CA2315212A1 - System and method for authenticating peer components - Google Patents

System and method for authenticating peer components Download PDF

Info

Publication number
CA2315212A1
CA2315212A1 CA002315212A CA2315212A CA2315212A1 CA 2315212 A1 CA2315212 A1 CA 2315212A1 CA 002315212 A CA002315212 A CA 002315212A CA 2315212 A CA2315212 A CA 2315212A CA 2315212 A1 CA2315212 A1 CA 2315212A1
Authority
CA
Canada
Prior art keywords
peer
data object
data
data objects
objects
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA002315212A
Other languages
French (fr)
Other versions
CA2315212C (en
Inventor
Greg Benson
Martin Franklin
Christopher L. Knauft
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Rovi Corp
Original Assignee
Mediadna, Inc.
Greg Benson
Martin Franklin
Christopher L. Knauft
Macrovision Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=22103256&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=CA2315212(A1) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Mediadna, Inc., Greg Benson, Martin Franklin, Christopher L. Knauft, Macrovision Corporation filed Critical Mediadna, Inc.
Publication of CA2315212A1 publication Critical patent/CA2315212A1/en
Application granted granted Critical
Publication of CA2315212C publication Critical patent/CA2315212C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/565Static detection by checking file integrity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2115Third party

Abstract

A system and method for controlling the usage of data objects in component object systems. According to the invention, each data object (112) includes a peer list that defines one or more peer data objects (118) that are required by the data object (112). Upon receipt of a data object (112), the system verifies the integrity of the data object (112). Further, the system identifies the integrity of the peer data objects (118). If the system cannot find the peer data objects (118), or the system cannot authenticate the peer data objects (118), the system may optionally retrieve a peer data object that can be authenticated from a data object depository. In addition to validating the integrity of the data object (112), the system verifies that the data object (112) is authorized to communicate with each of the peer data objects (118). Further, the system verifies that the peer data objects (118) are authorized to communicate with the data object (112).
CA002315212A 1998-01-16 1999-01-15 System and method for authenticating peer components Expired - Fee Related CA2315212C (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US7173798P 1998-01-16 1998-01-16
US60/071,737 1998-01-16
PCT/US1999/000968 WO1999036854A1 (en) 1998-01-16 1999-01-15 System and method for authenticating peer components

Publications (2)

Publication Number Publication Date
CA2315212A1 true CA2315212A1 (en) 1999-07-22
CA2315212C CA2315212C (en) 2008-12-02

Family

ID=22103256

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002315212A Expired - Fee Related CA2315212C (en) 1998-01-16 1999-01-15 System and method for authenticating peer components

Country Status (15)

Country Link
US (1) US6510516B1 (en)
EP (1) EP1047992B1 (en)
JP (1) JP2002509313A (en)
KR (1) KR100539987B1 (en)
CN (1) CN1153140C (en)
AT (1) ATE216095T1 (en)
AU (1) AU765747B2 (en)
CA (1) CA2315212C (en)
DE (1) DE69901231T2 (en)
DK (1) DK1047992T3 (en)
ES (1) ES2175936T3 (en)
MX (1) MX214637B (en)
PT (1) PT1047992E (en)
RU (1) RU2000115287A (en)
WO (1) WO1999036854A1 (en)

Families Citing this family (45)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6820202B1 (en) * 1998-11-09 2004-11-16 First Data Corporation Account authority digital signature (AADS) system
US7047416B2 (en) * 1998-11-09 2006-05-16 First Data Corporation Account-based digital signature (ABDS) system
US6754886B1 (en) * 1998-11-30 2004-06-22 International Business Machines Corporation Method and system for storing java objects in devices having a reduced support of high-level programming concepts
US6802006B1 (en) * 1999-01-15 2004-10-05 Macrovision Corporation System and method of verifying the authenticity of dynamically connectable executable images
AU4230300A (en) 1999-04-12 2000-11-14 Reciprocal, Inc. System and method for data rights management
US7650504B2 (en) * 1999-07-22 2010-01-19 Macrovision Corporation System and method of verifying the authenticity of dynamically connectable executable images
US7124408B1 (en) 2000-06-28 2006-10-17 Microsoft Corporation Binding by hash
US7117371B1 (en) 2000-06-28 2006-10-03 Microsoft Corporation Shared names
US6789189B2 (en) * 2000-08-04 2004-09-07 First Data Corporation Managing account database in ABDS system
US7082533B2 (en) * 2000-08-04 2006-07-25 First Data Corporation Gauging risk in electronic communications regarding accounts in ABDS system
US6983368B2 (en) * 2000-08-04 2006-01-03 First Data Corporation Linking public key of device to information during manufacture
US7096354B2 (en) * 2000-08-04 2006-08-22 First Data Corporation Central key authority database in an ABDS system
US6978369B2 (en) * 2000-08-04 2005-12-20 First Data Corporation Person-centric account-based digital signature system
US7010691B2 (en) * 2000-08-04 2006-03-07 First Data Corporation ABDS system utilizing security information in authenticating entity access
EP1316168A4 (en) * 2000-08-04 2006-05-10 First Data Corp Method and system for using electronic communications for an electronic contact
US7509492B2 (en) * 2001-03-27 2009-03-24 Microsoft Corporation Distributed scalable cryptographic access control
GB2377287B (en) 2001-07-06 2005-07-13 Livedevices Ltd Improvements relating to internet-connected devices
WO2003005671A2 (en) * 2001-07-06 2003-01-16 Livedevices Limited Improvements relating to internet-connected devices
US7444522B1 (en) * 2002-09-18 2008-10-28 Open Invention Network, Llc Dynamic negotiation of security arrangements between web services
US7188359B2 (en) 2002-12-18 2007-03-06 America Online, Inc. Optimizing authentication service availability and responsiveness via client-side routing
US7693867B2 (en) * 2003-05-14 2010-04-06 Pixar Model referencing method and apparatus
US7831519B2 (en) * 2003-12-17 2010-11-09 First Data Corporation Methods and systems for electromagnetic initiation of secure transactions
US8043219B2 (en) * 2004-09-17 2011-10-25 Siemens Medical Solutions Usa, Inc. Automated power level for contrast agent imaging
US20060153369A1 (en) * 2005-01-07 2006-07-13 Beeson Curtis L Providing cryptographic key based on user input data
US20060153364A1 (en) * 2005-01-07 2006-07-13 Beeson Curtis L Asymmetric key cryptosystem based on shared knowledge
KR20060081336A (en) * 2005-01-07 2006-07-12 엘지전자 주식회사 Digital certificates in a recoding medium
US7869593B2 (en) * 2005-01-07 2011-01-11 First Data Corporation Software for providing based on shared knowledge public keys having same private key
US20060156013A1 (en) * 2005-01-07 2006-07-13 Beeson Curtis L Digital signature software using ephemeral private key and system
US20060153367A1 (en) * 2005-01-07 2006-07-13 Beeson Curtis L Digital signature system based on shared knowledge
US7693277B2 (en) * 2005-01-07 2010-04-06 First Data Corporation Generating digital signatures using ephemeral cryptographic key
US20060153370A1 (en) * 2005-01-07 2006-07-13 Beeson Curtis L Generating public-private key pair based on user input data
US7936869B2 (en) * 2005-01-07 2011-05-03 First Data Corporation Verifying digital signature based on shared knowledge
US7593527B2 (en) * 2005-01-07 2009-09-22 First Data Corporation Providing digital signature and public key based on shared knowledge
US7490239B2 (en) * 2005-01-07 2009-02-10 First Data Corporation Facilitating digital signature based on ephemeral private key
US8214634B1 (en) * 2006-02-21 2012-07-03 Adobe Systems Incorporated Establishing trust via aggregate peer ranking
US8818904B2 (en) 2007-01-17 2014-08-26 The Western Union Company Generation systems and methods for transaction identifiers having biometric keys associated therewith
US7933835B2 (en) 2007-01-17 2011-04-26 The Western Union Company Secure money transfer systems and methods using biometric keys associated therewith
US8504473B2 (en) 2007-03-28 2013-08-06 The Western Union Company Money transfer system and messaging system
US9009309B2 (en) * 2007-07-11 2015-04-14 Verizon Patent And Licensing Inc. Token-based crediting of network usage
US9177313B1 (en) 2007-10-18 2015-11-03 Jpmorgan Chase Bank, N.A. System and method for issuing, circulating and trading financial instruments with smart features
KR100961442B1 (en) * 2007-11-14 2010-06-09 한국전자통신연구원 Method for constructing Key Graph for Multi-Group Multi-Casting Service, and Method of Key Management using it
KR101407640B1 (en) 2008-02-14 2014-06-16 삼성전자주식회사 Apparatus and Method for controlling access in P2P network
US20090290714A1 (en) * 2008-05-20 2009-11-26 Microsoft Corporation Protocol for Verifying Integrity of Remote Data
US20100088520A1 (en) * 2008-10-02 2010-04-08 Microsoft Corporation Protocol for determining availability of peers in a peer-to-peer storage system
CN111131246B (en) * 2019-12-24 2022-06-28 南京南瑞继保工程技术有限公司 Information upgrading and backup method and system suitable for embedded equipment of power system

Family Cites Families (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5023907A (en) 1988-09-30 1991-06-11 Apollo Computer, Inc. Network license server
US4953209A (en) 1988-10-31 1990-08-28 International Business Machines Corp. Self-verifying receipt and acceptance system for electronically delivered data objects
US4919545A (en) 1988-12-22 1990-04-24 Gte Laboratories Incorporated Distributed security procedure for intelligent networks
US5187790A (en) 1989-06-29 1993-02-16 Digital Equipment Corporation Server impersonation of client processes in an object based computer operating system
US5222134A (en) 1990-11-07 1993-06-22 Tau Systems Corporation Secure system for activating personal computer software at remote locations
US5103476A (en) 1990-11-07 1992-04-07 Waite David P Secure system for activating personal computer software at remote locations
US5291598A (en) 1992-04-07 1994-03-01 Gregory Grundy Method and system for decentralized manufacture of copy-controlled software
JP2659896B2 (en) 1992-04-29 1997-09-30 インターナショナル・ビジネス・マシーンズ・コーポレイション Structured document copy management method and structured document copy management device
US5235642A (en) 1992-07-21 1993-08-10 Digital Equipment Corporation Access control subsystem and method for distributed computer system using locally cached authentication credentials
US5319705A (en) 1992-10-21 1994-06-07 International Business Machines Corporation Method and system for multimedia access control enablement
US5400403A (en) 1993-08-16 1995-03-21 Rsa Data Security, Inc. Abuse-resistant object distribution system and method
US5625690A (en) 1993-11-15 1997-04-29 Lucent Technologies Inc. Software pay per use system
US5572590A (en) * 1994-04-12 1996-11-05 International Business Machines Corporation Discrimination of malicious changes to digital information using multiple signatures
US5802275A (en) 1994-06-22 1998-09-01 Lucent Technologies Inc. Isolation of non-secure software from secure software to limit virus infection
US5559884A (en) 1994-06-30 1996-09-24 Microsoft Corporation Method and system for generating and auditing a signature for a computer program
US5630066A (en) * 1994-12-20 1997-05-13 Sun Microsystems, Inc. System and method for locating object view and platform independent object
US5757914A (en) * 1995-10-26 1998-05-26 Sun Microsystems, Inc. System and method for protecting use of dynamically linked executable modules
US5692047A (en) 1995-12-08 1997-11-25 Sun Microsystems, Inc. System and method for executing verifiable programs with facility for using non-verifiable programs from trusted sources
US5982390A (en) * 1996-03-25 1999-11-09 Stan Stoneking Controlling personality manifestations by objects in a computer-assisted animation environment
US6289320B1 (en) * 1998-07-07 2001-09-11 Diebold, Incorporated Automated banking machine apparatus and system
US6317868B1 (en) * 1997-10-24 2001-11-13 University Of Washington Process for transparently enforcing protection domains and access control as well as auditing operations in software components
DE19840029C1 (en) 1998-09-02 2000-04-20 Siemens Ag Method for linking program modules loaded into a main memory of a processor on a chip card

Also Published As

Publication number Publication date
WO1999036854A1 (en) 1999-07-22
JP2002509313A (en) 2002-03-26
KR20010024853A (en) 2001-03-26
DE69901231T2 (en) 2002-11-07
MX214637B (en) 2003-06-04
EP1047992A1 (en) 2000-11-02
DE69901231D1 (en) 2002-05-16
PT1047992E (en) 2002-09-30
CN1287639A (en) 2001-03-14
US6510516B1 (en) 2003-01-21
AU765747B2 (en) 2003-09-25
CN1153140C (en) 2004-06-09
CA2315212C (en) 2008-12-02
DK1047992T3 (en) 2002-07-29
AU2322899A (en) 1999-08-02
ES2175936T3 (en) 2002-11-16
EP1047992B1 (en) 2002-04-10
KR100539987B1 (en) 2006-01-10
ATE216095T1 (en) 2002-04-15
RU2000115287A (en) 2002-07-27

Similar Documents

Publication Publication Date Title
CA2315212A1 (en) System and method for authenticating peer components
WO2004074957A3 (en) System and method of multiple-level control of electronic devices
WO1998010611A3 (en) System for preventing electronic memory tampering
WO2003010942A3 (en) System and method for improved security in a handset reprovisioning and reprogramming
WO2004027588A3 (en) Certificate based authorized domains
WO2007005101A3 (en) System and method for establishing a shared key between network peers
WO2004019550A3 (en) System and method for authenticating wireless component
EP1388777A3 (en) System and method for cryptographic control of system configurations
EP1860620A3 (en) Terminal device, secure device and application authentication method
WO1998054869A3 (en) Method and apparatus for providing security in a star network connection using public key cryptography
WO2000076120A3 (en) Security architecture
WO1999016031A3 (en) Method and apparatus for asymmetric key management in a cryptographic system
EP1389752A3 (en) System and method for privilege delegation and control
EP0840479A3 (en) Device authentication system which allows the authentication function to be changed
EP1286312A3 (en) Automobile data archive system having securely authenticated instrumentation data storage
WO2003034188A3 (en) Method and system for detecting unauthorised executable programs _______________________________________________________________
AU6816101A (en) Systems, methods and software for remote password authentication using multiple servers
MY145724A (en) Persistent authorization context based on external authentication
EP1478204A3 (en) Method and apparatus for performing authentication in a communications system
WO1998045981A3 (en) Cryptographic system and protocol for establishing secure authenticated remote access
CA2173018A1 (en) Method of Manufacturing Secure Boxes in a Key Management System
WO2002067097A3 (en) Authentication method and data transmission system
EP1032176A3 (en) Detecting and locating a misbehaving device in a network domain
EP1280312A3 (en) Methods, systems and computer program products for checking the validity of data
SE0003464D0 (en) A method and a system for improving logon security in network applications

Legal Events

Date Code Title Description
EEER Examination request
MKLA Lapsed

Effective date: 20180115