CA2967353A1 - Systemes autonomes et procedes pour un acces securise - Google Patents

Systemes autonomes et procedes pour un acces securise Download PDF

Info

Publication number
CA2967353A1
CA2967353A1 CA2967353A CA2967353A CA2967353A1 CA 2967353 A1 CA2967353 A1 CA 2967353A1 CA 2967353 A CA2967353 A CA 2967353A CA 2967353 A CA2967353 A CA 2967353A CA 2967353 A1 CA2967353 A1 CA 2967353A1
Authority
CA
Canada
Prior art keywords
autonomous
security
source
processor
under protection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA2967353A
Other languages
English (en)
Inventor
Ronald Lance Justin
Charles ELDEN
Jared Karro
Mark Tucker
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TEMPORAL DEFENSE SYSTEMS LLC
Original Assignee
TEMPORAL DEFENSE SYSTEMS LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TEMPORAL DEFENSE SYSTEMS LLC filed Critical TEMPORAL DEFENSE SYSTEMS LLC
Publication of CA2967353A1 publication Critical patent/CA2967353A1/fr
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/72Signcrypting, i.e. digital signing and encrypting simultaneously

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
CA2967353A 2014-11-11 2015-11-11 Systemes autonomes et procedes pour un acces securise Abandoned CA2967353A1 (fr)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201462078137P 2014-11-11 2014-11-11
US62/078,137 2014-11-11
PCT/US2015/060216 WO2016077494A1 (fr) 2014-11-11 2015-11-11 Systèmes autonomes et procédés pour un accès sécurisé

Publications (1)

Publication Number Publication Date
CA2967353A1 true CA2967353A1 (fr) 2016-05-19

Family

ID=55955004

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2967353A Abandoned CA2967353A1 (fr) 2014-11-11 2015-11-11 Systemes autonomes et procedes pour un acces securise

Country Status (7)

Country Link
EP (1) EP3218840A4 (fr)
JP (1) JP2017535871A (fr)
KR (1) KR20170085529A (fr)
CN (1) CN107111719A (fr)
AU (1) AU2015346404A1 (fr)
CA (1) CA2967353A1 (fr)
WO (1) WO2016077494A1 (fr)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107622210B (zh) * 2017-09-22 2019-12-03 天逸财金科技服务股份有限公司 身份认证及授权证明之资料查询方法与系统

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9038193B2 (en) * 1998-08-14 2015-05-19 Azos Al, Llc System and method of data cognition incorporating autonomous security protection
US7334124B2 (en) * 2002-07-22 2008-02-19 Vormetric, Inc. Logical access block processing protocol for transparent secure file storage
US8266676B2 (en) * 2004-11-29 2012-09-11 Harris Corporation Method to verify the integrity of components on a trusted platform using integrity database services
US8037310B2 (en) * 2004-11-30 2011-10-11 Ricoh Co., Ltd. Document authentication combining digital signature verification and visual comparison
US8087067B2 (en) * 2008-10-21 2011-12-27 Lookout, Inc. Secure mobile platform system
US8364984B2 (en) * 2009-03-13 2013-01-29 Microsoft Corporation Portable secure data files
CN102223364B (zh) * 2011-05-09 2014-06-04 飞天诚信科技股份有限公司 一种访问电子书数据的方法及系统
US9489529B2 (en) * 2011-10-13 2016-11-08 Stewart A. Baker Data security system
US9706410B2 (en) * 2012-03-07 2017-07-11 Rapid 7, Inc. Controlling enterprise access by mobile devices
US20140282895A1 (en) * 2013-03-15 2014-09-18 Sky Socket, Llc Secondary device as key for authorizing access to resources
CN104009977B (zh) * 2014-05-09 2016-10-05 北京奇虎科技有限公司 一种信息保护的方法和系统

Also Published As

Publication number Publication date
AU2015346404A1 (en) 2017-06-01
JP2017535871A (ja) 2017-11-30
KR20170085529A (ko) 2017-07-24
CN107111719A (zh) 2017-08-29
EP3218840A1 (fr) 2017-09-20
WO2016077494A1 (fr) 2016-05-19
EP3218840A4 (fr) 2018-05-16

Similar Documents

Publication Publication Date Title
US9887984B2 (en) Autonomous system for secure electric system access
EP2866166B1 (fr) Systèmes et procédés permettant d'imposer une anonymisation de données de surveillance de tiers
Maes et al. A pay-per-use licensing scheme for hardware IP cores in recent SRAM-based FPGAs
JP2009518762A (ja) インテグリティデータベースサービスを用いた、トラステッドプラットフォーム上のコンポーンテントのインテグリティの検証方法
Zhang et al. A pragmatic per-device licensing scheme for hardware IP cores on SRAM-based FPGAs
Fisher et al. Trust and trusted computing platforms
Siddiqui et al. Establishing Cyber Resilience in Embedded Systems for Securing Next-Generation Critical Infrastructure
Alzomai et al. The mobile phone as a multi OTP device using trusted computing
US9769192B2 (en) Security evaluation systems and methods
US20160116893A1 (en) Autonomous control systems and methods
Duncan et al. SeRFI: secure remote FPGA initialization in an untrusted environment
Fournaris et al. Hardware security for critical infrastructures-the cipsec project approach
CA2967353A1 (fr) Systemes autonomes et procedes pour un acces securise
US20160219079A1 (en) Autonomous control systems and methods for protecting infrastructure
Wu et al. The mobile agent security enhanced by trusted computing technology
Farag Architectural enhancements to increase trust in cyber-physical systems containing untrusted software and hardware
CN111555857A (zh) 一种边缘网络和网络传输方法
Murti et al. Security in embedded systems
Kepa et al. IP protection in partially reconfigurable FPGAs
CA2966745A1 (fr) Systemes de commande autonome et procedes pour la protection d'infrastructure
Raval et al. Hardware Root of Trust on IoT Gateway
Heins Ingredients for Secure Design
Balakrishnan Freescale Trust Computing and Security in the Smart Grid
DILUOFFO Internal Cognitive Assurance Model for Autonomous Robotic Systems (ICAMARS)
Tesfaye Secure reprogramming of a network connected device: Securing programmable logic controllers

Legal Events

Date Code Title Description
FZDE Dead

Effective date: 20191113