BR112019003128A2 - trânsito e armazenamento de dados de usuário criptografados - Google Patents
trânsito e armazenamento de dados de usuário criptografadosInfo
- Publication number
- BR112019003128A2 BR112019003128A2 BR112019003128-6A BR112019003128A BR112019003128A2 BR 112019003128 A2 BR112019003128 A2 BR 112019003128A2 BR 112019003128 A BR112019003128 A BR 112019003128A BR 112019003128 A2 BR112019003128 A2 BR 112019003128A2
- Authority
- BR
- Brazil
- Prior art keywords
- transit
- storage
- user data
- encrypted user
- storage unit
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/25—Integrating or interfacing systems involving database management systems
- G06F16/258—Data format conversion from or to a database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0637—Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0281—Proxies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
Abstract
trata-se de um método para processar dados que inclui pelo menos um processador que acessa uma unidade de armazenamento de dados, sendo que a unidade de armazenamento de dados fornece pelo menos um objeto de dados de entrada e pelo menos um comando de transmutação a ser realizado no pelo menos um objeto de dados de entrada. o pelo menos um comando de transmutação opera em um modo direto no pelo menos um objeto de dados de entrada para produzir pelo menos um objeto de dados de saída a ser armazenado em uma unidade de armazenamento de dados.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201662395084P | 2016-09-15 | 2016-09-15 | |
US62/395.084 | 2016-09-15 | ||
PCT/US2017/049661 WO2018052726A1 (en) | 2016-09-15 | 2017-08-31 | Encrypted userdata transit and storage |
Publications (1)
Publication Number | Publication Date |
---|---|
BR112019003128A2 true BR112019003128A2 (pt) | 2019-05-21 |
Family
ID=61560000
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
BR112019003128-6A BR112019003128A2 (pt) | 2016-09-15 | 2017-08-31 | trânsito e armazenamento de dados de usuário criptografados |
Country Status (14)
Country | Link |
---|---|
US (7) | US10503933B2 (pt) |
EP (1) | EP3513298A4 (pt) |
JP (2) | JP7076819B2 (pt) |
KR (3) | KR20240038828A (pt) |
CN (2) | CN109643285B (pt) |
AU (4) | AU2017325928C1 (pt) |
BR (1) | BR112019003128A2 (pt) |
CA (1) | CA3031531A1 (pt) |
CR (1) | CR20190075A (pt) |
EA (1) | EA201990315A1 (pt) |
IL (1) | IL274473B (pt) |
MX (2) | MX2019002385A (pt) |
TW (3) | TWI763710B (pt) |
WO (1) | WO2018052726A1 (pt) |
Families Citing this family (94)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017087822A1 (en) * | 2015-11-18 | 2017-05-26 | Level 3 Communications, Llc | Service activation system |
US10374809B1 (en) * | 2016-12-13 | 2019-08-06 | Amazon Technologies, Inc. | Digital signature verification for asynchronous responses |
US10887090B2 (en) * | 2017-09-22 | 2021-01-05 | Nec Corporation | Scalable byzantine fault-tolerant protocol with partial tee support |
US10491577B2 (en) * | 2017-10-18 | 2019-11-26 | Blue Jeans Network, Inc. | Secure, customer-controlled storage for cloud-managed meeting details |
US11329817B2 (en) * | 2017-10-19 | 2022-05-10 | Devi Selva Kumar Vijayanarayanan | Protecting data using controlled corruption in computer networks |
US10903997B2 (en) | 2017-10-19 | 2021-01-26 | Autnhive Corporation | Generating keys using controlled corruption in computer networks |
US10061932B1 (en) * | 2018-01-04 | 2018-08-28 | WindTalker, LLC | Securing portable data elements between containers in insecure shared memory space |
US10817649B2 (en) * | 2018-01-09 | 2020-10-27 | Saudi Arabian Oil Comapny | Unicode conversion with minimal downtime |
US10878036B2 (en) * | 2018-01-17 | 2020-12-29 | Actian Corporation | Maintaining character set compatibility in database systems |
US20190238323A1 (en) * | 2018-01-31 | 2019-08-01 | Nutanix, Inc. | Key managers for distributed computing systems using key sharing techniques |
US10693662B2 (en) * | 2018-02-22 | 2020-06-23 | Idlogiq Inc. | Methods for secure serialization of supply chain product units |
US11088826B2 (en) * | 2018-02-27 | 2021-08-10 | International Business Machines Corporation | Managing assets with expiration on a blockchain |
US11687794B2 (en) * | 2018-03-22 | 2023-06-27 | Microsoft Technology Licensing, Llc | User-centric artificial intelligence knowledge base |
US20190318118A1 (en) * | 2018-04-16 | 2019-10-17 | International Business Machines Corporation | Secure encrypted document retrieval |
CN108959128B (zh) * | 2018-06-04 | 2023-03-31 | 浙江大学 | Crypt-SHA512加密算法的加速装置与方法 |
EP3591926A1 (en) * | 2018-07-03 | 2020-01-08 | Assa Abloy AB | Providing connectivity for a plurality of iot devices |
CN109086608A (zh) * | 2018-07-20 | 2018-12-25 | 西安四叶草信息技术有限公司 | 一种检测文件上传漏洞的方法、终端设备和服务器 |
US11216592B2 (en) * | 2018-08-02 | 2022-01-04 | Qualcomm Incorporated | Dynamic cryptographic key expansion |
CN110825922B (zh) * | 2018-08-14 | 2020-08-04 | 阿里巴巴集团控股有限公司 | 数据统计方法和装置 |
TWI803687B (zh) * | 2018-08-23 | 2023-06-01 | 美商阿爾克斯股份有限公司 | 用於路由最佳化的系統及其方法 |
WO2020112210A2 (en) * | 2018-09-14 | 2020-06-04 | SeaPort, Inc. | Methods and systems for customized encoding and decoding communications |
US11741196B2 (en) | 2018-11-15 | 2023-08-29 | The Research Foundation For The State University Of New York | Detecting and preventing exploits of software vulnerability using instruction tags |
CN109743287A (zh) * | 2018-12-06 | 2019-05-10 | 广东电网有限责任公司 | 一种基于数据隔离的数据重组方法及装置 |
TWI682296B (zh) * | 2018-12-06 | 2020-01-11 | 啓碁科技股份有限公司 | 映像檔打包方法及映像檔打包系統 |
KR102570688B1 (ko) * | 2018-12-27 | 2023-08-28 | 한국전력공사 | 데이터 보안 장치 |
US20200210595A1 (en) * | 2018-12-30 | 2020-07-02 | Sze Yuen Wong | CryptoJSON Indexed Search Systems and Methods |
US10389708B1 (en) | 2019-01-03 | 2019-08-20 | Capital One Services, Llc | Secure authentication of a user associated with communication with a service representative |
US11470060B2 (en) | 2019-01-10 | 2022-10-11 | Twingate, Inc. | Private exchange of encrypted data over a computer network |
US10937339B2 (en) * | 2019-01-10 | 2021-03-02 | Bank Of America Corporation | Digital cryptosystem with re-derivable hybrid keys |
US11232104B2 (en) * | 2019-01-21 | 2022-01-25 | International Business Machines Corporation | Join and predicate filtering using string lengths for variable character fields |
CN109886048B (zh) * | 2019-02-12 | 2023-01-13 | 苏州超块链信息科技有限公司 | 一种基于密码学难度累积的数据一致性保护方法 |
CN109829719B (zh) * | 2019-02-22 | 2021-06-25 | 中国农业银行股份有限公司 | 一种无连接的跨账本DvP结算方法及系统 |
US11763011B2 (en) | 2019-02-25 | 2023-09-19 | Oocl (Infotech) Holdings Limited | Zero trust communication system for freight shipping organizations, and methods of use |
CN114008611A (zh) * | 2019-02-25 | 2022-02-01 | 东方海外(信息科技)控股有限公司 | 货物运输组织的零信任通信系统及其使用方法 |
US11228434B2 (en) | 2019-03-20 | 2022-01-18 | Zettaset, Inc. | Data-at-rest encryption and key management in unreliably connected environments |
SG11202002786UA (en) * | 2019-03-27 | 2020-04-29 | Alibaba Group Holding Ltd | Retrieving public data for blockchain networks using trusted execution environments |
SG11201908981SA (en) | 2019-03-27 | 2019-10-30 | Alibaba Group Holding Ltd | Retrieving public data for blockchain networks using highly available trusted execution environments |
AU2019204725B2 (en) | 2019-03-29 | 2020-11-26 | Advanced New Technologies Co., Ltd. | Retrieving access data for blockchain networks using highly available trusted execution environments |
US11853454B1 (en) * | 2019-05-31 | 2023-12-26 | Ca, Inc. | Systems and methods for preparing a secure search index for securely detecting personally identifiable information |
WO2020247093A1 (en) * | 2019-06-05 | 2020-12-10 | Mastercard International Incorporated | Security model for distributed computing system |
CN110246207A (zh) * | 2019-06-13 | 2019-09-17 | 四川长虹电器股份有限公司 | 基于多图层的图形验证码生成方法 |
CN110267001B (zh) * | 2019-06-17 | 2021-11-16 | 视联动力信息技术股份有限公司 | 一种视联网设备信息管理方法及装置 |
WO2020256734A1 (en) * | 2019-06-21 | 2020-12-24 | Bae Systems Information And Electronic Systems Integration Inc. | Control of mission data tool application program interfaces |
CN110446108B (zh) * | 2019-06-28 | 2022-04-22 | 中国传媒大学 | 一种媒体云系统及视频加密、解密方法 |
CN112307487A (zh) * | 2019-08-02 | 2021-02-02 | 中国电信股份有限公司 | 消息处理方法和装置、消息集群服务器 |
US11265709B2 (en) | 2019-08-08 | 2022-03-01 | Zettaset, Inc. | Efficient internet-of-things (IoT) data encryption/decryption |
US11356274B2 (en) * | 2019-09-20 | 2022-06-07 | Kaleidoscope Blockchain, Inc. | Verifying a set of remotely stored data |
US11533127B1 (en) | 2019-09-20 | 2022-12-20 | Kaleidoscope Blockchain, Inc. | Determining data availability |
CN110708058B (zh) * | 2019-10-24 | 2023-05-30 | 大连东软信息学院 | 一种基于全自旋逻辑器件的2-4线译码器及其控制方法 |
CN112825054B (zh) * | 2019-11-21 | 2023-09-05 | 杭州海康威视数字技术股份有限公司 | 一种数据处理方法及电子设备 |
US10938961B1 (en) | 2019-12-18 | 2021-03-02 | Ndata, Inc. | Systems and methods for data deduplication by generating similarity metrics using sketch computation |
US11119995B2 (en) * | 2019-12-18 | 2021-09-14 | Ndata, Inc. | Systems and methods for sketch computation |
US11641346B2 (en) | 2019-12-30 | 2023-05-02 | Industrial Technology Research Institute | Data anonymity method and data anonymity system |
CN113312326B (zh) * | 2020-02-26 | 2024-04-16 | 伊姆西Ip控股有限责任公司 | 用于存储管理的方法、电子设备和计算机程序产品 |
US11265144B2 (en) * | 2020-03-09 | 2022-03-01 | International Business Machines Corporation | Consistent ciphertext creation |
US11544389B2 (en) * | 2020-03-16 | 2023-01-03 | Acronis International Gmbh | Systems and methods for performing secure computing while maintaining data confidentiality |
US11558192B2 (en) | 2020-04-09 | 2023-01-17 | Nuts Holdings, Llc | NUTS: flexible hierarchy object graphs |
US10873852B1 (en) | 2020-04-10 | 2020-12-22 | Avila Technology, LLC | POOFster: a secure mobile text message and object sharing application, system, and method for same |
US11151229B1 (en) | 2020-04-10 | 2021-10-19 | Avila Technology, LLC | Secure messaging service with digital rights management using blockchain technology |
US11175989B1 (en) * | 2020-04-24 | 2021-11-16 | Netapp, Inc. | Pooling blocks for erasure coding write groups |
US11368287B2 (en) | 2020-05-19 | 2022-06-21 | International Business Machines Corporation | Identification of a creator of an encrypted object |
EP3917103A1 (de) * | 2020-05-29 | 2021-12-01 | Siemens Aktiengesellschaft | Verfahren, system, sender und empfänger zum authentifizieren eines senders |
US11238757B2 (en) * | 2020-06-11 | 2022-02-01 | Fmr Llc | Shifting substitution cipher based efficient vaultless data tokenization apparatuses, methods and systems |
US11599649B2 (en) * | 2020-06-29 | 2023-03-07 | Rockwell Automation Technologies, Inc. | Method and apparatus for managing transmission of secure data packets |
US11606346B2 (en) | 2020-06-29 | 2023-03-14 | Rockwell Automation Technologies, Inc. | Method and apparatus for managing reception of secure data packets |
EP3933630A1 (en) * | 2020-06-30 | 2022-01-05 | Nxp B.V. | Method and apparatus to adjust system security policies based on system state |
CN111931200B (zh) * | 2020-07-13 | 2024-02-23 | 车智互联(北京)科技有限公司 | 一种数据序列化方法、移动终端和可读存储介质 |
US11962709B1 (en) * | 2020-07-15 | 2024-04-16 | Marvell Asia Pte, Ltd. | Structures and methods for deriving stable physical unclonable functions from semiconductor devices |
CN112104615B (zh) * | 2020-08-24 | 2021-07-20 | 清华大学 | 基于IPv6地址的文件可信判断的处理方法及装置 |
TWI744002B (zh) * | 2020-09-22 | 2021-10-21 | 財團法人資訊工業策進會 | 資料傳輸系統與資料傳輸方法 |
CN112395304B (zh) * | 2020-10-30 | 2024-01-02 | 迅鳐成都科技有限公司 | 基于数据行为模拟的数据安全计算方法、系统及存储介质 |
CN112347103B (zh) * | 2020-11-05 | 2024-04-12 | 深圳市极致科技股份有限公司 | 数据同步方法、装置、电子设备及存储介质 |
US20220141221A1 (en) * | 2020-11-05 | 2022-05-05 | T-Mobile Innovations Llc | Smart Computing Device Implementing Network Security and Data Arbitration |
TWI749866B (zh) * | 2020-11-12 | 2021-12-11 | 南亞科技股份有限公司 | 資料處理裝置與資料處理方法 |
KR102519357B1 (ko) | 2020-11-18 | 2023-05-03 | (주)에프알텍 | O-RAN 프론트홀의 5G mmWave 광대역 빔포밍 MIMO 서비스 방법과 그 장치 |
CN112241547B (zh) * | 2020-11-23 | 2023-06-06 | 中国联合网络通信集团有限公司 | 车辆数据加密分析方法、边缘服务器及存储介质 |
KR102497155B1 (ko) | 2020-11-24 | 2023-02-07 | 주식회사 에스원 | 방범 시스템에서 감지 루프에 대한 강제 루핑을 검출하기 위한 장치 및 이를 위한 방법 |
CN112492580B (zh) * | 2020-11-25 | 2023-08-18 | 北京小米移动软件有限公司 | 信息处理方法及装置、通信设备及存储介质 |
JP7175480B2 (ja) * | 2020-12-02 | 2022-11-21 | 株式会社アーリーワークス | 情報処理システム及びプログラム |
KR20220081256A (ko) | 2020-12-07 | 2022-06-15 | 주식회사 마이지놈박스 | 블록체인 기술을 이용한 dna 데이터의 인증과 무결성 확보를 위한 장치 |
KR102293404B1 (ko) | 2020-12-07 | 2021-08-26 | 주식회사 마이지놈박스 | 블록체인 기술을 이용한 dna 데이터의 인증과 무결성 확보를 위한 장치 및 이를 위한 방법 |
CN112541186B (zh) * | 2020-12-21 | 2022-03-18 | 中国电子科技集团公司第三十研究所 | 一种基于运动状态感知的密码抗失控系统及方法 |
US11327721B1 (en) * | 2021-02-08 | 2022-05-10 | Marco Renedo | System for extending functionality of a computer programming language, and related method and software |
CN113222829B (zh) * | 2021-02-25 | 2023-04-25 | 安徽师范大学 | 基于Bernstein基的数字图像分存方法及图像复原方法 |
US11856090B2 (en) | 2021-06-24 | 2023-12-26 | International Business Machines Corporation | Data protection optimization |
US11868275B2 (en) | 2021-06-24 | 2024-01-09 | International Business Machines Corporation | Encrypted data processing design including local buffers |
CN113259390B (zh) * | 2021-06-25 | 2021-09-14 | 深圳市爱挖网络科技有限公司 | 一种用于招聘平台的账号安全防护系统 |
CN113360505B (zh) * | 2021-07-02 | 2023-09-26 | 招商局金融科技有限公司 | 基于时序数据的数据处理方法、装置、电子设备及可读存储介质 |
CN113497806B (zh) * | 2021-07-05 | 2023-07-04 | 国铁吉讯科技有限公司 | 一种远程登录方法、装置及存储介质 |
CN113569262B (zh) * | 2021-07-30 | 2022-05-10 | 立信(重庆)数据科技股份有限公司 | 基于区块链的密文存储方法及系统 |
US20230086809A1 (en) * | 2021-09-17 | 2023-03-23 | BCD International, Inc. | Combined security and video camera control system |
CN114154123B (zh) * | 2022-02-09 | 2022-05-17 | 北京天防安全科技有限公司 | 应用于Python项目的加密保护方法 |
CN116629871B (zh) * | 2023-07-21 | 2023-10-17 | 济南正浩软件科技有限公司 | 一种订单线上支付系统及支付方法 |
CN117421759B (zh) * | 2023-12-19 | 2024-03-29 | 长春市鸣玺科技有限公司 | 基于大数据信息进行处理的工程资料管理系统及方法 |
Family Cites Families (121)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5870474A (en) | 1995-12-04 | 1999-02-09 | Scientific-Atlanta, Inc. | Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity of service providers |
US5715403A (en) | 1994-11-23 | 1998-02-03 | Xerox Corporation | System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar |
JPH08263438A (ja) | 1994-11-23 | 1996-10-11 | Xerox Corp | ディジタルワークの配給及び使用制御システム並びにディジタルワークへのアクセス制御方法 |
US7690043B2 (en) | 1994-12-19 | 2010-03-30 | Legal Igaming, Inc. | System and method for connecting gaming devices to a network for remote play |
US5933501A (en) | 1996-08-01 | 1999-08-03 | Harris Corporation | `Virtual` encryption scheme combining different encryption operators into compound-encryption mechanism |
US6249866B1 (en) | 1997-09-16 | 2001-06-19 | Microsoft Corporation | Encrypting file system and method |
US6324650B1 (en) | 1998-03-16 | 2001-11-27 | John W.L. Ogilvie | Message content protection and conditional disclosure |
US6205549B1 (en) | 1998-08-28 | 2001-03-20 | Adobe Systems, Inc. | Encapsulation of public key cryptography standard number 7 into a secured document |
US6185684B1 (en) | 1998-08-28 | 2001-02-06 | Adobe Systems, Inc. | Secured document access control using recipient lists |
US6823068B1 (en) | 1999-02-01 | 2004-11-23 | Gideon Samid | Denial cryptography based on graph theory |
DE19906450C1 (de) | 1999-02-16 | 2000-08-17 | Fraunhofer Ges Forschung | Verfahren und Vorrichtung zum Erzeugen eines verschlüsselten Nutzdatenstroms und Verfahren und Vorrichtung zum Entschlüsseln eines verschlüsselten Nutzdatenstroms |
US6845449B1 (en) | 1999-07-23 | 2005-01-18 | Networks Associates Technology, Inc. | System and method for fast nested message authentication codes and error correction codes |
US6976168B1 (en) | 1999-07-23 | 2005-12-13 | Mcafee, Inc. | System and method for adaptive cryptographically synchronized authentication |
US20110208567A9 (en) | 1999-08-23 | 2011-08-25 | Roddy Nicholas E | System and method for managing a fleet of remote assets |
US20020184485A1 (en) | 1999-12-20 | 2002-12-05 | Dray James F. | Method for electronic communication providing self-encrypting and self-verification capabilities |
US20050015608A1 (en) | 2003-07-16 | 2005-01-20 | Pkware, Inc. | Method for strongly encrypting .ZIP files |
GB0023409D0 (en) * | 2000-09-22 | 2000-11-08 | Integrated Silicon Systems Ltd | Data encryption apparatus |
US6862354B1 (en) * | 2000-09-29 | 2005-03-01 | Cisco Technology, Inc. | Stream cipher encryption method and apparatus that can efficiently seek to arbitrary locations in a key stream |
US7010570B1 (en) | 2000-10-16 | 2006-03-07 | International Business Machines Corporation | System and method for the controlled progressive disclosure of information |
US20020170053A1 (en) * | 2000-10-26 | 2002-11-14 | General Instrument, Inc. | ECM and EMM distribution for multimedia multicast content |
US7436964B2 (en) * | 2000-12-19 | 2008-10-14 | At&T Mobility Ii Llc | Synchronization of encryption in a wireless communication system |
US7136859B2 (en) | 2001-03-14 | 2006-11-14 | Microsoft Corporation | Accessing heterogeneous data in a standardized manner |
US7043637B2 (en) | 2001-03-21 | 2006-05-09 | Microsoft Corporation | On-disk file format for a serverless distributed file system |
US6981138B2 (en) | 2001-03-26 | 2005-12-27 | Microsoft Corporation | Encrypted key cache |
US7185205B2 (en) | 2001-03-26 | 2007-02-27 | Galois Connections, Inc. | Crypto-pointers for secure data storage |
WO2002077747A2 (en) | 2001-03-27 | 2002-10-03 | Microsoft Corporation | Distributed, scalable cryptographic access control |
US7461405B2 (en) * | 2001-04-26 | 2008-12-02 | Autodesk, Inc. | Mixed-media data encoding |
US20020198748A1 (en) * | 2001-05-25 | 2002-12-26 | Eden Thomas M. | System and method for implementing an employee-rights-sensitive drug free workplace policy |
US7359517B1 (en) | 2001-10-09 | 2008-04-15 | Adobe Systems Incorporated | Nestable skeleton decryption keys for digital rights management |
US20030074482A1 (en) | 2001-10-16 | 2003-04-17 | Christensen Erik B. | Composable messaging protocol |
US8059815B2 (en) | 2001-12-13 | 2011-11-15 | Digimarc Corporation | Transforming data files into logical storage units for auxiliary data through reversible watermarks |
US7137553B2 (en) | 2001-12-31 | 2006-11-21 | Digital Data Research Company | Security clearance card, system and method of reading a security clearance card |
US7487365B2 (en) | 2002-04-17 | 2009-02-03 | Microsoft Corporation | Saving and retrieving data based on symmetric key encryption |
US7890771B2 (en) | 2002-04-17 | 2011-02-15 | Microsoft Corporation | Saving and retrieving data based on public key encryption |
JP4111923B2 (ja) | 2003-01-22 | 2008-07-02 | 株式会社リコー | データ形式可逆変換方法、画像処理装置、データ形式可逆変換用プログラム及び記憶媒体 |
US7181016B2 (en) | 2003-01-27 | 2007-02-20 | Microsoft Corporation | Deriving a symmetric key from an asymmetric key for file encryption or decryption |
US7197512B2 (en) | 2003-03-26 | 2007-03-27 | Microsoft Corporation | Type bridges |
US7653876B2 (en) | 2003-04-07 | 2010-01-26 | Adobe Systems Incorporated | Reversible document format |
EP2528000B1 (en) * | 2003-05-23 | 2017-07-26 | IP Reservoir, LLC | Intelligent data storage and processing using FPGA devices |
US7389529B1 (en) | 2003-05-30 | 2008-06-17 | Cisco Technology, Inc. | Method and apparatus for generating and using nested encapsulation data |
US7480382B2 (en) | 2003-09-30 | 2009-01-20 | Microsoft Corporation | Image file container |
WO2005043802A1 (en) | 2003-10-20 | 2005-05-12 | Drm Technologies, Llc | Securing digital content system and method |
US7243157B2 (en) | 2004-02-20 | 2007-07-10 | Microsoft Corporation | Dynamic protocol construction |
JP2005259015A (ja) | 2004-03-15 | 2005-09-22 | Ricoh Co Ltd | 文書開示装置、文書開示システム、プログラム及び記憶媒体 |
US20050213511A1 (en) * | 2004-03-29 | 2005-09-29 | Merlin Mobile Media | System and method to track wireless device and communications usage |
JP2005341316A (ja) * | 2004-05-27 | 2005-12-08 | Sony Corp | 情報処理システムおよび方法、情報処理装置および方法、並びにプログラム |
US7587433B2 (en) | 2004-06-01 | 2009-09-08 | Red Bend Ltd. | Method and system for in-place updating content stored in a storage device |
US8306920B1 (en) | 2004-07-28 | 2012-11-06 | Ebay Inc. | Method and system to securely store customer data in a network-based commerce system |
US7711120B2 (en) | 2004-07-29 | 2010-05-04 | Infoassure, Inc. | Cryptographic key management |
IL164571A0 (en) * | 2004-10-14 | 2005-12-18 | Yuval Broshy | A system and method for authenticating and validating the validating the linkage between input filesand output files in a computational process |
US7454021B2 (en) * | 2004-10-29 | 2008-11-18 | Hewlett-Packard Development Company, L.P. | Off-loading data re-encryption in encrypted data management systems |
US7441185B2 (en) | 2005-01-25 | 2008-10-21 | Microsoft Corporation | Method and system for binary serialization of documents |
EP1870821A4 (en) * | 2005-03-30 | 2013-04-03 | Fujitsu Ltd | IMPLEMENTATION PROCEDURES FOR STRUCTURED DATA |
US8694788B1 (en) * | 2005-04-29 | 2014-04-08 | Progressive Casualty Insurance Company | Security system |
US8832047B2 (en) | 2005-07-27 | 2014-09-09 | Adobe Systems Incorporated | Distributed document version control |
US7945784B1 (en) | 2005-08-19 | 2011-05-17 | Adobe Systems Incorporated | Method and system to perform secret sharing |
US20070078684A1 (en) * | 2005-09-30 | 2007-04-05 | International Business Machines Corporation | Models for sustaining and facilitating participation in health record data banks |
JP2007142591A (ja) | 2005-11-15 | 2007-06-07 | Matsushita Electric Ind Co Ltd | 暗号管理方法 |
US7593548B2 (en) | 2005-12-15 | 2009-09-22 | Microsoft Corporation | Secure and anonymous storage and accessibility for sensitive data |
US7949720B2 (en) | 2006-01-31 | 2011-05-24 | Microsoft Corporation | Message object model |
US8561127B1 (en) | 2006-03-01 | 2013-10-15 | Adobe Systems Incorporated | Classification of security sensitive information and application of customizable security policies |
US20080248782A1 (en) * | 2006-04-07 | 2008-10-09 | Mobitv, Inc. | Providing Devices With Command Functionality in Content Streams |
CA2546148A1 (en) * | 2006-05-09 | 2007-11-09 | Nikolajs Volkovs | Method, system and computer program for polynomial based hashing and message authentication coding with separate generation of spectrums |
KR20090052321A (ko) * | 2006-07-07 | 2009-05-25 | 쌘디스크 코포레이션 | 다기능 제어 구조를 이용하는 콘텐트 제어 시스템과 방법 |
US20080091606A1 (en) | 2006-10-12 | 2008-04-17 | William Grecia | Proprietary encapsulated session container with embedded features for a post transferred option for electronic commerce along with a system for distribution and user access |
US20080097786A1 (en) * | 2006-10-18 | 2008-04-24 | Rohit Sachdeva | Digital data security in healthcare enterprise |
US20080104146A1 (en) * | 2006-10-31 | 2008-05-01 | Rebit, Inc. | System for automatically shadowing encrypted data and file directory structures for a plurality of network-connected computers using a network-attached memory with single instance storage |
US8219821B2 (en) | 2007-03-27 | 2012-07-10 | Netapp, Inc. | System and method for signature based data container recognition |
US7779139B2 (en) | 2007-04-30 | 2010-08-17 | Microsoft Corporation | Normalization of binary data |
US8656159B1 (en) | 2007-10-11 | 2014-02-18 | Adobe Systems Incorporated | Versioning of modifiable encrypted documents |
JP4818345B2 (ja) | 2007-12-05 | 2011-11-16 | イノヴァティヴ ソニック リミテッド | セキュリティーキー変更を処理する方法及び通信装置 |
US7996672B1 (en) | 2007-12-05 | 2011-08-09 | Adobe Systems Incorporated | Support for multiple digital rights management systems for same content |
US8145794B2 (en) | 2008-03-14 | 2012-03-27 | Microsoft Corporation | Encoding/decoding while allowing varying message formats per message |
US8621222B1 (en) | 2008-05-30 | 2013-12-31 | Adobe Systems Incorporated | Archiving electronic content having digital signatures |
US8826005B1 (en) | 2008-08-21 | 2014-09-02 | Adobe Systems Incorporated | Security for software in a computing system |
US9996567B2 (en) * | 2014-05-30 | 2018-06-12 | Georgetown University | Process and framework for facilitating data sharing using a distributed hypergraph |
US20100174664A1 (en) | 2009-01-05 | 2010-07-08 | Blackrock Institutional Trust Company, N.A. | ETF Trading in Secondary Market Based on Underlying Basket |
US20100173610A1 (en) * | 2009-01-05 | 2010-07-08 | Qualcomm Incorporated | Access stratum security configuration for inter-cell handover |
US8978091B2 (en) | 2009-01-20 | 2015-03-10 | Microsoft Technology Licensing, Llc | Protecting content from third party using client-side security protection |
US10169599B2 (en) | 2009-08-26 | 2019-01-01 | International Business Machines Corporation | Data access control with flexible data disclosure |
US8831228B1 (en) | 2009-08-28 | 2014-09-09 | Adobe Systems Incorporated | System and method for decentralized management of keys and policies |
US8468345B2 (en) * | 2009-11-16 | 2013-06-18 | Microsoft Corporation | Containerless data for trustworthy computing and data services |
EP2348449A3 (en) | 2009-12-18 | 2013-07-10 | CompuGroup Medical AG | A computer implemented method for performing cloud computing on data being stored pseudonymously in a database |
US8397068B2 (en) | 2010-04-28 | 2013-03-12 | Microsoft Corporation | Generic file protection format |
US9762435B2 (en) | 2010-10-04 | 2017-09-12 | Avocent Huntsville, Llc | System and method for monitoring and managing data center resources incorporating a common data model repository |
EP2646936B1 (en) * | 2011-01-11 | 2018-11-07 | Apple Inc. | Real-time or near real-time streaming |
HU230908B1 (hu) | 2011-03-25 | 2019-02-28 | Tresorit Kft. | Eljárás és rendszertechnikai elrendezés csoportmegosztások kezelésére elosztott adattárolási, különösen P2P környezetben |
US8181035B1 (en) * | 2011-06-22 | 2012-05-15 | Media Patents, S.L. | Methods, apparatus and systems to improve security in computer systems |
US9077525B2 (en) | 2011-06-24 | 2015-07-07 | Microsoft Technology Licensing, Llc | User-controlled data encryption with obfuscated policy |
US9390228B2 (en) | 2011-10-31 | 2016-07-12 | Reid Consulting Group, Inc. | System and method for securely storing and sharing information |
US9378380B1 (en) | 2011-10-31 | 2016-06-28 | Reid Consulting Group | System and method for securely storing and sharing information |
CN104012030B (zh) * | 2011-12-21 | 2018-04-13 | 英特尔公司 | 用于保护对称加密密钥的系统及方法 |
US9152819B2 (en) * | 2011-12-30 | 2015-10-06 | Intel Corporation | Cloud based real time app privacy dashboard |
US9215223B2 (en) | 2012-01-18 | 2015-12-15 | OneID Inc. | Methods and systems for secure identity management |
US8739308B1 (en) * | 2012-03-27 | 2014-05-27 | Amazon Technologies, Inc. | Source identification for unauthorized copies of content |
US9116906B2 (en) | 2012-06-12 | 2015-08-25 | Sap Se | Centralized read access logging |
US20140025719A1 (en) * | 2012-07-02 | 2014-01-23 | Alexander A. Kalinkin | Asynchronous distributed computing based system |
US9285981B1 (en) | 2012-07-16 | 2016-03-15 | Wickr Inc. | Discouraging screen capture |
US9278249B2 (en) * | 2012-07-23 | 2016-03-08 | Icon Health & Fitness, Inc. | Exercise cycle with vibration capabilities |
WO2014059136A2 (en) * | 2012-10-12 | 2014-04-17 | Safelylocked, Llc. | Techniqued for secure data exchange |
US8972750B2 (en) | 2012-12-19 | 2015-03-03 | Adobe Systems Incorporated | Method and apparatus for securing transfer of secure content to a destination |
WO2014105834A1 (en) | 2012-12-30 | 2014-07-03 | Feliciano Raymond Richard | Method and apparatus for encrypting and decrypting data |
US20140245025A1 (en) * | 2013-02-22 | 2014-08-28 | Spideroak Inc. | System and method for storing data securely |
US10769296B2 (en) | 2013-12-10 | 2020-09-08 | Early Warning Services, Llc | System and method of permission-based data sharing |
CN103731272B (zh) | 2014-01-06 | 2017-06-06 | 飞天诚信科技股份有限公司 | 一种身份认证方法、系统及设备 |
US9767317B1 (en) * | 2014-03-25 | 2017-09-19 | Amazon Technologies, Inc. | System to provide cryptographic functions to a markup language application |
CN105207774B (zh) * | 2014-05-30 | 2019-03-01 | 北京奇虎科技有限公司 | 验证信息的密钥协商方法及装置 |
GB2513260B (en) | 2014-06-27 | 2018-06-13 | PQ Solutions Ltd | System and method for quorum-based data recovery |
US20160028735A1 (en) | 2014-07-28 | 2016-01-28 | Max Planck Gesellschaft zur Förderung der Wissenschaften e.V. | Private analytics with controlled information disclosure |
EP3219048A4 (en) | 2014-11-12 | 2018-05-16 | Reid Consulting Group | System and method for securely storing and sharing information |
US9129095B1 (en) | 2014-12-19 | 2015-09-08 | Tresorit, Kft | Client-side encryption with DRM |
US9871772B1 (en) * | 2015-03-17 | 2018-01-16 | The Charles Stark Draper Laboratory, Inc. | Cryptographic system for secure command and control of remotely controlled devices |
RU2673842C1 (ru) | 2015-03-20 | 2018-11-30 | Ривец Корп. | Автоматическая аттестация сохранности устройства с применением цепочки блоков |
CN105743958A (zh) * | 2015-04-13 | 2016-07-06 | 乐视网信息技术(北京)股份有限公司 | 一种终端之间的通信方法和装置 |
US10515409B2 (en) | 2016-03-23 | 2019-12-24 | Domus Tower, Inc. | Distributing work load of high-volume per second transactions recorded to append-only ledgers |
US10613938B2 (en) * | 2015-07-01 | 2020-04-07 | Actifio, Inc. | Data virtualization using copy data tokens |
KR101661930B1 (ko) | 2015-08-03 | 2016-10-05 | 주식회사 코인플러그 | 블록체인을 기반으로 하는 공인인증서 발급시스템 |
US10243744B2 (en) * | 2016-06-21 | 2019-03-26 | The King Abdulaziz City For Science And Technology | Residue message authentication code |
CN105930236A (zh) * | 2016-07-15 | 2016-09-07 | 深圳市沃特玛电池有限公司 | 一种基于BMS Bootloader升级的应用程序版本回退方法 |
US11341259B2 (en) | 2018-12-12 | 2022-05-24 | Spideroak, Inc. | Managing group authority and access to a secured file system in a decentralized environment |
US11341261B2 (en) | 2019-04-05 | 2022-05-24 | Spideroak, Inc. | Integration of a block chain, managing group authority and access in an enterprise environment |
-
2017
- 2017-08-31 CN CN201780053634.5A patent/CN109643285B/zh active Active
- 2017-08-31 US US15/692,648 patent/US10503933B2/en active Active
- 2017-08-31 EP EP17851312.3A patent/EP3513298A4/en active Pending
- 2017-08-31 BR BR112019003128-6A patent/BR112019003128A2/pt unknown
- 2017-08-31 KR KR1020247008644A patent/KR20240038828A/ko active Application Filing
- 2017-08-31 JP JP2019515439A patent/JP7076819B2/ja active Active
- 2017-08-31 EA EA201990315A patent/EA201990315A1/ru unknown
- 2017-08-31 AU AU2017325928A patent/AU2017325928C1/en active Active
- 2017-08-31 MX MX2019002385A patent/MX2019002385A/es unknown
- 2017-08-31 KR KR1020227033687A patent/KR102649209B1/ko active Application Filing
- 2017-08-31 WO PCT/US2017/049661 patent/WO2018052726A1/en active Application Filing
- 2017-08-31 CR CR20190075A patent/CR20190075A/es unknown
- 2017-08-31 KR KR1020197004510A patent/KR102482406B1/ko active IP Right Grant
- 2017-08-31 CA CA3031531A patent/CA3031531A1/en active Pending
- 2017-08-31 CN CN202311550181.0A patent/CN117692170A/zh active Pending
- 2017-08-31 US US15/692,584 patent/US10671764B2/en active Active
- 2017-09-14 TW TW106131531A patent/TWI763710B/zh active
- 2017-09-14 TW TW111114996A patent/TWI803291B/zh active
- 2017-09-14 TW TW112115495A patent/TW202333054A/zh unknown
-
2019
- 2019-02-27 MX MX2023007718A patent/MX2023007718A/es unknown
- 2019-09-25 US US16/582,649 patent/US11010496B2/en active Active
-
2020
- 2020-03-24 US US16/828,535 patent/US11003802B2/en active Active
- 2020-05-05 IL IL274473A patent/IL274473B/en unknown
-
2021
- 2021-04-16 US US17/232,903 patent/US20210240867A1/en active Pending
- 2021-04-16 US US17/232,929 patent/US11720716B2/en active Active
-
2022
- 2022-02-07 AU AU2022200795A patent/AU2022200795B2/en active Active
- 2022-05-10 JP JP2022077448A patent/JP2022116009A/ja active Pending
-
2023
- 2023-06-08 US US18/331,366 patent/US20230315917A1/en active Pending
- 2023-07-04 AU AU2023204296A patent/AU2023204296B2/en active Active
-
2024
- 2024-02-21 AU AU2024201130A patent/AU2024201130A1/en active Pending
Also Published As
Similar Documents
Publication | Publication Date | Title |
---|---|---|
BR112019003128A2 (pt) | trânsito e armazenamento de dados de usuário criptografados | |
MX347136B (es) | Desambiguacion de comandos dinamicos. | |
BR112016024522A2 (pt) | meio de armazenamento legível por computador não transitório, e, método | |
CO2017007028A2 (es) | Completamiento, sin cabeza, de tareas dentro de asistentes personales digitales | |
BR112017002834A2 (pt) | transformações de fluxos de eventos | |
BR112019006489A2 (pt) | serviço de segurança de iot | |
MX2016003521A (es) | Generacion de contenido fuera de linea. | |
BR112016024774A2 (pt) | sistema de criação de website implementável em um dispositivo de computação, e método implementável em um dispositivo de computação | |
BR112019008162A2 (pt) | método para executar uma liquidação e sistema para executar uma liquidação | |
BR112016020776A8 (pt) | Calibração de teclado virtual | |
TWD174329S (zh) | 筆記型電腦之部分 | |
BR112015024773A8 (pt) | Método, sistema e aparelho para comparação de imagens | |
CR20150552A (es) | Entorno de aprendizaje de idiomas | |
BR112013028501A2 (pt) | aparelho e método para processamento de dados seguro baseado em hardware utilizando regras de faixa de endereço de memória de armazenamento temporário | |
MX2016012272A (es) | Intencion de cliente en entorno de busqueda integrada. | |
SG10201810036QA (en) | Processing queries containing a union-type operation | |
BR112015014470A2 (pt) | compilador configurado para compilar um programa de computador, dispositivo de computação configurado para executar um programa de computador compilado por um compilador, método para executar um programa de computador compilado por um compilador e programa de computador | |
BR112017003426A2 (pt) | fluxo de dados construído para processamento de evento intensificado | |
MX2017002872A (es) | Envoltura condicional para objeto de programa. | |
SG10201907046QA (en) | Method and apparatus for assigning device fingerprints to internet devices | |
BR112017007442A2 (pt) | roteamento de interrupção eficiente para um processador de várias threads | |
SG10201901587VA (en) | Application testing | |
MX2018010114A (es) | Sistemas y metodos para calcular la compensacion de privacidad-utilidad de datos. | |
BR112018071698A2 (pt) | sistema de provisionamento de ativos baseados na rede social | |
MX2019012411A (es) | Supresion temporal de procesamiento de una solicitud de operando de almacenamiento restringida. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
B350 | Update of information on the portal [chapter 15.35 patent gazette] | ||
B06W | Patent application suspended after preliminary examination (for patents with searches from other patent authorities) chapter 6.23 patent gazette] | ||
B154 | Notification of filing of divisional application [chapter 15.50 patent gazette] |
Free format text: O PEDIDO FOI DIVIDIDO NO BR122023009313-5 PROTOCOLO 870230040637 EM 15/05/2023 17:49. |
|
B15K | Others concerning applications: alteration of classification |
Free format text: AS CLASSIFICACOES ANTERIORES ERAM: G06F 12/14 , G06F 11/30 Ipc: H04L 9/06 (2006.01), H04L 9/08 (2006.01), H04L 9/1 |