JP2019118135A - キーエクスポート技術 - Google Patents
キーエクスポート技術 Download PDFInfo
- Publication number
- JP2019118135A JP2019118135A JP2019047189A JP2019047189A JP2019118135A JP 2019118135 A JP2019118135 A JP 2019118135A JP 2019047189 A JP2019047189 A JP 2019047189A JP 2019047189 A JP2019047189 A JP 2019047189A JP 2019118135 A JP2019118135 A JP 2019118135A
- Authority
- JP
- Japan
- Prior art keywords
- key
- request
- export
- customer
- cryptographic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000005516 engineering process Methods 0.000 title abstract description 7
- 239000000463 material Substances 0.000 claims abstract description 19
- 238000000034 method Methods 0.000 claims description 180
- 230000008569 process Effects 0.000 claims description 162
- 230000004044 response Effects 0.000 claims description 21
- 230000009471 action Effects 0.000 claims description 6
- 238000012545 processing Methods 0.000 abstract description 60
- 238000013500 data storage Methods 0.000 description 30
- 230000015654 memory Effects 0.000 description 21
- 238000013475 authorization Methods 0.000 description 16
- 238000004422 calculation algorithm Methods 0.000 description 16
- 238000007726 management method Methods 0.000 description 12
- 238000004891 communication Methods 0.000 description 11
- 230000007246 mechanism Effects 0.000 description 10
- 238000012795 verification Methods 0.000 description 8
- 230000006870 function Effects 0.000 description 7
- 230000008520 organization Effects 0.000 description 7
- 230000005540 biological transmission Effects 0.000 description 4
- 238000013478 data encryption standard Methods 0.000 description 4
- 238000012986 modification Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 238000012546 transfer Methods 0.000 description 3
- 230000001413 cellular effect Effects 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 238000010276 construction Methods 0.000 description 2
- 238000009795 derivation Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000013515 script Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000003936 working memory Effects 0.000 description 2
- VBMOHECZZWVLFJ-GXTUVTBFSA-N (2s)-2-[[(2s)-6-amino-2-[[(2s)-6-amino-2-[[(2s,3r)-2-[[(2s,3r)-2-[[(2s)-6-amino-2-[[(2s)-2-[[(2s)-6-amino-2-[[(2s)-2-[[(2s)-2-[[(2s)-2,6-diaminohexanoyl]amino]-5-(diaminomethylideneamino)pentanoyl]amino]propanoyl]amino]hexanoyl]amino]propanoyl]amino]hexan Chemical compound NC(N)=NCCC[C@@H](C(O)=O)NC(=O)[C@H](CCCCN)NC(=O)[C@H](CCCCN)NC(=O)[C@H]([C@@H](C)O)NC(=O)[C@H]([C@H](O)C)NC(=O)[C@H](CCCCN)NC(=O)[C@H](C)NC(=O)[C@H](CCCCN)NC(=O)[C@H](C)NC(=O)[C@H](CCCN=C(N)N)NC(=O)[C@@H](N)CCCCN VBMOHECZZWVLFJ-GXTUVTBFSA-N 0.000 description 1
- TVZRAEYQIKYCPH-UHFFFAOYSA-N 3-(trimethylsilyl)propane-1-sulfonic acid Chemical compound C[Si](C)(C)CCCS(O)(=O)=O TVZRAEYQIKYCPH-UHFFFAOYSA-N 0.000 description 1
- 241000270295 Serpentes Species 0.000 description 1
- 241001441724 Tetraodontidae Species 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000008094 contradictory effect Effects 0.000 description 1
- 125000004122 cyclic group Chemical group 0.000 description 1
- 230000001351 cycling effect Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000001339 gustatory effect Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 108010068904 lysyl-arginyl-alanyl-lysyl-alanyl-lysyl-threonyl-threonyl-lysyl-lysyl-arginine Proteins 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 230000010076 replication Effects 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 230000035807 sensation Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
2015年3月31日に出願された「KEY EXPORT TECHNIQUES」と題する米国特許出願第14/675,614号の全開示内容は、全ての目的で参照することにより本出願に組み込まれるものとする。
1.暗号サービスのウェブサーバにおいて、前記暗号サービスの顧客に対応付けられたデバイスから、有効期間を指定する暗号キーの要求を受信することと、
暗号材料のハードウェア保護を提供するデバイスにおいて、前記暗号キーを生成することと、
前記デバイス内に記憶され、前記デバイスからプログラム的にエクスポート不可能なドメインキー集合の中から、前記指定された有効期間に合う有効期限を有するドメインキーを選択することであって、前記有効期限に従って特定される時点に前記ドメインキーが永久に前記デバイスによりアクセス不可能となることを引き起こす自動プロセスの少なくとも1つのインスタンスにより前記有効期限は施行される、前記指定された有効期間に合う前記有効期限を有する前記ドメインキーを選択することと、
前記デバイスにおいて、前記生成された暗号キーを暗号化することと、
前記暗号化された暗号キー及び前記暗号キーの識別子を含むトークンを生成することと、
前記顧客に対応付けられた前記デバイスに対し、前記受信された要求に応えて前記トークンを提供することと、
前記デバイスが前記暗号キーへのアクセスを失うことを引き起こす1つまたは複数の処理を行うことと、
を含むコンピュータ実施方法。
前記デバイスにおいて、前記ホスト型暗号キーを生成することと、
前記デバイスに記憶される第2ドメインキーを使用して、前記ホスト型暗号キーを暗号化することと、
前記暗号サービスへアクセス可能な場所に前記暗号化されたホスト型暗号キーを記憶することと
をさらに含む、条項1または2に記載のコンピュータ実施方法。
前記第2ドメインキーは、ホスト型暗号キーのために支給される前記ドメインキー集合の第2部分集合に属する、
条項3に記載のコンピュータ実施方法。
暗号キーの要求を受信し、
前記暗号キーの前記要求を履行するように構成され、前記暗号キーの前記要求を履行することは、
前記暗号キーを取得することと、
暗号材料を使用して前記取得された暗号キーを暗号化することであって、前記暗号材料は、前記暗号材料のハードウェア保護をそれぞれが提供するハードウェアデバイス集合の外側からアクセス不可能であり、前記暗号材料は、前記ハードウェアデバイス集合から前記暗号材料がアクセス不可能となる時間に対応する有効期限を有し、前記有効期限は、前記システムにより実行される自動化プロセスにより施行される、前記暗号材料を使用して前記取得された暗号キーを暗号化することと、
前記暗号化された暗号キーを提供することと、
前記ハードウェアデバイス集合が前記取得された暗号キーへのアクセスを失うことを引き起こすことと、
により行われる、前記システム。
前記暗号化された暗号キーを提供することは、前記生成されたトークンを提供することを含む、
条項5に記載のシステム。
前記暗号キーを使用して暗号処理を行う第2要求であって、前記暗号化された暗号キーを含む前記第2要求を受信し、
前記暗号材料が今もなお利用可能であることを条件として、前記暗号化された暗号キーを復号化し、前記暗号キーを使用して前記暗号処理を実行することにより、前記第2要求を履行する、
ように構成される、条項5または6に記載のシステム。
前記暗号処理を実行する第3要求であって、前記1つまたは複数のサービスにより管理される第2暗号キーの識別子を指定する前記要求を受信し、
前記要求を履行するように構成され、前記要求を履行することは少なくとも、
データストレージ場所から前記第2暗号キーの暗号化された複製を取得することと、
前記第2暗号キーの前記暗号化された複製を復号化することと、
前記第2暗号キーを使用して前記暗号処理を実行することと
により行われる、条項7に記載のシステム。
前記暗号キーの許可集合を指定するポリシーを前記暗号キーと対応付け、
前記ポリシーに従って前記暗号キーを使用する要求の履行を制御する、
ように構成される、条項5〜8のいずれかに記載のシステム。
条項5〜10のいずれかに記載のシステム。
前記1つまたは複数のサービスにアクセス可能なデータストレージシステムから前記暗号キーの暗号化された複製を取得することと、
前記暗号材料とは異なる別の暗号材料を使用して前記暗号キーの前記暗号化された複製を復号化することと、
を含む、条項5〜11のいずれかに記載のシステム。
キートークンの第1要求に関して、
第1暗号キーの暗号化された複製と、前記第1暗号キーを暗号化するのに使用された第2暗号キーを識別するのに使用可能な情報を含むキートークンを取得することであって、前記第2暗号キーは、前記第2暗号キーを管理するハードウェアデバイス集合の外側からアクセス不可能であり、前記キートークンを取得することは、前記キートークンが生成された後に前記第1暗号キーが前記エンティティへアクセス不可能になることを引き起こし、前記第2暗号キーは、前記ハードウェアデバイス集合へ前記第2暗号キーがアクセス不可能となる時間を示す有効期限を有する、前記キートークンを取得することと、
第2エンティティに対応付けられた、キートークンの第2要求に関して、
前記キートークンを取得することと、
前記有効期限により示される前記時間がまだ経過していない場合、前記ハードウェアデバイス集合内のハードウェアデバイスに、前記第1暗号キーを復号化させ、前記復号化された第1暗号キーを使用して1つまたは複数の暗号処理を実行させ、前記1つまたは複数の暗号処理の結果を前記コンピュータシステムへ提供させることと、
前記提供される結果に少なくとも部分的に基づく前記第2要求への応答を提供することと、
を実行する、前記非一時的コンピュータ可読記憶媒体。
条項13に記載の非一時的コンピュータ可読記憶媒体。
条項13または14に記載の非一時的コンピュータ可読記憶媒体。
前記第1暗号キーの識別子に少なくとも部分的に基づいて、前記第1暗号キーを使用するための許可集合を定義するポリシー集合を特定させ、
前記要求の履行が前記特定されたポリシー集合に準拠するか否かを判定させる
命令をさらに含み、
前記ハードウェアデバイスが前記第1暗号キーを復号化し、前記復号化された第1暗号キーを使用して前記1つまたは複数の暗号処理を実行することを前記コンピュータシステムに引き起こさせる前記命令の実行は、前記要求の履行が前記特定されたポリシー集合に準拠するという判定を条件とする、
条項13〜15のいずれかに記載の非一時的コンピュータ可読記憶媒体。
条項13〜16のいずれかに記載の非一時的コンピュータ可読記憶媒体。
前記コンピュータシステムに前記キートークンを取得させる前記命令は、前記1つまたは複数のプロセッサにより実行されると、前記コンピュータシステムに前記第2要求から前記キートークンを特定させる、
条項13〜17のいずれかに記載の非一時的コンピュータ可読記憶媒体。
条項13〜18のいずれかに記載の非一時的コンピュータ可読記憶媒体。
条項13〜19のいずれかに記載の非一時的コンピュータ可読記憶媒体。
Claims (1)
- 暗号サービスのウェブサーバにおいて、前記暗号サービスの顧客に対応付けられたデバイスから、有効期間を指定する暗号キーの要求を受信することと、
暗号材料のハードウェア保護を提供するデバイスにおいて、前記暗号キーを生成することと、
前記デバイス内に記憶され、前記デバイスからプログラム的にエクスポート不可能なドメインキー集合の中から、前記指定された有効期間に合う有効期限を有するドメインキーを選択することであって、前記有効期限に従って特定される時点に前記ドメインキーが永久に前記デバイスによりアクセス不可能となることを引き起こす自動プロセスの少なくとも1つのインスタンスにより前記有効期限は施行される、前記指定された有効期間に合う前記有効期限を有する前記ドメインキーを選択することと、
前記デバイスにおいて、前記生成された暗号キーを暗号化することと、
前記暗号化された暗号キー及び前記暗号キーの識別子を含むトークンを生成することと、
前記顧客に対応付けられた前記デバイスに対し、前記受信された要求に応えて前記トークンを提供することと、
前記デバイスが前記暗号キーへのアクセスを失うことを引き起こす1つまたは複数の処理を行うことと、
を含むコンピュータ実施方法。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/675,614 | 2015-03-31 | ||
US14/675,614 US10469477B2 (en) | 2015-03-31 | 2015-03-31 | Key export techniques |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2017549404A Division JP6499310B2 (ja) | 2015-03-31 | 2016-03-25 | キーエクスポート技術 |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2019118135A true JP2019118135A (ja) | 2019-07-18 |
JP6838799B2 JP6838799B2 (ja) | 2021-03-03 |
Family
ID=55661646
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2017549404A Active JP6499310B2 (ja) | 2015-03-31 | 2016-03-25 | キーエクスポート技術 |
JP2019047189A Active JP6838799B2 (ja) | 2015-03-31 | 2019-03-14 | キーエクスポート技術 |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2017549404A Active JP6499310B2 (ja) | 2015-03-31 | 2016-03-25 | キーエクスポート技術 |
Country Status (9)
Country | Link |
---|---|
US (2) | US10469477B2 (ja) |
EP (1) | EP3278533A1 (ja) |
JP (2) | JP6499310B2 (ja) |
KR (2) | KR101985187B1 (ja) |
CN (2) | CN107534667B (ja) |
AU (3) | AU2016243115B2 (ja) |
CA (2) | CA3147153A1 (ja) |
SG (1) | SG11201707796PA (ja) |
WO (1) | WO2016160597A1 (ja) |
Families Citing this family (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9930066B2 (en) | 2013-02-12 | 2018-03-27 | Nicira, Inc. | Infrastructure level LAN security |
US10747888B2 (en) | 2014-06-30 | 2020-08-18 | Nicira, Inc. | Method and apparatus for differently encrypting data messages for different logical networks |
US10798073B2 (en) * | 2016-08-26 | 2020-10-06 | Nicira, Inc. | Secure key management protocol for distributed network encryption |
GB2556638B (en) * | 2016-12-02 | 2018-12-12 | Gurulogic Microsystems Oy | Protecting usage of key store content |
US10489307B2 (en) * | 2017-01-05 | 2019-11-26 | Pure Storage, Inc. | Periodically re-encrypting user data stored on a storage device |
KR102468390B1 (ko) * | 2017-05-31 | 2022-11-18 | 삼성에스디에스 주식회사 | 토큰 관리 방법 및 이를 수행하기 위한 서버 |
WO2018236420A1 (en) | 2017-06-20 | 2018-12-27 | Google Llc | CLOUD EQUIPMENT SECURITY MODULES FOR CRYPTOGRAPHIC EXTERNALIZATION OPERATIONS |
US10505938B2 (en) * | 2017-07-21 | 2019-12-10 | Schlage Lock Company Llc | Leveraging flexible distributed tokens in an access control system |
US10536267B2 (en) * | 2017-09-15 | 2020-01-14 | Visa International Service Association | Cryptographic services utilizing commodity hardware |
KR101967380B1 (ko) * | 2017-10-31 | 2019-08-13 | 삼성에스디에스 주식회사 | 키 관리 시스템 |
US11095446B2 (en) * | 2018-02-27 | 2021-08-17 | Anchor Labs, Inc. | Cryptoasset custodial system with different rules governing access to logically separated cryptoassets and proof-of-stake blockchain support |
CN110677250B (zh) | 2018-07-02 | 2022-09-02 | 阿里巴巴集团控股有限公司 | 密钥和证书分发方法、身份信息处理方法、设备、介质 |
US20200036705A1 (en) * | 2018-07-27 | 2020-01-30 | Jasper Chee Pang LEE | Strong password by convention methods and systems |
CN110795774B (zh) | 2018-08-02 | 2023-04-11 | 阿里巴巴集团控股有限公司 | 基于可信高速加密卡的度量方法、设备和系统 |
CN110795742B (zh) | 2018-08-02 | 2023-05-02 | 阿里巴巴集团控股有限公司 | 高速密码运算的度量处理方法、装置、存储介质及处理器 |
CN110874478B (zh) | 2018-08-29 | 2023-05-02 | 阿里巴巴集团控股有限公司 | 密钥处理方法及装置、存储介质和处理器 |
US11082235B2 (en) | 2019-02-14 | 2021-08-03 | Anchor Labs, Inc. | Cryptoasset custodial system with different cryptographic keys controlling access to separate groups of private keys |
US11240022B1 (en) * | 2019-04-11 | 2022-02-01 | Wells Fargo Bank, N.A. | Passive encryption rotation keys |
US11698981B2 (en) * | 2019-06-14 | 2023-07-11 | Mongodb, Inc. | Systems and methods for client-side and field-level encryption with dynamic schema databases |
US11494763B2 (en) | 2019-08-19 | 2022-11-08 | Anchor Labs, Inc. | Cryptoasset custodial system with custom logic |
US11301845B2 (en) | 2019-08-19 | 2022-04-12 | Anchor Labs, Inc. | Cryptoasset custodial system with proof-of-stake blockchain support |
US11100497B2 (en) | 2019-08-20 | 2021-08-24 | Anchor Labs, Inc. | Risk mitigation for a cryptoasset custodial system using a hardware security key |
US11562349B2 (en) | 2019-08-20 | 2023-01-24 | Anchor Labs, Inc. | Risk mitigation for a cryptoasset custodial system using data points from multiple mobile devices |
US11501291B2 (en) * | 2019-08-23 | 2022-11-15 | Anchor Labs, Inc. | Cryptoasset custodial system using encrypted and distributed client keys |
US11259082B2 (en) | 2019-10-22 | 2022-02-22 | Synamedia Limited | Systems and methods for data processing, storage, and retrieval from a server |
US11838413B2 (en) * | 2019-10-22 | 2023-12-05 | Synamedia Limited | Content recognition systems and methods for encrypted data structures |
US11159330B1 (en) | 2019-10-24 | 2021-10-26 | Whatsapp Llc. | Rendering online content via secured URL |
US11308228B1 (en) | 2019-10-24 | 2022-04-19 | Whatsapp Inc. | Providing access for online content via secured URL |
CN110809035B (zh) * | 2019-10-25 | 2021-12-03 | 广州查正源电子科技有限公司 | 一种去中心化防伪数据生成和管理方法及系统 |
US11522684B2 (en) | 2020-09-24 | 2022-12-06 | Capital One Services, Llc | Key rotation service |
TWI769961B (zh) * | 2020-12-11 | 2022-07-01 | 熵碼科技股份有限公司 | 基於物理不可複製函數的密鑰管理系統及其操作方法 |
US11223489B1 (en) | 2021-02-23 | 2022-01-11 | Garantir LLC | Advanced security control implementation of proxied cryptographic keys |
US11218317B1 (en) | 2021-05-28 | 2022-01-04 | Garantir LLC | Secure enclave implementation of proxied cryptographic keys |
US11418329B1 (en) | 2021-05-28 | 2022-08-16 | Garantir LLC | Shared secret implementation of proxied cryptographic keys |
US11502827B1 (en) * | 2021-09-03 | 2022-11-15 | Garantir LLC | Exporting remote cryptographic keys |
Family Cites Families (146)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4868877A (en) | 1988-02-12 | 1989-09-19 | Fischer Addison M | Public key/signature cryptosystem with enhanced digital signature certification |
US4918728A (en) | 1989-08-30 | 1990-04-17 | International Business Machines Corporation | Data cryptography operations using control vectors |
US5146498A (en) | 1991-01-10 | 1992-09-08 | Motorola, Inc. | Remote key manipulations for over-the-air re-keying |
US5201000A (en) | 1991-09-27 | 1993-04-06 | International Business Machines Corporation | Method for generating public and private key pairs without using a passphrase |
US5495533A (en) | 1994-04-29 | 1996-02-27 | International Business Machines Corporation | Personal key archive |
US5761306A (en) | 1996-02-22 | 1998-06-02 | Visa International Service Association | Key replacement in a public key cryptosystem |
JPH1041933A (ja) | 1996-07-22 | 1998-02-13 | Fuji Xerox Co Ltd | 復号装置 |
US6253323B1 (en) | 1996-11-01 | 2001-06-26 | Intel Corporation | Object-based digital signatures |
US6546492B1 (en) | 1999-03-26 | 2003-04-08 | Ericsson Inc. | System for secure controlled electronic memory updates via networks |
JP2000295209A (ja) | 1999-04-09 | 2000-10-20 | Ntt Data Corp | 鍵管理方法、鍵管理システム及び記録媒体 |
SE9904094D0 (sv) | 1999-11-12 | 1999-11-12 | Protegrity Research & Dev | Method for reencryption of a database |
US6826609B1 (en) | 2000-03-31 | 2004-11-30 | Tumbleweed Communications Corp. | Policy enforcement in a secure data file delivery system |
DE10025626A1 (de) | 2000-05-24 | 2001-11-29 | Deutsche Telekom Ag | Verschlüsseln von abzuspeichernden Daten in einem IV-System |
US8538843B2 (en) | 2000-07-17 | 2013-09-17 | Galactic Computing Corporation Bvi/Bc | Method and system for operating an E-commerce service provider |
US6986040B1 (en) | 2000-11-03 | 2006-01-10 | Citrix Systems, Inc. | System and method of exploiting the security of a secure communication channel to secure a non-secure communication channel |
US20050120232A1 (en) | 2000-11-28 | 2005-06-02 | Yoshihiro Hori | Data terminal managing ciphered content data and license acquired by software |
US7181017B1 (en) | 2001-03-23 | 2007-02-20 | David Felsher | System and method for secure three-party communications |
US7050583B2 (en) | 2001-03-29 | 2006-05-23 | Etreppid Technologies, Llc | Method and apparatus for streaming data using rotating cryptographic keys |
CA2358048A1 (en) | 2001-09-25 | 2003-03-25 | Luis Rueda | A cryptosystem for data security |
US7200747B2 (en) | 2001-10-31 | 2007-04-03 | Hewlett-Packard Development Company, L.P. | System for ensuring data privacy and user differentiation in a distributed file system |
US7243366B2 (en) | 2001-11-15 | 2007-07-10 | General Instrument Corporation | Key management protocol and authentication system for secure internet protocol rights management architecture |
US20020076044A1 (en) | 2001-11-16 | 2002-06-20 | Paul Pires | Method of and system for encrypting messages, generating encryption keys and producing secure session keys |
US7580972B2 (en) | 2001-12-12 | 2009-08-25 | Valve Corporation | Method and system for controlling bandwidth on client and server |
US7117366B2 (en) | 2002-01-08 | 2006-10-03 | International Business Machines Corporation | Public key based authentication method for transaction delegation in service-based computing environments |
US7376967B1 (en) | 2002-01-14 | 2008-05-20 | F5 Networks, Inc. | Method and system for performing asynchronous cryptographic operations |
JP3897613B2 (ja) | 2002-02-27 | 2007-03-28 | 株式会社日立製作所 | 公開鍵暗号方式における登録局サーバの運用方法、登録局サーバ、及びプログラム |
US20030188188A1 (en) | 2002-03-15 | 2003-10-02 | Microsoft Corporation | Time-window-constrained multicast for future delivery multicast |
US7890771B2 (en) | 2002-04-17 | 2011-02-15 | Microsoft Corporation | Saving and retrieving data based on public key encryption |
US7778606B2 (en) | 2002-05-17 | 2010-08-17 | Network Security Technologies, Inc. | Method and system for wireless intrusion detection |
US20040009815A1 (en) | 2002-06-26 | 2004-01-15 | Zotto Banjamin O. | Managing access to content |
US7620680B1 (en) | 2002-08-15 | 2009-11-17 | Microsoft Corporation | Fast byzantine paxos |
US7877607B2 (en) | 2002-08-30 | 2011-01-25 | Hewlett-Packard Development Company, L.P. | Tamper-evident data management |
FR2844656B1 (fr) | 2002-09-18 | 2005-01-28 | France Telecom | Procede de signature electronique, programme et serveur pour la mise en oeuvre du procede |
US20040107345A1 (en) | 2002-10-21 | 2004-06-03 | Brandt David D. | System and methodology providing automation security protocols and intrusion detection in an industrial controller environment |
US7565419B1 (en) | 2002-11-22 | 2009-07-21 | Symantec Operating Corporation | Conflict resolution in a peer to peer network |
US20040143733A1 (en) | 2003-01-16 | 2004-07-22 | Cloverleaf Communication Co. | Secure network data storage mediator |
GB2400699B (en) | 2003-04-17 | 2006-07-05 | Hewlett Packard Development Co | Security data provision method and apparatus and data recovery method and system |
US7409545B2 (en) * | 2003-09-18 | 2008-08-05 | Sun Microsystems, Inc. | Ephemeral decryption utilizing binding functions |
JP2005151529A (ja) | 2003-10-20 | 2005-06-09 | Sony Corp | データ伝送方法、データ伝送装置及びデータ受信装置 |
US7296023B2 (en) | 2004-01-15 | 2007-11-13 | International Business Machines Corporation | Method and apparatus for persistent real-time collaboration |
EP2267624B1 (en) | 2004-04-19 | 2017-07-12 | Lumension Security S.A. | A generic framework for runtime interception and execution control of interpreted languages |
JP4532484B2 (ja) | 2004-05-17 | 2010-08-25 | 三菱電機株式会社 | 量子暗号通信装置 |
US20060010323A1 (en) | 2004-07-07 | 2006-01-12 | Xerox Corporation | Method for a repository to provide access to a document, and a repository arranged in accordance with the same method |
CN101019371A (zh) | 2004-07-15 | 2007-08-15 | 松下电器产业株式会社 | 时刻认证装置、时刻认证方法、计算机程序、记录介质、集成电路及时刻认证系统 |
US20060021018A1 (en) | 2004-07-21 | 2006-01-26 | International Business Machines Corporation | Method and system for enabling trust infrastructure support for federated user lifecycle management |
EP1784943A4 (en) | 2004-08-31 | 2011-08-03 | Ntt Docomo Inc | RECEPTION OF CRYPTOGRAPHIC DIGITAL CERTIFICATES |
US20080091941A1 (en) | 2004-09-03 | 2008-04-17 | Nec Corporation | Group Signature System, Member Status Judging Device, Group Signature Method And Member Status Judging Program |
JP2006120089A (ja) | 2004-10-25 | 2006-05-11 | Ntt Docomo Inc | データ管理システム及びデータ管理方法 |
JP2006127349A (ja) | 2004-11-01 | 2006-05-18 | Ntt Communications Kk | デジタル著作権管理装置およびプログラム |
JP4714482B2 (ja) | 2005-02-28 | 2011-06-29 | 株式会社日立製作所 | 暗号通信システムおよび方法 |
US7900247B2 (en) | 2005-03-14 | 2011-03-01 | Microsoft Corporation | Trusted third party authentication for web services |
US7774826B1 (en) | 2005-03-18 | 2010-08-10 | Novell, Inc. | System and method for determining effective policy profiles in a client-server architecture |
US8295492B2 (en) | 2005-06-27 | 2012-10-23 | Wells Fargo Bank, N.A. | Automated key management system |
US7784087B2 (en) | 2005-08-04 | 2010-08-24 | Toshiba Corporation | System and method for securely sharing electronic documents |
US8566607B2 (en) | 2005-08-26 | 2013-10-22 | International Business Machines Corporation | Cryptography methods and apparatus used with a processor |
JP4569464B2 (ja) | 2005-12-20 | 2010-10-27 | 沖電気工業株式会社 | マルチホップネットワークにおける鍵更新システム,鍵管理装置,通信端末および鍵情報構築方法 |
US7912994B2 (en) | 2006-01-27 | 2011-03-22 | Apple Inc. | Reducing connection time for mass storage class peripheral by internally prefetching file data into local cache in response to connection to host |
JP4226606B2 (ja) | 2006-02-06 | 2009-02-18 | 株式会社コナミデジタルエンタテインメント | 通信装置、通信方法、ならびに、プログラム |
US7925023B2 (en) * | 2006-03-03 | 2011-04-12 | Oracle International Corporation | Method and apparatus for managing cryptographic keys |
US8064604B2 (en) | 2006-04-04 | 2011-11-22 | Oracle International Corporation | Method and apparatus for facilitating role-based cryptographic key management for a database |
US9002018B2 (en) | 2006-05-09 | 2015-04-07 | Sync Up Technologies Corporation | Encryption key exchange system and method |
US20070283446A1 (en) | 2006-06-05 | 2007-12-06 | Kabushiki Kaisha Toshiba | System and method for secure handling of scanned documents |
US20080028470A1 (en) | 2006-07-25 | 2008-01-31 | Mark Remington | Systems and Methods for Vulnerability Detection and Scoring with Threat Assessment |
US8689287B2 (en) | 2006-08-17 | 2014-04-01 | Northrop Grumman Systems Corporation | Federated credentialing system and method |
US20100316219A1 (en) | 2007-08-06 | 2010-12-16 | David Boubion | Systems and methods for simultaneous integrated multiencrypted rotating key communication |
US7953978B2 (en) | 2006-09-07 | 2011-05-31 | International Business Machines Corporation | Key generation and retrieval using key servers |
US8407806B2 (en) | 2006-09-29 | 2013-03-26 | Purusharth Agrawal | Digital data distribution detection, deterrence and disablement system and method |
GB2443244A (en) | 2006-10-05 | 2008-04-30 | Hewlett Packard Development Co | Authenticated Encryption Method and Apparatus |
CN101166259B (zh) * | 2006-10-16 | 2010-11-10 | 华为技术有限公司 | 手机电视业务保护方法、系统、手机电视服务器及终端 |
US8090098B2 (en) | 2006-11-13 | 2012-01-03 | Electronics And Telecommunications Research Institute | Method of generating message authentication code using stream cipher and authentication/encryption and authentication/decryption methods using stream cipher |
PL2052548T3 (pl) | 2006-12-12 | 2012-08-31 | Fraunhofer Ges Forschung | Koder, dekoder oraz sposoby kodowania i dekodowania segmentów danych reprezentujących strumień danych w dziedzinie czasu |
US20080172562A1 (en) | 2007-01-12 | 2008-07-17 | Christian Cachin | Encryption and authentication of data and for decryption and verification of authenticity of data |
JP4890309B2 (ja) | 2007-03-19 | 2012-03-07 | 株式会社リコー | 情報処理装置及び情報保護方法 |
US8218761B2 (en) | 2007-04-06 | 2012-07-10 | Oracle International Corporation | Method and apparatus for generating random data-encryption keys |
US9413686B2 (en) | 2007-06-04 | 2016-08-09 | Qualcomm Incorporated | Establishing a unique end-to-end management key |
US20080319909A1 (en) | 2007-06-25 | 2008-12-25 | Perkins George S | System and method for managing the lifecycle of encryption keys |
WO2009012388A1 (en) | 2007-07-17 | 2009-01-22 | Peirson William Howard Jr | Systems and processes for obtaining and managing electronic signatures for real estate transaction documents |
US8111828B2 (en) | 2007-07-31 | 2012-02-07 | Hewlett-Packard Development Company, L.P. | Management of cryptographic keys for securing stored data |
US8140847B1 (en) | 2007-09-18 | 2012-03-20 | Jianqing Wu | Digital safe |
CN101400059B (zh) | 2007-09-28 | 2010-12-08 | 华为技术有限公司 | 一种active状态下的密钥更新方法和设备 |
KR100980831B1 (ko) | 2007-12-12 | 2010-09-10 | 한국전자통신연구원 | 일회용 패스워드를 이용한 신뢰성 있는 통신 시스템 및방법 |
US8495357B2 (en) | 2007-12-19 | 2013-07-23 | International Business Machines Corporation | Data security policy enforcement |
WO2009104873A2 (en) | 2008-02-19 | 2009-08-27 | Lg Electronics Inc. | Method and device for managing authorization of right object in digital rights management |
US8681990B2 (en) | 2008-03-28 | 2014-03-25 | International Business Machines Corporation | Renewal management for data items |
US8225106B2 (en) | 2008-04-02 | 2012-07-17 | Protegrity Corporation | Differential encryption utilizing trust modes |
US8494168B1 (en) | 2008-04-28 | 2013-07-23 | Netapp, Inc. | Locating cryptographic keys stored in a cache |
US8589697B2 (en) | 2008-04-30 | 2013-11-19 | Netapp, Inc. | Discarding sensitive data from persistent point-in-time image |
US20090300356A1 (en) | 2008-05-27 | 2009-12-03 | Crandell Jeffrey L | Remote storage encryption system |
US20100014662A1 (en) | 2008-06-19 | 2010-01-21 | Sami Antti Jutila | Method, apparatus and computer program product for providing trusted storage of temporary subscriber data |
WO2009157142A1 (ja) | 2008-06-23 | 2009-12-30 | パナソニック株式会社 | 情報処理装置、暗号鍵の管理方法、コンピュータプログラム及び集積回路 |
US8261320B1 (en) | 2008-06-30 | 2012-09-04 | Symantec Corporation | Systems and methods for securely managing access to data |
GB0811897D0 (en) | 2008-06-30 | 2008-07-30 | Steed Darren | Intelligent file encapsulation |
JP4620146B2 (ja) | 2008-07-18 | 2011-01-26 | 株式会社東芝 | 情報処理装置及び認証方法 |
US8302170B2 (en) | 2008-09-22 | 2012-10-30 | Bespoke Innovations S.A.R.L. | Method for enhancing network application security |
US8804950B1 (en) | 2008-09-30 | 2014-08-12 | Juniper Networks, Inc. | Methods and apparatus for producing a hash value based on a hash function |
JP2010087888A (ja) | 2008-09-30 | 2010-04-15 | Onkyo Corp | 暗号鍵配信システム、暗号鍵配信サーバ、コンテンツ配信サーバ、及びクライアント |
US8699704B2 (en) | 2010-01-13 | 2014-04-15 | Entropic Communications, Inc. | Secure node admission in a communication network |
US9165154B2 (en) | 2009-02-16 | 2015-10-20 | Microsoft Technology Licensing, Llc | Trusted cloud computing and services framework |
US8245037B1 (en) | 2009-02-17 | 2012-08-14 | Amazon Technologies, Inc. | Encryption key management |
US8284945B2 (en) | 2009-06-02 | 2012-10-09 | Hewlett-Packard Development Company, L.P. | Automatic change of symmetrical encryption key |
US9031876B2 (en) | 2009-06-19 | 2015-05-12 | Hewlett-Packard Development Company, L.P. | Managing keys for encrypted shared documents |
US8799322B2 (en) | 2009-07-24 | 2014-08-05 | Cisco Technology, Inc. | Policy driven cloud storage management and cloud storage policy router |
US8904169B2 (en) | 2009-09-15 | 2014-12-02 | Symantec Corporation | Just in time trust establishment and propagation |
US9311465B2 (en) | 2009-09-21 | 2016-04-12 | James McNulty | Secure information storage and retrieval apparatus and method |
IL201351A0 (en) | 2009-10-01 | 2010-05-31 | Michael Feldbau | Device and method for electronic signature via proxy |
DE102009046436A1 (de) | 2009-11-05 | 2011-05-12 | Robert Bosch Gmbh | Kryptographisches Hardwaremodul bzw. Verfahren zur Aktualisierung eines kryptographischen Schlüssels |
WO2011073894A1 (en) | 2009-12-18 | 2011-06-23 | Koninklijke Philips Electronics N.V. | Digital rights management using attribute-based encryption |
GB201000288D0 (en) | 2010-01-11 | 2010-02-24 | Scentrics Information Security | System and method of enforcing a computer policy |
US20110213971A1 (en) | 2010-03-01 | 2011-09-01 | Nokia Corporation | Method and apparatus for providing rights management at file system level |
US8667269B2 (en) | 2010-04-02 | 2014-03-04 | Suridx, Inc. | Efficient, secure, cloud-based identity services |
EP2378451B1 (en) | 2010-04-19 | 2018-07-04 | Vodafone Holding GmbH | User authentication in a tag-based service |
US8601263B1 (en) | 2010-05-18 | 2013-12-03 | Google Inc. | Storing encrypted objects |
US20120079289A1 (en) | 2010-09-27 | 2012-03-29 | Skymedi Corporation | Secure erase system for a solid state non-volatile memory device |
US8401186B2 (en) | 2010-11-29 | 2013-03-19 | Beijing Z&W Technology Consulting Co., Ltd. | Cloud storage data access method, apparatus and system based on OTP |
US8565422B2 (en) * | 2010-12-03 | 2013-10-22 | Salesforce.Com, Inc. | Method and system for enryption key versioning and key rotation in a multi-tenant environment |
KR101145766B1 (ko) | 2010-12-10 | 2012-05-16 | 고려대학교 산학협력단 | 보안 서비스 제공 시스템 및 방법 |
US8478858B2 (en) | 2011-02-01 | 2013-07-02 | Limelight Networks, Inc. | Policy management for content storage in content delivery networks |
US8588426B2 (en) | 2011-02-21 | 2013-11-19 | Blackberry Limited | Methods and apparatus to secure communications in a mobile network |
EP2515499B1 (de) * | 2011-04-21 | 2015-10-28 | Wibu-Systems AG | Verfahren zum Erzeugen eines kryptographischen Schlüssels für ein geschütztes digitales Datenobjekt auf Basis von aktuellen Komponenten eines Rechners |
US8850593B2 (en) | 2011-05-12 | 2014-09-30 | Hewlett-Packard Development Company, L.P. | Data management using a virtual machine-data image |
US9076020B2 (en) | 2011-05-13 | 2015-07-07 | Microsoft Technology Licensing, Llc | Protected mode for mobile communication and other devices |
US9049023B2 (en) | 2011-05-24 | 2015-06-02 | Zeutro Llc | Outsourcing the decryption of functional encryption ciphertexts |
US9106632B2 (en) | 2011-05-26 | 2015-08-11 | First Data Corporation | Provisioning by delivered items |
KR20120134509A (ko) | 2011-06-02 | 2012-12-12 | 삼성전자주식회사 | 어플리케이션 개발 시스템에서 디바이스용 어플리케이션을 생성 및 설치하기 위한 장치 및 방법 |
US8516244B2 (en) | 2011-06-10 | 2013-08-20 | Zeutro Llc | System, apparatus and method for decentralizing attribute-based encryption information |
US20120323990A1 (en) | 2011-06-15 | 2012-12-20 | Microsoft Corporation | Efficient state reconciliation |
US8806204B2 (en) | 2011-06-20 | 2014-08-12 | Liaison Technologies, Inc. | Systems and methods for maintaining data security across multiple active domains |
US8751807B2 (en) | 2011-06-23 | 2014-06-10 | Azuki Systems Inc. | Method and system for secure over-the-top live video delivery |
US9009315B2 (en) | 2011-07-28 | 2015-04-14 | Telefonaktiebolaget L M Ericsson (Publ) | Hierarchical delegation and reservation of lookup keys |
US8798273B2 (en) | 2011-08-19 | 2014-08-05 | International Business Machines Corporation | Extending credential type to group Key Management Interoperability Protocol (KMIP) clients |
US8788843B2 (en) | 2011-10-28 | 2014-07-22 | LogMeln, Inc. | Storing user data in a service provider cloud without exposing user-specific secrets to the service provider |
US8774403B2 (en) | 2011-12-08 | 2014-07-08 | Dark Matter Labs, Inc. | Key creation and rotation for data encryption |
US8639951B2 (en) | 2011-12-19 | 2014-01-28 | International Business Machines Corporation | States for breakout appliance in a mobile data network |
US8954758B2 (en) | 2011-12-20 | 2015-02-10 | Nicolas LEOUTSARAKOS | Password-less security and protection of online digital assets |
US9449183B2 (en) | 2012-01-28 | 2016-09-20 | Jianqing Wu | Secure file drawer and safe |
US9237446B2 (en) | 2012-05-24 | 2016-01-12 | Blackberry Limited | System and method for controlling access to media content |
US9590959B2 (en) | 2013-02-12 | 2017-03-07 | Amazon Technologies, Inc. | Data security service |
WO2014011453A2 (en) | 2012-07-09 | 2014-01-16 | Jvl Ventures, Llc | Systems, methods, and computer program products for integrating third party services with a mobile wallet |
US9137222B2 (en) | 2012-10-31 | 2015-09-15 | Vmware, Inc. | Crypto proxy for cloud storage services |
US8713311B1 (en) | 2012-11-07 | 2014-04-29 | Google Inc. | Encryption using alternate authentication key |
US8997197B2 (en) | 2012-12-12 | 2015-03-31 | Citrix Systems, Inc. | Encryption-based data access management |
US10038679B2 (en) | 2012-12-24 | 2018-07-31 | Intel Corporation | Centralized secure device pairing |
JP6112874B2 (ja) | 2013-01-21 | 2017-04-12 | キヤノン株式会社 | 通信装置、通信装置の制御方法、および、プログラム |
US9547771B2 (en) | 2013-02-12 | 2017-01-17 | Amazon Technologies, Inc. | Policy enforcement with associated data |
US9311500B2 (en) * | 2013-09-25 | 2016-04-12 | Amazon Technologies, Inc. | Data security using request-supplied keys |
US9094453B2 (en) | 2013-11-06 | 2015-07-28 | Google Technology Holdings LLC | Method and apparatus for associating mobile devices using audio signature detection |
-
2015
- 2015-03-31 US US14/675,614 patent/US10469477B2/en active Active
-
2016
- 2016-03-25 CN CN201680023756.5A patent/CN107534667B/zh active Active
- 2016-03-25 EP EP16714716.4A patent/EP3278533A1/en active Pending
- 2016-03-25 SG SG11201707796PA patent/SG11201707796PA/en unknown
- 2016-03-25 CN CN202110787083.3A patent/CN113381857A/zh active Pending
- 2016-03-25 KR KR1020177030633A patent/KR101985187B1/ko active IP Right Grant
- 2016-03-25 CA CA3147153A patent/CA3147153A1/en active Pending
- 2016-03-25 CA CA2980590A patent/CA2980590C/en active Active
- 2016-03-25 AU AU2016243115A patent/AU2016243115B2/en active Active
- 2016-03-25 JP JP2017549404A patent/JP6499310B2/ja active Active
- 2016-03-25 WO PCT/US2016/024302 patent/WO2016160597A1/en active Application Filing
- 2016-03-25 KR KR1020197015198A patent/KR102311843B1/ko active IP Right Grant
-
2019
- 2019-03-14 JP JP2019047189A patent/JP6838799B2/ja active Active
- 2019-05-06 AU AU2019203153A patent/AU2019203153B9/en active Active
- 2019-11-04 US US16/673,703 patent/US11374916B2/en active Active
-
2021
- 2021-09-09 AU AU2021229223A patent/AU2021229223A1/en not_active Abandoned
Also Published As
Publication number | Publication date |
---|---|
US20200099674A1 (en) | 2020-03-26 |
CN113381857A (zh) | 2021-09-10 |
JP6838799B2 (ja) | 2021-03-03 |
EP3278533A1 (en) | 2018-02-07 |
US10469477B2 (en) | 2019-11-05 |
KR20190062615A (ko) | 2019-06-05 |
WO2016160597A1 (en) | 2016-10-06 |
AU2019203153B9 (en) | 2021-06-24 |
KR20170131577A (ko) | 2017-11-29 |
AU2019203153B2 (en) | 2021-06-10 |
CA3147153A1 (en) | 2016-10-06 |
SG11201707796PA (en) | 2017-10-30 |
KR101985187B1 (ko) | 2019-06-04 |
US11374916B2 (en) | 2022-06-28 |
JP6499310B2 (ja) | 2019-04-10 |
JP2018511247A (ja) | 2018-04-19 |
CA2980590C (en) | 2022-04-12 |
US20170006018A1 (en) | 2017-01-05 |
AU2016243115A1 (en) | 2017-10-19 |
CN107534667A (zh) | 2018-01-02 |
AU2021229223A1 (en) | 2021-10-07 |
AU2016243115B2 (en) | 2019-02-07 |
KR102311843B1 (ko) | 2021-10-14 |
CN107534667B (zh) | 2021-07-30 |
AU2019203153A1 (en) | 2019-05-30 |
CA2980590A1 (en) | 2016-10-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6838799B2 (ja) | キーエクスポート技術 | |
US20240126895A1 (en) | Data security using request-supplied keys | |
US10511633B2 (en) | Trusted-code generated requests | |
US11329962B2 (en) | Pluggable cipher suite negotiation | |
US11184155B2 (en) | Cryptographic key management for imported cryptographic keys | |
US20220166631A1 (en) | Complete forward access sessions | |
US9973481B1 (en) | Envelope-based encryption method | |
US11570158B2 (en) | Efficient use of keystreams | |
US9596263B1 (en) | Obfuscation and de-obfuscation of identifiers |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20190415 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20190424 |
|
A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20191120 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20200107 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20200319 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20201006 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20201204 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20210112 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20210208 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 6838799 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |