CA2967353A1 - Systemes autonomes et procedes pour un acces securise - Google Patents
Systemes autonomes et procedes pour un acces securise Download PDFInfo
- Publication number
- CA2967353A1 CA2967353A1 CA2967353A CA2967353A CA2967353A1 CA 2967353 A1 CA2967353 A1 CA 2967353A1 CA 2967353 A CA2967353 A CA 2967353A CA 2967353 A CA2967353 A CA 2967353A CA 2967353 A1 CA2967353 A1 CA 2967353A1
- Authority
- CA
- Canada
- Prior art keywords
- autonomous
- security
- source
- processor
- under protection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/72—Signcrypting, i.e. digital signing and encrypting simultaneously
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201462078137P | 2014-11-11 | 2014-11-11 | |
US62/078,137 | 2014-11-11 | ||
PCT/US2015/060216 WO2016077494A1 (fr) | 2014-11-11 | 2015-11-11 | Systèmes autonomes et procédés pour un accès sécurisé |
Publications (1)
Publication Number | Publication Date |
---|---|
CA2967353A1 true CA2967353A1 (fr) | 2016-05-19 |
Family
ID=55955004
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2967353A Abandoned CA2967353A1 (fr) | 2014-11-11 | 2015-11-11 | Systemes autonomes et procedes pour un acces securise |
Country Status (7)
Country | Link |
---|---|
EP (1) | EP3218840A4 (fr) |
JP (1) | JP2017535871A (fr) |
KR (1) | KR20170085529A (fr) |
CN (1) | CN107111719A (fr) |
AU (1) | AU2015346404A1 (fr) |
CA (1) | CA2967353A1 (fr) |
WO (1) | WO2016077494A1 (fr) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107622210B (zh) * | 2017-09-22 | 2019-12-03 | 天逸财金科技服务股份有限公司 | 身份认证及授权证明之资料查询方法与系统 |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9038193B2 (en) * | 1998-08-14 | 2015-05-19 | Azos Al, Llc | System and method of data cognition incorporating autonomous security protection |
US7334124B2 (en) * | 2002-07-22 | 2008-02-19 | Vormetric, Inc. | Logical access block processing protocol for transparent secure file storage |
US8266676B2 (en) * | 2004-11-29 | 2012-09-11 | Harris Corporation | Method to verify the integrity of components on a trusted platform using integrity database services |
US8037310B2 (en) * | 2004-11-30 | 2011-10-11 | Ricoh Co., Ltd. | Document authentication combining digital signature verification and visual comparison |
US8087067B2 (en) * | 2008-10-21 | 2011-12-27 | Lookout, Inc. | Secure mobile platform system |
US8364984B2 (en) * | 2009-03-13 | 2013-01-29 | Microsoft Corporation | Portable secure data files |
CN102223364B (zh) * | 2011-05-09 | 2014-06-04 | 飞天诚信科技股份有限公司 | 一种访问电子书数据的方法及系统 |
US9489529B2 (en) * | 2011-10-13 | 2016-11-08 | Stewart A. Baker | Data security system |
US9706410B2 (en) * | 2012-03-07 | 2017-07-11 | Rapid 7, Inc. | Controlling enterprise access by mobile devices |
US20140282895A1 (en) * | 2013-03-15 | 2014-09-18 | Sky Socket, Llc | Secondary device as key for authorizing access to resources |
CN104009977B (zh) * | 2014-05-09 | 2016-10-05 | 北京奇虎科技有限公司 | 一种信息保护的方法和系统 |
-
2015
- 2015-11-11 AU AU2015346404A patent/AU2015346404A1/en not_active Abandoned
- 2015-11-11 EP EP15859303.8A patent/EP3218840A4/fr not_active Withdrawn
- 2015-11-11 CN CN201580061453.8A patent/CN107111719A/zh active Pending
- 2015-11-11 JP JP2017525379A patent/JP2017535871A/ja active Pending
- 2015-11-11 KR KR1020177015346A patent/KR20170085529A/ko unknown
- 2015-11-11 WO PCT/US2015/060216 patent/WO2016077494A1/fr active Application Filing
- 2015-11-11 CA CA2967353A patent/CA2967353A1/fr not_active Abandoned
Also Published As
Publication number | Publication date |
---|---|
AU2015346404A1 (en) | 2017-06-01 |
JP2017535871A (ja) | 2017-11-30 |
KR20170085529A (ko) | 2017-07-24 |
CN107111719A (zh) | 2017-08-29 |
EP3218840A1 (fr) | 2017-09-20 |
WO2016077494A1 (fr) | 2016-05-19 |
EP3218840A4 (fr) | 2018-05-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9887984B2 (en) | Autonomous system for secure electric system access | |
EP2866166B1 (fr) | Systèmes et procédés permettant d'imposer une anonymisation de données de surveillance de tiers | |
Maes et al. | A pay-per-use licensing scheme for hardware IP cores in recent SRAM-based FPGAs | |
JP2009518762A (ja) | インテグリティデータベースサービスを用いた、トラステッドプラットフォーム上のコンポーンテントのインテグリティの検証方法 | |
Zhang et al. | A pragmatic per-device licensing scheme for hardware IP cores on SRAM-based FPGAs | |
Fisher et al. | Trust and trusted computing platforms | |
Siddiqui et al. | Establishing Cyber Resilience in Embedded Systems for Securing Next-Generation Critical Infrastructure | |
Alzomai et al. | The mobile phone as a multi OTP device using trusted computing | |
US9769192B2 (en) | Security evaluation systems and methods | |
US20160116893A1 (en) | Autonomous control systems and methods | |
Duncan et al. | SeRFI: secure remote FPGA initialization in an untrusted environment | |
Fournaris et al. | Hardware security for critical infrastructures-the cipsec project approach | |
CA2967353A1 (fr) | Systemes autonomes et procedes pour un acces securise | |
US20160219079A1 (en) | Autonomous control systems and methods for protecting infrastructure | |
Wu et al. | The mobile agent security enhanced by trusted computing technology | |
Farag | Architectural enhancements to increase trust in cyber-physical systems containing untrusted software and hardware | |
CN111555857A (zh) | 一种边缘网络和网络传输方法 | |
Murti et al. | Security in embedded systems | |
Kepa et al. | IP protection in partially reconfigurable FPGAs | |
CA2966745A1 (fr) | Systemes de commande autonome et procedes pour la protection d'infrastructure | |
Raval et al. | Hardware Root of Trust on IoT Gateway | |
Heins | Ingredients for Secure Design | |
Balakrishnan | Freescale Trust Computing and Security in the Smart Grid | |
DILUOFFO | Internal Cognitive Assurance Model for Autonomous Robotic Systems (ICAMARS) | |
Tesfaye | Secure reprogramming of a network connected device: Securing programmable logic controllers |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FZDE | Dead |
Effective date: 20191113 |