AU2002367950A1 - Clearance-based method for dynamically configuring encryption strength - Google Patents
Clearance-based method for dynamically configuring encryption strengthInfo
- Publication number
- AU2002367950A1 AU2002367950A1 AU2002367950A AU2002367950A AU2002367950A1 AU 2002367950 A1 AU2002367950 A1 AU 2002367950A1 AU 2002367950 A AU2002367950 A AU 2002367950A AU 2002367950 A AU2002367950 A AU 2002367950A AU 2002367950 A1 AU2002367950 A1 AU 2002367950A1
- Authority
- AU
- Australia
- Prior art keywords
- clearance
- based method
- dynamically configuring
- encryption strength
- configuring encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0457—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply dynamic encryption, e.g. stream encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2002/015367 WO2003098898A1 (en) | 2002-05-13 | 2002-05-13 | Clearance-based method for dynamically configuring encryption strength |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2002367950A1 true AU2002367950A1 (en) | 2003-12-02 |
Family
ID=29547644
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2002367950A Abandoned AU2002367950A1 (en) | 2002-05-13 | 2002-05-13 | Clearance-based method for dynamically configuring encryption strength |
Country Status (2)
Country | Link |
---|---|
AU (1) | AU2002367950A1 (en) |
WO (1) | WO2003098898A1 (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9928508B2 (en) | 2000-08-04 | 2018-03-27 | Intellectual Ventures I Llc | Single sign-on for access to a central data repository |
GB2411554B (en) * | 2004-02-24 | 2006-01-18 | Toshiba Res Europ Ltd | Multi-rate security |
GB0404444D0 (en) * | 2004-02-27 | 2004-09-01 | Bae Sys Defence Sys Ltd | Secure computer communication |
US8527752B2 (en) | 2004-06-16 | 2013-09-03 | Dormarke Assets Limited Liability | Graduated authentication in an identity management system |
US9245266B2 (en) | 2004-06-16 | 2016-01-26 | Callahan Cellular L.L.C. | Auditable privacy policies in a distributed hierarchical identity management system |
US20160065537A1 (en) * | 2014-08-28 | 2016-03-03 | Motorola Solutions, Inc | Method and apparatus enabling interoperability between devices operating at different security levels and trust chains |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5602916A (en) * | 1994-10-05 | 1997-02-11 | Motorola, Inc. | Method and apparatus for preventing unauthorized monitoring of wireless data transmissions |
US5689566A (en) * | 1995-10-24 | 1997-11-18 | Nguyen; Minhtam C. | Network with secure communications sessions |
SE506853C2 (en) * | 1996-06-20 | 1998-02-16 | Anonymity Prot In Sweden Ab | Method of data processing |
US6609198B1 (en) * | 1999-08-05 | 2003-08-19 | Sun Microsystems, Inc. | Log-on service providing credential level change without loss of session continuity |
-
2002
- 2002-05-13 WO PCT/US2002/015367 patent/WO2003098898A1/en not_active Application Discontinuation
- 2002-05-13 AU AU2002367950A patent/AU2002367950A1/en not_active Abandoned
Also Published As
Publication number | Publication date |
---|---|
WO2003098898A1 (en) | 2003-11-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2003233103A1 (en) | Method for authentication between devices | |
AU2002232187A1 (en) | Authenticating method | |
AU2002338042A1 (en) | Cryptographic communication apparatus | |
AU2003216337A1 (en) | Firewall | |
AU2003269751A1 (en) | Immobilization method | |
AUPS160602A0 (en) | Therapeutic method | |
AU2003233357A1 (en) | Dressing aid | |
AU2003278355A1 (en) | Process | |
AU2003237695A1 (en) | Authentication means | |
AU2003258070A1 (en) | Electrodionization method | |
AU2003227414A1 (en) | Polishing method | |
AU2003286421A1 (en) | Polishing method | |
AU2003277663A1 (en) | Screening method | |
AU2003902613A0 (en) | Self-surveying method | |
AU2002367950A1 (en) | Clearance-based method for dynamically configuring encryption strength | |
AU2003227976A1 (en) | Meeting aid | |
AU2003229646A1 (en) | Authentication method | |
AU2003253582A1 (en) | Biodetection method | |
AU2002322417A1 (en) | An improved hydrocracking process | |
AU2003253813A1 (en) | Method for colpoplasty | |
AU2003208685A1 (en) | Podologic aid | |
AU2003278535A1 (en) | Histoscreen method | |
AU2003264722A1 (en) | Methods | |
AU2003263197A1 (en) | Process | |
AU2002338223A1 (en) | Multi kick-sled |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MK6 | Application lapsed section 142(2)(f)/reg. 8.3(3) - pct applic. not entering national phase |