JP6329970B2 - 関連データを有するポリシー施行 - Google Patents
関連データを有するポリシー施行 Download PDFInfo
- Publication number
- JP6329970B2 JP6329970B2 JP2015558044A JP2015558044A JP6329970B2 JP 6329970 B2 JP6329970 B2 JP 6329970B2 JP 2015558044 A JP2015558044 A JP 2015558044A JP 2015558044 A JP2015558044 A JP 2015558044A JP 6329970 B2 JP6329970 B2 JP 6329970B2
- Authority
- JP
- Japan
- Prior art keywords
- key
- request
- data
- policy
- service
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US13/764,995 US9547771B2 (en) | 2013-02-12 | 2013-02-12 | Policy enforcement with associated data |
| US13/764,995 | 2013-02-12 | ||
| PCT/US2014/015410 WO2014126815A1 (en) | 2013-02-12 | 2014-02-07 | Policy enforcement with associated data |
Related Child Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2018000821A Division JP2018077893A (ja) | 2013-02-12 | 2018-01-05 | 関連データを有するポリシー施行 |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| JP2016515235A JP2016515235A (ja) | 2016-05-26 |
| JP2016515235A5 JP2016515235A5 (enExample) | 2017-04-27 |
| JP6329970B2 true JP6329970B2 (ja) | 2018-05-23 |
Family
ID=51298438
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2015558044A Active JP6329970B2 (ja) | 2013-02-12 | 2014-02-07 | 関連データを有するポリシー施行 |
| JP2018000821A Pending JP2018077893A (ja) | 2013-02-12 | 2018-01-05 | 関連データを有するポリシー施行 |
Family Applications After (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2018000821A Pending JP2018077893A (ja) | 2013-02-12 | 2018-01-05 | 関連データを有するポリシー施行 |
Country Status (6)
| Country | Link |
|---|---|
| US (1) | US9547771B2 (enExample) |
| EP (1) | EP2957063B1 (enExample) |
| JP (2) | JP6329970B2 (enExample) |
| CN (1) | CN105103488B (enExample) |
| CA (1) | CA2899014C (enExample) |
| WO (1) | WO2014126815A1 (enExample) |
Families Citing this family (53)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8874935B2 (en) | 2011-08-30 | 2014-10-28 | Microsoft Corporation | Sector map-based rapid data encryption policy compliance |
| US9762389B2 (en) * | 2012-04-13 | 2017-09-12 | Anyfi Networks Ab | Moderation of network and access point selection in an IEEE 802.11 communication system |
| US9373001B2 (en) | 2012-12-26 | 2016-06-21 | Barracuda Networks, Inc. | Distributed encryption and access control scheme in a cloud environment |
| US9705674B2 (en) | 2013-02-12 | 2017-07-11 | Amazon Technologies, Inc. | Federated key management |
| US9059977B2 (en) * | 2013-03-13 | 2015-06-16 | Route1 Inc. | Distribution of secure or cryptographic material |
| JP2014197726A (ja) * | 2013-03-29 | 2014-10-16 | 株式会社東芝 | 計測装置、情報処理装置、鍵管理装置および使用量計算システム |
| US20140344570A1 (en) | 2013-05-20 | 2014-11-20 | Microsoft Corporation | Data Protection For Organizations On Computing Devices |
| US10430608B2 (en) * | 2013-06-14 | 2019-10-01 | Salesforce.Com, Inc. | Systems and methods of automated compliance with data privacy laws |
| MX361684B (es) * | 2013-12-02 | 2018-12-13 | Mastercard International Inc | Método y sistema para la transmisión segura de mensajes del servicio de notificación a distancia a dispositivos móviles sin elementos de seguridad. |
| US9203619B2 (en) * | 2014-01-21 | 2015-12-01 | Vormetric, Inc. | Online data transformation |
| US20150235011A1 (en) * | 2014-02-19 | 2015-08-20 | Adobe Systems Incorporated | Drm protected video streaming on game console with secret-less application |
| US10615967B2 (en) * | 2014-03-20 | 2020-04-07 | Microsoft Technology Licensing, Llc | Rapid data protection for storage devices |
| KR20150115332A (ko) * | 2014-04-03 | 2015-10-14 | 한국전자통신연구원 | 개방형 서비스 컴포넌트 접근 제어 관리 장치 및 그 방법 |
| US9344455B2 (en) * | 2014-07-30 | 2016-05-17 | Motorola Solutions, Inc. | Apparatus and method for sharing a hardware security module interface in a collaborative network |
| US9825945B2 (en) | 2014-09-09 | 2017-11-21 | Microsoft Technology Licensing, Llc | Preserving data protection with policy |
| US9853812B2 (en) | 2014-09-17 | 2017-12-26 | Microsoft Technology Licensing, Llc | Secure key management for roaming protected content |
| US9531692B2 (en) * | 2014-09-19 | 2016-12-27 | Bank Of America Corporation | Method of securing mobile applications using distributed keys |
| US9531542B2 (en) * | 2014-09-19 | 2016-12-27 | Bank Of America Corporation | Secure remote password |
| US10367646B1 (en) | 2014-10-21 | 2019-07-30 | Amazon Technologies, Inc. | Cryptographic material distribution and management |
| US9552485B1 (en) * | 2014-10-21 | 2017-01-24 | Amazon Technologies, Inc. | Cryptographic material renewal |
| US9900295B2 (en) | 2014-11-05 | 2018-02-20 | Microsoft Technology Licensing, Llc | Roaming content wipe actions across devices |
| DE102014018889A1 (de) * | 2014-12-17 | 2016-06-23 | Giesecke & Devrient Gmbh | Verfahren und Vorrichtung zum sicheren Speichern von Daten und zum Zugreifen auf diese Daten |
| US9609541B2 (en) | 2014-12-31 | 2017-03-28 | Motorola Solutions, Inc. | Method and apparatus for device collaboration via a hybrid network |
| WO2016112338A1 (en) * | 2015-01-08 | 2016-07-14 | Intertrust Technologies Corporation | Cryptographic systems and methods |
| US10630686B2 (en) | 2015-03-12 | 2020-04-21 | Fornetix Llc | Systems and methods for organizing devices in a policy hierarchy |
| US10965459B2 (en) | 2015-03-13 | 2021-03-30 | Fornetix Llc | Server-client key escrow for applied key management system and process |
| US10469477B2 (en) * | 2015-03-31 | 2019-11-05 | Amazon Technologies, Inc. | Key export techniques |
| US9853820B2 (en) | 2015-06-30 | 2017-12-26 | Microsoft Technology Licensing, Llc | Intelligent deletion of revoked data |
| US9900325B2 (en) | 2015-10-09 | 2018-02-20 | Microsoft Technology Licensing, Llc | Passive encryption of organization data |
| JP6527090B2 (ja) * | 2016-02-01 | 2019-06-05 | 株式会社日立製作所 | ユーザ許可の確認システム |
| GB2547025A (en) | 2016-02-05 | 2017-08-09 | Thales Holdings Uk Plc | A method of data transfer, a method of controlling use of data and a cryptographic device |
| US10860086B2 (en) * | 2016-02-26 | 2020-12-08 | Fornetix Llc | Policy-enabled encryption keys having complex logical operations |
| US10523434B1 (en) * | 2016-03-04 | 2019-12-31 | Amazon Technologies, Inc. | Data storage key rotation |
| WO2017189027A1 (en) | 2016-04-29 | 2017-11-02 | Digital Asset Holdings | Digital asset modeling |
| US12445293B2 (en) | 2016-07-29 | 2025-10-14 | Digital Asset (Switzerland) GmbH | System and method for verifying private channel data using synchronization log |
| US9887975B1 (en) | 2016-08-03 | 2018-02-06 | KryptCo, Inc. | Systems and methods for delegated cryptography |
| CN106055993A (zh) * | 2016-08-13 | 2016-10-26 | 深圳市樊溪电子有限公司 | 一种用于区块链的加密存储系统及其使用方法 |
| JP6780462B2 (ja) * | 2016-11-14 | 2020-11-04 | 大日本印刷株式会社 | 電子情報記憶媒体、セキュア処理実行方法、及びセキュア処理実行プログラム |
| US10587406B1 (en) * | 2016-12-15 | 2020-03-10 | Amazon Technologies, Inc. | File system encryption with key rotation |
| US11373176B2 (en) * | 2018-02-22 | 2022-06-28 | Wells Fargo Bank, N.A. | Systems and methods for federated identity management |
| US12081662B2 (en) * | 2018-06-05 | 2024-09-03 | Ebay Inc. | Automated key and encryption system |
| WO2021178957A1 (en) * | 2020-03-06 | 2021-09-10 | Cornell University | Application-specific computer memory protection |
| EP3952202B1 (en) * | 2020-08-07 | 2023-12-13 | nCipher Security Limited | A device and a method for performing a cryptographic algorithm |
| US11475140B1 (en) | 2020-11-24 | 2022-10-18 | Amazon Technologies, Inc. | Enclave-based cryptography services in edge computing environments |
| US12367293B2 (en) * | 2020-12-04 | 2025-07-22 | Amazon Technologies, Inc. | Highly-available cryptographic keys |
| US11924350B2 (en) | 2021-07-29 | 2024-03-05 | Digital Asset (Switzerland) GmbH | Cryptographically enforced partial blinding for distributed system |
| CN115828271A (zh) * | 2021-09-16 | 2023-03-21 | 华为技术有限公司 | 一种模型保护方法及装置 |
| US12445415B2 (en) | 2022-08-11 | 2025-10-14 | Microsoft Technology Licensing, Llc | Verifiable identity map maintaining identities and associated public keys |
| US12395331B2 (en) * | 2022-09-13 | 2025-08-19 | Microsoft Technology Licensing, Llc | Decryption key generation and recovery |
| US12401630B2 (en) | 2022-09-30 | 2025-08-26 | Microsoft Technology Licensing, Llc | Zero-trust distributed data sharing |
| US12393720B2 (en) | 2022-10-07 | 2025-08-19 | Microsoft Technology Licensing, Llc | Blind subpoena protection |
| US12411973B2 (en) | 2023-11-08 | 2025-09-09 | Bank Of America Corporation | System and method for enhanced encryption orchestration and application integration framework |
| CN117610079B (zh) * | 2024-01-23 | 2024-04-09 | 中汽智联技术有限公司 | 数据安全处理方法、设备和存储介质 |
Family Cites Families (138)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4868877A (en) | 1988-02-12 | 1989-09-19 | Fischer Addison M | Public key/signature cryptosystem with enhanced digital signature certification |
| US4918728A (en) | 1989-08-30 | 1990-04-17 | International Business Machines Corporation | Data cryptography operations using control vectors |
| US5146498A (en) | 1991-01-10 | 1992-09-08 | Motorola, Inc. | Remote key manipulations for over-the-air re-keying |
| US5201000A (en) | 1991-09-27 | 1993-04-06 | International Business Machines Corporation | Method for generating public and private key pairs without using a passphrase |
| US5495533A (en) | 1994-04-29 | 1996-02-27 | International Business Machines Corporation | Personal key archive |
| US5761306A (en) | 1996-02-22 | 1998-06-02 | Visa International Service Association | Key replacement in a public key cryptosystem |
| US6356941B1 (en) | 1999-02-22 | 2002-03-12 | Cyber-Ark Software Ltd. | Network vaults |
| US6546492B1 (en) | 1999-03-26 | 2003-04-08 | Ericsson Inc. | System for secure controlled electronic memory updates via networks |
| JP2000295209A (ja) | 1999-04-09 | 2000-10-20 | Ntt Data Corp | 鍵管理方法、鍵管理システム及び記録媒体 |
| SE9904094D0 (sv) | 1999-11-12 | 1999-11-12 | Protegrity Research & Dev | Method for reencryption of a database |
| US6826609B1 (en) | 2000-03-31 | 2004-11-30 | Tumbleweed Communications Corp. | Policy enforcement in a secure data file delivery system |
| DE10025626A1 (de) | 2000-05-24 | 2001-11-29 | Deutsche Telekom Ag | Verschlüsseln von abzuspeichernden Daten in einem IV-System |
| US8538843B2 (en) | 2000-07-17 | 2013-09-17 | Galactic Computing Corporation Bvi/Bc | Method and system for operating an E-commerce service provider |
| US6986040B1 (en) | 2000-11-03 | 2006-01-10 | Citrix Systems, Inc. | System and method of exploiting the security of a secure communication channel to secure a non-secure communication channel |
| US20050120232A1 (en) | 2000-11-28 | 2005-06-02 | Yoshihiro Hori | Data terminal managing ciphered content data and license acquired by software |
| US7181017B1 (en) | 2001-03-23 | 2007-02-20 | David Felsher | System and method for secure three-party communications |
| US7050583B2 (en) | 2001-03-29 | 2006-05-23 | Etreppid Technologies, Llc | Method and apparatus for streaming data using rotating cryptographic keys |
| CA2358048A1 (en) | 2001-09-25 | 2003-03-25 | Luis Rueda | A cryptosystem for data security |
| US7200747B2 (en) | 2001-10-31 | 2007-04-03 | Hewlett-Packard Development Company, L.P. | System for ensuring data privacy and user differentiation in a distributed file system |
| US7243366B2 (en) | 2001-11-15 | 2007-07-10 | General Instrument Corporation | Key management protocol and authentication system for secure internet protocol rights management architecture |
| US20020076044A1 (en) | 2001-11-16 | 2002-06-20 | Paul Pires | Method of and system for encrypting messages, generating encryption keys and producing secure session keys |
| US7392390B2 (en) | 2001-12-12 | 2008-06-24 | Valve Corporation | Method and system for binding kerberos-style authenticators to single clients |
| JP4291970B2 (ja) | 2001-12-20 | 2009-07-08 | 富士通株式会社 | 暗号処理装置 |
| US7117366B2 (en) | 2002-01-08 | 2006-10-03 | International Business Machines Corporation | Public key based authentication method for transaction delegation in service-based computing environments |
| US7376967B1 (en) | 2002-01-14 | 2008-05-20 | F5 Networks, Inc. | Method and system for performing asynchronous cryptographic operations |
| JP3897613B2 (ja) | 2002-02-27 | 2007-03-28 | 株式会社日立製作所 | 公開鍵暗号方式における登録局サーバの運用方法、登録局サーバ、及びプログラム |
| US20030188188A1 (en) | 2002-03-15 | 2003-10-02 | Microsoft Corporation | Time-window-constrained multicast for future delivery multicast |
| US7890771B2 (en) | 2002-04-17 | 2011-02-15 | Microsoft Corporation | Saving and retrieving data based on public key encryption |
| US20040009815A1 (en) | 2002-06-26 | 2004-01-15 | Zotto Banjamin O. | Managing access to content |
| US7620680B1 (en) | 2002-08-15 | 2009-11-17 | Microsoft Corporation | Fast byzantine paxos |
| US7877607B2 (en) | 2002-08-30 | 2011-01-25 | Hewlett-Packard Development Company, L.P. | Tamper-evident data management |
| FR2844656B1 (fr) | 2002-09-18 | 2005-01-28 | France Telecom | Procede de signature electronique, programme et serveur pour la mise en oeuvre du procede |
| US20040107345A1 (en) | 2002-10-21 | 2004-06-03 | Brandt David D. | System and methodology providing automation security protocols and intrusion detection in an industrial controller environment |
| US7565419B1 (en) | 2002-11-22 | 2009-07-21 | Symantec Operating Corporation | Conflict resolution in a peer to peer network |
| US20040143733A1 (en) | 2003-01-16 | 2004-07-22 | Cloverleaf Communication Co. | Secure network data storage mediator |
| GB2400699B (en) | 2003-04-17 | 2006-07-05 | Hewlett Packard Development Co | Security data provision method and apparatus and data recovery method and system |
| JP4062206B2 (ja) * | 2003-08-01 | 2008-03-19 | 日本電気株式会社 | 署名復号サービスシステム及びプログラム |
| JP2005151529A (ja) | 2003-10-20 | 2005-06-09 | Sony Corp | データ伝送方法、データ伝送装置及びデータ受信装置 |
| US7296023B2 (en) | 2004-01-15 | 2007-11-13 | International Business Machines Corporation | Method and apparatus for persistent real-time collaboration |
| JP2005258801A (ja) | 2004-03-11 | 2005-09-22 | Matsushita Electric Ind Co Ltd | 個人認証システム |
| EP2267625A3 (en) | 2004-04-19 | 2015-08-05 | Lumension Security S.A. | On-line centralized and local authorization of executable files |
| EP1748595B1 (en) | 2004-05-17 | 2015-09-23 | Mitsubishi Denki Kabushiki Kaisha | Quantum cryptography communication apparatus |
| US20060010323A1 (en) | 2004-07-07 | 2006-01-12 | Xerox Corporation | Method for a repository to provide access to a document, and a repository arranged in accordance with the same method |
| US7979731B2 (en) | 2004-07-15 | 2011-07-12 | Panasonic Corporation | Time authentication device, time authentication method, computer program, recording medium, integrated circuit, and time authentication system |
| US20060021018A1 (en) | 2004-07-21 | 2006-01-26 | International Business Machines Corporation | Method and system for enabling trust infrastructure support for federated user lifecycle management |
| EP1784943A4 (en) | 2004-08-31 | 2011-08-03 | Ntt Docomo Inc | RECEPTION OF CRYPTOGRAPHIC DIGITAL CERTIFICATES |
| JP4714482B2 (ja) | 2005-02-28 | 2011-06-29 | 株式会社日立製作所 | 暗号通信システムおよび方法 |
| US7900247B2 (en) | 2005-03-14 | 2011-03-01 | Microsoft Corporation | Trusted third party authentication for web services |
| US7774826B1 (en) | 2005-03-18 | 2010-08-10 | Novell, Inc. | System and method for determining effective policy profiles in a client-server architecture |
| US7639819B2 (en) | 2005-06-16 | 2009-12-29 | Oracle International Corporation | Method and apparatus for using an external security device to secure data in a database |
| US8295492B2 (en) | 2005-06-27 | 2012-10-23 | Wells Fargo Bank, N.A. | Automated key management system |
| US7784087B2 (en) | 2005-08-04 | 2010-08-24 | Toshiba Corporation | System and method for securely sharing electronic documents |
| US8566607B2 (en) | 2005-08-26 | 2013-10-22 | International Business Machines Corporation | Cryptography methods and apparatus used with a processor |
| JP2007081482A (ja) | 2005-09-09 | 2007-03-29 | Canon Inc | 端末認証方法及びその装置、プログラム |
| JP4569464B2 (ja) | 2005-12-20 | 2010-10-27 | 沖電気工業株式会社 | マルチホップネットワークにおける鍵更新システム,鍵管理装置,通信端末および鍵情報構築方法 |
| US7912994B2 (en) | 2006-01-27 | 2011-03-22 | Apple Inc. | Reducing connection time for mass storage class peripheral by internally prefetching file data into local cache in response to connection to host |
| US7925023B2 (en) | 2006-03-03 | 2011-04-12 | Oracle International Corporation | Method and apparatus for managing cryptographic keys |
| US8064604B2 (en) | 2006-04-04 | 2011-11-22 | Oracle International Corporation | Method and apparatus for facilitating role-based cryptographic key management for a database |
| US9002018B2 (en) | 2006-05-09 | 2015-04-07 | Sync Up Technologies Corporation | Encryption key exchange system and method |
| US20070283446A1 (en) | 2006-06-05 | 2007-12-06 | Kabushiki Kaisha Toshiba | System and method for secure handling of scanned documents |
| US20080025515A1 (en) | 2006-07-25 | 2008-01-31 | Jason Scott Coombs | Systems and Methods for Digitally-Signed Updates |
| US8689287B2 (en) | 2006-08-17 | 2014-04-01 | Northrop Grumman Systems Corporation | Federated credentialing system and method |
| US20100316219A1 (en) | 2007-08-06 | 2010-12-16 | David Boubion | Systems and methods for simultaneous integrated multiencrypted rotating key communication |
| US7953978B2 (en) | 2006-09-07 | 2011-05-31 | International Business Machines Corporation | Key generation and retrieval using key servers |
| US8407806B2 (en) | 2006-09-29 | 2013-03-26 | Purusharth Agrawal | Digital data distribution detection, deterrence and disablement system and method |
| GB2443244A (en) * | 2006-10-05 | 2008-04-30 | Hewlett Packard Development Co | Authenticated Encryption Method and Apparatus |
| US8090098B2 (en) * | 2006-11-13 | 2012-01-03 | Electronics And Telecommunications Research Institute | Method of generating message authentication code using stream cipher and authentication/encryption and authentication/decryption methods using stream cipher |
| MX2009006201A (es) | 2006-12-12 | 2009-06-22 | Fraunhofer Ges Forschung | Codificador, decodificador y metodos para codificar y decodificar segmentos de datos que representan una corriente de datos del dominio temporal. |
| US20080172562A1 (en) * | 2007-01-12 | 2008-07-17 | Christian Cachin | Encryption and authentication of data and for decryption and verification of authenticity of data |
| US8218761B2 (en) | 2007-04-06 | 2012-07-10 | Oracle International Corporation | Method and apparatus for generating random data-encryption keys |
| US9413686B2 (en) | 2007-06-04 | 2016-08-09 | Qualcomm Incorporated | Establishing a unique end-to-end management key |
| JP2008306418A (ja) | 2007-06-07 | 2008-12-18 | Kddi Corp | ネットワーク負荷軽減システム、ネットワーク負荷軽減方法およびプログラム |
| US20080319909A1 (en) | 2007-06-25 | 2008-12-25 | Perkins George S | System and method for managing the lifecycle of encryption keys |
| CA2693743C (en) | 2007-07-17 | 2016-10-04 | Chris Alexander Peirson | Systems and processes for obtaining and managing electronic signatures for real estate transaction documents |
| US8111828B2 (en) | 2007-07-31 | 2012-02-07 | Hewlett-Packard Development Company, L.P. | Management of cryptographic keys for securing stored data |
| US8140847B1 (en) | 2007-09-18 | 2012-03-20 | Jianqing Wu | Digital safe |
| CN101400059B (zh) | 2007-09-28 | 2010-12-08 | 华为技术有限公司 | 一种active状态下的密钥更新方法和设备 |
| WO2009060283A1 (en) * | 2007-11-05 | 2009-05-14 | Synaptic Laboratories Limited | Method and apparatus for secure communication |
| KR100980831B1 (ko) | 2007-12-12 | 2010-09-10 | 한국전자통신연구원 | 일회용 패스워드를 이용한 신뢰성 있는 통신 시스템 및방법 |
| US8495357B2 (en) | 2007-12-19 | 2013-07-23 | International Business Machines Corporation | Data security policy enforcement |
| JP4896054B2 (ja) | 2008-03-06 | 2012-03-14 | イートライアル株式会社 | 個人情報管理装置,個人情報管理プログラムおよび個人情報管理システム |
| US8681990B2 (en) | 2008-03-28 | 2014-03-25 | International Business Machines Corporation | Renewal management for data items |
| US8225106B2 (en) | 2008-04-02 | 2012-07-17 | Protegrity Corporation | Differential encryption utilizing trust modes |
| US8494168B1 (en) | 2008-04-28 | 2013-07-23 | Netapp, Inc. | Locating cryptographic keys stored in a cache |
| US8589697B2 (en) | 2008-04-30 | 2013-11-19 | Netapp, Inc. | Discarding sensitive data from persistent point-in-time image |
| US20090300356A1 (en) | 2008-05-27 | 2009-12-03 | Crandell Jeffrey L | Remote storage encryption system |
| US20100014662A1 (en) | 2008-06-19 | 2010-01-21 | Sami Antti Jutila | Method, apparatus and computer program product for providing trusted storage of temporary subscriber data |
| US20110099362A1 (en) | 2008-06-23 | 2011-04-28 | Tomoyuki Haga | Information processing device, encryption key management method, computer program and integrated circuit |
| GB0811897D0 (en) | 2008-06-30 | 2008-07-30 | Steed Darren | Intelligent file encapsulation |
| US8261320B1 (en) | 2008-06-30 | 2012-09-04 | Symantec Corporation | Systems and methods for securely managing access to data |
| JP4620146B2 (ja) | 2008-07-18 | 2011-01-26 | 株式会社東芝 | 情報処理装置及び認証方法 |
| US8302170B2 (en) | 2008-09-22 | 2012-10-30 | Bespoke Innovations S.A.R.L. | Method for enhancing network application security |
| US8804950B1 (en) | 2008-09-30 | 2014-08-12 | Juniper Networks, Inc. | Methods and apparatus for producing a hash value based on a hash function |
| US8392682B2 (en) | 2008-12-17 | 2013-03-05 | Unisys Corporation | Storage security using cryptographic splitting |
| US8699704B2 (en) | 2010-01-13 | 2014-04-15 | Entropic Communications, Inc. | Secure node admission in a communication network |
| US9165154B2 (en) | 2009-02-16 | 2015-10-20 | Microsoft Technology Licensing, Llc | Trusted cloud computing and services framework |
| US8245037B1 (en) | 2009-02-17 | 2012-08-14 | Amazon Technologies, Inc. | Encryption key management |
| US8284945B2 (en) | 2009-06-02 | 2012-10-09 | Hewlett-Packard Development Company, L.P. | Automatic change of symmetrical encryption key |
| US9031876B2 (en) | 2009-06-19 | 2015-05-12 | Hewlett-Packard Development Company, L.P. | Managing keys for encrypted shared documents |
| JP2011019129A (ja) | 2009-07-09 | 2011-01-27 | Nec Corp | データ管理システム及びデータ管理方法 |
| US8799322B2 (en) | 2009-07-24 | 2014-08-05 | Cisco Technology, Inc. | Policy driven cloud storage management and cloud storage policy router |
| US9311465B2 (en) | 2009-09-21 | 2016-04-12 | James McNulty | Secure information storage and retrieval apparatus and method |
| IL201351A0 (en) | 2009-10-01 | 2010-05-31 | Michael Feldbau | Device and method for electronic signature via proxy |
| EP2513832A1 (en) * | 2009-12-18 | 2012-10-24 | Koninklijke Philips Electronics N.V. | Digital rights management using attribute-based encryption |
| GB201000288D0 (en) | 2010-01-11 | 2010-02-24 | Scentrics Information Security | System and method of enforcing a computer policy |
| JP5375976B2 (ja) * | 2010-01-22 | 2013-12-25 | 富士通株式会社 | 認証方法、認証システムおよび認証プログラム |
| US20110213971A1 (en) | 2010-03-01 | 2011-09-01 | Nokia Corporation | Method and apparatus for providing rights management at file system level |
| US8667269B2 (en) | 2010-04-02 | 2014-03-04 | Suridx, Inc. | Efficient, secure, cloud-based identity services |
| EP2378451B1 (en) | 2010-04-19 | 2018-07-04 | Vodafone Holding GmbH | User authentication in a tag-based service |
| US8601263B1 (en) | 2010-05-18 | 2013-12-03 | Google Inc. | Storing encrypted objects |
| US20120079289A1 (en) | 2010-09-27 | 2012-03-29 | Skymedi Corporation | Secure erase system for a solid state non-volatile memory device |
| US9961550B2 (en) * | 2010-11-04 | 2018-05-01 | Itron Networked Solutions, Inc. | Physically secured authorization for utility applications |
| US8401186B2 (en) | 2010-11-29 | 2013-03-19 | Beijing Z&W Technology Consulting Co., Ltd. | Cloud storage data access method, apparatus and system based on OTP |
| US8565422B2 (en) | 2010-12-03 | 2013-10-22 | Salesforce.Com, Inc. | Method and system for enryption key versioning and key rotation in a multi-tenant environment |
| KR101145766B1 (ko) | 2010-12-10 | 2012-05-16 | 고려대학교 산학협력단 | 보안 서비스 제공 시스템 및 방법 |
| US8478858B2 (en) | 2011-02-01 | 2013-07-02 | Limelight Networks, Inc. | Policy management for content storage in content delivery networks |
| US8588426B2 (en) | 2011-02-21 | 2013-11-19 | Blackberry Limited | Methods and apparatus to secure communications in a mobile network |
| US8850593B2 (en) | 2011-05-12 | 2014-09-30 | Hewlett-Packard Development Company, L.P. | Data management using a virtual machine-data image |
| US9076020B2 (en) | 2011-05-13 | 2015-07-07 | Microsoft Technology Licensing, Llc | Protected mode for mobile communication and other devices |
| US8544070B2 (en) | 2011-05-16 | 2013-09-24 | Novell, Inc. | Techniques for non repudiation of storage in cloud or shared storage environments |
| US9049023B2 (en) | 2011-05-24 | 2015-06-02 | Zeutro Llc | Outsourcing the decryption of functional encryption ciphertexts |
| US9106632B2 (en) | 2011-05-26 | 2015-08-11 | First Data Corporation | Provisioning by delivered items |
| KR20120134509A (ko) | 2011-06-02 | 2012-12-12 | 삼성전자주식회사 | 어플리케이션 개발 시스템에서 디바이스용 어플리케이션을 생성 및 설치하기 위한 장치 및 방법 |
| US8516244B2 (en) | 2011-06-10 | 2013-08-20 | Zeutro Llc | System, apparatus and method for decentralizing attribute-based encryption information |
| US20120323990A1 (en) | 2011-06-15 | 2012-12-20 | Microsoft Corporation | Efficient state reconciliation |
| US8751807B2 (en) | 2011-06-23 | 2014-06-10 | Azuki Systems Inc. | Method and system for secure over-the-top live video delivery |
| US9009315B2 (en) | 2011-07-28 | 2015-04-14 | Telefonaktiebolaget L M Ericsson (Publ) | Hierarchical delegation and reservation of lookup keys |
| US8798273B2 (en) | 2011-08-19 | 2014-08-05 | International Business Machines Corporation | Extending credential type to group Key Management Interoperability Protocol (KMIP) clients |
| US8788843B2 (en) | 2011-10-28 | 2014-07-22 | LogMeln, Inc. | Storing user data in a service provider cloud without exposing user-specific secrets to the service provider |
| WO2013084054A1 (en) | 2011-12-08 | 2013-06-13 | Dark Matter Labs Inc. | Key creation and rotation for data encryption |
| US8639951B2 (en) | 2011-12-19 | 2014-01-28 | International Business Machines Corporation | States for breakout appliance in a mobile data network |
| US8954758B2 (en) | 2011-12-20 | 2015-02-10 | Nicolas LEOUTSARAKOS | Password-less security and protection of online digital assets |
| US9449183B2 (en) | 2012-01-28 | 2016-09-20 | Jianqing Wu | Secure file drawer and safe |
| US9237446B2 (en) | 2012-05-24 | 2016-01-12 | Blackberry Limited | System and method for controlling access to media content |
| US20140012750A1 (en) | 2012-07-09 | 2014-01-09 | Jvl Ventures, Llc | Systems, methods, and computer program products for integrating third party services with a mobile wallet |
| US9137222B2 (en) | 2012-10-31 | 2015-09-15 | Vmware, Inc. | Crypto proxy for cloud storage services |
| US8713311B1 (en) * | 2012-11-07 | 2014-04-29 | Google Inc. | Encryption using alternate authentication key |
| US8997197B2 (en) | 2012-12-12 | 2015-03-31 | Citrix Systems, Inc. | Encryption-based data access management |
-
2013
- 2013-02-12 US US13/764,995 patent/US9547771B2/en active Active
-
2014
- 2014-02-07 CA CA2899014A patent/CA2899014C/en active Active
- 2014-02-07 EP EP14751881.5A patent/EP2957063B1/en active Active
- 2014-02-07 JP JP2015558044A patent/JP6329970B2/ja active Active
- 2014-02-07 WO PCT/US2014/015410 patent/WO2014126815A1/en not_active Ceased
- 2014-02-07 CN CN201480020517.5A patent/CN105103488B/zh active Active
-
2018
- 2018-01-05 JP JP2018000821A patent/JP2018077893A/ja active Pending
Also Published As
| Publication number | Publication date |
|---|---|
| EP2957063A1 (en) | 2015-12-23 |
| CA2899014C (en) | 2019-04-16 |
| EP2957063B1 (en) | 2020-07-29 |
| US20140230007A1 (en) | 2014-08-14 |
| CN105103488B (zh) | 2019-04-12 |
| CA2899014A1 (en) | 2014-08-21 |
| EP2957063A4 (en) | 2016-08-03 |
| US9547771B2 (en) | 2017-01-17 |
| JP2016515235A (ja) | 2016-05-26 |
| JP2018077893A (ja) | 2018-05-17 |
| CN105103488A (zh) | 2015-11-25 |
| WO2014126815A1 (en) | 2014-08-21 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP6329970B2 (ja) | 関連データを有するポリシー施行 | |
| JP7295068B2 (ja) | フェデレーテッドキー管理 | |
| US11372993B2 (en) | Automatic key rotation | |
| JP6542962B2 (ja) | 遅延データアクセス | |
| JP6606156B2 (ja) | データセキュリティサービス | |
| JP6678457B2 (ja) | データセキュリティサービス |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20151013 |
|
| A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20161025 |
|
| A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20170125 |
|
| A524 | Written submission of copy of amendment under article 19 pct |
Free format text: JAPANESE INTERMEDIATE CODE: A524 Effective date: 20170327 |
|
| A02 | Decision of refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A02 Effective date: 20170905 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20180105 |
|
| A911 | Transfer to examiner for re-examination before appeal (zenchi) |
Free format text: JAPANESE INTERMEDIATE CODE: A911 Effective date: 20180227 |
|
| TRDD | Decision of grant or rejection written | ||
| A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20180327 |
|
| A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20180423 |
|
| R150 | Certificate of patent or registration of utility model |
Ref document number: 6329970 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |