ATE484144T1 - System und verfahren zum verarbeiten sicherer übertragungen - Google Patents
System und verfahren zum verarbeiten sicherer übertragungenInfo
- Publication number
- ATE484144T1 ATE484144T1 AT06795753T AT06795753T ATE484144T1 AT E484144 T1 ATE484144 T1 AT E484144T1 AT 06795753 T AT06795753 T AT 06795753T AT 06795753 T AT06795753 T AT 06795753T AT E484144 T1 ATE484144 T1 AT E484144T1
- Authority
- AT
- Austria
- Prior art keywords
- decrypted
- client
- server
- transmission
- secure transmissions
- Prior art date
Links
- 230000005540 biological transmission Effects 0.000 title abstract 4
- 238000012986 modification Methods 0.000 abstract 1
- 230000004048 modification Effects 0.000 abstract 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0464—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
- Small-Scale Networks (AREA)
- Harvester Elements (AREA)
- Mobile Radio Communication Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Hardware Redundancy (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB0517303.4A GB0517303D0 (en) | 2005-08-23 | 2005-08-23 | System and method for processing secure transmissions |
PCT/IB2006/052926 WO2007023465A1 (en) | 2005-08-23 | 2006-08-23 | System and method for processing secure transmissions |
Publications (1)
Publication Number | Publication Date |
---|---|
ATE484144T1 true ATE484144T1 (de) | 2010-10-15 |
Family
ID=35198315
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AT06795753T ATE484144T1 (de) | 2005-08-23 | 2006-08-23 | System und verfahren zum verarbeiten sicherer übertragungen |
Country Status (9)
Country | Link |
---|---|
US (2) | US20090201978A1 (de) |
EP (1) | EP1917780B8 (de) |
JP (1) | JP2009506617A (de) |
CN (1) | CN101300806B (de) |
AT (1) | ATE484144T1 (de) |
CA (1) | CA2620001A1 (de) |
DE (1) | DE602006017387D1 (de) |
GB (1) | GB0517303D0 (de) |
WO (1) | WO2007023465A1 (de) |
Families Citing this family (42)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8363536B2 (en) * | 2006-08-28 | 2013-01-29 | Qualcomm Incorporated | OFDM channel estimation |
US8395986B2 (en) * | 2007-12-20 | 2013-03-12 | Intel Mobile Communications GmbH | Transmitter and receiver |
US8566580B2 (en) | 2008-07-23 | 2013-10-22 | Finjan, Inc. | Splitting an SSL connection between gateways |
US9769149B1 (en) | 2009-07-02 | 2017-09-19 | Sonicwall Inc. | Proxy-less secure sockets layer (SSL) data inspection |
US8856460B2 (en) | 2010-09-15 | 2014-10-07 | Oracle International Corporation | System and method for zero buffer copying in a middleware environment |
US9185054B2 (en) | 2010-09-15 | 2015-11-10 | Oracle International Corporation | System and method for providing zero buffer copying in a middleware machine environment |
US8675586B2 (en) * | 2010-11-19 | 2014-03-18 | Aurora Wireless, Inc. | Systems and methods for channel tracking in OFDMA |
IL212344A (en) | 2011-04-14 | 2015-03-31 | Verint Systems Ltd | A system and method for selectively controlling encrypted traffic |
US10469533B2 (en) | 2012-01-24 | 2019-11-05 | Ssh Communications Security Oyj | Controlling and auditing SFTP file transfers |
US9026784B2 (en) * | 2012-01-26 | 2015-05-05 | Mcafee, Inc. | System and method for innovative management of transport layer security session tickets in a network environment |
US9176838B2 (en) | 2012-10-19 | 2015-11-03 | Intel Corporation | Encrypted data inspection in a network environment |
US9467828B2 (en) | 2013-11-08 | 2016-10-11 | Gogo Llc | Systems and methods for configuring an electronic device for cellular-based communications |
US9716542B2 (en) * | 2014-05-30 | 2017-07-25 | Gogo Llc | Systems and methods for facilitating communications destined for a non-terrestrial network |
US9576147B1 (en) * | 2015-01-05 | 2017-02-21 | Amazon Technologies, Inc. | Security policy application through data tagging |
US9264370B1 (en) | 2015-02-10 | 2016-02-16 | Centripetal Networks, Inc. | Correlating packets in communications networks |
US9866576B2 (en) | 2015-04-17 | 2018-01-09 | Centripetal Networks, Inc. | Rule-based network-threat detection |
US9338147B1 (en) * | 2015-04-24 | 2016-05-10 | Extrahop Networks, Inc. | Secure communication secret sharing |
CN104954386B (zh) * | 2015-06-30 | 2018-10-02 | 百度在线网络技术(北京)有限公司 | 一种网络反劫持方法及装置 |
WO2017148509A1 (en) * | 2016-03-02 | 2017-09-08 | Telefonaktiebolaget Lm Ericsson (Publ) | Transport relay in communications network |
IL248306B (en) | 2016-10-10 | 2019-12-31 | Verint Systems Ltd | System and method for creating data sets for learning to recognize user actions |
US10686831B2 (en) | 2016-11-16 | 2020-06-16 | Cisco Technology, Inc. | Malware classification and attribution through server fingerprinting using server certificate data |
US10476673B2 (en) | 2017-03-22 | 2019-11-12 | Extrahop Networks, Inc. | Managing session secrets for continuous packet capture systems |
US10320842B1 (en) * | 2017-03-24 | 2019-06-11 | Symantec Corporation | Securely sharing a transport layer security session with one or more trusted devices |
US11233777B2 (en) | 2017-07-24 | 2022-01-25 | Centripetal Networks, Inc. | Efficient SSL/TLS proxy |
US9967292B1 (en) | 2017-10-25 | 2018-05-08 | Extrahop Networks, Inc. | Inline secret sharing |
US10389574B1 (en) | 2018-02-07 | 2019-08-20 | Extrahop Networks, Inc. | Ranking alerts based on network monitoring |
US10038611B1 (en) | 2018-02-08 | 2018-07-31 | Extrahop Networks, Inc. | Personalization of alerts based on network monitoring |
US10270794B1 (en) | 2018-02-09 | 2019-04-23 | Extrahop Networks, Inc. | Detection of denial of service attacks |
US10411978B1 (en) | 2018-08-09 | 2019-09-10 | Extrahop Networks, Inc. | Correlating causes and effects associated with network activity |
US10594718B1 (en) | 2018-08-21 | 2020-03-17 | Extrahop Networks, Inc. | Managing incident response operations based on monitored network activity |
WO2020188524A1 (en) | 2019-03-20 | 2020-09-24 | Verint Systems Ltd. | System and method for de-anonymizing actions and messages on networks |
US10965702B2 (en) | 2019-05-28 | 2021-03-30 | Extrahop Networks, Inc. | Detecting injection attacks using passive network monitoring |
US11165814B2 (en) | 2019-07-29 | 2021-11-02 | Extrahop Networks, Inc. | Modifying triage information based on network monitoring |
US10742530B1 (en) | 2019-08-05 | 2020-08-11 | Extrahop Networks, Inc. | Correlating network traffic that crosses opaque endpoints |
US11388072B2 (en) | 2019-08-05 | 2022-07-12 | Extrahop Networks, Inc. | Correlating network traffic that crosses opaque endpoints |
US10742677B1 (en) | 2019-09-04 | 2020-08-11 | Extrahop Networks, Inc. | Automatic determination of user roles and asset types based on network monitoring |
US11165823B2 (en) | 2019-12-17 | 2021-11-02 | Extrahop Networks, Inc. | Automated preemptive polymorphic deception |
US11310256B2 (en) | 2020-09-23 | 2022-04-19 | Extrahop Networks, Inc. | Monitoring encrypted network traffic |
US11463466B2 (en) | 2020-09-23 | 2022-10-04 | Extrahop Networks, Inc. | Monitoring encrypted network traffic |
US11349861B1 (en) | 2021-06-18 | 2022-05-31 | Extrahop Networks, Inc. | Identifying network entities based on beaconing activity |
US11296967B1 (en) | 2021-09-23 | 2022-04-05 | Extrahop Networks, Inc. | Combining passive network analysis and active probing |
US11843606B2 (en) | 2022-03-30 | 2023-12-12 | Extrahop Networks, Inc. | Detecting abnormal data access based on data similarity |
Family Cites Families (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5161193A (en) * | 1990-06-29 | 1992-11-03 | Digital Equipment Corporation | Pipelined cryptography processor and method for its use in communication networks |
US5479514A (en) * | 1994-02-23 | 1995-12-26 | International Business Machines Corporation | Method and apparatus for encrypted communication in data networks |
US6393568B1 (en) * | 1997-10-23 | 2002-05-21 | Entrust Technologies Limited | Encryption and decryption system and method with content analysis provision |
US6732269B1 (en) * | 1999-10-01 | 2004-05-04 | International Business Machines Corporation | Methods, systems and computer program products for enhanced security identity utilizing an SSL proxy |
US6636838B1 (en) | 2000-02-23 | 2003-10-21 | Sun Microsystems, Inc. | Content screening with end-to-end encryption |
JP2001313663A (ja) * | 2000-05-01 | 2001-11-09 | Nippon Telegr & Teleph Corp <Ntt> | 排他的論理ネットワークアクセス制御方法及び装置 |
SG118081A1 (en) * | 2000-07-24 | 2006-01-27 | Sony Corp | Information processing method inter-task communication method and computer-excutable program for thesame |
US20030014624A1 (en) * | 2000-07-31 | 2003-01-16 | Andes Networks, Inc. | Non-proxy internet communication |
US7228350B2 (en) | 2000-08-04 | 2007-06-05 | Avaya Technology Corp. | Intelligent demand driven recognition of URL objects in connection oriented transactions |
US20040015725A1 (en) * | 2000-08-07 | 2004-01-22 | Dan Boneh | Client-side inspection and processing of secure content |
FI20001837A (fi) * | 2000-08-18 | 2002-02-19 | Nokia Corp | Autentikointi |
US7127740B2 (en) * | 2001-10-29 | 2006-10-24 | Pitney Bowes Inc. | Monitoring system for a corporate network |
AU2003218550A1 (en) * | 2002-03-20 | 2003-09-29 | Research In Motion Limited | System and method for checking digital certificate status |
JP4129783B2 (ja) * | 2002-07-10 | 2008-08-06 | ソニー株式会社 | リモートアクセスシステム及びリモートアクセス方法 |
US7587587B2 (en) * | 2002-12-05 | 2009-09-08 | Broadcom Corporation | Data path security processing |
JP2004252852A (ja) * | 2003-02-21 | 2004-09-09 | Matsushita Electric Ind Co Ltd | 情報処理装置及び情報処理方法 |
US20050055463A1 (en) * | 2003-05-16 | 2005-03-10 | Verilegal, Inc. | Secure internet functionality |
US20050015599A1 (en) * | 2003-06-25 | 2005-01-20 | Nokia, Inc. | Two-phase hash value matching technique in message protection systems |
US7769994B2 (en) * | 2003-08-13 | 2010-08-03 | Radware Ltd. | Content inspection in secure networks |
US7853782B1 (en) * | 2004-04-14 | 2010-12-14 | Sprint Spectrum L.P. | Secure intermediation system and method |
US20070180227A1 (en) | 2005-03-01 | 2007-08-02 | Matsushita Electric Works, Ltd. | Decryption apparatus for use in encrypted communications |
US20060248575A1 (en) * | 2005-05-02 | 2006-11-02 | Zachary Levow | Divided encryption connections to provide network traffic security |
-
2005
- 2005-08-23 GB GBGB0517303.4A patent/GB0517303D0/en not_active Ceased
-
2006
- 2006-08-23 JP JP2008527575A patent/JP2009506617A/ja active Pending
- 2006-08-23 AT AT06795753T patent/ATE484144T1/de not_active IP Right Cessation
- 2006-08-23 EP EP06795753A patent/EP1917780B8/de not_active Not-in-force
- 2006-08-23 CN CN2006800309273A patent/CN101300806B/zh not_active Expired - Fee Related
- 2006-08-23 CA CA002620001A patent/CA2620001A1/en not_active Abandoned
- 2006-08-23 US US12/064,560 patent/US20090201978A1/en not_active Abandoned
- 2006-08-23 DE DE602006017387T patent/DE602006017387D1/de active Active
- 2006-08-23 WO PCT/IB2006/052926 patent/WO2007023465A1/en active Application Filing
-
2012
- 2012-01-30 US US13/361,559 patent/US20120131330A1/en not_active Abandoned
Also Published As
Publication number | Publication date |
---|---|
EP1917780B1 (de) | 2010-10-06 |
JP2009506617A (ja) | 2009-02-12 |
WO2007023465A1 (en) | 2007-03-01 |
CA2620001A1 (en) | 2007-03-01 |
CN101300806A (zh) | 2008-11-05 |
EP1917780B8 (de) | 2011-02-16 |
GB0517303D0 (en) | 2005-10-05 |
DE602006017387D1 (de) | 2010-11-18 |
US20090201978A1 (en) | 2009-08-13 |
US20120131330A1 (en) | 2012-05-24 |
EP1917780A1 (de) | 2008-05-07 |
CN101300806B (zh) | 2011-07-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
ATE484144T1 (de) | System und verfahren zum verarbeiten sicherer übertragungen | |
PH12019550116A1 (en) | Addressing a trusted execution environment using encryption key | |
EP2192716A3 (de) | Verfahren und System zur Aufhebung von kryptographischen Shares in Computersystemen | |
WO2011103561A3 (en) | Encryption system using web browsers and untrusted web servers | |
EP2345977A4 (de) | Clientcomputer zum schutz vertraulicher dateien, servercomputer dafür, verfahren dafür und computerprogramm | |
PH12019550119A1 (en) | Addressing a trusted execution environment using signing key | |
WO2010144815A3 (en) | System and method for providing security aboard a moving platform | |
WO2010026561A3 (en) | An appliance, system, method and corresponding software components for encrypting and processing data | |
DE602006007019D1 (de) | Erneuerbare verräterverfolgung | |
EP1944905A4 (de) | Verschlüsseltes übertragungsverfahren und gerätesystem zum verhindern des kopierens der datenressource | |
EP1850233A4 (de) | Authentifikationsverfahren, authentifikationssystem und tag-einrichtung dafür, informationsreferenz-client, authentifikationsserver und informationsserver | |
WO2006019726A3 (en) | System and method for detecting computer virus | |
WO2012122117A3 (en) | Content playback apis using encrypted streams | |
WO2009044461A1 (ja) | デバイスアクセス制御プログラム、デバイスアクセス制御方法および情報処理装置 | |
GB2530972A (en) | Encrypted purging of data from content node storage | |
DE602005027423D1 (de) | Server/Client System, Informationsverarbeitungseinheit, Informationsverarbeitungsverfahren und Computerprogramm | |
EP2234049A3 (de) | Im Hintergrund laufender Dienstprozess zur lokalen Sammlung von Daten in einem elektronischen Entdeckungssystem | |
WO2009065000A3 (en) | Reduced security risk apparatus and method for analyzing and managing unstructured data | |
CL2011002676A1 (es) | Metodo y dispositivo para procesar la consistencia de metadatos en un computador cliente que comprende obtener un documento en el computador y abrirlo, recibir un mensaje, editar un area, recibir segundo y tercer mensajes en diferentes canales y determinar si uno o mas metadatos de bloqueo coinciden usando identificadores. | |
Zhang et al. | Plaintext related two-level secret key image encryption scheme | |
EP2105857A3 (de) | Verfahren und Vorrichtung zur Erzeugung des richtigen Objekts, Verfahren und Vorrichtung zur Übertragung des richtigen Objekts und Verfahren und Vorrichtung zum Empfangen des richtigen Objekts | |
NL1034193A1 (nl) | Client-server verdeeld systeem, serverapparatuur, clientapparatuur en daarvoor gebruikte inter-client RTP-coderingswerkwijze. | |
EA200500347A1 (ru) | Способ создания и обработки потоков данных, которые содержат зашифрованные и дешифрованные данные | |
GB201305600D0 (en) | Security | |
GB2472955A (en) | Security printing analysis system and method for enhancing security printing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
RER | Ceased as to paragraph 5 lit. 3 law introducing patent treaties |