AU6614600A - Systems and methods for using cryptography to protect secure and insecure computing environments - Google Patents

Systems and methods for using cryptography to protect secure and insecure computing environments

Info

Publication number
AU6614600A
AU6614600A AU66146/00A AU6614600A AU6614600A AU 6614600 A AU6614600 A AU 6614600A AU 66146/00 A AU66146/00 A AU 66146/00A AU 6614600 A AU6614600 A AU 6614600A AU 6614600 A AU6614600 A AU 6614600A
Authority
AU
Australia
Prior art keywords
cryptography
systems
methods
computing environments
protect secure
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU66146/00A
Inventor
W. Olin Sibert
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intertrust Technologies Corp
Original Assignee
Intertrust Technologies Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intertrust Technologies Corp filed Critical Intertrust Technologies Corp
Publication of AU6614600A publication Critical patent/AU6614600A/en
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2145Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
AU66146/00A 1999-07-29 2000-07-31 Systems and methods for using cryptography to protect secure and insecure computing environments Abandoned AU6614600A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US14642699P 1999-07-29 1999-07-29
US60146426 1999-07-29
PCT/US2000/020736 WO2001010076A2 (en) 1999-07-29 2000-07-31 Systems and methods for protecting secure and insecure computing environments using cryptography

Publications (1)

Publication Number Publication Date
AU6614600A true AU6614600A (en) 2001-02-19

Family

ID=22517306

Family Applications (1)

Application Number Title Priority Date Filing Date
AU66146/00A Abandoned AU6614600A (en) 1999-07-29 2000-07-31 Systems and methods for using cryptography to protect secure and insecure computing environments

Country Status (2)

Country Link
AU (1) AU6614600A (en)
WO (1) WO2001010076A2 (en)

Families Citing this family (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6157721A (en) 1996-08-12 2000-12-05 Intertrust Technologies Corp. Systems and methods using cryptography to protect secure computing environments
US5892900A (en) 1996-08-30 1999-04-06 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
EP1526472A3 (en) 1995-02-13 2006-07-26 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US6959384B1 (en) 1999-12-14 2005-10-25 Intertrust Technologies Corporation Systems and methods for authenticating and protecting the integrity of data streams and other data
US7430670B1 (en) 1999-07-29 2008-09-30 Intertrust Technologies Corp. Software self-defense systems and methods
US7124170B1 (en) 1999-08-20 2006-10-17 Intertrust Technologies Corp. Secure processing unit systems and methods
US7406603B1 (en) 1999-08-31 2008-07-29 Intertrust Technologies Corp. Data protection systems and methods
US6985885B1 (en) 1999-09-21 2006-01-10 Intertrust Technologies Corp. Systems and methods for pricing and selling digital goods
US6832316B1 (en) 1999-12-22 2004-12-14 Intertrust Technologies, Corp. Systems and methods for protecting data secrecy and integrity
US7085839B1 (en) 2000-04-07 2006-08-01 Intertrust Technologies Corporation Network content management
US7313692B2 (en) 2000-05-19 2007-12-25 Intertrust Technologies Corp. Trust management systems and methods
US7107448B1 (en) 2000-06-04 2006-09-12 Intertrust Technologies Corporation Systems and methods for governing content rendering, protection, and management applications
US7213266B1 (en) 2000-06-09 2007-05-01 Intertrust Technologies Corp. Systems and methods for managing and protecting electronic content and applications
US7050586B1 (en) 2000-06-19 2006-05-23 Intertrust Technologies Corporation Systems and methods for retrofitting electronic appliances to accept different content formats
JP4067757B2 (en) * 2000-10-31 2008-03-26 株式会社東芝 Program distribution system
US7580988B2 (en) 2001-04-05 2009-08-25 Intertrust Technologies Corporation System and methods for managing the distribution of electronic content
US7136840B2 (en) 2001-04-20 2006-11-14 Intertrust Technologies Corp. Systems and methods for conducting transactions and communications using a trusted third party
US7581103B2 (en) 2001-06-13 2009-08-25 Intertrust Technologies Corporation Software self-checking systems and methods
US7383570B2 (en) 2002-04-25 2008-06-03 Intertrust Technologies, Corp. Secure authentication systems and methods
US7149899B2 (en) 2002-04-25 2006-12-12 Intertrust Technologies Corp. Establishing a secure channel with a human user
US9818136B1 (en) 2003-02-05 2017-11-14 Steven M. Hoffberg System and method for determining contingent relevance
KR101030203B1 (en) 2003-06-05 2011-04-22 인터트러스트 테크놀로지즈 코포레이션 Interoperable systems and methods for peer-to-peer service orchestration
US7103779B2 (en) 2003-09-18 2006-09-05 Apple Computer, Inc. Method and apparatus for incremental code signing
US7590589B2 (en) 2004-09-10 2009-09-15 Hoffberg Steven M Game theoretic prioritization scheme for mobile ad hoc networks permitting hierarchal deference
GB2426837A (en) * 2005-06-01 2006-12-06 Hewlett Packard Development Co Checking the integrity of a software component
US8874477B2 (en) 2005-10-04 2014-10-28 Steven Mark Hoffberg Multifactorial optimization system and method
US9626667B2 (en) 2005-10-18 2017-04-18 Intertrust Technologies Corporation Digital rights management engine systems and methods
FR2895545B1 (en) * 2005-12-23 2008-05-30 Trusted Logic Sa METHOD FOR AUTHENTICATING APPLICATIONS OF A COMPUTER SYSTEM
US8364965B2 (en) 2006-03-15 2013-01-29 Apple Inc. Optimized integrity verification procedures
US7987514B2 (en) 2006-04-04 2011-07-26 Intertrust Technologies Corp. Systems and methods for retrofitting electronic appliances to accept different content formats
US7934197B2 (en) * 2006-12-19 2011-04-26 Telefonaktiebolaget Lm Ericsson (Publ) Maintaining code integrity in a central software development system
DE102006061935A1 (en) * 2006-12-29 2008-07-03 Robert Bosch Gmbh Method for protecting microcomputer from manipulation, involves determining multiple access levels for test software and test software is only executed on microcomputer at determined access level
EP2250604B1 (en) 2008-03-04 2017-12-27 Apple Inc. System and method of authorizing execution of software code based on at least one installed profile
US8639943B2 (en) * 2008-06-16 2014-01-28 Qualcomm Incorporated Methods and systems for checking run-time integrity of secure code cross-reference to related applications
CA2832752A1 (en) 2011-04-11 2012-10-18 Intertrust Technologies Corporation Information security systems and methods
CN115708339B (en) * 2021-08-20 2024-03-12 清华大学 Data processing method, device and storage medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE69521977T2 (en) * 1994-12-13 2002-04-04 Ibm Process and system for secure program distribution
US6108420A (en) * 1997-04-10 2000-08-22 Channelware Inc. Method and system for networked installation of uniquely customized, authenticable, and traceable software application
US6330549B1 (en) * 1997-10-30 2001-12-11 Xerox Corporation Protected shareware

Also Published As

Publication number Publication date
WO2001010076A2 (en) 2001-02-08
WO2001010076A3 (en) 2001-06-07

Similar Documents

Publication Publication Date Title
AU6614600A (en) Systems and methods for using cryptography to protect secure and insecure computing environments
AU3681597A (en) Systems and methods using cryptography to protect secure computing environments
AU2002359611A1 (en) Methods and systems for cryptographically protecting secure content
AU1606201A (en) Any-to-any component computing system
AU5514701A (en) Cryptographic isolator using multiplication
AU2003251505A1 (en) Layered computing systems and methods for insecure environments
AU3775999A (en) Computer security
AU3710200A (en) Globally time-synchronized systems, devices and methods
AU1327801A (en) Systems and methods for protecting private information
AU2002238153A1 (en) Multimedia and computing system
AU6799700A (en) Suitcase with compressible packing system
AU2001245580A1 (en) Fuel processor and systems and devices containing the same
AU8755698A (en) Systems and methods for protecting access to encrypted information
AU4145200A (en) Cyclic compounds and uses thereof
AU2585301A (en) System and method for trusted self-billing for utilities
AU2001255366A1 (en) Systems and methods for encrypting/decrypting data
AU7102998A (en) Data and access protection system for computers
AU2002239582A1 (en) Method and system to accelerate cryptographic functions for secure e-commerce applications using cpu and dsp to calculate the cryptographic functions
AU5730200A (en) Cryptographic processing system
AU2621301A (en) Computer generated poetry system
AU2211501A (en) Computer methods and systems for payment applications
AU1979001A (en) Cryptographic token and security system
AU5988999A (en) Silanes and polyorganosiloxanes with boronate function(s)
AU2003203649A1 (en) Systems and methods using cryptography to protect secure computing environments
AU3987100A (en) Computer system

Legal Events

Date Code Title Description
MK6 Application lapsed section 142(2)(f)/reg. 8.3(3) - pct applic. not entering national phase