JP2016054501A5 - - Google Patents
Download PDFInfo
- Publication number
- JP2016054501A5 JP2016054501A5 JP2015215323A JP2015215323A JP2016054501A5 JP 2016054501 A5 JP2016054501 A5 JP 2016054501A5 JP 2015215323 A JP2015215323 A JP 2015215323A JP 2015215323 A JP2015215323 A JP 2015215323A JP 2016054501 A5 JP2016054501 A5 JP 2016054501A5
- Authority
- JP
- Japan
- Prior art keywords
- unique
- security key
- key
- unique security
- computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 claims 27
Applications Claiming Priority (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201161563893P | 2011-11-28 | 2011-11-28 | |
| US61/563,893 | 2011-11-28 | ||
| US201261603383P | 2012-02-27 | 2012-02-27 | |
| US61/603,383 | 2012-02-27 |
Related Parent Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2014542996A Division JP2015503280A (ja) | 2011-11-28 | 2012-11-28 | 仮想化とクラウド・コンピューティングの安全確保と管理に適用される、安全未確保のコンピュータ環境で暗号化キーを確保する方法と装置。 |
Related Child Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2017092060A Division JP6525478B2 (ja) | 2011-11-28 | 2017-05-05 | 仮想化とクラウド・コンピューティングの安全確保と管理に適用される、 安全未確保のコンピュータ環境で暗号化キーを確保する方法と装置。 |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| JP2016054501A JP2016054501A (ja) | 2016-04-14 |
| JP2016054501A5 true JP2016054501A5 (enExample) | 2016-06-02 |
| JP6456805B2 JP6456805B2 (ja) | 2019-01-23 |
Family
ID=48534763
Family Applications (3)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2014542996A Pending JP2015503280A (ja) | 2011-11-28 | 2012-11-28 | 仮想化とクラウド・コンピューティングの安全確保と管理に適用される、安全未確保のコンピュータ環境で暗号化キーを確保する方法と装置。 |
| JP2015215323A Expired - Fee Related JP6456805B2 (ja) | 2011-11-28 | 2015-10-31 | 仮想化とクラウド・コンピューティングの安全確保と管理に適用される、安全未確保のコンピュータ環境でキーの安全を確保する方法と装置。 |
| JP2017092060A Expired - Fee Related JP6525478B2 (ja) | 2011-11-28 | 2017-05-05 | 仮想化とクラウド・コンピューティングの安全確保と管理に適用される、 安全未確保のコンピュータ環境で暗号化キーを確保する方法と装置。 |
Family Applications Before (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2014542996A Pending JP2015503280A (ja) | 2011-11-28 | 2012-11-28 | 仮想化とクラウド・コンピューティングの安全確保と管理に適用される、安全未確保のコンピュータ環境で暗号化キーを確保する方法と装置。 |
Family Applications After (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2017092060A Expired - Fee Related JP6525478B2 (ja) | 2011-11-28 | 2017-05-05 | 仮想化とクラウド・コンピューティングの安全確保と管理に適用される、 安全未確保のコンピュータ環境で暗号化キーを確保する方法と装置。 |
Country Status (4)
| Country | Link |
|---|---|
| US (2) | US9380036B2 (enExample) |
| EP (2) | EP2786292B1 (enExample) |
| JP (3) | JP2015503280A (enExample) |
| WO (1) | WO2013080204A1 (enExample) |
Families Citing this family (34)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9203847B2 (en) * | 2012-06-26 | 2015-12-01 | At&T Intellectual Property I, L.P. | Detection and management of unauthorized use of cloud computing services |
| CN103347073B (zh) * | 2013-07-02 | 2016-04-27 | 北京大学 | 一种云管理行为安全控制方法和系统 |
| US9298942B1 (en) * | 2013-12-31 | 2016-03-29 | Google Inc. | Encrypted augmentation storage |
| JP6287282B2 (ja) * | 2014-02-04 | 2018-03-07 | 日本電気株式会社 | 情報処理装置及び情報処理方法、情報処理システム、並びにコンピュータ・プログラム |
| WO2015131394A1 (en) * | 2014-03-07 | 2015-09-11 | Nokia Technologies Oy | Method and apparatus for verifying processed data |
| US9660805B2 (en) * | 2014-05-14 | 2017-05-23 | Porticor Ltd. | Methods and devices for securing keys when key-management processes are subverted by an adversary |
| US9660801B2 (en) | 2014-06-23 | 2017-05-23 | Porticor Ltd. | Methods and devices for key management in an as-a-service context |
| CN105337736B (zh) * | 2014-06-30 | 2018-10-30 | 华为技术有限公司 | 全同态消息认证方法、装置及系统 |
| US10333696B2 (en) | 2015-01-12 | 2019-06-25 | X-Prime, Inc. | Systems and methods for implementing an efficient, scalable homomorphic transformation of encrypted data with minimal data expansion and improved processing efficiency |
| SG11201708750TA (en) * | 2015-05-13 | 2017-11-29 | Agency Science Tech & Res | Network system, and methods of encrypting data, decrypting encrypted data in the same |
| US10110566B2 (en) | 2015-07-21 | 2018-10-23 | Baffle, Inc. | Systems and processes for executing private programs on untrusted computers |
| EP3410630B1 (en) * | 2017-05-30 | 2021-04-21 | BE-Invest International SA | General data protection method for multicentric sensitive data storage and sharing |
| CN107257381B (zh) * | 2017-07-03 | 2021-03-26 | 深圳大学 | 一种隐私保护空间众包的任务分配系统模型及实现方法 |
| US11290263B2 (en) * | 2017-08-04 | 2022-03-29 | Sony Corporation | Information processing apparatus and information processing method |
| CN107682379A (zh) * | 2017-11-22 | 2018-02-09 | 南京汽车集团有限公司 | 基于同态加密的信息安全传输装置、传输方法及存储方法 |
| US10887088B2 (en) * | 2018-03-20 | 2021-01-05 | International Business Machines Corporation | Virtualizing a key hierarchy using a partially-oblivious pseudorandom function (P-OPRF) |
| US10887293B2 (en) | 2018-03-20 | 2021-01-05 | International Business Machines Corporation | Key identifiers in an obliviousness pseudorandom function (OPRF)-based key management service (KMS) |
| US10841080B2 (en) | 2018-03-20 | 2020-11-17 | International Business Machines Corporation | Oblivious pseudorandom function in a key management system |
| US10826694B2 (en) * | 2018-04-23 | 2020-11-03 | International Business Machines Corporation | Method for leakage-resilient distributed function evaluation with CPU-enclaves |
| US10841081B2 (en) * | 2018-05-15 | 2020-11-17 | International Business Machines Corporation | Threshold oblivious pseudorandom function in a key management system |
| US11115206B2 (en) | 2018-08-23 | 2021-09-07 | International Business Machines Corporation | Assymetric structured key recovering using oblivious pseudorandom function |
| US10924267B2 (en) | 2018-08-24 | 2021-02-16 | International Business Machines Corporation | Validating keys derived from an oblivious pseudorandom function |
| US10985912B2 (en) * | 2018-10-05 | 2021-04-20 | Intuit Inc. | Homomorphic key derivation |
| US10970378B2 (en) * | 2019-05-13 | 2021-04-06 | Cyberark Software Ltd. | Secure generation and verification of machine-readable visual codes |
| US11121882B2 (en) * | 2019-07-25 | 2021-09-14 | EMC IP Holding Company LLC | Blinding techniques for protection of private keys in message signing based on elliptic curve cryptography |
| US12236221B2 (en) | 2019-10-30 | 2025-02-25 | Red Hat, Inc. | Software provisioning agent residing in trusted execution environment |
| US11263310B2 (en) * | 2019-11-26 | 2022-03-01 | Red Hat, Inc. | Using a trusted execution environment for a proof-of-work key wrapping scheme that verifies remote device capabilities |
| US11520878B2 (en) * | 2019-11-26 | 2022-12-06 | Red Hat, Inc. | Using a trusted execution environment for a proof-of-work key wrapping scheme that restricts execution based on device capabilities |
| US12099997B1 (en) | 2020-01-31 | 2024-09-24 | Steven Mark Hoffberg | Tokenized fungible liabilities |
| US11343069B2 (en) | 2020-02-06 | 2022-05-24 | Intuit Inc. | Oracle-aided protocol for compact data storage for applications using computations over fully homomorphic encrypted data |
| US11251944B2 (en) | 2020-02-21 | 2022-02-15 | Nutanix, Inc. | Secure storage and usage of cryptography keys |
| US11637817B2 (en) * | 2020-03-12 | 2023-04-25 | Springcoin, Inc. | Method and apparatus for effecting a data-based activity |
| CN114338124B (zh) * | 2021-12-23 | 2024-04-12 | 成都卫士通信息产业股份有限公司 | 云密码计算服务的管理方法、系统、电子设备及存储介质 |
| US11818260B1 (en) * | 2022-12-15 | 2023-11-14 | Intuit Inc. | Systems and methods for blocking decryption capabilities in symmetric key encryption |
Family Cites Families (24)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6577734B1 (en) * | 1995-10-31 | 2003-06-10 | Lucent Technologies Inc. | Data encryption key management system |
| US5991414A (en) * | 1997-09-12 | 1999-11-23 | International Business Machines Corporation | Method and apparatus for the secure distributed storage and retrieval of information |
| US7079653B2 (en) * | 1998-02-13 | 2006-07-18 | Tecsec, Inc. | Cryptographic key split binding process and apparatus |
| JP3820777B2 (ja) * | 1998-11-12 | 2006-09-13 | 富士ゼロックス株式会社 | 秘密鍵寄託システムおよび方法 |
| US6636968B1 (en) * | 1999-03-25 | 2003-10-21 | Koninklijke Philips Electronics N.V. | Multi-node encryption and key delivery |
| CA2304433A1 (en) * | 2000-04-05 | 2001-10-05 | Cloakware Corporation | General purpose access recovery scheme |
| US7266687B2 (en) * | 2001-02-16 | 2007-09-04 | Motorola, Inc. | Method and apparatus for storing and distributing encryption keys |
| US20030174840A1 (en) * | 2002-03-12 | 2003-09-18 | Bogan William B. | Encryption method for preventing unauthorized dissemination of protected data |
| JP4690007B2 (ja) * | 2004-01-22 | 2011-06-01 | Kddi株式会社 | 通信システムおよび通信端末 |
| GB2415064B (en) * | 2004-06-10 | 2008-01-09 | Symbian Software Ltd | Computing device with a process-based keystore and method for operating a computing device |
| CN1977513B (zh) * | 2004-06-29 | 2010-09-01 | 皇家飞利浦电子股份有限公司 | 用于有效认证医疗无线自组网节点的系统和方法 |
| US7472105B2 (en) * | 2004-10-19 | 2008-12-30 | Palo Alto Research Center Incorporated | System and method for providing private inference control |
| WO2007016787A2 (en) * | 2005-08-09 | 2007-02-15 | Nexsan Technologies Canada Inc. | Data archiving system |
| US8050410B2 (en) * | 2006-12-08 | 2011-11-01 | Uti Limited Partnership | Distributed encryption methods and systems |
| JP2010517449A (ja) * | 2007-01-26 | 2010-05-20 | セーフネット インコーポレイテッド | 信頼できない受信者における秘密の保護 |
| US20080219449A1 (en) * | 2007-03-09 | 2008-09-11 | Ball Matthew V | Cryptographic key management for stored data |
| US8213620B1 (en) * | 2008-11-17 | 2012-07-03 | Netapp, Inc. | Method for managing cryptographic information |
| US8505084B2 (en) * | 2009-04-06 | 2013-08-06 | Microsoft Corporation | Data access programming model for occasionally connected applications |
| BRPI1013062A2 (pt) * | 2009-05-19 | 2016-04-05 | Security First Corp | sistemas e métodos para proteger dados na nuvem |
| US9003187B2 (en) * | 2009-10-29 | 2015-04-07 | Nec Europe Ltd. | Method for supporting a reputation mechanism in a network and network |
| US9922063B2 (en) * | 2009-12-29 | 2018-03-20 | International Business Machines Corporation | Secure storage of secret data in a dispersed storage network |
| US8468368B2 (en) * | 2009-12-29 | 2013-06-18 | Cleversafe, Inc. | Data encryption parameter dispersal |
| US8625802B2 (en) * | 2010-06-16 | 2014-01-07 | Porticor Ltd. | Methods, devices, and media for secure key management in a non-secured, distributed, virtualized environment with applications to cloud-computing security and management |
| US8538029B2 (en) * | 2011-03-24 | 2013-09-17 | Hewlett-Packard Development Company, L.P. | Encryption key fragment distribution |
-
2012
- 2012-11-28 EP EP12853199.3A patent/EP2786292B1/en not_active Not-in-force
- 2012-11-28 WO PCT/IL2012/050483 patent/WO2013080204A1/en not_active Ceased
- 2012-11-28 US US13/820,815 patent/US9380036B2/en active Active
- 2012-11-28 EP EP16167836.2A patent/EP3089399B1/en active Active
- 2012-11-28 JP JP2014542996A patent/JP2015503280A/ja active Pending
-
2013
- 2013-05-09 US US13/890,274 patent/US9380037B2/en active Active
-
2015
- 2015-10-31 JP JP2015215323A patent/JP6456805B2/ja not_active Expired - Fee Related
-
2017
- 2017-05-05 JP JP2017092060A patent/JP6525478B2/ja not_active Expired - Fee Related
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP2016054501A5 (enExample) | ||
| JP2017139811A5 (enExample) | ||
| CN108768978B (zh) | 一种基于sgx的远端存储服务方法及系统 | |
| US8462955B2 (en) | Key protectors based on online keys | |
| US9652631B2 (en) | Secure transport of encrypted virtual machines with continuous owner access | |
| US9673975B1 (en) | Cryptographic key splitting for offline and online data protection | |
| US9367701B2 (en) | Systems and methods for maintaining integrity and secrecy in untrusted computing platforms | |
| TWI724555B (zh) | 金鑰管理方法、安全晶片、業務伺服器及資訊系統 | |
| CN102760214B (zh) | 一种新型的软件版权保护方法及装置 | |
| Patel et al. | Integrated ECC and Blowfish for smartphone security | |
| CN103797489A (zh) | 用于安全地将程序执行绑定到且节点锁定到受信任的签名授权机构的系统和方法 | |
| CN101359991A (zh) | 基于标识的公钥密码体制私钥托管系统 | |
| CN110889696A (zh) | 一种基于sgx技术的联盟区块链秘钥存储方法、装置、设备及介质 | |
| TWI597960B (zh) | 金鑰分裂技術 | |
| CN103580855A (zh) | 一种基于共享技术的UsbKey秘钥管理方案 | |
| WO2013097209A1 (zh) | 一种加密方法、解密方法和相关装置及系统 | |
| EP3292654B1 (en) | A security approach for storing credentials for offline use and copy-protected vault content in devices | |
| US11683159B2 (en) | Hybrid content protection architecture | |
| CN114513302A (zh) | 一种数据加解密方法及设备 | |
| Reddy et al. | Cloud security using blowfish and key management encryption algorithm | |
| CN109891823B (zh) | 用于凭证加密的方法、系统以及非暂态计算机可读介质 | |
| Jayalekshmi et al. | A study of data storage security issues in cloud computing | |
| CN109446793B (zh) | 一种基于Windows agent的账户改密方法及装置 | |
| US9245097B2 (en) | Systems and methods for locking an application to device without storing device information on server | |
| CN115809459B (zh) | 软件密码模块的数据保护及解密方法、系统、设备及介质 |