ATE484144T1 - System und verfahren zum verarbeiten sicherer übertragungen - Google Patents

System und verfahren zum verarbeiten sicherer übertragungen

Info

Publication number
ATE484144T1
ATE484144T1 AT06795753T AT06795753T ATE484144T1 AT E484144 T1 ATE484144 T1 AT E484144T1 AT 06795753 T AT06795753 T AT 06795753T AT 06795753 T AT06795753 T AT 06795753T AT E484144 T1 ATE484144 T1 AT E484144T1
Authority
AT
Austria
Prior art keywords
decrypted
client
server
transmission
secure transmissions
Prior art date
Application number
AT06795753T
Other languages
English (en)
Inventor
Toit Roelof Du
Leeuwen Gysbert Van
Original Assignee
Netronome Systems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Netronome Systems Inc filed Critical Netronome Systems Inc
Application granted granted Critical
Publication of ATE484144T1 publication Critical patent/ATE484144T1/de

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0464Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)
  • Small-Scale Networks (AREA)
  • Harvester Elements (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Hardware Redundancy (AREA)
AT06795753T 2005-08-23 2006-08-23 System und verfahren zum verarbeiten sicherer übertragungen ATE484144T1 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GBGB0517303.4A GB0517303D0 (en) 2005-08-23 2005-08-23 System and method for processing secure transmissions
PCT/IB2006/052926 WO2007023465A1 (en) 2005-08-23 2006-08-23 System and method for processing secure transmissions

Publications (1)

Publication Number Publication Date
ATE484144T1 true ATE484144T1 (de) 2010-10-15

Family

ID=35198315

Family Applications (1)

Application Number Title Priority Date Filing Date
AT06795753T ATE484144T1 (de) 2005-08-23 2006-08-23 System und verfahren zum verarbeiten sicherer übertragungen

Country Status (9)

Country Link
US (2) US20090201978A1 (de)
EP (1) EP1917780B8 (de)
JP (1) JP2009506617A (de)
CN (1) CN101300806B (de)
AT (1) ATE484144T1 (de)
CA (1) CA2620001A1 (de)
DE (1) DE602006017387D1 (de)
GB (1) GB0517303D0 (de)
WO (1) WO2007023465A1 (de)

Families Citing this family (42)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8363536B2 (en) * 2006-08-28 2013-01-29 Qualcomm Incorporated OFDM channel estimation
US8395986B2 (en) * 2007-12-20 2013-03-12 Intel Mobile Communications GmbH Transmitter and receiver
US8566580B2 (en) 2008-07-23 2013-10-22 Finjan, Inc. Splitting an SSL connection between gateways
US9769149B1 (en) 2009-07-02 2017-09-19 Sonicwall Inc. Proxy-less secure sockets layer (SSL) data inspection
US8856460B2 (en) 2010-09-15 2014-10-07 Oracle International Corporation System and method for zero buffer copying in a middleware environment
US9185054B2 (en) 2010-09-15 2015-11-10 Oracle International Corporation System and method for providing zero buffer copying in a middleware machine environment
US8675586B2 (en) * 2010-11-19 2014-03-18 Aurora Wireless, Inc. Systems and methods for channel tracking in OFDMA
IL212344A (en) 2011-04-14 2015-03-31 Verint Systems Ltd A system and method for selectively controlling encrypted traffic
US10469533B2 (en) 2012-01-24 2019-11-05 Ssh Communications Security Oyj Controlling and auditing SFTP file transfers
US9026784B2 (en) * 2012-01-26 2015-05-05 Mcafee, Inc. System and method for innovative management of transport layer security session tickets in a network environment
US9176838B2 (en) 2012-10-19 2015-11-03 Intel Corporation Encrypted data inspection in a network environment
US9467828B2 (en) 2013-11-08 2016-10-11 Gogo Llc Systems and methods for configuring an electronic device for cellular-based communications
US9716542B2 (en) * 2014-05-30 2017-07-25 Gogo Llc Systems and methods for facilitating communications destined for a non-terrestrial network
US9576147B1 (en) * 2015-01-05 2017-02-21 Amazon Technologies, Inc. Security policy application through data tagging
US9264370B1 (en) 2015-02-10 2016-02-16 Centripetal Networks, Inc. Correlating packets in communications networks
US9866576B2 (en) 2015-04-17 2018-01-09 Centripetal Networks, Inc. Rule-based network-threat detection
US9338147B1 (en) * 2015-04-24 2016-05-10 Extrahop Networks, Inc. Secure communication secret sharing
CN104954386B (zh) * 2015-06-30 2018-10-02 百度在线网络技术(北京)有限公司 一种网络反劫持方法及装置
WO2017148509A1 (en) * 2016-03-02 2017-09-08 Telefonaktiebolaget Lm Ericsson (Publ) Transport relay in communications network
IL248306B (en) 2016-10-10 2019-12-31 Verint Systems Ltd System and method for creating data sets for learning to recognize user actions
US10686831B2 (en) 2016-11-16 2020-06-16 Cisco Technology, Inc. Malware classification and attribution through server fingerprinting using server certificate data
US10476673B2 (en) 2017-03-22 2019-11-12 Extrahop Networks, Inc. Managing session secrets for continuous packet capture systems
US10320842B1 (en) * 2017-03-24 2019-06-11 Symantec Corporation Securely sharing a transport layer security session with one or more trusted devices
US11233777B2 (en) 2017-07-24 2022-01-25 Centripetal Networks, Inc. Efficient SSL/TLS proxy
US9967292B1 (en) 2017-10-25 2018-05-08 Extrahop Networks, Inc. Inline secret sharing
US10389574B1 (en) 2018-02-07 2019-08-20 Extrahop Networks, Inc. Ranking alerts based on network monitoring
US10038611B1 (en) 2018-02-08 2018-07-31 Extrahop Networks, Inc. Personalization of alerts based on network monitoring
US10270794B1 (en) 2018-02-09 2019-04-23 Extrahop Networks, Inc. Detection of denial of service attacks
US10411978B1 (en) 2018-08-09 2019-09-10 Extrahop Networks, Inc. Correlating causes and effects associated with network activity
US10594718B1 (en) 2018-08-21 2020-03-17 Extrahop Networks, Inc. Managing incident response operations based on monitored network activity
WO2020188524A1 (en) 2019-03-20 2020-09-24 Verint Systems Ltd. System and method for de-anonymizing actions and messages on networks
US10965702B2 (en) 2019-05-28 2021-03-30 Extrahop Networks, Inc. Detecting injection attacks using passive network monitoring
US11165814B2 (en) 2019-07-29 2021-11-02 Extrahop Networks, Inc. Modifying triage information based on network monitoring
US10742530B1 (en) 2019-08-05 2020-08-11 Extrahop Networks, Inc. Correlating network traffic that crosses opaque endpoints
US11388072B2 (en) 2019-08-05 2022-07-12 Extrahop Networks, Inc. Correlating network traffic that crosses opaque endpoints
US10742677B1 (en) 2019-09-04 2020-08-11 Extrahop Networks, Inc. Automatic determination of user roles and asset types based on network monitoring
US11165823B2 (en) 2019-12-17 2021-11-02 Extrahop Networks, Inc. Automated preemptive polymorphic deception
US11310256B2 (en) 2020-09-23 2022-04-19 Extrahop Networks, Inc. Monitoring encrypted network traffic
US11463466B2 (en) 2020-09-23 2022-10-04 Extrahop Networks, Inc. Monitoring encrypted network traffic
US11349861B1 (en) 2021-06-18 2022-05-31 Extrahop Networks, Inc. Identifying network entities based on beaconing activity
US11296967B1 (en) 2021-09-23 2022-04-05 Extrahop Networks, Inc. Combining passive network analysis and active probing
US11843606B2 (en) 2022-03-30 2023-12-12 Extrahop Networks, Inc. Detecting abnormal data access based on data similarity

Family Cites Families (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5161193A (en) * 1990-06-29 1992-11-03 Digital Equipment Corporation Pipelined cryptography processor and method for its use in communication networks
US5479514A (en) * 1994-02-23 1995-12-26 International Business Machines Corporation Method and apparatus for encrypted communication in data networks
US6393568B1 (en) * 1997-10-23 2002-05-21 Entrust Technologies Limited Encryption and decryption system and method with content analysis provision
US6732269B1 (en) * 1999-10-01 2004-05-04 International Business Machines Corporation Methods, systems and computer program products for enhanced security identity utilizing an SSL proxy
US6636838B1 (en) 2000-02-23 2003-10-21 Sun Microsystems, Inc. Content screening with end-to-end encryption
JP2001313663A (ja) * 2000-05-01 2001-11-09 Nippon Telegr & Teleph Corp <Ntt> 排他的論理ネットワークアクセス制御方法及び装置
SG118081A1 (en) * 2000-07-24 2006-01-27 Sony Corp Information processing method inter-task communication method and computer-excutable program for thesame
US20030014624A1 (en) * 2000-07-31 2003-01-16 Andes Networks, Inc. Non-proxy internet communication
US7228350B2 (en) 2000-08-04 2007-06-05 Avaya Technology Corp. Intelligent demand driven recognition of URL objects in connection oriented transactions
US20040015725A1 (en) * 2000-08-07 2004-01-22 Dan Boneh Client-side inspection and processing of secure content
FI20001837A (fi) * 2000-08-18 2002-02-19 Nokia Corp Autentikointi
US7127740B2 (en) * 2001-10-29 2006-10-24 Pitney Bowes Inc. Monitoring system for a corporate network
AU2003218550A1 (en) * 2002-03-20 2003-09-29 Research In Motion Limited System and method for checking digital certificate status
JP4129783B2 (ja) * 2002-07-10 2008-08-06 ソニー株式会社 リモートアクセスシステム及びリモートアクセス方法
US7587587B2 (en) * 2002-12-05 2009-09-08 Broadcom Corporation Data path security processing
JP2004252852A (ja) * 2003-02-21 2004-09-09 Matsushita Electric Ind Co Ltd 情報処理装置及び情報処理方法
US20050055463A1 (en) * 2003-05-16 2005-03-10 Verilegal, Inc. Secure internet functionality
US20050015599A1 (en) * 2003-06-25 2005-01-20 Nokia, Inc. Two-phase hash value matching technique in message protection systems
US7769994B2 (en) * 2003-08-13 2010-08-03 Radware Ltd. Content inspection in secure networks
US7853782B1 (en) * 2004-04-14 2010-12-14 Sprint Spectrum L.P. Secure intermediation system and method
US20070180227A1 (en) 2005-03-01 2007-08-02 Matsushita Electric Works, Ltd. Decryption apparatus for use in encrypted communications
US20060248575A1 (en) * 2005-05-02 2006-11-02 Zachary Levow Divided encryption connections to provide network traffic security

Also Published As

Publication number Publication date
EP1917780B1 (de) 2010-10-06
JP2009506617A (ja) 2009-02-12
WO2007023465A1 (en) 2007-03-01
CA2620001A1 (en) 2007-03-01
CN101300806A (zh) 2008-11-05
EP1917780B8 (de) 2011-02-16
GB0517303D0 (en) 2005-10-05
DE602006017387D1 (de) 2010-11-18
US20090201978A1 (en) 2009-08-13
US20120131330A1 (en) 2012-05-24
EP1917780A1 (de) 2008-05-07
CN101300806B (zh) 2011-07-13

Similar Documents

Publication Publication Date Title
ATE484144T1 (de) System und verfahren zum verarbeiten sicherer übertragungen
PH12019550116A1 (en) Addressing a trusted execution environment using encryption key
EP2192716A3 (de) Verfahren und System zur Aufhebung von kryptographischen Shares in Computersystemen
WO2011103561A3 (en) Encryption system using web browsers and untrusted web servers
EP2345977A4 (de) Clientcomputer zum schutz vertraulicher dateien, servercomputer dafür, verfahren dafür und computerprogramm
PH12019550119A1 (en) Addressing a trusted execution environment using signing key
WO2010144815A3 (en) System and method for providing security aboard a moving platform
WO2010026561A3 (en) An appliance, system, method and corresponding software components for encrypting and processing data
DE602006007019D1 (de) Erneuerbare verräterverfolgung
EP1944905A4 (de) Verschlüsseltes übertragungsverfahren und gerätesystem zum verhindern des kopierens der datenressource
EP1850233A4 (de) Authentifikationsverfahren, authentifikationssystem und tag-einrichtung dafür, informationsreferenz-client, authentifikationsserver und informationsserver
WO2006019726A3 (en) System and method for detecting computer virus
WO2012122117A3 (en) Content playback apis using encrypted streams
WO2009044461A1 (ja) デバイスアクセス制御プログラム、デバイスアクセス制御方法および情報処理装置
GB2530972A (en) Encrypted purging of data from content node storage
DE602005027423D1 (de) Server/Client System, Informationsverarbeitungseinheit, Informationsverarbeitungsverfahren und Computerprogramm
EP2234049A3 (de) Im Hintergrund laufender Dienstprozess zur lokalen Sammlung von Daten in einem elektronischen Entdeckungssystem
WO2009065000A3 (en) Reduced security risk apparatus and method for analyzing and managing unstructured data
CL2011002676A1 (es) Metodo y dispositivo para procesar la consistencia de metadatos en un computador cliente que comprende obtener un documento en el computador y abrirlo, recibir un mensaje, editar un area, recibir segundo y tercer mensajes en diferentes canales y determinar si uno o mas metadatos de bloqueo coinciden usando identificadores.
Zhang et al. Plaintext related two-level secret key image encryption scheme
EP2105857A3 (de) Verfahren und Vorrichtung zur Erzeugung des richtigen Objekts, Verfahren und Vorrichtung zur Übertragung des richtigen Objekts und Verfahren und Vorrichtung zum Empfangen des richtigen Objekts
NL1034193A1 (nl) Client-server verdeeld systeem, serverapparatuur, clientapparatuur en daarvoor gebruikte inter-client RTP-coderingswerkwijze.
EA200500347A1 (ru) Способ создания и обработки потоков данных, которые содержат зашифрованные и дешифрованные данные
GB201305600D0 (en) Security
GB2472955A (en) Security printing analysis system and method for enhancing security printing

Legal Events

Date Code Title Description
RER Ceased as to paragraph 5 lit. 3 law introducing patent treaties