IN2015KN00455A - - Google Patents
Info
- Publication number
- IN2015KN00455A IN2015KN00455A IN455KON2015A IN2015KN00455A IN 2015KN00455 A IN2015KN00455 A IN 2015KN00455A IN 455KON2015 A IN455KON2015 A IN 455KON2015A IN 2015KN00455 A IN2015KN00455 A IN 2015KN00455A
- Authority
- IN
- India
- Prior art keywords
- different
- software components
- data packet
- data packets
- data
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/034—Test or assess a computer or a system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/24—Key scheduling, i.e. generating round keys or sub-keys for block encryption
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Stored Programmes (AREA)
- Storage Device Security (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Retry When Errors Occur (AREA)
- Mobile Radio Communication Systems (AREA)
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201261684743P | 2012-08-18 | 2012-08-18 | |
US201261684746P | 2012-08-18 | 2012-08-18 | |
US201261684744P | 2012-08-18 | 2012-08-18 | |
US201261684745P | 2012-08-18 | 2012-08-18 | |
PCT/US2013/055449 WO2014031494A2 (en) | 2012-08-18 | 2013-08-16 | System and method for providing a secure computational environment |
Publications (1)
Publication Number | Publication Date |
---|---|
IN2015KN00455A true IN2015KN00455A (de) | 2015-07-17 |
Family
ID=50100946
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
IN455KON2015 IN2015KN00455A (de) | 2012-08-18 | 2013-08-16 |
Country Status (10)
Country | Link |
---|---|
US (8) | US8755522B2 (de) |
EP (1) | EP2885739B1 (de) |
JP (1) | JP6382196B2 (de) |
KR (1) | KR20150070105A (de) |
CN (2) | CN107979612A (de) |
AU (2) | AU2013306094A1 (de) |
CA (1) | CA2882136A1 (de) |
IL (1) | IL237219B (de) |
IN (1) | IN2015KN00455A (de) |
WO (1) | WO2014031494A2 (de) |
Families Citing this family (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
IL210169A0 (en) | 2010-12-22 | 2011-03-31 | Yehuda Binder | System and method for routing-based internet security |
EP2885739B1 (de) | 2012-08-18 | 2019-10-02 | Fugue, Inc. | System und verfahren zur bereitstellung eines sicheren computerumgebung |
US9231921B2 (en) * | 2013-08-20 | 2016-01-05 | Janus Technologies, Inc. | System and architecture for secure computer devices |
US9756074B2 (en) | 2013-12-26 | 2017-09-05 | Fireeye, Inc. | System and method for IPS and VM-based detection of suspicious objects |
US10084813B2 (en) * | 2014-06-24 | 2018-09-25 | Fireeye, Inc. | Intrusion prevention and remedy system |
US20160170739A1 (en) * | 2014-12-15 | 2016-06-16 | Dimitar Kapashikov | Alter application behaviour during runtime |
US9591022B2 (en) | 2014-12-17 | 2017-03-07 | The Boeing Company | Computer defenses and counterattacks |
US11651367B2 (en) * | 2015-09-18 | 2023-05-16 | International Business Machines Corporation | Security in a communication network |
US10341194B2 (en) | 2015-10-05 | 2019-07-02 | Fugue, Inc. | System and method for building, optimizing, and enforcing infrastructure on a cloud based computing environment |
WO2018022901A1 (en) * | 2016-07-27 | 2018-02-01 | Fugue, Inc. | Regeneration and generational mutation for security and fidelity in software defined networks |
US10666443B2 (en) * | 2016-10-18 | 2020-05-26 | Red Hat, Inc. | Continued verification and monitoring of application code in containerized execution environment |
US10691837B1 (en) * | 2017-06-02 | 2020-06-23 | Apple Inc. | Multi-user storage volume encryption via secure enclave |
US10346157B2 (en) * | 2017-07-31 | 2019-07-09 | Qualcomm Incorporated | Patch infrastructure for ROM firmware |
EP3547122B1 (de) * | 2018-03-27 | 2023-06-07 | CODESYS Holding GmbH | Verfahren und system zum ersetzen einer softwarekomponente eines laufzeitsystems |
US11709946B2 (en) | 2018-06-06 | 2023-07-25 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US11095673B2 (en) | 2018-06-06 | 2021-08-17 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US11461461B2 (en) | 2018-07-17 | 2022-10-04 | Mergebase Software Inc. | Systems and methods for managing and securing computer systems |
US10990370B1 (en) | 2018-11-21 | 2021-04-27 | Candid Labs, Inc. | System, apparatus and method for deploying infrastructure to the cloud |
US10872029B1 (en) | 2018-11-21 | 2020-12-22 | Candid Partners, LLC | System, apparatus and method for deploying infrastructure to the cloud |
US10785128B1 (en) | 2018-11-21 | 2020-09-22 | Candid Partners, LLC | System, apparatus and method for deploying infrastructure to the cloud |
US11599644B2 (en) * | 2019-05-17 | 2023-03-07 | Walmart Apollo, Llc | Blocking insecure code with locking |
USD926810S1 (en) | 2019-06-05 | 2021-08-03 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
USD926809S1 (en) | 2019-06-05 | 2021-08-03 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
USD926200S1 (en) | 2019-06-06 | 2021-07-27 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
USD926782S1 (en) | 2019-06-06 | 2021-08-03 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
USD926811S1 (en) | 2019-06-06 | 2021-08-03 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
US11343089B2 (en) * | 2019-07-10 | 2022-05-24 | Tunnel VUE Inc. | Cryptography system and method |
CN112714097A (zh) * | 2019-10-25 | 2021-04-27 | 华为技术有限公司 | 一种安全通信方法、装置及系统 |
US11968187B2 (en) * | 2020-10-23 | 2024-04-23 | Secturion Systems, Inc. | Multi-independent level security for high performance computing and data storage systems |
US11921878B2 (en) * | 2021-01-21 | 2024-03-05 | Servicenow, Inc. | Database security through obfuscation |
Family Cites Families (71)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5444850A (en) | 1993-08-04 | 1995-08-22 | Trend Micro Devices Incorporated | Method and apparatus for controlling network and workstation access prior to workstation boot |
US5832492A (en) * | 1995-09-05 | 1998-11-03 | Compaq Computer Corporation | Method of scheduling interrupts to the linked lists of transfer descriptors scheduled at intervals on a serial bus |
US6199203B1 (en) | 1998-07-21 | 2001-03-06 | Hewlett-Packard Company | Memory management techniques for on-line replaceable software |
US6501995B1 (en) * | 1999-06-30 | 2002-12-31 | The Foxboro Company | Process control system and method with improved distribution, installation and validation of components |
US7284274B1 (en) * | 2001-01-18 | 2007-10-16 | Cigital, Inc. | System and method for identifying and eliminating vulnerabilities in computer software applications |
US20020178375A1 (en) | 2001-01-31 | 2002-11-28 | Harris Corporation | Method and system for protecting against malicious mobile code |
US7350207B2 (en) | 2001-05-25 | 2008-03-25 | Tellabs Operations, Inc. | Rule-based system and method for downloading computer software over a network |
US8205193B2 (en) | 2001-06-11 | 2012-06-19 | Hewlett-Packard Development Company, L.P. | Runtime updating of virtual machine class files |
US7188163B2 (en) | 2001-11-26 | 2007-03-06 | Sun Microsystems, Inc. | Dynamic reconfiguration of applications on a server |
US20030147369A1 (en) | 2001-12-24 | 2003-08-07 | Singh Ram Naresh | Secure wireless transfer of data between different computing devices |
US7292691B2 (en) * | 2002-01-02 | 2007-11-06 | Sony Corporation | Progressive video refresh slice detection |
US7254586B2 (en) * | 2002-06-28 | 2007-08-07 | Microsoft Corporation | Secure and opaque type library providing secure data protection of variables |
US7486678B1 (en) | 2002-07-03 | 2009-02-03 | Greenfield Networks | Multi-slice network processor |
JP2004164351A (ja) * | 2002-11-14 | 2004-06-10 | Hitachi Ltd | コンピュータシステムの不正プログラム修正方法およびその装置 |
AU2003285634A1 (en) | 2002-12-16 | 2004-07-09 | Koninklijke Philips Electronics N.V. | Method and apparatus to encrypt video data streams |
US7716736B2 (en) | 2003-04-17 | 2010-05-11 | Cybersoft, Inc. | Apparatus, methods and articles of manufacture for computer virus testing |
US7134121B2 (en) | 2003-06-12 | 2006-11-07 | International Business Machines Corporation | Installing fixes based on usage |
US7149897B2 (en) * | 2003-07-25 | 2006-12-12 | The United States Of America As Represented By The Secretary Of The Navy | Systems and methods for providing increased computer security |
US7275213B2 (en) | 2003-08-11 | 2007-09-25 | Ricoh Company, Ltd. | Configuring a graphical user interface on a multifunction peripheral |
US7533377B2 (en) | 2003-09-29 | 2009-05-12 | International Business Machines Corporation | Achieving autonomic behavior in an operating system via a hot-swapping mechanism |
US7735078B1 (en) * | 2003-10-30 | 2010-06-08 | Oracle America, Inc. | System and method for software patching for cross-platform products |
US8332943B2 (en) * | 2004-02-17 | 2012-12-11 | Microsoft Corporation | Tiered object-related trust decisions |
US7848332B2 (en) | 2004-11-15 | 2010-12-07 | Cisco Technology, Inc. | Method and apparatus for classifying a network protocol and aligning a network protocol header relative to cache line boundary |
US20060185018A1 (en) * | 2005-02-17 | 2006-08-17 | Microsoft Corporation | Systems and methods for shielding an identified vulnerability |
US8800042B2 (en) * | 2005-05-16 | 2014-08-05 | Hewlett-Packard Development Company, L.P. | Secure web application development and execution environment |
US7779399B2 (en) * | 2005-05-16 | 2010-08-17 | Armorize Technologies, Inc. | System and method for securing web application code and verifying correctness of software |
CN1881908A (zh) | 2005-06-13 | 2006-12-20 | 华为技术有限公司 | 测量mpls网络性能参数的方法 |
US20070016961A1 (en) | 2005-07-11 | 2007-01-18 | Vogler Dean H | Application revocation using an application revocation list in a portable electronic device |
US7650492B2 (en) * | 2005-07-19 | 2010-01-19 | Microsoft Corporation | Automatic update of computer-readable components to support a trusted environment |
US20070074187A1 (en) * | 2005-09-29 | 2007-03-29 | O'brien Thomas E | Method and apparatus for inserting code fixes into applications at runtime |
US20070091926A1 (en) | 2005-10-21 | 2007-04-26 | Apostolopoulos John G | Method for optimizing portions of data from a plurality of data streams at a transcoding node |
US7756834B2 (en) * | 2005-11-03 | 2010-07-13 | I365 Inc. | Malware and spyware attack recovery system and method |
US7809670B2 (en) * | 2005-12-09 | 2010-10-05 | Microsoft Corporation | Classification of malware using clustering that orders events in accordance with the time of occurance |
US7761503B2 (en) * | 2006-01-06 | 2010-07-20 | Microsoft Corporation | Peer distribution point feature for system management server |
US7697529B2 (en) | 2006-02-28 | 2010-04-13 | Cisco Technology, Inc. | Fabric channel control apparatus and method |
CN101473333B (zh) * | 2006-06-21 | 2011-09-07 | 威步系统股份公司 | 入侵检测的方法和系统 |
US20080022374A1 (en) | 2006-06-29 | 2008-01-24 | Research In Motion Limited | System and method for securely communicating with a server |
US20090254900A1 (en) * | 2006-07-13 | 2009-10-08 | Seiko Epson Corporation | Network system, computers, and method and program for providing and executing applications in network system |
IL177756A (en) * | 2006-08-29 | 2014-11-30 | Lior Frenkel | Encryption-based protection against attacks |
US7809955B2 (en) | 2006-10-17 | 2010-10-05 | Blue Ridge Networks, Inc. | Trustable communities for a computer system |
US8234641B2 (en) | 2006-10-17 | 2012-07-31 | Managelq, Inc. | Compliance-based adaptations in managed virtual systems |
US8218539B2 (en) | 2006-10-18 | 2012-07-10 | Broadcom Corporation | Flexible packet field processor |
WO2008047351A2 (en) * | 2006-10-19 | 2008-04-24 | Checkmarx Ltd. | Locating security vulnerabilities in source code |
IL180748A (en) * | 2007-01-16 | 2013-03-24 | Waterfall Security Solutions Ltd | Secure archive |
US8011010B2 (en) | 2007-04-17 | 2011-08-30 | Microsoft Corporation | Using antimalware technologies to perform offline scanning of virtual machine images |
US20090076628A1 (en) | 2007-09-18 | 2009-03-19 | David Mark Smith | Methods and apparatus to upgrade and provide control redundancy in process plants |
US8332838B2 (en) * | 2007-11-14 | 2012-12-11 | Continental Automotive Systems, Inc. | Systems and methods for updating device software |
ATE522861T1 (de) * | 2007-12-13 | 2011-09-15 | Ericsson Telefon Ab L M | Firmware-aktualisierung bei einem elektronischen gerät |
US20090247293A1 (en) | 2008-03-26 | 2009-10-01 | Aristocrat Technologies Australia Pty Limited | Gaming machine |
US9189628B2 (en) | 2008-04-10 | 2015-11-17 | Adobe Systems Incorporated | Data driven system for responding to security vulnerability |
US20100049373A1 (en) * | 2008-08-25 | 2010-02-25 | Gm Global Technology Operations, Inc. | Method for modular software removal |
DE102008061480A1 (de) * | 2008-10-06 | 2010-04-08 | Siemens Aktiengesellschaft | Verfahren und Vorrichtung zum Austauschen einer Komponente eines Computersystems |
US8051287B2 (en) | 2008-10-15 | 2011-11-01 | Adobe Systems Incorporated | Imparting real-time priority-based network communications in an encrypted communication session |
US8208494B2 (en) | 2008-12-03 | 2012-06-26 | Gigamon Llc | Intelligent packet slicing |
US9046995B2 (en) * | 2009-04-09 | 2015-06-02 | On24, Inc. | Editing of two dimensional software consumables within a complex three dimensional spatial application and method |
CN101625641A (zh) * | 2009-08-05 | 2010-01-13 | 天津大学 | 基于安全缺陷知识库的可信软件开发方法 |
US8407800B2 (en) * | 2009-11-24 | 2013-03-26 | Honeywell International Inc. | Method for software vulnerability flow analysis, generation of vulnerability-covering code, and multi-generation of functionally-equivalent code |
US9639347B2 (en) | 2009-12-21 | 2017-05-02 | International Business Machines Corporation | Updating a firmware package |
US20120066672A1 (en) * | 2010-03-16 | 2012-03-15 | Salesforce.Com, Inc. | Systems and Methods for Implementing Upgradeable Subscriber-Controlled Managed Package Components in a Multi-Tenant Environment |
US20110258701A1 (en) * | 2010-04-14 | 2011-10-20 | Raytheon Company | Protecting A Virtualization System Against Computer Attacks |
US8739150B2 (en) | 2010-05-28 | 2014-05-27 | Smartshift Gmbh | Systems and methods for dynamically replacing code objects via conditional pattern templates |
US9672022B2 (en) | 2010-06-23 | 2017-06-06 | Microsoft Technology Licensing, Llc | Applications including multiple experience modules |
US8640206B2 (en) | 2010-08-20 | 2014-01-28 | Regis J. Betsch | System and method for controlling access to information stored at plurality of sites |
IL210169A0 (en) * | 2010-12-22 | 2011-03-31 | Yehuda Binder | System and method for routing-based internet security |
CN103688550B (zh) | 2011-02-11 | 2019-01-22 | 英特尔公司 | 用于通过穿过机制的媒体流的方法、设备和装置 |
CN102073823A (zh) * | 2011-02-25 | 2011-05-25 | 天津大学 | 一种基于缺陷分析的软件可信性评价方法 |
CN202067259U (zh) * | 2011-04-18 | 2011-12-07 | 宁波天一职业技术学院 | 软件测试装置 |
US20130081007A1 (en) | 2011-09-27 | 2013-03-28 | International Business Machines Corporation | Providing continuous application availability during application update |
US8745746B1 (en) | 2012-03-07 | 2014-06-03 | Symantec Corporation | Systems and methods for addressing security vulnerabilities on computing devices |
US8756698B2 (en) | 2012-08-10 | 2014-06-17 | Nopsec Inc. | Method and system for managing computer system vulnerabilities |
EP2885739B1 (de) * | 2012-08-18 | 2019-10-02 | Fugue, Inc. | System und verfahren zur bereitstellung eines sicheren computerumgebung |
-
2013
- 2013-08-16 EP EP13831764.9A patent/EP2885739B1/de active Active
- 2013-08-16 CN CN201711385266.2A patent/CN107979612A/zh active Pending
- 2013-08-16 JP JP2015527673A patent/JP6382196B2/ja active Active
- 2013-08-16 AU AU2013306094A patent/AU2013306094A1/en not_active Abandoned
- 2013-08-16 CA CA2882136A patent/CA2882136A1/en not_active Abandoned
- 2013-08-16 IN IN455KON2015 patent/IN2015KN00455A/en unknown
- 2013-08-16 KR KR1020157006867A patent/KR20150070105A/ko not_active Application Discontinuation
- 2013-08-16 WO PCT/US2013/055449 patent/WO2014031494A2/en active Application Filing
- 2013-08-16 US US13/969,216 patent/US8755522B2/en active Active
- 2013-08-16 US US13/969,158 patent/US8819836B2/en active Active
- 2013-08-16 CN CN201380049976.1A patent/CN104769606B/zh active Active
- 2013-08-16 US US13/969,181 patent/US9003372B2/en active Active
-
2014
- 2014-06-16 US US14/305,500 patent/US9014373B2/en active Active
- 2014-08-25 US US14/467,933 patent/US9003525B2/en active Active
-
2015
- 2015-02-12 IL IL237219A patent/IL237219B/en active IP Right Grant
- 2015-04-06 US US14/679,831 patent/US9461823B2/en active Active
- 2015-04-06 US US14/679,811 patent/US9385866B2/en active Active
- 2015-04-20 US US14/691,436 patent/US9847878B2/en active Active
-
2019
- 2019-04-12 AU AU2019202562A patent/AU2019202562A1/en not_active Abandoned
Also Published As
Publication number | Publication date |
---|---|
US8755522B2 (en) | 2014-06-17 |
US20140053273A1 (en) | 2014-02-20 |
US20140053274A1 (en) | 2014-02-20 |
WO2014031494A3 (en) | 2014-06-19 |
US9003372B2 (en) | 2015-04-07 |
KR20150070105A (ko) | 2015-06-24 |
CN107979612A (zh) | 2018-05-01 |
US20150213271A1 (en) | 2015-07-30 |
CA2882136A1 (en) | 2014-02-27 |
AU2019202562A1 (en) | 2019-05-02 |
US9461823B2 (en) | 2016-10-04 |
US20140380043A1 (en) | 2014-12-25 |
CN104769606B (zh) | 2018-01-26 |
US8819836B2 (en) | 2014-08-26 |
US20140052979A1 (en) | 2014-02-20 |
US9385866B2 (en) | 2016-07-05 |
US9847878B2 (en) | 2017-12-19 |
US20140380487A1 (en) | 2014-12-25 |
US20150213270A1 (en) | 2015-07-30 |
EP2885739B1 (de) | 2019-10-02 |
WO2014031494A2 (en) | 2014-02-27 |
JP6382196B2 (ja) | 2018-08-29 |
CN104769606A (zh) | 2015-07-08 |
IL237219B (en) | 2018-08-30 |
US20150229474A1 (en) | 2015-08-13 |
US9014373B2 (en) | 2015-04-21 |
US9003525B2 (en) | 2015-04-07 |
AU2013306094A1 (en) | 2015-03-05 |
EP2885739A2 (de) | 2015-06-24 |
JP2015531928A (ja) | 2015-11-05 |
EP2885739A4 (de) | 2016-08-10 |
IL237219A0 (en) | 2015-04-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
IN2015KN00455A (de) | ||
WO2014059136A3 (en) | Techniqued for secure data exchange | |
MX2015014636A (es) | Metodo de seguridad para archivos y aparatos para el mismo. | |
EP2582086A4 (de) | Kryptographiesystem, kryptographisches kommunikationsverfahren, schlüsselerzeugungsvorrichtung, entschlüsselungsvorrichtung, inhaltsservervorrichtung, programm und aufzeichnungsmedium | |
EP2565862A4 (de) | Verschlüsselungsverarbeitungssystem, schlüsselerzeugungsvorrichtung, verschlüsselungsvorrichtung, unterschriftenverarbeitungssystem und überprüfungsvorrichtung | |
EP2613472A4 (de) | Verschlüsselungsverarbeitungssystem, schlüsselerzeugungsvorrichtung, schlüsselentwicklungsvorrichtung, verschlüsselungsvorrichtung, , verschlüsselungsverarbeitungsverfahren und verschlüsselungsverarbeitungsprogramm | |
GB2509422A (en) | Decryption and encryption of application data | |
WO2014070134A3 (en) | Quorum-based virtual machine security | |
PH12015500102A1 (en) | Method, device and system for encrypting and decrypting image | |
EP2905715A4 (de) | Verfahren, system und endgerät zur verschlüsselung/entschlüsselung eines anwendungsprogramms auf einem kommunikationsendgerät | |
WO2009155002A3 (en) | Time of day encryption using tdma timing | |
AU2012225621A8 (en) | Secure file sharing method and system | |
SG11201708750TA (en) | Network system, and methods of encrypting data, decrypting encrypted data in the same | |
EP2667538A4 (de) | Verschlüsselungssystem, verschlüsselungsverarbeitungsverfahren für das verschlüsselungssystem, verschlüsselungsvorrichtung, verschlüsselungsprogramm, entschlüsselungsvorrichtung, entschlüsselungsprogramm, setup-vorrichtung, setup-programm, schlüsselerzeugungsvorrichtung, schlüsselerzeugungsprogramm, schlüsselzuweisungsvorrichtung und schlüsselzuweisungsprogramm | |
PL2664098T3 (pl) | Sposoby i układy do dystrybucji danych kryptograficznych do uwierzytelnionych odbiorców | |
EP2884690A4 (de) | Vorrichtung zur erzeugung eines neuverschlüsselungsschlüssels, neuverschlüsselungsvorrichtung, verschlüsselungsvorrichtung, entschlüsselungsvorrichtung und programm | |
GB2503164A (en) | Cross enterprise communication | |
EP2525340A4 (de) | Vertrauliches suchsystem und verschlüsselungsverarbeitungssystem | |
WO2012087692A3 (en) | System and method for secure communications in a communication system | |
GB2512249A (en) | Secure peer discovery and authentication using a shared secret | |
WO2013104837A8 (fr) | Procede de chiffrement protege contre des attaques par canaux auxiliaires | |
GB201101471D0 (en) | A method, module and host | |
EP2523178A4 (de) | Verschlüsselungsverarbeitungssystem, schlüsselerzeugungsvorrichtung, schlüsselentwicklungsvorrichtung, verschlüsselungsvorrichtung, decodierungsvorrichtung, entschlüsselungsverarbeitungsverfahren und verschlüsselungsverarbeitungsprogramm | |
WO2014113132A3 (en) | Method for secure symbol comparison | |
EP2195963A4 (de) | Sicherheitsmassnahmen zur abwehr einer unbefugten entschlüsselung |