CL2014003437A1 - Sistema que comprende un modulo de recepcion capaz de recibir comandos de ambiente de ejecucion de confianza emitidos por una pluralidad de entidades, un procesador de seguridad configurado para realizar una pluralidad de procesos criptograficos y de seguridad en claves y conjuntos de datos protegidos, y un modulo de manejo de cuenta configurado para mantener una pluralidad de cuentas protegidas; producto de programa de computadora - Google Patents

Sistema que comprende un modulo de recepcion capaz de recibir comandos de ambiente de ejecucion de confianza emitidos por una pluralidad de entidades, un procesador de seguridad configurado para realizar una pluralidad de procesos criptograficos y de seguridad en claves y conjuntos de datos protegidos, y un modulo de manejo de cuenta configurado para mantener una pluralidad de cuentas protegidas; producto de programa de computadora

Info

Publication number
CL2014003437A1
CL2014003437A1 CL2014003437A CL2014003437A CL2014003437A1 CL 2014003437 A1 CL2014003437 A1 CL 2014003437A1 CL 2014003437 A CL2014003437 A CL 2014003437A CL 2014003437 A CL2014003437 A CL 2014003437A CL 2014003437 A1 CL2014003437 A1 CL 2014003437A1
Authority
CL
Chile
Prior art keywords
protected
security
cryptographic
entities
maintain
Prior art date
Application number
CL2014003437A
Other languages
English (en)
Spanish (es)
Inventor
Mark F Novak
Andrew John Layman
Magnus Nystrom
Stefan Thom
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp filed Critical Microsoft Corp
Publication of CL2014003437A1 publication Critical patent/CL2014003437A1/es

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • G06F3/0622Securing storage systems in relation to access

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Human Computer Interaction (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
CL2014003437A 2012-06-19 2014-12-18 Sistema que comprende un modulo de recepcion capaz de recibir comandos de ambiente de ejecucion de confianza emitidos por una pluralidad de entidades, un procesador de seguridad configurado para realizar una pluralidad de procesos criptograficos y de seguridad en claves y conjuntos de datos protegidos, y un modulo de manejo de cuenta configurado para mantener una pluralidad de cuentas protegidas; producto de programa de computadora CL2014003437A1 (es)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US13/527,439 US8782423B2 (en) 2012-06-19 2012-06-19 Network based management of protected data sets

Publications (1)

Publication Number Publication Date
CL2014003437A1 true CL2014003437A1 (es) 2015-05-08

Family

ID=48782597

Family Applications (1)

Application Number Title Priority Date Filing Date
CL2014003437A CL2014003437A1 (es) 2012-06-19 2014-12-18 Sistema que comprende un modulo de recepcion capaz de recibir comandos de ambiente de ejecucion de confianza emitidos por una pluralidad de entidades, un procesador de seguridad configurado para realizar una pluralidad de procesos criptograficos y de seguridad en claves y conjuntos de datos protegidos, y un modulo de manejo de cuenta configurado para mantener una pluralidad de cuentas protegidas; producto de programa de computadora

Country Status (19)

Country Link
US (2) US8782423B2 (enExample)
EP (1) EP2862119B1 (enExample)
JP (1) JP6293133B2 (enExample)
KR (1) KR102134491B1 (enExample)
CN (1) CN104471584B (enExample)
AU (2) AU2013277539B2 (enExample)
BR (1) BR112014031586B1 (enExample)
CA (1) CA2875664A1 (enExample)
CL (1) CL2014003437A1 (enExample)
CO (1) CO7160075A2 (enExample)
IL (1) IL235816B (enExample)
MX (2) MX356483B (enExample)
MY (1) MY189174A (enExample)
NZ (1) NZ702250A (enExample)
PH (1) PH12014502633B1 (enExample)
RU (1) RU2640653C2 (enExample)
SG (1) SG11201407985WA (enExample)
WO (1) WO2013192016A1 (enExample)
ZA (1) ZA201408574B (enExample)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8782423B2 (en) * 2012-06-19 2014-07-15 Microsoft Corporation Network based management of protected data sets
KR102132218B1 (ko) * 2013-09-24 2020-07-09 삼성전자 주식회사 신뢰하는 실행 환경에서의 보안 도메인 관리 방법 및 장치
US9940234B2 (en) * 2015-03-26 2018-04-10 Pure Storage, Inc. Aggressive data deduplication using lazy garbage collection
US11438155B2 (en) * 2017-01-24 2022-09-06 Microsoft Technology Licensing, Llc Key vault enclave
US10819696B2 (en) 2017-07-13 2020-10-27 Microsoft Technology Licensing, Llc Key attestation statement generation providing device anonymity
US11316693B2 (en) * 2018-04-13 2022-04-26 Microsoft Technology Licensing, Llc Trusted platform module-based prepaid access token for commercial IoT online services
US11934540B2 (en) * 2018-05-28 2024-03-19 Royal Bank Of Canada System and method for multiparty secure computing platform
CN108924421B (zh) * 2018-07-16 2020-09-11 Oppo广东移动通信有限公司 图像处理方法、装置、计算机可读存储介质和电子设备
US12267442B2 (en) * 2022-07-20 2025-04-01 Arista Networks, Inc. Establishing trust between supervisors in a network device
US20250342254A1 (en) * 2024-05-02 2025-11-06 Nvidia Corporation Attestable pcr extensions

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6965999B2 (en) 1998-05-01 2005-11-15 Microsoft Corporation Intelligent trust management method and system
US20070079120A1 (en) * 2005-10-03 2007-04-05 Bade Steven A Dynamic creation and hierarchical organization of trusted platform modules
US8108668B2 (en) 2006-06-26 2012-01-31 Intel Corporation Associating a multi-context trusted platform module with distributed platforms
US8272002B2 (en) 2006-08-18 2012-09-18 Fujitsu Limited Method and system for implementing an external trusted platform module
CN100566251C (zh) * 2007-08-01 2009-12-02 西安西电捷通无线网络通信有限公司 一种增强安全性的可信网络连接方法
JP5178341B2 (ja) * 2008-06-23 2013-04-10 パナソニック株式会社 オプショナルなコンポーネントを伴うセキュアブートの方法
US20110270748A1 (en) * 2010-04-30 2011-11-03 Tobsc Inc. Methods and apparatus for a financial document clearinghouse and secure delivery network
US8959363B2 (en) * 2010-06-03 2015-02-17 Intel Corporation Systems, methods, and apparatus to virtualize TPM accesses
WO2012093924A1 (en) 2011-01-07 2012-07-12 Mimos Berhad System and method to provide trusted platform module (tpm) functionalities on a remote server for multiple users
US8782423B2 (en) * 2012-06-19 2014-07-15 Microsoft Corporation Network based management of protected data sets

Also Published As

Publication number Publication date
PH12014502633A1 (en) 2015-02-02
BR112014031586A2 (pt) 2017-06-27
KR102134491B1 (ko) 2020-07-15
US20130339729A1 (en) 2013-12-19
BR112014031586B1 (pt) 2022-02-15
MX356483B (es) 2018-05-30
WO2013192016A1 (en) 2013-12-27
EP2862119A1 (en) 2015-04-22
IL235816A0 (en) 2015-01-29
KR20150020221A (ko) 2015-02-25
AU2013277539A1 (en) 2014-12-04
AU2018201934A1 (en) 2018-04-12
EP2862119B1 (en) 2021-02-24
BR112014031586A8 (pt) 2021-05-25
HK1206445A1 (en) 2016-01-08
JP6293133B2 (ja) 2018-03-14
IL235816B (en) 2018-02-28
AU2018201934B2 (en) 2020-01-16
MX2014015685A (es) 2015-07-23
PH12014502633B1 (en) 2018-08-08
JP2015524128A (ja) 2015-08-20
CA2875664A1 (en) 2013-12-27
MY189174A (en) 2022-01-31
US9268492B2 (en) 2016-02-23
SG11201407985WA (en) 2015-01-29
RU2640653C2 (ru) 2018-01-10
CO7160075A2 (es) 2015-01-15
RU2014151557A (ru) 2016-07-10
AU2013277539B2 (en) 2017-12-21
US20140304506A1 (en) 2014-10-09
US8782423B2 (en) 2014-07-15
CN104471584A (zh) 2015-03-25
MX388376B (es) 2025-03-19
ZA201408574B (en) 2016-09-28
NZ702250A (en) 2017-10-27
CN104471584B (zh) 2017-06-13

Similar Documents

Publication Publication Date Title
CL2014003437A1 (es) Sistema que comprende un modulo de recepcion capaz de recibir comandos de ambiente de ejecucion de confianza emitidos por una pluralidad de entidades, un procesador de seguridad configurado para realizar una pluralidad de procesos criptograficos y de seguridad en claves y conjuntos de datos protegidos, y un modulo de manejo de cuenta configurado para mantener una pluralidad de cuentas protegidas; producto de programa de computadora
EP2786292A4 (en) METHODS AND DEVICES FOR SECURING KEYS FOR AN UNSECURED DISTRIBUTED ENVIRONMENT APPLYING TO VIRTUALIZATION AND SECURITY AND MANAGEMENT OF CLOUD COMPUTING
WO2011084265A3 (en) Protected device management
BR112014011753A2 (pt) método de proteção de um dispositivo de computação, dispositivo de computação, e, software de computador
TWI560626B (en) Method,computer system,and computer program product for providing composite packages of applications and data sets
EP2680488A4 (en) Similarity calculation system, similarity calculation device, computer program, and similarity calculation method
IL222303A (en) Method, apparatus and computer program product for managing installation information
WO2014055372A3 (en) Secure computer architectures, systems, and applications
BR112013031580A2 (pt) dispositivo e método de processamento de informação, e, programa de computador.
EP3213209A4 (en) Systems and methods for detecting and reacting to malicious activity in computer networks
BR112015007304A2 (pt) sustentação de exibição e método para assegurar um computador tablet contra remoção não autorizada ou furto
WO2012024508A3 (en) Systems and methods for securing virtual machine computing environments
EP2946330A4 (en) PROCESS AND SYSTEM FOR PROTECTION COMPUTERIZED SYSTEMS BEFORE POSSIBLE CODE
EP2613472A4 (en) Encryption processing system, key generation device, encryption device, decryption device, encryption processing method, and encryption processing program
EP2659451A4 (en) SYSTEMS, METHODS AND COMPUTER SOFTWARE FOR INNOVATION MANAGEMENT
IL219361A (en) Security systems and methods based on a combination of physical and cyber information
EP2741180A4 (en) INFORMATION ENTRY, INFORMATION ENTRY AND COMPUTER PROGRAM
GB2501470B (en) Management of data processing security in a secondary processor
EP2798458A4 (en) Packed data operation mask comparison processors, methods, systems, and instructions
GB2501274B (en) Management of data processing security in a secondary processor
GB2520855A (en) Systems apparatuses, and methods for performing rotate and XOR in response to a single instruction
GB2501588B (en) Managing encryption keys in a computer system
SG11201400891VA (en) System, method, and computer program product for contact center management
BRPI1009154A2 (pt) métodos, sistemas e produto de programa de computador para fornecer dados de poço
EP2571232A4 (en) INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING PROCESS AND PROGRAM