ATE252248T1 - System zum auffangen von dateizugriffen und zum automatischen entschlüsseln und wieder- verschlüsseln von dateidaten auf benutzungsbasis - Google Patents
System zum auffangen von dateizugriffen und zum automatischen entschlüsseln und wieder- verschlüsseln von dateidaten auf benutzungsbasisInfo
- Publication number
- ATE252248T1 ATE252248T1 AT99914891T AT99914891T ATE252248T1 AT E252248 T1 ATE252248 T1 AT E252248T1 AT 99914891 T AT99914891 T AT 99914891T AT 99914891 T AT99914891 T AT 99914891T AT E252248 T1 ATE252248 T1 AT E252248T1
- Authority
- AT
- Austria
- Prior art keywords
- file data
- machine system
- unauthorized
- protecting
- encrypting
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2209/00—Indexing scheme relating to G06F9/00
- G06F2209/54—Indexing scheme relating to G06F9/54
- G06F2209/542—Intercept
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99931—Database or file accessing
- Y10S707/99939—Privileged access
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/047,316 US20010044901A1 (en) | 1998-03-24 | 1998-03-24 | Bubble-protected system for automatic decryption of file data on a per-use basis and automatic re-encryption |
PCT/US1999/005070 WO1999049380A1 (en) | 1998-03-24 | 1999-03-08 | System for intercepting file accesses and for automatic decryption and re-encryption of file data on a per-use basis |
Publications (1)
Publication Number | Publication Date |
---|---|
ATE252248T1 true ATE252248T1 (de) | 2003-11-15 |
Family
ID=21948284
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AT99914891T ATE252248T1 (de) | 1998-03-24 | 1999-03-08 | System zum auffangen von dateizugriffen und zum automatischen entschlüsseln und wieder- verschlüsseln von dateidaten auf benutzungsbasis |
Country Status (6)
Country | Link |
---|---|
US (2) | US20010044901A1 (de) |
EP (1) | EP1066554B1 (de) |
AT (1) | ATE252248T1 (de) |
CA (1) | CA2325621A1 (de) |
DE (1) | DE69912109D1 (de) |
WO (1) | WO1999049380A1 (de) |
Families Citing this family (104)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20010044901A1 (en) | 1998-03-24 | 2001-11-22 | Symantec Corporation | Bubble-protected system for automatic decryption of file data on a per-use basis and automatic re-encryption |
US6766315B1 (en) * | 1998-05-01 | 2004-07-20 | Bratsos Timothy G | Method and apparatus for simultaneously accessing a plurality of dispersed databases |
US7552090B1 (en) * | 1998-08-12 | 2009-06-23 | Keynetics Inc. | Method for billing for services delivered over a computer network |
US7099848B1 (en) * | 1999-02-16 | 2006-08-29 | Listen.Com, Inc. | Audio delivery and rendering method and apparatus |
US7069591B1 (en) * | 2000-03-22 | 2006-06-27 | Neil Weicher | System for encrypting data files of application programs |
US6874139B2 (en) * | 2000-05-15 | 2005-03-29 | Interfuse Technology Corporation | Method and system for seamless integration of preprocessing and postprocessing functions with an existing application program |
US7231050B1 (en) * | 2000-07-21 | 2007-06-12 | Harris Scott C | Protection against unintentional file changing |
JP2002073542A (ja) * | 2000-08-31 | 2002-03-12 | Sony Corp | サーバの使用予約方法、予約管理装置およびプログラム格納媒体 |
CN101694688B (zh) | 2000-09-21 | 2014-07-16 | 黑莓有限公司 | 代码签字系统及方法 |
US7904454B2 (en) * | 2001-07-16 | 2011-03-08 | International Business Machines Corporation | Database access security |
US7167982B2 (en) * | 2001-09-14 | 2007-01-23 | Lenovo (Singapore) Pte Ltd. | Securing decrypted files in a shared environment |
US7890771B2 (en) | 2002-04-17 | 2011-02-15 | Microsoft Corporation | Saving and retrieving data based on public key encryption |
US7398465B2 (en) * | 2002-06-20 | 2008-07-08 | The Boeing Company | System and method for identifying, classifying, extracting and resolving hidden entities |
US20040054696A1 (en) * | 2002-09-13 | 2004-03-18 | Sheinis Joseph Igor | System and method for using proxies |
US7478248B2 (en) * | 2002-11-27 | 2009-01-13 | M-Systems Flash Disk Pioneers, Ltd. | Apparatus and method for securing data on a portable storage device |
US7664991B1 (en) * | 2002-12-17 | 2010-02-16 | Symantec Operating Corporation | System and method for distributed file system I/O recovery |
US8452847B2 (en) | 2003-09-22 | 2013-05-28 | Broadcom Corporation | Processor sharing between in-range devices |
US7930757B2 (en) | 2003-10-31 | 2011-04-19 | Adobe Systems Incorporated | Offline access in a document control system |
US8108672B1 (en) | 2003-10-31 | 2012-01-31 | Adobe Systems Incorporated | Transparent authentication process integration |
US8627489B2 (en) * | 2003-10-31 | 2014-01-07 | Adobe Systems Incorporated | Distributed document version control |
US20080270806A1 (en) * | 2004-04-02 | 2008-10-30 | Tomonori Nakamura | Execution Device |
JP4612461B2 (ja) * | 2004-06-24 | 2011-01-12 | 株式会社東芝 | マイクロプロセッサ |
US7580894B2 (en) * | 2004-09-30 | 2009-08-25 | Nokia Corporation | Method, device and computer program product for activating the right of use at least one secured content item |
US7995758B1 (en) | 2004-11-30 | 2011-08-09 | Adobe Systems Incorporated | Family of encryption keys |
US7707619B2 (en) * | 2005-01-28 | 2010-04-27 | Microsoft Corporation | Method and system for troubleshooting when a program is adversely impacted by a security policy |
US7590868B2 (en) * | 2005-02-09 | 2009-09-15 | Hewlett-Packard Development Company, L.P. | Method and apparatus for managing encrypted data on a computer readable medium |
WO2006099540A2 (en) | 2005-03-15 | 2006-09-21 | Trapeze Networks, Inc. | System and method for distributing keys in a wireless network |
US10636040B2 (en) | 2005-03-16 | 2020-04-28 | Dt Labs, Llc | Apparatus for customer authentication of an item |
US20100005509A1 (en) * | 2005-03-16 | 2010-01-07 | Dt Labs, Llc | System, method and apparatus for electronically protecting data and digital content |
US7562304B2 (en) | 2005-05-03 | 2009-07-14 | Mcafee, Inc. | Indicating website reputations during website manipulation of user information |
US7765481B2 (en) * | 2005-05-03 | 2010-07-27 | Mcafee, Inc. | Indicating website reputations during an electronic commerce transaction |
US20060253584A1 (en) * | 2005-05-03 | 2006-11-09 | Dixon Christopher J | Reputation of an entity associated with a content item |
US20060253582A1 (en) * | 2005-05-03 | 2006-11-09 | Dixon Christopher J | Indicating website reputations within search results |
US7822620B2 (en) * | 2005-05-03 | 2010-10-26 | Mcafee, Inc. | Determining website reputations using automatic testing |
US8566726B2 (en) | 2005-05-03 | 2013-10-22 | Mcafee, Inc. | Indicating website reputations based on website handling of personal information |
US8438499B2 (en) | 2005-05-03 | 2013-05-07 | Mcafee, Inc. | Indicating website reputations during user interactions |
US9384345B2 (en) | 2005-05-03 | 2016-07-05 | Mcafee, Inc. | Providing alternative web content based on website reputation assessment |
US20060259674A1 (en) * | 2005-05-12 | 2006-11-16 | Robert Dunstan | Apparatus and method for granting access to a hardware interface shared between multiple software entities |
US8832047B2 (en) | 2005-07-27 | 2014-09-09 | Adobe Systems Incorporated | Distributed document version control |
US7895651B2 (en) | 2005-07-29 | 2011-02-22 | Bit 9, Inc. | Content tracking in a network security system |
US8272058B2 (en) | 2005-07-29 | 2012-09-18 | Bit 9, Inc. | Centralized timed analysis in a network security system |
US8984636B2 (en) | 2005-07-29 | 2015-03-17 | Bit9, Inc. | Content extractor and analysis system |
US7970788B2 (en) | 2005-08-02 | 2011-06-28 | International Business Machines Corporation | Selective local database access restriction |
US8340289B2 (en) | 2005-09-29 | 2012-12-25 | Research In Motion Limited | System and method for providing an indication of randomness quality of random number data generated by a random data service |
US7797545B2 (en) * | 2005-09-29 | 2010-09-14 | Research In Motion Limited | System and method for registering entities for code signing services |
US8073442B2 (en) * | 2005-10-05 | 2011-12-06 | Microsoft Corporation | Binding a device to a provider |
WO2007044986A2 (en) | 2005-10-13 | 2007-04-19 | Trapeze Networks, Inc. | System and method for remote monitoring in a wireless network |
US7724703B2 (en) | 2005-10-13 | 2010-05-25 | Belden, Inc. | System and method for wireless network monitoring |
US8638762B2 (en) | 2005-10-13 | 2014-01-28 | Trapeze Networks, Inc. | System and method for network integrity |
US7573859B2 (en) | 2005-10-13 | 2009-08-11 | Trapeze Networks, Inc. | System and method for remote monitoring in a wireless network |
US7933923B2 (en) * | 2005-11-04 | 2011-04-26 | International Business Machines Corporation | Tracking and reconciling database commands |
US8701196B2 (en) | 2006-03-31 | 2014-04-15 | Mcafee, Inc. | System, method and computer program product for obtaining a reputation associated with a file |
US7558266B2 (en) | 2006-05-03 | 2009-07-07 | Trapeze Networks, Inc. | System and method for restricting network access using forwarding databases |
US8966018B2 (en) | 2006-05-19 | 2015-02-24 | Trapeze Networks, Inc. | Automated network device configuration and network deployment |
US9258702B2 (en) | 2006-06-09 | 2016-02-09 | Trapeze Networks, Inc. | AP-local dynamic switching |
US9191799B2 (en) | 2006-06-09 | 2015-11-17 | Juniper Networks, Inc. | Sharing data between wireless switches system and method |
US8818322B2 (en) | 2006-06-09 | 2014-08-26 | Trapeze Networks, Inc. | Untethered access point mesh system and method |
US20080027892A1 (en) * | 2006-07-27 | 2008-01-31 | Kestrelink Corporation | Dynamic stream file system network support |
US8190868B2 (en) | 2006-08-07 | 2012-05-29 | Webroot Inc. | Malware management through kernel detection |
US7769992B2 (en) * | 2006-08-18 | 2010-08-03 | Webroot Software, Inc. | File manipulation during early boot time |
US8340110B2 (en) * | 2006-09-15 | 2012-12-25 | Trapeze Networks, Inc. | Quality of service provisioning for wireless networks |
FR2910202A1 (fr) * | 2006-12-19 | 2008-06-20 | France Telecom | Traitement de donnee relative a un reseau de donnees |
US8141100B2 (en) * | 2006-12-20 | 2012-03-20 | International Business Machines Corporation | Identifying attribute propagation for multi-tier processing |
US7873061B2 (en) | 2006-12-28 | 2011-01-18 | Trapeze Networks, Inc. | System and method for aggregation and queuing in a wireless network |
US8495367B2 (en) * | 2007-02-22 | 2013-07-23 | International Business Machines Corporation | Nondestructive interception of secure data in transit |
US8332907B2 (en) | 2007-06-22 | 2012-12-11 | Microsoft Corporation | Detection and management of controlled files |
US8902904B2 (en) | 2007-09-07 | 2014-12-02 | Trapeze Networks, Inc. | Network assignment based on priority |
US8990583B1 (en) * | 2007-09-20 | 2015-03-24 | United Services Automobile Association (Usaa) | Forensic investigation tool |
US20090126027A1 (en) * | 2007-11-08 | 2009-05-14 | Rambus, Inc. | File accessing and retrieval using soft digital rights management technology |
US8238942B2 (en) | 2007-11-21 | 2012-08-07 | Trapeze Networks, Inc. | Wireless station location detection |
US8250475B2 (en) * | 2007-12-14 | 2012-08-21 | International Business Machines Corporation | Managing icon integrity |
CN101925913A (zh) * | 2008-01-31 | 2010-12-22 | 国际商业机器公司 | 加密文件访问的方法和系统 |
GB2458568B (en) * | 2008-03-27 | 2012-09-19 | Covertix Ltd | System and method for dynamically enforcing security policies on electronic files |
US8150357B2 (en) | 2008-03-28 | 2012-04-03 | Trapeze Networks, Inc. | Smoothing filter for irregular update intervals |
US8695087B2 (en) * | 2008-04-04 | 2014-04-08 | Sandisk Il Ltd. | Access control for a memory device |
US8261326B2 (en) | 2008-04-25 | 2012-09-04 | International Business Machines Corporation | Network intrusion blocking security overlay |
US8978105B2 (en) | 2008-07-25 | 2015-03-10 | Trapeze Networks, Inc. | Affirming network relationships and resource access via related networks |
US8238298B2 (en) | 2008-08-29 | 2012-08-07 | Trapeze Networks, Inc. | Picking an optimal channel for an access point in a wireless network |
US11489857B2 (en) | 2009-04-21 | 2022-11-01 | Webroot Inc. | System and method for developing a risk profile for an internet resource |
US8429429B1 (en) * | 2009-10-23 | 2013-04-23 | Secure Vector, Inc. | Computer security system and method |
US8775802B1 (en) | 2009-10-23 | 2014-07-08 | Secure Vector | Computer security system and method |
US10242182B2 (en) | 2009-10-23 | 2019-03-26 | Secure Vector, Llc | Computer security system and method |
US9454652B2 (en) | 2009-10-23 | 2016-09-27 | Secure Vector, Llc | Computer security system and method |
US9367341B2 (en) * | 2010-03-30 | 2016-06-14 | Red Hat Israel, Ltd. | Encrypting and decrypting virtual disk content using a single user sign-on |
US8726387B2 (en) * | 2011-02-11 | 2014-05-13 | F-Secure Corporation | Detecting a trojan horse |
US8352444B1 (en) | 2011-07-11 | 2013-01-08 | Peter Hon-You Chang | User-driven menu generation system with dynamic generation of target files with placeholders for persistent change or temporary security change over cloud computing virtual storage from template files |
US8625805B1 (en) | 2012-07-16 | 2014-01-07 | Wickr Inc. | Digital security bubble |
EP2738709A1 (de) * | 2012-11-28 | 2014-06-04 | Alcatel Lucent | Verbessertes Verfahren und Vorrichtung zur Durchsetzung von Datenschutzbestimmungen |
US9866591B1 (en) | 2013-06-25 | 2018-01-09 | Wickr Inc. | Enterprise messaging platform |
US10567349B2 (en) | 2013-06-25 | 2020-02-18 | Wickr Inc. | Secure time-to-live |
US9830089B1 (en) | 2013-06-25 | 2017-11-28 | Wickr Inc. | Digital data sanitization |
US10129260B1 (en) | 2013-06-25 | 2018-11-13 | Wickr Inc. | Mutual privacy management |
JP6183034B2 (ja) * | 2013-07-30 | 2017-08-23 | 富士通株式会社 | アクセス制御プログラム、アクセス制御方法およびシステム |
US9698976B1 (en) | 2014-02-24 | 2017-07-04 | Wickr Inc. | Key management and dynamic perfect forward secrecy |
US9584530B1 (en) | 2014-06-27 | 2017-02-28 | Wickr Inc. | In-band identity verification and man-in-the-middle defense |
US10089315B2 (en) * | 2014-08-22 | 2018-10-02 | AsterionDB, Inc. | Systems, apparatus, and methods for accessing data from a database as a file |
US9654288B1 (en) | 2014-12-11 | 2017-05-16 | Wickr Inc. | Securing group communications |
US9584493B1 (en) | 2015-12-18 | 2017-02-28 | Wickr Inc. | Decentralized authoritative messaging |
US10291607B1 (en) | 2016-02-02 | 2019-05-14 | Wickr Inc. | Providing real-time events to applications |
US9602477B1 (en) | 2016-04-14 | 2017-03-21 | Wickr Inc. | Secure file transfer |
US9596079B1 (en) | 2016-04-14 | 2017-03-14 | Wickr Inc. | Secure telecommunications |
US11528142B2 (en) | 2016-10-11 | 2022-12-13 | BicDroid Inc. | Methods, systems and computer program products for data protection by policing processes accessing encrypted data |
US11165883B2 (en) | 2019-01-02 | 2021-11-02 | Bank Of America Corporation | Entry point classification of requests requiring access to data |
US11086821B2 (en) * | 2019-06-11 | 2021-08-10 | Dell Products L.P. | Identifying file exclusions for write filter overlays |
Family Cites Families (43)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4757533A (en) * | 1985-09-11 | 1988-07-12 | Computer Security Corporation | Security system for microcomputers |
US4854616A (en) * | 1987-09-18 | 1989-08-08 | Edmondson Peter C | Door latch assembly with see-through capabilities |
US4881263A (en) * | 1987-09-25 | 1989-11-14 | Digital Equipment Corporation | Apparatus and method for secure transmission of data over an unsecure transmission channel |
US5212792A (en) * | 1989-06-01 | 1993-05-18 | Hewlett-Packard Company | Method and apparatus for controlling execution of tools in a computer-aided software engineering system |
JPH0388052A (ja) * | 1989-08-31 | 1991-04-12 | Toshiba Corp | 機密保護処理方式 |
US5029207A (en) * | 1990-02-01 | 1991-07-02 | Scientific-Atlanta, Inc. | External security module for a television signal decoder |
US5151938A (en) * | 1990-03-13 | 1992-09-29 | General Instrument Corporation | Security enhancement in a data processor through use of dynamic parameter authentication |
US5052040A (en) * | 1990-05-25 | 1991-09-24 | Micronyx, Inc. | Multiple user stored data cryptographic labeling system and method |
DE69228350T2 (de) * | 1991-05-08 | 1999-09-23 | Digital Equipment Corp | Verwaltungssschnittstelle und format für lizenzverwaltungssystem |
US5481701A (en) * | 1991-09-13 | 1996-01-02 | Salient Software, Inc. | Method and apparatus for performing direct read of compressed data file |
GB9126779D0 (en) * | 1991-12-17 | 1992-02-12 | Int Computers Ltd | Security mechanism for a computer system |
US5274819A (en) * | 1992-03-27 | 1993-12-28 | Central Point Software, Inc. | Management system for memory resident computer programs |
US5465299A (en) * | 1992-12-03 | 1995-11-07 | Hitachi, Ltd. | Electronic document processing system and method of forming digital signature |
JPH06175905A (ja) * | 1992-12-03 | 1994-06-24 | Fujitsu Ltd | 暗号化ファイル共有方法 |
US5369766A (en) * | 1993-03-25 | 1994-11-29 | Taligent, Inc. | Object-oriented loader system with support for different load formats |
US5412721A (en) * | 1993-03-26 | 1995-05-02 | Motorola, Inc. | Method for loading and utilizing a key in a secure transmission device |
FI93280C (fi) | 1993-04-05 | 1995-03-10 | Icl Personal Systems Oy | Järjestely datan tallentamiseksi tietokonelaitteistossa |
SE501128C2 (sv) * | 1993-11-30 | 1994-11-21 | Anonymity Prot In Sweden Ab | Anordning och metod för lagring av datainformation |
US5584023A (en) | 1993-12-27 | 1996-12-10 | Hsu; Mike S. C. | Computer system including a transparent and secure file transform mechanism |
JPH07230380A (ja) * | 1994-02-15 | 1995-08-29 | Internatl Business Mach Corp <Ibm> | 適用業務プログラムの利用管理方法およびシステム |
US5394469A (en) * | 1994-02-18 | 1995-02-28 | Infosafe Systems, Inc. | Method and apparatus for retrieving secure information from mass storage media |
EP0674253B1 (de) | 1994-03-15 | 2003-02-19 | Kabushiki Kaisha Toshiba | Gemeinsame Benutzung eines Dateiedierungssystems mit geheimem Dateiinhalt, Versionsverwaltung und asynchroner Edierung |
US5563946A (en) | 1994-04-25 | 1996-10-08 | International Business Machines Corporation | Method and apparatus for enabling trial period use of software products: method and apparatus for passing encrypted files between data processing systems |
US5495533A (en) * | 1994-04-29 | 1996-02-27 | International Business Machines Corporation | Personal key archive |
US5604803A (en) * | 1994-06-03 | 1997-02-18 | Sun Microsystems, Inc. | Method and apparatus for secure remote authentication in a public network |
ATE305682T1 (de) * | 1994-07-19 | 2005-10-15 | Certco Llc | Verfahren zur sicheren anwendung digitaler unterschriften in einem kommerziellen verschlüsselungssystem |
US5504892A (en) * | 1994-09-08 | 1996-04-02 | Taligent, Inc. | Extensible object-oriented file system |
US5619639A (en) * | 1994-10-04 | 1997-04-08 | Mast; Michael B. | Method and apparatus for associating an image display area with an application display area |
US5615264A (en) * | 1995-06-08 | 1997-03-25 | Wave Systems Corp. | Encrypted data package record for use in remote transaction metered data system |
US5812848A (en) * | 1995-08-23 | 1998-09-22 | Symantec Corporation | Subclassing system for computer that operates with portable-executable (PE) modules |
US5787175A (en) * | 1995-10-23 | 1998-07-28 | Novell, Inc. | Method and apparatus for collaborative document control |
US5708709A (en) * | 1995-12-08 | 1998-01-13 | Sun Microsystems, Inc. | System and method for managing try-and-buy usage of application programs |
US5699428A (en) * | 1996-01-16 | 1997-12-16 | Symantec Corporation | System for automatic decryption of file data on a per-use basis and automatic re-encryption within context of multi-threaded operating system under which applications run in real-time |
US5732268A (en) * | 1996-02-26 | 1998-03-24 | Award Software International | Extended BIOS adapted to establish remote communication for diagnostics and repair |
US5991876A (en) * | 1996-04-01 | 1999-11-23 | Copyright Clearance Center, Inc. | Electronic rights management and authorization system |
US5953419A (en) * | 1996-05-06 | 1999-09-14 | Symantec Corporation | Cryptographic file labeling system for supporting secured access by multiple users |
US5835722A (en) * | 1996-06-27 | 1998-11-10 | Logon Data Corporation | System to control content and prohibit certain interactive attempts by a person using a personal computer |
US6105069A (en) * | 1997-01-22 | 2000-08-15 | Novell, Inc. | Licensing controller using network directory services |
US5933826A (en) * | 1997-03-21 | 1999-08-03 | Novell, Inc. | Method and apparatus for securing and storing executable content |
US5905990A (en) * | 1997-06-23 | 1999-05-18 | International Business Machines Corporation | File system viewpath mechanism |
US6233577B1 (en) * | 1998-02-17 | 2001-05-15 | Phone.Com, Inc. | Centralized certificate management system for two-way interactive communication devices in data networks |
US20010044901A1 (en) | 1998-03-24 | 2001-11-22 | Symantec Corporation | Bubble-protected system for automatic decryption of file data on a per-use basis and automatic re-encryption |
US7197638B1 (en) * | 2000-08-21 | 2007-03-27 | Symantec Corporation | Unified permissions control for remotely and locally stored files whose informational content may be protected by smart-locking and/or bubble-protection |
-
1998
- 1998-03-24 US US09/047,316 patent/US20010044901A1/en not_active Abandoned
-
1999
- 1999-03-08 CA CA002325621A patent/CA2325621A1/en not_active Abandoned
- 1999-03-08 AT AT99914891T patent/ATE252248T1/de not_active IP Right Cessation
- 1999-03-08 EP EP99914891A patent/EP1066554B1/de not_active Expired - Lifetime
- 1999-03-08 WO PCT/US1999/005070 patent/WO1999049380A1/en active IP Right Grant
- 1999-03-08 DE DE69912109T patent/DE69912109D1/de not_active Expired - Lifetime
-
2003
- 2003-08-11 US US10/638,940 patent/US7594276B2/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
WO1999049380A1 (en) | 1999-09-30 |
DE69912109D1 (de) | 2003-11-20 |
US20040093506A1 (en) | 2004-05-13 |
US20010044901A1 (en) | 2001-11-22 |
EP1066554B1 (de) | 2003-10-15 |
CA2325621A1 (en) | 1999-09-30 |
WO1999049380A8 (en) | 1999-12-29 |
EP1066554A1 (de) | 2001-01-10 |
US7594276B2 (en) | 2009-09-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
ATE252248T1 (de) | System zum auffangen von dateizugriffen und zum automatischen entschlüsseln und wieder- verschlüsseln von dateidaten auf benutzungsbasis | |
US6266416B1 (en) | Protection of software against use without permit | |
US4593353A (en) | Software protection method and apparatus | |
EP1596269A2 (de) | System und Verfahren für die selektive Darstellung von Dokumenten | |
NO985275D0 (no) | FremgangsmÕte for lagring og anvendelse av sensitiv informasjon i en sikkerhetsmodul, og en tilknyttet sikkerhetsmodul | |
DE69714422D1 (de) | Zugriffssteuerungs/verschlüsselungssystem | |
JP3819160B2 (ja) | 情報管理方法および情報管理装置 | |
EP0911738A3 (de) | Plattenlaufwerk mit eingebauter Datenverschlüsselung | |
WO2000052875A8 (en) | Transparent encryption and decryption with algorithm independent cryptographic engine that allows for containerization of encrypted files | |
ATE522877T1 (de) | Verschlüsselungsdateisystem und verfahren | |
KR950029930A (ko) | 화일 액세스 보안유지 방법 및 장치 | |
DE60130172D1 (de) | Eine gesicherte und offene Rechnerplattform | |
US20080168280A1 (en) | Apparatus for improving computer security | |
SE9303817D0 (sv) | System för läsning av krypterad information samt en enhet för användning i ett sådant system | |
Appel | Deobfuscation is in NP | |
ATE341080T1 (de) | Vorrichtung und verfahren zur wiedergabe von benutzerdaten | |
JP2002132364A (ja) | プログラムを内部解析から保護する方法、コンピュータ読み取り可能な記録媒体及びプログラムの配布方法 | |
GB2349250A (en) | Method for protecting bytecode | |
DE60134565D1 (de) | Schutz einer elektronischen datei unter verwendung des standorts | |
DE10345457A1 (de) | Verfahren und Vorrichtung zur Ver- und Entschlüsselung | |
GB2276965A (en) | Protecting temporarily stored data. | |
CA2226386C (en) | Protection of software against use without permit | |
KR100636223B1 (ko) | Rfid를 이용한 콘텐츠 백업 장치 및 방법 | |
JP2007074701A (ja) | 情報安全の暗号方法、情報安全の復号方法及びパソコンにより読取可能な記録メディア | |
JPH04268924A (ja) | 逆アセンブル保護方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
RER | Ceased as to paragraph 5 lit. 3 law introducing patent treaties |