JP2018137802A - 鍵を有するリソースロケーター - Google Patents
鍵を有するリソースロケーター Download PDFInfo
- Publication number
- JP2018137802A JP2018137802A JP2018078782A JP2018078782A JP2018137802A JP 2018137802 A JP2018137802 A JP 2018137802A JP 2018078782 A JP2018078782 A JP 2018078782A JP 2018078782 A JP2018078782 A JP 2018078782A JP 2018137802 A JP2018137802 A JP 2018137802A
- Authority
- JP
- Japan
- Prior art keywords
- request
- url
- service provider
- customer
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/108—Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/168—Implementing security features at a particular protocol layer above the transport layer
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
Abstract
【解決手段】要求を満たす際に使用する暗号化鍵を含めるために、要求を予め生成する。要求は、ユニフォームリソースロケータの中に符号化され、また、要求が提出されるサービスプロバイダが、要求が認可されたかどうかを判定するための、認証情報を含む。要求は、種々のエンティティに渡される。次いで、エンティティは、該要求をサービスプロバイダに提出する。サービスプロバイダは、要求を受け取ると、認証情報を検証し、要求の中に符号化された暗号化鍵を使用して要求を満たす。
【選択図】図1
Description
本出願は、完全な開示である、2013年9月25日に出願された米国特許第14,037,282号、名称「RESOURCE LOCATORS WITH KEYS」、及び2013年9月25日に出願された米国特許出願第14/037,292号、名称「DATA SECURITY USING REQUEST−SUPPLIED KEYS」を、全ての目的に対して参照により組み込む。
コンピュータで実現される方法であって、
実行可能命令とともに構成される1つまたは複数のコンピュータシステムの制御下で、
要求を受け取る前に前記1つまたは複数のコンピュータシステムによるアクセスが存在しない暗号化鍵を使用して、要求側から、1つまたは複数の動作を行う該要求を受け取ることであって、該要求は、ユニフォームリソースロケータを含み、該ユニフォームリソースロケータは、
前記1つまたは複数の動作を示し、
前記ユニフォームリソースロケータの一部分及び前記要求側がアクセスできない秘密情報に少なくとも部分的に基づいて、第1のエンティティによって生成される電子署名を含み、また、前記暗号化鍵を含む、受け取ることと、
電子署名が有効であるかどうか判定を行うことと、
この判定が、前記電子署名が有効であることを示すということを条件として、前記示された1つまたは複数の動作をデータに対して行って、前記1つまたは複数の動作の結果を生成するために、前記要求からの前記暗号化鍵を使用することと、
前記要求に従って前記1つまたは複数の動作の前記結果を提供することと、
前記示された1つまたは複数の動作を前記データに対して行うために、前記要求からの前記暗号化鍵を使用した後に、前記暗号化鍵へのアクセスを失わせるための1つまたは複数の動作を行うことと、を含む、コンピュータで実現される方法。
前記ユニフォームリソースロケータはさらに、前記データを識別する経路を符合化し、
前記示された1つまたは複数の動作を行うために前記暗号化鍵を使用することは、前記データにアクセスする前記符合化された経路を使用することを含む、付記1に記載のコンピュータで実現される方法。
前記データの少なくともいくつかは、前記要求において前記要求側によって供給される、付記1〜2に記載のコンピュータで実現される方法。
前記ユニフォームリソースロケータの前記一部分は、有効期限を示し、
前記示された1つまたは複数の動作を行うために前記暗号化鍵を使用することは、前記有効期限の前に前記要求を受け取ることをさらなる条件として行われる、付記1〜3のいずれか1つに記載のコンピュータで実現される方法。
前記要求を受け取ることは、サービスプロバイダによって行われ、
前記第1のエンティティは、前記サービスプロバイダの顧客であり、
前記要求側は、前記サービスプロバイダの顧客でない、付記1〜4のいずれか1つに記載のコンピュータで実現される方法。
前記示された1つまたは複数の動作を行うために前記暗号化鍵を使用することは、前記第1のエンティティによって構成される1つまたは複数のポリシーを前記要求が遵守することをさらなる条件として行われる、付記1〜5のいずれか1つに記載のコンピュータで実現される方法。
前記要求は、前記要求を生成するために前記第1のエンティティによって生成される最初のユニフォームリソースロケータに加えられる情報を含み、
前記示された1つまたは複数の動作を行うために前記暗号化鍵を前記使用することは、前記最初のユニフォームリソースロケータに加えられる前記情報に少なくとも部分的に基づく、付記1〜6のいずれか1つに記載のコンピュータで実現される方法。
前記ユニフォームリソースロケータは、暗号化された形態の前記暗号化鍵を含み、
前記方法はさらに、前記示された1つまたは複数の動作を行うために前記暗号化鍵を使用する前に、暗号化された形態の前記暗号化鍵を解読することを含む、付記1〜7のいずれか1つに記載のコンピュータで実現される方法。
システムであって、
1つまたは複数のプロセッサと、
命令を含むメモリと、を備え、該命令は、前記1つまたは複数のプロセッサによって実行されたときに、前記システムに、
要求側からの要求を受け取らせることであって、該要求は、第1のエンティティによって生成された認可情報及び暗号化鍵を含む予め生成された一部分を含む、受け取らせることと、
前記認可情報が、前記要求を満たすために前記第1のエンティティによって認可を示すと判定されることを条件として、前記暗号化鍵を使用して1つまたは複数の動作を行わせることと、
前記行った1つまたは複数の動作の結果を提供させることと、を行わせる、システム。
前記予め生成された一部分は、ユニフォームリソースロケータとしてフォーマットされる、付記9に記載のシステム。
前記1つまたは複数の動作は、暗号化された形態で前記第1のエンティティによって記憶されるデータにアクセスし、前記暗号化鍵を使用して前記データを解読することを含み、
前記結果を提供することは、前記要求側に前記解読したデータを伝送することを含む、付記9〜10に記載のシステム。
前記要求はさらに、前記予め生成された一部分に加えられたデータを含み、
前記暗号化鍵を使用して前記1つまたは複数の動作を行うことは、前記予め生成された一部分に加えられた前記データに対して1つまたは複数の暗号化動作を行うことを含む、付記9〜11に記載のシステム。
前記認可情報は、前記要求側がアクセスできない秘密情報を使用して生成される電子署名を含む、付記9〜12に記載のシステム。
前記認可情報は、前記要求を提出するためのコンテキストに対して1つまたは複数の条件を指定し、
前記暗号化鍵を使用して1つまたは複数の動作を行うことはさらに、前記1つまたは複数の条件を遵守して前記要求を受け取ることを条件として行われる、付記9〜13に記載のシステム。
前記1つまたは複数の条件は、前記要求を満たすことができる継続時間を定義する、付記9〜14に記載のシステム。
前記認可情報は、前記暗号化鍵に少なくとも部分的に基づいて生成される電子署名を含み、
前記第1のエンティティによる認可を示す前記認可情報は、前記電子署名が有効であることを必要とする、付記9〜15に記載のシステム。
前記システムはさらに、前記要求側と、前記要求側と異なる顧客システムとを備え、
前記顧客システムは、前記要求を提出する際に使用するための前記要求の表現を提供し、それによって、前記要求を前記要求側から受け取ることを可能にする、付記9〜16に記載のシステム。
そこに記憶される命令を有する非一時的なコンピュータ読み出し可能な記憶媒体であって、該命令は、コンピュータシステムの1つまたは複数のプロセッサによって実行されたときに、該コンピュータシステムに、
要求及び暗号化鍵を符号化する情報を生成することと、
前記要求を満たすことができるサービスプロバイダによって検証できる情報の電子署名を生成することと、
前記情報及び電子署名を前記サービスプロバイダに提供することを可能にして、前記サービスプロバイダに前記暗号化鍵を使用させて前記要求を満たすために、前記情報及び前記電子署名を利用できるようにすることと、を行わせる、非一時的なコンピュータ読み出し可能な記憶媒体。
前記情報及び前記電子署名を利用できるようにすることは、前記情報及び前記電子署名を含むユニフォームリソースロケータを生成することを含む、付記18に記載の非一時的なコンピュータ読み出し可能な記憶媒体。
前記情報及び前記電子署名を利用できるようにすることは、選択可能な要素とともに構成されるウェブページを提供することを含み、該要素は、選択されたときに、前記情報及び電子署名を含む前記要求を前記サービスプロバイダに伝送させる、付記18〜19に記載の非一時的なコンピュータ読み出し可能な記憶媒体。
前記ウェブページを提供することは、前記ウェブページを、前記サービスプロバイダと異なるサードパーティに提供することを含む、付記19〜20に記載の非一時的なコンピュータ読み出し可能な記憶媒体。
前記情報はさらに、前記サービスプロバイダによってホストされるリソースの識別子を符合化し、
前記要求は、前記リソースと関連して行われる1つまたは複数の動作を指定する、付記18〜21に記載の非一時的なコンピュータ読み出し可能な記憶媒体。
前記情報は、プレーンテキストの形態で前記暗号化鍵を符合化する、付記18〜22に記載の非一時的なコンピュータ読み出し可能な記憶媒体。
前記情報は、前記要求を前記サービスプロバイダによって満たすことができるようにするための、前記要求の提出に対する1つまたは複数の条件を符号化する、付記18〜23に記載の非一時的なコンピュータ読み出し可能な記憶媒体。
Claims (1)
- システムであって、
1つまたは複数のプロセッサと、
命令を含むメモリと、を備え、該命令は、前記1つまたは複数のプロセッサによって実行されたときに、前記システムに、
要求側からの要求を受け取らせることであって、前記要求は、第1のエンティティによって生成された認可情報及び暗号化鍵を含む予め生成された一部分を含む、受け取らせることと、
前記認可情報が、前記要求を満たすために前記第1のエンティティによって認可を示すと判定されることを条件として、前記暗号化鍵を使用して1つまたは複数の動作を行わせることと、
前記行った1つまたは複数の動作の結果を提供させることと、を行わせる、
システム。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/037,282 US9237019B2 (en) | 2013-09-25 | 2013-09-25 | Resource locators with keys |
US14/037,282 | 2013-09-25 |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2016542890A Division JP2016530850A (ja) | 2013-09-25 | 2014-09-23 | 鍵を有するリソースロケーター |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2020126140A Division JP7175550B2 (ja) | 2013-09-25 | 2020-07-27 | 鍵を有するリソースロケーター |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2018137802A true JP2018137802A (ja) | 2018-08-30 |
JP7007985B2 JP7007985B2 (ja) | 2022-01-25 |
Family
ID=52692100
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2016542890A Pending JP2016530850A (ja) | 2013-09-25 | 2014-09-23 | 鍵を有するリソースロケーター |
JP2018078782A Active JP7007985B2 (ja) | 2013-09-25 | 2018-04-17 | 鍵を有するリソースロケーター |
JP2020126140A Active JP7175550B2 (ja) | 2013-09-25 | 2020-07-27 | 鍵を有するリソースロケーター |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2016542890A Pending JP2016530850A (ja) | 2013-09-25 | 2014-09-23 | 鍵を有するリソースロケーター |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2020126140A Active JP7175550B2 (ja) | 2013-09-25 | 2020-07-27 | 鍵を有するリソースロケーター |
Country Status (6)
Country | Link |
---|---|
US (5) | US9237019B2 (ja) |
EP (3) | EP4040718B1 (ja) |
JP (3) | JP2016530850A (ja) |
CN (2) | CN105612716B (ja) |
CA (2) | CA2923437C (ja) |
WO (1) | WO2015048039A1 (ja) |
Families Citing this family (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9237019B2 (en) | 2013-09-25 | 2016-01-12 | Amazon Technologies, Inc. | Resource locators with keys |
US9942229B2 (en) * | 2014-10-03 | 2018-04-10 | Gopro, Inc. | Authenticating a limited input device via an authenticated application |
US9819648B1 (en) | 2014-10-21 | 2017-11-14 | Amazon Technologies, Inc. | Secure content delivery |
CN105991563B (zh) * | 2015-02-05 | 2020-07-03 | 阿里巴巴集团控股有限公司 | 一种保护敏感数据安全的方法、装置及三方服务系统 |
WO2016205733A1 (en) * | 2015-06-19 | 2016-12-22 | Huawei Technologies Co., Ltd. | Template uniform resource locator signing |
WO2017176437A1 (en) * | 2016-04-05 | 2017-10-12 | Carrier Corporation | Credential licensing service |
FR3054056B1 (fr) * | 2016-07-13 | 2018-06-29 | Safran Identity & Security | Procede de mise en relation securisee d'un premier dispositif avec un deuxieme dispositif |
JP6635323B2 (ja) | 2016-12-15 | 2020-01-22 | 日本電気株式会社 | アクセストークンシステム、情報処理装置、情報処理方法および情報処理プログラム |
JP6740545B2 (ja) | 2017-05-30 | 2020-08-19 | 日本電気株式会社 | 情報処理装置、検証装置、情報処理システム、情報処理方法、及び、プログラム |
US10791120B2 (en) * | 2017-08-30 | 2020-09-29 | Lenovo Enterprise Solutions (Singapore) Pte. Ltd. | System and method for providing access to secured data via a push notification |
CN109962888A (zh) * | 2017-12-22 | 2019-07-02 | 航天信息股份有限公司 | 一种防篡改业务访问方法、客户端以及服务器 |
US11601402B1 (en) * | 2018-05-03 | 2023-03-07 | Cyber Ip Holdings, Llc | Secure communications to multiple devices and multiple parties using physical and virtual key storage |
US10289836B1 (en) | 2018-05-18 | 2019-05-14 | Securitymetrics, Inc. | Webpage integrity monitoring |
US11368477B2 (en) | 2019-05-13 | 2022-06-21 | Securitymetrics, Inc. | Webpage integrity monitoring |
US11356485B2 (en) | 2019-06-28 | 2022-06-07 | International Business Machines Corporation | Pre-signed URLs with custom policies for data access in an object storage system |
US20220376933A1 (en) * | 2019-09-25 | 2022-11-24 | Commonwealth Scientific And Industrial Research Organisation | Cryptographic services for browser applications |
CA3112673A1 (en) | 2020-03-20 | 2021-09-20 | Tactika.Com Inc. | System and method for securing access to network assets |
US11258608B1 (en) * | 2021-05-21 | 2022-02-22 | Contentful GmbH | Systems for secure access to protected content in a content management system |
US20230232220A1 (en) * | 2022-01-20 | 2023-07-20 | Verizon Patent And Licensing Inc. | Systems and methods for a quantum proxy server handover mechanism |
US20230237245A1 (en) * | 2022-01-21 | 2023-07-27 | Docusign, Inc. | Identification of document access by a message scanning system |
US11695772B1 (en) * | 2022-05-03 | 2023-07-04 | Capital One Services, Llc | System and method for enabling multiple auxiliary use of an access token of a user by another entity to facilitate an action of the user |
US20240171627A1 (en) * | 2022-11-17 | 2024-05-23 | Vizio, Inc. | Systems and methods for communicating between a mobile device and a smart television |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020083178A1 (en) * | 2000-08-11 | 2002-06-27 | Brothers John David West | Resource distribution in network environment |
JP2002190795A (ja) * | 2000-12-20 | 2002-07-05 | Hitachi Ltd | 情報端末及び情報端末システム |
JP2003242124A (ja) * | 2002-02-15 | 2003-08-29 | Mitsubishi Electric Corp | コンテンツ管理システムおよびコンテンツ管理方法 |
JP2006128873A (ja) * | 2004-10-27 | 2006-05-18 | Matsushita Electric Ind Co Ltd | Url認証システム及びurl認証方法 |
US20130247218A1 (en) * | 2010-12-09 | 2013-09-19 | Qryptal Pte Ltd | System And Method For Verifying Authenticity Of Documents |
Family Cites Families (241)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5200999A (en) | 1991-09-27 | 1993-04-06 | International Business Machines Corporation | Public key cryptosystem key management based on control vectors |
US5179591A (en) | 1991-10-16 | 1993-01-12 | Motorola, Inc. | Method for algorithm independent cryptographic key management |
US5418854A (en) | 1992-04-28 | 1995-05-23 | Digital Equipment Corporation | Method and apparatus for protecting the confidentiality of passwords in a distributed data processing system |
US6021202A (en) | 1996-12-20 | 2000-02-01 | Financial Services Technology Consortium | Method and system for processing electronic documents |
US6272631B1 (en) | 1997-06-30 | 2001-08-07 | Microsoft Corporation | Protected storage of core data secrets |
US6279110B1 (en) | 1997-11-10 | 2001-08-21 | Certicom Corporation | Masked digital signatures |
US6185316B1 (en) | 1997-11-12 | 2001-02-06 | Unisys Corporation | Self-authentication apparatus and method |
US6097817A (en) | 1997-12-10 | 2000-08-01 | Omnipoint Corporation | Encryption and decryption in communication system with wireless trunk |
US6453416B1 (en) | 1997-12-19 | 2002-09-17 | Koninklijke Philips Electronics N.V. | Secure proxy signing device and method of use |
US6084969A (en) | 1997-12-31 | 2000-07-04 | V-One Corporation | Key encryption system and method, pager unit, and pager proxy for a two-way alphanumeric pager network |
US6754820B1 (en) | 2001-01-30 | 2004-06-22 | Tecsec, Inc. | Multiple level access system |
EP0940960A1 (en) * | 1998-03-02 | 1999-09-08 | Hewlett-Packard Company | Authentication between servers |
US6760711B1 (en) | 1999-01-11 | 2004-07-06 | Microsoft Corporation | Merchant owned, ISP-hosted online stores with secure data store |
US6985583B1 (en) | 1999-05-04 | 2006-01-10 | Rsa Security Inc. | System and method for authentication seed distribution |
AU6640500A (en) | 1999-08-13 | 2001-03-19 | Microsoft Corporation | Methods and systems of protecting digital content |
US7343351B1 (en) | 1999-08-31 | 2008-03-11 | American Express Travel Related Services Company, Inc. | Methods and apparatus for conducting electronic transactions |
US7085931B1 (en) | 1999-09-03 | 2006-08-01 | Secure Computing Corporation | Virtual smart card system and method |
JP2001202452A (ja) | 2000-01-21 | 2001-07-27 | Nippon Telegr & Teleph Corp <Ntt> | ディジタルコンテンツ配布方法、その装置およびそのプログラム記録媒体 |
JP4622064B2 (ja) | 2000-04-06 | 2011-02-02 | ソニー株式会社 | 情報記録装置、情報再生装置、情報記録方法、情報再生方法、および情報記録媒体、並びにプログラム提供媒体 |
US6826686B1 (en) | 2000-04-14 | 2004-11-30 | International Business Machines Corporation | Method and apparatus for secure password transmission and password changes |
US7512965B1 (en) | 2000-04-19 | 2009-03-31 | Hewlett-Packard Development Company, L.P. | Computer system security service |
US7757271B2 (en) | 2000-04-19 | 2010-07-13 | Hewlett-Packard Development Company, L.P. | Computer system security service |
US20020016840A1 (en) | 2000-05-12 | 2002-02-07 | Shai Herzog | Applying recursive policy for scoping of administration of policy based networking |
AU6816101A (en) | 2000-06-05 | 2001-12-17 | Phoenix Tech Ltd | Systems, methods and software for remote password authentication using multiple servers |
JP2001356952A (ja) | 2000-06-14 | 2001-12-26 | Do It Inc | データ暗号化方法及びシステム |
US20020194483A1 (en) | 2001-02-25 | 2002-12-19 | Storymail, Inc. | System and method for authorization of access to a resource |
US20030041110A1 (en) | 2000-07-28 | 2003-02-27 | Storymail, Inc. | System, Method and Structure for generating and using a compressed digital certificate |
WO2002013435A1 (en) | 2000-08-04 | 2002-02-14 | First Data Corporation | Method and system for using electronic communications for an electronic contact |
US7010689B1 (en) | 2000-08-21 | 2006-03-07 | International Business Machines Corporation | Secure data storage and retrieval in a client-server environment |
US7308431B2 (en) | 2000-09-11 | 2007-12-11 | Nokia Corporation | System and method of secure authentication and billing for goods and services using a cellular telecommunication and an authorization infrastructure |
US7689832B2 (en) | 2000-09-11 | 2010-03-30 | Sentrycom Ltd. | Biometric-based system and method for enabling authentication of electronic messages sent over a network |
US6959394B1 (en) | 2000-09-29 | 2005-10-25 | Intel Corporation | Splitting knowledge of a password |
US20020112181A1 (en) | 2000-12-12 | 2002-08-15 | Smith Mark Elwin | Multilevel secure network access system |
JP2002278839A (ja) | 2001-03-15 | 2002-09-27 | Sony Corp | データアクセス管理システム、メモリ搭載デバイス、およびデータアクセス管理方法、並びにプログラム記憶媒体 |
AU2002252405A1 (en) | 2001-03-19 | 2002-10-03 | Accenture Llp | Mobile valet |
US20020162019A1 (en) | 2001-04-25 | 2002-10-31 | Berry Michael C. | Method and system for managing access to services |
US20020161998A1 (en) | 2001-04-27 | 2002-10-31 | International Business Machines Corporation | Method and system for providing hardware cryptography functionality to a data processing system lacking cryptography hardware |
WO2003003321A2 (en) | 2001-06-26 | 2003-01-09 | Enterprises Solutions, Inc. | Transaction verification system and method |
EP1278112B1 (en) * | 2001-07-12 | 2003-05-28 | Castify Networks SA | A process for providing access of a client to a content provider server under control of a resource locator server |
US7610390B2 (en) | 2001-12-04 | 2009-10-27 | Sun Microsystems, Inc. | Distributed network identity |
KR100458516B1 (ko) * | 2001-12-28 | 2004-12-03 | 한국전자통신연구원 | 웹-리소스 불법 변경 감지 장치 및 그 방법 |
US7073195B2 (en) | 2002-01-28 | 2006-07-04 | Intel Corporation | Controlled access to credential information of delegators in delegation relationships |
US20040158734A1 (en) | 2002-02-01 | 2004-08-12 | Larsen Vincent Alan | System and method for process-based security in a portable electronic device |
US7249379B2 (en) | 2002-02-01 | 2007-07-24 | Systems Advisory Group Enterprises, Inc. | Method and apparatus for implementing process-based security in a computer system |
US7228417B2 (en) | 2002-02-26 | 2007-06-05 | America Online, Inc. | Simple secure login with multiple-authentication providers |
US6971017B2 (en) * | 2002-04-16 | 2005-11-29 | Xerox Corporation | Ad hoc secure access to documents and services |
US7523490B2 (en) * | 2002-05-15 | 2009-04-21 | Microsoft Corporation | Session key security protocol |
US7174021B2 (en) | 2002-06-28 | 2007-02-06 | Microsoft Corporation | Systems and methods for providing secure server key operations |
US7546633B2 (en) | 2002-10-25 | 2009-06-09 | Microsoft Corporation | Role-based authorization management framework |
US20040088260A1 (en) | 2002-10-31 | 2004-05-06 | Foster Ward Scott | Secure user authentication |
US7360096B2 (en) * | 2002-11-20 | 2008-04-15 | Microsoft Corporation | Securely processing client credentials used for Web-based access to resources |
WO2004051585A2 (en) | 2002-11-27 | 2004-06-17 | Rsa Security Inc | Identity authentication system and method |
JP4226309B2 (ja) | 2002-12-11 | 2009-02-18 | 日本放送協会 | 利用者証明書発行サーバ及びそのプログラム、利用者認証サーバ及びそのプログラム、並びに、コンテンツ取得認証装置及びそのプログラム |
US7319757B2 (en) | 2003-01-02 | 2008-01-15 | Intel Corporation | Wireless communication device and method for over-the-air application service |
US20040143733A1 (en) | 2003-01-16 | 2004-07-22 | Cloverleaf Communication Co. | Secure network data storage mediator |
JP2004242124A (ja) | 2003-02-07 | 2004-08-26 | Konica Minolta Holdings Inc | 画像処理システム、画像処理装置及び画像処理方法並びに画像処理プログラム |
US7320076B2 (en) | 2003-03-05 | 2008-01-15 | Sun Microsystems, Inc. | Method and apparatus for a transaction-based secure storage file system |
WO2004091170A2 (en) | 2003-03-31 | 2004-10-21 | Visa U.S.A. Inc. | Method and system for secure authentication |
US20040221174A1 (en) | 2003-04-29 | 2004-11-04 | Eric Le Saint | Uniform modular framework for a host computer system |
US20070186102A1 (en) | 2003-05-06 | 2007-08-09 | Ng Raymond K | Method and apparatus for facilitating fine-grain permission management |
US7711097B2 (en) | 2003-07-09 | 2010-05-04 | Fujitsu Limited | Pay-per-connection scheme for wireless access to internet |
DE602004005219T2 (de) | 2003-08-13 | 2007-06-28 | Thomson Licensing | Verfahren und einrichtung zur sicherung der inhaltsablieferung über ein kommunikationsnetz über inhaltsschlüssel |
CN100432889C (zh) | 2003-09-12 | 2008-11-12 | Rsa安全公司 | 提供断开鉴别的系统和方法 |
US20050065935A1 (en) | 2003-09-16 | 2005-03-24 | Chebolu Anil Kumar | Client comparison of network content with server-based categorization |
US8453196B2 (en) | 2003-10-14 | 2013-05-28 | Salesforce.Com, Inc. | Policy management in an interoperability network |
TWI240530B (en) | 2003-12-11 | 2005-09-21 | Inst Information Industry | Dynamic delegation method, storage medium and device using the same |
US7434050B2 (en) | 2003-12-11 | 2008-10-07 | International Business Machines Corporation | Efficient method for providing secure remote access |
JP2005197912A (ja) | 2004-01-06 | 2005-07-21 | Nippon Telegr & Teleph Corp <Ntt> | 情報開示制御方法、情報開示制御プログラム、ならびに、耐タンパ装置 |
US7636941B2 (en) | 2004-03-10 | 2009-12-22 | Microsoft Corporation | Cross-domain authentication |
US8522039B2 (en) | 2004-06-09 | 2013-08-27 | Apple Inc. | Method and apparatus for establishing a federated identity using a personal wireless device |
JP2006028873A (ja) | 2004-07-15 | 2006-02-02 | Hitachi Constr Mach Co Ltd | 建設機械の吸気装置 |
WO2006026737A2 (en) | 2004-08-31 | 2006-03-09 | Ntt Docomo Inc. | Revocation of cryptographic digital certificates |
US20060047662A1 (en) * | 2004-08-31 | 2006-03-02 | Rajkishore Barik | Capability support for web transactions |
GB0419479D0 (en) | 2004-09-02 | 2004-10-06 | Cryptomathic Ltd | Data certification methods and apparatus |
KR100645512B1 (ko) | 2004-09-30 | 2006-11-15 | 삼성전자주식회사 | 통신 시스템에서 네트워크 접속에 대한 사용자 인증 장치및 그 방법 |
US8181219B2 (en) | 2004-10-01 | 2012-05-15 | Microsoft Corporation | Access authorization having embedded policies |
US20060130100A1 (en) | 2004-10-12 | 2006-06-15 | Pentland Joseph D | Methods and apparatus for remotely displaying and distributing advertising and emergency information |
US7251476B2 (en) | 2004-11-01 | 2007-07-31 | Xcellasave, Inc. | Method for advertising on digital cellular telephones and reducing costs to the end user |
US7251478B2 (en) | 2004-11-01 | 2007-07-31 | Xcellasave, Inc. | Method for advertising on digital cellular telephones and reducing costs to the end user |
BRPI0517606A (pt) | 2004-11-09 | 2008-10-14 | Mobile Phone Applic Inc | sistema e método para provimento de conteúdo para um dispositivo de comunicação móvel |
US7886155B2 (en) | 2004-12-20 | 2011-02-08 | Biogy, Inc. | System for generating requests to a passcode protected entity |
US7734051B2 (en) | 2004-11-30 | 2010-06-08 | Novell, Inc. | Key distribution |
KR101202671B1 (ko) | 2004-12-28 | 2012-11-19 | 텔레콤 이탈리아 소시에떼 퍼 아찌오니 | 사용자가 가입자 단말에서 단말 장치에 원격으로 접속할 수있게 하기 위한 원격 접속 시스템 및 방법 |
US20060149677A1 (en) | 2005-01-06 | 2006-07-06 | Microsoft Corporation | Contextual ad processing on local machine |
JP4548737B2 (ja) | 2005-01-24 | 2010-09-22 | パナソニック株式会社 | 署名生成装置及び署名検証装置 |
US20060174125A1 (en) | 2005-01-31 | 2006-08-03 | Brookner George M | Multiple cryptographic key security device |
US20060190331A1 (en) | 2005-02-04 | 2006-08-24 | Preston Tollinger | Delivering targeted advertising to mobile devices |
KR100750214B1 (ko) * | 2005-02-15 | 2007-08-17 | 권도균 | 공인 인증서를 이용한 로그인 방법 |
JP4790731B2 (ja) | 2005-02-18 | 2011-10-12 | イーエムシー コーポレイション | 派生シード |
US7478419B2 (en) | 2005-03-09 | 2009-01-13 | Sun Microsystems, Inc. | Automated policy constraint matching for computing resources |
US7770206B2 (en) | 2005-03-11 | 2010-08-03 | Microsoft Corporation | Delegating right to access resource or the like in access management system |
JP2006258458A (ja) | 2005-03-15 | 2006-09-28 | Sumitomo Bakelite Co Ltd | 医療材料用高分子化合物及び該高分子化合物を用いたバイオチップ用基板 |
US7784092B2 (en) | 2005-03-25 | 2010-08-24 | AT&T Intellectual I, L.P. | System and method of locating identity providers in a data network |
EP1902401B1 (en) | 2005-05-13 | 2017-03-29 | CryptoMill Inc. | Content cryptographic firewall system |
JP2008541247A (ja) | 2005-05-13 | 2008-11-20 | クリプトミル テクノロジーズ リミティド | モバイルストレージ手段の暗号化制御 |
FI20050562A0 (fi) | 2005-05-26 | 2005-05-26 | Nokia Corp | Menetelmä avainmateriaalin tuottamiseksi |
US20060282878A1 (en) | 2005-06-14 | 2006-12-14 | Stanley James C | Expression of packet processing policies using file processing rules |
US7685430B1 (en) | 2005-06-17 | 2010-03-23 | Sun Microsystems, Inc. | Initial password security accentuated by triple encryption and hashed cache table management on the hosted site's server |
US7836306B2 (en) | 2005-06-29 | 2010-11-16 | Microsoft Corporation | Establishing secure mutual trust using an insecure password |
US20070037552A1 (en) | 2005-08-11 | 2007-02-15 | Timothy Lee | Method and system for performing two factor mutual authentication |
JP2007053658A (ja) | 2005-08-19 | 2007-03-01 | Nec Corp | 問い合わせ対応システム、端末、サーバ及びプログラム |
US8194859B2 (en) | 2005-09-01 | 2012-06-05 | Qualcomm Incorporated | Efficient key hierarchy for delivery of multimedia content |
US20070061885A1 (en) | 2005-09-09 | 2007-03-15 | Hammes Peter C | System and method for managing security testing |
US7721322B2 (en) | 2005-11-22 | 2010-05-18 | Oracle International Corporation | Enterprise service-to-service trust framework |
KR100825736B1 (ko) * | 2005-12-07 | 2008-04-29 | 한국전자통신연구원 | 무선 xml 전자 서명 서비스 제공 장치 및 그 방법 |
KR20070108315A (ko) * | 2005-12-07 | 2007-11-09 | 한국전자통신연구원 | 서명된 콜백 유알엘 메시지를 이용한 개인정보 공유 서비스제공 장치 및 방법 |
KR100875919B1 (ko) * | 2005-12-07 | 2008-12-26 | 한국전자통신연구원 | 서명된 콜백 유알엘 메시지를 이용한 개인정보 공유 서비스제공 장치 및 방법 |
US8006289B2 (en) | 2005-12-16 | 2011-08-23 | International Business Machines Corporation | Method and system for extending authentication methods |
US8321437B2 (en) | 2005-12-29 | 2012-11-27 | Nextlabs, Inc. | Detecting behavioral patterns and anomalies using activity profiles |
US7716240B2 (en) | 2005-12-29 | 2010-05-11 | Nextlabs, Inc. | Techniques and system to deploy policies intelligently |
CN100571125C (zh) | 2005-12-30 | 2009-12-16 | 上海贝尔阿尔卡特股份有限公司 | 一种用于用户设备与内部网络间安全通信的方法及装置 |
US8688813B2 (en) | 2006-01-11 | 2014-04-01 | Oracle International Corporation | Using identity/resource profile and directory enablers to support identity management |
JP2007214757A (ja) | 2006-02-08 | 2007-08-23 | Denso Corp | 車両用情報処理システム |
US8312523B2 (en) | 2006-03-31 | 2012-11-13 | Amazon Technologies, Inc. | Enhanced security for electronic communications |
US7752676B2 (en) | 2006-04-18 | 2010-07-06 | International Business Machines Corporation | Encryption of data in storage systems |
US8239671B2 (en) | 2006-04-20 | 2012-08-07 | Toshiba America Research, Inc. | Channel binding mechanism based on parameter binding in key derivation |
CN100517205C (zh) | 2006-04-21 | 2009-07-22 | 邱波 | 用于it领域的同时多维、增速、省空间的系统显示方法 |
US7913084B2 (en) | 2006-05-26 | 2011-03-22 | Microsoft Corporation | Policy driven, credential delegation for single sign on and secure access to network resources |
US8151116B2 (en) | 2006-06-09 | 2012-04-03 | Brigham Young University | Multi-channel user authentication apparatus system and method |
US9276739B2 (en) | 2006-06-30 | 2016-03-01 | Koninklijke Philips N.V. | Method and apparatus for encrypting/decrypting data |
US8151317B2 (en) | 2006-07-07 | 2012-04-03 | International Business Machines Corporation | Method and system for policy-based initiation of federation management |
US20120245978A1 (en) | 2006-07-12 | 2012-09-27 | Arbitron, Inc. | System and method for determinimg contextual characteristics of media exposure data |
US20080040773A1 (en) | 2006-08-11 | 2008-02-14 | Microsoft Corporation | Policy isolation for network authentication and authorization |
DE102006038037A1 (de) | 2006-08-14 | 2008-02-21 | Siemens Ag | Verfahren und System zum Bereitstellen eines zugangsspezifischen Schlüssels |
EP2059315A4 (en) | 2006-08-24 | 2011-10-26 | Howard W Lutnick | COMPUTER TERMINAL SYSTEM WITH MULTIPLE DISPLAY SCREENS |
US8601598B2 (en) | 2006-09-29 | 2013-12-03 | Microsoft Corporation | Off-premise encryption of data storage |
US8705746B2 (en) | 2006-09-29 | 2014-04-22 | Microsoft Corporation | Data security in an off-premise environment |
US8554749B2 (en) * | 2006-10-23 | 2013-10-08 | Adobe Systems Incorporated | Data file access control |
US8060916B2 (en) * | 2006-11-06 | 2011-11-15 | Symantec Corporation | System and method for website authentication using a shared secret |
US8041954B2 (en) | 2006-12-07 | 2011-10-18 | Paul Plesman | Method and system for providing a secure login solution using one-time passwords |
US8468244B2 (en) | 2007-01-05 | 2013-06-18 | Digital Doors, Inc. | Digital information infrastructure and method for security designated data and with granular data stores |
US9124602B2 (en) | 2007-01-05 | 2015-09-01 | International Business Machines Corporation | Method and apparatus for creating custom access control hierarchies |
US20080178010A1 (en) * | 2007-01-18 | 2008-07-24 | Vaterlaus Robert K | Cryptographic web service |
CN101589596B (zh) | 2007-01-26 | 2013-02-27 | 交互数字技术公司 | 用于保护位置信息和使用该位置信息来访问控制的方法和装置 |
JP4973246B2 (ja) | 2007-03-09 | 2012-07-11 | 日本電気株式会社 | アクセス権管理システム、サーバ及びアクセス権管理プログラム |
US8413221B2 (en) | 2007-03-23 | 2013-04-02 | Emc Corporation | Methods and apparatus for delegated authentication |
US10146871B2 (en) * | 2007-03-27 | 2018-12-04 | Sholem Weisner | Method and apparatus for a digital leg history |
US7996823B2 (en) | 2007-05-31 | 2011-08-09 | International Business Machines Corporation | Mechanism to provide debugging and optimization in policy and knowledge controlled distributed computing systems, through the use of tagged policies and knowledge representation elements |
US20090049518A1 (en) | 2007-08-08 | 2009-02-19 | Innopath Software, Inc. | Managing and Enforcing Policies on Mobile Devices |
US8332922B2 (en) | 2007-08-31 | 2012-12-11 | Microsoft Corporation | Transferable restricted security tokens |
CN101809584B (zh) | 2007-09-25 | 2014-01-01 | 日本电气株式会社 | 证书生成/分发系统、证书生成/分发方法和证书生成/分发程序 |
US8059820B2 (en) | 2007-10-11 | 2011-11-15 | Microsoft Corporation | Multi-factor content protection |
US8453198B2 (en) | 2007-12-27 | 2013-05-28 | Hewlett-Packard Development Company, L.P. | Policy based, delegated limited network access management |
US9323938B2 (en) | 2007-12-31 | 2016-04-26 | Enterra Solutions, Llc | Holistic XACML and obligation code automatically generated from ontologically defined rule set |
US8266306B2 (en) | 2007-12-31 | 2012-09-11 | Symantec Corporation | Systems and methods for delegating access to online accounts |
US8621561B2 (en) | 2008-01-04 | 2013-12-31 | Microsoft Corporation | Selective authorization based on authentication input attributes |
CA2621147C (en) | 2008-02-15 | 2013-10-08 | Connotech Experts-Conseils Inc. | Method of bootstrapping an authenticated data session configuration |
US20090210712A1 (en) | 2008-02-19 | 2009-08-20 | Nicolas Fort | Method for server-side detection of man-in-the-middle attacks |
US8418222B2 (en) | 2008-03-05 | 2013-04-09 | Microsoft Corporation | Flexible scalable application authorization for cloud computing environments |
US8464058B1 (en) | 2008-04-08 | 2013-06-11 | Hewlett-Packard Development Company, L.P. | Password-based cryptographic method and apparatus |
US8281151B2 (en) | 2008-04-09 | 2012-10-02 | Hewlett-Packard Development Company L. P. | Auditor assisted extraction and verification of client data returned from a storage provided while hiding client data from the auditor |
US20110099362A1 (en) | 2008-06-23 | 2011-04-28 | Tomoyuki Haga | Information processing device, encryption key management method, computer program and integrated circuit |
US8245039B2 (en) | 2008-07-18 | 2012-08-14 | Bridgewater Systems Corp. | Extensible authentication protocol authentication and key agreement (EAP-AKA) optimization |
US20110055585A1 (en) | 2008-07-25 | 2011-03-03 | Kok-Wah Lee | Methods and Systems to Create Big Memorizable Secrets and Their Applications in Information Engineering |
US8276184B2 (en) | 2008-08-05 | 2012-09-25 | International Business Machines Corporation | User-centric resource architecture |
US9258113B2 (en) | 2008-08-29 | 2016-02-09 | Red Hat, Inc. | Username based key exchange |
US8099768B2 (en) | 2008-09-18 | 2012-01-17 | Oracle America, Inc. | Method and system for multi-protocol single logout |
WO2010037201A1 (en) | 2008-09-30 | 2010-04-08 | Wicksoft Corporation | System and method for secure management of mobile user access to enterprise network resources |
WO2010040010A1 (en) * | 2008-10-01 | 2010-04-08 | Twilio Inc | Telephony web event system and method |
KR101019322B1 (ko) | 2008-10-22 | 2011-03-07 | 성균관대학교산학협력단 | 상황 인지 역할 기반 접근 제어 시스템 및 그 제어방법 |
US8744077B2 (en) | 2008-10-28 | 2014-06-03 | International Business Machines Corporation | Cryptographic encoding and decoding of secret data |
US8891756B2 (en) | 2008-10-30 | 2014-11-18 | Certicom Corp. | Collision-resistant elliptic curve hash functions |
US9338166B2 (en) * | 2008-11-04 | 2016-05-10 | Adobe Systems Incorporated | System and method for a single request and single response authentication protocol |
US20100125894A1 (en) | 2008-11-19 | 2010-05-20 | At&T Intellectual Property I, L.P. | Systems, methods and computer program products that facilitate remote access of devices in a subscriber network |
US9106426B2 (en) | 2008-11-26 | 2015-08-11 | Red Hat, Inc. | Username based authentication and key generation |
CN101448130B (zh) | 2008-12-19 | 2013-04-17 | 北京中星微电子有限公司 | 监控系统中数据加密保护的方法、系统和设备 |
US8505078B2 (en) | 2008-12-28 | 2013-08-06 | Qualcomm Incorporated | Apparatus and methods for providing authorized device access |
US20100205649A1 (en) | 2009-02-06 | 2010-08-12 | Microsoft Corporation | Credential gathering with deferred instantiation |
US8793774B1 (en) * | 2009-03-31 | 2014-07-29 | Juniper Networks, Inc. | Methods and apparatus for accessing a secure network segment |
US20130132232A1 (en) | 2009-04-22 | 2013-05-23 | Florian Pestoni | System And Method For Digital Rights Management With Delegated Authorization For Content Access |
US8068504B2 (en) | 2009-05-18 | 2011-11-29 | Tresys Technology, Llc | One-way router |
SG178015A1 (en) | 2009-06-23 | 2012-03-29 | Panasonic Corp | Encryption key distribution system |
JP2011008701A (ja) * | 2009-06-29 | 2011-01-13 | Sony Corp | 情報処理サーバ、情報処理装置、および情報処理方法 |
US8185729B2 (en) | 2009-08-27 | 2012-05-22 | Devon It, Inc. | Method of converting personal computers into thin client computers |
US20110055562A1 (en) | 2009-08-28 | 2011-03-03 | The Go Daddy Group, Inc. | Public key certificate based social website account authentication |
JP2011054028A (ja) | 2009-09-03 | 2011-03-17 | Ntt Data Solfis Corp | 暗号化ネットワークストレージシステム |
US8498959B2 (en) | 2009-09-29 | 2013-07-30 | Hewlett-Packard Development Company, L.P. | Policy enforcement |
US20110083015A1 (en) | 2009-10-05 | 2011-04-07 | Eidgenossiche Technische Hochschule Zurich | System and method for an electronic signature for quick and efficient data authentication |
US20110126197A1 (en) | 2009-11-25 | 2011-05-26 | Novell, Inc. | System and method for controlling cloud and virtualized data centers in an intelligent workload management system |
US9225526B2 (en) | 2009-11-30 | 2015-12-29 | Red Hat, Inc. | Multifactor username based authentication |
JP5552541B2 (ja) | 2009-12-04 | 2014-07-16 | クリプトグラフィ リサーチ, インコーポレイテッド | 検証可能な耐漏洩性暗号化および復号化 |
US20110167479A1 (en) | 2010-01-07 | 2011-07-07 | Oracle International Corporation | Enforcement of policies on context-based authorization |
US8776204B2 (en) | 2010-03-12 | 2014-07-08 | Alcatel Lucent | Secure dynamic authority delegation |
US20110231940A1 (en) | 2010-03-19 | 2011-09-22 | Microsoft Corporation | Credential-based access to data |
US8353019B2 (en) | 2010-03-26 | 2013-01-08 | Canon Kabushiki Kaisha | Security token destined for multiple or group of service providers |
JP5404501B2 (ja) | 2010-03-30 | 2014-02-05 | 日本電信電話株式会社 | 暗号化情報の有効期限延長システム、有効期限延長方法及びプログラム |
US9015489B2 (en) | 2010-04-07 | 2015-04-21 | Microsoft Technology Licensing, Llc | Securing passwords against dictionary attacks |
US8918848B2 (en) | 2010-04-26 | 2014-12-23 | Blackberry Limited | Method and system for third party client authentication |
US8826001B2 (en) | 2010-04-27 | 2014-09-02 | International Business Machines Corporation | Securing information within a cloud computing environment |
US9160738B2 (en) | 2010-05-27 | 2015-10-13 | Microsoft Corporation | Delegation-based authorization |
WO2011159842A2 (en) | 2010-06-15 | 2011-12-22 | Nimbula, Inc. | Virtual computing infrastructure |
US8625802B2 (en) | 2010-06-16 | 2014-01-07 | Porticor Ltd. | Methods, devices, and media for secure key management in a non-secured, distributed, virtualized environment with applications to cloud-computing security and management |
US8352611B2 (en) | 2010-06-29 | 2013-01-08 | International Business Machines Corporation | Allocating computer resources in a cloud environment |
US20120017095A1 (en) | 2010-07-19 | 2012-01-19 | Coreguard | Software Service for Encrypting and Decrypting Data |
JP2012028860A (ja) | 2010-07-20 | 2012-02-09 | Toshiba Corp | 記録装置、コントローラ及び記録装置の制御方法 |
US8799656B2 (en) | 2010-07-26 | 2014-08-05 | Intel Corporation | Methods for anonymous authentication and key agreement |
US8868923B1 (en) | 2010-07-28 | 2014-10-21 | Sandia Corporation | Multi-factor authentication |
EP2612272B1 (en) | 2010-08-30 | 2017-10-11 | VMWare, Inc. | Unified workspace for thin, remote, and saas applications |
US20120060035A1 (en) | 2010-09-08 | 2012-03-08 | Microsoft Corporation | Secure and Verifiable Data Handling |
US9069940B2 (en) | 2010-09-23 | 2015-06-30 | Seagate Technology Llc | Secure host authentication using symmetric key cryptography |
US8776190B1 (en) | 2010-11-29 | 2014-07-08 | Amazon Technologies, Inc. | Multifactor authentication for programmatic interfaces |
US9294479B1 (en) * | 2010-12-01 | 2016-03-22 | Google Inc. | Client-side authentication |
US8832271B2 (en) | 2010-12-03 | 2014-09-09 | International Business Machines Corporation | Identity provider instance discovery |
US8955035B2 (en) | 2010-12-16 | 2015-02-10 | Microsoft Corporation | Anonymous principals for policy languages |
US8538029B2 (en) | 2011-03-24 | 2013-09-17 | Hewlett-Packard Development Company, L.P. | Encryption key fragment distribution |
US8561152B2 (en) | 2011-05-17 | 2013-10-15 | Microsoft Corporation | Target-based access check independent of access request |
US10963584B2 (en) | 2011-06-08 | 2021-03-30 | Workshare Ltd. | Method and system for collaborative editing of a remotely stored document |
US10237060B2 (en) | 2011-06-23 | 2019-03-19 | Microsoft Technology Licensing, Llc | Media agnostic, distributed, and defendable data retention |
US9009315B2 (en) | 2011-07-28 | 2015-04-14 | Telefonaktiebolaget L M Ericsson (Publ) | Hierarchical delegation and reservation of lookup keys |
US9178701B2 (en) | 2011-09-29 | 2015-11-03 | Amazon Technologies, Inc. | Parameter based key derivation |
US9197409B2 (en) | 2011-09-29 | 2015-11-24 | Amazon Technologies, Inc. | Key derivation techniques |
US8788843B2 (en) | 2011-10-28 | 2014-07-22 | LogMeln, Inc. | Storing user data in a service provider cloud without exposing user-specific secrets to the service provider |
US20140013409A1 (en) | 2012-07-06 | 2014-01-09 | Milind I. Halageri | Single sign on for cloud |
US20130254536A1 (en) | 2012-03-22 | 2013-09-26 | Workshare, Ltd. | Secure server side encryption for online file sharing and collaboration |
US9692732B2 (en) | 2011-11-29 | 2017-06-27 | Amazon Technologies, Inc. | Network connection automation |
US9330245B2 (en) | 2011-12-01 | 2016-05-03 | Dashlane SAS | Cloud-based data backup and sync with secure local storage of access keys |
US8806193B2 (en) | 2011-12-22 | 2014-08-12 | Adobe Systems Incorporated | Methods and apparatus for integrating digital rights management (DRM) systems with native HTTP live streaming |
US8819444B2 (en) | 2011-12-27 | 2014-08-26 | Majid Shahbazi | Methods for single signon (SSO) using decentralized password and credential management |
KR101692796B1 (ko) | 2011-12-28 | 2017-01-05 | 인텔 코포레이션 | 싱글 사인온 서비스를 용이하게 하는 방법 및 장치 |
US8966268B2 (en) | 2011-12-30 | 2015-02-24 | Vasco Data Security, Inc. | Strong authentication token with visual output of PKI signatures |
KR101730459B1 (ko) | 2012-01-20 | 2017-04-26 | 인터디지탈 패튼 홀딩스, 인크 | 로컬 기능을 갖는 아이덴티티 관리 |
US8977857B1 (en) * | 2012-02-10 | 2015-03-10 | Google Inc. | System and method for granting access to protected information on a remote server |
US8739308B1 (en) | 2012-03-27 | 2014-05-27 | Amazon Technologies, Inc. | Source identification for unauthorized copies of content |
US8892865B1 (en) | 2012-03-27 | 2014-11-18 | Amazon Technologies, Inc. | Multiple authority key derivation |
CN102624737B (zh) * | 2012-03-27 | 2015-05-06 | 武汉理工大学 | 单点登录系统中针对Form身份鉴别的单点登录集成方法 |
US9575816B2 (en) | 2012-03-29 | 2017-02-21 | Via Technologies, Inc. | Deadlock/livelock resolution using service processor |
US20130282461A1 (en) | 2012-04-20 | 2013-10-24 | Visa International Service Association | Systems and methods to use transaction authorization communications to process offers |
US9053329B2 (en) | 2012-05-24 | 2015-06-09 | Lockbox Llc | Systems and methods for validated secure data access |
US8769289B1 (en) * | 2012-09-14 | 2014-07-01 | Emc Corporation | Authentication of a user accessing a protected resource using multi-channel protocol |
US8769651B2 (en) | 2012-09-19 | 2014-07-01 | Secureauth Corporation | Mobile multifactor single-sign-on authentication |
CN104756441B (zh) | 2012-10-26 | 2018-05-18 | 诺基亚技术有限公司 | 用于数据访问控制的方法和装置 |
US9137222B2 (en) | 2012-10-31 | 2015-09-15 | Vmware, Inc. | Crypto proxy for cloud storage services |
US9064109B2 (en) | 2012-12-20 | 2015-06-23 | Intel Corporation | Privacy enhanced key management for a web service provider using a converged security engine |
US8997198B1 (en) * | 2012-12-31 | 2015-03-31 | Emc Corporation | Techniques for securing a centralized metadata distributed filesystem |
US9246678B2 (en) | 2013-03-14 | 2016-01-26 | Intel Corporation | Secure cloud storage and encryption management system |
US10362006B2 (en) | 2013-03-15 | 2019-07-23 | Mastercard International Incorporated | Systems and methods for cryptographic security as a service |
US9008305B2 (en) * | 2013-03-15 | 2015-04-14 | Startal, Inc. | Video data delivery protection |
US9544293B2 (en) | 2013-09-20 | 2017-01-10 | Oracle International Corporation | Global unified session identifier across multiple data centers |
US9311500B2 (en) | 2013-09-25 | 2016-04-12 | Amazon Technologies, Inc. | Data security using request-supplied keys |
US9237019B2 (en) | 2013-09-25 | 2016-01-12 | Amazon Technologies, Inc. | Resource locators with keys |
JP6763695B2 (ja) | 2016-05-31 | 2020-09-30 | 株式会社Lixil | 建具 |
-
2013
- 2013-09-25 US US14/037,282 patent/US9237019B2/en active Active
-
2014
- 2014-09-23 CN CN201480052715.XA patent/CN105612716B/zh active Active
- 2014-09-23 JP JP2016542890A patent/JP2016530850A/ja active Pending
- 2014-09-23 EP EP22155709.3A patent/EP4040718B1/en active Active
- 2014-09-23 EP EP14849276.2A patent/EP3050257B1/en active Active
- 2014-09-23 CA CA2923437A patent/CA2923437C/en active Active
- 2014-09-23 CN CN202010034368.5A patent/CN111277573B/zh active Active
- 2014-09-23 WO PCT/US2014/057043 patent/WO2015048039A1/en active Application Filing
- 2014-09-23 CA CA3229997A patent/CA3229997A1/en active Pending
- 2014-09-23 EP EP19167409.2A patent/EP3525395B1/en active Active
-
2016
- 2016-01-11 US US14/992,599 patent/US9819654B2/en active Active
-
2017
- 2017-10-17 US US15/786,322 patent/US10412059B2/en active Active
-
2018
- 2018-04-17 JP JP2018078782A patent/JP7007985B2/ja active Active
- 2018-10-25 US US16/171,227 patent/US11146538B2/en active Active
-
2020
- 2020-07-27 JP JP2020126140A patent/JP7175550B2/ja active Active
-
2021
- 2021-09-15 US US17/476,300 patent/US11777911B1/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020083178A1 (en) * | 2000-08-11 | 2002-06-27 | Brothers John David West | Resource distribution in network environment |
JP2002190795A (ja) * | 2000-12-20 | 2002-07-05 | Hitachi Ltd | 情報端末及び情報端末システム |
JP2003242124A (ja) * | 2002-02-15 | 2003-08-29 | Mitsubishi Electric Corp | コンテンツ管理システムおよびコンテンツ管理方法 |
JP2006128873A (ja) * | 2004-10-27 | 2006-05-18 | Matsushita Electric Ind Co Ltd | Url認証システム及びurl認証方法 |
US20130247218A1 (en) * | 2010-12-09 | 2013-09-19 | Qryptal Pte Ltd | System And Method For Verifying Authenticity Of Documents |
Also Published As
Publication number | Publication date |
---|---|
US20180041480A1 (en) | 2018-02-08 |
US10412059B2 (en) | 2019-09-10 |
CA2923437A1 (en) | 2015-04-02 |
EP3050257B1 (en) | 2019-06-12 |
CA3229997A1 (en) | 2015-04-02 |
EP4040718B1 (en) | 2023-09-06 |
JP7175550B2 (ja) | 2022-11-21 |
EP4040718A1 (en) | 2022-08-10 |
EP3525395A1 (en) | 2019-08-14 |
CN105612716B (zh) | 2020-02-11 |
EP3525395B1 (en) | 2022-02-09 |
CN111277573A (zh) | 2020-06-12 |
US9819654B2 (en) | 2017-11-14 |
CA2923437C (en) | 2024-04-02 |
US20150089233A1 (en) | 2015-03-26 |
WO2015048039A1 (en) | 2015-04-02 |
US20190068560A1 (en) | 2019-02-28 |
US20160127330A1 (en) | 2016-05-05 |
JP2020184800A (ja) | 2020-11-12 |
JP2016530850A (ja) | 2016-09-29 |
EP3050257A1 (en) | 2016-08-03 |
EP3050257A4 (en) | 2017-04-05 |
US11777911B1 (en) | 2023-10-03 |
US11146538B2 (en) | 2021-10-12 |
JP7007985B2 (ja) | 2022-01-25 |
CN105612716A (zh) | 2016-05-25 |
CN111277573B (zh) | 2022-09-30 |
US9237019B2 (en) | 2016-01-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7175550B2 (ja) | 鍵を有するリソースロケーター | |
US20240126895A1 (en) | Data security using request-supplied keys | |
EP3017561B1 (en) | Virtual service provider zones |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20180516 |
|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20180516 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20180517 |
|
A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20190425 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20190531 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20190902 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20191021 |
|
A02 | Decision of refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A02 Effective date: 20200323 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20200727 |
|
C60 | Trial request (containing other claim documents, opposition documents) |
Free format text: JAPANESE INTERMEDIATE CODE: C60 Effective date: 20200727 |
|
A911 | Transfer to examiner for re-examination before appeal (zenchi) |
Free format text: JAPANESE INTERMEDIATE CODE: A911 Effective date: 20200805 |
|
C21 | Notice of transfer of a case for reconsideration by examiners before appeal proceedings |
Free format text: JAPANESE INTERMEDIATE CODE: C21 Effective date: 20200811 |
|
A912 | Re-examination (zenchi) completed and case transferred to appeal board |
Free format text: JAPANESE INTERMEDIATE CODE: A912 Effective date: 20201023 |
|
C211 | Notice of termination of reconsideration by examiners before appeal proceedings |
Free format text: JAPANESE INTERMEDIATE CODE: C211 Effective date: 20201027 |
|
C22 | Notice of designation (change) of administrative judge |
Free format text: JAPANESE INTERMEDIATE CODE: C22 Effective date: 20201215 |
|
C13 | Notice of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: C13 Effective date: 20210303 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20210601 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20210601 |
|
C272 | Notice of ex officio correction |
Free format text: JAPANESE INTERMEDIATE CODE: C272 Effective date: 20210614 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20210702 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20210802 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20210804 |
|
C23 | Notice of termination of proceedings |
Free format text: JAPANESE INTERMEDIATE CODE: C23 Effective date: 20211115 |
|
C03 | Trial/appeal decision taken |
Free format text: JAPANESE INTERMEDIATE CODE: C03 Effective date: 20211213 |
|
C30A | Notification sent |
Free format text: JAPANESE INTERMEDIATE CODE: C3012 Effective date: 20211213 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20220107 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 7007985 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |