US6272631B1
(en)
*
|
1997-06-30 |
2001-08-07 |
Microsoft Corporation |
Protected storage of core data secrets
|
US6249866B1
(en)
*
|
1997-09-16 |
2001-06-19 |
Microsoft Corporation |
Encrypting file system and method
|
JPH11205738A
(ja)
*
|
1998-01-09 |
1999-07-30 |
Canon Inc |
画像入力装置および方法並びに記憶媒体
|
JP4169822B2
(ja)
*
|
1998-03-18 |
2008-10-22 |
富士通株式会社 |
記憶媒体のデータ保護方法、その装置及びその記憶媒体
|
US7096358B2
(en)
*
|
1998-05-07 |
2006-08-22 |
Maz Technologies, Inc. |
Encrypting file system
|
US6928551B1
(en)
|
1999-10-29 |
2005-08-09 |
Lockheed Martin Corporation |
Method and apparatus for selectively denying access to encoded data
|
US6296317B1
(en)
*
|
1999-10-29 |
2001-10-02 |
Carnegie Mellon University |
Vision-based motion sensor for mining machine control
|
WO2001054083A1
(de)
*
|
2000-01-18 |
2001-07-26 |
Infineon Technologies Ag |
Mikroprozessoranordnung mit verschlüsselung
|
FR2804524B1
(fr)
*
|
2000-01-31 |
2002-04-19 |
Oberthur Card Systems Sas |
Procede d'execution d'un protocole cryptographique entre deux entites electroniques
|
FR2810425A1
(fr)
*
|
2000-06-20 |
2001-12-21 |
Groupe Ecoles Telecomm |
Microprocesseur securise
|
EP1327937B1
(en)
*
|
2000-09-20 |
2006-06-21 |
Yutaka Yasukura |
Ciphering and deciphering method of electronic information using random permutations
|
US6757699B2
(en)
|
2000-10-06 |
2004-06-29 |
Franciscan University Of Steubenville |
Method and system for fragmenting and reconstituting data
|
US7362868B2
(en)
*
|
2000-10-20 |
2008-04-22 |
Eruces, Inc. |
Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data
|
US7003110B1
(en)
*
|
2000-11-14 |
2006-02-21 |
Lucent Technologies Inc. |
Software aging method and apparatus for discouraging software piracy
|
JP2002319230A
(ja)
*
|
2001-01-25 |
2002-10-31 |
Sony Computer Entertainment Inc |
記録媒体、情報処理装置、コンテンツ配信サーバ、方法、プログラム、その記録媒体
|
JP2002244926A
(ja)
*
|
2001-02-15 |
2002-08-30 |
Matsushita Electric Ind Co Ltd |
データ無効化装置
|
US20020116624A1
(en)
*
|
2001-02-16 |
2002-08-22 |
International Business Machines Corporation |
Embedded cryptographic system
|
US7203317B2
(en)
*
|
2001-10-31 |
2007-04-10 |
Hewlett-Packard Development Company, L.P. |
System for enabling lazy-revocation through recursive key generation
|
US7260555B2
(en)
|
2001-12-12 |
2007-08-21 |
Guardian Data Storage, Llc |
Method and architecture for providing pervasive security to digital assets
|
US7921450B1
(en)
|
2001-12-12 |
2011-04-05 |
Klimenty Vainstein |
Security system using indirect key generation from access rules and methods therefor
|
US10360545B2
(en)
|
2001-12-12 |
2019-07-23 |
Guardian Data Storage, Llc |
Method and apparatus for accessing secured electronic data off-line
|
US8006280B1
(en)
|
2001-12-12 |
2011-08-23 |
Hildebrand Hal S |
Security system for generating keys from access rules in a decentralized manner and methods therefor
|
US7921288B1
(en)
|
2001-12-12 |
2011-04-05 |
Hildebrand Hal S |
System and method for providing different levels of key security for controlling access to secured items
|
US7631184B2
(en)
*
|
2002-05-14 |
2009-12-08 |
Nicholas Ryan |
System and method for imposing security on copies of secured items
|
US7681034B1
(en)
|
2001-12-12 |
2010-03-16 |
Chang-Ping Lee |
Method and apparatus for securing electronic data
|
US7380120B1
(en)
|
2001-12-12 |
2008-05-27 |
Guardian Data Storage, Llc |
Secured data format for access control
|
US7783765B2
(en)
*
|
2001-12-12 |
2010-08-24 |
Hildebrand Hal S |
System and method for providing distributed access control to secured documents
|
US7930756B1
(en)
|
2001-12-12 |
2011-04-19 |
Crocker Steven Toye |
Multi-level cryptographic transformations for securing digital assets
|
USRE41546E1
(en)
|
2001-12-12 |
2010-08-17 |
Klimenty Vainstein |
Method and system for managing security tiers
|
US7565683B1
(en)
|
2001-12-12 |
2009-07-21 |
Weiqing Huang |
Method and system for implementing changes to security policies in a distributed security system
|
US7178033B1
(en)
|
2001-12-12 |
2007-02-13 |
Pss Systems, Inc. |
Method and apparatus for securing digital assets
|
US10033700B2
(en)
|
2001-12-12 |
2018-07-24 |
Intellectual Ventures I Llc |
Dynamic evaluation of access rights
|
US8065713B1
(en)
|
2001-12-12 |
2011-11-22 |
Klimenty Vainstein |
System and method for providing multi-location access management to secured items
|
US7478418B2
(en)
*
|
2001-12-12 |
2009-01-13 |
Guardian Data Storage, Llc |
Guaranteed delivery of changes to security policies in a distributed system
|
US7562232B2
(en)
|
2001-12-12 |
2009-07-14 |
Patrick Zuili |
System and method for providing manageability to security information for secured items
|
US7921284B1
(en)
|
2001-12-12 |
2011-04-05 |
Gary Mark Kinghorn |
Method and system for protecting electronic data in enterprise environment
|
US7950066B1
(en)
|
2001-12-21 |
2011-05-24 |
Guardian Data Storage, Llc |
Method and system for restricting use of a clipboard application
|
US8176334B2
(en)
*
|
2002-09-30 |
2012-05-08 |
Guardian Data Storage, Llc |
Document security system that permits external users to gain access to secured files
|
US6950836B2
(en)
*
|
2002-03-14 |
2005-09-27 |
International Business Machines Corporation |
Method, system, and program for a transparent file restore
|
US8613102B2
(en)
*
|
2004-03-30 |
2013-12-17 |
Intellectual Ventures I Llc |
Method and system for providing document retention using cryptography
|
US7748045B2
(en)
*
|
2004-03-30 |
2010-06-29 |
Michael Frederick Kenrich |
Method and system for providing cryptographic document retention with off-line access
|
US8335915B2
(en)
*
|
2002-05-14 |
2012-12-18 |
Netapp, Inc. |
Encryption based security system for network storage
|
US8386797B1
(en)
*
|
2002-08-07 |
2013-02-26 |
Nvidia Corporation |
System and method for transparent disk encryption
|
US7512810B1
(en)
|
2002-09-11 |
2009-03-31 |
Guardian Data Storage Llc |
Method and system for protecting encrypted files transmitted over a network
|
US7302566B2
(en)
*
|
2002-09-13 |
2007-11-27 |
Wayne Yingling |
Internet security system
|
US7836310B1
(en)
|
2002-11-01 |
2010-11-16 |
Yevgeniy Gutnik |
Security system that uses indirect password-based encryption
|
KR100456599B1
(ko)
*
|
2002-11-12 |
2004-11-09 |
삼성전자주식회사 |
병렬 디이에스 구조를 갖는 암호 장치
|
US7577838B1
(en)
|
2002-12-20 |
2009-08-18 |
Alain Rossmann |
Hybrid systems for securing digital assets
|
US7890990B1
(en)
|
2002-12-20 |
2011-02-15 |
Klimenty Vainstein |
Security system with staging capabilities
|
US7383586B2
(en)
|
2003-01-17 |
2008-06-03 |
Microsoft Corporation |
File system operation and digital rights management (DRM)
|
JP2004227669A
(ja)
*
|
2003-01-23 |
2004-08-12 |
Shinano Kenshi Co Ltd |
データ記録装置
|
US7181016B2
(en)
*
|
2003-01-27 |
2007-02-20 |
Microsoft Corporation |
Deriving a symmetric key from an asymmetric key for file encryption or decryption
|
US8707034B1
(en)
|
2003-05-30 |
2014-04-22 |
Intellectual Ventures I Llc |
Method and system for using remote headers to secure electronic files
|
US7555558B1
(en)
|
2003-08-15 |
2009-06-30 |
Michael Frederick Kenrich |
Method and system for fault-tolerant transfer of files across a network
|
US7703140B2
(en)
*
|
2003-09-30 |
2010-04-20 |
Guardian Data Storage, Llc |
Method and system for securing digital assets using process-driven security policies
|
US8127366B2
(en)
|
2003-09-30 |
2012-02-28 |
Guardian Data Storage, Llc |
Method and apparatus for transitioning between states of security policies used to secure electronic documents
|
US20050086531A1
(en)
*
|
2003-10-20 |
2005-04-21 |
Pss Systems, Inc. |
Method and system for proxy approval of security changes for a file security system
|
US20050138371A1
(en)
*
|
2003-12-19 |
2005-06-23 |
Pss Systems, Inc. |
Method and system for distribution of notifications in file security systems
|
US7702909B2
(en)
*
|
2003-12-22 |
2010-04-20 |
Klimenty Vainstein |
Method and system for validating timestamps
|
US7593532B2
(en)
*
|
2004-04-22 |
2009-09-22 |
Netapp, Inc. |
Management of the retention and/or discarding of stored data
|
US7681042B2
(en)
*
|
2004-06-17 |
2010-03-16 |
Eruces, Inc. |
System and method for dis-identifying sensitive information and associated records
|
US7707427B1
(en)
*
|
2004-07-19 |
2010-04-27 |
Michael Frederick Kenrich |
Multi-level file digests
|
WO2006012457A1
(en)
*
|
2004-07-21 |
2006-02-02 |
Beachhead Solutions, Inc. |
A system and method for lost data destruction of electronic data stored on portable electronic devices
|
KR100580204B1
(ko)
*
|
2004-10-06 |
2006-05-16 |
삼성전자주식회사 |
데이터 저장 장치 및 방법
|
US7590868B2
(en)
*
|
2005-02-09 |
2009-09-15 |
Hewlett-Packard Development Company, L.P. |
Method and apparatus for managing encrypted data on a computer readable medium
|
US8108693B2
(en)
|
2005-04-01 |
2012-01-31 |
Ged-I Ltd. |
Method for data storage protection and encryption
|
CN100464313C
(zh)
*
|
2005-05-20 |
2009-02-25 |
联想(北京)有限公司 |
一种移动存储装置及存取移动存储装置中加密数据的方法
|
US8898452B2
(en)
*
|
2005-09-08 |
2014-11-25 |
Netapp, Inc. |
Protocol translation
|
US8407482B2
(en)
*
|
2006-03-31 |
2013-03-26 |
Avaya Inc. |
User session dependent URL masking
|
US8171307B1
(en)
|
2006-05-26 |
2012-05-01 |
Netapp, Inc. |
Background encryption of disks in a large cluster
|
US8397083B1
(en)
|
2006-08-23 |
2013-03-12 |
Netapp, Inc. |
System and method for efficiently deleting a file from secure storage served by a storage system
|
US8181011B1
(en)
|
2006-08-23 |
2012-05-15 |
Netapp, Inc. |
iSCSI name forwarding technique
|
US7971234B1
(en)
|
2006-09-15 |
2011-06-28 |
Netapp, Inc. |
Method and apparatus for offline cryptographic key establishment
|
US7995759B1
(en)
|
2006-09-28 |
2011-08-09 |
Netapp, Inc. |
System and method for parallel compression of a single data stream
|
US8190905B1
(en)
|
2006-09-29 |
2012-05-29 |
Netapp, Inc. |
Authorizing administrative operations using a split knowledge protocol
|
US8042155B1
(en)
|
2006-09-29 |
2011-10-18 |
Netapp, Inc. |
System and method for generating a single use password based on a challenge/response protocol
|
US8245050B1
(en)
|
2006-09-29 |
2012-08-14 |
Netapp, Inc. |
System and method for initial key establishment using a split knowledge protocol
|
US7853019B1
(en)
|
2006-11-30 |
2010-12-14 |
Netapp, Inc. |
Tape failover across a cluster
|
US8387124B2
(en)
*
|
2007-03-15 |
2013-02-26 |
Palo Alto Research Center Incorporated |
Wormhole devices for usable secure access to remote resource
|
US8607046B1
(en)
|
2007-04-23 |
2013-12-10 |
Netapp, Inc. |
System and method for signing a message to provide one-time approval to a plurality of parties
|
US8611542B1
(en)
|
2007-04-26 |
2013-12-17 |
Netapp, Inc. |
Peer to peer key synchronization
|
US8824686B1
(en)
|
2007-04-27 |
2014-09-02 |
Netapp, Inc. |
Cluster key synchronization
|
US8037524B1
(en)
|
2007-06-19 |
2011-10-11 |
Netapp, Inc. |
System and method for differentiated cross-licensing for services across heterogeneous systems using transient keys
|
US8196182B2
(en)
|
2007-08-24 |
2012-06-05 |
Netapp, Inc. |
Distributed management of crypto module white lists
|
US9774445B1
(en)
|
2007-09-04 |
2017-09-26 |
Netapp, Inc. |
Host based rekeying
|
US7983423B1
(en)
|
2007-10-29 |
2011-07-19 |
Netapp, Inc. |
Re-keying based on pre-generated keys
|
JP2009139722A
(ja)
*
|
2007-12-07 |
2009-06-25 |
Tani Electronics Corp |
カラーを利用した暗号化方法および暗号化装置
|
IL188254A0
(en)
*
|
2007-12-19 |
2008-11-03 |
Isaac J Labaton |
Memory management method for the impovement of portable devices applications' security
|
US8190921B1
(en)
*
|
2007-12-27 |
2012-05-29 |
Emc Corporation |
Methodology for vaulting data encryption keys with encrypted storage
|
US20090196417A1
(en)
*
|
2008-02-01 |
2009-08-06 |
Seagate Technology Llc |
Secure disposal of storage data
|
US8103844B2
(en)
*
|
2008-02-01 |
2012-01-24 |
Donald Rozinak Beaver |
Secure direct platter access
|
US20100031057A1
(en)
*
|
2008-02-01 |
2010-02-04 |
Seagate Technology Llc |
Traffic analysis resistant storage encryption using implicit and explicit data
|
JP2010009717A
(ja)
*
|
2008-06-30 |
2010-01-14 |
Hitachi-Lg Data Storage Inc |
暗号化情報の版数確認方法、および光ディスク再生装置
|
KR101228857B1
(ko)
|
2011-04-15 |
2013-02-01 |
루멘소프트 (주) |
이중 패스워드 방식의 대칭키 암복호화 방법
|
US10140477B2
(en)
*
|
2013-12-09 |
2018-11-27 |
Thales E-Security, Inc. |
Obfuscating in memory encryption keys
|
WO2016060639A1
(en)
*
|
2014-10-13 |
2016-04-21 |
Hewlett Packard Enterprise Development Lp |
Controlling access to secured media content
|
WO2017106406A1
(en)
*
|
2015-12-16 |
2017-06-22 |
Cryptography Research, Inc. |
Cryptographic management of lifecycle states
|
US10911215B2
(en)
*
|
2018-02-12 |
2021-02-02 |
Gideon Samid |
BitMap lattice: a cyber tool comprised of geometric construction
|
US11316658B2
(en)
|
2020-07-20 |
2022-04-26 |
Bank Of America Corporation |
System and method for securing a database by scrambling data
|