IN2015KN00455A - - Google Patents
Info
- Publication number
- IN2015KN00455A IN2015KN00455A IN455KON2015A IN2015KN00455A IN 2015KN00455 A IN2015KN00455 A IN 2015KN00455A IN 455KON2015 A IN455KON2015 A IN 455KON2015A IN 2015KN00455 A IN2015KN00455 A IN 2015KN00455A
- Authority
- IN
- India
- Prior art keywords
- different
- software components
- data packet
- data packets
- data
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/034—Test or assess a computer or a system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/24—Key scheduling, i.e. generating round keys or sub-keys for block encryption
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Stored Programmes (AREA)
- Storage Device Security (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Retry When Errors Occur (AREA)
- Mobile Radio Communication Systems (AREA)
Applications Claiming Priority (5)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201261684744P | 2012-08-18 | 2012-08-18 | |
| US201261684746P | 2012-08-18 | 2012-08-18 | |
| US201261684745P | 2012-08-18 | 2012-08-18 | |
| US201261684743P | 2012-08-18 | 2012-08-18 | |
| PCT/US2013/055449 WO2014031494A2 (en) | 2012-08-18 | 2013-08-16 | System and method for providing a secure computational environment |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| IN2015KN00455A true IN2015KN00455A (enExample) | 2015-07-17 |
Family
ID=50100946
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| IN455KON2015 IN2015KN00455A (enExample) | 2012-08-18 | 2013-08-16 |
Country Status (10)
| Country | Link |
|---|---|
| US (8) | US8755522B2 (enExample) |
| EP (1) | EP2885739B1 (enExample) |
| JP (1) | JP6382196B2 (enExample) |
| KR (1) | KR20150070105A (enExample) |
| CN (2) | CN107979612A (enExample) |
| AU (2) | AU2013306094A1 (enExample) |
| CA (1) | CA2882136A1 (enExample) |
| IL (1) | IL237219B (enExample) |
| IN (1) | IN2015KN00455A (enExample) |
| WO (1) | WO2014031494A2 (enExample) |
Families Citing this family (31)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| IL210169A0 (en) | 2010-12-22 | 2011-03-31 | Yehuda Binder | System and method for routing-based internet security |
| US8755522B2 (en) | 2012-08-18 | 2014-06-17 | Luminal, Inc. | System and method for interleaving information into slices of a data packet, differentially encrypting the slices, and obfuscating information in the data packet |
| US9231921B2 (en) * | 2013-08-20 | 2016-01-05 | Janus Technologies, Inc. | System and architecture for secure computer devices |
| US9756074B2 (en) | 2013-12-26 | 2017-09-05 | Fireeye, Inc. | System and method for IPS and VM-based detection of suspicious objects |
| US10084813B2 (en) * | 2014-06-24 | 2018-09-25 | Fireeye, Inc. | Intrusion prevention and remedy system |
| US20160170739A1 (en) * | 2014-12-15 | 2016-06-16 | Dimitar Kapashikov | Alter application behaviour during runtime |
| US9591022B2 (en) | 2014-12-17 | 2017-03-07 | The Boeing Company | Computer defenses and counterattacks |
| US11651367B2 (en) * | 2015-09-18 | 2023-05-16 | International Business Machines Corporation | Security in a communication network |
| US10341194B2 (en) | 2015-10-05 | 2019-07-02 | Fugue, Inc. | System and method for building, optimizing, and enforcing infrastructure on a cloud based computing environment |
| WO2018022901A1 (en) * | 2016-07-27 | 2018-02-01 | Fugue, Inc. | Regeneration and generational mutation for security and fidelity in software defined networks |
| US10666443B2 (en) * | 2016-10-18 | 2020-05-26 | Red Hat, Inc. | Continued verification and monitoring of application code in containerized execution environment |
| US10691837B1 (en) * | 2017-06-02 | 2020-06-23 | Apple Inc. | Multi-user storage volume encryption via secure enclave |
| US10346157B2 (en) * | 2017-07-31 | 2019-07-09 | Qualcomm Incorporated | Patch infrastructure for ROM firmware |
| EP3547122B1 (en) * | 2018-03-27 | 2023-06-07 | CODESYS Holding GmbH | A method and system for replacing a software component of a runtime system |
| US11709946B2 (en) | 2018-06-06 | 2023-07-25 | Reliaquest Holdings, Llc | Threat mitigation system and method |
| US11108798B2 (en) * | 2018-06-06 | 2021-08-31 | Reliaquest Holdings, Llc | Threat mitigation system and method |
| WO2020014787A1 (en) * | 2018-07-17 | 2020-01-23 | Mergebase Software Inc. | Systems and methods for managing and securing computer systems |
| US10990370B1 (en) | 2018-11-21 | 2021-04-27 | Candid Labs, Inc. | System, apparatus and method for deploying infrastructure to the cloud |
| US10872029B1 (en) | 2018-11-21 | 2020-12-22 | Candid Partners, LLC | System, apparatus and method for deploying infrastructure to the cloud |
| US10785128B1 (en) | 2018-11-21 | 2020-09-22 | Candid Partners, LLC | System, apparatus and method for deploying infrastructure to the cloud |
| EP3756090B1 (en) * | 2018-12-07 | 2025-05-14 | Google LLC | Passive-enabled applications for a computing device |
| US11599644B2 (en) * | 2019-05-17 | 2023-03-07 | Walmart Apollo, Llc | Blocking insecure code with locking |
| USD926810S1 (en) | 2019-06-05 | 2021-08-03 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
| USD926809S1 (en) | 2019-06-05 | 2021-08-03 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
| USD926200S1 (en) | 2019-06-06 | 2021-07-27 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
| USD926811S1 (en) | 2019-06-06 | 2021-08-03 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
| USD926782S1 (en) | 2019-06-06 | 2021-08-03 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
| US11343089B2 (en) * | 2019-07-10 | 2022-05-24 | Tunnel VUE Inc. | Cryptography system and method |
| CN112714097B (zh) * | 2019-10-25 | 2025-06-06 | 华为技术有限公司 | 一种安全通信方法、装置及系统 |
| US11968187B2 (en) * | 2020-10-23 | 2024-04-23 | Secturion Systems, Inc. | Multi-independent level security for high performance computing and data storage systems |
| US11921878B2 (en) * | 2021-01-21 | 2024-03-05 | Servicenow, Inc. | Database security through obfuscation |
Family Cites Families (71)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5444850A (en) | 1993-08-04 | 1995-08-22 | Trend Micro Devices Incorporated | Method and apparatus for controlling network and workstation access prior to workstation boot |
| US5832492A (en) * | 1995-09-05 | 1998-11-03 | Compaq Computer Corporation | Method of scheduling interrupts to the linked lists of transfer descriptors scheduled at intervals on a serial bus |
| US6199203B1 (en) * | 1998-07-21 | 2001-03-06 | Hewlett-Packard Company | Memory management techniques for on-line replaceable software |
| US6501995B1 (en) * | 1999-06-30 | 2002-12-31 | The Foxboro Company | Process control system and method with improved distribution, installation and validation of components |
| US7284274B1 (en) | 2001-01-18 | 2007-10-16 | Cigital, Inc. | System and method for identifying and eliminating vulnerabilities in computer software applications |
| US20020178375A1 (en) | 2001-01-31 | 2002-11-28 | Harris Corporation | Method and system for protecting against malicious mobile code |
| US7350207B2 (en) | 2001-05-25 | 2008-03-25 | Tellabs Operations, Inc. | Rule-based system and method for downloading computer software over a network |
| US8205193B2 (en) * | 2001-06-11 | 2012-06-19 | Hewlett-Packard Development Company, L.P. | Runtime updating of virtual machine class files |
| US7188163B2 (en) | 2001-11-26 | 2007-03-06 | Sun Microsystems, Inc. | Dynamic reconfiguration of applications on a server |
| US20030147369A1 (en) | 2001-12-24 | 2003-08-07 | Singh Ram Naresh | Secure wireless transfer of data between different computing devices |
| US7292691B2 (en) * | 2002-01-02 | 2007-11-06 | Sony Corporation | Progressive video refresh slice detection |
| US7254586B2 (en) * | 2002-06-28 | 2007-08-07 | Microsoft Corporation | Secure and opaque type library providing secure data protection of variables |
| US7486678B1 (en) | 2002-07-03 | 2009-02-03 | Greenfield Networks | Multi-slice network processor |
| JP2004164351A (ja) * | 2002-11-14 | 2004-06-10 | Hitachi Ltd | コンピュータシステムの不正プログラム修正方法およびその装置 |
| AU2003285634A1 (en) * | 2002-12-16 | 2004-07-09 | Koninklijke Philips Electronics N.V. | Method and apparatus to encrypt video data streams |
| US7716736B2 (en) | 2003-04-17 | 2010-05-11 | Cybersoft, Inc. | Apparatus, methods and articles of manufacture for computer virus testing |
| US7134121B2 (en) * | 2003-06-12 | 2006-11-07 | International Business Machines Corporation | Installing fixes based on usage |
| US7149897B2 (en) * | 2003-07-25 | 2006-12-12 | The United States Of America As Represented By The Secretary Of The Navy | Systems and methods for providing increased computer security |
| US7275213B2 (en) | 2003-08-11 | 2007-09-25 | Ricoh Company, Ltd. | Configuring a graphical user interface on a multifunction peripheral |
| US7533377B2 (en) * | 2003-09-29 | 2009-05-12 | International Business Machines Corporation | Achieving autonomic behavior in an operating system via a hot-swapping mechanism |
| US7735078B1 (en) | 2003-10-30 | 2010-06-08 | Oracle America, Inc. | System and method for software patching for cross-platform products |
| US8332943B2 (en) * | 2004-02-17 | 2012-12-11 | Microsoft Corporation | Tiered object-related trust decisions |
| US7848332B2 (en) | 2004-11-15 | 2010-12-07 | Cisco Technology, Inc. | Method and apparatus for classifying a network protocol and aligning a network protocol header relative to cache line boundary |
| US20060185018A1 (en) * | 2005-02-17 | 2006-08-17 | Microsoft Corporation | Systems and methods for shielding an identified vulnerability |
| US7779399B2 (en) * | 2005-05-16 | 2010-08-17 | Armorize Technologies, Inc. | System and method for securing web application code and verifying correctness of software |
| US8800042B2 (en) * | 2005-05-16 | 2014-08-05 | Hewlett-Packard Development Company, L.P. | Secure web application development and execution environment |
| CN1881908A (zh) | 2005-06-13 | 2006-12-20 | 华为技术有限公司 | 测量mpls网络性能参数的方法 |
| US20070016961A1 (en) | 2005-07-11 | 2007-01-18 | Vogler Dean H | Application revocation using an application revocation list in a portable electronic device |
| US7650492B2 (en) * | 2005-07-19 | 2010-01-19 | Microsoft Corporation | Automatic update of computer-readable components to support a trusted environment |
| US20070074187A1 (en) | 2005-09-29 | 2007-03-29 | O'brien Thomas E | Method and apparatus for inserting code fixes into applications at runtime |
| US20070091926A1 (en) | 2005-10-21 | 2007-04-26 | Apostolopoulos John G | Method for optimizing portions of data from a plurality of data streams at a transcoding node |
| US7756834B2 (en) * | 2005-11-03 | 2010-07-13 | I365 Inc. | Malware and spyware attack recovery system and method |
| US7809670B2 (en) | 2005-12-09 | 2010-10-05 | Microsoft Corporation | Classification of malware using clustering that orders events in accordance with the time of occurance |
| US7761503B2 (en) * | 2006-01-06 | 2010-07-20 | Microsoft Corporation | Peer distribution point feature for system management server |
| US7697529B2 (en) | 2006-02-28 | 2010-04-13 | Cisco Technology, Inc. | Fabric channel control apparatus and method |
| WO2007147495A2 (en) * | 2006-06-21 | 2007-12-27 | Wibu-Systems Ag | Method and system for intrusion detection |
| US20080022374A1 (en) * | 2006-06-29 | 2008-01-24 | Research In Motion Limited | System and method for securely communicating with a server |
| WO2008007456A1 (fr) | 2006-07-13 | 2008-01-17 | Seiko Epson Corporation | Système de réseau, ordinateur, procédé de mise en œuvre d'applications pour un système de réseau, procédé d'exécution d'applications pour un système de réseau, et programme |
| IL177756A (en) * | 2006-08-29 | 2014-11-30 | Lior Frenkel | Encryption-based protection against attacks |
| US8234641B2 (en) | 2006-10-17 | 2012-07-31 | Managelq, Inc. | Compliance-based adaptations in managed virtual systems |
| US7809955B2 (en) * | 2006-10-17 | 2010-10-05 | Blue Ridge Networks, Inc. | Trustable communities for a computer system |
| US8218539B2 (en) * | 2006-10-18 | 2012-07-10 | Broadcom Corporation | Flexible packet field processor |
| WO2008047351A2 (en) * | 2006-10-19 | 2008-04-24 | Checkmarx Ltd. | Locating security vulnerabilities in source code |
| IL180748A (en) * | 2007-01-16 | 2013-03-24 | Waterfall Security Solutions Ltd | Secure archive |
| US8011010B2 (en) * | 2007-04-17 | 2011-08-30 | Microsoft Corporation | Using antimalware technologies to perform offline scanning of virtual machine images |
| US20090076628A1 (en) * | 2007-09-18 | 2009-03-19 | David Mark Smith | Methods and apparatus to upgrade and provide control redundancy in process plants |
| US8332838B2 (en) * | 2007-11-14 | 2012-12-11 | Continental Automotive Systems, Inc. | Systems and methods for updating device software |
| WO2009074444A2 (en) | 2007-12-13 | 2009-06-18 | Telefonaktiebolaget L M Ericsson (Publ) | Updating firmware of an electronic device |
| US20090247293A1 (en) | 2008-03-26 | 2009-10-01 | Aristocrat Technologies Australia Pty Limited | Gaming machine |
| US9189628B2 (en) | 2008-04-10 | 2015-11-17 | Adobe Systems Incorporated | Data driven system for responding to security vulnerability |
| US20100049373A1 (en) * | 2008-08-25 | 2010-02-25 | Gm Global Technology Operations, Inc. | Method for modular software removal |
| DE102008061480A1 (de) | 2008-10-06 | 2010-04-08 | Siemens Aktiengesellschaft | Verfahren und Vorrichtung zum Austauschen einer Komponente eines Computersystems |
| US8051287B2 (en) | 2008-10-15 | 2011-11-01 | Adobe Systems Incorporated | Imparting real-time priority-based network communications in an encrypted communication session |
| US8208494B2 (en) * | 2008-12-03 | 2012-06-26 | Gigamon Llc | Intelligent packet slicing |
| US9046995B2 (en) | 2009-04-09 | 2015-06-02 | On24, Inc. | Editing of two dimensional software consumables within a complex three dimensional spatial application and method |
| CN101625641A (zh) * | 2009-08-05 | 2010-01-13 | 天津大学 | 基于安全缺陷知识库的可信软件开发方法 |
| US8407800B2 (en) * | 2009-11-24 | 2013-03-26 | Honeywell International Inc. | Method for software vulnerability flow analysis, generation of vulnerability-covering code, and multi-generation of functionally-equivalent code |
| US9639347B2 (en) * | 2009-12-21 | 2017-05-02 | International Business Machines Corporation | Updating a firmware package |
| US20120066672A1 (en) * | 2010-03-16 | 2012-03-15 | Salesforce.Com, Inc. | Systems and Methods for Implementing Upgradeable Subscriber-Controlled Managed Package Components in a Multi-Tenant Environment |
| US20110258701A1 (en) * | 2010-04-14 | 2011-10-20 | Raytheon Company | Protecting A Virtualization System Against Computer Attacks |
| US8739150B2 (en) | 2010-05-28 | 2014-05-27 | Smartshift Gmbh | Systems and methods for dynamically replacing code objects via conditional pattern templates |
| US9672022B2 (en) | 2010-06-23 | 2017-06-06 | Microsoft Technology Licensing, Llc | Applications including multiple experience modules |
| US8640206B2 (en) * | 2010-08-20 | 2014-01-28 | Regis J. Betsch | System and method for controlling access to information stored at plurality of sites |
| IL210169A0 (en) | 2010-12-22 | 2011-03-31 | Yehuda Binder | System and method for routing-based internet security |
| US20140241380A1 (en) | 2011-02-11 | 2014-08-28 | Joseph A. Bennett | Media stream over pass through mechanism |
| CN102073823A (zh) * | 2011-02-25 | 2011-05-25 | 天津大学 | 一种基于缺陷分析的软件可信性评价方法 |
| CN202067259U (zh) * | 2011-04-18 | 2011-12-07 | 宁波天一职业技术学院 | 软件测试装置 |
| US20130081007A1 (en) | 2011-09-27 | 2013-03-28 | International Business Machines Corporation | Providing continuous application availability during application update |
| US8745746B1 (en) | 2012-03-07 | 2014-06-03 | Symantec Corporation | Systems and methods for addressing security vulnerabilities on computing devices |
| US8756698B2 (en) | 2012-08-10 | 2014-06-17 | Nopsec Inc. | Method and system for managing computer system vulnerabilities |
| US8755522B2 (en) | 2012-08-18 | 2014-06-17 | Luminal, Inc. | System and method for interleaving information into slices of a data packet, differentially encrypting the slices, and obfuscating information in the data packet |
-
2013
- 2013-08-16 US US13/969,216 patent/US8755522B2/en active Active
- 2013-08-16 AU AU2013306094A patent/AU2013306094A1/en not_active Abandoned
- 2013-08-16 WO PCT/US2013/055449 patent/WO2014031494A2/en not_active Ceased
- 2013-08-16 KR KR1020157006867A patent/KR20150070105A/ko not_active Ceased
- 2013-08-16 US US13/969,158 patent/US8819836B2/en active Active
- 2013-08-16 EP EP13831764.9A patent/EP2885739B1/en active Active
- 2013-08-16 CA CA2882136A patent/CA2882136A1/en not_active Abandoned
- 2013-08-16 CN CN201711385266.2A patent/CN107979612A/zh active Pending
- 2013-08-16 IN IN455KON2015 patent/IN2015KN00455A/en unknown
- 2013-08-16 CN CN201380049976.1A patent/CN104769606B/zh active Active
- 2013-08-16 US US13/969,181 patent/US9003372B2/en active Active
- 2013-08-16 JP JP2015527673A patent/JP6382196B2/ja active Active
-
2014
- 2014-06-16 US US14/305,500 patent/US9014373B2/en active Active
- 2014-08-25 US US14/467,933 patent/US9003525B2/en active Active
-
2015
- 2015-02-12 IL IL237219A patent/IL237219B/en active IP Right Grant
- 2015-04-06 US US14/679,831 patent/US9461823B2/en active Active
- 2015-04-06 US US14/679,811 patent/US9385866B2/en active Active
- 2015-04-20 US US14/691,436 patent/US9847878B2/en active Active
-
2019
- 2019-04-12 AU AU2019202562A patent/AU2019202562A1/en not_active Abandoned
Also Published As
| Publication number | Publication date |
|---|---|
| US20150213270A1 (en) | 2015-07-30 |
| US9385866B2 (en) | 2016-07-05 |
| US9003525B2 (en) | 2015-04-07 |
| US9003372B2 (en) | 2015-04-07 |
| AU2013306094A1 (en) | 2015-03-05 |
| WO2014031494A3 (en) | 2014-06-19 |
| AU2019202562A1 (en) | 2019-05-02 |
| EP2885739A2 (en) | 2015-06-24 |
| US20140052979A1 (en) | 2014-02-20 |
| US20150229474A1 (en) | 2015-08-13 |
| US8819836B2 (en) | 2014-08-26 |
| US9014373B2 (en) | 2015-04-21 |
| JP2015531928A (ja) | 2015-11-05 |
| CN104769606A (zh) | 2015-07-08 |
| JP6382196B2 (ja) | 2018-08-29 |
| US9461823B2 (en) | 2016-10-04 |
| CN107979612A (zh) | 2018-05-01 |
| EP2885739A4 (en) | 2016-08-10 |
| US20140380043A1 (en) | 2014-12-25 |
| US9847878B2 (en) | 2017-12-19 |
| US20140053274A1 (en) | 2014-02-20 |
| EP2885739B1 (en) | 2019-10-02 |
| US8755522B2 (en) | 2014-06-17 |
| WO2014031494A2 (en) | 2014-02-27 |
| KR20150070105A (ko) | 2015-06-24 |
| IL237219A0 (en) | 2015-04-30 |
| US20150213271A1 (en) | 2015-07-30 |
| IL237219B (en) | 2018-08-30 |
| CN104769606B (zh) | 2018-01-26 |
| US20140380487A1 (en) | 2014-12-25 |
| US20140053273A1 (en) | 2014-02-20 |
| CA2882136A1 (en) | 2014-02-27 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| IN2015KN00455A (enExample) | ||
| WO2014059136A3 (en) | Techniqued for secure data exchange | |
| EP2613472A4 (en) | Encryption processing system, key generation device, encryption device, decryption device, encryption processing method, and encryption processing program | |
| EP2565862A4 (en) | Encryption processing system, key generation device, encryption device, decryption device, signature processing system, signature device and verification device | |
| GB2509422A (en) | Decryption and encryption of application data | |
| WO2014070134A3 (en) | Quorum-based virtual machine security | |
| WO2009155002A3 (en) | Time of day encryption using tdma timing | |
| PH12015500102A1 (en) | Method, device and system for encrypting and decrypting image | |
| AU2012225621A8 (en) | Secure file sharing method and system | |
| EP2882132A4 (en) | SHARED SECRET KEY GENERATION DEVICE, ENCRYPTION DEVICE, DECRYPTION DEVICE, SHARED SECRET KEY GENERATION METHOD, ENCRYPTION METHOD, DECRYPTION METHOD, AND PROGRAM | |
| EP2667538A4 (en) | Encryption system, encryption processing method for encryption system, encryption device, encryption program, decryption device, decryption program, setup device, setup program, key generation device, key generation program, key assignment device and key assignment program | |
| SG11201708750TA (en) | Network system, and methods of encrypting data, decrypting encrypted data in the same | |
| PL2664098T3 (pl) | Sposoby i układy do dystrybucji danych kryptograficznych do uwierzytelnionych odbiorców | |
| EP2884690A4 (en) | READY KEY GENERATING DEVICE, RECTIFYING DEVICE, ENCRYPTION DEVICE, DECRYPTION DEVICE, AND PROGRAM | |
| GB2528226A (en) | Method performed by at least one server for processing a data packet from a first computing device to a second computing device to permit end-to-end | |
| GB2503164A (en) | Cross enterprise communication | |
| WO2012087692A3 (en) | System and method for secure communications in a communication system | |
| GB2512249A (en) | Secure peer discovery and authentication using a shared secret | |
| GB201101471D0 (en) | A method, module and host | |
| WO2013104837A8 (fr) | Procede de chiffrement protege contre des attaques par canaux auxiliaires | |
| EP2523178A4 (en) | Encryption processing system, key generation device, key devolvement device, encryption device, decoding device, encryption processing method, and encryption processing program | |
| EP2195963A4 (en) | SAFETY MEASURES TO PREVENT UNAUTHORIZED DECISION | |
| WO2014113132A3 (en) | Method for secure symbol comparison | |
| WO2013003642A3 (en) | Secure context-based computing | |
| WO2014164180A3 (en) | Decoy bits method for direct encryption and key generation |