JP6514115B2 - フェデレーテッドキー管理 - Google Patents
フェデレーテッドキー管理 Download PDFInfo
- Publication number
- JP6514115B2 JP6514115B2 JP2015558043A JP2015558043A JP6514115B2 JP 6514115 B2 JP6514115 B2 JP 6514115B2 JP 2015558043 A JP2015558043 A JP 2015558043A JP 2015558043 A JP2015558043 A JP 2015558043A JP 6514115 B2 JP6514115 B2 JP 6514115B2
- Authority
- JP
- Japan
- Prior art keywords
- key
- request
- data
- service
- cryptographic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Power Engineering (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
Description
本出願は、2013年2月12日出願の米国特許出願第13/765,209号の優先権を主張するものであり、その内容は、参照によりその全体が本明細書内に組み込まれる。本出願は、全ての目的上、本明細書と同時出願された表題「AUTOMATIC KEY ROTATION」の同時係属中の米国特許出願第13/764,944号、本明細書と同時出願の表題「DATA SECURITY SERVICE」の同時係属中の米国特許出願第13/764,963号、本明細書と同時出願された表題「DATA SECURITY WITH A SECURITY MODULE」の同時係属中の米国特許出願第13/765,020号、本明細書と同時出願された表題「POLICY ENFORCEMENT WITH ASSOCIATED DATA」の同時係属中の米国特許出願第13/764,995号、本明細書と同時出願された表題「DELAYED DATA ACCESS」の同時係属中の米国特許出願第13/765,239号、本明細書と同時出願の表題「DATA SECURITY SERVICE」の同時係属中の米国特許出願第13/765,265号、及び本明細書と同時出願された表題「SECURE MANAGEMENT OF INFORMATION USING A SECURITY MODULE」の同時係属中の米国特許出願第13/765,283号の全開示を、参照により組み込む。
CreateKey(KeyID)
Encrypt(KeyID、Data、[AAD])
Decrypt(KeyID、Ciphertext、[AAD])
Shred(KeyID)
ReKey(Ciphertext、OldKeyID、NewKeyID)。
Suspend(KeyID、Public Key)
Reinstate(KeyID、Private Key)
本開示の実施形態は、以下の付記を考慮して説明することができる。
1.コンピュータ実装方法であって、
実行可能な命令で構成される1つ以上のコンピュータシステムの制御下で、
要求者から暗号操作を実行するための要求を受信することであって、該要求が情報及び少なくとも部分的に該情報に基づいて生成される電子署名を含み、該電子署名が第2のキーに対応する1つ以上のキーのセットのうちの第1のキーで検証可能である、受信することと、
該要求が複数のキー所有者のうちのキー所有者を指定するかどうかを検出することと、
該要求が複数のキー所有者のうちの特定のキー所有者を検出した結果、特定のキー所有者に、少なくとも
少なくとも部分的に該情報及び第1のキーに基づいて、電子署名が有効であるかどうかを決定させ、
少なくとも部分的に該情報に基づいて、該情報が要求を遂行するための1つ以上の条件を満たすかどうかを決定させることと、
特定のキー所有者が、電子署名は有効であり、該情報は1つ以上の条件を満たすと決定した結果、特定のキー所有者から、要求を遂行するために必要な応答情報を獲得することであって、該応答情報が、第2のキーを使用して実行される1つ以上の暗号操作に少なくとも部分的に基づいて生成されている、獲得することと、
獲得した応答情報を使用して、要求者に、要求への応答を提供することと、を含むコンピュータ実装方法。
2.特定のキー所有者が第三者によってホストされるコンピュータシステムである、付記1に記載のコンピュータ実装方法。
3.第2のキーに対応する1つ以上のキーのセットが、複数のキーを含み、該複数のキーの各キーを、要求の遂行のために必要とされる条件の充足を検証することに使用可能な、付記1または2に記載のコンピュータ実装方法。
4.暗号操作を実行するための第2の要求を受信することであって、第2の要求が第2の情報及び少なくとも部分的に第2の情報に基づいた第2の電子署名を含み、電子署名が第4のキーに対応する1つ以上のキーの第2のセットのうちの第3のキーで検証可能である、受信することと、
少なくとも部分的に第2の情報及び第3のキーに基づいて、第2の電子署名が有効であるかどうかを決定することと、
少なくとも部分的に第2の情報に基づいて、情報が第2の要求を遂行するための1つ以上の第2の条件を満たすかどうかを決定することと、
第2の電子署名が有効であり、第2の情報が1つ以上の第2の条件を満たすことを決定した結果、第4のキーを使用して第2の要求を遂行するための1つ以上の暗号操作を実行することと、をさらに含む、付記1〜3のいずれか一項に記載のコンピュータ実装方法。
5.要求を遂行するための1つ以上の条件が、第2のキーに対応する1つ以上のポリシーによって定義される、付記1〜4のいずれか一項に記載のコンピュータ実装方法。
6.第2のキーが平文形態において1つ以上のコンピュータシステムにアクセス不可能である、付記1〜5のいずれか一項に記載のコンピュータ実装方法。
7.コンピュータ実装方法であって、
実行可能な命令で構成される1つ以上のコンピュータシステムの制御下で、
要求に関連して、情報及び電子署名を、少なくとも部分的に該情報の少なくとも一部に基づいて、受信することと、
複数のキー所有者から、該情報内で指定される、第2のキーの所有者を検出することと、
第2のキーの所有者を検出した結果、第2のキーの所有者に、
少なくとも部分的に該情報の一部、及び第2のキーに関連付けられる第1のキーに基づいて、電子署名が有効であるかどうかを決定させ、かつ
署名が有効であることを決定した結果、第2のキーを使用して1つ以上の暗号操作を実行させることと、
第2のキーの所有者から得られる1つ以上の暗号の1つ以上の結果を使用して、要求を遂行することと、を含む、方法。
8.第1のキーが、第2のキーに対応する1つ以上のキーのセットの要素であり、1つ以上のキーのセットの各キーが、対応する要求が遂行されるためには有効であることが必要とされる電子署名を検証するために使用可能である、付記7に記載のコンピュータ実装方法。
9.第2のキーの所有者が第三者である、付記7または8に記載のコンピュータ実装方法。
10.1つ以上のコンピュータシステムが、平文形態にある第2のキーへのアクセスを欠く、付記7〜9のいずれか一項に記載のコンピュータ実装方法。
11.該情報が1つ以上の値を含み、
該方法が、1つ以上の値が1つ以上の条件を満たすかどうかを決定することをさらに含み、
要求を遂行することが、1つ以上の値が1つ以上の条件を満たすことを決定することに依存する、付記7〜10のいずれか一項に記載のコンピュータ実装方法。
12.第2のキーの所有者が1つ以上のコンピュータシステムである、付記7〜11のいずれか一項に記載のコンピュータ実装方法。
13.システムであって、
1つ以上のプロセッサと、
メモリであって、1つ以上のプロセッサによって実行されるとき、コンピュータシステムに、
第1のキーと関連した1つ以上のキーのセットを記憶させ、
遂行のために第1のキーの使用を必要とする要求を受信させ、かつ
第1のキーが第三者によって保有された結果、第三者に、
1つ以上のキーのセットから第2のキーを使用して、要求が遂行されるべきかどうかを決定させ、かつ
要求が遂行されるべきであると決定した結果、第1のキーを使用して1つ以上の暗号操作を実行させる、命令を含む、メモリと、を備える、システム。
14.第1のキーの所有者が第三者システムである、付記13に記載のシステム。
15.1つ以上のキーのセットが、管理キーのサブセットを含み、それぞれが、1つ以上のキーのセットの変更に必要とされる電子署名検証に使用可能な、付記13または14に記載のシステム。
16.システムが、エンティティによってホストされ、エンティティが平文形態にある第1のキーへのアクセスを欠く、付記13〜15のいずれか一項に記載のシステム。
17.要求が第1のキーを指定する、付記13〜16のいずれか一項に記載のシステム。
18.1つ以上のキーのセットから第2のキーを使用して、要求が遂行されるべきかどうかを決定することが、第2のキーを使用して、要求と関連して提出される電子署名を検出することを含む、付記13〜17のいずれか一項に記載の前記システム。
19.1つ以上のコンピュータ可読記憶媒体であって、コンピュータシステムの1つ以上のプロセッサによって実行されるとき、コンピュータシステムに、
1つ以上のキーのセットを第1のキーと関連付けさせ、かつ
1つ以上のキーの前記セットからの第2のキーを使用して、少なくとも、第1のキーの所有者に1つ以上の暗号操作において第1のキーを使用させることによって、要求の遂行を可能にするかどうかを決定させる、命令をそこに記憶している、コンピュータ可読記憶媒体。
20.第1のキーの所有者が第三者である、付記19に記載の1つ以上のコンピュータ可読記憶媒体。
21.要求が要求情報に関連して提出され、
命令がさらに、コンピュータシステムに、要求情報に対する1つ以上の条件が満たされることを検証させ、
1つ以上の条件の充足が、要求の遂行を可能にするために必要とされる、付記19または20に記載の1つ以上のコンピュータ可読記憶媒体。
22.1つ以上のキーのセットが管理キーのサブセットを含み、
管理キーのサブセット内の各管理キーが、1つ以上のキーのセットを変更するための要求を遂行するかどうかの決定に使用可能である、付記19〜21のいずれか一項に記載の1つ以上のコンピュータ可読記憶媒体。
23.1つ以上のキーのセットを変更することが、キーを追加すること、または1つ以上のキーのセットからキーを削除することを含む、付記22に記載の1つ以上のコンピュータ可読記憶媒体。
24.要求が第1のキーの所有者を識別する情報と関連して提出される、付記19〜23のいずれか一項に記載の1つ以上のコンピュータ可読記憶媒体。
25.第1のキーの所有者がコンピュータシステムである、付記19〜24のいずれか一項に記載の1つ以上のコンピュータ可読記憶媒体。
Claims (12)
- コンピュータによって実行される方法であって、前記方法は、
前記コンピュータが、要求に関連して、キーアクセスアノテーションを少なくとも含む情報及び前記情報の少なくとも一部に基づく電子署名を受信するステップであって、前記キーアクセスアノテーションは、1つまたは複数の暗号操作に使用される第2のキーと関連付けられた、前記電子署名を送信するデバイスが所有する別のキーを用いて電子署名される、ステップと、
前記コンピュータが、複数のキー所有者装置のデータから前記第2のキーの所有者装置を検出するステップであって、前記第2のキーの所有者装置は、前記要求によって示される処理を実行するコンピュータであり、前記第2のキーの所有者装置の識別子が前記キーアクセスアノテーションに含まれており、前記情報、及び前記第2のキーに関連付けられる第1のキーは、前記検出した第2のキーの所有者装置によって、前記電子署名が有効であるかどうかを決定するために使用される、ステップと、
前記電子署名が有効であることが決定されたことに応答して、前記検出した第2のキーの所有者装置が前記第2のキーを使用して前記1つまたは複数の暗号操作を実行するために、前記コンピュータが前記要求を前記検出した第2のキーの所有者装置に転送するステップと、
前記コンピュータが、前記検出した第2のキーの所有者装置から得られる1つまたは複数の前記暗号操作の1つまたは複数の結果を使用して、前記要求を遂行するステップと
を含むことを特徴とする方法。 - 前記第1のキーが、前記第2のキーに対応する、前記コンピュータが有する1つまたは複数のキーのセットの要素であり、1つまたは複数のキーの前記セットの各キーが、対応する要求が遂行されるためには有効であることが要求される電子署名を検証するために使用可能であることを特徴とする請求項1に記載の方法。
- 前記コンピュータが、平文形態にある前記第2のキーへのアクセスを欠くことを特徴とする請求項1または2に記載の方法。
- 前記情報が1つまたは複数の値を含み、
前記方法が、前記1つまたは複数の値が1つまたは複数の条件を満たすかどうかを決定することをさらに含み、
前記要求を遂行することが、前記1つまたは複数の値が前記1つまたは複数の条件を満たすことを決定することに依存することを特徴とする請求項1〜3のいずれか一項に記載の方法。 - システムであって、
1つまたは複数のプロセッサと、
メモリであって、前記1つまたは複数のプロセッサによって実行されるとき、前記システムに、
第1のコンピュータに、第2のキーと関連した1つまたは複数のキーのセットを記憶させることと、
前記第2のキーの使用を必要とする要求を受信し、前記要求はキーアクセスアノテーションを含み、前記キーアクセスアノテーションは、1つまたは複数の暗号操作に使用される前記第2のキーと関連付けられた別のキーを用いて電子署名され、前記別のキーは前記電子署名を送信するデバイスに所有され、前記1つまたは複数のキーのセットからの第1のキーは、前記電子署名が有効であるかどうかを決定することによって、前記要求が遂行されるべきかどうかを決定するために使用され、
前記要求が遂行されるべきであると決定したことに応答して、前記第1のコンピュータに、前記第2のキーを使用させ、前記1つまたは複数の暗号操作を実行させることと、
を実行させる、コンピュータ実行可能命令を記憶したメモリと、を備えることを特徴とするシステム。 - 前記第2のキーの所有者装置が前記第1のコンピュータであることを特徴とする請求項5に記載のシステム。
- 1つまたは複数のキーの前記セットが、管理キーのサブセットを含み、前記管理キーのそれぞれが、1つまたは複数のキーの前記セットのうちの対応する1つのキーの変更に対して必要とされる電子署名を検証するために使用可能であることを特徴とする請求項5または6に記載のシステム。
- 前記システムが、第2のコンピュータによってホストされ、前記第2のコンピュータが平文形態にある前記第2のキーへのアクセスを欠くことを特徴とする請求項5〜7のいずれか一項に記載のシステム。
- 前記要求が前記第2のキーを指定することを特徴とする請求項5〜8のいずれか一項に記載のシステム。
- 1つまたは複数のキーの前記セットの変更が、1つまたは複数のキーの前記セットからキーを追加、または除去することを含むことを特徴とする請求項7に記載のシステム。
- 前記要求が、前記第2のキーの所有者装置を識別する情報に関連して送信されることを特徴とする請求項5〜10のいずれか一項に記載のシステム。
- 前記第1のコンピュータが前記システムを制御する第2のコンピュータによって制御されることを特徴とする請求項5〜11のいずれか一項に記載のシステム。
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US13/765,209 US9705674B2 (en) | 2013-02-12 | 2013-02-12 | Federated key management |
| US13/765,209 | 2013-02-12 | ||
| PCT/US2014/015408 WO2014126814A1 (en) | 2013-02-12 | 2014-02-07 | Federated key management |
Related Child Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2017232031A Division JP7045837B2 (ja) | 2013-02-12 | 2017-12-01 | フェデレーテッドキー管理 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| JP2016511994A JP2016511994A (ja) | 2016-04-21 |
| JP6514115B2 true JP6514115B2 (ja) | 2019-05-15 |
Family
ID=51298337
Family Applications (5)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2015558043A Active JP6514115B2 (ja) | 2013-02-12 | 2014-02-07 | フェデレーテッドキー管理 |
| JP2017232031A Active JP7045837B2 (ja) | 2013-02-12 | 2017-12-01 | フェデレーテッドキー管理 |
| JP2020114298A Active JP7295068B2 (ja) | 2013-02-12 | 2020-07-01 | フェデレーテッドキー管理 |
| JP2023094952A Active JP7784204B2 (ja) | 2013-02-12 | 2023-06-08 | フェデレーテッドキー管理 |
| JP2025117291A Withdrawn JP2025157359A (ja) | 2013-02-12 | 2025-07-11 | フェデレーテッドキー管理 |
Family Applications After (4)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2017232031A Active JP7045837B2 (ja) | 2013-02-12 | 2017-12-01 | フェデレーテッドキー管理 |
| JP2020114298A Active JP7295068B2 (ja) | 2013-02-12 | 2020-07-01 | フェデレーテッドキー管理 |
| JP2023094952A Active JP7784204B2 (ja) | 2013-02-12 | 2023-06-08 | フェデレーテッドキー管理 |
| JP2025117291A Withdrawn JP2025157359A (ja) | 2013-02-12 | 2025-07-11 | フェデレーテッドキー管理 |
Country Status (6)
| Country | Link |
|---|---|
| US (4) | US9705674B2 (ja) |
| EP (2) | EP2957065A4 (ja) |
| JP (5) | JP6514115B2 (ja) |
| CN (2) | CN105191207B (ja) |
| CA (2) | CA2899008C (ja) |
| WO (1) | WO2014126814A1 (ja) |
Families Citing this family (77)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9590959B2 (en) | 2013-02-12 | 2017-03-07 | Amazon Technologies, Inc. | Data security service |
| US10075471B2 (en) | 2012-06-07 | 2018-09-11 | Amazon Technologies, Inc. | Data loss prevention techniques |
| US9286491B2 (en) | 2012-06-07 | 2016-03-15 | Amazon Technologies, Inc. | Virtual service provider zones |
| US10084818B1 (en) | 2012-06-07 | 2018-09-25 | Amazon Technologies, Inc. | Flexibly configurable data modification services |
| US9882713B1 (en) * | 2013-01-30 | 2018-01-30 | vIPtela Inc. | Method and system for key generation, distribution and management |
| US9300464B1 (en) | 2013-02-12 | 2016-03-29 | Amazon Technologies, Inc. | Probabilistic key rotation |
| US10210341B2 (en) | 2013-02-12 | 2019-02-19 | Amazon Technologies, Inc. | Delayed data access |
| US9367697B1 (en) | 2013-02-12 | 2016-06-14 | Amazon Technologies, Inc. | Data security with a security module |
| US10211977B1 (en) | 2013-02-12 | 2019-02-19 | Amazon Technologies, Inc. | Secure management of information using a security module |
| US10467422B1 (en) | 2013-02-12 | 2019-11-05 | Amazon Technologies, Inc. | Automatic key rotation |
| US9705674B2 (en) | 2013-02-12 | 2017-07-11 | Amazon Technologies, Inc. | Federated key management |
| US9953317B2 (en) * | 2013-03-13 | 2018-04-24 | Shopkeep.Com, Inc. | Method and system for secure key rotation |
| US9832171B1 (en) | 2013-06-13 | 2017-11-28 | Amazon Technologies, Inc. | Negotiating a session with a cryptographic domain |
| DE102013108714B3 (de) * | 2013-08-12 | 2014-08-21 | Deutsche Post Ag | Unterstützung einer Entschlüsselung von verschlüsselten Daten |
| US9722795B2 (en) * | 2014-05-20 | 2017-08-01 | Vmware, Inc. | Digitally signing JSON messages |
| US9397835B1 (en) | 2014-05-21 | 2016-07-19 | Amazon Technologies, Inc. | Web of trust management in a distributed system |
| US9438421B1 (en) | 2014-06-27 | 2016-09-06 | Amazon Technologies, Inc. | Supporting a fixed transaction rate with a variably-backed logical cryptographic key |
| US9866392B1 (en) | 2014-09-15 | 2018-01-09 | Amazon Technologies, Inc. | Distributed system web of trust provisioning |
| US9806887B1 (en) * | 2014-09-23 | 2017-10-31 | Amazon Technologies, Inc. | Authenticating nonces prior to encrypting and decrypting cryptographic keys |
| US10819959B2 (en) * | 2014-11-05 | 2020-10-27 | Jason Christopher Palazzolo | Firearm environmental recording apparatus and system |
| WO2016112338A1 (en) * | 2015-01-08 | 2016-07-14 | Intertrust Technologies Corporation | Cryptographic systems and methods |
| US9767293B2 (en) * | 2015-02-13 | 2017-09-19 | International Business Machines Corporation | Content based hardware security module assignment to virtual machines |
| US10158953B2 (en) | 2015-07-02 | 2018-12-18 | Gn Hearing A/S | Hearing device and method of updating a hearing device |
| EP3113516B1 (en) * | 2015-07-02 | 2023-05-31 | GN Hearing A/S | Hearing device and method of updating security settings of a hearing device |
| US10419401B2 (en) * | 2016-01-08 | 2019-09-17 | Capital One Services, Llc | Methods and systems for securing data in the public cloud |
| US10757165B2 (en) * | 2016-06-10 | 2020-08-25 | Amdocs Development Limited | System and method for delegating service entitlements across multiple media services |
| US10389793B2 (en) * | 2016-06-10 | 2019-08-20 | Amdocs Development Limited | System and method for providing feature-level delegation of service entitlements among users in a group |
| US9887975B1 (en) | 2016-08-03 | 2018-02-06 | KryptCo, Inc. | Systems and methods for delegated cryptography |
| US10887291B2 (en) | 2016-12-16 | 2021-01-05 | Amazon Technologies, Inc. | Secure data distribution of sensitive data across content delivery networks |
| US20180176187A1 (en) * | 2016-12-16 | 2018-06-21 | Amazon Technologies, Inc. | Secure data ingestion for sensitive data across networks |
| US10313344B2 (en) | 2017-03-30 | 2019-06-04 | Bank Of America Corporation | Internal footprint repository |
| CN109150814B (zh) * | 2017-06-28 | 2022-12-02 | 西安中兴新软件有限责任公司 | 数据处理方法及其装置、终端、存储介质 |
| CN109462472A (zh) * | 2017-09-06 | 2019-03-12 | 阿里巴巴集团控股有限公司 | 数据加密和解密的方法、装置和系统 |
| EP3714389B1 (en) * | 2017-11-20 | 2023-08-02 | Telefonaktiebolaget LM Ericsson (PUBL) | Deployment of components of a distributed application to runtime environments |
| US11349822B2 (en) * | 2017-11-20 | 2022-05-31 | Fortanix, Inc. | Runtime encryption plugin for a key management system |
| KR102504361B1 (ko) * | 2017-12-13 | 2023-02-28 | 비자 인터네셔널 서비스 어소시에이션 | 보안 트랜잭션용 장치의 자가 인증 |
| US11074997B2 (en) * | 2018-01-23 | 2021-07-27 | Statum Systems Inc. | Multi-modal encrypted messaging system |
| US10893505B2 (en) | 2018-01-23 | 2021-01-12 | Statum Systems Inc. | Enhanced pager network |
| US11070373B2 (en) | 2018-02-21 | 2021-07-20 | Ebay Inc. | Masked key hopping |
| US11373176B2 (en) * | 2018-02-22 | 2022-06-28 | Wells Fargo Bank, N.A. | Systems and methods for federated identity management |
| US10764036B1 (en) * | 2018-03-06 | 2020-09-01 | Wells Fargo Bank, N.A. | Derived unique key per raindrop (DUKPR) |
| US11159498B1 (en) | 2018-03-21 | 2021-10-26 | Amazon Technologies, Inc. | Information security proxy service |
| US10554701B1 (en) * | 2018-04-09 | 2020-02-04 | Amazon Technologies, Inc. | Real-time call tracing in a service-oriented system |
| EP3554096B9 (en) | 2018-04-11 | 2023-07-05 | GN Hearing A/S | A hearing aid housing with an integrated antenna |
| US10909250B2 (en) * | 2018-05-02 | 2021-02-02 | Amazon Technologies, Inc. | Key management and hardware security integration |
| US10606888B2 (en) * | 2018-06-05 | 2020-03-31 | Eight Plus Ventures, LLC | Image inventory production |
| US10979403B1 (en) | 2018-06-08 | 2021-04-13 | Amazon Technologies, Inc. | Cryptographic configuration enforcement |
| US11042661B2 (en) * | 2018-06-08 | 2021-06-22 | Weka.IO Ltd. | Encryption for a distributed filesystem |
| US11210664B2 (en) * | 2018-10-02 | 2021-12-28 | Capital One Services, Llc | Systems and methods for amplifying the strength of cryptographic algorithms |
| US10956600B2 (en) * | 2018-10-31 | 2021-03-23 | Salesforce.Com, Inc. | Highly available encryption framework for multiple different computing environments |
| US11177933B2 (en) * | 2019-03-24 | 2021-11-16 | Google Llc | Side channel timing attack mitigation in securing data in transit |
| US20200396054A1 (en) * | 2019-06-17 | 2020-12-17 | Macronix International Co., Ltd. | Secure Memory Read |
| US11188658B2 (en) * | 2019-09-11 | 2021-11-30 | International Business Machines Corporation | Concurrent enablement of encryption on an operational path at a storage port |
| US11188659B2 (en) * | 2019-09-11 | 2021-11-30 | International Business Machines Corporation | Concurrent enablement of encryption on an operational path at a host port |
| US11308243B2 (en) | 2019-09-11 | 2022-04-19 | International Business Machines Corporation | Maintenance of access for security enablement in a storage device |
| US11354455B2 (en) | 2019-09-11 | 2022-06-07 | International Business Machines Corporation | Maintenance of access for security enablement on a host system |
| GB201913144D0 (en) * | 2019-09-12 | 2019-10-30 | Nchain Holdings Ltd | Sharing data via transactions of a blockchain |
| US11887072B2 (en) | 2019-12-11 | 2024-01-30 | Bitt Inc. | Digital currency minting in a system of network nodes implementing a distributed ledger |
| US11641275B2 (en) * | 2019-12-11 | 2023-05-02 | LendingClub Bank, National Association | Encryption key rotation framework |
| CN111222958B (zh) * | 2020-01-10 | 2023-12-05 | 临沂大学 | 一种机械设备动力控制方法、系统、介质及电子设备 |
| JP7397403B2 (ja) * | 2020-01-20 | 2023-12-13 | 大日本印刷株式会社 | 電子情報記憶媒体、認証コード生成方法、認証コード検証方法、及びプログラム |
| US10873852B1 (en) | 2020-04-10 | 2020-12-22 | Avila Technology, LLC | POOFster: a secure mobile text message and object sharing application, system, and method for same |
| US11151229B1 (en) | 2020-04-10 | 2021-10-19 | Avila Technology, LLC | Secure messaging service with digital rights management using blockchain technology |
| US11943338B2 (en) * | 2021-08-19 | 2024-03-26 | Capital One Services, Llc | Object-level encryption |
| US20230078187A1 (en) * | 2021-09-12 | 2023-03-16 | Zoom Video Communications, Inc. | Distributed Encryption Key Allocation |
| US12381731B2 (en) * | 2022-02-03 | 2025-08-05 | Tassat Group Inc. | Method, controller, and computer-readable medium of a distributed ledger network for initiating a net transmission among a plurality of clients of the distributed ledger network |
| US12411714B2 (en) * | 2022-02-03 | 2025-09-09 | Tassat Group Inc. | Method, controller, and computer-readable medium of a distributed ledger network for uninterrupted transmission processing and continuous net transmission among a plurality of clients of the distributed ledger network |
| US12445415B2 (en) | 2022-08-11 | 2025-10-14 | Microsoft Technology Licensing, Llc | Verifiable identity map maintaining identities and associated public keys |
| US12395331B2 (en) * | 2022-09-13 | 2025-08-19 | Microsoft Technology Licensing, Llc | Decryption key generation and recovery |
| US12401630B2 (en) | 2022-09-30 | 2025-08-26 | Microsoft Technology Licensing, Llc | Zero-trust distributed data sharing |
| US12393720B2 (en) | 2022-10-07 | 2025-08-19 | Microsoft Technology Licensing, Llc | Blind subpoena protection |
| US12580740B2 (en) | 2022-10-10 | 2026-03-17 | Microsoft Technology Licensing, Llc | Access control using mediated location, attribute, policy, and purpose verification |
| US12452041B2 (en) | 2022-10-21 | 2025-10-21 | Zoom Communications, Inc. | Distributed encryption management |
| US12537680B2 (en) * | 2022-11-18 | 2026-01-27 | Dropbox, Inc. | Secure caching of namespace keys |
| US12432056B2 (en) * | 2023-03-07 | 2025-09-30 | Rubrik, Inc. | Unified key management |
| CN117061101A (zh) * | 2023-08-09 | 2023-11-14 | 中国银联股份有限公司 | 一种密钥更新方法、装置、设备及存储介质 |
| US12411973B2 (en) | 2023-11-08 | 2025-09-09 | Bank Of America Corporation | System and method for enhanced encryption orchestration and application integration framework |
Family Cites Families (387)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6175625B1 (en) | 1944-12-15 | 2001-01-16 | The United States Of America As Represented By The National Security Agency | Control circuits for electric coding machines |
| US4908759A (en) | 1985-08-29 | 1990-03-13 | Bell Communications Research, Inc. | Hierarchical database conversion with conditional write |
| US4782517A (en) | 1986-09-08 | 1988-11-01 | Bell Communications Research, Inc. | System and method for defining and providing telephone network services |
| US4868877A (en) | 1988-02-12 | 1989-09-19 | Fischer Addison M | Public key/signature cryptosystem with enhanced digital signature certification |
| US4918728A (en) | 1989-08-30 | 1990-04-17 | International Business Machines Corporation | Data cryptography operations using control vectors |
| US6044205A (en) | 1996-02-29 | 2000-03-28 | Intermind Corporation | Communications system for transferring information between memories according to processes transferred with the information |
| US5054067A (en) | 1990-02-21 | 1991-10-01 | General Instrument Corporation | Block-cipher cryptographic device based upon a pseudorandom nonlinear sequence generator |
| US5146498A (en) | 1991-01-10 | 1992-09-08 | Motorola, Inc. | Remote key manipulations for over-the-air re-keying |
| US5201000A (en) | 1991-09-27 | 1993-04-06 | International Business Machines Corporation | Method for generating public and private key pairs without using a passphrase |
| US5870477A (en) | 1993-09-29 | 1999-02-09 | Pumpkin House Incorporated | Enciphering/deciphering device and method, and encryption/decryption communication system |
| US5495533A (en) | 1994-04-29 | 1996-02-27 | International Business Machines Corporation | Personal key archive |
| US7904722B2 (en) | 1994-07-19 | 2011-03-08 | Certco, Llc | Method for securely using digital signatures in a commercial cryptographic system |
| US5826245A (en) * | 1995-03-20 | 1998-10-20 | Sandberg-Diment; Erik | Providing verification information for a transaction |
| US5633931A (en) | 1995-06-30 | 1997-05-27 | Novell, Inc. | Method and apparatus for calculating message signatures in advance |
| US5675653A (en) | 1995-11-06 | 1997-10-07 | Nelson, Jr.; Douglas Valmore | Method and apparatus for digital encryption |
| US5761306A (en) | 1996-02-22 | 1998-06-02 | Visa International Service Association | Key replacement in a public key cryptosystem |
| US5933503A (en) | 1996-03-15 | 1999-08-03 | Novell, Inc | Controlled modular cryptography apparatus and method |
| US5862220A (en) * | 1996-06-03 | 1999-01-19 | Webtv Networks, Inc. | Method and apparatus for using network address information to improve the performance of network transactions |
| US6012144A (en) * | 1996-10-08 | 2000-01-04 | Pickett; Thomas E. | Transaction security method and apparatus |
| US6934249B1 (en) | 1997-04-01 | 2005-08-23 | Cisco Technology, Inc. | Method and system for minimizing the connection set up time in high speed packet switching networks |
| US7194424B2 (en) | 1997-06-25 | 2007-03-20 | Intel Corporation | User demographic profile driven advertising targeting |
| US20010011226A1 (en) | 1997-06-25 | 2001-08-02 | Paul Greer | User demographic profile driven advertising targeting |
| JP3542895B2 (ja) | 1997-08-22 | 2004-07-14 | インターナショナル・ビジネス・マシーンズ・コーポレーション | 時間制約暗号システム |
| CA2302784A1 (en) | 1997-09-17 | 1999-03-25 | Frank C. Luyster | Improved block cipher method |
| US6978017B2 (en) | 1997-10-14 | 2005-12-20 | Entrust Limited | Method and system for providing updated encryption key pairs and digital signature key pairs in a public key system |
| US6259789B1 (en) | 1997-12-12 | 2001-07-10 | Safecourier Software, Inc. | Computer implemented secret object key block cipher encryption and digital signature device and method |
| US6195622B1 (en) | 1998-01-15 | 2001-02-27 | Microsoft Corporation | Methods and apparatus for building attribute transition probability models for use in pre-fetching resources |
| US6185679B1 (en) | 1998-02-23 | 2001-02-06 | International Business Machines Corporation | Method and apparatus for a symmetric block cipher using multiple stages with type-1 and type-3 feistel networks |
| JP3659791B2 (ja) | 1998-03-23 | 2005-06-15 | インターナショナル・ビジネス・マシーンズ・コーポレーション | 小時間鍵生成の方法及びシステム |
| US6336186B1 (en) | 1998-07-02 | 2002-01-01 | Networks Associates Technology, Inc. | Cryptographic system and methodology for creating and managing crypto policy on certificate servers |
| JP3939453B2 (ja) | 1999-01-22 | 2007-07-04 | 三菱電機株式会社 | 情報仲介システム |
| US6356941B1 (en) | 1999-02-22 | 2002-03-12 | Cyber-Ark Software Ltd. | Network vaults |
| US6505299B1 (en) | 1999-03-01 | 2003-01-07 | Sharp Laboratories Of America, Inc. | Digital image scrambling for image coding systems |
| US20020135611A1 (en) | 1999-03-04 | 2002-09-26 | Trevor Deosaran | Remote performance management to accelerate distributed processes |
| US6546492B1 (en) | 1999-03-26 | 2003-04-08 | Ericsson Inc. | System for secure controlled electronic memory updates via networks |
| JP2000295209A (ja) | 1999-04-09 | 2000-10-20 | Ntt Data Corp | 鍵管理方法、鍵管理システム及び記録媒体 |
| JP4132530B2 (ja) * | 2000-01-24 | 2008-08-13 | 株式会社リコー | 電子保存装置 |
| US6721713B1 (en) | 1999-05-27 | 2004-04-13 | Andersen Consulting Llp | Business alliance identification in a web architecture framework |
| US7882247B2 (en) | 1999-06-11 | 2011-02-01 | Netmotion Wireless, Inc. | Method and apparatus for providing secure connectivity in mobile and other intermittent computing environments |
| US8868914B2 (en) | 1999-07-02 | 2014-10-21 | Steven W. Teppler | System and methods for distributing trusted time |
| SE9904094D0 (sv) | 1999-11-12 | 1999-11-12 | Protegrity Research & Dev | Method for reencryption of a database |
| WO2001054099A1 (en) | 2000-01-21 | 2001-07-26 | Sony Corporation | Data authentication system |
| US6826609B1 (en) | 2000-03-31 | 2004-11-30 | Tumbleweed Communications Corp. | Policy enforcement in a secure data file delivery system |
| US20050195743A1 (en) | 2000-04-03 | 2005-09-08 | P-Cube Ltd. | Real time charging of pre-paid accounts |
| DE10025626A1 (de) | 2000-05-24 | 2001-11-29 | Deutsche Telekom Ag | Verschlüsseln von abzuspeichernden Daten in einem IV-System |
| US8538843B2 (en) | 2000-07-17 | 2013-09-17 | Galactic Computing Corporation Bvi/Bc | Method and system for operating an E-commerce service provider |
| US7362868B2 (en) | 2000-10-20 | 2008-04-22 | Eruces, Inc. | Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data |
| US20030021417A1 (en) * | 2000-10-20 | 2003-01-30 | Ognjen Vasic | Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data |
| JP2002140534A (ja) | 2000-11-01 | 2002-05-17 | Sony Corp | ログ管理構成を持つコンテンツ配信システムおよびコンテンツ配信方法 |
| US6986040B1 (en) | 2000-11-03 | 2006-01-10 | Citrix Systems, Inc. | System and method of exploiting the security of a secure communication channel to secure a non-secure communication channel |
| WO2002044970A1 (en) | 2000-11-28 | 2002-06-06 | Sanyo Electric Co., Ltd. | Data terminal for managing ciphered content data and license acquired by software |
| US7085834B2 (en) | 2000-12-22 | 2006-08-01 | Oracle International Corporation | Determining a user's groups |
| US7493391B2 (en) | 2001-02-12 | 2009-02-17 | International Business Machines Corporation | System for automated session resource clean-up by determining whether server resources have been held by client longer than preset thresholds |
| US7711122B2 (en) | 2001-03-09 | 2010-05-04 | Arcot Systems, Inc. | Method and apparatus for cryptographic key storage wherein key servers are authenticated by possession and secure distribution of stored keys |
| US7181017B1 (en) | 2001-03-23 | 2007-02-20 | David Felsher | System and method for secure three-party communications |
| US7050583B2 (en) | 2001-03-29 | 2006-05-23 | Etreppid Technologies, Llc | Method and apparatus for streaming data using rotating cryptographic keys |
| US20030037237A1 (en) | 2001-04-09 | 2003-02-20 | Jean-Paul Abgrall | Systems and methods for computer device authentication |
| US6934702B2 (en) | 2001-05-04 | 2005-08-23 | Sun Microsystems, Inc. | Method and system of routing messages in a distributed search network |
| JP2007037197A (ja) | 2001-08-01 | 2007-02-08 | Matsushita Electric Ind Co Ltd | 暗号化データ配信システム |
| CA2358048A1 (en) | 2001-09-25 | 2003-03-25 | Luis Rueda | A cryptosystem for data security |
| CA2358980A1 (en) | 2001-10-12 | 2003-04-12 | Karthika Technologies Inc. | Distributed security architecture for storage area networks (san) |
| US7200747B2 (en) | 2001-10-31 | 2007-04-03 | Hewlett-Packard Development Company, L.P. | System for ensuring data privacy and user differentiation in a distributed file system |
| US7333616B1 (en) | 2001-11-14 | 2008-02-19 | Omniva Corp. | Approach for managing access to messages using encryption key management policies |
| US7243366B2 (en) | 2001-11-15 | 2007-07-10 | General Instrument Corporation | Key management protocol and authentication system for secure internet protocol rights management architecture |
| US20020076044A1 (en) | 2001-11-16 | 2002-06-20 | Paul Pires | Method of and system for encrypting messages, generating encryption keys and producing secure session keys |
| US7865446B2 (en) * | 2001-12-11 | 2011-01-04 | International Businesss Machines Corporation | Method for secure electronic commercial transaction on-line processing |
| US7392390B2 (en) | 2001-12-12 | 2008-06-24 | Valve Corporation | Method and system for binding kerberos-style authenticators to single clients |
| JP4291970B2 (ja) | 2001-12-20 | 2009-07-08 | 富士通株式会社 | 暗号処理装置 |
| US7117366B2 (en) | 2002-01-08 | 2006-10-03 | International Business Machines Corporation | Public key based authentication method for transaction delegation in service-based computing environments |
| US7376967B1 (en) | 2002-01-14 | 2008-05-20 | F5 Networks, Inc. | Method and system for performing asynchronous cryptographic operations |
| US20030145203A1 (en) * | 2002-01-30 | 2003-07-31 | Yves Audebert | System and method for performing mutual authentications between security tokens |
| US7146009B2 (en) | 2002-02-05 | 2006-12-05 | Surety, Llc | Secure electronic messaging system requiring key retrieval for deriving decryption keys |
| JP3897613B2 (ja) | 2002-02-27 | 2007-03-28 | 株式会社日立製作所 | 公開鍵暗号方式における登録局サーバの運用方法、登録局サーバ、及びプログラム |
| US7400733B1 (en) | 2002-02-27 | 2008-07-15 | Atheros Communications, Inc. | Key refresh at the MAC layer |
| US20030188188A1 (en) | 2002-03-15 | 2003-10-02 | Microsoft Corporation | Time-window-constrained multicast for future delivery multicast |
| US7890771B2 (en) | 2002-04-17 | 2011-02-15 | Microsoft Corporation | Saving and retrieving data based on public key encryption |
| US20030217126A1 (en) | 2002-05-14 | 2003-11-20 | Polcha Andrew J. | System and method for automatically configuring remote computer |
| US6965674B2 (en) | 2002-05-21 | 2005-11-15 | Wavelink Corporation | System and method for providing WLAN security through synchronized update and rotation of WEP keys |
| WO2003101020A1 (en) | 2002-05-23 | 2003-12-04 | Atmel Corporation | Advanced encryption standard (aes) hardware cryptographic engine |
| US20040009815A1 (en) | 2002-06-26 | 2004-01-15 | Zotto Banjamin O. | Managing access to content |
| KR20050026478A (ko) | 2002-07-12 | 2005-03-15 | 인그리안 네트웍스, 인코퍼레이티드 | 암호화된 네트워크 |
| US7844717B2 (en) | 2003-07-18 | 2010-11-30 | Herz Frederick S M | Use of proxy servers and pseudonymous transactions to maintain individual's privacy in the competitive business of maintaining personal history databases |
| US7620680B1 (en) | 2002-08-15 | 2009-11-17 | Microsoft Corporation | Fast byzantine paxos |
| US7877607B2 (en) | 2002-08-30 | 2011-01-25 | Hewlett-Packard Development Company, L.P. | Tamper-evident data management |
| FR2844656B1 (fr) | 2002-09-18 | 2005-01-28 | France Telecom | Procede de signature electronique, programme et serveur pour la mise en oeuvre du procede |
| US8064508B1 (en) | 2002-09-19 | 2011-11-22 | Silicon Image, Inc. | Equalizer with controllably weighted parallel high pass and low pass filters and receiver including such an equalizer |
| US20040107345A1 (en) | 2002-10-21 | 2004-06-03 | Brandt David D. | System and methodology providing automation security protocols and intrusion detection in an industrial controller environment |
| US7565419B1 (en) | 2002-11-22 | 2009-07-21 | Symantec Operating Corporation | Conflict resolution in a peer to peer network |
| FR2848052B1 (fr) | 2002-11-29 | 2005-03-18 | Orange France | Systeme et procede de selection dans un terminal pour une architecture dediee a un reseau de communication |
| JP2004208184A (ja) | 2002-12-26 | 2004-07-22 | Matsushita Electric Ind Co Ltd | 秘密鍵管理装置、秘密鍵管理方法および秘密鍵管理プログラム |
| US20040143733A1 (en) | 2003-01-16 | 2004-07-22 | Cloverleaf Communication Co. | Secure network data storage mediator |
| US20050021712A1 (en) | 2003-01-24 | 2005-01-27 | Constantin Chassapis | Multi-user, multi-device remote access system |
| US7003117B2 (en) | 2003-02-05 | 2006-02-21 | Voltage Security, Inc. | Identity-based encryption system for secure data distribution |
| DE10306268A1 (de) | 2003-02-14 | 2004-08-26 | Michael Sack | Verfahren zum Übermitteln eines Nutzerdatensatzes an eine Anwenderstation |
| ATE490511T1 (de) | 2003-02-28 | 2010-12-15 | Research In Motion Ltd | System und verfahren zum schutz von daten in einem kommunikationsgerät |
| GB2400699B (en) | 2003-04-17 | 2006-07-05 | Hewlett Packard Development Co | Security data provision method and apparatus and data recovery method and system |
| US7093147B2 (en) | 2003-04-25 | 2006-08-15 | Hewlett-Packard Development Company, L.P. | Dynamically selecting processor cores for overall power efficiency |
| US20050015471A1 (en) | 2003-07-18 | 2005-01-20 | Zhang Pu Paul | Secure cluster configuration data set transfer protocol |
| US7697690B2 (en) | 2003-07-21 | 2010-04-13 | Hewlett-Packard Development Company, L.P. | Windowed backward key rotation |
| JP4062206B2 (ja) | 2003-08-01 | 2008-03-19 | 日本電気株式会社 | 署名復号サービスシステム及びプログラム |
| JP4437650B2 (ja) | 2003-08-25 | 2010-03-24 | 株式会社日立製作所 | ストレージシステム |
| JP2005151529A (ja) | 2003-10-20 | 2005-06-09 | Sony Corp | データ伝送方法、データ伝送装置及びデータ受信装置 |
| US7421079B2 (en) | 2003-12-09 | 2008-09-02 | Northrop Grumman Corporation | Method and apparatus for secure key replacement |
| JP2005197912A (ja) | 2004-01-06 | 2005-07-21 | Nippon Telegr & Teleph Corp <Ntt> | 情報開示制御方法、情報開示制御プログラム、ならびに、耐タンパ装置 |
| US8065720B1 (en) * | 2004-01-06 | 2011-11-22 | Novell, Inc. | Techniques for managing secure communications |
| US7296023B2 (en) | 2004-01-15 | 2007-11-13 | International Business Machines Corporation | Method and apparatus for persistent real-time collaboration |
| JP2005258801A (ja) | 2004-03-11 | 2005-09-22 | Matsushita Electric Ind Co Ltd | 個人認証システム |
| US8086702B2 (en) | 2005-03-16 | 2011-12-27 | Icontrol Networks, Inc. | Takeover processes in security network integrated with premise security system |
| US7418728B2 (en) | 2004-03-17 | 2008-08-26 | Arcot Systems, Inc. | Auditing secret key cryptographic operations |
| EP2267625A3 (en) * | 2004-04-19 | 2015-08-05 | Lumension Security S.A. | On-line centralized and local authorization of executable files |
| US7894604B2 (en) | 2004-05-17 | 2011-02-22 | Mitsubishi Electric Corporation | Quantum cryptographic communication apparatus |
| US20050273629A1 (en) | 2004-06-04 | 2005-12-08 | Vitalsource Technologies | System, method and computer program product for providing digital rights management of protected content |
| US20060010323A1 (en) | 2004-07-07 | 2006-01-12 | Xerox Corporation | Method for a repository to provide access to a document, and a repository arranged in accordance with the same method |
| KR20070030272A (ko) | 2004-07-15 | 2007-03-15 | 마츠시타 덴끼 산교 가부시키가이샤 | 시각인증장치, 시각인증방법, 컴퓨터 프로그램, 기록매체,집적회로 및 시각인증시스템 |
| US20060021018A1 (en) | 2004-07-21 | 2006-01-26 | International Business Machines Corporation | Method and system for enabling trust infrastructure support for federated user lifecycle management |
| US20060048222A1 (en) | 2004-08-27 | 2006-03-02 | O'connor Clint H | Secure electronic delivery seal for information handling system |
| WO2006026737A2 (en) * | 2004-08-31 | 2006-03-09 | Ntt Docomo Inc. | Revocation of cryptographic digital certificates |
| US20070100834A1 (en) | 2004-09-15 | 2007-05-03 | John Landry | System and method for managing data in a distributed computer system |
| JP2006099548A (ja) | 2004-09-30 | 2006-04-13 | Hitachi Ltd | データ共有システム、データ共有方法、データ保有者デバイスおよびデータサーバ |
| US7756808B2 (en) | 2004-10-14 | 2010-07-13 | Sap Ag | Apparatus and product of manufacture for using condition data structures separately from rule data structures in business transactions |
| US7970625B2 (en) | 2004-11-04 | 2011-06-28 | Dr Systems, Inc. | Systems and methods for retrieval of medical data |
| US8315387B2 (en) | 2004-11-05 | 2012-11-20 | Nucrypt Llc | System and method for data transmission over arbitrary media using physical encryption |
| JP4679123B2 (ja) | 2004-11-26 | 2011-04-27 | 株式会社コーナン・メディカル | フォトレフラクター |
| US20070168292A1 (en) | 2004-12-21 | 2007-07-19 | Fabrice Jogand-Coulomb | Memory system with versatile content control |
| US7607164B2 (en) | 2004-12-23 | 2009-10-20 | Microsoft Corporation | Systems and processes for managing policy change in a distributed enterprise |
| US7707288B2 (en) | 2005-01-06 | 2010-04-27 | International Business Machines Corporation | Automatically building a locally managed virtual node grouping to handle a grid job requiring a degree of resource parallelism within a grid environment |
| JP4714482B2 (ja) | 2005-02-28 | 2011-06-29 | 株式会社日立製作所 | 暗号通信システムおよび方法 |
| US7900247B2 (en) | 2005-03-14 | 2011-03-01 | Microsoft Corporation | Trusted third party authentication for web services |
| US7774826B1 (en) | 2005-03-18 | 2010-08-10 | Novell, Inc. | System and method for determining effective policy profiles in a client-server architecture |
| JP4622627B2 (ja) | 2005-03-30 | 2011-02-02 | ブラザー工業株式会社 | 通信装置、通信システム及びプログラム |
| US8554916B2 (en) | 2005-04-11 | 2013-10-08 | Accenture Global Services Gmbh | Service delivery platform and development of new client business models |
| US8051487B2 (en) | 2005-05-09 | 2011-11-01 | Trend Micro Incorporated | Cascading security architecture |
| US8973008B2 (en) | 2005-05-10 | 2015-03-03 | Oracle America, Inc. | Combining different resource types |
| JP2006319543A (ja) | 2005-05-11 | 2006-11-24 | Nec Corp | コンテンツ再生システム、携帯端末、コンテンツ再生方法、およびコンテンツ再生管理プログラム |
| US8312064B1 (en) | 2005-05-11 | 2012-11-13 | Symantec Corporation | Method and apparatus for securing documents using a position dependent file system |
| US8028329B2 (en) | 2005-06-13 | 2011-09-27 | Iamsecureonline, Inc. | Proxy authentication network |
| US7639819B2 (en) | 2005-06-16 | 2009-12-29 | Oracle International Corporation | Method and apparatus for using an external security device to secure data in a database |
| US8295492B2 (en) | 2005-06-27 | 2012-10-23 | Wells Fargo Bank, N.A. | Automated key management system |
| US7784087B2 (en) | 2005-08-04 | 2010-08-24 | Toshiba Corporation | System and method for securely sharing electronic documents |
| US8917159B2 (en) | 2005-08-19 | 2014-12-23 | CLARKE William McALLISTER | Fully secure item-level tagging |
| US8566607B2 (en) | 2005-08-26 | 2013-10-22 | International Business Machines Corporation | Cryptography methods and apparatus used with a processor |
| US20070055921A1 (en) | 2005-08-30 | 2007-03-08 | Challenor Timothy W | Document editing system |
| US20070055862A1 (en) | 2005-09-08 | 2007-03-08 | Interdigital Technology Corporation | Method and system for distributing data |
| JP2007081482A (ja) | 2005-09-09 | 2007-03-29 | Canon Inc | 端末認証方法及びその装置、プログラム |
| US7680905B1 (en) | 2005-09-30 | 2010-03-16 | Emc Corporation | Methods and system for viewing SAN resources |
| FI20051022L (fi) * | 2005-10-11 | 2007-04-12 | Meridea Financial Software Oy | Menetelmä, laite, palvelinjärjestely, järjestelmä ja tietokoneohjelmatuotteet datan tallentamiseksi turvallisesti kannettavassa laitteessa |
| US9055093B2 (en) | 2005-10-21 | 2015-06-09 | Kevin R. Borders | Method, system and computer program product for detecting at least one of security threats and undesirable computer files |
| JP4569464B2 (ja) | 2005-12-20 | 2010-10-27 | 沖電気工業株式会社 | マルチホップネットワークにおける鍵更新システム,鍵管理装置,通信端末および鍵情報構築方法 |
| US20070143851A1 (en) | 2005-12-21 | 2007-06-21 | Fiberlink | Method and systems for controlling access to computing resources based on known security vulnerabilities |
| US7716240B2 (en) | 2005-12-29 | 2010-05-11 | Nextlabs, Inc. | Techniques and system to deploy policies intelligently |
| US8150816B2 (en) | 2005-12-29 | 2012-04-03 | Nextlabs, Inc. | Techniques of optimizing policies in an information management system |
| US9407662B2 (en) | 2005-12-29 | 2016-08-02 | Nextlabs, Inc. | Analyzing activity data of an information management system |
| US20070174429A1 (en) | 2006-01-24 | 2007-07-26 | Citrix Systems, Inc. | Methods and servers for establishing a connection between a client system and a virtual machine hosting a requested computing environment |
| US7912994B2 (en) | 2006-01-27 | 2011-03-22 | Apple Inc. | Reducing connection time for mass storage class peripheral by internally prefetching file data into local cache in response to connection to host |
| US7925023B2 (en) * | 2006-03-03 | 2011-04-12 | Oracle International Corporation | Method and apparatus for managing cryptographic keys |
| US7801128B2 (en) | 2006-03-31 | 2010-09-21 | Amazon Technologies, Inc. | Managing communications between computing nodes |
| US8064604B2 (en) | 2006-04-04 | 2011-11-22 | Oracle International Corporation | Method and apparatus for facilitating role-based cryptographic key management for a database |
| US7751570B2 (en) | 2006-04-04 | 2010-07-06 | Oracle International Corporation | Method and apparatus for managing cryptographic keys |
| JP2007293468A (ja) | 2006-04-24 | 2007-11-08 | Fujifilm Corp | プリントサービスシステムおよびプリント処理方法 |
| US9002018B2 (en) | 2006-05-09 | 2015-04-07 | Sync Up Technologies Corporation | Encryption key exchange system and method |
| US20080005024A1 (en) | 2006-05-17 | 2008-01-03 | Carter Kirkwood | Document authentication system |
| US20070283446A1 (en) | 2006-06-05 | 2007-12-06 | Kabushiki Kaisha Toshiba | System and method for secure handling of scanned documents |
| US9053460B2 (en) | 2006-06-12 | 2015-06-09 | International Business Machines Corporation | Rule management using a configuration database |
| US8219869B2 (en) | 2006-06-22 | 2012-07-10 | Lg Electronics Inc. | Method of retransmitting data in a mobile communication system |
| US20080019516A1 (en) | 2006-06-22 | 2008-01-24 | Entriq Inc. | Enforced delay of access to digital content |
| US20080022376A1 (en) | 2006-06-23 | 2008-01-24 | Lenovo (Beijing) Limited | System and method for hardware access control |
| JP4943751B2 (ja) | 2006-07-04 | 2012-05-30 | 株式会社内田洋行 | 電子データアクセス制御システム、プログラム及び情報記憶媒体 |
| CN101102186B (zh) | 2006-07-04 | 2012-01-04 | 华为技术有限公司 | 通用鉴权框架推送业务实现方法 |
| US8108670B2 (en) | 2006-07-13 | 2012-01-31 | Intel Corporation | Client apparatus and method with key manager |
| US20080025515A1 (en) | 2006-07-25 | 2008-01-31 | Jason Scott Coombs | Systems and Methods for Digitally-Signed Updates |
| US8689287B2 (en) | 2006-08-17 | 2014-04-01 | Northrop Grumman Systems Corporation | Federated credentialing system and method |
| US20100316219A1 (en) | 2007-08-06 | 2010-12-16 | David Boubion | Systems and methods for simultaneous integrated multiencrypted rotating key communication |
| US7953978B2 (en) | 2006-09-07 | 2011-05-31 | International Business Machines Corporation | Key generation and retrieval using key servers |
| US8407806B2 (en) | 2006-09-29 | 2013-03-26 | Purusharth Agrawal | Digital data distribution detection, deterrence and disablement system and method |
| GB2443244A (en) | 2006-10-05 | 2008-04-30 | Hewlett Packard Development Co | Authenticated Encryption Method and Apparatus |
| WO2008121157A2 (en) | 2006-10-12 | 2008-10-09 | Rsa Security Inc. | Cryptographic key management system facilitating secure access of data portions to corresponding groups of users |
| CN101573910A (zh) * | 2006-10-31 | 2009-11-04 | 新加坡科技研究局 | 生成和分配对数字对象的访问许可的设备和方法 |
| US8090098B2 (en) | 2006-11-13 | 2012-01-03 | Electronics And Telecommunications Research Institute | Method of generating message authentication code using stream cipher and authentication/encryption and authentication/decryption methods using stream cipher |
| US8213602B2 (en) * | 2006-11-27 | 2012-07-03 | Broadcom Corporation | Method and system for encrypting and decrypting a transport stream using multiple algorithms |
| JP4847301B2 (ja) | 2006-11-28 | 2011-12-28 | 富士通株式会社 | コンテンツ保護システム,コンテンツ保護用デバイスおよびコンテンツ保護方法 |
| US8526621B2 (en) | 2006-12-01 | 2013-09-03 | President And Fellows Of Harvard College | Method and apparatus for time-lapse cryptography |
| EP2052548B1 (en) | 2006-12-12 | 2012-02-29 | Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. | Encoder, decoder and methods for encoding and decoding data segments representing a time-domain data stream |
| US20080172562A1 (en) | 2007-01-12 | 2008-07-17 | Christian Cachin | Encryption and authentication of data and for decryption and verification of authenticity of data |
| US7870398B2 (en) | 2007-01-25 | 2011-01-11 | International Business Machines Corporation | Integrity assurance of query result from database service provider |
| US7937432B2 (en) | 2007-02-16 | 2011-05-03 | Red Hat, Inc. | State transition management according to a workflow management policy |
| US8879727B2 (en) | 2007-08-31 | 2014-11-04 | Ip Reservoir, Llc | Method and apparatus for hardware-accelerated encryption/decryption |
| KR101391152B1 (ko) | 2007-04-05 | 2014-05-02 | 삼성전자주식회사 | Ums 기기의 컨텐츠를 보호하기 위한 방법 및 장치 |
| US8218761B2 (en) | 2007-04-06 | 2012-07-10 | Oracle International Corporation | Method and apparatus for generating random data-encryption keys |
| CA2684229A1 (en) | 2007-04-12 | 2008-10-23 | Ncipher Corporation Ltd. | Method and system for identifying and managing keys |
| US8145762B2 (en) | 2007-05-22 | 2012-03-27 | Kount Inc. | Collecting information regarding consumer click-through traffic |
| US9413686B2 (en) | 2007-06-04 | 2016-08-09 | Qualcomm Incorporated | Establishing a unique end-to-end management key |
| US9003488B2 (en) | 2007-06-06 | 2015-04-07 | Datavalet Technologies | System and method for remote device recognition at public hotspots |
| JP2008306418A (ja) | 2007-06-07 | 2008-12-18 | Kddi Corp | ネットワーク負荷軽減システム、ネットワーク負荷軽減方法およびプログラム |
| US20080319909A1 (en) | 2007-06-25 | 2008-12-25 | Perkins George S | System and method for managing the lifecycle of encryption keys |
| CA2693743C (en) | 2007-07-17 | 2016-10-04 | Chris Alexander Peirson | Systems and processes for obtaining and managing electronic signatures for real estate transaction documents |
| JP4287485B2 (ja) | 2007-07-30 | 2009-07-01 | 日立ソフトウエアエンジニアリング株式会社 | 情報処理装置及び方法、コンピュータ読み取り可能な記録媒体、並びに、外部記憶媒体 |
| US8111828B2 (en) * | 2007-07-31 | 2012-02-07 | Hewlett-Packard Development Company, L.P. | Management of cryptographic keys for securing stored data |
| US7894626B2 (en) | 2007-08-31 | 2011-02-22 | Xerox Corporation | System and method for the generation of multiple angle correlation-based digital watermarks |
| US8140847B1 (en) | 2007-09-18 | 2012-03-20 | Jianqing Wu | Digital safe |
| CN101399661A (zh) | 2007-09-27 | 2009-04-01 | 华为技术有限公司 | 一种组密钥管理中的合法邻居认证方法和装置 |
| CN101400059B (zh) | 2007-09-28 | 2010-12-08 | 华为技术有限公司 | 一种active状态下的密钥更新方法和设备 |
| US8131663B1 (en) | 2007-10-12 | 2012-03-06 | Bonamy Taylor | Apparatus for generating software logic rules by flowchart design |
| US8549278B2 (en) | 2007-10-20 | 2013-10-01 | Blackout, Inc. | Rights management services-based file encryption system and method |
| WO2009060283A1 (en) | 2007-11-05 | 2009-05-14 | Synaptic Laboratories Limited | Method and apparatus for secure communication |
| US8387127B1 (en) | 2007-11-28 | 2013-02-26 | Network Appliance, Inc. | Storage security appliance with out-of-band management capabilities |
| KR100980831B1 (ko) | 2007-12-12 | 2010-09-10 | 한국전자통신연구원 | 일회용 패스워드를 이용한 신뢰성 있는 통신 시스템 및방법 |
| US8495357B2 (en) | 2007-12-19 | 2013-07-23 | International Business Machines Corporation | Data security policy enforcement |
| US8060596B1 (en) | 2007-12-26 | 2011-11-15 | Symantec Corporation | Methods and systems for normalizing data loss prevention categorization information |
| JP4824044B2 (ja) | 2008-01-18 | 2011-11-24 | 株式会社エヌ・ティ・ティ・ドコモ | ユーザ端末装置 |
| US8175276B2 (en) | 2008-02-04 | 2012-05-08 | Freescale Semiconductor, Inc. | Encryption apparatus with diverse key retention schemes |
| US20090217027A1 (en) | 2008-02-21 | 2009-08-27 | Zenlok Corporation | Safe e-mail for everybody |
| JP4896054B2 (ja) | 2008-03-06 | 2012-03-14 | イートライアル株式会社 | 個人情報管理装置,個人情報管理プログラムおよび個人情報管理システム |
| US8893285B2 (en) | 2008-03-14 | 2014-11-18 | Mcafee, Inc. | Securing data using integrated host-based data loss agent with encryption detection |
| US8681990B2 (en) | 2008-03-28 | 2014-03-25 | International Business Machines Corporation | Renewal management for data items |
| JP4526574B2 (ja) | 2008-03-31 | 2010-08-18 | 富士通株式会社 | 暗号データ管理システム、および暗号データ管理方法 |
| US8225106B2 (en) | 2008-04-02 | 2012-07-17 | Protegrity Corporation | Differential encryption utilizing trust modes |
| US8494168B1 (en) * | 2008-04-28 | 2013-07-23 | Netapp, Inc. | Locating cryptographic keys stored in a cache |
| US8589697B2 (en) | 2008-04-30 | 2013-11-19 | Netapp, Inc. | Discarding sensitive data from persistent point-in-time image |
| WO2009137511A2 (en) | 2008-05-05 | 2009-11-12 | Ticketmaster, Llc | Process control system |
| US8423483B2 (en) | 2008-05-16 | 2013-04-16 | Carnegie Mellon University | User-controllable learning of policies |
| US20090300356A1 (en) * | 2008-05-27 | 2009-12-03 | Crandell Jeffrey L | Remote storage encryption system |
| US20100014662A1 (en) | 2008-06-19 | 2010-01-21 | Sami Antti Jutila | Method, apparatus and computer program product for providing trusted storage of temporary subscriber data |
| CN102057618A (zh) * | 2008-06-23 | 2011-05-11 | 松下电器产业株式会社 | 信息处理装置、加密密钥的管理方法、计算机程序及集成电路 |
| GB0811897D0 (en) | 2008-06-30 | 2008-07-30 | Steed Darren | Intelligent file encapsulation |
| US8261320B1 (en) | 2008-06-30 | 2012-09-04 | Symantec Corporation | Systems and methods for securely managing access to data |
| US8005859B2 (en) | 2008-07-09 | 2011-08-23 | The Go Daddy Group, Inc. | Maintaining contact with a document storage file owner |
| JP5341415B2 (ja) | 2008-07-16 | 2013-11-13 | 株式会社福田結晶技術研究所 | 圧電単結晶、及び、その製造方法 |
| US8245039B2 (en) | 2008-07-18 | 2012-08-14 | Bridgewater Systems Corp. | Extensible authentication protocol authentication and key agreement (EAP-AKA) optimization |
| JP4620146B2 (ja) | 2008-07-18 | 2011-01-26 | 株式会社東芝 | 情報処理装置及び認証方法 |
| JP4922262B2 (ja) | 2008-07-30 | 2012-04-25 | 株式会社オートネットワーク技術研究所 | 制御装置 |
| JP2010072916A (ja) | 2008-09-18 | 2010-04-02 | Hitachi Software Eng Co Ltd | データ保護システム及びデータ保護方法 |
| US8826443B1 (en) | 2008-09-18 | 2014-09-02 | Symantec Corporation | Selective removal of protected content from web requests sent to an interactive website |
| US8302170B2 (en) | 2008-09-22 | 2012-10-30 | Bespoke Innovations S.A.R.L. | Method for enhancing network application security |
| US9742555B2 (en) | 2008-09-25 | 2017-08-22 | Nokia Technologies Oy | Encryption/identification using array of resonators at transmitter and receiver |
| US8804950B1 (en) | 2008-09-30 | 2014-08-12 | Juniper Networks, Inc. | Methods and apparatus for producing a hash value based on a hash function |
| CN102264591A (zh) | 2008-10-27 | 2011-11-30 | 西门子有限公司 | 用于在至少一个导引车和地面网之间路由数据的方法 |
| US8695090B2 (en) | 2008-10-31 | 2014-04-08 | Symantec Corporation | Data loss protection through application data access classification |
| JP2010124071A (ja) | 2008-11-17 | 2010-06-03 | Toshiba Corp | 通信装置、通信方法及びプログラム |
| US8392682B2 (en) | 2008-12-17 | 2013-03-05 | Unisys Corporation | Storage security using cryptographic splitting |
| JP2010128824A (ja) | 2008-11-27 | 2010-06-10 | Hitachi Software Eng Co Ltd | ポリシーグループ識別子を利用したクライアント制御システム |
| CN101753302B (zh) | 2008-12-09 | 2012-07-04 | 北大方正集团有限公司 | 一种保证sip通信安全的方法和系统 |
| US8230050B1 (en) | 2008-12-10 | 2012-07-24 | Amazon Technologies, Inc. | Providing access to configurable private computer networks |
| US8185931B1 (en) | 2008-12-19 | 2012-05-22 | Quantcast Corporation | Method and system for preserving privacy related to networked media consumption activities |
| US8613040B2 (en) | 2008-12-22 | 2013-12-17 | Symantec Corporation | Adaptive data loss prevention policies |
| US8051187B2 (en) | 2008-12-22 | 2011-11-01 | Check Point Software Technologies Ltd. | Methods for automatic categorization of internal and external communication for preventing data loss |
| US8565118B2 (en) | 2008-12-30 | 2013-10-22 | Juniper Networks, Inc. | Methods and apparatus for distributed dynamic network provisioning |
| US8555089B2 (en) | 2009-01-08 | 2013-10-08 | Panasonic Corporation | Program execution apparatus, control method, control program, and integrated circuit |
| US8699704B2 (en) | 2010-01-13 | 2014-04-15 | Entropic Communications, Inc. | Secure node admission in a communication network |
| US8738932B2 (en) | 2009-01-16 | 2014-05-27 | Teleputers, Llc | System and method for processor-based security |
| US9165154B2 (en) | 2009-02-16 | 2015-10-20 | Microsoft Technology Licensing, Llc | Trusted cloud computing and services framework |
| US8245037B1 (en) * | 2009-02-17 | 2012-08-14 | Amazon Technologies, Inc. | Encryption key management |
| CA2752752C (en) | 2009-02-27 | 2015-09-15 | Certicom Corp. | System and method for securely communicating with electronic meters |
| US9106617B2 (en) | 2009-03-10 | 2015-08-11 | At&T Intellectual Property I, L.P. | Methods, systems and computer program products for authenticating computer processing devices and transferring both encrypted and unencrypted data therebetween |
| US9015789B2 (en) | 2009-03-17 | 2015-04-21 | Sophos Limited | Computer security lock down methods |
| US8572758B1 (en) | 2009-03-30 | 2013-10-29 | Symantec Corporation | DLP-enforced loss scanning, sequestering, and content indexing |
| US20100250965A1 (en) | 2009-03-31 | 2010-09-30 | Olson Christopher H | Apparatus and method for implementing instruction support for the advanced encryption standard (aes) algorithm |
| US8654970B2 (en) | 2009-03-31 | 2014-02-18 | Oracle America, Inc. | Apparatus and method for implementing instruction support for the data encryption standard (DES) algorithm |
| US8411867B2 (en) | 2009-04-06 | 2013-04-02 | Broadcom Corporation | Scalable and secure key management for cryptographic data processing |
| US20100266132A1 (en) | 2009-04-15 | 2010-10-21 | Microsoft Corporation | Service-based key escrow and security for device data |
| US7996564B2 (en) | 2009-04-16 | 2011-08-09 | International Business Machines Corporation | Remote asynchronous data mover |
| US9672189B2 (en) | 2009-04-20 | 2017-06-06 | Check Point Software Technologies, Ltd. | Methods for effective network-security inspection in virtualized environments |
| CN102405128B (zh) | 2009-04-21 | 2015-01-21 | 株式会社松井制作所 | 塑料成形材料的减压干燥装置 |
| US8516264B2 (en) | 2009-10-09 | 2013-08-20 | Lsi Corporation | Interlocking plain text passwords to data encryption keys |
| US8251283B1 (en) | 2009-05-08 | 2012-08-28 | Oberon Labs, LLC | Token authentication using spatial characteristics |
| US8752180B2 (en) | 2009-05-26 | 2014-06-10 | Symantec Corporation | Behavioral engine for identifying patterns of confidential data use |
| US8296434B1 (en) | 2009-05-28 | 2012-10-23 | Amazon Technologies, Inc. | Providing dynamically scaling computing load balancing |
| US8284945B2 (en) | 2009-06-02 | 2012-10-09 | Hewlett-Packard Development Company, L.P. | Automatic change of symmetrical encryption key |
| US9031876B2 (en) | 2009-06-19 | 2015-05-12 | Hewlett-Packard Development Company, L.P. | Managing keys for encrypted shared documents |
| GB2471282B (en) | 2009-06-22 | 2015-02-18 | Barclays Bank Plc | Method and system for provision of cryptographic services |
| JP2011019129A (ja) | 2009-07-09 | 2011-01-27 | Nec Corp | データ管理システム及びデータ管理方法 |
| US8799322B2 (en) | 2009-07-24 | 2014-08-05 | Cisco Technology, Inc. | Policy driven cloud storage management and cloud storage policy router |
| US8321560B1 (en) | 2009-08-13 | 2012-11-27 | Symantec Corporation | Systems and methods for preventing data loss from files sent from endpoints |
| JPWO2011024298A1 (ja) | 2009-08-28 | 2013-01-24 | リプレックス株式会社 | サービスシステム |
| US8560848B2 (en) | 2009-09-02 | 2013-10-15 | Marvell World Trade Ltd. | Galois/counter mode encryption in a wireless network |
| US8224796B1 (en) | 2009-09-11 | 2012-07-17 | Symantec Corporation | Systems and methods for preventing data loss on external devices |
| US9311465B2 (en) | 2009-09-21 | 2016-04-12 | James McNulty | Secure information storage and retrieval apparatus and method |
| IL201351A0 (en) | 2009-10-01 | 2010-05-31 | Michael Feldbau | Device and method for electronic signature via proxy |
| US9043877B2 (en) | 2009-10-06 | 2015-05-26 | International Business Machines Corporation | Temporarily providing higher privileges for computing system to user identifier |
| US8578504B2 (en) | 2009-10-07 | 2013-11-05 | Ca, Inc. | System and method for data leakage prevention |
| US8458186B2 (en) | 2009-11-06 | 2013-06-04 | Symantec Corporation | Systems and methods for processing and managing object-related data for use by a plurality of applications |
| US9552497B2 (en) | 2009-11-10 | 2017-01-24 | Mcafee, Inc. | System and method for preventing data loss using virtual machine wrapped applications |
| US20110119487A1 (en) | 2009-11-13 | 2011-05-19 | Velocite Systems, LLC | System and method for encryption rekeying |
| US8572369B2 (en) | 2009-12-11 | 2013-10-29 | Sap Ag | Security for collaboration services |
| CN101741547B (zh) | 2009-12-18 | 2012-05-23 | 西安西电捷通无线网络通信股份有限公司 | 节点间保密通信方法及系统 |
| EP2513832A1 (en) | 2009-12-18 | 2012-10-24 | Koninklijke Philips Electronics N.V. | Digital rights management using attribute-based encryption |
| US8478996B2 (en) | 2009-12-21 | 2013-07-02 | International Business Machines Corporation | Secure Kerberized access of encrypted file system |
| GB201000288D0 (en) | 2010-01-11 | 2010-02-24 | Scentrics Information Security | System and method of enforcing a computer policy |
| US8650129B2 (en) | 2010-01-20 | 2014-02-11 | American Express Travel Related Services Company, Inc. | Dynamically reacting policies and protections for securing mobile financial transaction data in transit |
| WO2011089712A1 (ja) | 2010-01-22 | 2011-07-28 | 富士通株式会社 | 認証方法、認証システムおよび認証プログラム |
| JP5070305B2 (ja) | 2010-01-29 | 2012-11-14 | 株式会社日本総合研究所 | 取引中継方法および取引中継システム |
| US8527549B2 (en) | 2010-02-22 | 2013-09-03 | Sookasa Inc. | Cloud based operating and virtual file system |
| US8468455B2 (en) | 2010-02-24 | 2013-06-18 | Novell, Inc. | System and method for providing virtual desktop extensions on a client desktop |
| US20110213971A1 (en) | 2010-03-01 | 2011-09-01 | Nokia Corporation | Method and apparatus for providing rights management at file system level |
| US10672286B2 (en) | 2010-03-14 | 2020-06-02 | Kryterion, Inc. | Cloud based test environment |
| US8370648B1 (en) | 2010-03-15 | 2013-02-05 | Emc International Company | Writing and reading encrypted data using time-based encryption keys |
| US8667269B2 (en) | 2010-04-02 | 2014-03-04 | Suridx, Inc. | Efficient, secure, cloud-based identity services |
| WO2011127440A2 (en) | 2010-04-08 | 2011-10-13 | University Of Washington Through Its Center For Commercialization | Systems and methods for file access auditing |
| US8555059B2 (en) | 2010-04-16 | 2013-10-08 | Microsoft Corporation | Secure local update of content management software |
| EP2378451B1 (en) | 2010-04-19 | 2018-07-04 | Vodafone Holding GmbH | User authentication in a tag-based service |
| US8300831B2 (en) | 2010-04-26 | 2012-10-30 | International Business Machines Corporation | Redundant key server encryption environment |
| US8856300B2 (en) | 2010-05-18 | 2014-10-07 | At&T Intellectual Property I, L.P. | End-to-end secure cloud computing |
| US8601263B1 (en) | 2010-05-18 | 2013-12-03 | Google Inc. | Storing encrypted objects |
| US9160738B2 (en) | 2010-05-27 | 2015-10-13 | Microsoft Corporation | Delegation-based authorization |
| US8462955B2 (en) * | 2010-06-03 | 2013-06-11 | Microsoft Corporation | Key protectors based on online keys |
| US8447986B2 (en) | 2010-06-23 | 2013-05-21 | Microsoft Corporation | Accessing restricted content based on proximity |
| US8443367B1 (en) | 2010-07-16 | 2013-05-14 | Vmware, Inc. | Federated management in a distributed environment |
| US8769269B2 (en) | 2010-08-12 | 2014-07-01 | International Business Machines Corporation | Cloud data management |
| US20120079289A1 (en) | 2010-09-27 | 2012-03-29 | Skymedi Corporation | Secure erase system for a solid state non-volatile memory device |
| JP2012073374A (ja) | 2010-09-28 | 2012-04-12 | Fujikura Ltd | 光ファイバ切断装置 |
| US8555383B1 (en) | 2010-09-28 | 2013-10-08 | Amazon Technologies, Inc. | Network data transmission auditing |
| US8565108B1 (en) | 2010-09-28 | 2013-10-22 | Amazon Technologies, Inc. | Network data transmission analysis |
| US8416709B1 (en) | 2010-09-28 | 2013-04-09 | Amazon Technologies, Inc. | Network data transmission analysis management |
| US8504837B2 (en) | 2010-10-15 | 2013-08-06 | Rockwell Automation Technologies, Inc. | Security model for industrial devices |
| US9961550B2 (en) | 2010-11-04 | 2018-05-01 | Itron Networked Solutions, Inc. | Physically secured authorization for utility applications |
| US20120114118A1 (en) | 2010-11-05 | 2012-05-10 | Samsung Electronics Co., Ltd. | Key rotation in live adaptive streaming |
| US8832726B2 (en) | 2010-11-17 | 2014-09-09 | Verizon Patent And Licensing Inc. | Video streaming entitlement determined based on the location of the viewer |
| US8401186B2 (en) | 2010-11-29 | 2013-03-19 | Beijing Z&W Technology Consulting Co., Ltd. | Cloud storage data access method, apparatus and system based on OTP |
| JP5437222B2 (ja) | 2010-12-01 | 2014-03-12 | 本田技研工業株式会社 | 燃料電池スタック |
| US8713362B2 (en) | 2010-12-01 | 2014-04-29 | International Business Machines Corporation | Obviation of recovery of data store consistency for application I/O errors |
| US8565422B2 (en) | 2010-12-03 | 2013-10-22 | Salesforce.Com, Inc. | Method and system for enryption key versioning and key rotation in a multi-tenant environment |
| US9311495B2 (en) | 2010-12-09 | 2016-04-12 | International Business Machines Corporation | Method and apparatus for associating data loss protection (DLP) policies with endpoints |
| KR101145766B1 (ko) | 2010-12-10 | 2012-05-16 | 고려대학교 산학협력단 | 보안 서비스 제공 시스템 및 방법 |
| US8352749B2 (en) | 2010-12-17 | 2013-01-08 | Google Inc. | Local trusted services manager for a contactless smart card |
| CN102130768B (zh) | 2010-12-20 | 2012-11-07 | 西安西电捷通无线网络通信股份有限公司 | 一种具有链路层加解密能力的终端设备及其数据处理方法 |
| US9306741B1 (en) | 2010-12-22 | 2016-04-05 | Emc Corporation | Updating keys for use in authentication |
| US8538020B1 (en) | 2010-12-29 | 2013-09-17 | Amazon Technologies, Inc. | Hybrid client-server cryptography for network applications |
| US8971539B2 (en) | 2010-12-30 | 2015-03-03 | Verisign, Inc. | Management of SSL certificate escrow |
| US8478858B2 (en) | 2011-02-01 | 2013-07-02 | Limelight Networks, Inc. | Policy management for content storage in content delivery networks |
| ES2902644T3 (es) | 2011-02-11 | 2022-03-29 | Siemens Healthcare Diagnostics Inc | Sistema y método para actualización segura de software |
| US8588426B2 (en) | 2011-02-21 | 2013-11-19 | Blackberry Limited | Methods and apparatus to secure communications in a mobile network |
| JP5564453B2 (ja) | 2011-02-25 | 2014-07-30 | 株式会社エヌ・ティ・ティ・データ | 情報処理システム、及び情報処理方法 |
| US9100186B2 (en) | 2011-03-07 | 2015-08-04 | Security First Corp. | Secure file sharing method and system |
| JP5676331B2 (ja) | 2011-03-24 | 2015-02-25 | 株式会社東芝 | ルートノード及びプログラム |
| US8965827B2 (en) | 2011-03-30 | 2015-02-24 | Computer Sciences Corporation | Rules execution platform system and method |
| US8379857B1 (en) | 2011-03-30 | 2013-02-19 | Google Inc. | Secure key distribution for private communication in an unsecured communication channel |
| JP5518785B2 (ja) | 2011-04-13 | 2014-06-11 | 日本電信電話株式会社 | Icカード発行システム及びicカード発行方法 |
| US8789210B2 (en) | 2011-05-04 | 2014-07-22 | International Business Machines Corporation | Key usage policies for cryptographic keys |
| US8850593B2 (en) | 2011-05-12 | 2014-09-30 | Hewlett-Packard Development Company, L.P. | Data management using a virtual machine-data image |
| US9076020B2 (en) | 2011-05-13 | 2015-07-07 | Microsoft Technology Licensing, Llc | Protected mode for mobile communication and other devices |
| US8544070B2 (en) | 2011-05-16 | 2013-09-24 | Novell, Inc. | Techniques for non repudiation of storage in cloud or shared storage environments |
| US9690941B2 (en) | 2011-05-17 | 2017-06-27 | Microsoft Technology Licensing, Llc | Policy bound key creation and re-wrap service |
| US9049023B2 (en) | 2011-05-24 | 2015-06-02 | Zeutro Llc | Outsourcing the decryption of functional encryption ciphertexts |
| US8752127B2 (en) | 2011-05-26 | 2014-06-10 | First Data Corporation | Systems and methods for identifying devices by a trusted service manager |
| KR20120134509A (ko) | 2011-06-02 | 2012-12-12 | 삼성전자주식회사 | 어플리케이션 개발 시스템에서 디바이스용 어플리케이션을 생성 및 설치하기 위한 장치 및 방법 |
| US8516244B2 (en) | 2011-06-10 | 2013-08-20 | Zeutro Llc | System, apparatus and method for decentralizing attribute-based encryption information |
| US20120323990A1 (en) | 2011-06-15 | 2012-12-20 | Microsoft Corporation | Efficient state reconciliation |
| US20120323717A1 (en) | 2011-06-16 | 2012-12-20 | OneID, Inc. | Method and system for determining authentication levels in transactions |
| US8891772B2 (en) | 2011-06-17 | 2014-11-18 | Microsoft Corporation | Cloud key escrow system |
| US8806204B2 (en) | 2011-06-20 | 2014-08-12 | Liaison Technologies, Inc. | Systems and methods for maintaining data security across multiple active domains |
| US8850516B1 (en) | 2011-06-22 | 2014-09-30 | Emc Corporation | Virtual private cloud that provides enterprise grade functionality and compliance |
| US10237060B2 (en) | 2011-06-23 | 2019-03-19 | Microsoft Technology Licensing, Llc | Media agnostic, distributed, and defendable data retention |
| US8751807B2 (en) | 2011-06-23 | 2014-06-10 | Azuki Systems Inc. | Method and system for secure over-the-top live video delivery |
| US9015469B2 (en) | 2011-07-28 | 2015-04-21 | Cloudflare, Inc. | Supporting secure sessions in a cloud-based proxy service |
| US9009315B2 (en) * | 2011-07-28 | 2015-04-14 | Telefonaktiebolaget L M Ericsson (Publ) | Hierarchical delegation and reservation of lookup keys |
| US8798273B2 (en) * | 2011-08-19 | 2014-08-05 | International Business Machines Corporation | Extending credential type to group Key Management Interoperability Protocol (KMIP) clients |
| US8655989B2 (en) | 2011-10-14 | 2014-02-18 | Sap Ag | Business network access protocol for the business network |
| US20130103834A1 (en) | 2011-10-21 | 2013-04-25 | Blue Coat Systems, Inc. | Multi-Tenant NATting for Segregating Traffic Through a Cloud Service |
| US8788843B2 (en) | 2011-10-28 | 2014-07-22 | LogMeln, Inc. | Storing user data in a service provider cloud without exposing user-specific secrets to the service provider |
| US8639928B2 (en) * | 2011-12-05 | 2014-01-28 | Certicom Corp. | System and method for mounting encrypted data based on availability of a key on a network |
| WO2013084054A1 (en) | 2011-12-08 | 2013-06-13 | Dark Matter Labs Inc. | Key creation and rotation for data encryption |
| US8639951B2 (en) | 2011-12-19 | 2014-01-28 | International Business Machines Corporation | States for breakout appliance in a mobile data network |
| US8954758B2 (en) | 2011-12-20 | 2015-02-10 | Nicolas LEOUTSARAKOS | Password-less security and protection of online digital assets |
| US8873754B2 (en) | 2011-12-20 | 2014-10-28 | Huawei Technologies Co., Ltd. | Proxy-based encryption method, proxy-based decryption method, network equipment, network device and system |
| WO2013093209A1 (en) | 2011-12-21 | 2013-06-27 | Ssh Communications Security Oyj | Automated access, key, certificate, and credential management |
| CN104247333B (zh) | 2011-12-27 | 2017-08-11 | 思科技术公司 | 用于基于网络的服务的管理的系统和方法 |
| US9449183B2 (en) | 2012-01-28 | 2016-09-20 | Jianqing Wu | Secure file drawer and safe |
| US9038083B2 (en) | 2012-02-09 | 2015-05-19 | Citrix Systems, Inc. | Virtual machine provisioning based on tagged physical resources in a cloud computing environment |
| JP6098636B2 (ja) | 2012-03-28 | 2017-03-22 | ソニー株式会社 | 情報処理装置、情報処理システム、情報処理方法及びプログラム |
| US9160722B2 (en) | 2012-04-30 | 2015-10-13 | Anchorfree, Inc. | System and method for securing user information on social networks |
| US9117084B2 (en) | 2012-05-15 | 2015-08-25 | Ixia | Methods, systems, and computer readable media for measuring detection accuracy of a security device using benign traffic |
| US8964990B1 (en) * | 2012-05-17 | 2015-02-24 | Amazon Technologies, Inc. | Automating key rotation in a distributed system |
| US9237446B2 (en) | 2012-05-24 | 2016-01-12 | Blackberry Limited | System and method for controlling access to media content |
| US9590959B2 (en) | 2013-02-12 | 2017-03-07 | Amazon Technologies, Inc. | Data security service |
| US9112704B2 (en) | 2012-06-22 | 2015-08-18 | Ologn Technologies Ag | Systems, methods and apparatuses for securing root certificates |
| WO2014011454A2 (en) | 2012-07-09 | 2014-01-16 | Jvl Ventures, Llc | Systems, methods, and computer program products for integrating third party services with a mobile wallet |
| US8713633B2 (en) | 2012-07-13 | 2014-04-29 | Sophos Limited | Security access protection for user data stored in a cloud computing facility |
| US9400890B2 (en) | 2012-08-10 | 2016-07-26 | Qualcomm Incorporated | Method and devices for selective RAM scrambling |
| US20140115327A1 (en) * | 2012-10-22 | 2014-04-24 | Microsoft Corporation | Trust services data encryption for multiple parties |
| US9143491B2 (en) | 2012-10-29 | 2015-09-22 | Empire Technology Development Llc | Quorum-based virtual machine security |
| US9137222B2 (en) | 2012-10-31 | 2015-09-15 | Vmware, Inc. | Crypto proxy for cloud storage services |
| US8713311B1 (en) | 2012-11-07 | 2014-04-29 | Google Inc. | Encryption using alternate authentication key |
| US8997197B2 (en) | 2012-12-12 | 2015-03-31 | Citrix Systems, Inc. | Encryption-based data access management |
| US9547771B2 (en) | 2013-02-12 | 2017-01-17 | Amazon Technologies, Inc. | Policy enforcement with associated data |
| US9367697B1 (en) | 2013-02-12 | 2016-06-14 | Amazon Technologies, Inc. | Data security with a security module |
| US9705674B2 (en) * | 2013-02-12 | 2017-07-11 | Amazon Technologies, Inc. | Federated key management |
| US10210341B2 (en) | 2013-02-12 | 2019-02-19 | Amazon Technologies, Inc. | Delayed data access |
| US20140229732A1 (en) | 2013-02-12 | 2014-08-14 | Amazon Technologies, Inc. | Data security service |
-
2013
- 2013-02-12 US US13/765,209 patent/US9705674B2/en active Active
-
2014
- 2014-02-07 CN CN201480013039.5A patent/CN105191207B/zh active Active
- 2014-02-07 CN CN202010838180.6A patent/CN111884801A/zh active Pending
- 2014-02-07 CA CA2899008A patent/CA2899008C/en active Active
- 2014-02-07 EP EP14751612.4A patent/EP2957065A4/en not_active Withdrawn
- 2014-02-07 WO PCT/US2014/015408 patent/WO2014126814A1/en not_active Ceased
- 2014-02-07 EP EP19203674.7A patent/EP3661121B1/en active Active
- 2014-02-07 JP JP2015558043A patent/JP6514115B2/ja active Active
- 2014-02-07 CA CA3190899A patent/CA3190899A1/en active Pending
-
2016
- 2016-12-12 US US15/376,451 patent/US10666436B2/en active Active
-
2017
- 2017-12-01 JP JP2017232031A patent/JP7045837B2/ja active Active
-
2020
- 2020-05-07 US US16/869,423 patent/US11695555B2/en active Active
- 2020-07-01 JP JP2020114298A patent/JP7295068B2/ja active Active
-
2023
- 2023-05-12 US US18/196,750 patent/US12432054B2/en active Active
- 2023-06-08 JP JP2023094952A patent/JP7784204B2/ja active Active
-
2025
- 2025-07-11 JP JP2025117291A patent/JP2025157359A/ja not_active Withdrawn
Also Published As
| Publication number | Publication date |
|---|---|
| WO2014126814A1 (en) | 2014-08-21 |
| CA2899008A1 (en) | 2014-08-21 |
| CA2899008C (en) | 2023-04-18 |
| CN105191207A (zh) | 2015-12-23 |
| US10666436B2 (en) | 2020-05-26 |
| JP7045837B2 (ja) | 2022-04-01 |
| US20230291556A1 (en) | 2023-09-14 |
| JP7295068B2 (ja) | 2023-06-20 |
| JP2018067941A (ja) | 2018-04-26 |
| US11695555B2 (en) | 2023-07-04 |
| CN105191207B (zh) | 2020-09-08 |
| CA3190899A1 (en) | 2014-08-21 |
| US20170093581A1 (en) | 2017-03-30 |
| US9705674B2 (en) | 2017-07-11 |
| JP2020167744A (ja) | 2020-10-08 |
| EP3661121B1 (en) | 2025-10-15 |
| EP3661121A1 (en) | 2020-06-03 |
| US12432054B2 (en) | 2025-09-30 |
| JP7784204B2 (ja) | 2025-12-11 |
| CN111884801A (zh) | 2020-11-03 |
| US20200266976A1 (en) | 2020-08-20 |
| JP2025157359A (ja) | 2025-10-15 |
| EP2957065A4 (en) | 2016-10-12 |
| JP2023113889A (ja) | 2023-08-16 |
| EP2957065A1 (en) | 2015-12-23 |
| US20140229737A1 (en) | 2014-08-14 |
| JP2016511994A (ja) | 2016-04-21 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP7784204B2 (ja) | フェデレーテッドキー管理 | |
| JP6542962B2 (ja) | 遅延データアクセス | |
| US11372993B2 (en) | Automatic key rotation | |
| JP6329970B2 (ja) | 関連データを有するポリシー施行 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20151007 |
|
| A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20160912 |
|
| A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20161025 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20170125 |
|
| A02 | Decision of refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A02 Effective date: 20170801 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20171201 |
|
| C60 | Trial request (containing other claim documents, opposition documents) |
Free format text: JAPANESE INTERMEDIATE CODE: C60 Effective date: 20171201 |
|
| C11 | Written invitation by the commissioner to file amendments |
Free format text: JAPANESE INTERMEDIATE CODE: C11 Effective date: 20171212 |
|
| A911 | Transfer to examiner for re-examination before appeal (zenchi) |
Free format text: JAPANESE INTERMEDIATE CODE: A911 Effective date: 20180112 |
|
| C21 | Notice of transfer of a case for reconsideration by examiners before appeal proceedings |
Free format text: JAPANESE INTERMEDIATE CODE: C21 Effective date: 20180116 |
|
| A912 | Re-examination (zenchi) completed and case transferred to appeal board |
Free format text: JAPANESE INTERMEDIATE CODE: A912 Effective date: 20180309 |
|
| C211 | Notice of termination of reconsideration by examiners before appeal proceedings |
Free format text: JAPANESE INTERMEDIATE CODE: C211 Effective date: 20180313 |
|
| C22 | Notice of designation (change) of administrative judge |
Free format text: JAPANESE INTERMEDIATE CODE: C22 Effective date: 20180619 |
|
| C13 | Notice of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: C13 Effective date: 20180904 |
|
| C22 | Notice of designation (change) of administrative judge |
Free format text: JAPANESE INTERMEDIATE CODE: C22 Effective date: 20181009 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20181204 |
|
| C23 | Notice of termination of proceedings |
Free format text: JAPANESE INTERMEDIATE CODE: C23 Effective date: 20190122 |
|
| C03 | Trial/appeal decision taken |
Free format text: JAPANESE INTERMEDIATE CODE: C03 Effective date: 20190312 |
|
| C30A | Notification sent |
Free format text: JAPANESE INTERMEDIATE CODE: C3012 Effective date: 20190312 |
|
| A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20190411 |
|
| R150 | Certificate of patent or registration of utility model |
Ref document number: 6514115 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |