IN2015DE01753A - - Google Patents
Info
- Publication number
- IN2015DE01753A IN2015DE01753A IN1753DE2015A IN2015DE01753A IN 2015DE01753 A IN2015DE01753 A IN 2015DE01753A IN 1753DE2015 A IN1753DE2015 A IN 1753DE2015A IN 2015DE01753 A IN2015DE01753 A IN 2015DE01753A
- Authority
- IN
- India
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
- G06Q20/123—Shopping for digital content
- G06Q20/1235—Shopping for digital content with control of digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/106—Enforcing content protection by specific content processing
- G06F21/1066—Hiding content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/034—Test or assess a computer or a system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q2220/00—Business processing using cryptography
- G06Q2220/10—Usage protection of distributed data files
- G06Q2220/18—Licensing
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Storage Device Security (AREA)
- User Interface Of Digital Computer (AREA)
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IN1753DE2015 IN2015DE01753A (fr) | 2015-06-11 | 2015-06-11 | |
US14/928,851 US20160364707A1 (en) | 2015-06-11 | 2015-10-30 | Potentate: A Cryptography-Obfuscating, Self-Policing, Pervasive Distribution System For Digital Content |
AU2016276660A AU2016276660A1 (en) | 2015-06-11 | 2016-06-06 | Potentate: A cryptography-obfuscating, self-policing, pervasive distribution system for digital content |
PCT/IN2016/050169 WO2016199166A1 (fr) | 2015-06-11 | 2016-06-06 | Système d'obscurcissement cryptographique, d'auto-contrôle et de distribution étendue de contenu numérique |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IN1753DE2015 IN2015DE01753A (fr) | 2015-06-11 | 2015-06-11 |
Publications (1)
Publication Number | Publication Date |
---|---|
IN2015DE01753A true IN2015DE01753A (fr) | 2015-08-28 |
Family
ID=54394859
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
IN1753DE2015 IN2015DE01753A (fr) | 2015-06-11 | 2015-06-11 |
Country Status (4)
Country | Link |
---|---|
US (1) | US20160364707A1 (fr) |
AU (1) | AU2016276660A1 (fr) |
IN (1) | IN2015DE01753A (fr) |
WO (1) | WO2016199166A1 (fr) |
Families Citing this family (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106909811B (zh) * | 2015-12-23 | 2020-07-03 | 腾讯科技(深圳)有限公司 | 用户标识处理的方法和装置 |
JP2017194835A (ja) * | 2016-04-20 | 2017-10-26 | 富士通株式会社 | 認証プログラム、認証方法および認証装置 |
US10452802B2 (en) * | 2016-07-08 | 2019-10-22 | efabless corporation | Methods for engineering integrated circuit design and development |
US10354069B2 (en) * | 2016-09-02 | 2019-07-16 | Bae Systems Information And Electronic Systems Integration Inc. | Automated reverse engineering |
JP6805720B2 (ja) * | 2016-10-21 | 2020-12-23 | 富士通株式会社 | データ検索プログラム、データ検索装置およびデータ検索方法 |
FR3063822B1 (fr) | 2017-03-10 | 2019-03-15 | Wallix | Procede d’acces a une ressource informatique securisee par une application informatique. |
JP7059516B2 (ja) | 2017-03-29 | 2022-04-26 | 富士通株式会社 | 符号化プログラム、符号化装置および符号化方法 |
US11036424B2 (en) * | 2017-05-18 | 2021-06-15 | The Silk Technologies Ilc Ltd | Garbage collection in a distributed storage system |
EP3462308B1 (fr) * | 2017-09-29 | 2022-03-02 | ARM Limited | Instruction de test de profondeur d'imbrication de transaction |
US11055411B2 (en) * | 2018-05-10 | 2021-07-06 | Acronis International Gmbh | System and method for protection against ransomware attacks |
US10838715B1 (en) | 2019-05-03 | 2020-11-17 | Servicenow, Inc. | Efficient automatic population of downgrade rights of licensed software |
US11575504B2 (en) | 2019-06-29 | 2023-02-07 | Intel Corporation | Cryptographic computing engine for memory load and store units of a microarchitecture pipeline |
US11403234B2 (en) | 2019-06-29 | 2022-08-02 | Intel Corporation | Cryptographic computing using encrypted base addresses and used in multi-tenant environments |
US11580234B2 (en) | 2019-06-29 | 2023-02-14 | Intel Corporation | Implicit integrity for cryptographic computing |
US11250165B2 (en) | 2019-12-20 | 2022-02-15 | Intel Corporation | Binding of cryptographic operations to context or speculative execution restrictions |
CN113031930B (zh) * | 2019-12-24 | 2022-07-05 | 武汉斗鱼鱼乐网络科技有限公司 | 一种控制流平坦化的源代码混淆生成方法及装置 |
CN111294340B (zh) * | 2020-01-17 | 2022-05-17 | 河南芯盾网安科技发展有限公司 | 基于零宽字符的加密信息隐写方法 |
US11416621B2 (en) * | 2020-06-18 | 2022-08-16 | Micron Technology, Inc. | Authenticating software images |
US11526612B2 (en) * | 2020-09-22 | 2022-12-13 | International Business Machines Corporation | Computer file metadata segmentation security system |
US11580035B2 (en) | 2020-12-26 | 2023-02-14 | Intel Corporation | Fine-grained stack protection using cryptographic computing |
US11625337B2 (en) | 2020-12-26 | 2023-04-11 | Intel Corporation | Encoded pointer based data encryption |
US11669625B2 (en) | 2020-12-26 | 2023-06-06 | Intel Corporation | Data type based cryptographic computing |
CN115396103B (zh) * | 2022-10-26 | 2023-03-24 | 杭州海康威视数字技术股份有限公司 | 基于白盒密钥的ai数据共享方法、系统和装置 |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5822606A (en) * | 1996-01-11 | 1998-10-13 | Morton; Steven G. | DSP having a plurality of like processors controlled in parallel by an instruction word, and a control processor also controlled by the instruction word |
US7810080B2 (en) * | 2003-09-15 | 2010-10-05 | Thomas Plum | Automated safe secure techniques for eliminating undefined behavior in computer software |
CN100342296C (zh) * | 2005-09-09 | 2007-10-10 | 深圳兆日技术有限公司 | 基于可信计算模块芯片实现计算机软件防盗版的方法 |
US9710623B2 (en) * | 2008-03-05 | 2017-07-18 | Irdeto B.V. | Cryptographic system |
CN101727941B (zh) * | 2008-10-24 | 2013-01-16 | 英属开曼群岛商康帝国际科技股份有限公司 | 分布式隐藏解密钥匙的方法与系统 |
EP2430584B1 (fr) * | 2009-05-06 | 2019-11-13 | Irdeto B.V. | Protection binaire verrouillée utilisant une cryptographie à boîte blanche |
CN102034054A (zh) * | 2009-09-29 | 2011-04-27 | 华腾国际科技股份有限公司 | 信息验证系统 |
JP5914962B2 (ja) * | 2010-04-09 | 2016-05-11 | ソニー株式会社 | 画像処理装置および方法、プログラム、並びに、記録媒体 |
CN104392154B (zh) * | 2014-11-10 | 2017-06-16 | 北京深思数盾科技股份有限公司 | 一种加密方法 |
-
2015
- 2015-06-11 IN IN1753DE2015 patent/IN2015DE01753A/en unknown
- 2015-10-30 US US14/928,851 patent/US20160364707A1/en not_active Abandoned
-
2016
- 2016-06-06 AU AU2016276660A patent/AU2016276660A1/en not_active Abandoned
- 2016-06-06 WO PCT/IN2016/050169 patent/WO2016199166A1/fr active Application Filing
Also Published As
Publication number | Publication date |
---|---|
AU2016276660A1 (en) | 2018-01-04 |
US20160364707A1 (en) | 2016-12-15 |
WO2016199166A1 (fr) | 2016-12-15 |