CN1127835C - 有线电话适配器与相连信令控制器之间的密钥管理 - Google Patents
有线电话适配器与相连信令控制器之间的密钥管理 Download PDFInfo
- Publication number
- CN1127835C CN1127835C CN00806089A CN00806089A CN1127835C CN 1127835 C CN1127835 C CN 1127835C CN 00806089 A CN00806089 A CN 00806089A CN 00806089 A CN00806089 A CN 00806089A CN 1127835 C CN1127835 C CN 1127835C
- Authority
- CN
- China
- Prior art keywords
- key
- server
- sub
- request
- endpoint
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
- 230000011664 signaling Effects 0.000 title claims description 30
- 238000000034 method Methods 0.000 claims abstract description 11
- 230000008878 coupling Effects 0.000 claims description 2
- 238000010168 coupling process Methods 0.000 claims description 2
- 238000005859 coupling reaction Methods 0.000 claims description 2
- 230000008901 benefit Effects 0.000 abstract description 4
- 230000008859 change Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000012856 packing Methods 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 235000014510 cooky Nutrition 0.000 description 1
- 238000005538 encapsulation Methods 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 238000007789 sealing Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1101—Session protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/10—Architectures or entities
- H04L65/102—Gateways
- H04L65/1043—Gateway controllers, e.g. media gateway control protocol [MGCP] controllers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1408—Protection against unauthorised use of memory or access to memory by using cryptography
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
- G06F2211/008—Public Key, Asymmetric Key, Asymmetric Encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2129—Authenticate client device independently of the user
Abstract
Description
Claims (4)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12877299P | 1999-04-09 | 1999-04-09 | |
US60/128,772 | 1999-04-09 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1346563A CN1346563A (zh) | 2002-04-24 |
CN1127835C true CN1127835C (zh) | 2003-11-12 |
Family
ID=22436900
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN00806089A Expired - Lifetime CN1127835C (zh) | 1999-04-09 | 2000-04-07 | 有线电话适配器与相连信令控制器之间的密钥管理 |
Country Status (9)
Country | Link |
---|---|
US (2) | US7568223B2 (zh) |
EP (2) | EP1169833B1 (zh) |
CN (1) | CN1127835C (zh) |
AT (1) | ATE313200T1 (zh) |
AU (2) | AU4213600A (zh) |
CA (2) | CA2370471A1 (zh) |
DE (1) | DE60024800T2 (zh) |
HK (1) | HK1045917B (zh) |
WO (2) | WO2000062507A1 (zh) |
Families Citing this family (59)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE60024800T2 (de) * | 1999-04-09 | 2006-07-06 | General Instrument Corporation | Schlüsselverwaltung zwischen kabeltelefonsystemadapter und signaleinrichtungkontrolle |
US20030021417A1 (en) * | 2000-10-20 | 2003-01-30 | Ognjen Vasic | Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data |
US6966003B1 (en) * | 2001-01-12 | 2005-11-15 | 3Com Corporation | System and method for switching security associations |
US8156223B2 (en) * | 2001-03-20 | 2012-04-10 | Microsoft Corporation | Distribution of binary executables and content from peer locations/machines |
US8555062B1 (en) * | 2001-03-26 | 2013-10-08 | Access Co., Ltd. | Protocol to prevent replay attacks on secured wireless transactions |
US7181620B1 (en) * | 2001-11-09 | 2007-02-20 | Cisco Technology, Inc. | Method and apparatus providing secure initialization of network devices using a cryptographic key distribution approach |
KR100415117B1 (ko) * | 2002-03-04 | 2004-01-13 | 삼성전자주식회사 | 인터넷프로토콜 전화시스템에서 인터넷프로토콜단말기들간의 다중통화 시 강제 착신장치 및 방법 |
US7565537B2 (en) * | 2002-06-10 | 2009-07-21 | Microsoft Corporation | Secure key exchange with mutual authentication |
FR2845226B1 (fr) * | 2002-10-01 | 2004-12-10 | France Telecom | Procede et installation de controle de l'identite de l'emetteur d'un appel telephonique sur un reseau internet et terminal de telephonie pour une telle installation |
JP4397675B2 (ja) * | 2003-11-12 | 2010-01-13 | 株式会社日立製作所 | 計算機システム |
JP4559794B2 (ja) * | 2004-06-24 | 2010-10-13 | 株式会社東芝 | マイクロプロセッサ |
US7748032B2 (en) * | 2004-09-30 | 2010-06-29 | Citrix Systems, Inc. | Method and apparatus for associating tickets in a ticket hierarchy |
US7711835B2 (en) | 2004-09-30 | 2010-05-04 | Citrix Systems, Inc. | Method and apparatus for reducing disclosure of proprietary data in a networked environment |
US8613048B2 (en) | 2004-09-30 | 2013-12-17 | Citrix Systems, Inc. | Method and apparatus for providing authorized remote access to application sessions |
US7464267B2 (en) * | 2004-11-01 | 2008-12-09 | Innomedia Pte Ltd. | System and method for secure transmission of RTP packets |
EP1843513A1 (en) * | 2005-01-24 | 2007-10-10 | Matsushita Electric Industrial Co., Ltd. | Signature generation device and signature verification device |
US7890634B2 (en) | 2005-03-18 | 2011-02-15 | Microsoft Corporation | Scalable session management |
US7650505B1 (en) * | 2005-06-17 | 2010-01-19 | Sun Microsystems, Inc. | Methods and apparatus for persistence of authentication and authorization for a multi-tenant internet hosted site using cookies |
US7545810B2 (en) * | 2005-07-01 | 2009-06-09 | Cisco Technology, Inc. | Approaches for switching transport protocol connection keys |
WO2007062392A2 (en) * | 2005-11-23 | 2007-05-31 | Riverain Medical Group, Llc | Computer-aided diagnosis using dual-energy subtraction images |
EP1955511B1 (en) * | 2005-11-30 | 2015-02-25 | Telecom Italia S.p.A. | Method and system for automated and secure provisioning of service access credentials for on-line services |
KR100652017B1 (ko) * | 2005-12-08 | 2006-12-01 | 한국전자통신연구원 | 물리보안공격에 대한 닥시스 케이블 모뎀의 보안 방법 |
US7706381B2 (en) * | 2006-01-10 | 2010-04-27 | Cisco Technology, Inc. | Approaches for switching transport protocol connection keys |
US8140851B1 (en) * | 2006-02-24 | 2012-03-20 | Cisco Technology, Inc. | Approaches for automatically switching message authentication keys |
US8732279B2 (en) * | 2006-08-18 | 2014-05-20 | Cisco Technology, Inc. | Secure network deployment |
US8533846B2 (en) | 2006-11-08 | 2013-09-10 | Citrix Systems, Inc. | Method and system for dynamically associating access rights with a resource |
CA2571891C (en) * | 2006-12-21 | 2015-11-24 | Bce Inc. | Device authentication and secure channel management for peer-to-peer initiated communications |
CN101790867A (zh) * | 2007-04-30 | 2010-07-28 | 惠普开发有限公司 | 分配节点配置信息的系统和方法 |
CA2699846C (en) | 2007-09-17 | 2016-07-05 | Telefonaktiebolaget L M Ericsson (Publ) | Method and arrangement for establishing a security key for protecting rrc/up traffic |
US8171483B2 (en) | 2007-10-20 | 2012-05-01 | Citrix Systems, Inc. | Method and system for communicating between isolation environments |
CN101286840B (zh) * | 2008-05-29 | 2014-07-30 | 西安西电捷通无线网络通信股份有限公司 | 一种利用公钥密码技术的密钥分配方法及其系统 |
US7877503B2 (en) * | 2008-07-02 | 2011-01-25 | Verizon Patent And Licensing Inc. | Method and system for an intercept chain of custody protocol |
US8776238B2 (en) * | 2008-07-16 | 2014-07-08 | International Business Machines Corporation | Verifying certificate use |
KR101255987B1 (ko) * | 2008-12-22 | 2013-04-17 | 한국전자통신연구원 | Dcas 시스템의 sm과 tp간의 페어링 방법, 이를 이용한 셋탑박스 및 인증장치 |
US20110013762A1 (en) * | 2009-07-18 | 2011-01-20 | Gregg Bieser | Notification apparatus & method |
WO2011039460A2 (fr) * | 2009-09-30 | 2011-04-07 | France Telecom | Procede et dispositifs de communications securisees dans un reseau de telecommunications |
US20110302416A1 (en) * | 2010-03-15 | 2011-12-08 | Bigband Networks Inc. | Method and system for secured communication in a non-ctms environment |
US8347080B2 (en) | 2010-05-10 | 2013-01-01 | Research In Motion Limited | System and method for multi-certificate and certificate authority strategy |
EP2387262B1 (en) * | 2010-05-10 | 2015-04-29 | BlackBerry Limited | System and method for multi-certificate and certificate authority strategy |
US8566596B2 (en) * | 2010-08-24 | 2013-10-22 | Cisco Technology, Inc. | Pre-association mechanism to provide detailed description of wireless services |
US8938619B2 (en) * | 2010-12-29 | 2015-01-20 | Adobe Systems Incorporated | System and method for decrypting content samples including distinct encryption chains |
US8843737B2 (en) * | 2011-07-24 | 2014-09-23 | Telefonaktiebolaget L M Ericsson (Publ) | Enhanced approach for transmission control protocol authentication option (TCP-AO) with key management protocols (KMPS) |
EP3300408B1 (en) | 2011-10-28 | 2022-03-16 | NEC Corporation | Secure method for mtc device triggering |
US9026784B2 (en) * | 2012-01-26 | 2015-05-05 | Mcafee, Inc. | System and method for innovative management of transport layer security session tickets in a network environment |
CN104704789B (zh) * | 2012-10-15 | 2018-06-22 | 诺基亚通信公司 | 网络认证 |
US9515996B1 (en) * | 2013-06-28 | 2016-12-06 | EMC IP Holding Company LLC | Distributed password-based authentication in a public key cryptography authentication system |
US9553982B2 (en) * | 2013-07-06 | 2017-01-24 | Newvoicemedia, Ltd. | System and methods for tamper proof interaction recording and timestamping |
JP6278651B2 (ja) * | 2013-09-27 | 2018-02-14 | キヤノン株式会社 | ネットワークシステム、管理サーバシステム、制御方法及びプログラム |
FR3018371B1 (fr) * | 2014-03-10 | 2016-05-06 | Commissariat Energie Atomique | Procede et systeme de chiffrement/dechiffrement de donnees a cle distante et verification prealable de jeton |
US20170163607A1 (en) * | 2015-12-03 | 2017-06-08 | Microsoft Technology Licensing, Llc | Establishing a Communication Event Using Secure Signalling |
US10009380B2 (en) | 2016-01-08 | 2018-06-26 | Secureworks Corp. | Systems and methods for security configuration |
US10263788B2 (en) * | 2016-01-08 | 2019-04-16 | Dell Products, Lp | Systems and methods for providing a man-in-the-middle proxy |
US20180123782A1 (en) * | 2016-10-27 | 2018-05-03 | Motorola Solutions, Inc. | Method for secret origination service to distribute a shared secret |
EP3501654B1 (en) | 2017-12-22 | 2021-08-25 | Tecan Trading Ag | Pipetting apparatus with a pipette tube and method for detecting a liquid within an intermediate section of pipette tube |
US10771269B2 (en) * | 2018-03-09 | 2020-09-08 | Cisco Technology, Inc. | Automated intelligent node for hybrid fiber-coaxial (HFC) networks |
US10630467B1 (en) | 2019-01-04 | 2020-04-21 | Blue Ridge Networks, Inc. | Methods and apparatus for quantum-resistant network communication |
US11063753B2 (en) * | 2019-03-20 | 2021-07-13 | Arris Enterprises Llc | Secure distribution of device key sets over a network |
US11743242B2 (en) * | 2020-07-27 | 2023-08-29 | Charter Communications Operating, Llc | Establishing an encrypted communications channel without prior knowledge of the encryption key |
CN112492004B (zh) * | 2020-11-17 | 2023-02-17 | 深圳市晨北科技有限公司 | 本地通信链接的建立方法及设备、系统及存储介质 |
Family Cites Families (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5235642A (en) | 1992-07-21 | 1993-08-10 | Digital Equipment Corporation | Access control subsystem and method for distributed computer system using locally cached authentication credentials |
WO1995008885A1 (en) * | 1993-09-20 | 1995-03-30 | International Business Machines Corporation | System and method for changing the key or password in a secure distributed communications network |
US5544322A (en) * | 1994-05-09 | 1996-08-06 | International Business Machines Corporation | System and method for policy-based inter-realm authentication within a distributed processing system |
IL113259A (en) * | 1995-04-05 | 2001-03-19 | Diversinet Corp | A device and method for a secure interface for secure communication and data transfer |
US5602918A (en) * | 1995-12-22 | 1997-02-11 | Virtual Open Network Environment Corp. | Application level security system and method |
SE506775C2 (sv) * | 1996-06-04 | 1998-02-09 | Ericsson Telefon Ab L M | Sätt och anordning för samtidig telefon- och Internetförbindelse på en telefonlinje |
US5796830A (en) * | 1996-07-29 | 1998-08-18 | International Business Machines Corporation | Interoperable cryptographic key recovery system |
US5864665A (en) * | 1996-08-20 | 1999-01-26 | International Business Machines Corporation | Auditing login activity in a distributed computing environment |
US5867495A (en) * | 1996-11-18 | 1999-02-02 | Mci Communications Corporations | System, method and article of manufacture for communications utilizing calling, plans in a hybrid network |
US5917817A (en) | 1996-12-06 | 1999-06-29 | International Business Machines Corporation | User invocation of services in public switched telephone network via parallel data networks |
US5923756A (en) * | 1997-02-12 | 1999-07-13 | Gte Laboratories Incorporated | Method for providing secure remote command execution over an insecure computer network |
TR199902599T2 (xx) | 1997-04-15 | 2001-02-21 | Mci Worldcom, Inc. | Anahtarlanm�� telefon ileti�imi i�in sistem/y�ntem/ara�. |
US5999612A (en) | 1997-05-27 | 1999-12-07 | International Business Machines Corporation | Integrated telephony and data services over cable networks |
DE60024800T2 (de) * | 1999-04-09 | 2006-07-06 | General Instrument Corporation | Schlüsselverwaltung zwischen kabeltelefonsystemadapter und signaleinrichtungkontrolle |
EP1320975B1 (en) * | 2000-09-22 | 2005-12-07 | General Instrument Corporation | Internet protocol telephony security architecture |
US20030163693A1 (en) * | 2002-02-28 | 2003-08-28 | General Instrument Corporation | Detection of duplicate client identities in a communication system |
-
2000
- 2000-04-07 DE DE60024800T patent/DE60024800T2/de not_active Expired - Lifetime
- 2000-04-07 AU AU42136/00A patent/AU4213600A/en not_active Abandoned
- 2000-04-07 WO PCT/US2000/009323 patent/WO2000062507A1/en active IP Right Grant
- 2000-04-07 CN CN00806089A patent/CN1127835C/zh not_active Expired - Lifetime
- 2000-04-07 AU AU40792/00A patent/AU4079200A/en not_active Abandoned
- 2000-04-07 EP EP00921875A patent/EP1169833B1/en not_active Expired - Lifetime
- 2000-04-07 CA CA002370471A patent/CA2370471A1/en not_active Abandoned
- 2000-04-07 CA CA2365856A patent/CA2365856C/en not_active Expired - Lifetime
- 2000-04-07 EP EP00920214A patent/EP1171989A2/en not_active Withdrawn
- 2000-04-07 AT AT00921875T patent/ATE313200T1/de not_active IP Right Cessation
- 2000-04-07 WO PCT/US2000/009318 patent/WO2000062519A2/en active Search and Examination
-
2002
- 2002-10-02 HK HK02107229.6A patent/HK1045917B/zh not_active IP Right Cessation
-
2004
- 2004-07-15 US US10/893,047 patent/US7568223B2/en not_active Expired - Lifetime
-
2009
- 2009-06-23 US US12/490,124 patent/US8544077B2/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
EP1169833B1 (en) | 2005-12-14 |
AU4213600A (en) | 2000-11-14 |
DE60024800D1 (de) | 2006-01-19 |
CA2365856A1 (en) | 2000-10-19 |
DE60024800T2 (de) | 2006-07-06 |
ATE313200T1 (de) | 2005-12-15 |
HK1045917B (zh) | 2004-09-10 |
EP1171989A2 (en) | 2002-01-16 |
WO2000062507A1 (en) | 2000-10-19 |
WO2000062519A3 (en) | 2001-02-08 |
US20090323954A1 (en) | 2009-12-31 |
CA2370471A1 (en) | 2000-10-19 |
US20050027985A1 (en) | 2005-02-03 |
CN1346563A (zh) | 2002-04-24 |
US8544077B2 (en) | 2013-09-24 |
WO2000062519A9 (en) | 2002-02-21 |
WO2000062519A2 (en) | 2000-10-19 |
HK1045917A1 (en) | 2002-12-13 |
CA2365856C (en) | 2011-11-01 |
EP1169833A1 (en) | 2002-01-09 |
US7568223B2 (en) | 2009-07-28 |
AU4079200A (en) | 2000-11-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1127835C (zh) | 有线电话适配器与相连信令控制器之间的密钥管理 | |
US6038322A (en) | Group key distribution | |
US8086847B2 (en) | Computer program product and computer system for peer-to-peer communications | |
US8327129B2 (en) | Method, apparatus and system for internet key exchange negotiation | |
EP2335391B1 (en) | Key management in a communication network | |
US20080307110A1 (en) | Conditional BGP advertising for dynamic group VPN (DGVPN) clients | |
US20090210699A1 (en) | Method and apparatus for secure network enclaves | |
EP1374533B1 (en) | Facilitating legal interception of ip connections | |
CN101651539A (zh) | 更新及分配加密密钥 | |
CN109981584B (zh) | 一种基于区块链的分布式社交方法 | |
EP1384370B1 (en) | Method and system for authenticating a personal security device vis-a-vis at least one remote computer system | |
EP1493243B1 (en) | Secure file transfer | |
CN112332986B (zh) | 一种基于权限控制的私有加密通信方法及系统 | |
Kim et al. | Cryptanalysis and improvement of password authenticated key exchange scheme between clients with different passwords | |
CN107635227A (zh) | 一种群组消息加密方法及装置 | |
US20020199102A1 (en) | Method and apparatus for establishing a shared cryptographic key between energy-limited nodes in a network | |
CN107493294B (zh) | 一种基于非对称加密算法的ocf设备的安全接入与管理控制方法 | |
CN113572788A (zh) | BACnet/IP协议设备认证安全方法 | |
CN100571133C (zh) | 媒体流安全传输的实现方法 | |
US8793494B2 (en) | Method and apparatus for recovering sessions | |
EP1623527A1 (en) | A process for secure communication over a wireless network, related network and computer program product | |
JP2001177514A (ja) | 通信方法および通信装置 | |
CN100499649C (zh) | 一种实现安全联盟备份和切换的方法 | |
US6975729B1 (en) | Method and apparatus for facilitating use of a pre-shared secret key with identity hiding | |
CN111310210B (zh) | 基于口令和匿签密的双重认证对称可搜索加密方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C06 | Publication | ||
PB01 | Publication | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
ASS | Succession or assignment of patent right |
Owner name: GENERAL MATERIAL HOLDING CO., LTD. Free format text: FORMER OWNER: GENERAL INSTRUMENT CORP. Effective date: 20130918 Owner name: MOTOROLA MOBILITY LLC Free format text: FORMER OWNER: GENERAL MATERIAL HOLDING CO., LTD. Effective date: 20130918 |
|
C41 | Transfer of patent application or patent right or utility model | ||
TR01 | Transfer of patent right |
Effective date of registration: 20130918 Address after: Illinois State Patentee after: MOTOROLA MOBILITY LLC Address before: California, USA Patentee before: General Equipment Holdings Ltd. Effective date of registration: 20130918 Address after: California, USA Patentee after: General Equipment Holdings Ltd. Address before: American Pennsylvania Patentee before: General Instrument Corp. |
|
CX01 | Expiry of patent term | ||
CX01 | Expiry of patent term |
Granted publication date: 20031112 |