DE602007008632D1 - Verfahren, Vorrichtung und Computerprogramm für eine ferngesteuerte Freigabe von Sicherheitsoperationen mittels Zugangsschlüssel - Google Patents

Verfahren, Vorrichtung und Computerprogramm für eine ferngesteuerte Freigabe von Sicherheitsoperationen mittels Zugangsschlüssel

Info

Publication number
DE602007008632D1
DE602007008632D1 DE602007008632T DE602007008632T DE602007008632D1 DE 602007008632 D1 DE602007008632 D1 DE 602007008632D1 DE 602007008632 T DE602007008632 T DE 602007008632T DE 602007008632 T DE602007008632 T DE 602007008632T DE 602007008632 D1 DE602007008632 D1 DE 602007008632D1
Authority
DE
Germany
Prior art keywords
computer program
security operations
access keys
remote release
remote
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
DE602007008632T
Other languages
English (en)
Inventor
Stephen R Carter
Lloyd L Burch
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Micro Focus Software Inc
Original Assignee
Novell Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Novell Inc filed Critical Novell Inc
Publication of DE602007008632D1 publication Critical patent/DE602007008632D1/de
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/081Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying self-generating credentials, e.g. instead of receiving credentials from an authority or from another peer, the credentials are generated at the entity itself
DE602007008632T 2006-03-29 2007-02-26 Verfahren, Vorrichtung und Computerprogramm für eine ferngesteuerte Freigabe von Sicherheitsoperationen mittels Zugangsschlüssel Active DE602007008632D1 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11/392,195 US7810139B2 (en) 2006-03-29 2006-03-29 Remote authorization for operations

Publications (1)

Publication Number Publication Date
DE602007008632D1 true DE602007008632D1 (de) 2010-10-07

Family

ID=38158143

Family Applications (1)

Application Number Title Priority Date Filing Date
DE602007008632T Active DE602007008632D1 (de) 2006-03-29 2007-02-26 Verfahren, Vorrichtung und Computerprogramm für eine ferngesteuerte Freigabe von Sicherheitsoperationen mittels Zugangsschlüssel

Country Status (3)

Country Link
US (2) US7810139B2 (de)
EP (1) EP1841181B1 (de)
DE (1) DE602007008632D1 (de)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7810139B2 (en) * 2006-03-29 2010-10-05 Novell, Inc Remote authorization for operations
US9665718B2 (en) 2014-03-14 2017-05-30 International Business Machines Corporation Correlating a task with commands to perform a change ticket in an IT system
US9654922B2 (en) 2014-03-21 2017-05-16 Venafi, Inc. Geo-fencing cryptographic key material
US9577823B2 (en) * 2014-03-21 2017-02-21 Venafi, Inc. Rule-based validity of cryptographic key material
US9686244B2 (en) * 2014-03-21 2017-06-20 Venafi, Inc. Rule-based validity of cryptographic key material
US9647998B2 (en) 2014-03-21 2017-05-09 Venafi, Inc. Geo-fencing cryptographic key material
US9531533B2 (en) 2014-03-21 2016-12-27 Venafi, Inc. Rule-based validity of cryptographic key material
US9680827B2 (en) 2014-03-21 2017-06-13 Venafi, Inc. Geo-fencing cryptographic key material

Family Cites Families (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4386233A (en) * 1980-09-29 1983-05-31 Smid Miles E Crytographic key notarization methods and apparatus
US5548721A (en) * 1994-04-28 1996-08-20 Harris Corporation Method of conducting secure operations on an uncontrolled network
US5742756A (en) 1996-02-12 1998-04-21 Microsoft Corporation System and method of using smart cards to perform security-critical operations requiring user authorization
US5970149A (en) 1996-11-19 1999-10-19 Johnson; R. Brent Combined remote access and security system
US6073237A (en) * 1997-11-06 2000-06-06 Cybercash, Inc. Tamper resistant method and apparatus
US5982892A (en) 1997-12-22 1999-11-09 Hicks; Christian Bielefeldt System and method for remote authorization for unlocking electronic data
US6567793B1 (en) * 1997-12-22 2003-05-20 Christian Bielefeldt Hicks Remote authorization for unlocking electronic data system and method
US6192405B1 (en) 1998-01-23 2001-02-20 Novell, Inc. Method and apparatus for acquiring authorized access to resources in a distributed system
US6772350B1 (en) * 1998-05-15 2004-08-03 E.Piphany, Inc. System and method for controlling access to resources in a distributed environment
US6374355B1 (en) * 1998-07-31 2002-04-16 Lucent Technologies Inc. Method for securing over-the-air communication in a wireless system
IL126552A (en) * 1998-10-13 2007-06-03 Nds Ltd Remote administration of smart cards for secure access systems
US6684330B1 (en) * 1998-10-16 2004-01-27 Tecsec, Inc. Cryptographic information and flow control
US6647494B1 (en) * 1999-06-14 2003-11-11 Intel Corporation System and method for checking authorization of remote configuration operations
US6853988B1 (en) * 1999-09-20 2005-02-08 Security First Corporation Cryptographic server with provisions for interoperability between cryptographic systems
AU7596300A (en) 1999-09-20 2001-04-24 Ethentica, Inc. Cryptographic server with provisions for interoperability between cryptographic systems
GB2357227B (en) * 1999-12-08 2003-12-17 Hewlett Packard Co Security protocol
CA2397994A1 (en) * 2000-01-27 2001-08-02 Hummingbird Ltd. A method and system for implementing a common user logon to multiple applications
US7240202B1 (en) * 2000-03-16 2007-07-03 Novell, Inc. Security context sharing
US7278023B1 (en) * 2000-06-09 2007-10-02 Northrop Grumman Corporation System and method for distributed network acess and control enabling high availability, security and survivability
JP2002132730A (ja) 2000-10-20 2002-05-10 Hitachi Ltd 個人情報の信頼度および開示度による認証またはアクセス管理システム、および管理方法
US20040203592A1 (en) * 2000-11-15 2004-10-14 Motorola, Inc. Introduction device, smart appliance and method of creating a federation thereof
US6954740B2 (en) * 2001-02-26 2005-10-11 Albert Israel Talker Action verification system using central verification authority
US7370351B1 (en) * 2001-03-22 2008-05-06 Novell, Inc. Cross domain authentication and security services using proxies for HTTP access
US6971030B2 (en) 2001-03-26 2005-11-29 International Business Machines Corporation System and method for maintaining user security features
GB2378539B (en) * 2001-09-05 2003-07-02 Data Encryption Systems Ltd Apparatus for and method of controlling propagation of decryption keys
US20030204722A1 (en) 2002-04-26 2003-10-30 Isadore Schoen Instant messaging apparatus and method with instant messaging secure policy certificates
WO2003107224A1 (en) * 2002-06-18 2003-12-24 Arizona Board Of Regents, Acting For Arizona State University Assignment and management of authentication & authorization
US7694330B2 (en) * 2003-05-23 2010-04-06 Industrial Technology Research Institute Personal authentication device and system and method thereof
US7257835B2 (en) * 2003-05-28 2007-08-14 Microsoft Corporation Securely authorizing the performance of actions
US7302570B2 (en) 2003-08-19 2007-11-27 International Business Machines Corporation Apparatus, system, and method for authorized remote access to a target system
US8015301B2 (en) * 2003-09-30 2011-09-06 Novell, Inc. Policy and attribute based access to a resource
US7827409B2 (en) * 2003-10-07 2010-11-02 Koolspan, Inc. Remote secure authorization
US7647256B2 (en) * 2004-01-29 2010-01-12 Novell, Inc. Techniques for establishing and managing a distributed credential store
CA2495949A1 (en) * 2004-02-05 2005-08-05 Simon Law Secure wireless authorization system
JP5038887B2 (ja) * 2004-04-15 2012-10-03 クリアパス・ネットワークス・インコーポレーテッド ネットワークを管理するシステムおよび方法
EP1745589B1 (de) * 2004-04-30 2014-07-16 BlackBerry Limited System und Verfahren zum Konfigurieren von Einrichtungen für sichere Operationen
CN100549985C (zh) * 2004-05-03 2009-10-14 捷讯研究有限公司 用于应用认证的系统和方法
US8463819B2 (en) 2004-09-01 2013-06-11 Oracle International Corporation Centralized enterprise security policy framework
US7711965B2 (en) * 2004-10-20 2010-05-04 Intel Corporation Data security
US7400891B2 (en) * 2004-11-10 2008-07-15 At&T Delaware Intellectual Property, Inc. Methods, systems and computer program products for remotely controlling wireless terminals
US7810139B2 (en) 2006-03-29 2010-10-05 Novell, Inc Remote authorization for operations

Also Published As

Publication number Publication date
US7810139B2 (en) 2010-10-05
EP1841181A2 (de) 2007-10-03
US20070234406A1 (en) 2007-10-04
EP1841181B1 (de) 2010-08-25
EP1841181A3 (de) 2007-11-28
US20100325693A1 (en) 2010-12-23
US8327417B2 (en) 2012-12-04

Similar Documents

Publication Publication Date Title
DE602007008632D1 (de) Verfahren, Vorrichtung und Computerprogramm für eine ferngesteuerte Freigabe von Sicherheitsoperationen mittels Zugangsschlüssel
DE602007009134D1 (de) Vorrichtung, verfahren und computerprogramm zum erionen
DK2359106T3 (da) Fremgangsmåde og indretning til vibrationsanalyse og mønsterdatabase dertil samt anvendelse af en mønsterdatabase
DE602007000510D1 (de) Verfahren und Vorrichtung zum Zuordnen biometrischer Informationen
DE602007007013D1 (de) Vorrichtung zur Bereitstellung von Informationen der Umgebung eines Fahrzeugs, Verfahren und Computerprogramm
DE602008005063D1 (de) Informationsverarbeitungsvorrichtung, Informationsverarbeitungsverfahren und Computerprogramm
TWI348119B (en) Personal identification device, personal identification method, updating method for identification dictionary data, and updating program for identification dictionary data
BRPI0813771A2 (pt) Método, produto de programa de computador, telefone, e, métodos para usar um telefone para facilitar um processo de autorização.
DE602006012935D1 (de) Vorrichtung zur signaturgenerierung, vorrichtung zur schlüsselgenerierung und verfahren zur signaturgenerierung
NO20055085D0 (no) A method and system for testing a control system for a petroleum process plant
BRPI1008357A2 (pt) dispositivo de autenticação, método de autenticação, e programa para execução deste por computador
DE602007001640D1 (de) Informationsverarbeitungsvorrichtung, Informationsverarbeitungsverfahren und Programm
DE602008004986D1 (de) Vorrichtung, Verfahren und Computerprogramm zur Bestimmung des Belegtzustands eines Parkplatzes
HK1138098A1 (en) Encryption device, encryption method, and computer program
DE602007001104D1 (de) Vorrichtung, Verfahren und Programm zur Bewegungserfassung
FI20060223A (fi) Menetelmä, järjestelmä ja tietokoneohjelmatuote mittauslaitteen paikantamiseksi ja suurten kappaleiden mittaamiseksi
EP2116952A4 (de) Informationsprozessor mit verriegelungsfunktion, verriegelungs-(entriegelungs-)verfahren für einen informationsprozessor und programm dafür
AT506603B1 (de) Verfahren und vorrichtung für eine giess-walz-verbundanlage
BRPI0811365A8 (pt) método, aparelho, dispositivo eletrônico e programa de computador para aumentar a segurança de senhas
DE602005026249D1 (de) Vorrichtung, Verfahren und Computerprogrammprodukt zur Schätzung von Sicherheitsinformationen
DE602006014598D1 (de) Vorrichtung zum detektieren eines taktausfalls und verfahren dafür
EP2058780A4 (de) Verschlüsselungsvorrichtung, verschlüsselungsverfahren und computerprogramm
DE602006007206D1 (de) Vorrichtung und Verfahren für eine Benutzerschnittstelle
DE602006014131D1 (de) Klassifikationswörterbuch-aktualisierungsvorrichtung, computerprogrammprodukt dafür und verfahren zu
DE602007001538D1 (de) Verschlüsselungsverarbeitungsvorrichtung, Verschlüsselungsverarbeitungsverfahren und Computerprogramm