IL259568A - Protecting device from cyber threat - Google Patents

Protecting device from cyber threat

Info

Publication number
IL259568A
IL259568A IL259568A IL25956818A IL259568A IL 259568 A IL259568 A IL 259568A IL 259568 A IL259568 A IL 259568A IL 25956818 A IL25956818 A IL 25956818A IL 259568 A IL259568 A IL 259568A
Authority
IL
Israel
Prior art keywords
guarding
device against
cyber threat
cyber
threat
Prior art date
Application number
IL259568A
Other languages
English (en)
Hebrew (he)
Inventor
KAUFMAN Yehuda
BENAILY Gabriel
AMAR Shalom
SANDLER Guy
Yasso Eran
SCHNAPP Jonathan
Original Assignee
Essence Security International Esi Ltd
KAUFMAN Yehuda
BENAILY Gabriel
AMAR Shalom
SANDLER Guy
Yasso Eran
SCHNAPP Jonathan
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Essence Security International Esi Ltd, KAUFMAN Yehuda, BENAILY Gabriel, AMAR Shalom, SANDLER Guy, Yasso Eran, SCHNAPP Jonathan filed Critical Essence Security International Esi Ltd
Priority to IL259568A priority Critical patent/IL259568A/en
Publication of IL259568A publication Critical patent/IL259568A/en
Priority to PCT/IL2019/050586 priority patent/WO2019224826A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/166Implementing security features at a particular protocol layer at the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/006Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving public key infrastructure [PKI] trust models
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)
IL259568A 2018-05-23 2018-05-23 Protecting device from cyber threat IL259568A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
IL259568A IL259568A (en) 2018-05-23 2018-05-23 Protecting device from cyber threat
PCT/IL2019/050586 WO2019224826A1 (fr) 2018-05-23 2019-05-23 Protection d'un dispositif contre une cybermenace

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
IL259568A IL259568A (en) 2018-05-23 2018-05-23 Protecting device from cyber threat

Publications (1)

Publication Number Publication Date
IL259568A true IL259568A (en) 2018-06-28

Family

ID=66624836

Family Applications (1)

Application Number Title Priority Date Filing Date
IL259568A IL259568A (en) 2018-05-23 2018-05-23 Protecting device from cyber threat

Country Status (2)

Country Link
IL (1) IL259568A (fr)
WO (1) WO2019224826A1 (fr)

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10013573B2 (en) * 2015-12-16 2018-07-03 International Business Machines Corporation Personal ledger blockchain

Also Published As

Publication number Publication date
WO2019224826A1 (fr) 2019-11-28

Similar Documents

Publication Publication Date Title
SG11202012813VA (en) Fall protection device
GB201804738D0 (en) Security device
GB2583563B (en) Lock device
GB201817857D0 (en) A security device
GB201809526D0 (en) Key protection device
GB201804776D0 (en) Malware Barrier
GB2537682B (en) A security device
PT3712361T (pt) Dispositivo de segurança
GB201919457D0 (en) Security device
EP3772753C0 (fr) Dispositif de protection
IL259568A (en) Protecting device from cyber threat
GB201817858D0 (en) Security device
GB201904414D0 (en) A security device
GB201814554D0 (en) A key device
GB2569092B (en) Hose security device
GB201804014D0 (en) Security device
GB2581186B (en) Security device
GB2574695B (en) Security device
GB201906760D0 (en) A security device
GB201903084D0 (en) Security device
GB201814541D0 (en) Security Device
EP3891461C0 (fr) Dispositif de protection balistique
GB201914178D0 (en) Protection device
GB201817335D0 (en) A fire protection device
GB201906504D0 (en) Security devices