GB201808581D0 - Encryption techiques - Google Patents
Encryption techiquesInfo
- Publication number
- GB201808581D0 GB201808581D0 GBGB1808581.1A GB201808581A GB201808581D0 GB 201808581 D0 GB201808581 D0 GB 201808581D0 GB 201808581 A GB201808581 A GB 201808581A GB 201808581 D0 GB201808581 D0 GB 201808581D0
- Authority
- GB
- United Kingdom
- Prior art keywords
- techiques
- encryption
- encryption techiques
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3265—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate chains, trees or paths; Hierarchical trust model
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2147—Locking files
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/062—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys
Applications Claiming Priority (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/042,862 US10650154B2 (en) | 2016-02-12 | 2016-02-12 | Process-level control of encrypted content |
US15/042,916 US9984248B2 (en) | 2016-02-12 | 2016-02-12 | Behavioral-based control of access to encrypted content by a process |
US15/099,524 US10791097B2 (en) | 2016-04-14 | 2016-04-14 | Portable encryption format |
US15/098,684 US10263966B2 (en) | 2016-04-14 | 2016-04-14 | Perimeter enforcement of encryption rules |
US15/098,720 US10686827B2 (en) | 2016-04-14 | 2016-04-14 | Intermediate encryption for exposed content |
US15/099,542 US10628597B2 (en) | 2016-04-14 | 2016-04-14 | Just-in-time encryption |
US15/179,447 US10681078B2 (en) | 2016-06-10 | 2016-06-10 | Key throttling to mitigate unauthorized file access |
GB1717704.9A GB2552438B8 (en) | 2016-02-12 | 2016-06-17 | Encryption techniques |
Publications (3)
Publication Number | Publication Date |
---|---|
GB201808581D0 true GB201808581D0 (en) | 2018-07-11 |
GB2565185A GB2565185A (en) | 2019-02-06 |
GB2565185B GB2565185B (en) | 2019-11-27 |
Family
ID=59563510
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB1808581.1A Active GB2565185B (en) | 2016-02-12 | 2016-06-17 | Encryption techniques |
GB1717704.9A Active GB2552438B8 (en) | 2016-02-12 | 2016-06-17 | Encryption techniques |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB1717704.9A Active GB2552438B8 (en) | 2016-02-12 | 2016-06-17 | Encryption techniques |
Country Status (4)
Country | Link |
---|---|
AU (1) | AU2016392715B2 (en) |
CA (1) | CA3014175A1 (en) |
GB (2) | GB2565185B (en) |
WO (1) | WO2017138976A1 (en) |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10686827B2 (en) | 2016-04-14 | 2020-06-16 | Sophos Limited | Intermediate encryption for exposed content |
US10263966B2 (en) | 2016-04-14 | 2019-04-16 | Sophos Limited | Perimeter enforcement of encryption rules |
US10681078B2 (en) | 2016-06-10 | 2020-06-09 | Sophos Limited | Key throttling to mitigate unauthorized file access |
US10650154B2 (en) | 2016-02-12 | 2020-05-12 | Sophos Limited | Process-level control of encrypted content |
US10791097B2 (en) | 2016-04-14 | 2020-09-29 | Sophos Limited | Portable encryption format |
US9984248B2 (en) | 2016-02-12 | 2018-05-29 | Sophos Limited | Behavioral-based control of access to encrypted content by a process |
US10628597B2 (en) | 2016-04-14 | 2020-04-21 | Sophos Limited | Just-in-time encryption |
GB2551983B (en) | 2016-06-30 | 2020-03-04 | Sophos Ltd | Perimeter encryption |
US11138574B2 (en) * | 2017-02-17 | 2021-10-05 | Tiffany Walling-McGarity | Systems and methods for protecting digital media |
US11126718B2 (en) * | 2017-07-12 | 2021-09-21 | Acronis International Gmbh | Method for decrypting data encrypted by ransomware |
CN110990875B (en) * | 2019-12-06 | 2023-06-20 | 九江学院 | Ciphertext access control method based on cloud computing platform |
US11880482B2 (en) | 2020-12-10 | 2024-01-23 | International Business Machines Corporation | Secure smart containers for controlling access to data |
EP4315130A1 (en) * | 2021-03-30 | 2024-02-07 | Telefonaktiebolaget LM Ericsson (publ) | Network time protocol key encryption |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6885747B1 (en) * | 1997-02-13 | 2005-04-26 | Tec.Sec, Inc. | Cryptographic key split combiner |
US8090659B2 (en) * | 2001-09-18 | 2012-01-03 | Music Public Broadcasting, Inc. | Method and system for providing location-obscured media delivery |
US8826449B2 (en) * | 2007-09-27 | 2014-09-02 | Protegrity Corporation | Data security in a disconnected environment |
US7712143B2 (en) * | 2006-09-27 | 2010-05-04 | Blue Ridge Networks, Inc. | Trusted enclave for a computer system |
US7783666B1 (en) * | 2007-09-26 | 2010-08-24 | Netapp, Inc. | Controlling access to storage resources by using access pattern based quotas |
US20090144545A1 (en) * | 2007-11-29 | 2009-06-04 | International Business Machines Corporation | Computer system security using file system access pattern heuristics |
CN101925913A (en) * | 2008-01-31 | 2010-12-22 | 国际商业机器公司 | Method and system for encrypted file access |
EP2163067B1 (en) * | 2008-02-22 | 2013-12-25 | Security First Corp. | Systems and methods for secure workgroup management and communication |
US8281382B1 (en) * | 2008-06-30 | 2012-10-02 | Amazon Technologies, Inc. | Dynamic throttling systems and services |
US20120174196A1 (en) * | 2010-12-30 | 2012-07-05 | Suresh Bhogavilli | Active validation for ddos and ssl ddos attacks |
AU2013200916B2 (en) * | 2012-02-20 | 2014-09-11 | Kl Data Security Pty Ltd | Cryptographic Method and System |
US9374369B2 (en) * | 2012-12-28 | 2016-06-21 | Lookout, Inc. | Multi-factor authentication and comprehensive login system for client-server networks |
GB2516972A (en) * | 2013-08-09 | 2015-02-11 | Ibm | Validating DDoS attacks based on social media content |
GB2564589B (en) * | 2014-09-14 | 2019-07-03 | Sophos Ltd | Labeling computing objects for improved threat detection |
-
2016
- 2016-06-17 CA CA3014175A patent/CA3014175A1/en active Pending
- 2016-06-17 WO PCT/US2016/038020 patent/WO2017138976A1/en active Application Filing
- 2016-06-17 GB GB1808581.1A patent/GB2565185B/en active Active
- 2016-06-17 GB GB1717704.9A patent/GB2552438B8/en active Active
- 2016-06-17 AU AU2016392715A patent/AU2016392715B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
AU2016392715A1 (en) | 2018-09-13 |
GB2565185B (en) | 2019-11-27 |
GB201717704D0 (en) | 2017-12-13 |
GB2552438B8 (en) | 2021-12-08 |
GB2552438A (en) | 2018-01-24 |
CA3014175A1 (en) | 2017-08-17 |
AU2016392715B2 (en) | 2020-07-23 |
WO2017138976A1 (en) | 2017-08-17 |
GB2552438B (en) | 2018-07-04 |
GB2565185A (en) | 2019-02-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB2551983B (en) | Perimeter encryption | |
GB2551242B (en) | Authentication | |
PL3256015T3 (en) | Helmet | |
GB201808581D0 (en) | Encryption techiques | |
PL3554298T3 (en) | Helmet | |
GB201720175D0 (en) | An encryption process | |
GB201609420D0 (en) | Secure communications | |
HUE058967T2 (en) | Earphone | |
GB201615128D0 (en) | Methods | |
GB2551243B (en) | Security | |
GB201610162D0 (en) | Methods | |
EP3132422A4 (en) | Contour encryption and decryption | |
GB201709075D0 (en) | Methods | |
GB201511947D0 (en) | Encrypted locks | |
GB201621728D0 (en) | Methods | |
GB201621386D0 (en) | Methods | |
PL3258640T3 (en) | Location based authentication | |
GB201615343D0 (en) | Methods | |
GB201700649D0 (en) | Improved authentication | |
GB201619945D0 (en) | Methods | |
GB201717147D0 (en) | Encrypted patterns | |
GB201709527D0 (en) | Encrypted patterns | |
AU201616987S (en) | Earphone | |
GB201621273D0 (en) | Helmet | |
GB2546802B (en) | Disk encryption |