DE602005015429D1 - Verfahren, vorrichtungen und computerprogrammprodukt zum gemeinsamen benutzen eines kryptographischen schlüssels mit einem eingebetteten agenten auf einem netzwerkendpunkt in einer netzwerkdomäne - Google Patents
Verfahren, vorrichtungen und computerprogrammprodukt zum gemeinsamen benutzen eines kryptographischen schlüssels mit einem eingebetteten agenten auf einem netzwerkendpunkt in einer netzwerkdomäneInfo
- Publication number
- DE602005015429D1 DE602005015429D1 DE602005015429T DE602005015429T DE602005015429D1 DE 602005015429 D1 DE602005015429 D1 DE 602005015429D1 DE 602005015429 T DE602005015429 T DE 602005015429T DE 602005015429 T DE602005015429 T DE 602005015429T DE 602005015429 D1 DE602005015429 D1 DE 602005015429D1
- Authority
- DE
- Germany
- Prior art keywords
- embedded agent
- network
- key
- embedded
- network domain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
- Small-Scale Networks (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/809,315 US20050213768A1 (en) | 2004-03-24 | 2004-03-24 | Shared cryptographic key in networks with an embedded agent |
PCT/US2005/008975 WO2005101794A1 (en) | 2004-03-24 | 2005-03-18 | Method, apparatuses and computer program product for sharing cryptographic key with an embedded agent on a network endpoint in a network domain |
Publications (1)
Publication Number | Publication Date |
---|---|
DE602005015429D1 true DE602005015429D1 (de) | 2009-08-27 |
Family
ID=34963516
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DE602005015429T Active DE602005015429D1 (de) | 2004-03-24 | 2005-03-18 | Verfahren, vorrichtungen und computerprogrammprodukt zum gemeinsamen benutzen eines kryptographischen schlüssels mit einem eingebetteten agenten auf einem netzwerkendpunkt in einer netzwerkdomäne |
Country Status (7)
Country | Link |
---|---|
US (1) | US20050213768A1 (de) |
EP (1) | EP1728376B1 (de) |
JP (1) | JP4579969B2 (de) |
KR (1) | KR100831437B1 (de) |
CN (1) | CN1926837B (de) |
DE (1) | DE602005015429D1 (de) |
WO (1) | WO2005101794A1 (de) |
Families Citing this family (71)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060230439A1 (en) * | 2005-03-30 | 2006-10-12 | Smith Ned M | Trusted platform module apparatus, systems, and methods |
US7802111B1 (en) * | 2005-04-27 | 2010-09-21 | Oracle America, Inc. | System and method for limiting exposure of cryptographic keys protected by a trusted platform module |
US7953980B2 (en) | 2005-06-30 | 2011-05-31 | Intel Corporation | Signed manifest for run-time verification of software program identity and integrity |
US7870565B2 (en) * | 2005-06-30 | 2011-01-11 | Intel Corporation | Systems and methods for secure host resource management |
US7669242B2 (en) * | 2005-06-30 | 2010-02-23 | Intel Corporation | Agent presence monitor configured to execute in a secure environment |
US8839450B2 (en) | 2007-08-02 | 2014-09-16 | Intel Corporation | Secure vault service for software components within an execution environment |
US20070025554A1 (en) * | 2005-08-01 | 2007-02-01 | Ping-Wen Ong | Remote control association methodology |
US8218770B2 (en) * | 2005-09-13 | 2012-07-10 | Agere Systems Inc. | Method and apparatus for secure key management and protection |
US8521955B2 (en) | 2005-09-13 | 2013-08-27 | Lsi Corporation | Aligned data storage for network attached media streaming systems |
US7565567B2 (en) | 2005-11-18 | 2009-07-21 | Intel Corporation | Highly available computing platform |
US7894606B2 (en) * | 2005-11-28 | 2011-02-22 | Panasonic Electric Works Co., Ltd. | Systems and methods for facilitating secure key distribution to an embedded device |
US20070165638A1 (en) * | 2006-01-13 | 2007-07-19 | Cisco Technology, Inc. | System and method for routing data over an internet protocol security network |
US8688856B2 (en) * | 2006-01-24 | 2014-04-01 | Novell, Inc. | Techniques for managing a network delivery path of content via a key |
JP4745858B2 (ja) * | 2006-02-20 | 2011-08-10 | 富士通株式会社 | セキュリティ管理プログラム、およびセキュリティ管理方法 |
US8522018B2 (en) * | 2006-08-18 | 2013-08-27 | Fujitsu Limited | Method and system for implementing a mobile trusted platform module |
US8272002B2 (en) | 2006-08-18 | 2012-09-18 | Fujitsu Limited | Method and system for implementing an external trusted platform module |
CN100405766C (zh) * | 2006-09-18 | 2008-07-23 | 北京明朝万达科技有限公司 | 一种基于模式切换的网络隔离控制方法 |
US7802050B2 (en) * | 2006-09-29 | 2010-09-21 | Intel Corporation | Monitoring a target agent execution pattern on a VT-enabled system |
US7882318B2 (en) * | 2006-09-29 | 2011-02-01 | Intel Corporation | Tamper protection of software agents operating in a vitual technology environment methods and apparatuses |
US8254579B1 (en) * | 2007-01-31 | 2012-08-28 | Hewlett-Packard Development Company, L.P. | Cryptographic key distribution using a trusted computing platform |
US8132233B2 (en) * | 2007-02-05 | 2012-03-06 | Hewlett-Packard Development Company, L.P. | Dynamic network access control method and apparatus |
KR100853448B1 (ko) * | 2007-02-06 | 2008-08-21 | 성균관대학교산학협력단 | 도메인 기반 이동에이전트 인증 시스템 및 그 인증 방법 |
KR100876320B1 (ko) | 2007-02-12 | 2008-12-31 | 한국정보인증주식회사 | 내장형 보안서버를 이용한 웹서비스 보안 시스템 및 방법. |
CN100581116C (zh) * | 2007-09-14 | 2010-01-13 | 西安西电捷通无线网络通信有限公司 | 一种实现可信网络管理的方法 |
US8099718B2 (en) * | 2007-11-13 | 2012-01-17 | Intel Corporation | Method and system for whitelisting software components |
US9047468B2 (en) * | 2007-12-28 | 2015-06-02 | Intel Corporation | Migration of full-disk encrypted virtualized storage between blade servers |
US20110191842A1 (en) * | 2008-09-09 | 2011-08-04 | Telefonaktiebolaget L M Ericsson (Publ) | Authentication in a Communication Network |
US8250356B2 (en) * | 2008-11-21 | 2012-08-21 | Motorola Solutions, Inc. | Method to construct a high-assurance IPSec gateway using an unmodified commercial implementation |
US8364601B2 (en) * | 2008-12-31 | 2013-01-29 | Intel Corporation | Methods and systems to directly render an image and correlate corresponding user input in a secure memory domain |
US9047450B2 (en) * | 2009-06-19 | 2015-06-02 | Deviceauthority, Inc. | Identification of embedded system devices |
CN102437913B (zh) * | 2010-09-29 | 2016-03-02 | 任少华 | 网络用户的认证系统 |
US8918835B2 (en) * | 2010-12-16 | 2014-12-23 | Futurewei Technologies, Inc. | Method and apparatus to create and manage virtual private groups in a content oriented network |
WO2012159059A1 (en) | 2011-05-18 | 2012-11-22 | Citrix Systems, Inc. | Systems and methods for secure handling of data |
WO2013089728A1 (en) | 2011-12-15 | 2013-06-20 | Intel Corporation | Method, device, and system for securely sharing media content from a source device |
WO2013089725A1 (en) * | 2011-12-15 | 2013-06-20 | Intel Corporation | Method and device for secure communications over a network using a hardware security engine |
US8964973B2 (en) | 2012-04-30 | 2015-02-24 | General Electric Company | Systems and methods for controlling file execution for industrial control systems |
US9046886B2 (en) | 2012-04-30 | 2015-06-02 | General Electric Company | System and method for logging security events for an industrial control system |
US8973124B2 (en) | 2012-04-30 | 2015-03-03 | General Electric Company | Systems and methods for secure operation of an industrial controller |
US9172544B2 (en) | 2012-10-05 | 2015-10-27 | General Electric Company | Systems and methods for authentication between networked devices |
US8856515B2 (en) | 2012-11-08 | 2014-10-07 | Intel Corporation | Implementation of robust and secure content protection in a system-on-a-chip apparatus |
US10909137B2 (en) | 2014-10-06 | 2021-02-02 | Fisher-Rosemount Systems, Inc. | Streaming data for analytics in process control systems |
US10678225B2 (en) | 2013-03-04 | 2020-06-09 | Fisher-Rosemount Systems, Inc. | Data analytic services for distributed industrial performance monitoring |
US9665088B2 (en) | 2014-01-31 | 2017-05-30 | Fisher-Rosemount Systems, Inc. | Managing big data in process control systems |
US10866952B2 (en) | 2013-03-04 | 2020-12-15 | Fisher-Rosemount Systems, Inc. | Source-independent queries in distributed industrial system |
US10649449B2 (en) | 2013-03-04 | 2020-05-12 | Fisher-Rosemount Systems, Inc. | Distributed industrial performance monitoring and analytics |
US9804588B2 (en) | 2014-03-14 | 2017-10-31 | Fisher-Rosemount Systems, Inc. | Determining associations and alignments of process elements and measurements in a process |
US9397836B2 (en) * | 2014-08-11 | 2016-07-19 | Fisher-Rosemount Systems, Inc. | Securing devices to process control systems |
US9823626B2 (en) | 2014-10-06 | 2017-11-21 | Fisher-Rosemount Systems, Inc. | Regional big data in process control systems |
US9558220B2 (en) | 2013-03-04 | 2017-01-31 | Fisher-Rosemount Systems, Inc. | Big data in process control systems |
US10386827B2 (en) | 2013-03-04 | 2019-08-20 | Fisher-Rosemount Systems, Inc. | Distributed industrial performance monitoring and analytics platform |
US10649424B2 (en) | 2013-03-04 | 2020-05-12 | Fisher-Rosemount Systems, Inc. | Distributed industrial performance monitoring and analytics |
US10223327B2 (en) | 2013-03-14 | 2019-03-05 | Fisher-Rosemount Systems, Inc. | Collecting and delivering data to a big data machine in a process control system |
US10282676B2 (en) | 2014-10-06 | 2019-05-07 | Fisher-Rosemount Systems, Inc. | Automatic signal processing-based learning in a process plant |
EP3200131A1 (de) | 2013-03-15 | 2017-08-02 | Fisher-Rosemount Systems, Inc. | Datenmodellierungsstudio |
US10691281B2 (en) | 2013-03-15 | 2020-06-23 | Fisher-Rosemount Systems, Inc. | Method and apparatus for controlling a process plant with location aware mobile control devices |
US9426185B1 (en) | 2013-06-03 | 2016-08-23 | Ayla Networks, Inc. | Proximity based communication with embedded system |
US10372463B1 (en) * | 2013-11-27 | 2019-08-06 | EMC IP Holding Company LLC | Provisioning a computerized device with an operating system |
US9686077B2 (en) * | 2014-03-06 | 2017-06-20 | Microsoft Technology Licensing, Llc | Secure hardware for cross-device trusted applications |
US9419986B2 (en) * | 2014-03-26 | 2016-08-16 | Symantec Corporation | System to identify machines infected by malware applying linguistic analysis to network requests from endpoints |
US20160352731A1 (en) * | 2014-05-13 | 2016-12-01 | Hewlett Packard Enterprise Development Lp | Network access control at controller |
US10168691B2 (en) | 2014-10-06 | 2019-01-01 | Fisher-Rosemount Systems, Inc. | Data pipeline for process control system analytics |
WO2016067473A1 (ja) * | 2014-10-31 | 2016-05-06 | 富士通株式会社 | セキュリティシステム及びコンピュータ機器間の通信方法 |
US10469464B2 (en) * | 2015-06-09 | 2019-11-05 | Intel Corporation | Self-configuring key management system for an internet of things network |
US9875189B2 (en) | 2015-06-12 | 2018-01-23 | Intel Corporation | Supporting secure memory intent |
CN105391723B (zh) * | 2015-11-24 | 2018-07-06 | 无锡江南计算技术研究所 | 一种基于硬件的多级密钥协商方法 |
US10503483B2 (en) | 2016-02-12 | 2019-12-10 | Fisher-Rosemount Systems, Inc. | Rule builder in a process control network |
WO2020185204A1 (en) * | 2019-03-11 | 2020-09-17 | Hewlett-Packard Development Company, L.P. | Network device compliance |
US11863522B2 (en) * | 2019-04-04 | 2024-01-02 | Cisco Technology, Inc. | Applying attestation to the border gateway protocol (BGP) |
CN110138552B (zh) * | 2019-05-08 | 2021-07-20 | 北京邮电大学 | 多用户量子密钥供应方法及装置 |
KR102258215B1 (ko) * | 2019-11-08 | 2021-05-31 | 한국과학기술원 | Kms 및 hsm를 함께 이용하는 보안 시스템 및 그 동작 방법 |
US11611435B2 (en) | 2021-01-15 | 2023-03-21 | Servicenow, Inc. | Automatic key exchange |
Family Cites Families (38)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6282645B1 (en) * | 1994-02-28 | 2001-08-28 | Kabushiki Kaisha Toshiba | Computer system for reading/writing system configuration using I/O instruction |
US5602918A (en) * | 1995-12-22 | 1997-02-11 | Virtual Open Network Environment Corp. | Application level security system and method |
US5978912A (en) * | 1997-03-20 | 1999-11-02 | Phoenix Technologies Limited | Network enhanced BIOS enabling remote management of a computer without a functioning operating system |
US6243809B1 (en) * | 1998-04-30 | 2001-06-05 | Compaq Computer Corporation | Method of flash programming or reading a ROM of a computer system independently of its operating system |
US6092202A (en) * | 1998-05-22 | 2000-07-18 | N*Able Technologies, Inc. | Method and system for secure transactions in a computer system |
FI105739B (fi) * | 1998-06-10 | 2000-09-29 | Ssh Comm Security Oy | Verkkoon kytkettävä laite ja menetelmä sen asennusta ja konfigurointia varten |
SG83684A1 (en) * | 1998-07-07 | 2001-10-16 | Compaq Computer Corp | Computer system performing machine specific tasks before going to a low power state |
US6408387B1 (en) * | 1999-01-22 | 2002-06-18 | Intel Corporation | Preventing unauthorized updates to a non-volatile memory |
US6484262B1 (en) * | 1999-01-26 | 2002-11-19 | Dell Usa, L.P. | Network controlled computer system security |
EP1203278B1 (de) * | 1999-08-13 | 2012-02-08 | Hewlett-Packard Development Company, L.P. | Erzwingung von beschränkungen auf benutzung von gespeicherten daten |
US7013389B1 (en) * | 1999-09-29 | 2006-03-14 | Cisco Technology, Inc. | Method and apparatus for creating a secure communication channel among multiple event service nodes |
US7103185B1 (en) * | 1999-12-22 | 2006-09-05 | Cisco Technology, Inc. | Method and apparatus for distributing and updating private keys of multicast group managers using directory replication |
US7278016B1 (en) * | 1999-10-26 | 2007-10-02 | International Business Machines Corporation | Encryption/decryption of stored data using non-accessible, unique encryption key |
US6581159B1 (en) * | 1999-12-23 | 2003-06-17 | Intel Corporation | Secure method of updating bios by using a simply authenticated external module to further validate new firmware code |
US6590981B2 (en) * | 2000-02-22 | 2003-07-08 | Zyfer, Inc. | System and method for secure cryptographic communications |
US6792556B1 (en) * | 2000-05-31 | 2004-09-14 | Dell Products L.P. | Boot record recovery |
JP3714119B2 (ja) * | 2000-06-13 | 2005-11-09 | 日本電気株式会社 | Biosプリブート環境を利用したユーザ認証型ネットワークosブート方法及びシステム |
US7076653B1 (en) * | 2000-06-27 | 2006-07-11 | Intel Corporation | System and method for supporting multiple encryption or authentication schemes over a connection on a network |
US20030037237A1 (en) * | 2001-04-09 | 2003-02-20 | Jean-Paul Abgrall | Systems and methods for computer device authentication |
EP1249964A3 (de) * | 2001-04-12 | 2004-01-07 | Matsushita Electric Industrial Co., Ltd. | Empfangsendgerät, Vorrichtung zum Schlüsselverwaltung und Verfahren zum Anpassen eines Schlüssels für ein Public-key Verschlüsselungssystem |
US7061899B2 (en) * | 2001-05-01 | 2006-06-13 | Hewlett-Packard Development Company, L.P. | Method and apparatus for providing network security |
US20030037244A1 (en) * | 2001-08-16 | 2003-02-20 | International Business Machines Corporation | System management interrupt generation upon completion of cryptographic operation |
US6978018B2 (en) * | 2001-09-28 | 2005-12-20 | Intel Corporation | Technique to support co-location and certification of executable content from a pre-boot space into an operating system runtime environment |
US7243230B2 (en) * | 2001-11-16 | 2007-07-10 | Microsoft Corporation | Transferring application secrets in a trusted operating system environment |
BR0214760A (pt) * | 2001-12-06 | 2004-11-09 | Access Co Ltd | Sistema e método para fornecer serviços de conteúdo de assinatura para dispositivos móveis |
US7996888B2 (en) * | 2002-01-11 | 2011-08-09 | Nokia Corporation | Virtual identity apparatus and method for using same |
GB2384404B (en) * | 2002-01-18 | 2005-02-16 | Sun Microsystems Inc | Key management |
US7343493B2 (en) * | 2002-03-28 | 2008-03-11 | Lenovo (Singapore) Pte. Ltd. | Encrypted file system using TCPA |
US7318173B1 (en) * | 2002-06-03 | 2008-01-08 | National Semiconductor Corporation | Embedded controller based BIOS boot ROM select |
US20040019805A1 (en) * | 2002-07-25 | 2004-01-29 | Perkins Gregory M. | Apparatus and method for securing a distributed network |
US7594262B2 (en) * | 2002-09-04 | 2009-09-22 | Secure Computing Corporation | System and method for secure group communications |
KR100929870B1 (ko) * | 2002-12-04 | 2009-12-04 | 삼성전자주식회사 | 컴퓨터 시스템의 바이오스 보안 유지방법 |
US7392399B2 (en) * | 2003-05-05 | 2008-06-24 | Sun Microsystems, Inc. | Methods and systems for efficiently integrating a cryptographic co-processor |
US7685436B2 (en) * | 2003-10-02 | 2010-03-23 | Itt Manufacturing Enterprises, Inc. | System and method for a secure I/O interface |
US7225325B2 (en) * | 2003-12-30 | 2007-05-29 | International Business Machines Corporation | Customizing a computer system by using stored configuration parameters in a configuration mechanism |
US20050166213A1 (en) * | 2003-12-31 | 2005-07-28 | International Business Machines Corporation | Remote deployment of executable code in a pre-boot environment |
US20050204155A1 (en) * | 2004-03-09 | 2005-09-15 | Nec Laboratories America, Inc | Tamper resistant secure architecture |
US7349537B2 (en) * | 2004-03-11 | 2008-03-25 | Teknovus, Inc. | Method for data encryption in an ethernet passive optical network |
-
2004
- 2004-03-24 US US10/809,315 patent/US20050213768A1/en not_active Abandoned
-
2005
- 2005-03-18 EP EP05729217A patent/EP1728376B1/de not_active Not-in-force
- 2005-03-18 CN CN2005800061945A patent/CN1926837B/zh not_active Expired - Fee Related
- 2005-03-18 KR KR1020067019798A patent/KR100831437B1/ko not_active IP Right Cessation
- 2005-03-18 JP JP2007500838A patent/JP4579969B2/ja not_active Expired - Fee Related
- 2005-03-18 DE DE602005015429T patent/DE602005015429D1/de active Active
- 2005-03-18 WO PCT/US2005/008975 patent/WO2005101794A1/en not_active Application Discontinuation
Also Published As
Publication number | Publication date |
---|---|
KR100831437B1 (ko) | 2008-05-21 |
KR20060127229A (ko) | 2006-12-11 |
WO2005101794A1 (en) | 2005-10-27 |
CN1926837A (zh) | 2007-03-07 |
JP2007525913A (ja) | 2007-09-06 |
EP1728376B1 (de) | 2009-07-15 |
JP4579969B2 (ja) | 2010-11-10 |
EP1728376A1 (de) | 2006-12-06 |
CN1926837B (zh) | 2011-04-06 |
US20050213768A1 (en) | 2005-09-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE602005015429D1 (de) | Verfahren, vorrichtungen und computerprogrammprodukt zum gemeinsamen benutzen eines kryptographischen schlüssels mit einem eingebetteten agenten auf einem netzwerkendpunkt in einer netzwerkdomäne | |
EP4236203A3 (de) | Datensicherheit mittels abfragesteuerten schlüsseln | |
WO2010141445A3 (en) | Workgroup key wrapping for community of interest membership authentication | |
GB2496354B (en) | A method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors | |
WO2011162990A3 (en) | Single-use authentication methods for accessing encrypted data | |
WO2008048712A3 (en) | Device-independent management of cryptographic information | |
WO2007125486A3 (en) | Improved access to authorized domains | |
TW200625874A (en) | Method and system for multi-domain virtual private network configuration | |
TW200603582A (en) | System, method, computer program product, and business method for device group management using virtual device domain | |
MX337986B (es) | Sistemas, metodos y productos de programas de computadora para gestionar elementos de seguridad. | |
NZ720190A (en) | System and methods for encrypting data | |
EP1983461A3 (de) | Externe Speichervorrichtung und Vorrichtung zur Verhinderung von Informationslecks | |
CN102760214B (zh) | 一种新型的软件版权保护方法及装置 | |
WO2016126332A3 (en) | Data security operations with expectations | |
PH12018550176A1 (en) | Using hardware based secure isolated region to prevent piracy and cheating on electronic devices | |
EP1976222A3 (de) | Kostengünstiges RFID-Tag-Sicherheits- und Datenschutzverfahren | |
CN103248476B (zh) | 数据加密密钥的管理方法、系统及终端 | |
WO2013003238A3 (en) | Privacy protected interactions with third parties | |
FI20075776A0 (fi) | Päästä-päähän salattu viestintä | |
WO2007084863A3 (en) | Privacy protection in communication systems | |
EP2511848A3 (de) | Mehrfach unabhängige Verschlüsselungsdomänen | |
CY1111944T1 (el) | Ασφαλες πρωτοκολλο συνδεσης | |
Schell | Security—a big question for big data | |
TW200943124A (en) | Personal license server and methods for use thereof | |
BRPI0705068A (pt) | método para gerenciar um domìnio de usuário |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
8364 | No opposition during term of opposition |