AU6614600A - Systems and methods for using cryptography to protect secure and insecure computing environments - Google Patents
Systems and methods for using cryptography to protect secure and insecure computing environmentsInfo
- Publication number
- AU6614600A AU6614600A AU66146/00A AU6614600A AU6614600A AU 6614600 A AU6614600 A AU 6614600A AU 66146/00 A AU66146/00 A AU 66146/00A AU 6614600 A AU6614600 A AU 6614600A AU 6614600 A AU6614600 A AU 6614600A
- Authority
- AU
- Australia
- Prior art keywords
- cryptography
- systems
- methods
- computing environments
- protect secure
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2145—Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14642699P | 1999-07-29 | 1999-07-29 | |
US60146426 | 1999-07-29 | ||
PCT/US2000/020736 WO2001010076A2 (en) | 1999-07-29 | 2000-07-31 | Systems and methods for protecting secure and insecure computing environments using cryptography |
Publications (1)
Publication Number | Publication Date |
---|---|
AU6614600A true AU6614600A (en) | 2001-02-19 |
Family
ID=22517306
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU66146/00A Abandoned AU6614600A (en) | 1999-07-29 | 2000-07-31 | Systems and methods for using cryptography to protect secure and insecure computing environments |
Country Status (2)
Country | Link |
---|---|
AU (1) | AU6614600A (en) |
WO (1) | WO2001010076A2 (en) |
Families Citing this family (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6157721A (en) | 1996-08-12 | 2000-12-05 | Intertrust Technologies Corp. | Systems and methods using cryptography to protect secure computing environments |
US5892900A (en) | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
EP1526472A3 (en) | 1995-02-13 | 2006-07-26 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US6959384B1 (en) | 1999-12-14 | 2005-10-25 | Intertrust Technologies Corporation | Systems and methods for authenticating and protecting the integrity of data streams and other data |
US7430670B1 (en) | 1999-07-29 | 2008-09-30 | Intertrust Technologies Corp. | Software self-defense systems and methods |
US7124170B1 (en) | 1999-08-20 | 2006-10-17 | Intertrust Technologies Corp. | Secure processing unit systems and methods |
US7406603B1 (en) | 1999-08-31 | 2008-07-29 | Intertrust Technologies Corp. | Data protection systems and methods |
US6985885B1 (en) | 1999-09-21 | 2006-01-10 | Intertrust Technologies Corp. | Systems and methods for pricing and selling digital goods |
US6832316B1 (en) | 1999-12-22 | 2004-12-14 | Intertrust Technologies, Corp. | Systems and methods for protecting data secrecy and integrity |
US7085839B1 (en) | 2000-04-07 | 2006-08-01 | Intertrust Technologies Corporation | Network content management |
US7313692B2 (en) | 2000-05-19 | 2007-12-25 | Intertrust Technologies Corp. | Trust management systems and methods |
US7107448B1 (en) | 2000-06-04 | 2006-09-12 | Intertrust Technologies Corporation | Systems and methods for governing content rendering, protection, and management applications |
US7213266B1 (en) | 2000-06-09 | 2007-05-01 | Intertrust Technologies Corp. | Systems and methods for managing and protecting electronic content and applications |
US7050586B1 (en) | 2000-06-19 | 2006-05-23 | Intertrust Technologies Corporation | Systems and methods for retrofitting electronic appliances to accept different content formats |
JP4067757B2 (en) * | 2000-10-31 | 2008-03-26 | 株式会社東芝 | Program distribution system |
US7580988B2 (en) | 2001-04-05 | 2009-08-25 | Intertrust Technologies Corporation | System and methods for managing the distribution of electronic content |
US7136840B2 (en) | 2001-04-20 | 2006-11-14 | Intertrust Technologies Corp. | Systems and methods for conducting transactions and communications using a trusted third party |
US7581103B2 (en) | 2001-06-13 | 2009-08-25 | Intertrust Technologies Corporation | Software self-checking systems and methods |
US7383570B2 (en) | 2002-04-25 | 2008-06-03 | Intertrust Technologies, Corp. | Secure authentication systems and methods |
US7149899B2 (en) | 2002-04-25 | 2006-12-12 | Intertrust Technologies Corp. | Establishing a secure channel with a human user |
US9818136B1 (en) | 2003-02-05 | 2017-11-14 | Steven M. Hoffberg | System and method for determining contingent relevance |
KR101030203B1 (en) | 2003-06-05 | 2011-04-22 | 인터트러스트 테크놀로지즈 코포레이션 | Interoperable systems and methods for peer-to-peer service orchestration |
US7103779B2 (en) | 2003-09-18 | 2006-09-05 | Apple Computer, Inc. | Method and apparatus for incremental code signing |
US7590589B2 (en) | 2004-09-10 | 2009-09-15 | Hoffberg Steven M | Game theoretic prioritization scheme for mobile ad hoc networks permitting hierarchal deference |
GB2426837A (en) * | 2005-06-01 | 2006-12-06 | Hewlett Packard Development Co | Checking the integrity of a software component |
US8874477B2 (en) | 2005-10-04 | 2014-10-28 | Steven Mark Hoffberg | Multifactorial optimization system and method |
US9626667B2 (en) | 2005-10-18 | 2017-04-18 | Intertrust Technologies Corporation | Digital rights management engine systems and methods |
FR2895545B1 (en) * | 2005-12-23 | 2008-05-30 | Trusted Logic Sa | METHOD FOR AUTHENTICATING APPLICATIONS OF A COMPUTER SYSTEM |
US8364965B2 (en) | 2006-03-15 | 2013-01-29 | Apple Inc. | Optimized integrity verification procedures |
US7987514B2 (en) | 2006-04-04 | 2011-07-26 | Intertrust Technologies Corp. | Systems and methods for retrofitting electronic appliances to accept different content formats |
US7934197B2 (en) * | 2006-12-19 | 2011-04-26 | Telefonaktiebolaget Lm Ericsson (Publ) | Maintaining code integrity in a central software development system |
DE102006061935A1 (en) * | 2006-12-29 | 2008-07-03 | Robert Bosch Gmbh | Method for protecting microcomputer from manipulation, involves determining multiple access levels for test software and test software is only executed on microcomputer at determined access level |
EP2250604B1 (en) | 2008-03-04 | 2017-12-27 | Apple Inc. | System and method of authorizing execution of software code based on at least one installed profile |
US8639943B2 (en) * | 2008-06-16 | 2014-01-28 | Qualcomm Incorporated | Methods and systems for checking run-time integrity of secure code cross-reference to related applications |
CA2832752A1 (en) | 2011-04-11 | 2012-10-18 | Intertrust Technologies Corporation | Information security systems and methods |
CN115708339B (en) * | 2021-08-20 | 2024-03-12 | 清华大学 | Data processing method, device and storage medium |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE69521977T2 (en) * | 1994-12-13 | 2002-04-04 | Ibm | Process and system for secure program distribution |
US6108420A (en) * | 1997-04-10 | 2000-08-22 | Channelware Inc. | Method and system for networked installation of uniquely customized, authenticable, and traceable software application |
US6330549B1 (en) * | 1997-10-30 | 2001-12-11 | Xerox Corporation | Protected shareware |
-
2000
- 2000-07-31 WO PCT/US2000/020736 patent/WO2001010076A2/en active Application Filing
- 2000-07-31 AU AU66146/00A patent/AU6614600A/en not_active Abandoned
Also Published As
Publication number | Publication date |
---|---|
WO2001010076A2 (en) | 2001-02-08 |
WO2001010076A3 (en) | 2001-06-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU6614600A (en) | Systems and methods for using cryptography to protect secure and insecure computing environments | |
AU3681597A (en) | Systems and methods using cryptography to protect secure computing environments | |
AU2002359611A1 (en) | Methods and systems for cryptographically protecting secure content | |
AU1606201A (en) | Any-to-any component computing system | |
AU5514701A (en) | Cryptographic isolator using multiplication | |
AU2003251505A1 (en) | Layered computing systems and methods for insecure environments | |
AU3775999A (en) | Computer security | |
AU3710200A (en) | Globally time-synchronized systems, devices and methods | |
AU1327801A (en) | Systems and methods for protecting private information | |
AU2002238153A1 (en) | Multimedia and computing system | |
AU6799700A (en) | Suitcase with compressible packing system | |
AU2001245580A1 (en) | Fuel processor and systems and devices containing the same | |
AU8755698A (en) | Systems and methods for protecting access to encrypted information | |
AU4145200A (en) | Cyclic compounds and uses thereof | |
AU2585301A (en) | System and method for trusted self-billing for utilities | |
AU2001255366A1 (en) | Systems and methods for encrypting/decrypting data | |
AU7102998A (en) | Data and access protection system for computers | |
AU2002239582A1 (en) | Method and system to accelerate cryptographic functions for secure e-commerce applications using cpu and dsp to calculate the cryptographic functions | |
AU5730200A (en) | Cryptographic processing system | |
AU2621301A (en) | Computer generated poetry system | |
AU2211501A (en) | Computer methods and systems for payment applications | |
AU1979001A (en) | Cryptographic token and security system | |
AU5988999A (en) | Silanes and polyorganosiloxanes with boronate function(s) | |
AU2003203649A1 (en) | Systems and methods using cryptography to protect secure computing environments | |
AU3987100A (en) | Computer system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MK6 | Application lapsed section 142(2)(f)/reg. 8.3(3) - pct applic. not entering national phase |