DE602005015429D1 - Verfahren, vorrichtungen und computerprogrammprodukt zum gemeinsamen benutzen eines kryptographischen schlüssels mit einem eingebetteten agenten auf einem netzwerkendpunkt in einer netzwerkdomäne - Google Patents

Verfahren, vorrichtungen und computerprogrammprodukt zum gemeinsamen benutzen eines kryptographischen schlüssels mit einem eingebetteten agenten auf einem netzwerkendpunkt in einer netzwerkdomäne

Info

Publication number
DE602005015429D1
DE602005015429D1 DE602005015429T DE602005015429T DE602005015429D1 DE 602005015429 D1 DE602005015429 D1 DE 602005015429D1 DE 602005015429 T DE602005015429 T DE 602005015429T DE 602005015429 T DE602005015429 T DE 602005015429T DE 602005015429 D1 DE602005015429 D1 DE 602005015429D1
Authority
DE
Germany
Prior art keywords
embedded agent
network
key
embedded
network domain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
DE602005015429T
Other languages
English (en)
Inventor
David Durham
Vincent Zimmer
Carey Smith
Raj Yavatkar
Travis Schluessler
Dylan Larson
Carlos Rozas
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intel Corp
Original Assignee
Intel Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intel Corp filed Critical Intel Corp
Publication of DE602005015429D1 publication Critical patent/DE602005015429D1/de
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)
  • Small-Scale Networks (AREA)
DE602005015429T 2004-03-24 2005-03-18 Verfahren, vorrichtungen und computerprogrammprodukt zum gemeinsamen benutzen eines kryptographischen schlüssels mit einem eingebetteten agenten auf einem netzwerkendpunkt in einer netzwerkdomäne Active DE602005015429D1 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/809,315 US20050213768A1 (en) 2004-03-24 2004-03-24 Shared cryptographic key in networks with an embedded agent
PCT/US2005/008975 WO2005101794A1 (en) 2004-03-24 2005-03-18 Method, apparatuses and computer program product for sharing cryptographic key with an embedded agent on a network endpoint in a network domain

Publications (1)

Publication Number Publication Date
DE602005015429D1 true DE602005015429D1 (de) 2009-08-27

Family

ID=34963516

Family Applications (1)

Application Number Title Priority Date Filing Date
DE602005015429T Active DE602005015429D1 (de) 2004-03-24 2005-03-18 Verfahren, vorrichtungen und computerprogrammprodukt zum gemeinsamen benutzen eines kryptographischen schlüssels mit einem eingebetteten agenten auf einem netzwerkendpunkt in einer netzwerkdomäne

Country Status (7)

Country Link
US (1) US20050213768A1 (de)
EP (1) EP1728376B1 (de)
JP (1) JP4579969B2 (de)
KR (1) KR100831437B1 (de)
CN (1) CN1926837B (de)
DE (1) DE602005015429D1 (de)
WO (1) WO2005101794A1 (de)

Families Citing this family (71)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060230439A1 (en) * 2005-03-30 2006-10-12 Smith Ned M Trusted platform module apparatus, systems, and methods
US7802111B1 (en) * 2005-04-27 2010-09-21 Oracle America, Inc. System and method for limiting exposure of cryptographic keys protected by a trusted platform module
US7953980B2 (en) 2005-06-30 2011-05-31 Intel Corporation Signed manifest for run-time verification of software program identity and integrity
US7870565B2 (en) * 2005-06-30 2011-01-11 Intel Corporation Systems and methods for secure host resource management
US7669242B2 (en) * 2005-06-30 2010-02-23 Intel Corporation Agent presence monitor configured to execute in a secure environment
US8839450B2 (en) 2007-08-02 2014-09-16 Intel Corporation Secure vault service for software components within an execution environment
US20070025554A1 (en) * 2005-08-01 2007-02-01 Ping-Wen Ong Remote control association methodology
US8218770B2 (en) * 2005-09-13 2012-07-10 Agere Systems Inc. Method and apparatus for secure key management and protection
US8521955B2 (en) 2005-09-13 2013-08-27 Lsi Corporation Aligned data storage for network attached media streaming systems
US7565567B2 (en) 2005-11-18 2009-07-21 Intel Corporation Highly available computing platform
US7894606B2 (en) * 2005-11-28 2011-02-22 Panasonic Electric Works Co., Ltd. Systems and methods for facilitating secure key distribution to an embedded device
US20070165638A1 (en) * 2006-01-13 2007-07-19 Cisco Technology, Inc. System and method for routing data over an internet protocol security network
US8688856B2 (en) * 2006-01-24 2014-04-01 Novell, Inc. Techniques for managing a network delivery path of content via a key
JP4745858B2 (ja) * 2006-02-20 2011-08-10 富士通株式会社 セキュリティ管理プログラム、およびセキュリティ管理方法
US8522018B2 (en) * 2006-08-18 2013-08-27 Fujitsu Limited Method and system for implementing a mobile trusted platform module
US8272002B2 (en) 2006-08-18 2012-09-18 Fujitsu Limited Method and system for implementing an external trusted platform module
CN100405766C (zh) * 2006-09-18 2008-07-23 北京明朝万达科技有限公司 一种基于模式切换的网络隔离控制方法
US7802050B2 (en) * 2006-09-29 2010-09-21 Intel Corporation Monitoring a target agent execution pattern on a VT-enabled system
US7882318B2 (en) * 2006-09-29 2011-02-01 Intel Corporation Tamper protection of software agents operating in a vitual technology environment methods and apparatuses
US8254579B1 (en) * 2007-01-31 2012-08-28 Hewlett-Packard Development Company, L.P. Cryptographic key distribution using a trusted computing platform
US8132233B2 (en) * 2007-02-05 2012-03-06 Hewlett-Packard Development Company, L.P. Dynamic network access control method and apparatus
KR100853448B1 (ko) * 2007-02-06 2008-08-21 성균관대학교산학협력단 도메인 기반 이동에이전트 인증 시스템 및 그 인증 방법
KR100876320B1 (ko) 2007-02-12 2008-12-31 한국정보인증주식회사 내장형 보안서버를 이용한 웹서비스 보안 시스템 및 방법.
CN100581116C (zh) * 2007-09-14 2010-01-13 西安西电捷通无线网络通信有限公司 一种实现可信网络管理的方法
US8099718B2 (en) * 2007-11-13 2012-01-17 Intel Corporation Method and system for whitelisting software components
US9047468B2 (en) * 2007-12-28 2015-06-02 Intel Corporation Migration of full-disk encrypted virtualized storage between blade servers
US20110191842A1 (en) * 2008-09-09 2011-08-04 Telefonaktiebolaget L M Ericsson (Publ) Authentication in a Communication Network
US8250356B2 (en) * 2008-11-21 2012-08-21 Motorola Solutions, Inc. Method to construct a high-assurance IPSec gateway using an unmodified commercial implementation
US8364601B2 (en) * 2008-12-31 2013-01-29 Intel Corporation Methods and systems to directly render an image and correlate corresponding user input in a secure memory domain
US9047450B2 (en) * 2009-06-19 2015-06-02 Deviceauthority, Inc. Identification of embedded system devices
CN102437913B (zh) * 2010-09-29 2016-03-02 任少华 网络用户的认证系统
US8918835B2 (en) * 2010-12-16 2014-12-23 Futurewei Technologies, Inc. Method and apparatus to create and manage virtual private groups in a content oriented network
WO2012159059A1 (en) 2011-05-18 2012-11-22 Citrix Systems, Inc. Systems and methods for secure handling of data
WO2013089728A1 (en) 2011-12-15 2013-06-20 Intel Corporation Method, device, and system for securely sharing media content from a source device
WO2013089725A1 (en) * 2011-12-15 2013-06-20 Intel Corporation Method and device for secure communications over a network using a hardware security engine
US8964973B2 (en) 2012-04-30 2015-02-24 General Electric Company Systems and methods for controlling file execution for industrial control systems
US9046886B2 (en) 2012-04-30 2015-06-02 General Electric Company System and method for logging security events for an industrial control system
US8973124B2 (en) 2012-04-30 2015-03-03 General Electric Company Systems and methods for secure operation of an industrial controller
US9172544B2 (en) 2012-10-05 2015-10-27 General Electric Company Systems and methods for authentication between networked devices
US8856515B2 (en) 2012-11-08 2014-10-07 Intel Corporation Implementation of robust and secure content protection in a system-on-a-chip apparatus
US10909137B2 (en) 2014-10-06 2021-02-02 Fisher-Rosemount Systems, Inc. Streaming data for analytics in process control systems
US10678225B2 (en) 2013-03-04 2020-06-09 Fisher-Rosemount Systems, Inc. Data analytic services for distributed industrial performance monitoring
US9665088B2 (en) 2014-01-31 2017-05-30 Fisher-Rosemount Systems, Inc. Managing big data in process control systems
US10866952B2 (en) 2013-03-04 2020-12-15 Fisher-Rosemount Systems, Inc. Source-independent queries in distributed industrial system
US10649449B2 (en) 2013-03-04 2020-05-12 Fisher-Rosemount Systems, Inc. Distributed industrial performance monitoring and analytics
US9804588B2 (en) 2014-03-14 2017-10-31 Fisher-Rosemount Systems, Inc. Determining associations and alignments of process elements and measurements in a process
US9397836B2 (en) * 2014-08-11 2016-07-19 Fisher-Rosemount Systems, Inc. Securing devices to process control systems
US9823626B2 (en) 2014-10-06 2017-11-21 Fisher-Rosemount Systems, Inc. Regional big data in process control systems
US9558220B2 (en) 2013-03-04 2017-01-31 Fisher-Rosemount Systems, Inc. Big data in process control systems
US10386827B2 (en) 2013-03-04 2019-08-20 Fisher-Rosemount Systems, Inc. Distributed industrial performance monitoring and analytics platform
US10649424B2 (en) 2013-03-04 2020-05-12 Fisher-Rosemount Systems, Inc. Distributed industrial performance monitoring and analytics
US10223327B2 (en) 2013-03-14 2019-03-05 Fisher-Rosemount Systems, Inc. Collecting and delivering data to a big data machine in a process control system
US10282676B2 (en) 2014-10-06 2019-05-07 Fisher-Rosemount Systems, Inc. Automatic signal processing-based learning in a process plant
EP3200131A1 (de) 2013-03-15 2017-08-02 Fisher-Rosemount Systems, Inc. Datenmodellierungsstudio
US10691281B2 (en) 2013-03-15 2020-06-23 Fisher-Rosemount Systems, Inc. Method and apparatus for controlling a process plant with location aware mobile control devices
US9426185B1 (en) 2013-06-03 2016-08-23 Ayla Networks, Inc. Proximity based communication with embedded system
US10372463B1 (en) * 2013-11-27 2019-08-06 EMC IP Holding Company LLC Provisioning a computerized device with an operating system
US9686077B2 (en) * 2014-03-06 2017-06-20 Microsoft Technology Licensing, Llc Secure hardware for cross-device trusted applications
US9419986B2 (en) * 2014-03-26 2016-08-16 Symantec Corporation System to identify machines infected by malware applying linguistic analysis to network requests from endpoints
US20160352731A1 (en) * 2014-05-13 2016-12-01 Hewlett Packard Enterprise Development Lp Network access control at controller
US10168691B2 (en) 2014-10-06 2019-01-01 Fisher-Rosemount Systems, Inc. Data pipeline for process control system analytics
WO2016067473A1 (ja) * 2014-10-31 2016-05-06 富士通株式会社 セキュリティシステム及びコンピュータ機器間の通信方法
US10469464B2 (en) * 2015-06-09 2019-11-05 Intel Corporation Self-configuring key management system for an internet of things network
US9875189B2 (en) 2015-06-12 2018-01-23 Intel Corporation Supporting secure memory intent
CN105391723B (zh) * 2015-11-24 2018-07-06 无锡江南计算技术研究所 一种基于硬件的多级密钥协商方法
US10503483B2 (en) 2016-02-12 2019-12-10 Fisher-Rosemount Systems, Inc. Rule builder in a process control network
WO2020185204A1 (en) * 2019-03-11 2020-09-17 Hewlett-Packard Development Company, L.P. Network device compliance
US11863522B2 (en) * 2019-04-04 2024-01-02 Cisco Technology, Inc. Applying attestation to the border gateway protocol (BGP)
CN110138552B (zh) * 2019-05-08 2021-07-20 北京邮电大学 多用户量子密钥供应方法及装置
KR102258215B1 (ko) * 2019-11-08 2021-05-31 한국과학기술원 Kms 및 hsm를 함께 이용하는 보안 시스템 및 그 동작 방법
US11611435B2 (en) 2021-01-15 2023-03-21 Servicenow, Inc. Automatic key exchange

Family Cites Families (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6282645B1 (en) * 1994-02-28 2001-08-28 Kabushiki Kaisha Toshiba Computer system for reading/writing system configuration using I/O instruction
US5602918A (en) * 1995-12-22 1997-02-11 Virtual Open Network Environment Corp. Application level security system and method
US5978912A (en) * 1997-03-20 1999-11-02 Phoenix Technologies Limited Network enhanced BIOS enabling remote management of a computer without a functioning operating system
US6243809B1 (en) * 1998-04-30 2001-06-05 Compaq Computer Corporation Method of flash programming or reading a ROM of a computer system independently of its operating system
US6092202A (en) * 1998-05-22 2000-07-18 N*Able Technologies, Inc. Method and system for secure transactions in a computer system
FI105739B (fi) * 1998-06-10 2000-09-29 Ssh Comm Security Oy Verkkoon kytkettävä laite ja menetelmä sen asennusta ja konfigurointia varten
SG83684A1 (en) * 1998-07-07 2001-10-16 Compaq Computer Corp Computer system performing machine specific tasks before going to a low power state
US6408387B1 (en) * 1999-01-22 2002-06-18 Intel Corporation Preventing unauthorized updates to a non-volatile memory
US6484262B1 (en) * 1999-01-26 2002-11-19 Dell Usa, L.P. Network controlled computer system security
EP1203278B1 (de) * 1999-08-13 2012-02-08 Hewlett-Packard Development Company, L.P. Erzwingung von beschränkungen auf benutzung von gespeicherten daten
US7013389B1 (en) * 1999-09-29 2006-03-14 Cisco Technology, Inc. Method and apparatus for creating a secure communication channel among multiple event service nodes
US7103185B1 (en) * 1999-12-22 2006-09-05 Cisco Technology, Inc. Method and apparatus for distributing and updating private keys of multicast group managers using directory replication
US7278016B1 (en) * 1999-10-26 2007-10-02 International Business Machines Corporation Encryption/decryption of stored data using non-accessible, unique encryption key
US6581159B1 (en) * 1999-12-23 2003-06-17 Intel Corporation Secure method of updating bios by using a simply authenticated external module to further validate new firmware code
US6590981B2 (en) * 2000-02-22 2003-07-08 Zyfer, Inc. System and method for secure cryptographic communications
US6792556B1 (en) * 2000-05-31 2004-09-14 Dell Products L.P. Boot record recovery
JP3714119B2 (ja) * 2000-06-13 2005-11-09 日本電気株式会社 Biosプリブート環境を利用したユーザ認証型ネットワークosブート方法及びシステム
US7076653B1 (en) * 2000-06-27 2006-07-11 Intel Corporation System and method for supporting multiple encryption or authentication schemes over a connection on a network
US20030037237A1 (en) * 2001-04-09 2003-02-20 Jean-Paul Abgrall Systems and methods for computer device authentication
EP1249964A3 (de) * 2001-04-12 2004-01-07 Matsushita Electric Industrial Co., Ltd. Empfangsendgerät, Vorrichtung zum Schlüsselverwaltung und Verfahren zum Anpassen eines Schlüssels für ein Public-key Verschlüsselungssystem
US7061899B2 (en) * 2001-05-01 2006-06-13 Hewlett-Packard Development Company, L.P. Method and apparatus for providing network security
US20030037244A1 (en) * 2001-08-16 2003-02-20 International Business Machines Corporation System management interrupt generation upon completion of cryptographic operation
US6978018B2 (en) * 2001-09-28 2005-12-20 Intel Corporation Technique to support co-location and certification of executable content from a pre-boot space into an operating system runtime environment
US7243230B2 (en) * 2001-11-16 2007-07-10 Microsoft Corporation Transferring application secrets in a trusted operating system environment
BR0214760A (pt) * 2001-12-06 2004-11-09 Access Co Ltd Sistema e método para fornecer serviços de conteúdo de assinatura para dispositivos móveis
US7996888B2 (en) * 2002-01-11 2011-08-09 Nokia Corporation Virtual identity apparatus and method for using same
GB2384404B (en) * 2002-01-18 2005-02-16 Sun Microsystems Inc Key management
US7343493B2 (en) * 2002-03-28 2008-03-11 Lenovo (Singapore) Pte. Ltd. Encrypted file system using TCPA
US7318173B1 (en) * 2002-06-03 2008-01-08 National Semiconductor Corporation Embedded controller based BIOS boot ROM select
US20040019805A1 (en) * 2002-07-25 2004-01-29 Perkins Gregory M. Apparatus and method for securing a distributed network
US7594262B2 (en) * 2002-09-04 2009-09-22 Secure Computing Corporation System and method for secure group communications
KR100929870B1 (ko) * 2002-12-04 2009-12-04 삼성전자주식회사 컴퓨터 시스템의 바이오스 보안 유지방법
US7392399B2 (en) * 2003-05-05 2008-06-24 Sun Microsystems, Inc. Methods and systems for efficiently integrating a cryptographic co-processor
US7685436B2 (en) * 2003-10-02 2010-03-23 Itt Manufacturing Enterprises, Inc. System and method for a secure I/O interface
US7225325B2 (en) * 2003-12-30 2007-05-29 International Business Machines Corporation Customizing a computer system by using stored configuration parameters in a configuration mechanism
US20050166213A1 (en) * 2003-12-31 2005-07-28 International Business Machines Corporation Remote deployment of executable code in a pre-boot environment
US20050204155A1 (en) * 2004-03-09 2005-09-15 Nec Laboratories America, Inc Tamper resistant secure architecture
US7349537B2 (en) * 2004-03-11 2008-03-25 Teknovus, Inc. Method for data encryption in an ethernet passive optical network

Also Published As

Publication number Publication date
KR100831437B1 (ko) 2008-05-21
KR20060127229A (ko) 2006-12-11
WO2005101794A1 (en) 2005-10-27
CN1926837A (zh) 2007-03-07
JP2007525913A (ja) 2007-09-06
EP1728376B1 (de) 2009-07-15
JP4579969B2 (ja) 2010-11-10
EP1728376A1 (de) 2006-12-06
CN1926837B (zh) 2011-04-06
US20050213768A1 (en) 2005-09-29

Similar Documents

Publication Publication Date Title
DE602005015429D1 (de) Verfahren, vorrichtungen und computerprogrammprodukt zum gemeinsamen benutzen eines kryptographischen schlüssels mit einem eingebetteten agenten auf einem netzwerkendpunkt in einer netzwerkdomäne
EP4236203A3 (de) Datensicherheit mittels abfragesteuerten schlüsseln
WO2010141445A3 (en) Workgroup key wrapping for community of interest membership authentication
GB2496354B (en) A method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors
WO2011162990A3 (en) Single-use authentication methods for accessing encrypted data
WO2008048712A3 (en) Device-independent management of cryptographic information
WO2007125486A3 (en) Improved access to authorized domains
TW200625874A (en) Method and system for multi-domain virtual private network configuration
TW200603582A (en) System, method, computer program product, and business method for device group management using virtual device domain
MX337986B (es) Sistemas, metodos y productos de programas de computadora para gestionar elementos de seguridad.
NZ720190A (en) System and methods for encrypting data
EP1983461A3 (de) Externe Speichervorrichtung und Vorrichtung zur Verhinderung von Informationslecks
CN102760214B (zh) 一种新型的软件版权保护方法及装置
WO2016126332A3 (en) Data security operations with expectations
PH12018550176A1 (en) Using hardware based secure isolated region to prevent piracy and cheating on electronic devices
EP1976222A3 (de) Kostengünstiges RFID-Tag-Sicherheits- und Datenschutzverfahren
CN103248476B (zh) 数据加密密钥的管理方法、系统及终端
WO2013003238A3 (en) Privacy protected interactions with third parties
FI20075776A0 (fi) Päästä-päähän salattu viestintä
WO2007084863A3 (en) Privacy protection in communication systems
EP2511848A3 (de) Mehrfach unabhängige Verschlüsselungsdomänen
CY1111944T1 (el) Ασφαλες πρωτοκολλο συνδεσης
Schell Security—a big question for big data
TW200943124A (en) Personal license server and methods for use thereof
BRPI0705068A (pt) método para gerenciar um domìnio de usuário

Legal Events

Date Code Title Description
8364 No opposition during term of opposition