Factbites
 Where results make sense
About us   |   Why use us?   |   Reviews   |   PR   |   Contact us  

Topic: Secure channel


Related Topics
SSH
Lsh

In the News (Wed 22 May 19)

  
  Secure channel - Wikipedia, the free encyclopedia
In cryptography, and particularly in analytic or academic discussions of it, a secure channel is a method or technique assumed to provide means by which data can be transferred from one place or user to another without risk of interception or tampering.
The analytic purpose is to presume something (the capability of such secure transfer) which does not bear directly on the instant discussion of, say, the cryptanalytic vulnerability of a new block cipher design or a new digital signature protocol proposal.
None are known to be unconditionally secure, which is precisely what the "secure channel" of cryptography discussions is assumed to be.
en.wikipedia.org /wiki/Secure_channel   (532 words)

  
 Secure Shell - Wikipedia, the free encyclopedia
In computing, Secure Shell or SSH is both a computer program and an associated network protocol designed for logging into and executing commands on a networked computer.
This layer defines the concept of channels, channel requests and global requests using which SSH services are provided.
Channel requests are used to relay out-of-band channel specific data, such as the changed size of a terminal window or the exit code of a server-side process.
en.wikipedia.org /wiki/Secure_shell   (1497 words)

  
 Authentication process including setting up a secure channel between a subscriber and a service provider accessible ...   (Site not responding. Last check: 2007-11-07)
Security through data transfers through one or several telecommunications networks is accomplished by providing a data transfer process through a secure channel that enables a subscriber and a service provider to communicate in the secure manner without any action by, or even unknown to, the subscriber's attachment network operator.
According to the invention, setting up a secure channel requires that the subscriber should be firstly registered with the service provider, and that the operator has transmitted data for subscriber/service provider identification and authentication to the service provider, to be used when setting up communication sessions later on.
On the other hand, the secure channel is set up and used without any action by the subscriber's network operator, except obviously to transport the communication itself which remains undecrypted and undecryptable by the operator since the secret elements are only known to the subscriber and the service provider.
www.patentstorm.us /patents/6745326.html   (5721 words)

  
 * Secure channel - (Computing): Definition   (Site not responding. Last check: 2007-11-07)
Secure Channel - A security service provider modules that sits on top of the Microsoft® crypto API, and implements the public key encryption between a client and the server.
secure way prior to any use of the system (the term usually used is 'via a secure channel') such as a trustworthy courier with a briefcase handcuffed to...
Digital signatures are often used in combination with strong-encryption software to create a secure channel of communication in which both privacy and identity are protected...
www.mimihu.com /computing/secure_channel.html   (141 words)

  
 2005 06 21: Entrust Congratulates Government of Canada on Its Information Security Achievements
By providing a common infrastructure to enable service integration, the Secure Channel has proven to be crucial to citizen adoption and service growth of the GOL Initiative, and has been a factor in Accenture* ranking the Government of Canada the number-one global e-government five years consecutively.
The Secure Channel Project is a multi-departmental, public and private sector effort to build a common security infrastructure for government electronic business and service delivery.
The Secure Channel is built upon Entrust security solutions and PKI infrastructure and provides the foundation to maintain and promote user confidence in the privacy and security of their personal information when conducting e-government transactions.
www.entrust.com /news/2005/6126_6262.htm   (903 words)

  
 Secure Networking: Windows 2000 Distributed Security Services
Secure channel services are based on public-key certificates issued by trusted Certificate Authorities; they do not require an online authentication server.
Secure Socket Layer and Transport Layer Security are public-key-based security protocols implemented by the Secure Channel (Schannel) security provider.
All of the security protocols rely on some form of user credentials, which are presented to a server when a connection is established.
www.microsoft.com /technet/itsolutions/network/security/distsec.mspx   (9369 words)

  
 Secure channel manipulation with TCP/IP
There are several processes on a Windows NT network that require workstations and servers to establish a secure channel with a domain controller.
A common misconception is that this secure channel will be formed with the nearest domain controller.
This is rarely desirable, and, therefore, it becomes necessary to attempt to control the formation of secure channels.
support.microsoft.com /support/kb/articles/q181/1/71.asp   (1291 words)

  
 Press Release
While secure channel protocols such as SSL encrypt data passing along the network between a client system and a server, Secure Courier delivers the additional security of keeping the financial data encrypted -- or in a "secure digital envelope" -- when it arrives at a merchant's server or at other intermediate points on the net.
Secure Courier is fully compatible with SSL, an open security protocol that incorporates RSA Data Security technology for securing data communicationsacross networks.
SSLis application protocol-independent and provides encryption, which creates a secured channel to prevent others from tapping into the network; authentication, which uses certificates and digital signatures to verify the identity of parties in information exchanges and transactions; and message integrity, which ensures that messages cannot be altered en route.
wp.netscape.com /newsref/pr/newsrelease33.html   (882 words)

  
 Guardian Unlimited | The Guardian | Channel 4 looks at takeover of Radio 1
Channel 4 is also considering whether to bid for UKTV, the joint venture run by the BBC and cable operator Flextech, which includes channels such as UK Gold and UK History.
If Channel 4 were to run Radio 1, it would not take advertisements, as this would be opposed by the under-pressure commercial radio sector, but it could be free to exploit lucrative sponsorship deals.
Channel 4 is still pursuing other interests in radio: it recently signed a development deal with UBC Media, the largest independent radio production company in the UK and owner of digital station Classic Gold.
www.guardian.co.uk /uk_news/story/0,3604,1312462,00.html   (766 words)

  
 Secure channel: Digitally encrypt or sign secure channel data (always) (Windows 2000 Group Policy Reference)   (Site not responding. Last check: 2007-11-07)
Thereafter, when the system boots, it uses the password for that account to create a secure channel with the domain controller for its domain.
Requests sent on the secure channel are authenticated, and sensitive information (such as passwords) is encrypted, but the channel is not integrity checked and not all information is encrypted.
If this parameter is enabled, then Secure channel: Digitally sign secure channel data (when possible) is automatically enabled.
msdn.microsoft.com /library/en-us/gp/587.asp?frame=true   (190 words)

  
 Secure Channel Privacy Impact Assessment 5 / 11   (Site not responding. Last check: 2007-11-07)
As epass becomes operational, there is no indication as to the responsibilities for ongoing privacy impact assessment management or for dealing with privacy issues if they do arise.
There is no specific assignment of responsibilities as to who will initiate a privacy review when there is a further refinement of the functionality of the Secure Channel when further applications are "added" to the Secure channel in future Builds.
That criteria should be established for privacy reviews when further refinements of the functionality of the Secure Channel occur.
www.gol-ged.gc.ca /progres/pia-evp/pia-evp05_e.asp   (159 words)

  
 02 Jul 2001: Entrust Awarded Largest Contract in its History by BCE Nexxia to Deliver "Enhanced Internet ...
Secure Channel will help transform the way Canadians access and use government services by providing secure access to key government services and information anytime and from nearly anywhere.
The solution, called the "Secure Channel", represents a major step in the Government of Canada's plan to become a world leader in electronic service delivery.
The Secure Channel is designed to allow Canadian citizens and businesses to access a wide range of different government services electronically.
www.entrust.com /news/files/07_02_01_753.htm   (990 words)

  
 PWGSC - Fact Sheets - Secure Channel   (Site not responding. Last check: 2007-11-07)
Secure Channel is a portfolio of services that forms the foundation of the Government of Canada's (GoC) Government On-line (GOL) initiative.
Secure Channel's primary goals are to provide citizens and businesses with secure, private and high-speed access to all federal government's on-line services, and to provide an environment that enables and encourages departments to integrate with federated common services.
Secure Channel is also proud to report it successfully delivered an on-line option for Statistics Canada's Census Test.
www.pwgsc.gc.ca /text/factsheets/secure_channel-e.html   (1098 words)

  
 Hardware is secure (false) | Channel Register
Hardware devices are far from a panacea for information security problems but users are continuing to place too much faith in marketing claims to the contrary, the Black Hat conference was told this week.
For example, biometric systems are reckoned to be more secure than systems that use passwords, but physical characteristics are hard to keep secret.
Security through obscurity is still widely practiced in hardware design but hiding something does not make the problem go away, Grand said.
go.theregister.com /feed/2005/04/01/hw_not_secure   (612 words)

  
 A Calculus for Secure Channel Establishment in Open Networks - Maurer, Schmid (ResearchIndex)   (Site not responding. Last check: 2007-11-07)
This paper presents a calculus of channel security properties which allows to analyze and compare protocols for establishing secure channels in an insecure open network at a high level of abstraction.
A channel is characterized by its direction, time of availability and its security properties.
Cryptographic primitives and trust relations are interpreted as transformations for channel security properties, and cryptographic protocols can be viewed as combinations of such transformations.
citeseer.ist.psu.edu /127168.html   (560 words)

  
 kbAlertz: SUMMARY For each Windows 2000 or Windows XP workstation or server that is a member of a domain, there is a ...
For each Windows 2000 or Windows XP workstation or server that is a member of a domain, there is a discrete communication channel, known as the security channel, with a domain controller.
The security channel's password is stored along with the computer account on all domain controllers.
The security channel is used by the Netlogon service on the member and on the domain controller to communicate.
www.kbalertz.com /kb_Q216393.aspx   (969 words)

  
 Secure channel   (Site not responding. Last check: 2007-11-07)
There are, at best, only ways to make insecure channels (eg, couriers, carrier pigeons, diplomatic bags, etc) less insecure.
It is important to note that many cryptographic techniques are trivially breakable if keys are not exchanged securely or, if they actually were so exchanged, if those keys become known in some other way -- burglary, for instance.
Researchers have proposed, and actually demonstrated in real circumstances, and there is at least one commercial company offering a product embodying it, quantum cryptography.
www.sciencedaily.com /encyclopedia/secure_channel   (505 words)

  
 Microsoft Windows XP - Domain member: Digitally encrypt or sign secure channel data (always)
Determines whether a secure channel can be established with a domain controller that is not capable of signing or encrypting all secure channel traffic.
If this setting is enabled, a secure channel cannot be established with any domain controller that cannot sign or encrypt all secure channel data.
If this setting is disabled, a secure channel can be established, but the level of encryption and signing is negotiated.
www.jp.microsoft.com /resources/documentation/windows/xp/all/proddocs/en-us/587.mspx   (207 words)

  
 Zvon - RFC 2356 [Sun's SKIP Firewall Traversal for Mobile IP] - Supporting Mobile IP: Secure Channel Configurations
The reason is that this alternative is probably not very popular with computer security personnel, because authentication is not carried out by the firewall but by the home agent, and the latter's security is potentially much weaker than the former's.
On the public network, encryption is dictated by a security association between the mobile node and the firewall.
Since the firewall is party to the security associations governing encryption on both the public and private networks, it is always able to inspect the traffic being exchanged by the home agent and the mobile node.
www.zvon.org /tmRFC/RFC2356/Output/chapter6.html   (840 words)

  
 Print - What's a Secure Channel   (Site not responding. Last check: 2007-11-07)
Think of a secure channel as the enabler of secure communication between machines and their trusted authority in the same domain, and between the trusted authorities of different domains.
Secure in this context means providing authentication of the requestor and confidentiality, integrity, and data-authentication services for the data sent across the channel.
A secure channel enables secure replication of the SAM data between the DCs of an NT domain.
www.windowsitpro.com /Articles/Print.cfm?ArticleID=20101   (433 words)

  
 Creating a Secure Channel   (Site not responding. Last check: 2007-11-07)
Although the user does not need to be a member of a Windows NT group, he or she must use a password to join every channel of this type.
This is the simplest but least secure method for limiting access to a channel.
To join the channel, the user's identity must be verified using some form of authentication.
digit.hdtv.pl /ecshelp/coc03_5.htm   (181 words)

  
 Windows NT PDC Handles All Secure Channel/Authentication Requests for Windows 2000 Domain Members (309115)   (Site not responding. Last check: 2007-11-07)
Because of this, all Windows 2000-based clients that join a Windows NT 4.0 domain establish a secure channel with the PDC on the first boot after the domain join operation.
Netlogon is notified by the registry and it (Netlogon) deletes the cached information so that next time Netlogon establishes the secure channel, the domain member will use a generic DC that is discovered through the 1C query in WINS.
Because of this, Netlogon is stuck using the PDC that uses a Windows NT 4.0 computer for its secure channel.
www.sunsite.org.uk /sites/ftp.microsoft.com/MISC/KB/en-us/309/115.HTM   (696 words)

  
 cpsch13
A human being that is affiliated with an organization (i) as an officer, director, employee, partner, contractor, intern, or other person within the organization, or (ii) as a person maintaining a contractual relationship with the organization where the organization has business records providing strong assurances of the identity of such person.
A hardware security token containing a user's private key(s), public key certificate, and, optionally, a cache of other certificates, including all certificates in the user's certification chain.
Computer hardware, software, and procedures that are reasonably secure from intrusion and misuse; provide a reasonable level of availability, reliability, and correct operation; are reasonably suited to performing their intended functions; and enforce the applicable security policy.
www.verisign.com /repository/CPS/CPSCH13.HTM   (5227 words)

  
 VeriSign Certification Practice Statement
(i) The mathematical science used to secure the confidentiality and authentication of data by replacing it with a transformed version that can be reconverted to reveal the original data only by someone holding the proper cryptographic algorithm and key.
Absolute security is impossible to achieve in practice and the quality of a given security system is relative.
Within a state-model security system, security is a specific "state" to be preserved under various operations.
verisign.com /repository/CPS1.0/CPSCH13.HTM   (4594 words)

  
 A Calculus for Secure Channel Establishment in Open Networks
Abstract : This paper presents a calculus of channel security properties which allows to analyse and compare protocols for establishing secure channels in a insecure open network at a high level of abstraction.
A protocol thus allows to transform a set of secure channels established during an initial setup phase, together with a set of secure channels specified by the security requirements.
The necessary and sufficient requirements for establishing a secure channels between two entities are characterized in terms of secure channels to be made available during the initial setup phase and in terms of trust relations between users and/or between users and trusted authorities.
www.laas.fr /~esorics/notices/MS94.html   (182 words)

  
 JSI Tip 0478 - Logon failures on BDC due to secure channel problem.   (Site not responding. Last check: 2007-11-07)
JSI Tip 0478 - Logon failures on BDC due to secure channel problem.
If the NetLogon service on the BDC cannot start due to a secure channel problems, NETDOM is the simplest solution.
The BDC \\JSIBDCn secure channel was reset successfully.
www.jsifaq.com /subA/tip0400/rh0478.htm   (165 words)

  
 Using Secure Communications (P&M)   (Site not responding. Last check: 2007-11-07)
Clear channel transmissions are faster than encrypted transmissions, but are less secure.
The decision to use secure communication should be weighed relative to throughput time requirements vs. the level of security needed.
To use secure communications, you must first enable the SSL port on the server to receive communications.
www.ppg.com /siteserver/docs/pm_ops01_juay.htm   (237 words)

Try your search on: Qwika (all wikis)

Factbites
  About us   |   Why use us?   |   Reviews   |   Press   |   Contact us  
Copyright © 2005-2007 www.factbites.com Usage implies agreement with terms.