JP2017139811A5 - - Google Patents

Download PDF

Info

Publication number
JP2017139811A5
JP2017139811A5 JP2017092060A JP2017092060A JP2017139811A5 JP 2017139811 A5 JP2017139811 A5 JP 2017139811A5 JP 2017092060 A JP2017092060 A JP 2017092060A JP 2017092060 A JP2017092060 A JP 2017092060A JP 2017139811 A5 JP2017139811 A5 JP 2017139811A5
Authority
JP
Japan
Prior art keywords
trusted
computer resource
key
computer
untrusted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
JP2017092060A
Other languages
English (en)
Japanese (ja)
Other versions
JP2017139811A (ja
JP6525478B2 (ja
Filing date
Publication date
Application filed filed Critical
Publication of JP2017139811A publication Critical patent/JP2017139811A/ja
Publication of JP2017139811A5 publication Critical patent/JP2017139811A5/ja
Application granted granted Critical
Publication of JP6525478B2 publication Critical patent/JP6525478B2/ja
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

JP2017092060A 2011-11-28 2017-05-05 仮想化とクラウド・コンピューティングの安全確保と管理に適用される、 安全未確保のコンピュータ環境で暗号化キーを確保する方法と装置。 Expired - Fee Related JP6525478B2 (ja)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US201161563893P 2011-11-28 2011-11-28
US61/563,893 2011-11-28
US201261603383P 2012-02-27 2012-02-27
US61/603,383 2012-02-27

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
JP2015215323A Division JP6456805B2 (ja) 2011-11-28 2015-10-31 仮想化とクラウド・コンピューティングの安全確保と管理に適用される、安全未確保のコンピュータ環境でキーの安全を確保する方法と装置。

Publications (3)

Publication Number Publication Date
JP2017139811A JP2017139811A (ja) 2017-08-10
JP2017139811A5 true JP2017139811A5 (enExample) 2017-11-02
JP6525478B2 JP6525478B2 (ja) 2019-06-05

Family

ID=48534763

Family Applications (3)

Application Number Title Priority Date Filing Date
JP2014542996A Pending JP2015503280A (ja) 2011-11-28 2012-11-28 仮想化とクラウド・コンピューティングの安全確保と管理に適用される、安全未確保のコンピュータ環境で暗号化キーを確保する方法と装置。
JP2015215323A Expired - Fee Related JP6456805B2 (ja) 2011-11-28 2015-10-31 仮想化とクラウド・コンピューティングの安全確保と管理に適用される、安全未確保のコンピュータ環境でキーの安全を確保する方法と装置。
JP2017092060A Expired - Fee Related JP6525478B2 (ja) 2011-11-28 2017-05-05 仮想化とクラウド・コンピューティングの安全確保と管理に適用される、 安全未確保のコンピュータ環境で暗号化キーを確保する方法と装置。

Family Applications Before (2)

Application Number Title Priority Date Filing Date
JP2014542996A Pending JP2015503280A (ja) 2011-11-28 2012-11-28 仮想化とクラウド・コンピューティングの安全確保と管理に適用される、安全未確保のコンピュータ環境で暗号化キーを確保する方法と装置。
JP2015215323A Expired - Fee Related JP6456805B2 (ja) 2011-11-28 2015-10-31 仮想化とクラウド・コンピューティングの安全確保と管理に適用される、安全未確保のコンピュータ環境でキーの安全を確保する方法と装置。

Country Status (4)

Country Link
US (2) US9380036B2 (enExample)
EP (2) EP3089399B1 (enExample)
JP (3) JP2015503280A (enExample)
WO (1) WO2013080204A1 (enExample)

Families Citing this family (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9203847B2 (en) * 2012-06-26 2015-12-01 At&T Intellectual Property I, L.P. Detection and management of unauthorized use of cloud computing services
CN103347073B (zh) * 2013-07-02 2016-04-27 北京大学 一种云管理行为安全控制方法和系统
US9298942B1 (en) * 2013-12-31 2016-03-29 Google Inc. Encrypted augmentation storage
JP6287282B2 (ja) * 2014-02-04 2018-03-07 日本電気株式会社 情報処理装置及び情報処理方法、情報処理システム、並びにコンピュータ・プログラム
CN106104549A (zh) * 2014-03-07 2016-11-09 诺基亚技术有限公司 用于验证处理的数据的方法和装置
US9660805B2 (en) * 2014-05-14 2017-05-23 Porticor Ltd. Methods and devices for securing keys when key-management processes are subverted by an adversary
WO2015198314A1 (en) * 2014-06-23 2015-12-30 Porticor Ltd. Methods and devices for key management in an as-a-service context
CN105337736B (zh) * 2014-06-30 2018-10-30 华为技术有限公司 全同态消息认证方法、装置及系统
US10333696B2 (en) 2015-01-12 2019-06-25 X-Prime, Inc. Systems and methods for implementing an efficient, scalable homomorphic transformation of encrypted data with minimal data expansion and improved processing efficiency
WO2016182509A1 (en) * 2015-05-13 2016-11-17 Agency For Science, Technology And Research Network system, and methods of encrypting data, decrypting encrypted data in the same
US10110566B2 (en) 2015-07-21 2018-10-23 Baffle, Inc. Systems and processes for executing private programs on untrusted computers
ES2878574T3 (es) 2017-05-30 2021-11-19 Be Invest Int Sa Método general de protección de datos para almacenamiento y uso compartido de datos confidenciales multicéntricos
CN107257381B (zh) * 2017-07-03 2021-03-26 深圳大学 一种隐私保护空间众包的任务分配系统模型及实现方法
US11290263B2 (en) * 2017-08-04 2022-03-29 Sony Corporation Information processing apparatus and information processing method
CN107682379A (zh) * 2017-11-22 2018-02-09 南京汽车集团有限公司 基于同态加密的信息安全传输装置、传输方法及存储方法
US10841080B2 (en) 2018-03-20 2020-11-17 International Business Machines Corporation Oblivious pseudorandom function in a key management system
US10887293B2 (en) 2018-03-20 2021-01-05 International Business Machines Corporation Key identifiers in an obliviousness pseudorandom function (OPRF)-based key management service (KMS)
US10887088B2 (en) * 2018-03-20 2021-01-05 International Business Machines Corporation Virtualizing a key hierarchy using a partially-oblivious pseudorandom function (P-OPRF)
US10826694B2 (en) * 2018-04-23 2020-11-03 International Business Machines Corporation Method for leakage-resilient distributed function evaluation with CPU-enclaves
US10841081B2 (en) * 2018-05-15 2020-11-17 International Business Machines Corporation Threshold oblivious pseudorandom function in a key management system
US11115206B2 (en) 2018-08-23 2021-09-07 International Business Machines Corporation Assymetric structured key recovering using oblivious pseudorandom function
US10924267B2 (en) 2018-08-24 2021-02-16 International Business Machines Corporation Validating keys derived from an oblivious pseudorandom function
US10985912B2 (en) * 2018-10-05 2021-04-20 Intuit Inc. Homomorphic key derivation
US10970378B2 (en) * 2019-05-13 2021-04-06 Cyberark Software Ltd. Secure generation and verification of machine-readable visual codes
US11121882B2 (en) * 2019-07-25 2021-09-14 EMC IP Holding Company LLC Blinding techniques for protection of private keys in message signing based on elliptic curve cryptography
US12236221B2 (en) 2019-10-30 2025-02-25 Red Hat, Inc. Software provisioning agent residing in trusted execution environment
US11520878B2 (en) * 2019-11-26 2022-12-06 Red Hat, Inc. Using a trusted execution environment for a proof-of-work key wrapping scheme that restricts execution based on device capabilities
US11263310B2 (en) * 2019-11-26 2022-03-01 Red Hat, Inc. Using a trusted execution environment for a proof-of-work key wrapping scheme that verifies remote device capabilities
US12099997B1 (en) 2020-01-31 2024-09-24 Steven Mark Hoffberg Tokenized fungible liabilities
US11343069B2 (en) 2020-02-06 2022-05-24 Intuit Inc. Oracle-aided protocol for compact data storage for applications using computations over fully homomorphic encrypted data
US11251944B2 (en) 2020-02-21 2022-02-15 Nutanix, Inc. Secure storage and usage of cryptography keys
US11637817B2 (en) * 2020-03-12 2023-04-25 Springcoin, Inc. Method and apparatus for effecting a data-based activity
CN114338124B (zh) * 2021-12-23 2024-04-12 成都卫士通信息产业股份有限公司 云密码计算服务的管理方法、系统、电子设备及存储介质
US11818260B1 (en) * 2022-12-15 2023-11-14 Intuit Inc. Systems and methods for blocking decryption capabilities in symmetric key encryption

Family Cites Families (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6577734B1 (en) * 1995-10-31 2003-06-10 Lucent Technologies Inc. Data encryption key management system
US5991414A (en) * 1997-09-12 1999-11-23 International Business Machines Corporation Method and apparatus for the secure distributed storage and retrieval of information
US7079653B2 (en) * 1998-02-13 2006-07-18 Tecsec, Inc. Cryptographic key split binding process and apparatus
JP3820777B2 (ja) * 1998-11-12 2006-09-13 富士ゼロックス株式会社 秘密鍵寄託システムおよび方法
US6636968B1 (en) * 1999-03-25 2003-10-21 Koninklijke Philips Electronics N.V. Multi-node encryption and key delivery
CA2304433A1 (en) * 2000-04-05 2001-10-05 Cloakware Corporation General purpose access recovery scheme
US7266687B2 (en) * 2001-02-16 2007-09-04 Motorola, Inc. Method and apparatus for storing and distributing encryption keys
US20030174840A1 (en) * 2002-03-12 2003-09-18 Bogan William B. Encryption method for preventing unauthorized dissemination of protected data
JP4690007B2 (ja) * 2004-01-22 2011-06-01 Kddi株式会社 通信システムおよび通信端末
GB2415064B (en) * 2004-06-10 2008-01-09 Symbian Software Ltd Computing device with a process-based keystore and method for operating a computing device
JP2008504782A (ja) * 2004-06-29 2008-02-14 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ 医療用無線アドホックネットワークノードの効率的な認証システム及び方法
US7472105B2 (en) * 2004-10-19 2008-12-30 Palo Alto Research Center Incorporated System and method for providing private inference control
CA2618135C (en) * 2005-08-09 2014-10-28 Nexsan Technologies Canada Inc. Data archiving system
US8050410B2 (en) * 2006-12-08 2011-11-01 Uti Limited Partnership Distributed encryption methods and systems
JP2010517449A (ja) * 2007-01-26 2010-05-20 セーフネット インコーポレイテッド 信頼できない受信者における秘密の保護
US20080219449A1 (en) * 2007-03-09 2008-09-11 Ball Matthew V Cryptographic key management for stored data
US8213620B1 (en) * 2008-11-17 2012-07-03 Netapp, Inc. Method for managing cryptographic information
US8505084B2 (en) * 2009-04-06 2013-08-06 Microsoft Corporation Data access programming model for occasionally connected applications
CN102428686A (zh) * 2009-05-19 2012-04-25 安全第一公司 用于安全保护云中的数据的系统和方法
ES2541610T3 (es) * 2009-10-29 2015-07-22 Nec Europe Ltd. Procedimiento para soportar un mecanismo de reputación en una red y red
US8468368B2 (en) * 2009-12-29 2013-06-18 Cleversafe, Inc. Data encryption parameter dispersal
US9922063B2 (en) * 2009-12-29 2018-03-20 International Business Machines Corporation Secure storage of secret data in a dispersed storage network
US8625802B2 (en) * 2010-06-16 2014-01-07 Porticor Ltd. Methods, devices, and media for secure key management in a non-secured, distributed, virtualized environment with applications to cloud-computing security and management
US8538029B2 (en) * 2011-03-24 2013-09-17 Hewlett-Packard Development Company, L.P. Encryption key fragment distribution

Similar Documents

Publication Publication Date Title
JP2017139811A5 (enExample)
JP4615601B2 (ja) コンピュータセキュリティシステムおよびコンピュータセキュリティ方法
CN102271037B (zh) 基于在线密钥的密钥保护装置
CN109886040B (zh) 数据处理方法、装置、存储介质及处理器
US9673975B1 (en) Cryptographic key splitting for offline and online data protection
WO2022073264A1 (en) Systems and methods for secure and fast machine learning inference in trusted execution environment
US9602500B2 (en) Secure import and export of keying material
US20180183586A1 (en) Assigning user identity awareness to a cryptographic key
JP2016054501A5 (enExample)
US20140112470A1 (en) Method and system for key generation, backup, and migration based on trusted computing
WO2021073170A1 (zh) 数据提供和融合的方法及装置
EP3732821B1 (en) Secure provisioning of keys
JP7087172B2 (ja) Pqaロック解除
WO2024139273A1 (zh) 联邦学习方法、装置、可读存储介质及电子设备
US20250071101A1 (en) Systems and methods for implementing privacy layer in cbdc networks
CN111191217A (zh) 一种密码管理方法及相关装置
EP3292654B1 (en) A security approach for storing credentials for offline use and copy-protected vault content in devices
US20160335453A1 (en) Managing Data
CN115801232A (zh) 一种私钥保护方法、装置、设备及存储介质
US10516655B1 (en) Encrypted boot volume access in resource-on-demand environments
US11700251B1 (en) Modification of device behavior for use in secure networking
CN106257859A (zh) 一种密码使用方法
US11626982B1 (en) Systems and methods for maintaining confidentiality, integrity, and authenticity of the last secret
JP2024045374A (ja) 排他的自己エスクロー方法及び機器
Ramesh et al. Cha-Cha 20: stream cipher based encryption for cloud data centre