IL259568D0 - Guarding a device against a cyber threat - Google Patents

Guarding a device against a cyber threat

Info

Publication number
IL259568D0
IL259568D0 IL259568A IL25956818A IL259568D0 IL 259568 D0 IL259568 D0 IL 259568D0 IL 259568 A IL259568 A IL 259568A IL 25956818 A IL25956818 A IL 25956818A IL 259568 D0 IL259568 D0 IL 259568D0
Authority
IL
Israel
Prior art keywords
guarding
device against
cyber threat
cyber
threat
Prior art date
Application number
IL259568A
Other languages
Hebrew (he)
Inventor
KAUFMAN Yehuda
BENAILY Gabriel
AMAR Shalom
SANDLER Guy
Yasso Eran
SCHNAPP Jonathan
Original Assignee
Essence Security Int E S I Ltd
KAUFMAN Yehuda
BENAILY Gabriel
AMAR Shalom
SANDLER Guy
Yasso Eran
SCHNAPP Jonathan
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Essence Security Int E S I Ltd, KAUFMAN Yehuda, BENAILY Gabriel, AMAR Shalom, SANDLER Guy, Yasso Eran, SCHNAPP Jonathan filed Critical Essence Security Int E S I Ltd
Priority to IL259568A priority Critical patent/IL259568D0/en
Publication of IL259568D0 publication Critical patent/IL259568D0/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/166Implementing security features at a particular protocol layer at the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/006Cryptographic mechanisms or cryptographic arrangements for secret or secure communication involving public key infrastructure [PKI] trust models
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/38Chaining, e.g. hash chain or certificate chain
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
IL259568A 2018-05-23 2018-05-23 Guarding a device against a cyber threat IL259568D0 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
IL259568A IL259568D0 (en) 2018-05-23 2018-05-23 Guarding a device against a cyber threat

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IL259568A IL259568D0 (en) 2018-05-23 2018-05-23 Guarding a device against a cyber threat
PCT/IL2019/050586 WO2019224826A1 (en) 2018-05-23 2019-05-23 Guarding a device against a cyber threat

Publications (1)

Publication Number Publication Date
IL259568D0 true IL259568D0 (en) 2018-06-28

Family

ID=66624836

Family Applications (1)

Application Number Title Priority Date Filing Date
IL259568A IL259568D0 (en) 2018-05-23 2018-05-23 Guarding a device against a cyber threat

Country Status (2)

Country Link
IL (1) IL259568D0 (en)
WO (1) WO2019224826A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019224826A1 (en) 2018-05-23 2019-11-28 Essence Security International (E.S.I.) Ltd. Guarding a device against a cyber threat

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10013573B2 (en) * 2015-12-16 2018-07-03 International Business Machines Corporation Personal ledger blockchain
IL259568D0 (en) 2018-05-23 2018-06-28 Essence Security Int E S I Ltd Guarding a device against a cyber threat

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019224826A1 (en) 2018-05-23 2019-11-28 Essence Security International (E.S.I.) Ltd. Guarding a device against a cyber threat

Also Published As

Publication number Publication date
WO2019224826A1 (en) 2019-11-28

Similar Documents

Publication Publication Date Title
GB201404192D0 (en) A security device
GB2514879B (en) Self-operated barrier for flood, spill and other protection
HUE039704T2 (en) Protection device for a wave guide
EP3414878A4 (en) Protecting network devices by a firewall
GB201409598D0 (en) A security barrier
GB201413573D0 (en) A security barrier
SG11201800820VA (en) Finger protection device for a leaf door
GB2531965B (en) A cracker device
FR3038131B1 (en) Improved protection device against electrostatic discharge.
PT2913461T (en) Security device for a cylinder lock
GB2533500B (en) Security device
EP3294568A4 (en) Security device
EP3447216A4 (en) Key security device
EP3335290A4 (en) Overvoltage protection device
GB201509181D0 (en) Device key security
GB201504249D0 (en) A security device
FR3025690B1 (en) Housing comprising a wall having a valve protection enclosure, and system comprising such a housing
PL3050759T3 (en) Underrun protection device
GB2543952B (en) Advanced local-network threat response
FR3044166B1 (en) Electronic device, especially for protection against overvoltages
GB201602306D0 (en) Cyber security
GB2529914B (en) Hand protection device
EP3236794A4 (en) A face guard comprising at least one wire
RU2017117251A (en) Modular security management device
ES1227154Y (en) Security device for doors