device handling |
US8065680B2 (en) * | 2005-11-15 | 2011-11-22 | Yahoo! Inc. | Data gateway for jobs management based on a persistent job table and a server table |
US9367832B2 (en) * | 2006-01-04 | 2016-06-14 | Yahoo! Inc. | Synchronizing image data among applications and devices |
US7848516B2 (en) * | 2006-01-20 | 2010-12-07 | Chiou-Haun Lee | Diffused symmetric encryption/decryption method with asymmetric keys |
US8386768B2 (en) * | 2006-02-08 | 2013-02-26 | Safenet, Inc. | High performance data encryption server and method for transparently encrypting/decrypting data |
US7958091B2 (en) | 2006-02-16 | 2011-06-07 | Ingrian Networks, Inc. | Method for fast bulk loading data into a database while bypassing exit routines |
US20080034008A1 (en) * | 2006-08-03 | 2008-02-07 | Yahoo! Inc. | User side database |
US8144875B2 (en) * | 2006-09-06 | 2012-03-27 | Paul McGough | Method and system for establishing real-time authenticated and secured communications channels in a public network |
US8379865B2 (en) * | 2006-10-27 | 2013-02-19 | Safenet, Inc. | Multikey support for multiple office system |
US8549122B2 (en) * | 2006-12-04 | 2013-10-01 | Oracle International Corporation | System and method for communication agent within a fully distributed network |
US20080270629A1 (en) * | 2007-04-27 | 2008-10-30 | Yahoo! Inc. | Data snychronization and device handling using sequence numbers |
US20100031321A1 (en) | 2007-06-11 | 2010-02-04 | Protegrity Corporation | Method and system for preventing impersonation of computer system user |
US20090132804A1 (en) * | 2007-11-21 | 2009-05-21 | Prabir Paul | Secured live software migration |
US7978854B2 (en) * | 2008-03-25 | 2011-07-12 | International Business Machines Corporation | Asymmetric key generation |
EP2222013A1 (en) * | 2009-02-19 | 2010-08-25 | Thomson Licensing | Method and device for countering fault attacks |
US8638926B2 (en) * | 2009-02-26 | 2014-01-28 | Red Hat, Inc. | Sharing a secret with modular inverses |
WO2014158183A1 (en) | 2013-03-29 | 2014-10-02 | Hewlett-Packard Development Company, L.P. | Batching tuples |
US9112907B2 (en) | 2013-05-31 | 2015-08-18 | International Business Machines Corporation | System and method for managing TLS connections among separate applications within a network of computing systems |
US9112908B2 (en) | 2013-05-31 | 2015-08-18 | International Business Machines Corporation | System and method for managing TLS connections among separate applications within a network of computing systems |
JP6262085B2 (en) * | 2014-06-25 | 2018-01-17 | ルネサスエレクトロニクス株式会社 | Data processing apparatus and decryption processing method |
FR3088452B1 (en) * | 2018-11-08 | 2023-01-06 | Idemia France | METHOD FOR VERIFYING THE INTEGRITY OF A PAIR OF CRYPTOGRAPHIC KEYS AND CRYPTOGRAPHIC DEVICE |
US11533603B2 (en) * | 2019-10-14 | 2022-12-20 | Qualcomm Incorporated | Power saving for pedestrian user equipments |
US11151071B1 (en) * | 2020-05-27 | 2021-10-19 | EMC IP Holding Company LLC | Host device with multi-path layer distribution of input-output operations across storage caches |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0946018A2 (en) * | 1998-03-26 | 1999-09-29 | Nippon Telegraph and Telephone Corporation | Scheme for fast realization of encryption, decryption and authentication |
Family Cites Families (51)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4386416A (en) * | 1980-06-02 | 1983-05-31 | Mostek Corporation | Data compression, encryption, and in-line transmission system |
US4964164A (en) * | 1989-08-07 | 1990-10-16 | Algorithmic Research, Ltd. | RSA computation method for efficient batch processing |
US5222133A (en) * | 1991-10-17 | 1993-06-22 | Wayne W. Chou | Method of protecting computer software from unauthorized execution using multiple keys |
JP3082554B2 (en) * | 1994-01-11 | 2000-08-28 | 株式会社日立製作所 | Self healing ring switch |
US5557712A (en) * | 1994-02-16 | 1996-09-17 | Apple Computer, Inc. | Color map tables smoothing in a color computer graphics system avoiding objectionable color shifts |
US5734744A (en) * | 1995-06-07 | 1998-03-31 | Pixar | Method and apparatus for compression and decompression of color data |
US5764235A (en) * | 1996-03-25 | 1998-06-09 | Insight Development Corporation | Computer implemented method and system for transmitting graphical images from server to client at user selectable resolution |
US5828832A (en) * | 1996-07-30 | 1998-10-27 | Itt Industries, Inc. | Mixed enclave operation in a computer network with multi-level network security |
JP3695045B2 (en) * | 1996-10-01 | 2005-09-14 | ソニー株式会社 | Encoder |
US6098096A (en) * | 1996-12-09 | 2000-08-01 | Sun Microsystems, Inc. | Method and apparatus for dynamic cache preloading across a network |
US5848159A (en) * | 1996-12-09 | 1998-12-08 | Tandem Computers, Incorporated | Public key cryptographic apparatus and method |
US5923756A (en) * | 1997-02-12 | 1999-07-13 | Gte Laboratories Incorporated | Method for providing secure remote command execution over an insecure computer network |
US6061448A (en) * | 1997-04-01 | 2000-05-09 | Tumbleweed Communications Corp. | Method and system for dynamic server document encryption |
US6012198A (en) * | 1997-04-11 | 2000-01-11 | Wagner Spray Tech Corporation | Painting apparatus |
US6105012A (en) * | 1997-04-22 | 2000-08-15 | Sun Microsystems, Inc. | Security system and method for financial institution server and client web browser |
US6397330B1 (en) * | 1997-06-30 | 2002-05-28 | Taher Elgamal | Cryptographic policy filters and policy control method and apparatus |
US6256712B1 (en) * | 1997-08-01 | 2001-07-03 | International Business Machines Corporation | Scaleable method for maintaining and making consistent updates to caches |
US6470386B1 (en) * | 1997-09-26 | 2002-10-22 | Worldcom, Inc. | Integrated proxy interface for web based telecommunications management tools |
US6621505B1 (en) * | 1997-09-30 | 2003-09-16 | Journee Software Corp. | Dynamic process-based enterprise computing system and method |
US6081598A (en) * | 1997-10-20 | 2000-06-27 | Microsoft Corporation | Cryptographic system and method with fast decryption |
US6202157B1 (en) * | 1997-12-08 | 2001-03-13 | Entrust Technologies Limited | Computer network security system and method having unilateral enforceable security policy provision |
US6154542A (en) * | 1997-12-17 | 2000-11-28 | Apple Computer, Inc. | Method and apparatus for simultaneously encrypting and compressing data |
US6233565B1 (en) * | 1998-02-13 | 2001-05-15 | Saranac Software, Inc. | Methods and apparatus for internet based financial transactions with evidence of payment |
US6073242A (en) * | 1998-03-19 | 2000-06-06 | Agorics, Inc. | Electronic authority server |
US6578061B1 (en) * | 1999-01-19 | 2003-06-10 | Nippon Telegraph And Telephone Corporation | Method and apparatus for data permutation/division and recording medium with data permutation/division program recorded thereon |
US6081900A (en) * | 1999-03-16 | 2000-06-27 | Novell, Inc. | Secure intranet access |
US6594279B1 (en) * | 1999-04-22 | 2003-07-15 | Nortel Networks Limited | Method and apparatus for transporting IP datagrams over synchronous optical networks at guaranteed quality of service |
US6886095B1 (en) * | 1999-05-21 | 2005-04-26 | International Business Machines Corporation | Method and apparatus for efficiently initializing secure communications among wireless devices |
US6477646B1 (en) * | 1999-07-08 | 2002-11-05 | Broadcom Corporation | Security chip architecture and implementations for cryptography acceleration |
US6757823B1 (en) * | 1999-07-27 | 2004-06-29 | Nortel Networks Limited | System and method for enabling secure connections for H.323 VoIP calls |
US6654354B1 (en) * | 1999-12-22 | 2003-11-25 | Worldcom, Inc. | System and method for planning multiple MUX levels in a fiber optic network simulation plan |
US6616350B1 (en) * | 1999-12-23 | 2003-09-09 | Nortel Networks Limited | Method and apparatus for providing a more efficient use of the total bandwidth capacity in a synchronous optical network |
US6587866B1 (en) * | 2000-01-10 | 2003-07-01 | Sun Microsystems, Inc. | Method for distributing packets to server nodes using network client affinity and packet distribution table |
US6763459B1 (en) * | 2000-01-14 | 2004-07-13 | Hewlett-Packard Company, L.P. | Lightweight public key infrastructure employing disposable certificates |
US20020087884A1 (en) * | 2000-06-12 | 2002-07-04 | Hovav Shacham | Method and apparatus for enhancing network security protection server performance |
US7177945B2 (en) * | 2000-08-04 | 2007-02-13 | Avaya Technology Corp. | Non-intrusive multiplexed transaction persistency in secure commerce environments |
US7137143B2 (en) * | 2000-08-07 | 2006-11-14 | Ingrian Systems Inc. | Method and system for caching secure web content |
US20040015725A1 (en) * | 2000-08-07 | 2004-01-22 | Dan Boneh | Client-side inspection and processing of secure content |
EP1327191B1 (en) * | 2000-09-22 | 2013-10-23 | Lumension Security, Inc. | Non-invasive automatic offsite patch fingerprinting and updating system and method |
US6963980B1 (en) * | 2000-11-16 | 2005-11-08 | Protegrity Corporation | Combined hardware and software based encryption of databases |
US20020066038A1 (en) * | 2000-11-29 | 2002-05-30 | Ulf Mattsson | Method and a system for preventing impersonation of a database user |
US7757278B2 (en) * | 2001-01-04 | 2010-07-13 | Safenet, Inc. | Method and apparatus for transparent encryption |
US20030065919A1 (en) * | 2001-04-18 | 2003-04-03 | Albert Roy David | Method and system for identifying a replay attack by an access device to a computer system |
US7853781B2 (en) * | 2001-07-06 | 2010-12-14 | Juniper Networks, Inc. | Load balancing secure sockets layer accelerator |
US20030097428A1 (en) * | 2001-10-26 | 2003-05-22 | Kambiz Afkhami | Internet server appliance platform with flexible integrated suite of server resources and content delivery capabilities supporting continuous data flow demands and bursty demands |
EP1315065B1 (en) * | 2001-11-23 | 2007-10-10 | Protegrity Research & Development | Method for intrusion detection in a database system |
US7269729B2 (en) * | 2001-12-28 | 2007-09-11 | International Business Machines Corporation | Relational database management encryption system |
US7742992B2 (en) * | 2002-02-05 | 2010-06-22 | Pace Anti-Piracy | Delivery of a secure software license for a software product and a toolset for creating the software product |
US6874089B2 (en) * | 2002-02-25 | 2005-03-29 | Network Resonance, Inc. | System, method and computer program product for guaranteeing electronic transactions |
US6694323B2 (en) * | 2002-04-25 | 2004-02-17 | Sybase, Inc. | System and methodology for providing compact B-Tree |
US6782000B2 (en) * | 2002-10-31 | 2004-08-24 | Ciena Corporation | Method, system and storage medium for providing a cross connect user interface |
-
2001
- 2001-06-08 US US09/877,302 patent/US20020039420A1/en not_active Abandoned
- 2001-06-12 AU AU2001268325A patent/AU2001268325A1/en not_active Abandoned
- 2001-06-12 WO PCT/US2001/018825 patent/WO2001097442A2/en active Application Filing
- 2001-06-12 AU AU2001269794A patent/AU2001269794A1/en not_active Abandoned
- 2001-06-12 WO PCT/US2001/018878 patent/WO2001097443A2/en active Application Filing
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0946018A2 (en) * | 1998-03-26 | 1999-09-29 | Nippon Telegraph and Telephone Corporation | Scheme for fast realization of encryption, decryption and authentication |
Non-Patent Citations (2)
Title |
---|
TAKAGI T: "FAST RSA-TYPE CRYPTOSYSTEM MODULO PKQ", ADVANCES IN CRYPTOLOGY. CRYPTO '98. 18TH ANNUAL INTERNATIONAL CRYPTOLOGY CONFERENCE. SANTA BARBARA, AUG. 23 - 27, 1998. PROCEEDINGS, LECTURE NOTES IN COMPUTER SCIENCE;VOL. 1462, BERLIN: SPRINGER, DE, 23 August 1998 (1998-08-23), pages 318 - 326, XP000792177, ISBN: 3-540-64892-5 * |
W. STALLINGS: "CRYPTOGRAPHY AND NETWORK SECURITY: PRINCIPLES AND PRACTICE", 1999, PRENTICE HALL, NEW JERSEY, XP002219172 * |
Also Published As
Publication number | Publication date |
---|---|
AU2001268325A1 (en) | 2001-12-24 |
WO2001097442A3 (en) | 2003-02-06 |
WO2001097443A2 (en) | 2001-12-20 |
US20020039420A1 (en) | 2002-04-04 |
WO2001097442A2 (en) | 2001-12-20 |
AU2001269794A1 (en) | 2001-12-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2001097443A3 (en) | Method and apparatus for enhancing network security protection server performance | |
EP0938209A3 (en) | Method and apparatus for conducting crypto-ignition processes between thin client devices and server devices over data networks | |
CA2278670A1 (en) | Encryption and decryption method and apparatus | |
EP1104959A3 (en) | A cryptographic protocol for secure communications | |
CA2335172A1 (en) | Secure mutual network authentication and key exchange protocol | |
TW363154B (en) | Token distribution, registration, and dynamic configuration of user entitlement for and application level security system and method | |
EP0858186A3 (en) | Method for secure communication in a telecommunication system | |
HK1072134A1 (en) | Method for secure data exchange between two devices | |
WO2004051964A3 (en) | Tunneled authentication protocol for preventing man-in-the-middle attacks | |
EP0807911A3 (en) | Client/server protocol for proving authenticity | |
AU1240499A (en) | Security of data connections | |
CA2241052A1 (en) | Application level security system and method | |
EP0720326A3 (en) | Method for secure session key generation | |
EP1223705A3 (en) | Methods and systems for generating encryption keys using random bit sequences | |
WO2000041357A8 (en) | Exchanging a secret over an unreliable network | |
CA2427699A1 (en) | A system and method of exploiting the security of a secure communication channel to secure a non-secure communication channel | |
CN101022455A (en) | Web communication encrypting method | |
CN113852460B (en) | Implementation method and system for enhancing working key security based on quantum key | |
EP1122930A3 (en) | Encryption key exchange protocol | |
WO2001084766A3 (en) | System and method for encryption using transparent keys | |
EP0982958A3 (en) | Method for protecting mobile anonymity | |
US20020146119A1 (en) | Two channel secure communication | |
Matsuura et al. | Modified aggressive mode of Internet key exchange resistant against denial-of-service attacks | |
MXPA05012234A (en) | Des algorithm-based encryption method. | |
CN212115340U (en) | Anti-quantum computation encryption device and anti-quantum computation encryption communication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US US US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase |
Ref country code: JP |