JP5860815B2 - コンピューターポリシーを施行するためのシステムおよび方法 - Google Patents
コンピューターポリシーを施行するためのシステムおよび方法 Download PDFInfo
- Publication number
- JP5860815B2 JP5860815B2 JP2012547550A JP2012547550A JP5860815B2 JP 5860815 B2 JP5860815 B2 JP 5860815B2 JP 2012547550 A JP2012547550 A JP 2012547550A JP 2012547550 A JP2012547550 A JP 2012547550A JP 5860815 B2 JP5860815 B2 JP 5860815B2
- Authority
- JP
- Japan
- Prior art keywords
- server
- client device
- user
- key
- encryption key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
- H04L9/0897—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
- H04L2209/127—Trusted platform modules [TPM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GBGB1000288.9A GB201000288D0 (en) | 2010-01-11 | 2010-01-11 | System and method of enforcing a computer policy |
| GB1000288.9 | 2010-01-11 | ||
| PCT/GB2011/050033 WO2011083343A2 (en) | 2010-01-11 | 2011-01-11 | System and method of enforcing a computer policy |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| JP2013516685A JP2013516685A (ja) | 2013-05-13 |
| JP2013516685A5 JP2013516685A5 (enExample) | 2014-02-27 |
| JP5860815B2 true JP5860815B2 (ja) | 2016-02-16 |
Family
ID=41819106
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2012547550A Expired - Fee Related JP5860815B2 (ja) | 2010-01-11 | 2011-01-11 | コンピューターポリシーを施行するためのシステムおよび方法 |
Country Status (8)
| Country | Link |
|---|---|
| US (2) | US10122529B2 (enExample) |
| EP (1) | EP2548353B1 (enExample) |
| JP (1) | JP5860815B2 (enExample) |
| CN (1) | CN102812684B (enExample) |
| CA (1) | CA2786975C (enExample) |
| ES (1) | ES2554491T3 (enExample) |
| GB (1) | GB201000288D0 (enExample) |
| WO (1) | WO2011083343A2 (enExample) |
Families Citing this family (70)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB201101507D0 (en) | 2011-01-28 | 2011-03-16 | Scentrics Information Security Technologies Ltd | Mobile device security |
| CN107437035A (zh) * | 2011-08-10 | 2017-12-05 | 瑞穗情报综研株式会社 | 信息管理系统以及信息管理方法 |
| EP2696305B1 (en) * | 2011-08-15 | 2018-03-21 | Huawei Device Co., Ltd. | Method and device for file protection |
| GB2500720A (en) * | 2012-03-30 | 2013-10-02 | Nec Corp | Providing security information to establish secure communications over a device-to-device (D2D) communication link |
| US10075471B2 (en) | 2012-06-07 | 2018-09-11 | Amazon Technologies, Inc. | Data loss prevention techniques |
| US9286491B2 (en) | 2012-06-07 | 2016-03-15 | Amazon Technologies, Inc. | Virtual service provider zones |
| US9590959B2 (en) | 2013-02-12 | 2017-03-07 | Amazon Technologies, Inc. | Data security service |
| US10084818B1 (en) | 2012-06-07 | 2018-09-25 | Amazon Technologies, Inc. | Flexibly configurable data modification services |
| US10255089B2 (en) * | 2012-07-31 | 2019-04-09 | Ca, Inc. | Self-deleting virtual machines |
| JP2014068140A (ja) * | 2012-09-25 | 2014-04-17 | Sony Corp | 情報処理装置、情報処理方法及びプログラム |
| CN104871167A (zh) | 2012-10-25 | 2015-08-26 | 英特尔公司 | 固件中的防盗 |
| US9124635B2 (en) | 2012-11-30 | 2015-09-01 | Intel Corporation | Verified sensor data processing |
| US9774446B1 (en) * | 2012-12-31 | 2017-09-26 | EMC IP Holding Company LLC | Managing use of security keys |
| US9282120B2 (en) | 2013-02-01 | 2016-03-08 | Vidder, Inc. | Securing communication over a network using client integrity verification |
| US10211977B1 (en) | 2013-02-12 | 2019-02-19 | Amazon Technologies, Inc. | Secure management of information using a security module |
| US10467422B1 (en) | 2013-02-12 | 2019-11-05 | Amazon Technologies, Inc. | Automatic key rotation |
| US9367697B1 (en) | 2013-02-12 | 2016-06-14 | Amazon Technologies, Inc. | Data security with a security module |
| US9300464B1 (en) | 2013-02-12 | 2016-03-29 | Amazon Technologies, Inc. | Probabilistic key rotation |
| US9705674B2 (en) | 2013-02-12 | 2017-07-11 | Amazon Technologies, Inc. | Federated key management |
| US10210341B2 (en) | 2013-02-12 | 2019-02-19 | Amazon Technologies, Inc. | Delayed data access |
| US9547771B2 (en) * | 2013-02-12 | 2017-01-17 | Amazon Technologies, Inc. | Policy enforcement with associated data |
| RU2618684C2 (ru) | 2013-04-26 | 2017-05-10 | Закрытое акционерное общество "Лаборатория Касперского" | Система и способ автоматического развертывания системы шифрования для пользователей, ранее работавших на ПК |
| US9832171B1 (en) | 2013-06-13 | 2017-11-28 | Amazon Technologies, Inc. | Negotiating a session with a cryptographic domain |
| CN105247566B (zh) | 2013-06-23 | 2020-10-16 | 英特尔公司 | 基于上下文关系选择性地公开信息的方法、装置、介质 |
| US9633210B2 (en) | 2013-09-13 | 2017-04-25 | Microsoft Technology Licensing, Llc | Keying infrastructure |
| US9639710B2 (en) * | 2013-12-23 | 2017-05-02 | Symantec Corporation | Device-based PIN authentication process to protect encrypted data |
| RU2562444C2 (ru) | 2013-12-27 | 2015-09-10 | Закрытое акционерное общество "Лаборатория Касперского" | Способ и система автоматического назначения политик шифрования устройствам |
| RU2587422C2 (ru) | 2013-12-27 | 2016-06-20 | Закрытое акционерное общество "Лаборатория Касперского" | Способ и система автоматического управления лицензиями |
| US9124571B1 (en) * | 2014-02-24 | 2015-09-01 | Keypasco Ab | Network authentication method for secure user identity verification |
| US9397835B1 (en) | 2014-05-21 | 2016-07-19 | Amazon Technologies, Inc. | Web of trust management in a distributed system |
| US9438421B1 (en) | 2014-06-27 | 2016-09-06 | Amazon Technologies, Inc. | Supporting a fixed transaction rate with a variably-backed logical cryptographic key |
| US9785801B2 (en) * | 2014-06-27 | 2017-10-10 | Intel Corporation | Management of authenticated variables |
| US9455839B2 (en) | 2014-07-30 | 2016-09-27 | Master Lock Company Llc | Wireless key management for authentication |
| US9600949B2 (en) | 2014-07-30 | 2017-03-21 | Master Lock Company Llc | Wireless key management for authentication |
| US9996999B2 (en) | 2014-07-30 | 2018-06-12 | Master Lock Company Llc | Location tracking for locking device |
| US9894066B2 (en) | 2014-07-30 | 2018-02-13 | Master Lock Company Llc | Wireless firmware updates |
| GB201413836D0 (en) | 2014-08-05 | 2014-09-17 | Arm Ip Ltd | Device security apparatus and methods |
| FR3024915B1 (fr) * | 2014-08-18 | 2016-09-09 | Proton World Int Nv | Dispositif et procede pour assurer des services de module de plateforme securisee |
| US10097513B2 (en) | 2014-09-14 | 2018-10-09 | Microsoft Technology Licensing, Llc | Trusted execution environment extensible computing device interface |
| US9866392B1 (en) | 2014-09-15 | 2018-01-09 | Amazon Technologies, Inc. | Distributed system web of trust provisioning |
| US20160116510A1 (en) | 2014-10-27 | 2016-04-28 | Master Lock Company | Predictive battery warnings for an electronic locking device |
| US9948625B2 (en) * | 2015-01-07 | 2018-04-17 | Cyph, Inc. | Encrypted group communication method |
| KR20170129866A (ko) * | 2015-03-20 | 2017-11-27 | 리베츠 코프. | 블록 체인을 사용하여 디바이스 무결성의 자동화된 입증 |
| US10469477B2 (en) | 2015-03-31 | 2019-11-05 | Amazon Technologies, Inc. | Key export techniques |
| US10171437B2 (en) * | 2015-04-24 | 2019-01-01 | Oracle International Corporation | Techniques for security artifacts management |
| US10395042B2 (en) | 2015-07-02 | 2019-08-27 | Oracle International Corporation | Data encryption service |
| GB2540965B (en) | 2015-07-31 | 2019-01-30 | Arm Ip Ltd | Secure configuration data storage |
| GB2540961B (en) | 2015-07-31 | 2019-09-18 | Arm Ip Ltd | Controlling configuration data storage |
| US10146916B2 (en) | 2015-11-17 | 2018-12-04 | Microsoft Technology Licensing, Llc | Tamper proof device capability store |
| CN105939330B (zh) * | 2016-02-04 | 2019-07-09 | 杭州迪普科技股份有限公司 | 处理本地安全策略配置的方法及装置 |
| US10861019B2 (en) * | 2016-03-18 | 2020-12-08 | Visa International Service Association | Location verification during dynamic data transactions |
| CN107347058B (zh) | 2016-05-06 | 2021-07-23 | 阿里巴巴集团控股有限公司 | 数据加密方法、数据解密方法、装置及系统 |
| WO2018049564A1 (zh) * | 2016-09-13 | 2018-03-22 | 华为技术有限公司 | 一种移动终端防盗方法及装置 |
| US20180254898A1 (en) * | 2017-03-06 | 2018-09-06 | Rivetz Corp. | Device enrollment protocol |
| CN108667608B (zh) * | 2017-03-28 | 2021-07-27 | 阿里巴巴集团控股有限公司 | 数据密钥的保护方法、装置和系统 |
| US10554480B2 (en) | 2017-05-11 | 2020-02-04 | Verizon Patent And Licensing Inc. | Systems and methods for maintaining communication links |
| US10671733B2 (en) * | 2017-05-19 | 2020-06-02 | International Business Machines Corporation | Policy enforcement via peer devices using a blockchain |
| CN109994115B (zh) | 2018-01-03 | 2023-07-07 | 阿里巴巴集团控股有限公司 | 通讯方法及装置、数据处理方法及设备 |
| CN108600151B (zh) * | 2018-02-28 | 2020-09-08 | 华为技术有限公司 | 一种数据通讯方法、设备及系统 |
| WO2019213316A1 (en) * | 2018-05-01 | 2019-11-07 | Hotshots Technologies S.À.R.L. | Multi-modal access policy enforcement |
| CN109450620B (zh) | 2018-10-12 | 2020-11-10 | 创新先进技术有限公司 | 一种移动终端中共享安全应用的方法及移动终端 |
| US11038852B2 (en) | 2019-02-08 | 2021-06-15 | Alibaba Group Holding Limited | Method and system for preventing data leakage from trusted network to untrusted network |
| EP3716115A1 (en) * | 2019-03-29 | 2020-09-30 | General Electric Company | Reporting and configuration enhancements of on-board certified software |
| US11520572B2 (en) * | 2019-09-13 | 2022-12-06 | Oracle International Corporation | Application of scheduled patches |
| US11429519B2 (en) | 2019-12-23 | 2022-08-30 | Alibaba Group Holding Limited | System and method for facilitating reduction of latency and mitigation of write amplification in a multi-tenancy storage drive |
| US11444762B2 (en) * | 2020-08-19 | 2022-09-13 | Oracle International Corporation | Attested end-to-end encryption for transporting sensitive data |
| GB2600116B (en) * | 2020-10-21 | 2023-12-06 | Advanced Risc Mach Ltd | Methods and apparatus for communication between processing circuitry and a peripheral device |
| US11368314B2 (en) * | 2020-11-13 | 2022-06-21 | Microsoft Technology Licensing, Llc | Secure digital signing |
| KR102549300B1 (ko) * | 2021-04-30 | 2023-06-30 | 주식회사 안랩 | 파일 검증 시스템 및 파일 검증 방법 |
| WO2023069464A1 (en) * | 2021-10-20 | 2023-04-27 | Cryptography Research, Inc. | Secure asset management infrastructure for enforcing access control policies |
Family Cites Families (51)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5148481A (en) * | 1989-10-06 | 1992-09-15 | International Business Machines Corporation | Transaction system security method and apparatus |
| US5224166A (en) * | 1992-08-11 | 1993-06-29 | International Business Machines Corporation | System for seamless processing of encrypted and non-encrypted data and instructions |
| US5719938A (en) * | 1994-08-01 | 1998-02-17 | Lucent Technologies Inc. | Methods for providing secure access to shared information |
| US6289450B1 (en) * | 1999-05-28 | 2001-09-11 | Authentica, Inc. | Information security architecture for encrypting documents for remote access while maintaining access control |
| US6694025B1 (en) * | 1999-06-02 | 2004-02-17 | Koninklijke Philips Electronics N.V. | Method and apparatus for secure distribution of public/private key pairs |
| AU1571101A (en) * | 1999-10-18 | 2001-04-30 | Stamps.Com | Role assignments in a cryptographic module for secure processing of value-bearing items |
| US6834112B1 (en) * | 2000-04-21 | 2004-12-21 | Intel Corporation | Secure distribution of private keys to multiple clients |
| US7158953B1 (en) * | 2000-06-27 | 2007-01-02 | Microsoft Corporation | Method and system for limiting the use of user-specific software features |
| US20020031230A1 (en) * | 2000-08-15 | 2002-03-14 | Sweet William B. | Method and apparatus for a web-based application service model for security management |
| US20020071566A1 (en) * | 2000-12-11 | 2002-06-13 | Kurn David Michael | Computer system employing a split-secret cryptographic key linked to a password-based cryptographic key security scheme |
| US20020071560A1 (en) * | 2000-12-12 | 2002-06-13 | Kurn David Michael | Computer system having an autonomous process for centralized cryptographic key administration |
| AU742639B3 (en) * | 2001-02-15 | 2002-01-10 | Ewise Systems Pty Limited | Secure network access |
| US7711122B2 (en) * | 2001-03-09 | 2010-05-04 | Arcot Systems, Inc. | Method and apparatus for cryptographic key storage wherein key servers are authenticated by possession and secure distribution of stored keys |
| US20030037237A1 (en) * | 2001-04-09 | 2003-02-20 | Jean-Paul Abgrall | Systems and methods for computer device authentication |
| US8909555B2 (en) * | 2001-04-24 | 2014-12-09 | Hewlett-Packard Development Company, L.P. | Information security system |
| US7783765B2 (en) * | 2001-12-12 | 2010-08-24 | Hildebrand Hal S | System and method for providing distributed access control to secured documents |
| US7095859B2 (en) * | 2002-03-18 | 2006-08-22 | Lenovo (Singapore) Pte. Ltd. | Managing private keys in a free seating environment |
| US7437752B2 (en) * | 2002-09-23 | 2008-10-14 | Credant Technologies, Inc. | Client architecture for portable device with security policies |
| US20040117318A1 (en) * | 2002-12-16 | 2004-06-17 | Grawrock David W. | Portable token controlling trusted environment launch |
| US6934846B2 (en) * | 2003-01-22 | 2005-08-23 | Walter Szrek | Method of generating unpredictable and auditable random numbers |
| US20040177258A1 (en) * | 2003-03-03 | 2004-09-09 | Ong Peng T. | Secure object for convenient identification |
| US7448080B2 (en) * | 2003-06-30 | 2008-11-04 | Nokia, Inc. | Method for implementing secure corporate communication |
| US20060149962A1 (en) * | 2003-07-11 | 2006-07-06 | Ingrian Networks, Inc. | Network attached encryption |
| GB2404537B (en) * | 2003-07-31 | 2007-03-14 | Hewlett Packard Development Co | Controlling access to data |
| WO2005062919A2 (en) * | 2003-12-22 | 2005-07-14 | Wachovia Corporation | Public key encryption for groups |
| US8495361B2 (en) * | 2003-12-31 | 2013-07-23 | International Business Machines Corporation | Securely creating an endorsement certificate in an insecure environment |
| JP2005197912A (ja) | 2004-01-06 | 2005-07-21 | Nippon Telegr & Teleph Corp <Ntt> | 情報開示制御方法、情報開示制御プログラム、ならびに、耐タンパ装置 |
| JP2005269396A (ja) * | 2004-03-19 | 2005-09-29 | Willcom Inc | 機器認証システム |
| US7574600B2 (en) * | 2004-03-24 | 2009-08-11 | Intel Corporation | System and method for combining user and platform authentication in negotiated channel security protocols |
| US7379551B2 (en) * | 2004-04-02 | 2008-05-27 | Microsoft Corporation | Method and system for recovering password protected private data via a communication network without exposing the private data |
| WO2007001328A2 (en) * | 2004-07-29 | 2007-01-04 | Infoassure, Inc. | Information-centric security |
| US7458102B2 (en) * | 2004-08-17 | 2008-11-25 | Emc Corporation | Information security architecture for remote access control using non-bidirectional protocols |
| US9032192B2 (en) * | 2004-10-28 | 2015-05-12 | Broadcom Corporation | Method and system for policy based authentication |
| US7987356B2 (en) * | 2004-11-29 | 2011-07-26 | Broadcom Corporation | Programmable security platform |
| US20060129824A1 (en) * | 2004-12-15 | 2006-06-15 | Hoff James P | Systems, methods, and media for accessing TPM keys |
| US8295492B2 (en) * | 2005-06-27 | 2012-10-23 | Wells Fargo Bank, N.A. | Automated key management system |
| US7908483B2 (en) * | 2005-06-30 | 2011-03-15 | Intel Corporation | Method and apparatus for binding TPM keys to execution entities |
| US8108668B2 (en) * | 2006-06-26 | 2012-01-31 | Intel Corporation | Associating a multi-context trusted platform module with distributed platforms |
| WO2008121157A2 (en) * | 2006-10-12 | 2008-10-09 | Rsa Security Inc. | Cryptographic key management system facilitating secure access of data portions to corresponding groups of users |
| US20080189213A1 (en) * | 2007-02-05 | 2008-08-07 | Curtis Blake | System and method for digital rights management with license proxy for mobile wireless platforms |
| US8208637B2 (en) * | 2007-12-17 | 2012-06-26 | Microsoft Corporation | Migration of computer secrets |
| EP2329391A1 (en) * | 2008-08-13 | 2011-06-08 | Secure Exchange Solutions, Llc | Trusted card system using secure exchange |
| US9559842B2 (en) * | 2008-09-30 | 2017-01-31 | Hewlett Packard Enterprise Development Lp | Trusted key management for virtualized platforms |
| US20100250955A1 (en) * | 2008-10-22 | 2010-09-30 | Paul Trevithick | Brokered information sharing system |
| JP2010108237A (ja) * | 2008-10-30 | 2010-05-13 | Nec Corp | 情報処理システム |
| US8391494B1 (en) * | 2009-02-26 | 2013-03-05 | Symantec Corporation | Systems and methods for protecting enterprise rights management keys |
| US8302169B1 (en) * | 2009-03-06 | 2012-10-30 | Google Inc. | Privacy enhancements for server-side cookies |
| GB2482434B (en) * | 2009-05-26 | 2015-03-04 | Hewlett Packard Development Co | System and method for performing a management operation |
| US8588422B2 (en) * | 2009-05-28 | 2013-11-19 | Novell, Inc. | Key management to protect encrypted data of an endpoint computing device |
| US8488782B2 (en) * | 2009-10-20 | 2013-07-16 | Oracle America, Inc. | Parameterizable cryptography |
| US8731203B2 (en) * | 2012-02-13 | 2014-05-20 | Alephcloud Systems, Inc. | Securing a secret of a user |
-
2010
- 2010-01-11 GB GBGB1000288.9A patent/GB201000288D0/en not_active Ceased
-
2011
- 2011-01-11 JP JP2012547550A patent/JP5860815B2/ja not_active Expired - Fee Related
- 2011-01-11 CN CN201180012382.4A patent/CN102812684B/zh not_active Expired - Fee Related
- 2011-01-11 EP EP11700203.0A patent/EP2548353B1/en not_active Not-in-force
- 2011-01-11 WO PCT/GB2011/050033 patent/WO2011083343A2/en not_active Ceased
- 2011-01-11 ES ES11700203.0T patent/ES2554491T3/es active Active
- 2011-01-11 US US13/521,674 patent/US10122529B2/en active Active
- 2011-01-11 CA CA2786975A patent/CA2786975C/en active Active
-
2018
- 2018-11-05 US US16/180,537 patent/US20190089527A1/en not_active Abandoned
Also Published As
| Publication number | Publication date |
|---|---|
| US10122529B2 (en) | 2018-11-06 |
| US20130159704A1 (en) | 2013-06-20 |
| WO2011083343A2 (en) | 2011-07-14 |
| WO2011083343A3 (en) | 2011-12-08 |
| CA2786975A1 (en) | 2011-07-14 |
| US20190089527A1 (en) | 2019-03-21 |
| JP2013516685A (ja) | 2013-05-13 |
| GB201000288D0 (en) | 2010-02-24 |
| CN102812684B (zh) | 2015-09-16 |
| EP2548353A2 (en) | 2013-01-23 |
| CN102812684A (zh) | 2012-12-05 |
| CA2786975C (en) | 2020-06-23 |
| EP2548353B1 (en) | 2015-10-21 |
| ES2554491T3 (es) | 2015-12-21 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP5860815B2 (ja) | コンピューターポリシーを施行するためのシステムおよび方法 | |
| US9641344B1 (en) | Multiple factor authentication in an identity certificate service | |
| KR100843081B1 (ko) | 보안 제공 시스템 및 방법 | |
| US9332002B1 (en) | Authenticating and authorizing a user by way of a digital certificate | |
| US7240201B2 (en) | Method and apparatus to provide secure communication between systems | |
| US10333930B2 (en) | System and method for transparent multi-factor authentication and security posture checking | |
| JP7730257B2 (ja) | 許可された暗号化 | |
| CN112565205B (zh) | 可信认证和度量方法、服务器、终端及可读存储介质 | |
| US11438161B2 (en) | Implicit attestation for network access | |
| US12450385B2 (en) | Integration of identity access management infrastructure with zero-knowledge services | |
| EP4145763B1 (en) | Exporting remote cryptographic keys | |
| CN102986161A (zh) | 用于对应用进行密码保护的方法 | |
| CN106411884A (zh) | 一种数据存储加密的方法及装置 | |
| KR101464724B1 (ko) | 멀티 클라우드 환경을 위한 OpenID 기반의 사용자 인증 기법 | |
| CN114338091A (zh) | 数据传输方法、装置、电子设备及存储介质 | |
| CN114826702B (zh) | 数据库访问密码加密方法、装置和计算机设备 | |
| Kurnikov et al. | Keys in the clouds: Auditable multi-device access to cryptographic credentials | |
| KR20090054774A (ko) | 분산 네트워크 환경에서의 통합 보안 관리 방법 | |
| KR20170111809A (ko) | 대칭키 기반의 보안 토큰을 이용한 양방향 인증 방법 | |
| KR100970552B1 (ko) | 비인증서 공개키를 사용하는 보안키 생성 방법 | |
| CN106576050B (zh) | 三层安全和计算架构 | |
| CN119003476A (zh) | 日志文件的存储方法及装置、存储介质及电子设备 | |
| Alzomai et al. | The mobile phone as a multi OTP device using trusted computing | |
| Jang-Jaccard et al. | Portable key management service for cloud storage | |
| KR102086739B1 (ko) | 보안 소켓 계층 복호화 장치에서 다양한 전자 서명 알고리즘을 지원하기 위한 전자 재서명 방법 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20140110 |
|
| A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20140110 |
|
| A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20140917 |
|
| A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20141007 |
|
| A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20141226 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20150407 |
|
| TRDD | Decision of grant or rejection written | ||
| A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20151208 |
|
| A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20151221 |
|
| R150 | Certificate of patent or registration of utility model |
Ref document number: 5860815 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| LAPS | Cancellation because of no payment of annual fees |