JP5952308B2 - モバイルデバイスのセキュリティ - Google Patents

モバイルデバイスのセキュリティ Download PDF

Info

Publication number
JP5952308B2
JP5952308B2 JP2013550957A JP2013550957A JP5952308B2 JP 5952308 B2 JP5952308 B2 JP 5952308B2 JP 2013550957 A JP2013550957 A JP 2013550957A JP 2013550957 A JP2013550957 A JP 2013550957A JP 5952308 B2 JP5952308 B2 JP 5952308B2
Authority
JP
Japan
Prior art keywords
server
key
mobile device
monitoring
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
JP2013550957A
Other languages
English (en)
Japanese (ja)
Other versions
JP2014505435A5 (enExample
JP2014505435A (ja
Inventor
グル パラン チャンドラセカラン,
グル パラン チャンドラセカラン,
アンドレア ビタウ,
アンドレア ビタウ,
Original Assignee
シントリクス インフォメーション セキュリティ テクノロジーズ リミテッド
シントリクス インフォメーション セキュリティ テクノロジーズ リミテッド
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by シントリクス インフォメーション セキュリティ テクノロジーズ リミテッド, シントリクス インフォメーション セキュリティ テクノロジーズ リミテッド filed Critical シントリクス インフォメーション セキュリティ テクノロジーズ リミテッド
Publication of JP2014505435A publication Critical patent/JP2014505435A/ja
Publication of JP2014505435A5 publication Critical patent/JP2014505435A5/ja
Application granted granted Critical
Publication of JP5952308B2 publication Critical patent/JP5952308B2/ja
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0254Stateful filtering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0464Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
JP2013550957A 2011-01-28 2012-01-30 モバイルデバイスのセキュリティ Expired - Fee Related JP5952308B2 (ja)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
GB1101507.0 2011-01-28
GBGB1101507.0A GB201101507D0 (en) 2011-01-28 2011-01-28 Mobile device security
PCT/GB2012/050192 WO2012101458A2 (en) 2011-01-28 2012-01-30 Mobile device security

Publications (3)

Publication Number Publication Date
JP2014505435A JP2014505435A (ja) 2014-02-27
JP2014505435A5 JP2014505435A5 (enExample) 2015-03-19
JP5952308B2 true JP5952308B2 (ja) 2016-07-13

Family

ID=43824751

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2013550957A Expired - Fee Related JP5952308B2 (ja) 2011-01-28 2012-01-30 モバイルデバイスのセキュリティ

Country Status (7)

Country Link
US (2) US9628452B2 (enExample)
EP (1) EP2668761B1 (enExample)
JP (1) JP5952308B2 (enExample)
CN (1) CN103339911B (enExample)
CA (1) CA2824826C (enExample)
GB (1) GB201101507D0 (enExample)
WO (1) WO2012101458A2 (enExample)

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9762554B2 (en) * 2013-05-02 2017-09-12 Telefonaktiebolaget Lm Ericsson (Publ) Handling of performance monitoring data
US9307405B2 (en) * 2013-10-17 2016-04-05 Arm Ip Limited Method for assigning an agent device from a first device registry to a second device registry
US10069811B2 (en) 2013-10-17 2018-09-04 Arm Ip Limited Registry apparatus, agent device, application providing apparatus and corresponding methods
US10320739B2 (en) * 2014-12-12 2019-06-11 Donuts Inc. Communication using DNS repurposing
DE102015111711A1 (de) * 2015-07-20 2017-01-26 Deutsche Post Ag Aufbau einer Kommunikationsverbindung mit einer Benutzervorrichtung über eine Zugangskontrollvorrichtung
US9929863B2 (en) * 2015-10-30 2018-03-27 Palo Alto Research Center Incorporated System and method for efficient and semantically secure symmetric encryption over channels with limited bandwidth
GB201608859D0 (en) * 2016-03-08 2016-07-06 Continental Automotive Systems Secure smartphone based access and start authorization system for vehicles
US10735388B2 (en) * 2016-03-17 2020-08-04 Lenovo (Singapore) Pte Ltd Confining data based on location
US10855694B2 (en) * 2017-05-30 2020-12-01 Keysight Technologies Singapore (Sales) Pte. Ltd. Methods, systems, and computer readable media for monitoring encrypted packet flows within a virtual network environment
US10708238B2 (en) * 2017-06-08 2020-07-07 Zixcorp Systems, Inc. Encrypted push message viewing system
US10903985B2 (en) 2017-08-25 2021-01-26 Keysight Technologies Singapore (Sales) Pte. Ltd. Monitoring encrypted network traffic flows in a virtual environment using dynamic session key acquisition techniques
US10992652B2 (en) * 2017-08-25 2021-04-27 Keysight Technologies Singapore (Sales) Pte. Ltd. Methods, systems, and computer readable media for monitoring encrypted network traffic flows
WO2019213316A1 (en) * 2018-05-01 2019-11-07 Hotshots Technologies S.À.R.L. Multi-modal access policy enforcement
US10893030B2 (en) 2018-08-10 2021-01-12 Keysight Technologies, Inc. Methods, systems, and computer readable media for implementing bandwidth limitations on specific application traffic at a proxy element
US11190417B2 (en) 2020-02-04 2021-11-30 Keysight Technologies, Inc. Methods, systems, and computer readable media for processing network flow metadata at a network packet broker
CN113242255B (zh) * 2021-05-24 2023-04-07 深圳市联软科技股份有限公司 一种基于企业安全的智能流量分析方法及系统

Family Cites Families (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH10276184A (ja) * 1997-03-28 1998-10-13 Nippon Telegr & Teleph Corp <Ntt> 鍵管理方法
US6721424B1 (en) * 1999-08-19 2004-04-13 Cybersoft, Inc Hostage system and method for intercepting encryted hostile data
JP2001318862A (ja) * 2000-05-08 2001-11-16 Toyoji Ishikawa メールシステム、監視情報サーバ、監視装置、及び記録媒体
JP2003067307A (ja) * 2001-08-27 2003-03-07 Kddi Corp 電子メール監視システム、電子メール監視方法、電子メール監視プログラム及びそれを記録した記録媒体
US7181765B2 (en) * 2001-10-12 2007-02-20 Motorola, Inc. Method and apparatus for providing node security in a router of a packet network
JP2005268873A (ja) * 2004-03-16 2005-09-29 Tokyo Denki Univ 機密情報の不正送信を防止する方法および装置
JP2006039740A (ja) * 2004-07-23 2006-02-09 Murata Mach Ltd 通信装置
US20060206941A1 (en) * 2005-03-08 2006-09-14 Praesidium Technologies, Ltd. Communications system with distributed risk management
US20060248575A1 (en) * 2005-05-02 2006-11-02 Zachary Levow Divided encryption connections to provide network traffic security
US7634364B2 (en) 2005-06-23 2009-12-15 Life Technologies Corporation Methods and systems for mass defect filtering of mass spectrometry data
US7827262B2 (en) * 2005-07-14 2010-11-02 Cisco Technology, Inc. Approach for managing state information by a group of servers that services a group of clients
US7685175B2 (en) * 2005-08-12 2010-03-23 Michael Lee Carroll Content manager
JP2007142930A (ja) * 2005-11-21 2007-06-07 Fuji Xerox Co Ltd 画像処理装置、ジョブログ生成方法、およびプログラム
US7272403B2 (en) * 2005-12-02 2007-09-18 International Business Machines Corporation Selective enablement and disablement of a mobile communications device based upon location
KR100881423B1 (ko) * 2006-12-08 2009-02-05 한국전자통신연구원 이동통신망에서 전자감시 시스템, 그에 따른 방법 및 그에따른 장치
US8325925B2 (en) * 2007-07-10 2012-12-04 Hewlett-Packard Development Company, L.P. Delivery of messages to a receiver mobile device
US20090204817A1 (en) * 2007-09-17 2009-08-13 Oci Mobile Llc Communication system
US20100138910A1 (en) * 2008-12-03 2010-06-03 Check Point Software Technologies, Ltd. Methods for encrypted-traffic url filtering using address-mapping interception
US9633183B2 (en) * 2009-06-19 2017-04-25 Uniloc Luxembourg S.A. Modular software protection
US9525999B2 (en) * 2009-12-21 2016-12-20 Blackberry Limited Method of securely transferring services between mobile devices
GB201000288D0 (en) 2010-01-11 2010-02-24 Scentrics Information Security System and method of enforcing a computer policy

Also Published As

Publication number Publication date
CA2824826C (en) 2019-02-26
EP2668761B1 (en) 2018-07-04
US9628452B2 (en) 2017-04-18
WO2012101458A2 (en) 2012-08-02
CA2824826A1 (en) 2012-08-02
CN103339911A (zh) 2013-10-02
US10027634B2 (en) 2018-07-17
GB201101507D0 (en) 2011-03-16
US20170201501A1 (en) 2017-07-13
WO2012101458A3 (en) 2012-11-08
EP2668761A2 (en) 2013-12-04
CN103339911B (zh) 2016-04-27
JP2014505435A (ja) 2014-02-27
US20140082348A1 (en) 2014-03-20

Similar Documents

Publication Publication Date Title
JP5952308B2 (ja) モバイルデバイスのセキュリティ
JP4199074B2 (ja) 安全なデータ通信リンクのための方法と装置
KR100886592B1 (ko) 데이터 프로세싱 시스템의 보안 방법 및 장치
KR101202671B1 (ko) 사용자가 가입자 단말에서 단말 장치에 원격으로 접속할 수있게 하기 위한 원격 접속 시스템 및 방법
US8738907B2 (en) Wireless device authentication and security key management
KR101123591B1 (ko) 이동 통신 시스템에서의 보안 데이터 송신을 위한 방법 및 장치
US20060059344A1 (en) Service authentication
EP1819123B1 (en) Secure method of termination of service notification
US20110035591A1 (en) Enterprise instant message aggregator
KR102255366B1 (ko) Mtm 기반 단문 메시지 서비스 보안 시스템 및 그 방법
US20140053255A1 (en) Secure Non-Geospatially Derived Device Presence Information
JP2008312200A (ja) ワイヤレスホームエリアネットワークを動作させる方法及び装置
WO2020020007A1 (zh) 网络接入方法、装置、终端、基站和可读存储介质
US10666755B2 (en) Method and apparatus for secure content caching and delivery
US20250106639A1 (en) Systems and methods for using a unique routing indicator to connect to a network
US11349818B2 (en) Secure virtual personalized network
US8688077B2 (en) Communication system and method for providing a mobile communications service
RU2365044C2 (ru) Способ и устройство для доставки ключей
US12413965B2 (en) Method for managing encryption by a transmitting entity in a 3GPP MCS network
Paul et al. A security analysis of smartphone data flow and feasible solutions for lawful interception

Legal Events

Date Code Title Description
A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20150129

A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20150129

A977 Report on retrieval

Free format text: JAPANESE INTERMEDIATE CODE: A971007

Effective date: 20150828

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20150929

A601 Written request for extension of time

Free format text: JAPANESE INTERMEDIATE CODE: A601

Effective date: 20151228

A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20160128

TRDD Decision of grant or rejection written
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 20160607

A61 First payment of annual fees (during grant procedure)

Free format text: JAPANESE INTERMEDIATE CODE: A61

Effective date: 20160609

R150 Certificate of patent or registration of utility model

Ref document number: 5952308

Country of ref document: JP

Free format text: JAPANESE INTERMEDIATE CODE: R150

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

LAPS Cancellation because of no payment of annual fees