KR20170085529A - 보안 액세스를 위한 자율 시스템 및 방법 - Google Patents

보안 액세스를 위한 자율 시스템 및 방법 Download PDF

Info

Publication number
KR20170085529A
KR20170085529A KR1020177015346A KR20177015346A KR20170085529A KR 20170085529 A KR20170085529 A KR 20170085529A KR 1020177015346 A KR1020177015346 A KR 1020177015346A KR 20177015346 A KR20177015346 A KR 20177015346A KR 20170085529 A KR20170085529 A KR 20170085529A
Authority
KR
South Korea
Prior art keywords
security
autonomous
source
processor
digital files
Prior art date
Application number
KR1020177015346A
Other languages
English (en)
Korean (ko)
Inventor
로널드 랜스 저스틴
샤를 엘든
제레드 카로
마크 터커
Original Assignee
템퍼럴 디펜스 시스템즈 엘엘씨
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 템퍼럴 디펜스 시스템즈 엘엘씨 filed Critical 템퍼럴 디펜스 시스템즈 엘엘씨
Publication of KR20170085529A publication Critical patent/KR20170085529A/ko

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/72Signcrypting, i.e. digital signing and encrypting simultaneously

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
KR1020177015346A 2014-11-11 2015-11-11 보안 액세스를 위한 자율 시스템 및 방법 KR20170085529A (ko)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201462078137P 2014-11-11 2014-11-11
US62/078,137 2014-11-11
PCT/US2015/060216 WO2016077494A1 (fr) 2014-11-11 2015-11-11 Systèmes autonomes et procédés pour un accès sécurisé

Publications (1)

Publication Number Publication Date
KR20170085529A true KR20170085529A (ko) 2017-07-24

Family

ID=55955004

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020177015346A KR20170085529A (ko) 2014-11-11 2015-11-11 보안 액세스를 위한 자율 시스템 및 방법

Country Status (7)

Country Link
EP (1) EP3218840A4 (fr)
JP (1) JP2017535871A (fr)
KR (1) KR20170085529A (fr)
CN (1) CN107111719A (fr)
AU (1) AU2015346404A1 (fr)
CA (1) CA2967353A1 (fr)
WO (1) WO2016077494A1 (fr)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107622210B (zh) * 2017-09-22 2019-12-03 天逸财金科技服务股份有限公司 身份认证及授权证明之资料查询方法与系统

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9038193B2 (en) * 1998-08-14 2015-05-19 Azos Al, Llc System and method of data cognition incorporating autonomous security protection
US7334124B2 (en) * 2002-07-22 2008-02-19 Vormetric, Inc. Logical access block processing protocol for transparent secure file storage
US8266676B2 (en) * 2004-11-29 2012-09-11 Harris Corporation Method to verify the integrity of components on a trusted platform using integrity database services
US8037310B2 (en) * 2004-11-30 2011-10-11 Ricoh Co., Ltd. Document authentication combining digital signature verification and visual comparison
US8087067B2 (en) * 2008-10-21 2011-12-27 Lookout, Inc. Secure mobile platform system
US8364984B2 (en) * 2009-03-13 2013-01-29 Microsoft Corporation Portable secure data files
CN102223364B (zh) * 2011-05-09 2014-06-04 飞天诚信科技股份有限公司 一种访问电子书数据的方法及系统
US9489529B2 (en) * 2011-10-13 2016-11-08 Stewart A. Baker Data security system
US9706410B2 (en) * 2012-03-07 2017-07-11 Rapid 7, Inc. Controlling enterprise access by mobile devices
US20140282895A1 (en) * 2013-03-15 2014-09-18 Sky Socket, Llc Secondary device as key for authorizing access to resources
CN104009977B (zh) * 2014-05-09 2016-10-05 北京奇虎科技有限公司 一种信息保护的方法和系统

Also Published As

Publication number Publication date
CA2967353A1 (fr) 2016-05-19
EP3218840A1 (fr) 2017-09-20
AU2015346404A1 (en) 2017-06-01
JP2017535871A (ja) 2017-11-30
EP3218840A4 (fr) 2018-05-16
CN107111719A (zh) 2017-08-29
WO2016077494A1 (fr) 2016-05-19

Similar Documents

Publication Publication Date Title
US9887984B2 (en) Autonomous system for secure electric system access
Martin et al. OpenFog security requirements and approaches
JP2009518762A (ja) インテグリティデータベースサービスを用いた、トラステッドプラットフォーム上のコンポーンテントのインテグリティの検証方法
Alzomai et al. The mobile phone as a multi OTP device using trusted computing
US9769192B2 (en) Security evaluation systems and methods
KR20170073669A (ko) 자율 제어 시스템 및 방법
Hieb et al. Security enhancements for distributed control systems
KR20170085529A (ko) 보안 액세스를 위한 자율 시스템 및 방법
Fournaris et al. Hardware security for critical infrastructures-the cipsec project approach
CN109359450A (zh) Linux系统的安全访问方法、装置、设备和存储介质
US20160219079A1 (en) Autonomous control systems and methods for protecting infrastructure
Wu et al. The mobile agent security enhanced by trusted computing technology
CN111555857A (zh) 一种边缘网络和网络传输方法
KR20170078734A (ko) 인프라스트럭쳐 보호 자율 제어 시스템 및 방법
Tesfaye Secure reprogramming of a network connected device: Securing programmable logic controllers
Chellam et al. Secure key exchange protocol and storage of logic locking key
Nayani Designing secure solutions for embedded systems
Najat et al. Comparative study of the Security Analysis of IoT systems using attack trees algorithm
Balakrishnan Freescale Trust Computing and Security in the Smart Grid
Heins Ingredients for Secure Design
CN117176390A (zh) 一种可信云计算系统
KR20240110555A (ko) 신뢰 에지 IoT 보안 게이트웨이들의 정형 모델링을 위한 시스템 및 방법
CN118862092A (zh) 一种可信云安全等级计算系统
Naumann et al. Paper Number: IAEA-CN-220-151
Talmi et al. NUVOTON TECHNOLOGY CORPORATION