IN2014CN00388A - - Google Patents
Info
- Publication number
- IN2014CN00388A IN2014CN00388A IN388CHN2014A IN2014CN00388A IN 2014CN00388 A IN2014CN00388 A IN 2014CN00388A IN 388CHN2014 A IN388CHN2014 A IN 388CHN2014A IN 2014CN00388 A IN2014CN00388 A IN 2014CN00388A
- Authority
- IN
- India
- Prior art keywords
- secure
- data
- mobile device
- methods
- devices
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
- H04W12/082—Access security using revocation of authorisation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/35—Protecting application or service provisioning, e.g. securing SIM application provisioning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/37—Managing security policies for mobile devices or for controlling mobile applications
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
Methods and devices provide a secure virtual environment within a mobile device for processing documents and conducting secure activities. The methods and devices create a secure application environment in which secure data and documents may be segregated from unsecured data using document encryption allowing the application of security policies to only the secure application environment. The creation of a secure application environment allows users to access and manipulate secure data on any mobile device not just specifically designated secure devices without having to secure all data on the mobile device while providing the corporate entity with necessary document security. The methods and devices provide for securing data on a mobile device at the data level using encryption.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/207,134 US8949929B2 (en) | 2011-08-10 | 2011-08-10 | Method and apparatus for providing a secure virtual environment on a mobile device |
PCT/US2012/050440 WO2013023179A1 (en) | 2011-08-10 | 2012-08-10 | Method and apparatus for providing a secure virtual environment on a mobile device |
Publications (1)
Publication Number | Publication Date |
---|---|
IN2014CN00388A true IN2014CN00388A (en) | 2015-04-03 |
Family
ID=46750474
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
IN388CHN2014 IN2014CN00388A (en) | 2011-08-10 | 2012-08-10 |
Country Status (7)
Country | Link |
---|---|
US (1) | US8949929B2 (en) |
EP (1) | EP2742710B1 (en) |
JP (1) | JP6014671B2 (en) |
KR (1) | KR101571641B1 (en) |
CN (2) | CN103733663A (en) |
IN (1) | IN2014CN00388A (en) |
WO (1) | WO2013023179A1 (en) |
Families Citing this family (90)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8650620B2 (en) | 2010-12-20 | 2014-02-11 | At&T Intellectual Property I, L.P. | Methods and apparatus to control privileges of mobile device applications |
US9339727B2 (en) | 2011-06-15 | 2016-05-17 | Microsoft Technology Licensing, Llc | Position-based decision to provide service |
US8843764B2 (en) | 2011-07-15 | 2014-09-23 | Cavium, Inc. | Secure software and hardware association technique |
US8700709B2 (en) | 2011-07-29 | 2014-04-15 | Microsoft Corporation | Conditional location-based reminders |
US20130045729A1 (en) * | 2011-08-17 | 2013-02-21 | Microsoft Corporation | Location-based promotion of applications |
US8898459B2 (en) | 2011-08-31 | 2014-11-25 | At&T Intellectual Property I, L.P. | Policy configuration for mobile device applications |
US8918841B2 (en) * | 2011-08-31 | 2014-12-23 | At&T Intellectual Property I, L.P. | Hardware interface access control for mobile applications |
US9489541B2 (en) * | 2011-09-09 | 2016-11-08 | Nvidia Corporation | Content protection via online servers and code execution in a secure operating system |
US10165007B2 (en) * | 2011-09-15 | 2018-12-25 | Microsoft Technology Licensing, Llc | Securing data usage in computing devices |
US9280377B2 (en) | 2013-03-29 | 2016-03-08 | Citrix Systems, Inc. | Application with multiple operation modes |
US8869235B2 (en) | 2011-10-11 | 2014-10-21 | Citrix Systems, Inc. | Secure mobile browser for protecting enterprise data |
US9215225B2 (en) * | 2013-03-29 | 2015-12-15 | Citrix Systems, Inc. | Mobile device locking with context |
US8832799B2 (en) * | 2011-10-31 | 2014-09-09 | Motorola Mobility Llc | Methods and apparatuses for hybrid desktop environment data usage authentication |
US8893261B2 (en) | 2011-11-22 | 2014-11-18 | Vmware, Inc. | Method and system for VPN isolation using network namespaces |
KR101947651B1 (en) * | 2012-03-21 | 2019-02-13 | 삼성전자주식회사 | Trusted Mobile Web Client and Web Server System |
US20130254906A1 (en) * | 2012-03-22 | 2013-09-26 | Cavium, Inc. | Hardware and Software Association and Authentication |
EP2836968B1 (en) | 2012-04-13 | 2020-05-06 | OLogN Technologies AG | Apparatuses, methods and systems for computer-based secure transactions |
TW201349009A (en) | 2012-04-13 | 2013-12-01 | Ologn Technologies Ag | Secure zone for digital communications |
TW201403375A (en) | 2012-04-20 | 2014-01-16 | 歐樂岡科技公司 | Secure zone for secure purchases |
CN103596170A (en) * | 2012-08-17 | 2014-02-19 | 中兴通讯股份有限公司 | Method and system employing SIM card to encrypt terminal |
US20140108558A1 (en) | 2012-10-12 | 2014-04-17 | Citrix Systems, Inc. | Application Management Framework for Secure Data Sharing in an Orchestration Framework for Connected Devices |
US9774658B2 (en) | 2012-10-12 | 2017-09-26 | Citrix Systems, Inc. | Orchestration framework for connected devices |
US8910239B2 (en) | 2012-10-15 | 2014-12-09 | Citrix Systems, Inc. | Providing virtualized private network tunnels |
US9971585B2 (en) | 2012-10-16 | 2018-05-15 | Citrix Systems, Inc. | Wrapping unmanaged applications on a mobile device |
US20140108793A1 (en) | 2012-10-16 | 2014-04-17 | Citrix Systems, Inc. | Controlling mobile device access to secure data |
CN104854561B (en) | 2012-10-16 | 2018-05-11 | 思杰系统有限公司 | Application program for application management framework encapsulates |
EP2914942B1 (en) | 2012-11-02 | 2023-06-14 | Variable Inc. | Computer-implemented system and method for color sensing, storage and comparison |
US20140173692A1 (en) * | 2012-12-15 | 2014-06-19 | Sudharshan Srinivasan | Bring your own device system using a mobile accessory device |
US20140282543A1 (en) * | 2013-03-15 | 2014-09-18 | Ologn Technologies Ag | Secure zone on a virutal machine for digital communications |
CA2902292A1 (en) | 2013-03-15 | 2014-09-18 | Ologn Technologies Ag | Systems, methods and apparatuses for securely storing and providing payment information |
US8849978B1 (en) | 2013-03-29 | 2014-09-30 | Citrix Systems, Inc. | Providing an enterprise application store |
US9985850B2 (en) * | 2013-03-29 | 2018-05-29 | Citrix Systems, Inc. | Providing mobile device management functionalities |
US10284627B2 (en) | 2013-03-29 | 2019-05-07 | Citrix Systems, Inc. | Data management for an application with multiple operation modes |
US9355223B2 (en) | 2013-03-29 | 2016-05-31 | Citrix Systems, Inc. | Providing a managed browser |
KR102095912B1 (en) * | 2013-05-15 | 2020-04-02 | 삼성전자 주식회사 | Operating Method of Secure Indicator and Electronic Device supporting the same |
US9927995B2 (en) * | 2013-06-19 | 2018-03-27 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and an integrated circuit for executing a trusted application within a trusted runtime environment |
WO2015015473A1 (en) | 2013-08-02 | 2015-02-05 | Ologn Technologies Ag | A secure server on a system with virtual machines |
US9674323B1 (en) * | 2013-08-29 | 2017-06-06 | Variable, Inc. | Modular multi-functional device, method, and system |
EP2851833B1 (en) * | 2013-09-20 | 2017-07-12 | Open Text S.A. | Application Gateway Architecture with Multi-Level Security Policy and Rule Promulgations |
US10116697B2 (en) | 2013-09-20 | 2018-10-30 | Open Text Sa Ulc | System and method for geofencing |
US10824756B2 (en) | 2013-09-20 | 2020-11-03 | Open Text Sa Ulc | Hosted application gateway architecture with multi-level security policy and rule promulgations |
US9218494B2 (en) | 2013-10-16 | 2015-12-22 | Citrix Systems, Inc. | Secure client drive mapping and file storage system for mobile device management type security |
US9342331B2 (en) * | 2013-10-21 | 2016-05-17 | International Business Machines Corporation | Secure virtualized mobile cellular device |
US9729551B1 (en) * | 2013-11-26 | 2017-08-08 | Mobile Iron, Inc. | Virtual mailbox |
US9785794B2 (en) * | 2013-12-12 | 2017-10-10 | Citrix Systems, Inc. | Securing sensitive data on a mobile device |
US8886933B1 (en) * | 2013-12-17 | 2014-11-11 | Google Inc. | Streamlined provisioning and configuration of computing devices |
US9832172B2 (en) | 2013-12-24 | 2017-11-28 | Intel Corporation | Content protection for data as a service (DaaS) |
US9311484B2 (en) | 2014-01-09 | 2016-04-12 | International Business Machines Corporation | Enhanced security and resource utilization in a multi-operating system environment |
US9697374B2 (en) * | 2014-02-19 | 2017-07-04 | Microsoft Technology Licensing, Llc | Data proxy service |
US9760710B2 (en) * | 2014-02-28 | 2017-09-12 | Sap Se | Password recovering for mobile applications |
WO2015143554A1 (en) * | 2014-03-24 | 2015-10-01 | TrustPoint Innovation Technologies, Ltd. | Management and distribution of security policies in a communication system |
US9521116B2 (en) * | 2014-06-11 | 2016-12-13 | Verizon Patent And Licensing Inc. | Apparatus, method, and system for securing a public wireless network |
US9715597B2 (en) * | 2014-09-25 | 2017-07-25 | Mcafee, Inc. | Data verification using enclave attestation |
US9785999B2 (en) * | 2014-10-02 | 2017-10-10 | Coupa Software Incorporated | Providing access to a networked application without authentication |
US9507951B2 (en) * | 2014-10-20 | 2016-11-29 | Intel Corporation | Technologies for secure input and display of virtual touch user interfaces |
CN104331667B (en) * | 2014-10-24 | 2018-10-26 | 宇龙计算机通信科技(深圳)有限公司 | Data save method based on dual system and system |
US9767324B2 (en) * | 2014-11-22 | 2017-09-19 | Intel Corporation | Transparent execution of secret content |
CN105762928B (en) * | 2014-12-15 | 2019-07-26 | 国家电网公司 | A kind of energy-accumulating power station monitoring system |
CN107873079B (en) | 2015-05-01 | 2019-08-02 | 变量公司 | Intelligence is to Barebone and for the method for colored sensing device |
BR102015015270B1 (en) * | 2015-06-24 | 2022-11-29 | Samsung Eletrônica Da Amazônia Ltda | METHOD FOR PROVIDING A SECURITY MODE FOR MOBILE DEVICE APPLICATIONS |
US11593075B2 (en) | 2015-11-03 | 2023-02-28 | Open Text Sa Ulc | Streamlined fast and efficient application building and customization systems and methods |
KR102088290B1 (en) * | 2016-01-07 | 2020-03-12 | 한국전자통신연구원 | Method of providing trusted service based on security area and apparatus using the same |
US10419401B2 (en) * | 2016-01-08 | 2019-09-17 | Capital One Services, Llc | Methods and systems for securing data in the public cloud |
US11797706B2 (en) * | 2016-02-09 | 2023-10-24 | Health2047, Inc. | Mobile device network traffic modification and user based restrictions on data access |
DE102016210788B4 (en) * | 2016-02-18 | 2023-06-07 | Volkswagen Aktiengesellschaft | Component for processing data worthy of protection and method for implementing a security function for protecting data worthy of protection in such a component |
US11388037B2 (en) | 2016-02-25 | 2022-07-12 | Open Text Sa Ulc | Systems and methods for providing managed services |
US10498726B2 (en) * | 2016-03-22 | 2019-12-03 | International Business Machines Corporation | Container independent secure file system for security application containers |
US9769131B1 (en) * | 2016-08-02 | 2017-09-19 | Architecture Technology Corporation | Fast reconfiguring environment for mobile computing devices |
US10592639B2 (en) | 2016-09-06 | 2020-03-17 | Intel Corporation | Blockchain-based shadow images to facilitate copyright protection of digital content |
GB2555569B (en) * | 2016-10-03 | 2019-06-12 | Haddad Elias | Enhanced computer objects security |
US10574689B1 (en) * | 2016-10-06 | 2020-02-25 | Hoyos Vsn Corp. | Mitigating mobile OS intrusions from user space applications using secure services and biometric identification |
US10733284B2 (en) * | 2016-10-06 | 2020-08-04 | Samsung Electronics Co., Ltd. | Trusted execution environment secure element communication |
JP2018106455A (en) * | 2016-12-27 | 2018-07-05 | 株式会社ケイエスジェイ | Built-in apparatus |
TWI673667B (en) * | 2017-01-25 | 2019-10-01 | 楊建綱 | Built-in smart security mobile device |
US11122013B2 (en) * | 2017-02-16 | 2021-09-14 | Emerald Cactus Ventures, Inc. | System and method for encrypting data interactions delineated by zones |
US11165825B2 (en) | 2017-02-16 | 2021-11-02 | Emerald Cactus Ventures, Inc. | System and method for creating encrypted virtual private network hotspot |
WO2018151851A1 (en) * | 2017-02-16 | 2018-08-23 | Tenta, Llc | System and method for establishing simultaneous encrypted virtual private networks from a single computing device |
CN110463163B (en) * | 2017-03-28 | 2022-08-05 | Netapp股份有限公司 | Method and system for providing wake-on-demand access to a session server |
GB2561396B (en) | 2017-04-13 | 2020-07-15 | Barclays Execution Services Ltd | Data security using two operating environments operating in parallel |
CN107229863A (en) * | 2017-06-12 | 2017-10-03 | 济南浪潮高新科技投资发展有限公司 | A kind of secure operating environment virtual method |
KR20190044815A (en) * | 2017-10-23 | 2019-05-02 | 삼성전자주식회사 | System for manageing security license for controlling security service and method for operating thereof |
CN110362976B (en) * | 2018-04-11 | 2021-05-07 | 旭景科技股份有限公司 | Biometric security device |
CN110765439B (en) * | 2018-08-17 | 2023-01-31 | 安天科技集团股份有限公司 | Method, device and storage medium for encrypting and authenticating mobile storage |
US10746599B2 (en) | 2018-10-30 | 2020-08-18 | Variable, Inc. | System and method for spectral interpolation using multiple illumination sources |
US11586750B2 (en) * | 2019-03-21 | 2023-02-21 | Blackberry Limited | Managing access to protected data file content |
FR3100901B1 (en) * | 2019-09-12 | 2021-08-27 | Stmicroelectronics Grand Ouest Sas | Memory protection system |
US11012326B1 (en) | 2019-12-17 | 2021-05-18 | CloudFit Software, LLC | Monitoring user experience using data blocks for secure data access |
CN111756718B (en) * | 2020-06-15 | 2022-09-30 | 深信服科技股份有限公司 | Terminal, access method, system, server and computer readable storage medium |
US11716355B1 (en) | 2020-11-24 | 2023-08-01 | Wells Fargo Bank, N.A. | Company controlled virtual computer over a network |
FR3128040B1 (en) * | 2021-10-08 | 2023-10-27 | Cyferall | Security application for a computing device, security system and corresponding security architecture |
Family Cites Families (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040163087A1 (en) * | 2003-02-14 | 2004-08-19 | Carl Sandland | Computer program code and method for delivering external data to a process running on a virtual machine |
WO2006018890A1 (en) * | 2004-08-20 | 2006-02-23 | Mitsubishi Denki Kabushiki Kaisha | Memory card, data exchanging system, and data exchanging method |
EP1811387A4 (en) * | 2004-08-25 | 2016-04-13 | Nec Corp | Information communication device, and program execution environment control method |
CN100388666C (en) * | 2004-12-09 | 2008-05-14 | 腾讯科技(深圳)有限公司 | Method and system for controlling data transmission procedure |
US8060683B2 (en) * | 2004-12-17 | 2011-11-15 | International Business Machines Corporation | System, method and program to preserve a cache of a virtual machine |
US7823214B2 (en) * | 2005-01-07 | 2010-10-26 | Apple Inc. | Accessory authentication for electronic devices |
US7693838B2 (en) * | 2005-11-12 | 2010-04-06 | Intel Corporation | Method and apparatus for securely accessing data |
US7984109B2 (en) | 2006-02-24 | 2011-07-19 | Qualcomm Incorporated | System and method for storing and accessing data files at wireless devices |
US7779252B2 (en) | 2006-03-21 | 2010-08-17 | Harris Corporation | Computer architecture for a handheld electronic device with a shared human-machine interface |
GB2440170B8 (en) | 2006-07-14 | 2014-07-16 | Vodafone Plc | Digital rights management |
US8126506B2 (en) * | 2007-02-14 | 2012-02-28 | Nuance Communications, Inc. | System and method for securely managing data stored on mobile devices, such as enterprise mobility data |
JP4987555B2 (en) * | 2007-04-27 | 2012-07-25 | 株式会社東芝 | Information processing apparatus and information processing system |
US8769268B2 (en) * | 2007-07-20 | 2014-07-01 | Check Point Software Technologies, Inc. | System and methods providing secure workspace sessions |
EP2183695B1 (en) * | 2007-07-20 | 2014-11-12 | Nxp B.V. | Device with a secure virtual machine |
US8554176B2 (en) * | 2007-09-18 | 2013-10-08 | Qualcomm Incorporated | Method and apparatus for creating a remotely activated secure backup service for mobile handsets |
US9003173B2 (en) | 2007-09-28 | 2015-04-07 | Microsoft Technology Licensing, Llc | Multi-OS (operating system) boot via mobile device |
JP2009169841A (en) * | 2008-01-18 | 2009-07-30 | Panasonic Corp | Information processor and portable telephone device |
JP2009223776A (en) * | 2008-03-18 | 2009-10-01 | Univ Of Tsukuba | Information processing system, program for information processing system, and access control method for client device |
KR101331032B1 (en) * | 2008-07-30 | 2013-11-19 | 삼성전자주식회사 | Method for executing application associated with virtualized environment |
US8453144B1 (en) * | 2008-09-23 | 2013-05-28 | Gogrid, LLC | System and method for adapting a system configuration using an adaptive library |
US9026918B2 (en) * | 2008-10-16 | 2015-05-05 | Accenture Global Services Limited | Enabling a user device to access enterprise data |
JP2010097567A (en) * | 2008-10-20 | 2010-04-30 | Hitachi Ltd | Device connection control method |
JP2010257289A (en) * | 2009-04-27 | 2010-11-11 | Nec Corp | Communication apparatus, method for controlling communication apparatus, and program |
US8107927B2 (en) | 2009-06-18 | 2012-01-31 | T-Mobile Usa, Inc. | Dedicated memory partitions for users of a shared mobile device |
US8302094B2 (en) * | 2009-06-26 | 2012-10-30 | Vmware, Inc. | Routing a physical device request using transformer stack to an equivalent physical device in a virtualized mobile device |
WO2011007017A1 (en) | 2009-07-13 | 2011-01-20 | Zitralia Seguridad Informática, S.L. | Electronic device for generating a secure environment |
US8689213B2 (en) * | 2009-12-14 | 2014-04-01 | Citrix Systems, Inc. | Methods and systems for communicating between trusted and non-trusted virtual machines |
US8307169B2 (en) * | 2011-03-10 | 2012-11-06 | Safenet, Inc. | Protecting guest virtual machine memory |
US10503343B2 (en) * | 2011-07-06 | 2019-12-10 | Microsoft Technology Licensing, Llc | Integrated graphical user interface |
-
2011
- 2011-08-10 US US13/207,134 patent/US8949929B2/en active Active
-
2012
- 2012-08-10 JP JP2014525186A patent/JP6014671B2/en active Active
- 2012-08-10 CN CN201280039099.5A patent/CN103733663A/en active Pending
- 2012-08-10 EP EP12751210.1A patent/EP2742710B1/en active Active
- 2012-08-10 WO PCT/US2012/050440 patent/WO2013023179A1/en unknown
- 2012-08-10 CN CN201910743408.0A patent/CN110598395A/en active Pending
- 2012-08-10 KR KR1020147006281A patent/KR101571641B1/en active IP Right Grant
- 2012-08-10 IN IN388CHN2014 patent/IN2014CN00388A/en unknown
Also Published As
Publication number | Publication date |
---|---|
JP2014525612A (en) | 2014-09-29 |
CN110598395A (en) | 2019-12-20 |
EP2742710A1 (en) | 2014-06-18 |
WO2013023179A1 (en) | 2013-02-14 |
US20130042295A1 (en) | 2013-02-14 |
JP6014671B2 (en) | 2016-10-25 |
CN103733663A (en) | 2014-04-16 |
US8949929B2 (en) | 2015-02-03 |
EP2742710B1 (en) | 2020-09-23 |
KR101571641B1 (en) | 2015-11-24 |
KR20140058623A (en) | 2014-05-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
IN2014CN00388A (en) | ||
AU2018256568A1 (en) | Systems and methods for software based encryption | |
WO2012016091A3 (en) | Protecting documents using policies and encryption | |
WO2017034642A3 (en) | Optimizable full-path encryption in a virtualization environment | |
EP2565862A4 (en) | Encryption processing system, key generation device, encryption device, decryption device, signature processing system, signature device and verification device | |
EP2525340A4 (en) | Confidential search system and encryption processing system | |
EP3118771A4 (en) | Confidential data management method and device, and security authentication method and system | |
WO2011083343A3 (en) | System and method of enforcing a computer policy | |
GB2534470A (en) | Method and apparatus for managing access to electronic content | |
GB2496354B (en) | A method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors | |
EP2884690A4 (en) | Re-encryption key generation device, re-encryption device, encryption device, decryption device, and program | |
GB2506066A (en) | Zero sign-on authentication | |
WO2014009813A3 (en) | Secure storage system and uses thereof | |
WO2016122747A3 (en) | Storage for encrypted data with enhanced security | |
EP2524334A4 (en) | System and methods for generating unclonable security keys in integrated circuits | |
EP3036703A4 (en) | System and method for graduated security in user authentication | |
EP3627843A3 (en) | Systems and methods for performing transport i/o | |
EP2882132A4 (en) | Shared secret key generation device, encryption device, decryption device, shared secret key generation method, encryption method, decryption method, and program | |
PH12018550176A1 (en) | Using hardware based secure isolated region to prevent piracy and cheating on electronic devices | |
GB201414383D0 (en) | Encrypted biometric data management and retrieval | |
EP2947810A4 (en) | Encryption system, re-encryption key generation device, re-encryption device, encryption method and encryption program | |
WO2013130561A3 (en) | Method of operating a computing device, computing device and computer program | |
EP3017562A4 (en) | A method and apparatus for anonymous authentication on trust in social networking | |
EP2874344A4 (en) | User terminal device and encryption method for encrypting in cloud computing environment | |
MX2016009066A (en) | Systems and methods with cryptography and tamper resistance software security. |