JP5552541B2 - 検証可能な耐漏洩性暗号化および復号化 - Google Patents
検証可能な耐漏洩性暗号化および復号化 Download PDFInfo
- Publication number
- JP5552541B2 JP5552541B2 JP2012542196A JP2012542196A JP5552541B2 JP 5552541 B2 JP5552541 B2 JP 5552541B2 JP 2012542196 A JP2012542196 A JP 2012542196A JP 2012542196 A JP2012542196 A JP 2012542196A JP 5552541 B2 JP5552541 B2 JP 5552541B2
- Authority
- JP
- Japan
- Prior art keywords
- key
- segment
- hash
- encryption
- message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1408—Protection against unauthorised use of memory or access to memory by using cryptography
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/556—Detecting local intrusion or implementing counter-measures involving covert channels, i.e. data leakage between processes
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/76—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in application-specific integrated circuits [ASIC] or field-programmable devices, e.g. field-programmable gate arrays [FPGA] or programmable logic devices [PLD]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
- G06F8/71—Version control; Configuration management
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44505—Configuring for program initiating, e.g. using registry, configuration files
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/003—Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
- H04L9/16—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/75—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
- G06F21/755—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation with measures against power attack
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2212/00—Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
- G06F2212/40—Specific encoding of data in memory or cache
- G06F2212/402—Encrypted data
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/034—Test or assess a computer or a system
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2125—Just-in-time application of countermeasures, e.g., on-the-fly decryption, just-in-time obfuscation or de-obfuscation
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2145—Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/24—Key scheduling, i.e. generating round keys or sub-keys for block encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/061—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Mathematical Physics (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Applications Claiming Priority (5)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US26694809P | 2009-12-04 | 2009-12-04 | |
| US61/266,948 | 2009-12-04 | ||
| US12/958,570 US8386800B2 (en) | 2009-12-04 | 2010-12-02 | Verifiable, leak-resistant encryption and decryption |
| US12/958,570 | 2010-12-02 | ||
| PCT/US2010/058768 WO2011068996A1 (en) | 2009-12-04 | 2010-12-02 | Verifiable, leak-resistant encryption and decryption |
Related Child Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2014065462A Division JP5805249B2 (ja) | 2009-12-04 | 2014-03-27 | 検証可能な耐漏洩性暗号化および復号化 |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| JP2013513312A JP2013513312A (ja) | 2013-04-18 |
| JP2013513312A5 JP2013513312A5 (enExample) | 2013-06-13 |
| JP5552541B2 true JP5552541B2 (ja) | 2014-07-16 |
Family
ID=44083176
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2012542196A Active JP5552541B2 (ja) | 2009-12-04 | 2010-12-02 | 検証可能な耐漏洩性暗号化および復号化 |
| JP2014065462A Active JP5805249B2 (ja) | 2009-12-04 | 2014-03-27 | 検証可能な耐漏洩性暗号化および復号化 |
Family Applications After (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2014065462A Active JP5805249B2 (ja) | 2009-12-04 | 2014-03-27 | 検証可能な耐漏洩性暗号化および復号化 |
Country Status (8)
| Country | Link |
|---|---|
| US (10) | US8386800B2 (enExample) |
| EP (2) | EP3537653B1 (enExample) |
| JP (2) | JP5552541B2 (enExample) |
| KR (1) | KR101714108B1 (enExample) |
| CN (1) | CN102725737B (enExample) |
| IL (1) | IL219906A (enExample) |
| TW (1) | TWI440351B (enExample) |
| WO (1) | WO2011068996A1 (enExample) |
Families Citing this family (302)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10181953B1 (en) | 2013-09-16 | 2019-01-15 | Amazon Technologies, Inc. | Trusted data verification |
| US7587044B2 (en) | 1998-01-02 | 2009-09-08 | Cryptography Research, Inc. | Differential power analysis method and apparatus |
| US8874477B2 (en) | 2005-10-04 | 2014-10-28 | Steven Mark Hoffberg | Multifactorial optimization system and method |
| CN101401341B (zh) * | 2005-11-18 | 2016-06-01 | 安全第一公司 | 安全数据解析方法和系统 |
| US20090307140A1 (en) * | 2008-06-06 | 2009-12-10 | Upendra Mardikar | Mobile device over-the-air (ota) registration and point-of-sale (pos) payment |
| US9680637B2 (en) | 2009-05-01 | 2017-06-13 | Harris Corporation | Secure hashing device using multiple different SHA variants and related methods |
| US10454674B1 (en) * | 2009-11-16 | 2019-10-22 | Arm Limited | System, method, and device of authenticated encryption of messages |
| JP5552541B2 (ja) | 2009-12-04 | 2014-07-16 | クリプトグラフィ リサーチ, インコーポレイテッド | 検証可能な耐漏洩性暗号化および復号化 |
| WO2011097482A1 (en) | 2010-02-05 | 2011-08-11 | Maxlinear, Inc. | Conditional access integration in a soc for mobile tv applications |
| WO2011119985A2 (en) | 2010-03-26 | 2011-09-29 | Maxlinear, Inc. | Firmware authentication and deciphering for secure tv receiver |
| US8935520B2 (en) | 2010-03-30 | 2015-01-13 | Maxlinear, Inc. | Control word obfuscation in secure TV receiver |
| US9602277B2 (en) | 2010-06-07 | 2017-03-21 | Protected Mobilty, Llc | User interface systems and methods for secure message oriented communications |
| US9172680B2 (en) | 2010-06-07 | 2015-10-27 | Protected Mobility, Llc | Systems and methods for enabling secure messaging, command, and control of remote devices, communicated via a short message service or other message oriented communications mediums |
| US8984271B2 (en) | 2010-06-07 | 2015-03-17 | Protected Mobility, Llc | User interface systems and methods for input and display of secure and insecure message oriented communications |
| US9143324B2 (en) * | 2010-06-07 | 2015-09-22 | Protected Mobility, Llc | Secure messaging |
| US8892855B2 (en) * | 2010-08-10 | 2014-11-18 | Maxlinear, Inc. | Encryption keys distribution for conditional access software in TV receiver SOC |
| CN101925060A (zh) * | 2010-08-27 | 2010-12-22 | 西安西电捷通无线网络通信股份有限公司 | 一种资源受限网络的实体鉴别方法及系统 |
| CN102014386B (zh) * | 2010-10-15 | 2012-05-09 | 西安西电捷通无线网络通信股份有限公司 | 一种基于对称密码算法的实体鉴别方法及系统 |
| US8924706B2 (en) | 2010-11-05 | 2014-12-30 | Protected Mobility, Llc | Systems and methods using one time pads during the exchange of cryptographic material |
| US9237155B1 (en) | 2010-12-06 | 2016-01-12 | Amazon Technologies, Inc. | Distributed policy enforcement with optimizing policy transformations |
| JP2012169756A (ja) * | 2011-02-10 | 2012-09-06 | Hitachi Ltd | 暗号化通信検査システム |
| JP5286380B2 (ja) * | 2011-03-07 | 2013-09-11 | 株式会社東芝 | データ送信装置および送信方法 |
| EP2523385B1 (en) * | 2011-05-05 | 2017-07-12 | Proton World International N.V. | Method and circuit for cryptographic operation |
| US9438418B1 (en) * | 2011-05-06 | 2016-09-06 | Altera Corporation | Systems and methods for generating a key difficult to clone |
| US8769642B1 (en) | 2011-05-31 | 2014-07-01 | Amazon Technologies, Inc. | Techniques for delegation of access privileges |
| IL213497A0 (en) * | 2011-06-12 | 2011-08-31 | Eliphaz Hibshoosh | Light public key cryptography |
| EP2535804A1 (en) * | 2011-06-17 | 2012-12-19 | Thomson Licensing | Fault-resistant exponentiation algorithm |
| US8862767B2 (en) | 2011-09-02 | 2014-10-14 | Ebay Inc. | Secure elements broker (SEB) for application communication channel selector optimization |
| FR2980607B1 (fr) * | 2011-09-27 | 2014-04-25 | Proton World Int Nv | Procede de derivation de cles dans un circuit integre |
| US9197409B2 (en) | 2011-09-29 | 2015-11-24 | Amazon Technologies, Inc. | Key derivation techniques |
| US9203613B2 (en) | 2011-09-29 | 2015-12-01 | Amazon Technologies, Inc. | Techniques for client constructed sessions |
| US9178701B2 (en) | 2011-09-29 | 2015-11-03 | Amazon Technologies, Inc. | Parameter based key derivation |
| US9553725B2 (en) * | 2011-11-21 | 2017-01-24 | Combined Conditional Access Development And Support, Llc | System and method for authenticating data |
| US10797864B2 (en) * | 2011-11-21 | 2020-10-06 | Combined Conditional Access Development And Support, Llc | System and method for authenticating data while minimizing bandwidth |
| US8627488B2 (en) * | 2011-12-05 | 2014-01-07 | At&T Intellectual Property I, L.P. | Methods and apparatus to anonymize a dataset of spatial data |
| US20180083930A1 (en) * | 2011-12-12 | 2018-03-22 | International Business Machines Corporation | Reads for dispersed computation jobs |
| US9674155B2 (en) * | 2011-12-12 | 2017-06-06 | International Business Machines Corporation | Encrypting segmented data in a distributed computing system |
| US10360106B2 (en) | 2011-12-12 | 2019-07-23 | International Business Machines Corporation | Throttled real-time writes |
| WO2013089682A1 (en) | 2011-12-13 | 2013-06-20 | Intel Corporation | Method and apparatus to process keccak secure hashing algorithm |
| US8984273B2 (en) | 2011-12-16 | 2015-03-17 | Protected Mobility, Llc | Method to provide secure multimedia messaging between peer systems |
| WO2013095547A1 (en) | 2011-12-22 | 2013-06-27 | Intel Corporation | Apparatus and method of execution unit for calculating multiple rounds of a skein hashing algorithm |
| KR101264286B1 (ko) | 2012-01-13 | 2013-05-22 | 고려대학교 산학협력단 | 데이터베이스 암호화 시스템 및 방법 |
| US9544075B2 (en) | 2012-02-22 | 2017-01-10 | Qualcomm Incorporated | Platform for wireless identity transmitter and system using short range wireless broadcast |
| US10419907B2 (en) | 2012-02-22 | 2019-09-17 | Qualcomm Incorporated | Proximity application discovery and provisioning |
| US9329879B2 (en) * | 2012-02-23 | 2016-05-03 | Qualcomm Innovation Center, Inc. | Device, method, and system to enable secure distribution of javascripts |
| JP5612006B2 (ja) | 2012-03-13 | 2014-10-22 | 株式会社東芝 | データ送信装置、データ受信装置、及びプログラム |
| TWI451741B (zh) * | 2012-03-19 | 2014-09-01 | Chiou Haun Lee | 以xor運算於三方通訊之加解密方法 |
| US8892865B1 (en) * | 2012-03-27 | 2014-11-18 | Amazon Technologies, Inc. | Multiple authority key derivation |
| US8739308B1 (en) | 2012-03-27 | 2014-05-27 | Amazon Technologies, Inc. | Source identification for unauthorized copies of content |
| US9215076B1 (en) | 2012-03-27 | 2015-12-15 | Amazon Technologies, Inc. | Key generation for hierarchical data access |
| DE102012206272A1 (de) * | 2012-04-17 | 2013-10-17 | Beckhoff Automation Gmbh | Feldbus-Datenübertragung |
| US10360593B2 (en) | 2012-04-24 | 2019-07-23 | Qualcomm Incorporated | Retail proximity marketing |
| US9380032B2 (en) * | 2012-04-25 | 2016-06-28 | International Business Machines Corporation | Encrypting data for storage in a dispersed storage network |
| US10795766B2 (en) | 2012-04-25 | 2020-10-06 | Pure Storage, Inc. | Mapping slice groupings in a dispersed storage network |
| US10621044B2 (en) | 2012-04-25 | 2020-04-14 | Pure Storage, Inc. | Mapping slice groupings in a dispersed storage network |
| US9258118B1 (en) | 2012-06-25 | 2016-02-09 | Amazon Technologies, Inc. | Decentralized verification in a distributed system |
| US9660972B1 (en) | 2012-06-25 | 2017-05-23 | Amazon Technologies, Inc. | Protection from data security threats |
| US9166958B2 (en) * | 2012-07-17 | 2015-10-20 | Texas Instruments Incorporated | ID-based control unit-key fob pairing |
| US9160719B2 (en) | 2012-07-20 | 2015-10-13 | Protected Mobility, Llc | Hiding ciphertext using a linguistics algorithm with dictionaries |
| US8917868B2 (en) * | 2012-08-22 | 2014-12-23 | Vixs Systems, Inc. | Adaptable encryption device and methods for use therewith |
| US11126418B2 (en) * | 2012-10-11 | 2021-09-21 | Mcafee, Llc | Efficient shared image deployment |
| US9189225B2 (en) * | 2012-10-16 | 2015-11-17 | Imprivata, Inc. | Secure, non-disruptive firmware updating |
| KR20140052243A (ko) * | 2012-10-23 | 2014-05-07 | 한국전자통신연구원 | 네트워크 데이터 서비스 장치 및 방법, 네트워크 데이터 서비스를 위한 클라이언트 단말 장치 |
| US8886926B2 (en) * | 2012-11-07 | 2014-11-11 | Centri Technology, Inc. | Single-pass data compression and encryption |
| JP6366595B2 (ja) * | 2012-11-12 | 2018-08-01 | クリプトグラフィ リサーチ, インコーポレイテッド | 耐グリッチ性暗号離散対数ベースの署名のための方法及びシステム |
| CN103023635B (zh) * | 2012-12-03 | 2015-10-07 | 广东欧珀移动通信有限公司 | 一种信息备份的方法及装置 |
| CN103023653B (zh) * | 2012-12-07 | 2017-03-29 | 哈尔滨工业大学深圳研究生院 | 低功耗的物联网安全组通信方法及装置 |
| US9690759B2 (en) * | 2013-01-03 | 2017-06-27 | Cable Television Laboratories, Inc. | Content linking |
| US9124434B2 (en) | 2013-02-01 | 2015-09-01 | Microsoft Technology Licensing, Llc | Securing a computing device accessory |
| JP6238774B2 (ja) | 2013-02-21 | 2017-11-29 | キヤノン株式会社 | ハッシュ値生成装置 |
| JP6113091B2 (ja) * | 2013-03-07 | 2017-04-12 | キヤノン株式会社 | ハッシュ値生成装置 |
| US9813235B2 (en) | 2013-03-11 | 2017-11-07 | Indian Institute of Technology Kharagpur | Resistance to cache timing attacks on block cipher encryption |
| US9425967B2 (en) | 2013-03-20 | 2016-08-23 | Industrial Technology Research Institute | Method for certificate generation and revocation with privacy preservation |
| JP5931797B2 (ja) * | 2013-05-27 | 2016-06-08 | 日本電信電話株式会社 | 署名システム及び方法、署名生成装置並びに署名検証装置 |
| US9763067B2 (en) | 2013-05-28 | 2017-09-12 | Protected Mobility, Llc | Methods and apparatus for long-short wave, low-high frequency radio secure message service |
| KR101416447B1 (ko) * | 2013-06-17 | 2014-07-10 | (주)씽크에이티 | 전화인증 기반의 정보유출 방지방법 및 시스템 |
| FR3007168B1 (fr) * | 2013-06-18 | 2016-10-07 | Stmicroelectronics Rousset | Mecanisme de verification de l'authenticite d'un produit |
| FR3007169B1 (fr) | 2013-06-18 | 2016-10-07 | Stmicroelectronics Rousset | Procede de verification de l'authenticite d'un produit |
| US9407440B2 (en) | 2013-06-20 | 2016-08-02 | Amazon Technologies, Inc. | Multiple authority data security and access |
| GB2513669B (en) | 2013-06-21 | 2016-07-20 | Visa Europe Ltd | Enabling access to data |
| TWI510046B (zh) * | 2013-07-04 | 2015-11-21 | Univ Nat Cheng Kung | 認證式加解密方法 |
| US9521000B1 (en) | 2013-07-17 | 2016-12-13 | Amazon Technologies, Inc. | Complete forward access sessions |
| US9160525B2 (en) * | 2013-07-19 | 2015-10-13 | Qualcomm Incorporated | Apparatus and method for key update for use in a block cipher algorithm |
| US9736181B2 (en) * | 2013-07-26 | 2017-08-15 | Intel Corporation | Hardening data transmissions against power side channel analysis |
| US10403173B2 (en) * | 2013-08-13 | 2019-09-03 | Fiske Software, Llc | NADO cryptography using one-way functions |
| US9485222B2 (en) * | 2013-08-20 | 2016-11-01 | Hewlett-Packard Development Company, L.P. | Data stream traffic control |
| US9053325B2 (en) * | 2013-08-22 | 2015-06-09 | Freescale Semiconductor, Inc. | Decryption key management system |
| US9189638B1 (en) * | 2013-08-25 | 2015-11-17 | Google Inc. | Systems and methods for multi-function and multi-purpose cryptography |
| TWI631462B (zh) * | 2013-09-10 | 2018-08-01 | 系微股份有限公司 | 確保機板上匯流排交易安全的計算系統和計算設備實現的方法以及非暫時性的電腦可讀取媒體 |
| US9218235B2 (en) * | 2013-09-25 | 2015-12-22 | Lexmark International, Inc. | Systems and methods of verifying operational information associated with an imaging device |
| US9311500B2 (en) | 2013-09-25 | 2016-04-12 | Amazon Technologies, Inc. | Data security using request-supplied keys |
| US9237019B2 (en) | 2013-09-25 | 2016-01-12 | Amazon Technologies, Inc. | Resource locators with keys |
| CN103761456B (zh) * | 2013-10-12 | 2016-05-11 | 利尔达科技集团股份有限公司 | 一种单片机核心代码防破解的方法 |
| FR3012234B1 (fr) * | 2013-10-23 | 2017-02-24 | Proton World Int Nv | Protection de l'execution d'un algorithme contre des attaques par canaux caches |
| US10243945B1 (en) | 2013-10-28 | 2019-03-26 | Amazon Technologies, Inc. | Managed identity federation |
| US9178699B2 (en) * | 2013-11-06 | 2015-11-03 | Blackberry Limited | Public key encryption algorithms for hard lock file encryption |
| US9420007B1 (en) | 2013-12-04 | 2016-08-16 | Amazon Technologies, Inc. | Access control using impersonization |
| EP2884692B1 (en) * | 2013-12-13 | 2020-05-20 | Nxp B.V. | Updating software on a secure element |
| CN103729602B (zh) * | 2013-12-18 | 2016-08-17 | 东莞市乐升电子有限公司 | 利用电源管理控制器对系统进行加密保护的方法 |
| CN104753661A (zh) * | 2013-12-30 | 2015-07-01 | 上海格尔软件股份有限公司 | 一种用于商用密码设备的密钥描述文件 |
| US9369461B1 (en) | 2014-01-07 | 2016-06-14 | Amazon Technologies, Inc. | Passcode verification using hardware secrets |
| US9292711B1 (en) | 2014-01-07 | 2016-03-22 | Amazon Technologies, Inc. | Hardware secret usage limits |
| US9374368B1 (en) | 2014-01-07 | 2016-06-21 | Amazon Technologies, Inc. | Distributed passcode verification system |
| US9270662B1 (en) | 2014-01-13 | 2016-02-23 | Amazon Technologies, Inc. | Adaptive client-aware session security |
| EP2902934B1 (en) * | 2014-02-03 | 2019-04-10 | Nxp B.V. | Portable Security Device, Method for Securing a Data Exchange and Computer Program Product |
| US20150242620A1 (en) * | 2014-02-27 | 2015-08-27 | Microsemi SoC Corporation | Methods for controlling the use of intellectual property in individual integrated circuit devices |
| US10771255B1 (en) | 2014-03-25 | 2020-09-08 | Amazon Technologies, Inc. | Authenticated storage operations |
| WO2015144764A1 (de) * | 2014-03-26 | 2015-10-01 | Continental Teves Ag & Co. Ohg | Verfahren und system zur verbesserung der datensicherheit bei einem kommunikationsvorgang |
| US9473296B2 (en) * | 2014-03-27 | 2016-10-18 | Intel Corporation | Instruction and logic for a simon block cipher |
| WO2015173905A1 (ja) | 2014-05-14 | 2015-11-19 | 三菱電機株式会社 | 暗号装置及び記憶システム及び復号装置及び暗号方法及び復号方法及び暗号プログラム及び復号プログラム |
| US9871651B2 (en) | 2014-06-16 | 2018-01-16 | Cisco Technology, Inc. | Differential power analysis countermeasures |
| CN106663389A (zh) * | 2014-06-18 | 2017-05-10 | 詹姆斯·科利尔 | 用于密码术的方法和装置 |
| US10114369B2 (en) | 2014-06-24 | 2018-10-30 | Microsemi SoC Corporation | Identifying integrated circuit origin using tooling signature |
| US9258117B1 (en) | 2014-06-26 | 2016-02-09 | Amazon Technologies, Inc. | Mutual authentication with symmetric secrets and signatures |
| US10326597B1 (en) | 2014-06-27 | 2019-06-18 | Amazon Technologies, Inc. | Dynamic response signing capability in a distributed system |
| US8990556B1 (en) | 2014-08-13 | 2015-03-24 | Gimbal, Inc. | Sharing beacons |
| US9571465B1 (en) * | 2014-09-18 | 2017-02-14 | Amazon Technologies, Inc. | Security verification by message interception and modification |
| US10115467B2 (en) * | 2014-09-30 | 2018-10-30 | Jonker Llc | One time accessible (OTA) non-volatile memory |
| US10839086B2 (en) * | 2014-09-30 | 2020-11-17 | Jonker Llc | Method of operating ephemeral peripheral device |
| US10061738B2 (en) | 2014-09-30 | 2018-08-28 | Jonker Llc | Ephemeral peripheral device |
| CN106716344B (zh) * | 2014-10-03 | 2021-04-30 | 密码研究公司 | 用于密码运算的指数分裂 |
| US9288043B1 (en) * | 2014-10-17 | 2016-03-15 | Motorola Solutions, Inc. | Methods and systems for providing high-security cryptographic keys to mobile radios |
| US10353638B2 (en) | 2014-11-18 | 2019-07-16 | Microsemi SoC Corporation | Security method and apparatus to prevent replay of external memory data to integrated circuits having only one-time programmable non-volatile memory |
| KR102794580B1 (ko) * | 2014-12-03 | 2025-04-10 | 나그라비젼 에스에이알엘 | 메시지 부호화 및 복호화를 위한 블록 암호화 방법 및 이 방법을 구현하기 위한 암호화 장치 |
| US10205710B2 (en) * | 2015-01-08 | 2019-02-12 | Intertrust Technologies Corporation | Cryptographic systems and methods |
| DE102015201298A1 (de) * | 2015-01-26 | 2016-07-28 | Robert Bosch Gmbh | Verfahren zum kryptographischen Bearbeiten von Daten |
| US10013363B2 (en) | 2015-02-09 | 2018-07-03 | Honeywell International Inc. | Encryption using entropy-based key derivation |
| JP6273225B2 (ja) * | 2015-02-26 | 2018-01-31 | 日本電信電話株式会社 | 暗号化システム、暗号化装置、復号装置、暗号化方法、暗号化プログラム、復号プログラム |
| JP6273226B2 (ja) * | 2015-02-26 | 2018-01-31 | 日本電信電話株式会社 | 暗号化システム、認証システム、暗号化装置、復号装置、認証子生成装置、検証装置、暗号化方法、認証方法 |
| US9832022B1 (en) | 2015-02-26 | 2017-11-28 | Altera Corporation | Systems and methods for performing reverse order cryptographic operations on data streams |
| JP6273223B2 (ja) * | 2015-02-26 | 2018-01-31 | 日本電信電話株式会社 | 暗号化システム、暗号化装置、復号装置、暗号化方法、暗号化プログラム、復号プログラム |
| CN104602209A (zh) * | 2015-02-27 | 2015-05-06 | 中国科学院大学 | 一种基于rsa和流密码算法的联合信源短信加密解密方法 |
| US9107152B1 (en) | 2015-03-11 | 2015-08-11 | Gimbal, Inc. | Beacon protocol advertising bi-directional communication availability window |
| CN108064381B (zh) * | 2015-03-30 | 2021-06-18 | 爱迪德技术有限公司 | 用于数据保护的方法 |
| US9697359B2 (en) | 2015-04-15 | 2017-07-04 | Qualcomm Incorporated | Secure software authentication and verification |
| US9703973B2 (en) | 2015-04-28 | 2017-07-11 | International Business Machines Corporation | Customer load of field programmable gate arrays |
| EP3089398B1 (en) * | 2015-04-30 | 2017-10-11 | Nxp B.V. | Securing a cryptographic device |
| US10979553B2 (en) | 2015-05-15 | 2021-04-13 | Overhead Door Corporation | Near field communications activated door access panel |
| US9697340B2 (en) * | 2015-06-14 | 2017-07-04 | Guardtime IP Holdings, Ltd. | System and methods with assured one-time, replay-resistant passwords |
| US10122689B2 (en) | 2015-06-16 | 2018-11-06 | Amazon Technologies, Inc. | Load balancing with handshake offload |
| US10122692B2 (en) | 2015-06-16 | 2018-11-06 | Amazon Technologies, Inc. | Handshake offload |
| DE102015211540A1 (de) * | 2015-06-23 | 2016-12-29 | Bayerische Motoren Werke Aktiengesellschaft | Verfahren, Server, Firewall, Steuergerät, und System zur Programmierung eines Steuergeräts eines Fahrzeugs |
| US10642962B2 (en) | 2015-07-28 | 2020-05-05 | Western Digital Technologies, Inc. | Licensable function for securing stored data |
| US10924270B2 (en) * | 2015-08-31 | 2021-02-16 | Nec Corporation | Secret calculation system, secret calculation apparatus, and secret calculation method |
| US9660803B2 (en) | 2015-09-15 | 2017-05-23 | Global Risk Advisors | Device and method for resonant cryptography |
| CN105224831B (zh) * | 2015-09-29 | 2018-06-15 | 深圳市九洲电器有限公司 | 终端设备标识数据写入方法及系统 |
| WO2017058221A1 (en) * | 2015-09-30 | 2017-04-06 | Hewlett Packard Enterprise Development Lp | Cryptographic-based initialization of memory content |
| US10025600B2 (en) * | 2015-10-02 | 2018-07-17 | Google Llc | NAND-based verified boot |
| US9876641B2 (en) * | 2015-10-08 | 2018-01-23 | The Boeing Company | Data dependent authentication keys for differential power analysis resistant authentication |
| CN105376053B (zh) * | 2015-10-26 | 2019-10-18 | 宁波大学 | 基于Keccak杂凑算法的图像密钥生成方法 |
| GB201519612D0 (en) * | 2015-11-06 | 2015-12-23 | Nagravision Sa | Key sequence generation for cryptographic operations |
| AT517983B1 (de) * | 2015-11-18 | 2018-11-15 | Siemens Ag Oesterreich | Schutz eines Computersystems vor Seitenkanalattacken |
| EP3179668B1 (en) * | 2015-12-11 | 2019-05-22 | Institut Mines-Télécom | Methods and devices for estimating secret values |
| US10897352B2 (en) | 2015-12-16 | 2021-01-19 | Rambus Inc. | Cryptographic management of lifecycle states |
| EP3185464B1 (en) | 2015-12-21 | 2020-05-20 | Hewlett-Packard Development Company, L.P. | Key generation information trees |
| US9930021B2 (en) * | 2016-01-05 | 2018-03-27 | Intel Corporation | Secure devices using entropy multiplexing |
| US10382210B2 (en) * | 2016-01-10 | 2019-08-13 | Apple Inc. | Secure device pairing |
| KR101772554B1 (ko) * | 2016-02-02 | 2017-08-30 | 주식회사 코인플러그 | 파일에 대한 노터리 서비스를 제공하고 상기 노터리 서비스를 사용하여 기록된 파일에 대한 검증을 수행하는 방법 및 서버 |
| EP3217307B1 (en) * | 2016-02-22 | 2018-11-07 | Eshard | Method of testing the resistance of a circuit to a side channel analysis of second order or more |
| EP3364598B1 (en) * | 2016-02-23 | 2020-10-14 | Nchain Holdings Limited | Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys |
| US10089116B2 (en) * | 2016-03-18 | 2018-10-02 | Uber Technologies, Inc. | Secure start system for an autonomous vehicle |
| WO2017161305A1 (en) * | 2016-03-18 | 2017-09-21 | University Of Florida Research Foundation, Incorporated | Bitstream security based on node locking |
| US9946890B2 (en) | 2016-03-18 | 2018-04-17 | Uber Technologies, Inc. | Secure start system for an autonomous vehicle |
| US20200076594A1 (en) * | 2016-03-30 | 2020-03-05 | The Athena Group, Inc. | Key update for masked keys |
| US10456699B2 (en) * | 2016-03-31 | 2019-10-29 | Shenzhen Bell Creative Sccience And Education Co., Ltd. | Modular assembly system |
| ES2957712T3 (es) * | 2016-04-07 | 2024-01-24 | Nagravision Sarl | Dispositivo criptográfico flexible |
| NL2016671B1 (en) * | 2016-04-25 | 2017-11-07 | Fugro N V | GNSS Message Authentication. |
| DE102016107913A1 (de) * | 2016-04-28 | 2017-11-16 | Deutscher Genossenschafts-Verlag Eg | Verfahren zur Übertragung von vertraulichen Nachrichten |
| US9916452B2 (en) | 2016-05-18 | 2018-03-13 | Microsoft Technology Licensing, Llc | Self-contained cryptographic boot policy validation |
| CN106201352B (zh) * | 2016-07-07 | 2019-11-29 | 广东高云半导体科技股份有限公司 | 非易失性fpga片上数据流文件的保密系统及解密方法 |
| US11372964B2 (en) | 2016-07-25 | 2022-06-28 | Apple Inc. | System for and method of authenticating a component of an electronic device |
| US10116440B1 (en) | 2016-08-09 | 2018-10-30 | Amazon Technologies, Inc. | Cryptographic key management for imported cryptographic keys |
| US10348502B2 (en) * | 2016-09-02 | 2019-07-09 | Blackberry Limited | Encrypting and decrypting data on an electronic device |
| US10341102B2 (en) * | 2016-09-02 | 2019-07-02 | Blackberry Limited | Decrypting encrypted data on an electronic device |
| US11496285B2 (en) * | 2016-09-08 | 2022-11-08 | International Business Machines Corporation | Cryptographic side channel resistance using permutation networks |
| US10528765B2 (en) | 2016-09-16 | 2020-01-07 | Intel Corporation | Technologies for secure boot provisioning and management of field-programmable gate array images |
| CH712947B1 (fr) * | 2016-09-23 | 2021-01-29 | Vidoni Pierino | Dispositif et méthode de sécurisation de transmission de données entre un émetteur et un récepteur. |
| US10318748B2 (en) * | 2016-09-30 | 2019-06-11 | Intel Corporation | Techniques to protect fuses against non-destructive attacks |
| KR101825838B1 (ko) * | 2016-10-14 | 2018-02-06 | 영남대학교 산학협력단 | 데이터의 부분 암호화 방법, 데이터의 부분 복호화 방법 및 부분 암호화된 데이터를 복호화하는 프로그램을 저장하는 저장매체 |
| ES2717099T3 (es) * | 2016-10-27 | 2019-06-19 | Hewlett Packard Development Co | Autentificación de artículo sustituible |
| US10708073B2 (en) | 2016-11-08 | 2020-07-07 | Honeywell International Inc. | Configuration based cryptographic key generation |
| US10547460B2 (en) | 2016-11-18 | 2020-01-28 | Qualcomm Incorporated | Message-based key generation using physical unclonable function (PUF) |
| CN106712929A (zh) * | 2016-12-30 | 2017-05-24 | 桂林电子科技大学 | 一种大数据的加密方法 |
| US11190344B2 (en) * | 2017-01-25 | 2021-11-30 | Salesforce.Com, Inc. | Secure user authentication based on multiple asymmetric cryptography key pairs |
| US20180234839A1 (en) | 2017-02-13 | 2018-08-16 | Futurewei Technologies, Inc. | System and Method for User Equipment Identification and Communications |
| JP6894979B2 (ja) * | 2017-02-24 | 2021-06-30 | エヌイーシー ラボラトリーズ ヨーロッパ ゲーエムベーハー | 分散型ブロックチェーンコンセンサスネットワークにおいて新しいブロックに署名する方法 |
| CN106686008B (zh) * | 2017-03-03 | 2019-01-11 | 腾讯科技(深圳)有限公司 | 信息存储方法及装置 |
| GB2560587A (en) * | 2017-03-17 | 2018-09-19 | Univ Oxford Innovation Ltd | Secure data exchange |
| US11128452B2 (en) * | 2017-03-25 | 2021-09-21 | AVAST Software s.r.o. | Encrypted data sharing with a hierarchical key structure |
| CN108733311B (zh) * | 2017-04-17 | 2021-09-10 | 伊姆西Ip控股有限责任公司 | 用于管理存储系统的方法和设备 |
| US10984136B2 (en) * | 2017-04-21 | 2021-04-20 | Micron Technology, Inc. | Secure memory device with unique identifier for authentication |
| US10924261B2 (en) | 2017-05-22 | 2021-02-16 | Arm Limited | Efficient power distribution |
| US10997322B2 (en) | 2017-05-22 | 2021-05-04 | Arm Limited | Efficient power distribution |
| US11290262B2 (en) * | 2017-07-18 | 2022-03-29 | Legic Identsystems Ag | Method and devices for communicating securely between devices |
| US10469272B2 (en) * | 2017-07-28 | 2019-11-05 | Netapp, Inc. | Methods for facilitating secure cloud compute environments and devices thereof |
| US10540297B2 (en) * | 2017-08-03 | 2020-01-21 | Arm Limited | Memory organization for security and reliability |
| US10733313B2 (en) | 2018-02-09 | 2020-08-04 | Arm Limited | Counter integrity tree for memory security |
| CN107609405B (zh) * | 2017-08-03 | 2020-08-18 | 海光信息技术有限公司 | 一种外部安全内存装置及系统级芯片soc |
| US10397000B2 (en) | 2017-08-14 | 2019-08-27 | Raytheon Company | Multi-level authentication for secure supply chain asset management |
| JP6735926B2 (ja) * | 2017-09-01 | 2020-08-05 | 三菱電機株式会社 | 暗号化装置、復号装置、暗号化方法、復号方法、暗号化プログラム及び復号プログラム |
| US10808280B2 (en) * | 2017-09-14 | 2020-10-20 | Colossio, Inc. | Computational phylogenetic analysis |
| US10965456B2 (en) | 2017-09-25 | 2021-03-30 | The Boeing Company | Systems and methods for facilitating data encryption and decryption and erasing of associated information |
| US10924263B2 (en) * | 2017-09-25 | 2021-02-16 | The Boeing Company | Systems and methods for facilitating iterative key generation and data encryption and decryption |
| US10860403B2 (en) | 2017-09-25 | 2020-12-08 | The Boeing Company | Systems and methods for facilitating truly random bit generation |
| CN107911210B (zh) * | 2017-10-20 | 2019-01-22 | 广东省南方数字电视无线传播有限公司 | 视频切片加密、解密方法及相应装置 |
| CN109726363B (zh) * | 2017-10-31 | 2020-05-29 | 阿里巴巴集团控股有限公司 | 一种数据统计方法和装置 |
| CN108063756B (zh) * | 2017-11-21 | 2020-07-03 | 阿里巴巴集团控股有限公司 | 一种密钥管理方法、装置及设备 |
| DE102018100357A1 (de) * | 2018-01-09 | 2019-07-11 | Infineon Technologies Ag | Chip und verfahren zum sicheren speichern von geheimen daten |
| US10706179B2 (en) * | 2018-01-10 | 2020-07-07 | General Electric Company | Secure provisioning of secrets into MPSoC devices using untrusted third-party systems |
| FR3076925B1 (fr) | 2018-01-16 | 2020-01-24 | Proton World International N.V. | Fonction cryptographique |
| US10719607B2 (en) * | 2018-03-19 | 2020-07-21 | Nxp B.V. | Data integrity verification in a non-volatile memory |
| CN108521325B (zh) * | 2018-03-27 | 2021-09-21 | 林喆昊 | 一种适用于系统数据全生命周期的防侧信道攻击方法 |
| US10826694B2 (en) | 2018-04-23 | 2020-11-03 | International Business Machines Corporation | Method for leakage-resilient distributed function evaluation with CPU-enclaves |
| US10673617B1 (en) * | 2018-04-24 | 2020-06-02 | George Antoniou | Methods, system and point-to-point encryption device microchip for AES-sea 512-bit key using identity access management utilizing blockchain ecosystem to improve cybersecurity |
| US10404454B1 (en) | 2018-04-25 | 2019-09-03 | Blockchain Asics Llc | Cryptographic ASIC for derivative key hierarchy |
| US12278893B2 (en) * | 2018-04-25 | 2025-04-15 | EMC IP Holding Company LLC | Lightweight security for internet of things messaging |
| CN112470157B (zh) * | 2018-05-11 | 2025-03-07 | 美国莱迪思半导体公司 | 用于可编程逻辑器件的资产管理系统和方法 |
| WO2019217929A1 (en) | 2018-05-11 | 2019-11-14 | Lattice Semiconductor Corporation | Failure characterization systems and methods for programmable logic devices |
| US11496445B2 (en) | 2018-05-23 | 2022-11-08 | Sideassure, Inc. | Electronic device for secure communications with an automobile |
| US10892903B2 (en) * | 2018-05-29 | 2021-01-12 | Ememory Technology Inc. | Communication system capable of preserving a chip-to-chip integrity |
| CN108830207A (zh) * | 2018-06-06 | 2018-11-16 | 成都邑教云信息技术有限公司 | 一种互联网教育告警系统 |
| US11005663B2 (en) * | 2018-08-13 | 2021-05-11 | Seagate Technology Llc | Secure audit scheme in a distributed data storage system |
| WO2020034118A1 (zh) * | 2018-08-15 | 2020-02-20 | 华为技术有限公司 | 一种安全的数据转移装置、系统和方法 |
| CN109460309B (zh) * | 2018-09-26 | 2020-09-22 | 华南理工大学 | 一种基于FPGA的Keccak算法故障检测系统 |
| CN109471675B (zh) * | 2018-10-30 | 2021-11-19 | 北京无限自在文化传媒股份有限公司 | 一种对于硬件执行改变的方法及其系统 |
| GB2578628B (en) * | 2018-11-01 | 2021-09-15 | Trustonic Ltd | Device attestation techniques |
| RU2710669C1 (ru) * | 2018-11-06 | 2019-12-30 | Открытое Акционерное Общество "Информационные Технологии И Коммуникационные Системы" | Способ шифрования данных |
| US11240025B2 (en) * | 2018-11-09 | 2022-02-01 | Ares Technologies, Inc. | Systems and methods for distributed key storage |
| CN109286501B (zh) * | 2018-11-13 | 2021-07-13 | 北京深思数盾科技股份有限公司 | 用于加密机的认证方法以及加密机 |
| CN109558759B (zh) * | 2018-11-20 | 2021-05-14 | 电子科技大学 | 一种用于非接触式智能卡电磁攻击的模拟信号调理电路 |
| EP3661243A1 (en) * | 2018-11-29 | 2020-06-03 | Nagravision S.A. | Secure beacons |
| CN109617867B (zh) * | 2018-12-04 | 2020-08-14 | 海南高信通科技有限公司 | 一种用于家居设备控制的智能网关系统 |
| KR102567097B1 (ko) * | 2018-12-05 | 2023-08-14 | 삼성전자주식회사 | 임베디드 시스템의 부트 롬 업데이트 방법 및 부팅 방법 |
| ES2941787T3 (es) * | 2018-12-20 | 2023-05-25 | Merck Patent Gmbh | Métodos y sistemas para preparar y realizar una autenticación de objeto |
| US11055409B2 (en) * | 2019-01-06 | 2021-07-06 | Nuvoton Technology Corporation | Protected system |
| EP3697020A1 (de) * | 2019-02-15 | 2020-08-19 | Siemens Aktiengesellschaft | Verfahren zum betreiben von im zähler-modus betriebenen schlüsselstromgeneratoren zur sicheren datenübertragung, schlüsselstromgenerator mit zähler-modus-betrieb zur sicheren datenübertragung und computer-programm-produkt zur schlüsselstromerzeugung |
| KR102621645B1 (ko) * | 2019-03-12 | 2024-01-05 | 삼성전자주식회사 | 보안 집적 회로를 포함하는 전자 장치 |
| DE102019109341B4 (de) * | 2019-04-09 | 2023-07-20 | Nicolai Roider | Verfahren zum sicheren Austausch von verschlüsselten Nachrichten |
| CN110213228B (zh) * | 2019-04-25 | 2021-09-07 | 平安科技(深圳)有限公司 | 一种认证通信的方法、装置、存储介质及计算机设备 |
| US11128471B2 (en) * | 2019-04-25 | 2021-09-21 | Microsoft Technology Licensing, Llc | Accessibility controls in distributed data systems |
| US10554637B1 (en) * | 2019-05-01 | 2020-02-04 | Cyberark Software Ltd. | Secure and reconstructible distribution of data among network resources |
| US11645393B2 (en) | 2019-06-28 | 2023-05-09 | Seagate Technology Llc | Secure booting in a data storage device with front end bus |
| CN110321737B (zh) * | 2019-06-28 | 2020-12-11 | 兆讯恒达科技股份有限公司 | 一种数据加密标准协处理器防注入式攻击的方法 |
| EP3767849A1 (en) * | 2019-07-18 | 2021-01-20 | Nagravision SA | A hardware component and a method for implementing a camouflage of current traces generated by a digital system |
| US11657169B2 (en) * | 2019-08-06 | 2023-05-23 | Red Balloon Security, Inc. | Pin-level encryption for electrical systems |
| WO2021041793A2 (en) * | 2019-08-29 | 2021-03-04 | Carnegie Mellon University | Method for securing logic circuits |
| TWI720694B (zh) * | 2019-11-18 | 2021-03-01 | 中華電信股份有限公司 | 具時間序列演算之燒錄認證裝置及方法 |
| US11582021B1 (en) * | 2019-11-20 | 2023-02-14 | Xilinx, Inc. | Protection against differential power analysis attacks involving initialization vectors |
| KR102094705B1 (ko) * | 2020-01-17 | 2020-03-30 | 주식회사 에프엔에스벨류 | 블록 체인을 기반으로 한 다중 노드 인증 방법 및 이를 위한 장치 |
| US11403433B2 (en) | 2020-01-17 | 2022-08-02 | Visa International Service Association | System, method, and computer program product for encrypting sensitive data using a field programmable gate array |
| CN114041173B (zh) * | 2020-01-19 | 2025-07-11 | 移动眼视觉科技有限公司 | 对来自有资格的成员的群组的数据的匿名收集 |
| EP3860035A1 (en) * | 2020-01-29 | 2021-08-04 | Sebastien Armleder | Storing and determining a data element |
| FR3106909B1 (fr) * | 2020-01-31 | 2022-02-18 | St Microelectronics Grenoble 2 | Circuit intégré configuré pour réaliser des opérations de chiffrement symétrique avec protection de clé secrète |
| US11438152B2 (en) * | 2020-01-31 | 2022-09-06 | Visa International Service Association | Distributed symmetric encryption |
| US11265144B2 (en) | 2020-03-09 | 2022-03-01 | International Business Machines Corporation | Consistent ciphertext creation |
| CN111404682B (zh) * | 2020-03-17 | 2023-04-25 | 江苏恒宝智能系统技术有限公司 | 一种Android环境密钥分段处理方法及装置 |
| EP3893431A1 (de) * | 2020-04-06 | 2021-10-13 | Siemens Aktiengesellschaft | Authentifizierung einer konfiguration einer feldprogrammierbaren logikgatter-anordnung |
| US11573929B2 (en) * | 2020-04-09 | 2023-02-07 | Kyndryl, Inc. | Deduplication of encrypted data using multiple keys |
| WO2021212339A1 (en) * | 2020-04-21 | 2021-10-28 | Citrix Systems, Inc. | Secure translation of sensitive content |
| US11368287B2 (en) | 2020-05-19 | 2022-06-21 | International Business Machines Corporation | Identification of a creator of an encrypted object |
| US20210367794A1 (en) * | 2020-05-21 | 2021-11-25 | Cryptotronix, LLC | Device provisioning system |
| US11416621B2 (en) | 2020-06-18 | 2022-08-16 | Micron Technology, Inc. | Authenticating software images |
| US11599679B2 (en) * | 2020-06-23 | 2023-03-07 | Arm Limited | Electromagnetic and power noise injection for hardware operation concealment |
| US11416639B2 (en) * | 2020-06-29 | 2022-08-16 | Nuvoton Technology Corporation | PQA unlock |
| GB2597539A (en) * | 2020-07-28 | 2022-02-02 | Nchain Holdings Ltd | Generating shared private keys |
| US11789565B2 (en) | 2020-08-18 | 2023-10-17 | Intel Corporation | Lid controller hub architecture for improved touch experiences |
| GB2600684A (en) | 2020-10-28 | 2022-05-11 | Nchain Holdings Ltd | Identifying denial-of-service attacks |
| CN112333698B (zh) * | 2020-11-18 | 2021-08-24 | 深圳大师科技有限公司 | 一种手游终端加密认证方法及装置 |
| CN112668039B (zh) * | 2020-12-11 | 2025-05-30 | 国网信通亿力科技有限责任公司 | 一种电网数据的隐私保护高效聚合及访问控制方法 |
| US11809493B2 (en) * | 2021-01-19 | 2023-11-07 | Micro Focus Llc | System and method for tokenization of data |
| GB2603495A (en) | 2021-02-05 | 2022-08-10 | Nchain Holdings Ltd | Generating shared keys |
| US11501027B2 (en) * | 2021-02-08 | 2022-11-15 | Micron Technology, Inc. | Mechanism to support writing files into a file system mounted in a secure memory device |
| US11539503B2 (en) | 2021-03-03 | 2022-12-27 | Red Hat, Inc. | Container management for cryptanalysis attack protection |
| US12362917B2 (en) * | 2021-03-10 | 2025-07-15 | Epifi Technologies Private Limited | Methods, systems and computer program products for secure encryption of data for transmission via an untrusted intermediary |
| US11929992B2 (en) | 2021-03-31 | 2024-03-12 | Sophos Limited | Encrypted cache protection |
| GB2606169A (en) | 2021-04-27 | 2022-11-02 | Nchain Licensing Ag | Nested threshold signatures |
| US11394308B1 (en) | 2021-05-05 | 2022-07-19 | Arm Limited | Apparatuses and methods for power isolation |
| US11574079B2 (en) | 2021-05-27 | 2023-02-07 | Nuvoton Technology Corporation | Multi-stage provisioning of secret data |
| US11494330B2 (en) * | 2021-06-22 | 2022-11-08 | Intel Corporation | Fuse recipe update mechanism |
| GB2609908B (en) | 2021-08-09 | 2023-10-18 | Nchain Licensing Ag | Generating Digital signatures |
| CN113591089B (zh) * | 2021-08-12 | 2024-06-11 | 上海观安信息技术股份有限公司 | 一种数据混淆加密方法 |
| CN113703838B (zh) * | 2021-08-30 | 2024-01-05 | 远景智能国际私人投资有限公司 | 设备控制方法、装置、设备及存储介质 |
| US12088715B2 (en) * | 2021-09-29 | 2024-09-10 | Richard D'Souza | System and method to enable a secure communication |
| GB2612309A (en) | 2021-10-26 | 2023-05-03 | Nchain Licensing Ag | Threshold signature scheme |
| CN113901503A (zh) * | 2021-10-26 | 2022-01-07 | 北京云迹科技有限公司 | 一种加密方法、加密装置和解密方法、解密装置 |
| US12244686B2 (en) | 2021-11-23 | 2025-03-04 | Samsung Electronics Co., Ltd. | Image sensor, image processing system having the same and operating method of the same |
| US11783043B2 (en) * | 2021-11-23 | 2023-10-10 | ZT Group Int'l, Inc. | Methods for authentication of firmware images in embedded systems |
| WO2023164567A2 (en) * | 2022-02-24 | 2023-08-31 | FortifyIQ, Inc. | Carry-based differential power analysis and its application to testing for vulnerability of sha-2 and hmac-sha-2 to side-channel attack |
| TWI819516B (zh) * | 2022-03-09 | 2023-10-21 | 瑞昱半導體股份有限公司 | 基於消息驗證的金鑰擴展的處理方法與電路 |
| US12494918B2 (en) * | 2022-04-15 | 2025-12-09 | Dish Network L.L.C. | Re-imaging image data on electronic devices |
| TWI806577B (zh) | 2022-04-28 | 2023-06-21 | 瑞昱半導體股份有限公司 | 數位簽章方法及數位簽章的驗證方法 |
| US12169634B2 (en) * | 2022-06-29 | 2024-12-17 | Western Digital Technologies, Inc. | Asynchronous operation completion notification |
| CN115361140B (zh) * | 2022-08-19 | 2023-11-24 | 广州万协通信息技术有限公司 | 安全芯片密钥验证方法及装置 |
| US12407512B2 (en) | 2022-12-21 | 2025-09-02 | Microsoft Technology Licensing, Llc | Securing a computing device accessory |
| US20240214224A1 (en) * | 2022-12-27 | 2024-06-27 | Arizona Board Of Regents On Behalf Of Northern Arizona University | Pseudo-homomorphic authentication of users with biometry |
| WO2024201955A1 (ja) * | 2023-03-30 | 2024-10-03 | 日本電信電話株式会社 | 送信装置、受信装置、通信システム、送信方法、及びプログラム |
| US20240348436A1 (en) * | 2023-04-17 | 2024-10-17 | Arizona Board Of Regents On Behalf Of Northern Arizona University | Biometry with challenge response pair mechanism |
| CN119232364B (zh) * | 2023-06-29 | 2025-09-09 | 智能资安科技股份有限公司 | 基于puf的根密钥与多个数字输入序列纠缠的电子系统及根密钥提取器 |
| US20250007710A1 (en) * | 2023-06-30 | 2025-01-02 | University Of Florida Research Foundation, Incorporated | System and method for secure cloud fpga deployment |
| EP4521281A1 (en) * | 2023-09-11 | 2025-03-12 | Zhuhai Pantum Electronics Co., Ltd. | Data verification method, information processing apparatus, consumable and image-forming apparatus |
| CN118094608B (zh) * | 2024-04-29 | 2024-08-30 | 山东水文印务有限公司 | 水文数据管理方法 |
| DE102024123512B3 (de) * | 2024-06-26 | 2025-12-04 | GM Global Technology Operations LLC | Aktualisierungssystem für kryptografische schlüssel zur aktualisierung von kryptografischen schlüsseln beliebiger länge |
Family Cites Families (179)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20338A (en) * | 1858-05-25 | Window-spring | ||
| US4694491A (en) | 1985-03-11 | 1987-09-15 | General Instrument Corp. | Cryptographic system using interchangeable key blocks and selectable key fragments |
| US4972472A (en) | 1985-03-15 | 1990-11-20 | Tandem Computers Incorporated | Method and apparatus for changing the master key in a cryptographic system |
| JPH01114995A (ja) | 1987-10-29 | 1989-05-08 | Toppan Printing Co Ltd | Icカード |
| JP2698588B2 (ja) | 1987-11-13 | 1998-01-19 | 株式会社東芝 | 携帯可能電子装置 |
| US5115133A (en) | 1990-04-19 | 1992-05-19 | Inomet, Inc. | Testing of body fluid constituents through measuring light reflected from tympanic membrane |
| JPH04251186A (ja) | 1991-01-08 | 1992-09-07 | Kobe Steel Ltd | 液体処理用マイクロ波溶融炉 |
| US5268962A (en) * | 1992-07-21 | 1993-12-07 | Digital Equipment Corporation | Computer network with modified host-to-host encryption keys |
| US5297207A (en) | 1993-05-24 | 1994-03-22 | Degele Steven T | Machine generation of cryptographic keys by non-linear processes similar to processes normally associated with encryption of data |
| US5454037A (en) | 1993-10-28 | 1995-09-26 | Grayline International Limited | Portable secure-telephone communications module |
| US5513261A (en) * | 1993-12-29 | 1996-04-30 | At&T Corp. | Key management scheme for use with electronic cards |
| US5491749A (en) | 1993-12-30 | 1996-02-13 | International Business Machines Corporation | Method and apparatus for entity authentication and key distribution secure against off-line adversarial attacks |
| DK0739560T3 (da) * | 1994-01-13 | 2001-10-01 | Certco Inc | Kryptografisk system og fremgangsmåde med nøgledeponeringsfunktion |
| US5511123A (en) | 1994-08-04 | 1996-04-23 | Northern Telecom Limited | Symmetric cryptographic system for data encryption |
| US5754659A (en) | 1995-12-22 | 1998-05-19 | General Instrument Corporation Of Delaware | Generation of cryptographic signatures using hash keys |
| FR2745924B1 (fr) | 1996-03-07 | 1998-12-11 | Bull Cp8 | Circuit integre perfectionne et procede d'utilisation d'un tel circuit integre |
| US6901509B1 (en) * | 1996-05-14 | 2005-05-31 | Tumbleweed Communications Corp. | Apparatus and method for demonstrating and confirming the status of a digital certificates and other data |
| US6587563B1 (en) | 1997-02-15 | 2003-07-01 | Apple Computer, Inc. | Cryptographic system using chaotic dynamics |
| US5991415A (en) * | 1997-05-12 | 1999-11-23 | Yeda Research And Development Co. Ltd. At The Weizmann Institute Of Science | Method and apparatus for protecting public key schemes from timing and fault attacks |
| US5978475A (en) * | 1997-07-18 | 1999-11-02 | Counterpane Internet Security, Inc. | Event auditing system |
| US6704871B1 (en) * | 1997-09-16 | 2004-03-09 | Safenet, Inc. | Cryptographic co-processor |
| US6327661B1 (en) | 1998-06-03 | 2001-12-04 | Cryptography Research, Inc. | Using unpredictable information to minimize leakage from smartcards and other cryptosystems |
| DE69834431T3 (de) * | 1998-01-02 | 2009-09-10 | Cryptography Research Inc., San Francisco | Leckresistentes kryptographisches verfahren und vorrichtung |
| US7587044B2 (en) | 1998-01-02 | 2009-09-08 | Cryptography Research, Inc. | Differential power analysis method and apparatus |
| US6049878A (en) * | 1998-01-20 | 2000-04-11 | Sun Microsystems, Inc. | Efficient, secure multicasting with global knowledge |
| US7809138B2 (en) * | 1999-03-16 | 2010-10-05 | Intertrust Technologies Corporation | Methods and apparatus for persistent control and protection of content |
| WO1999067919A2 (en) | 1998-06-03 | 1999-12-29 | Cryptography Research, Inc. | Improved des and other cryptographic processes with leak minimization for smartcards and other cryptosystems |
| ATE548819T1 (de) | 1998-06-03 | 2012-03-15 | Cryptography Res Inc | Symmetrisches kryptographisches rechenverfahren und vorrichtung zur verlustminimierung bei chipkarten und anderen verschlüsselungssystemen |
| US6298442B1 (en) | 1998-06-03 | 2001-10-02 | Cryptography Research, Inc. | Secure modular exponentiation with leak minimization for smartcards and other cryptosystems |
| EP1092297B1 (en) * | 1998-07-02 | 2007-04-25 | Cryptography Research Inc. | Leak-resistant cryptographic indexed key update |
| US6816968B1 (en) * | 1998-07-10 | 2004-11-09 | Silverbrook Research Pty Ltd | Consumable authentication protocol and system |
| US6385727B1 (en) * | 1998-09-25 | 2002-05-07 | Hughes Electronics Corporation | Apparatus for providing a secure processing environment |
| US7194092B1 (en) * | 1998-10-26 | 2007-03-20 | Microsoft Corporation | Key-based secure storage |
| US6188987B1 (en) * | 1998-11-17 | 2001-02-13 | Dolby Laboratories Licensing Corporation | Providing auxiliary information with frame-based encoded audio information |
| WO2000046967A1 (en) * | 1999-02-04 | 2000-08-10 | Meteora System Co., Ltd. | Ip key management mechanism with divergence barrier increasing entropy against computational crypto-analyses |
| US6654889B1 (en) | 1999-02-19 | 2003-11-25 | Xilinx, Inc. | Method and apparatus for protecting proprietary configuration data for programmable logic devices |
| US6735313B1 (en) * | 1999-05-07 | 2004-05-11 | Lucent Technologies Inc. | Cryptographic method and apparatus for restricting access to transmitted programming content using hash functions and program identifiers |
| EP1075108A1 (en) * | 1999-07-23 | 2001-02-07 | BRITISH TELECOMMUNICATIONS public limited company | Cryptographic data distribution |
| US6289455B1 (en) * | 1999-09-02 | 2001-09-11 | Crypotography Research, Inc. | Method and apparatus for preventing piracy of digital content |
| US7434046B1 (en) * | 1999-09-10 | 2008-10-07 | Cisco Technology, Inc. | Method and apparatus providing secure multicast group communication |
| US6724894B1 (en) | 1999-11-05 | 2004-04-20 | Pitney Bowes Inc. | Cryptographic device having reduced vulnerability to side-channel attack and method of operating same |
| CN100511329C (zh) * | 2000-01-21 | 2009-07-08 | 索尼公司 | 数据处理设备和数据处理方法 |
| JP2001211153A (ja) * | 2000-01-25 | 2001-08-03 | Murata Mach Ltd | 秘密鍵生成方法 |
| CA2298990A1 (en) * | 2000-02-18 | 2001-08-18 | Cloakware Corporation | Method and system for resistance to power analysis |
| US7089240B2 (en) * | 2000-04-06 | 2006-08-08 | International Business Machines Corporation | Longest prefix match lookup using hash function |
| RU2002100081A (ru) * | 2000-04-06 | 2003-07-27 | Сони Корпорейшн (JP) | Система и способ обработки информации |
| JP4622064B2 (ja) * | 2000-04-06 | 2011-02-02 | ソニー株式会社 | 情報記録装置、情報再生装置、情報記録方法、情報再生方法、および情報記録媒体、並びにプログラム提供媒体 |
| WO2001099331A1 (fr) * | 2000-06-15 | 2001-12-27 | Sony Corporation | Systeme et procede de traitement des informations au moyen d'un bloc de cles de cryptage |
| JP2001358707A (ja) * | 2000-06-15 | 2001-12-26 | Sony Corp | 暗号鍵ブロックを用いた情報処理システムおよび情報処理方法、並びにプログラム提供媒体 |
| JP4660899B2 (ja) * | 2000-07-24 | 2011-03-30 | ソニー株式会社 | データ処理装置およびデータ処理方法、並びにプログラム提供媒体 |
| US7539313B1 (en) * | 2000-09-13 | 2009-05-26 | Nortel Networks Limited | System and method for key management across geographic domains |
| US6993138B1 (en) * | 2000-09-14 | 2006-01-31 | Nortel Networks Limited | Spatial key trees for key management in wireless environments |
| US6931543B1 (en) | 2000-11-28 | 2005-08-16 | Xilinx, Inc. | Programmable logic device with decryption algorithm and decryption key |
| US7117373B1 (en) | 2000-11-28 | 2006-10-03 | Xilinx, Inc. | Bitstream for configuring a PLD with encrypted design data |
| US20020141593A1 (en) * | 2000-12-11 | 2002-10-03 | Kurn David Michael | Multiple cryptographic key linking scheme on a computer system |
| JP4710132B2 (ja) * | 2000-12-26 | 2011-06-29 | ソニー株式会社 | 情報処理システム、および情報処理方法、並びにプログラム記録媒体 |
| US7039803B2 (en) * | 2001-01-26 | 2006-05-02 | International Business Machines Corporation | Method for broadcast encryption and key revocation of stateless receivers |
| JP4019303B2 (ja) | 2001-02-02 | 2007-12-12 | 日本電気株式会社 | 電子透かしに含めた暗号鍵を用いた暗号化装置及び復号化装置並びにそれらの方法 |
| US20020131592A1 (en) * | 2001-03-16 | 2002-09-19 | Harris Hinnant | Entropy sources for encryption key generation |
| US7028191B2 (en) * | 2001-03-30 | 2006-04-11 | Michener John R | Trusted authorization device |
| JP4976622B2 (ja) | 2001-06-22 | 2012-07-18 | 東日本旅客鉄道株式会社 | 踏切制御装置及び踏切制御ネットワーク |
| JP4193380B2 (ja) * | 2001-07-05 | 2008-12-10 | Kddi株式会社 | ストリーム転送における電子署名システム |
| US7237121B2 (en) * | 2001-09-17 | 2007-06-26 | Texas Instruments Incorporated | Secure bootloader for securing digital devices |
| GB0124670D0 (en) * | 2001-10-15 | 2001-12-05 | Hewlett Packard Co | Method and apparatus for encrypting data |
| US7333616B1 (en) * | 2001-11-14 | 2008-02-19 | Omniva Corp. | Approach for managing access to messages using encryption key management policies |
| US7194633B2 (en) * | 2001-11-14 | 2007-03-20 | International Business Machines Corporation | Device and method with reduced information leakage |
| KR20040053101A (ko) * | 2001-11-14 | 2004-06-23 | 인터내셔널 비지네스 머신즈 코포레이션 | 정보 누출이 감소된 장치 및 방법 |
| US7308583B2 (en) * | 2002-01-25 | 2007-12-11 | Matsushita Electric Industrial Co., Ltd. | Data distribution system |
| US7340603B2 (en) * | 2002-01-30 | 2008-03-04 | Sony Corporation | Efficient revocation of receivers |
| US7162644B1 (en) | 2002-03-29 | 2007-01-09 | Xilinx, Inc. | Methods and circuits for protecting proprietary configuration data for programmable logic devices |
| US7545931B2 (en) * | 2002-04-12 | 2009-06-09 | Microsoft Corporation | Protection of application secrets |
| US7487365B2 (en) * | 2002-04-17 | 2009-02-03 | Microsoft Corporation | Saving and retrieving data based on symmetric key encryption |
| US8438392B2 (en) * | 2002-06-20 | 2013-05-07 | Krimmeni Technologies, Inc. | Method and system for control of code execution on a general purpose computing device and control of code execution in a recursive security protocol |
| EP1429224A1 (en) * | 2002-12-10 | 2004-06-16 | Texas Instruments Incorporated | Firmware run-time authentication |
| US7657748B2 (en) * | 2002-08-28 | 2010-02-02 | Ntt Docomo, Inc. | Certificate-based encryption and public key infrastructure |
| KR100940202B1 (ko) * | 2002-08-29 | 2010-02-10 | 삼성전자주식회사 | 일방향 함수를 사용하여 계층적으로 암호화하는 장치 및방법 |
| KR100924773B1 (ko) * | 2002-09-16 | 2009-11-03 | 삼성전자주식회사 | 메타데이터 암호화 및 복호화 방법과 암호화된 메타데이터관리 방법 및 그 시스템 |
| JP4099039B2 (ja) * | 2002-11-15 | 2008-06-11 | 松下電器産業株式会社 | プログラム更新方法 |
| US20090319802A1 (en) * | 2002-12-02 | 2009-12-24 | Silverbrook Research Pty Ltd | Key Genaration In An Integrated Circuit |
| US7278034B2 (en) * | 2002-12-02 | 2007-10-02 | Silverbrook Research Pty Ltd | Integrated circuit which disables writing circuitry to memory when the power drops below a power threshold predetermined and controlled by the processor |
| US20050210179A1 (en) * | 2002-12-02 | 2005-09-22 | Walmsley Simon R | Integrated circuit having random clock or random delay |
| US7613925B2 (en) * | 2003-01-10 | 2009-11-03 | Motorola, Inc. | Method for authenticating a message |
| CN100561396C (zh) | 2003-06-25 | 2009-11-18 | 诺基亚有限公司 | 修改数字权限对象的方法及其所用的电子设备 |
| US7581094B1 (en) * | 2003-07-09 | 2009-08-25 | Hewlett-Packard Development Company, L.P. | Cryptographic checksums enabling data manipulation and transcoding |
| GB2404488B (en) * | 2003-07-31 | 2006-05-31 | Sony Uk Ltd | Access control for digital content |
| GB2404489A (en) * | 2003-07-31 | 2005-02-02 | Sony Uk Ltd | Access control for digital storage medium content |
| GB2404538A (en) * | 2003-07-31 | 2005-02-02 | Sony Uk Ltd | Access control for digital content |
| GB2404467A (en) * | 2003-07-31 | 2005-02-02 | Sony Uk Ltd | Access control for digital content |
| GB2404486A (en) * | 2003-07-31 | 2005-02-02 | Sony Uk Ltd | Access control for digital storage medium content |
| GB2404487A (en) * | 2003-07-31 | 2005-02-02 | Sony Uk Ltd | Access control for digital storage medium content |
| US7366302B2 (en) * | 2003-08-25 | 2008-04-29 | Sony Corporation | Apparatus and method for an iterative cryptographic block |
| EP1519530A1 (en) * | 2003-09-29 | 2005-03-30 | STMicroelectronics S.r.l. | Method for establishing an encrypted communication by means of keys |
| US20050091496A1 (en) * | 2003-10-23 | 2005-04-28 | Hyser Chris D. | Method and system for distributed key management in a secure boot environment |
| US7996671B2 (en) * | 2003-11-17 | 2011-08-09 | Bluerisc Inc. | Security of program executables and microprocessors based on compiler-architecture interaction |
| WO2005052769A1 (ja) * | 2003-11-28 | 2005-06-09 | Matsushita Electric Industrial Co.,Ltd. | データ処理装置 |
| KR100982515B1 (ko) * | 2004-01-08 | 2010-09-16 | 삼성전자주식회사 | 해시 체인을 이용하여 디지털 컨텐츠의 접근 횟수를제한하는 장치 및 방법 |
| US7607025B1 (en) * | 2004-02-26 | 2009-10-20 | Xilinx, Inc. | Methods of intrusion detection and prevention in secure programmable logic devices |
| US20050210014A1 (en) * | 2004-03-08 | 2005-09-22 | Sony Corporation | Information-processing method, decryption method, information-processing apparatus and computer program |
| US20050213751A1 (en) * | 2004-03-26 | 2005-09-29 | Apostolopoulos John J | Methods and systems for generating transcodable encrypted content |
| JP2005286959A (ja) * | 2004-03-31 | 2005-10-13 | Sony Corp | 情報処理方法、復号処理方法、および情報処理装置、並びにコンピュータ・プログラム |
| EP1870814B1 (en) * | 2006-06-19 | 2014-08-13 | Texas Instruments France | Method and apparatus for secure demand paging for processor devices |
| US7483906B2 (en) * | 2004-04-14 | 2009-01-27 | Microsoft Corporation | Method and system for renaming consecutive keys in a B-tree |
| CN1954538B (zh) * | 2004-05-12 | 2012-06-20 | 艾利森电话股份有限公司 | 用于安全广播的密钥管理消息 |
| US9244979B2 (en) * | 2004-07-02 | 2016-01-26 | Oracle International Corporation | Determining predicate selectivity in query costing |
| US20120115455A1 (en) * | 2004-07-26 | 2012-05-10 | Bindu Rama Rao | Secure bootstrap provisioning of electronic devices in carrier networks |
| US20060021066A1 (en) * | 2004-07-26 | 2006-01-26 | Ray Clayton | Data encryption system and method |
| US20060036627A1 (en) * | 2004-08-06 | 2006-02-16 | Roger Deran | Method and apparatus for a restartable hash in a trie |
| WO2006021178A2 (de) * | 2004-08-26 | 2006-03-02 | Deutsche Telekom Ag | Verfahren und sicherheitssystem zur sicheren und eindeutigen kodierung eines sicherheitsmoduls |
| US20060059344A1 (en) * | 2004-09-10 | 2006-03-16 | Nokia Corporation | Service authentication |
| US8332653B2 (en) * | 2004-10-22 | 2012-12-11 | Broadcom Corporation | Secure processing environment |
| KR100727387B1 (ko) * | 2004-10-22 | 2007-06-12 | 삼성전자주식회사 | 네트워크 시스템에서의 키 관리방법 |
| JP4794269B2 (ja) * | 2004-11-08 | 2011-10-19 | パナソニック株式会社 | セキュアデバイスおよび中継端末 |
| JP4496061B2 (ja) * | 2004-11-11 | 2010-07-07 | パナソニック株式会社 | 機密情報処理装置 |
| US7987356B2 (en) * | 2004-11-29 | 2011-07-26 | Broadcom Corporation | Programmable security platform |
| US20060242067A1 (en) * | 2004-12-21 | 2006-10-26 | Fabrice Jogand-Coulomb | System for creating control structure for versatile content control |
| US8051052B2 (en) * | 2004-12-21 | 2011-11-01 | Sandisk Technologies Inc. | Method for creating control structure for versatile content control |
| KR101167751B1 (ko) * | 2005-01-12 | 2012-07-23 | 브리티쉬 텔리커뮤니케이션즈 파블릭 리미티드 캄퍼니 | Rfid 트랜스폰더 보안 시스템 및 그 방법 |
| US7689602B1 (en) * | 2005-07-20 | 2010-03-30 | Bakbone Software, Inc. | Method of creating hierarchical indices for a distributed object system |
| US8190895B2 (en) * | 2005-08-18 | 2012-05-29 | Microsoft Corporation | Authenticated key exchange with derived ephemeral keys |
| KR20080058462A (ko) * | 2005-11-04 | 2008-06-25 | 닛본 덴끼 가부시끼가이샤 | 메시지 인증 장치, 메시지 인증 방법, 메시지 인증 프로그램을 기록한 매체 |
| US8332649B2 (en) * | 2005-11-08 | 2012-12-11 | Panasonic Corporation | Authentication system, signature creating device, and signature verifying device |
| US20070174362A1 (en) | 2006-01-18 | 2007-07-26 | Duc Pham | System and methods for secure digital data archiving and access auditing |
| JP4770494B2 (ja) * | 2006-02-03 | 2011-09-14 | 株式会社日立製作所 | 暗号通信方法およびシステム |
| JP4795812B2 (ja) * | 2006-02-22 | 2011-10-19 | 富士通セミコンダクター株式会社 | セキュアプロセッサ |
| US7706538B1 (en) * | 2006-04-14 | 2010-04-27 | Oracle America, Inc. | System, method and data storage device for encrypting data |
| US7339400B1 (en) | 2006-06-09 | 2008-03-04 | Xilinx, Inc. | Interface port for electrically programmed fuses in a programmable logic device |
| US7424398B2 (en) * | 2006-06-22 | 2008-09-09 | Lexmark International, Inc. | Boot validation system and method |
| US8086850B2 (en) * | 2006-06-23 | 2011-12-27 | Honeywell International Inc. | Secure group communication among wireless devices with distributed trust |
| US8261068B1 (en) * | 2008-09-30 | 2012-09-04 | Emc Corporation | Systems and methods for selective encryption of operating system metadata for host-based encryption of data at rest on a logical unit |
| WO2008004524A1 (en) * | 2006-07-03 | 2008-01-10 | Panasonic Corporation | Certifying device, verifying device, verifying system, computer program and integrated circuit |
| WO2008013287A1 (en) * | 2006-07-27 | 2008-01-31 | Panasonic Corporation | Terminal device, server device, and content distribution system |
| JP4179563B2 (ja) * | 2006-09-21 | 2008-11-12 | インターナショナル・ビジネス・マシーンズ・コーポレーション | 暗号通信の暗号鍵を管理する技術 |
| IL178488A0 (en) * | 2006-10-05 | 2008-01-20 | Nds Ltd | Improved key production system |
| US8683212B2 (en) * | 2006-10-06 | 2014-03-25 | Broadcom Corporation | Method and system for securely loading code in a security processor |
| KR101377455B1 (ko) * | 2006-10-09 | 2014-04-02 | 삼성전자주식회사 | 브로드캐스트 암호화를 위한 암호화 키 생성 방법 및 장치 |
| US8769275B2 (en) * | 2006-10-17 | 2014-07-01 | Verifone, Inc. | Batch settlement transactions system and method |
| KR101213160B1 (ko) * | 2006-11-16 | 2012-12-17 | 삼성전자주식회사 | 그룹 키 업데이트 방법 및 이를 이용한 그룹 키 업데이트장치 |
| US20080172562A1 (en) * | 2007-01-12 | 2008-07-17 | Christian Cachin | Encryption and authentication of data and for decryption and verification of authenticity of data |
| WO2008087734A1 (ja) * | 2007-01-19 | 2008-07-24 | Mitsubishi Electric Corporation | 暗号文生成装置及び暗号通信システム及び群パラメータ生成装置 |
| WO2008147577A2 (en) * | 2007-01-22 | 2008-12-04 | Spyrus, Inc. | Portable data encryption device with configurable security functionality and method for file encryption |
| KR101405915B1 (ko) * | 2007-04-26 | 2014-06-12 | 삼성전자주식회사 | 데이터의 암호화 저장 방법 및 암호화된 데이터의 판독방법 |
| US7876895B2 (en) * | 2007-05-09 | 2011-01-25 | International Business Machines Corporation | System, method, and service for performing unified broadcast encryption and traitor tracing for digital content |
| KR100938262B1 (ko) * | 2007-07-18 | 2010-01-22 | 한국전자통신연구원 | 비밀키 사전분배 방법 |
| US8355982B2 (en) * | 2007-08-16 | 2013-01-15 | Verifone, Inc. | Metrics systems and methods for token transactions |
| JP5053013B2 (ja) * | 2007-09-25 | 2012-10-17 | 京セラ株式会社 | 受信装置、およびストリーム送信装置 |
| JP2009145544A (ja) | 2007-12-13 | 2009-07-02 | Panasonic Corp | プラズマディスプレイ装置 |
| FR2926382B1 (fr) * | 2008-01-11 | 2010-02-26 | Proton World Internat Nv | Hierarchisation de cles cryptographiques dans un circuit electronique |
| JP5525133B2 (ja) | 2008-01-17 | 2014-06-18 | 株式会社日立製作所 | デジタル署名及び認証のためのシステム及び方法 |
| JP4658150B2 (ja) * | 2008-01-25 | 2011-03-23 | Nttエレクトロニクス株式会社 | 暗号化方法および復号方法 |
| US9729316B2 (en) * | 2008-02-27 | 2017-08-08 | International Business Machines Corporation | Unified broadcast encryption system |
| CA2719975C (en) | 2008-04-04 | 2013-08-13 | Samsung Electronics Co., Ltd. | Method and apparatus for providing broadcast service using encryption key in a communication system |
| KR101485460B1 (ko) * | 2008-06-09 | 2015-01-23 | 삼성전자주식회사 | 브로드캐스트 암호화에서 디바이스 키를 추적하는 방법 |
| US20090327741A1 (en) * | 2008-06-30 | 2009-12-31 | Zimmer Vincent J | System and method to secure boot uefi firmware and uefi-aware operating systems on a mobile internet device (mid) |
| US8595504B2 (en) * | 2008-08-12 | 2013-11-26 | Industrial Technology Research Institute | Light weight authentication and secret retrieval |
| FR2935078B1 (fr) | 2008-08-12 | 2012-11-16 | Groupe Des Ecoles De Telecommunications Get Ecole Nationale Superieure Des Telecommunications Enst | Procede de protection du decryptage des fichiers de configuration de circuits logiques programmables et circuit mettant en oeuvre le procede |
| US7986158B2 (en) | 2008-08-21 | 2011-07-26 | OFID Microdevices, Inc. | Methods, apparatuses, and products for a secure circuit |
| US8368517B2 (en) * | 2008-08-22 | 2013-02-05 | Hong Kong R&D Centre for Logistics and Supply Chain Management Enabling Technologies Limited | RFID privacy-preserving authentication system and method |
| US9559842B2 (en) * | 2008-09-30 | 2017-01-31 | Hewlett Packard Enterprise Development Lp | Trusted key management for virtualized platforms |
| JP5457363B2 (ja) * | 2008-10-10 | 2014-04-02 | パナソニック株式会社 | 情報処理装置、認証システム、認証装置、情報処理方法、情報処理プログラム、記録媒体及び集積回路 |
| US8095800B2 (en) | 2008-11-20 | 2012-01-10 | General Dynamics C4 System, Inc. | Secure configuration of programmable logic device |
| US8359480B2 (en) * | 2008-12-19 | 2013-01-22 | University Of Washington | Scalable RFID systems: a privacy preserving protocol with constant-time identification |
| US8190892B2 (en) * | 2008-12-29 | 2012-05-29 | King Fahd University Of Petroleum & Minerals | Message authentication code with blind factorization and randomization |
| US20100169658A1 (en) * | 2008-12-30 | 2010-07-01 | Lahouari Ghouti | Elliptic curve-based message authentication code |
| US8738932B2 (en) * | 2009-01-16 | 2014-05-27 | Teleputers, Llc | System and method for processor-based security |
| KR101062995B1 (ko) * | 2009-01-19 | 2011-09-07 | 충남대학교산학협력단 | Scada 시스템 통신 환경에 효율적인 키 관리 방법 |
| CN102317904B (zh) * | 2009-01-29 | 2015-03-11 | 堡垒应用有限公司 | 带有验证完整性的加密系统和方法 |
| US9112862B2 (en) * | 2009-02-02 | 2015-08-18 | Adobe Systems Incorporated | System and method for parts-based digital rights management |
| US20120099948A1 (en) | 2010-10-21 | 2012-04-26 | Digi-Star, LLC, a Wisconsin Limited Liability Company | Automatic start / stop controls for agricultural load and transfer equipment |
| US8194858B2 (en) * | 2009-02-19 | 2012-06-05 | Physical Optics Corporation | Chaotic cipher system and method for secure communication |
| CN102396251B (zh) * | 2009-04-15 | 2015-06-24 | 交互数字专利控股公司 | 对与网络通信的设备的确认和/或认证 |
| US20100278338A1 (en) * | 2009-05-04 | 2010-11-04 | Mediatek Singapore Pte. Ltd. | Coding device and method with reconfigurable and scalable encryption/decryption modules |
| EP2462507B1 (en) * | 2009-08-04 | 2019-07-24 | Carnegie Mellon University | Methods and apparatuses for user-verifiable trusted path in the presence of malware |
| US8447988B2 (en) * | 2009-09-16 | 2013-05-21 | Lsi Corporation | Hash processing using a processor |
| AU2010302937C1 (en) * | 2009-09-29 | 2014-11-06 | Memjet Technology Limited | Communication system, method and device with limited encryption key retrieval |
| US9094195B2 (en) * | 2009-10-02 | 2015-07-28 | Andrew LEPPARD | Protecting de-duplication repositories against a malicious attack |
| US20120260324A1 (en) * | 2009-11-06 | 2012-10-11 | Emue Holdings Pty Ltd. | Method and a system for validating identifiers |
| JP5552541B2 (ja) * | 2009-12-04 | 2014-07-16 | クリプトグラフィ リサーチ, インコーポレイテッド | 検証可能な耐漏洩性暗号化および復号化 |
| US8261085B1 (en) | 2011-06-22 | 2012-09-04 | Media Patents, S.L. | Methods, apparatus and systems to improve security in computer systems |
| US9552493B2 (en) * | 2015-02-03 | 2017-01-24 | Palo Alto Research Center Incorporated | Access control framework for information centric networking |
-
2010
- 2010-12-02 JP JP2012542196A patent/JP5552541B2/ja active Active
- 2010-12-02 WO PCT/US2010/058768 patent/WO2011068996A1/en not_active Ceased
- 2010-12-02 EP EP19164962.3A patent/EP3537653B1/en active Active
- 2010-12-02 KR KR1020127014536A patent/KR101714108B1/ko active Active
- 2010-12-02 US US12/958,570 patent/US8386800B2/en active Active
- 2010-12-02 EP EP10835139.6A patent/EP2507708B1/en active Active
- 2010-12-02 CN CN201080060319.3A patent/CN102725737B/zh active Active
- 2010-12-03 TW TW099142160A patent/TWI440351B/zh active
-
2012
- 2012-05-21 IL IL219906A patent/IL219906A/en active IP Right Grant
-
2013
- 2013-02-08 US US13/762,703 patent/US8707052B2/en active Active
-
2014
- 2014-03-07 US US14/201,539 patent/US8977864B2/en active Active
- 2014-03-27 JP JP2014065462A patent/JP5805249B2/ja active Active
-
2015
- 2015-02-09 US US14/617,437 patent/US9569623B2/en active Active
- 2015-06-11 US US14/737,154 patent/US9576133B2/en active Active
- 2015-06-26 US US14/752,677 patent/US9367693B2/en active Active
-
2016
- 2016-12-30 US US15/395,809 patent/US10262141B2/en active Active
-
2017
- 2017-08-30 US US15/691,601 patent/US9940463B2/en active Active
-
2019
- 2019-01-04 US US16/240,671 patent/US11074349B2/en active Active
-
2021
- 2021-07-21 US US17/382,333 patent/US11797683B2/en active Active
Also Published As
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11797683B2 (en) | Security chip with resistance to external monitoring attacks | |
| US10482291B2 (en) | Secure field-programmable gate array (FPGA) architecture | |
| Bernstein et al. | Classic McEliece: conservative code-based cryptography | |
| Guajardo et al. | Physical unclonable functions and public-key crypto for FPGA IP protection | |
| US9571289B2 (en) | Methods and systems for glitch-resistant cryptographic signing | |
| JP4216475B2 (ja) | 漏洩抵抗力を有する暗号索引付き鍵の更新方法及びデバイス | |
| Ahola et al. | Device Boot-Up Security Restoration with Post-Quantum Split-Key KEM |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20130422 |
|
| A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20130422 |
|
| A871 | Explanation of circumstances concerning accelerated examination |
Free format text: JAPANESE INTERMEDIATE CODE: A871 Effective date: 20130422 |
|
| A975 | Report on accelerated examination |
Free format text: JAPANESE INTERMEDIATE CODE: A971005 Effective date: 20130510 |
|
| A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20130517 |
|
| A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20130814 |
|
| A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20130821 |
|
| A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20130913 |
|
| A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20130924 |
|
| A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20131016 |
|
| A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20131023 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20131106 |
|
| A02 | Decision of refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A02 Effective date: 20131128 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20140327 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20140404 |
|
| A911 | Transfer to examiner for re-examination before appeal (zenchi) |
Free format text: JAPANESE INTERMEDIATE CODE: A911 Effective date: 20140425 |
|
| TRDD | Decision of grant or rejection written | ||
| A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20140509 |
|
| A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20140526 |
|
| R150 | Certificate of patent or registration of utility model |
Ref document number: 5552541 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |