CA2315212A1 - System and method for authenticating peer components - Google Patents
System and method for authenticating peer components Download PDFInfo
- Publication number
- CA2315212A1 CA2315212A1 CA002315212A CA2315212A CA2315212A1 CA 2315212 A1 CA2315212 A1 CA 2315212A1 CA 002315212 A CA002315212 A CA 002315212A CA 2315212 A CA2315212 A CA 2315212A CA 2315212 A1 CA2315212 A1 CA 2315212A1
- Authority
- CA
- Canada
- Prior art keywords
- peer
- data object
- data
- data objects
- objects
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/565—Static detection by checking file integrity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2115—Third party
Abstract
A system and method for controlling the usage of data objects in component object systems. According to the invention, each data object (112) includes a peer list that defines one or more peer data objects (118) that are required by the data object (112). Upon receipt of a data object (112), the system verifies the integrity of the data object (112). Further, the system identifies the integrity of the peer data objects (118). If the system cannot find the peer data objects (118), or the system cannot authenticate the peer data objects (118), the system may optionally retrieve a peer data object that can be authenticated from a data object depository. In addition to validating the integrity of the data object (112), the system verifies that the data object (112) is authorized to communicate with each of the peer data objects (118). Further, the system verifies that the peer data objects (118) are authorized to communicate with the data object (112).
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US7173798P | 1998-01-16 | 1998-01-16 | |
US60/071,737 | 1998-01-16 | ||
PCT/US1999/000968 WO1999036854A1 (en) | 1998-01-16 | 1999-01-15 | System and method for authenticating peer components |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2315212A1 true CA2315212A1 (en) | 1999-07-22 |
CA2315212C CA2315212C (en) | 2008-12-02 |
Family
ID=22103256
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002315212A Expired - Fee Related CA2315212C (en) | 1998-01-16 | 1999-01-15 | System and method for authenticating peer components |
Country Status (15)
Country | Link |
---|---|
US (1) | US6510516B1 (en) |
EP (1) | EP1047992B1 (en) |
JP (1) | JP2002509313A (en) |
KR (1) | KR100539987B1 (en) |
CN (1) | CN1153140C (en) |
AT (1) | ATE216095T1 (en) |
AU (1) | AU765747B2 (en) |
CA (1) | CA2315212C (en) |
DE (1) | DE69901231T2 (en) |
DK (1) | DK1047992T3 (en) |
ES (1) | ES2175936T3 (en) |
MX (1) | MX214637B (en) |
PT (1) | PT1047992E (en) |
RU (1) | RU2000115287A (en) |
WO (1) | WO1999036854A1 (en) |
Families Citing this family (45)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6820202B1 (en) * | 1998-11-09 | 2004-11-16 | First Data Corporation | Account authority digital signature (AADS) system |
US7047416B2 (en) * | 1998-11-09 | 2006-05-16 | First Data Corporation | Account-based digital signature (ABDS) system |
US6754886B1 (en) * | 1998-11-30 | 2004-06-22 | International Business Machines Corporation | Method and system for storing java objects in devices having a reduced support of high-level programming concepts |
US6802006B1 (en) * | 1999-01-15 | 2004-10-05 | Macrovision Corporation | System and method of verifying the authenticity of dynamically connectable executable images |
AU4230300A (en) | 1999-04-12 | 2000-11-14 | Reciprocal, Inc. | System and method for data rights management |
US7650504B2 (en) * | 1999-07-22 | 2010-01-19 | Macrovision Corporation | System and method of verifying the authenticity of dynamically connectable executable images |
US7124408B1 (en) | 2000-06-28 | 2006-10-17 | Microsoft Corporation | Binding by hash |
US7117371B1 (en) | 2000-06-28 | 2006-10-03 | Microsoft Corporation | Shared names |
US6789189B2 (en) * | 2000-08-04 | 2004-09-07 | First Data Corporation | Managing account database in ABDS system |
US7082533B2 (en) * | 2000-08-04 | 2006-07-25 | First Data Corporation | Gauging risk in electronic communications regarding accounts in ABDS system |
US6983368B2 (en) * | 2000-08-04 | 2006-01-03 | First Data Corporation | Linking public key of device to information during manufacture |
US7096354B2 (en) * | 2000-08-04 | 2006-08-22 | First Data Corporation | Central key authority database in an ABDS system |
US6978369B2 (en) * | 2000-08-04 | 2005-12-20 | First Data Corporation | Person-centric account-based digital signature system |
US7010691B2 (en) * | 2000-08-04 | 2006-03-07 | First Data Corporation | ABDS system utilizing security information in authenticating entity access |
EP1316168A4 (en) * | 2000-08-04 | 2006-05-10 | First Data Corp | Method and system for using electronic communications for an electronic contact |
US7509492B2 (en) * | 2001-03-27 | 2009-03-24 | Microsoft Corporation | Distributed scalable cryptographic access control |
GB2377287B (en) | 2001-07-06 | 2005-07-13 | Livedevices Ltd | Improvements relating to internet-connected devices |
WO2003005671A2 (en) * | 2001-07-06 | 2003-01-16 | Livedevices Limited | Improvements relating to internet-connected devices |
US7444522B1 (en) * | 2002-09-18 | 2008-10-28 | Open Invention Network, Llc | Dynamic negotiation of security arrangements between web services |
US7188359B2 (en) | 2002-12-18 | 2007-03-06 | America Online, Inc. | Optimizing authentication service availability and responsiveness via client-side routing |
US7693867B2 (en) * | 2003-05-14 | 2010-04-06 | Pixar | Model referencing method and apparatus |
US7831519B2 (en) * | 2003-12-17 | 2010-11-09 | First Data Corporation | Methods and systems for electromagnetic initiation of secure transactions |
US8043219B2 (en) * | 2004-09-17 | 2011-10-25 | Siemens Medical Solutions Usa, Inc. | Automated power level for contrast agent imaging |
US20060153369A1 (en) * | 2005-01-07 | 2006-07-13 | Beeson Curtis L | Providing cryptographic key based on user input data |
US20060153364A1 (en) * | 2005-01-07 | 2006-07-13 | Beeson Curtis L | Asymmetric key cryptosystem based on shared knowledge |
KR20060081336A (en) * | 2005-01-07 | 2006-07-12 | 엘지전자 주식회사 | Digital certificates in a recoding medium |
US7869593B2 (en) * | 2005-01-07 | 2011-01-11 | First Data Corporation | Software for providing based on shared knowledge public keys having same private key |
US20060156013A1 (en) * | 2005-01-07 | 2006-07-13 | Beeson Curtis L | Digital signature software using ephemeral private key and system |
US20060153367A1 (en) * | 2005-01-07 | 2006-07-13 | Beeson Curtis L | Digital signature system based on shared knowledge |
US7693277B2 (en) * | 2005-01-07 | 2010-04-06 | First Data Corporation | Generating digital signatures using ephemeral cryptographic key |
US20060153370A1 (en) * | 2005-01-07 | 2006-07-13 | Beeson Curtis L | Generating public-private key pair based on user input data |
US7936869B2 (en) * | 2005-01-07 | 2011-05-03 | First Data Corporation | Verifying digital signature based on shared knowledge |
US7593527B2 (en) * | 2005-01-07 | 2009-09-22 | First Data Corporation | Providing digital signature and public key based on shared knowledge |
US7490239B2 (en) * | 2005-01-07 | 2009-02-10 | First Data Corporation | Facilitating digital signature based on ephemeral private key |
US8214634B1 (en) * | 2006-02-21 | 2012-07-03 | Adobe Systems Incorporated | Establishing trust via aggregate peer ranking |
US8818904B2 (en) | 2007-01-17 | 2014-08-26 | The Western Union Company | Generation systems and methods for transaction identifiers having biometric keys associated therewith |
US7933835B2 (en) | 2007-01-17 | 2011-04-26 | The Western Union Company | Secure money transfer systems and methods using biometric keys associated therewith |
US8504473B2 (en) | 2007-03-28 | 2013-08-06 | The Western Union Company | Money transfer system and messaging system |
US9009309B2 (en) * | 2007-07-11 | 2015-04-14 | Verizon Patent And Licensing Inc. | Token-based crediting of network usage |
US9177313B1 (en) | 2007-10-18 | 2015-11-03 | Jpmorgan Chase Bank, N.A. | System and method for issuing, circulating and trading financial instruments with smart features |
KR100961442B1 (en) * | 2007-11-14 | 2010-06-09 | 한국전자통신연구원 | Method for constructing Key Graph for Multi-Group Multi-Casting Service, and Method of Key Management using it |
KR101407640B1 (en) | 2008-02-14 | 2014-06-16 | 삼성전자주식회사 | Apparatus and Method for controlling access in P2P network |
US20090290714A1 (en) * | 2008-05-20 | 2009-11-26 | Microsoft Corporation | Protocol for Verifying Integrity of Remote Data |
US20100088520A1 (en) * | 2008-10-02 | 2010-04-08 | Microsoft Corporation | Protocol for determining availability of peers in a peer-to-peer storage system |
CN111131246B (en) * | 2019-12-24 | 2022-06-28 | 南京南瑞继保工程技术有限公司 | Information upgrading and backup method and system suitable for embedded equipment of power system |
Family Cites Families (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5023907A (en) | 1988-09-30 | 1991-06-11 | Apollo Computer, Inc. | Network license server |
US4953209A (en) | 1988-10-31 | 1990-08-28 | International Business Machines Corp. | Self-verifying receipt and acceptance system for electronically delivered data objects |
US4919545A (en) | 1988-12-22 | 1990-04-24 | Gte Laboratories Incorporated | Distributed security procedure for intelligent networks |
US5187790A (en) | 1989-06-29 | 1993-02-16 | Digital Equipment Corporation | Server impersonation of client processes in an object based computer operating system |
US5222134A (en) | 1990-11-07 | 1993-06-22 | Tau Systems Corporation | Secure system for activating personal computer software at remote locations |
US5103476A (en) | 1990-11-07 | 1992-04-07 | Waite David P | Secure system for activating personal computer software at remote locations |
US5291598A (en) | 1992-04-07 | 1994-03-01 | Gregory Grundy | Method and system for decentralized manufacture of copy-controlled software |
JP2659896B2 (en) | 1992-04-29 | 1997-09-30 | インターナショナル・ビジネス・マシーンズ・コーポレイション | Structured document copy management method and structured document copy management device |
US5235642A (en) | 1992-07-21 | 1993-08-10 | Digital Equipment Corporation | Access control subsystem and method for distributed computer system using locally cached authentication credentials |
US5319705A (en) | 1992-10-21 | 1994-06-07 | International Business Machines Corporation | Method and system for multimedia access control enablement |
US5400403A (en) | 1993-08-16 | 1995-03-21 | Rsa Data Security, Inc. | Abuse-resistant object distribution system and method |
US5625690A (en) | 1993-11-15 | 1997-04-29 | Lucent Technologies Inc. | Software pay per use system |
US5572590A (en) * | 1994-04-12 | 1996-11-05 | International Business Machines Corporation | Discrimination of malicious changes to digital information using multiple signatures |
US5802275A (en) | 1994-06-22 | 1998-09-01 | Lucent Technologies Inc. | Isolation of non-secure software from secure software to limit virus infection |
US5559884A (en) | 1994-06-30 | 1996-09-24 | Microsoft Corporation | Method and system for generating and auditing a signature for a computer program |
US5630066A (en) * | 1994-12-20 | 1997-05-13 | Sun Microsystems, Inc. | System and method for locating object view and platform independent object |
US5757914A (en) * | 1995-10-26 | 1998-05-26 | Sun Microsystems, Inc. | System and method for protecting use of dynamically linked executable modules |
US5692047A (en) | 1995-12-08 | 1997-11-25 | Sun Microsystems, Inc. | System and method for executing verifiable programs with facility for using non-verifiable programs from trusted sources |
US5982390A (en) * | 1996-03-25 | 1999-11-09 | Stan Stoneking | Controlling personality manifestations by objects in a computer-assisted animation environment |
US6289320B1 (en) * | 1998-07-07 | 2001-09-11 | Diebold, Incorporated | Automated banking machine apparatus and system |
US6317868B1 (en) * | 1997-10-24 | 2001-11-13 | University Of Washington | Process for transparently enforcing protection domains and access control as well as auditing operations in software components |
DE19840029C1 (en) | 1998-09-02 | 2000-04-20 | Siemens Ag | Method for linking program modules loaded into a main memory of a processor on a chip card |
-
1999
- 1999-01-15 EP EP99903135A patent/EP1047992B1/en not_active Expired - Lifetime
- 1999-01-15 MX MX9906914A patent/MX214637B/en unknown
- 1999-01-15 KR KR1020007007722A patent/KR100539987B1/en not_active IP Right Cessation
- 1999-01-15 AT AT99903135T patent/ATE216095T1/en active
- 1999-01-15 CN CNB998020087A patent/CN1153140C/en not_active Expired - Fee Related
- 1999-01-15 WO PCT/US1999/000968 patent/WO1999036854A1/en active IP Right Grant
- 1999-01-15 PT PT99903135T patent/PT1047992E/en unknown
- 1999-01-15 CA CA002315212A patent/CA2315212C/en not_active Expired - Fee Related
- 1999-01-15 DK DK99903135T patent/DK1047992T3/en active
- 1999-01-15 ES ES99903135T patent/ES2175936T3/en not_active Expired - Lifetime
- 1999-01-15 DE DE69901231T patent/DE69901231T2/en not_active Expired - Lifetime
- 1999-01-15 US US09/231,140 patent/US6510516B1/en not_active Expired - Lifetime
- 1999-01-15 JP JP2000540498A patent/JP2002509313A/en active Pending
- 1999-01-15 RU RU2000115287/09A patent/RU2000115287A/en not_active Application Discontinuation
- 1999-01-15 AU AU23228/99A patent/AU765747B2/en not_active Ceased
Also Published As
Publication number | Publication date |
---|---|
WO1999036854A1 (en) | 1999-07-22 |
JP2002509313A (en) | 2002-03-26 |
KR20010024853A (en) | 2001-03-26 |
DE69901231T2 (en) | 2002-11-07 |
MX214637B (en) | 2003-06-04 |
EP1047992A1 (en) | 2000-11-02 |
DE69901231D1 (en) | 2002-05-16 |
PT1047992E (en) | 2002-09-30 |
CN1287639A (en) | 2001-03-14 |
US6510516B1 (en) | 2003-01-21 |
AU765747B2 (en) | 2003-09-25 |
CN1153140C (en) | 2004-06-09 |
CA2315212C (en) | 2008-12-02 |
DK1047992T3 (en) | 2002-07-29 |
AU2322899A (en) | 1999-08-02 |
ES2175936T3 (en) | 2002-11-16 |
EP1047992B1 (en) | 2002-04-10 |
KR100539987B1 (en) | 2006-01-10 |
ATE216095T1 (en) | 2002-04-15 |
RU2000115287A (en) | 2002-07-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2315212A1 (en) | System and method for authenticating peer components | |
WO2004074957A3 (en) | System and method of multiple-level control of electronic devices | |
WO1998010611A3 (en) | System for preventing electronic memory tampering | |
WO2003010942A3 (en) | System and method for improved security in a handset reprovisioning and reprogramming | |
WO2004027588A3 (en) | Certificate based authorized domains | |
WO2007005101A3 (en) | System and method for establishing a shared key between network peers | |
WO2004019550A3 (en) | System and method for authenticating wireless component | |
EP1388777A3 (en) | System and method for cryptographic control of system configurations | |
EP1860620A3 (en) | Terminal device, secure device and application authentication method | |
WO1998054869A3 (en) | Method and apparatus for providing security in a star network connection using public key cryptography | |
WO2000076120A3 (en) | Security architecture | |
WO1999016031A3 (en) | Method and apparatus for asymmetric key management in a cryptographic system | |
EP1389752A3 (en) | System and method for privilege delegation and control | |
EP0840479A3 (en) | Device authentication system which allows the authentication function to be changed | |
EP1286312A3 (en) | Automobile data archive system having securely authenticated instrumentation data storage | |
WO2003034188A3 (en) | Method and system for detecting unauthorised executable programs _______________________________________________________________ | |
AU6816101A (en) | Systems, methods and software for remote password authentication using multiple servers | |
MY145724A (en) | Persistent authorization context based on external authentication | |
EP1478204A3 (en) | Method and apparatus for performing authentication in a communications system | |
WO1998045981A3 (en) | Cryptographic system and protocol for establishing secure authenticated remote access | |
CA2173018A1 (en) | Method of Manufacturing Secure Boxes in a Key Management System | |
WO2002067097A3 (en) | Authentication method and data transmission system | |
EP1032176A3 (en) | Detecting and locating a misbehaving device in a network domain | |
EP1280312A3 (en) | Methods, systems and computer program products for checking the validity of data | |
SE0003464D0 (en) | A method and a system for improving logon security in network applications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKLA | Lapsed |
Effective date: 20180115 |