KR20170085529A - 보안 액세스를 위한 자율 시스템 및 방법 - Google Patents
보안 액세스를 위한 자율 시스템 및 방법 Download PDFInfo
- Publication number
- KR20170085529A KR20170085529A KR1020177015346A KR20177015346A KR20170085529A KR 20170085529 A KR20170085529 A KR 20170085529A KR 1020177015346 A KR1020177015346 A KR 1020177015346A KR 20177015346 A KR20177015346 A KR 20177015346A KR 20170085529 A KR20170085529 A KR 20170085529A
- Authority
- KR
- South Korea
- Prior art keywords
- security
- autonomous
- source
- processor
- digital files
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/72—Signcrypting, i.e. digital signing and encrypting simultaneously
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201462078137P | 2014-11-11 | 2014-11-11 | |
US62/078,137 | 2014-11-11 | ||
PCT/US2015/060216 WO2016077494A1 (fr) | 2014-11-11 | 2015-11-11 | Systèmes autonomes et procédés pour un accès sécurisé |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20170085529A true KR20170085529A (ko) | 2017-07-24 |
Family
ID=55955004
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020177015346A KR20170085529A (ko) | 2014-11-11 | 2015-11-11 | 보안 액세스를 위한 자율 시스템 및 방법 |
Country Status (7)
Country | Link |
---|---|
EP (1) | EP3218840A4 (fr) |
JP (1) | JP2017535871A (fr) |
KR (1) | KR20170085529A (fr) |
CN (1) | CN107111719A (fr) |
AU (1) | AU2015346404A1 (fr) |
CA (1) | CA2967353A1 (fr) |
WO (1) | WO2016077494A1 (fr) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107622210B (zh) * | 2017-09-22 | 2019-12-03 | 天逸财金科技服务股份有限公司 | 身份认证及授权证明之资料查询方法与系统 |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9038193B2 (en) * | 1998-08-14 | 2015-05-19 | Azos Al, Llc | System and method of data cognition incorporating autonomous security protection |
US7334124B2 (en) * | 2002-07-22 | 2008-02-19 | Vormetric, Inc. | Logical access block processing protocol for transparent secure file storage |
US8266676B2 (en) * | 2004-11-29 | 2012-09-11 | Harris Corporation | Method to verify the integrity of components on a trusted platform using integrity database services |
US8037310B2 (en) * | 2004-11-30 | 2011-10-11 | Ricoh Co., Ltd. | Document authentication combining digital signature verification and visual comparison |
US8087067B2 (en) * | 2008-10-21 | 2011-12-27 | Lookout, Inc. | Secure mobile platform system |
US8364984B2 (en) * | 2009-03-13 | 2013-01-29 | Microsoft Corporation | Portable secure data files |
CN102223364B (zh) * | 2011-05-09 | 2014-06-04 | 飞天诚信科技股份有限公司 | 一种访问电子书数据的方法及系统 |
US9489529B2 (en) * | 2011-10-13 | 2016-11-08 | Stewart A. Baker | Data security system |
US9706410B2 (en) * | 2012-03-07 | 2017-07-11 | Rapid 7, Inc. | Controlling enterprise access by mobile devices |
US20140282895A1 (en) * | 2013-03-15 | 2014-09-18 | Sky Socket, Llc | Secondary device as key for authorizing access to resources |
CN104009977B (zh) * | 2014-05-09 | 2016-10-05 | 北京奇虎科技有限公司 | 一种信息保护的方法和系统 |
-
2015
- 2015-11-11 WO PCT/US2015/060216 patent/WO2016077494A1/fr active Application Filing
- 2015-11-11 AU AU2015346404A patent/AU2015346404A1/en not_active Abandoned
- 2015-11-11 JP JP2017525379A patent/JP2017535871A/ja active Pending
- 2015-11-11 CA CA2967353A patent/CA2967353A1/fr not_active Abandoned
- 2015-11-11 KR KR1020177015346A patent/KR20170085529A/ko unknown
- 2015-11-11 EP EP15859303.8A patent/EP3218840A4/fr not_active Withdrawn
- 2015-11-11 CN CN201580061453.8A patent/CN107111719A/zh active Pending
Also Published As
Publication number | Publication date |
---|---|
CA2967353A1 (fr) | 2016-05-19 |
EP3218840A1 (fr) | 2017-09-20 |
AU2015346404A1 (en) | 2017-06-01 |
JP2017535871A (ja) | 2017-11-30 |
EP3218840A4 (fr) | 2018-05-16 |
CN107111719A (zh) | 2017-08-29 |
WO2016077494A1 (fr) | 2016-05-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9887984B2 (en) | Autonomous system for secure electric system access | |
Martin et al. | OpenFog security requirements and approaches | |
JP2009518762A (ja) | インテグリティデータベースサービスを用いた、トラステッドプラットフォーム上のコンポーンテントのインテグリティの検証方法 | |
Alzomai et al. | The mobile phone as a multi OTP device using trusted computing | |
US9769192B2 (en) | Security evaluation systems and methods | |
KR20170073669A (ko) | 자율 제어 시스템 및 방법 | |
Hieb et al. | Security enhancements for distributed control systems | |
KR20170085529A (ko) | 보안 액세스를 위한 자율 시스템 및 방법 | |
Fournaris et al. | Hardware security for critical infrastructures-the cipsec project approach | |
CN109359450A (zh) | Linux系统的安全访问方法、装置、设备和存储介质 | |
US20160219079A1 (en) | Autonomous control systems and methods for protecting infrastructure | |
Wu et al. | The mobile agent security enhanced by trusted computing technology | |
CN111555857A (zh) | 一种边缘网络和网络传输方法 | |
KR20170078734A (ko) | 인프라스트럭쳐 보호 자율 제어 시스템 및 방법 | |
Tesfaye | Secure reprogramming of a network connected device: Securing programmable logic controllers | |
Chellam et al. | Secure key exchange protocol and storage of logic locking key | |
Nayani | Designing secure solutions for embedded systems | |
Najat et al. | Comparative study of the Security Analysis of IoT systems using attack trees algorithm | |
Balakrishnan | Freescale Trust Computing and Security in the Smart Grid | |
Heins | Ingredients for Secure Design | |
CN117176390A (zh) | 一种可信云计算系统 | |
KR20240110555A (ko) | 신뢰 에지 IoT 보안 게이트웨이들의 정형 모델링을 위한 시스템 및 방법 | |
CN118862092A (zh) | 一种可信云安全等级计算系统 | |
Naumann et al. | Paper Number: IAEA-CN-220-151 | |
Talmi et al. | NUVOTON TECHNOLOGY CORPORATION |