US6175625B1
(en)
|
1944-12-15 |
2001-01-16 |
The United States Of America As Represented By The National Security Agency |
Control circuits for electric coding machines
|
JPS61177479A
(ja)
|
1985-02-01 |
1986-08-09 |
沖電気工業株式会社 |
暗号化鍵管理方式
|
US4908759A
(en)
|
1985-08-29 |
1990-03-13 |
Bell Communications Research, Inc. |
Hierarchical database conversion with conditional write
|
US4782517A
(en)
|
1986-09-08 |
1988-11-01 |
Bell Communications Research, Inc. |
System and method for defining and providing telephone network services
|
US4868877A
(en)
|
1988-02-12 |
1989-09-19 |
Fischer Addison M |
Public key/signature cryptosystem with enhanced digital signature certification
|
US4918728A
(en)
|
1989-08-30 |
1990-04-17 |
International Business Machines Corporation |
Data cryptography operations using control vectors
|
US6044205A
(en)
|
1996-02-29 |
2000-03-28 |
Intermind Corporation |
Communications system for transferring information between memories according to processes transferred with the information
|
US5054067A
(en)
|
1990-02-21 |
1991-10-01 |
General Instrument Corporation |
Block-cipher cryptographic device based upon a pseudorandom nonlinear sequence generator
|
JPH09233067A
(ja)
*
|
1990-07-31 |
1997-09-05 |
Hiroichi Okano |
知的情報処理方法および装置
|
US5146498A
(en)
|
1991-01-10 |
1992-09-08 |
Motorola, Inc. |
Remote key manipulations for over-the-air re-keying
|
US5201000A
(en)
|
1991-09-27 |
1993-04-06 |
International Business Machines Corporation |
Method for generating public and private key pairs without using a passphrase
|
AU7707894A
(en)
|
1993-09-29 |
1995-04-18 |
Pumpkin House Incorporated |
Enciphering/deciphering device and method and enciphering/deciphering communication system
|
US5495533A
(en)
|
1994-04-29 |
1996-02-27 |
International Business Machines Corporation |
Personal key archive
|
US7904722B2
(en)
|
1994-07-19 |
2011-03-08 |
Certco, Llc |
Method for securely using digital signatures in a commercial cryptographic system
|
US5826245A
(en)
|
1995-03-20 |
1998-10-20 |
Sandberg-Diment; Erik |
Providing verification information for a transaction
|
US5633931A
(en)
|
1995-06-30 |
1997-05-27 |
Novell, Inc. |
Method and apparatus for calculating message signatures in advance
|
US5675653A
(en)
|
1995-11-06 |
1997-10-07 |
Nelson, Jr.; Douglas Valmore |
Method and apparatus for digital encryption
|
US5761306A
(en)
|
1996-02-22 |
1998-06-02 |
Visa International Service Association |
Key replacement in a public key cryptosystem
|
US5933503A
(en)
|
1996-03-15 |
1999-08-03 |
Novell, Inc |
Controlled modular cryptography apparatus and method
|
US5862220A
(en)
|
1996-06-03 |
1999-01-19 |
Webtv Networks, Inc. |
Method and apparatus for using network address information to improve the performance of network transactions
|
US6012144A
(en)
|
1996-10-08 |
2000-01-04 |
Pickett; Thomas E. |
Transaction security method and apparatus
|
US6934249B1
(en)
|
1997-04-01 |
2005-08-23 |
Cisco Technology, Inc. |
Method and system for minimizing the connection set up time in high speed packet switching networks
|
US20010011226A1
(en)
|
1997-06-25 |
2001-08-02 |
Paul Greer |
User demographic profile driven advertising targeting
|
US7194424B2
(en)
|
1997-06-25 |
2007-03-20 |
Intel Corporation |
User demographic profile driven advertising targeting
|
JP3542895B2
(ja)
|
1997-08-22 |
2004-07-14 |
インターナショナル・ビジネス・マシーンズ・コーポレーション |
時間制約暗号システム
|
CA2302784A1
(fr)
|
1997-09-17 |
1999-03-25 |
Frank C. Luyster |
Procede de chiffrement bloc ameliore
|
US6978017B2
(en)
|
1997-10-14 |
2005-12-20 |
Entrust Limited |
Method and system for providing updated encryption key pairs and digital signature key pairs in a public key system
|
US6259789B1
(en)
|
1997-12-12 |
2001-07-10 |
Safecourier Software, Inc. |
Computer implemented secret object key block cipher encryption and digital signature device and method
|
US6195622B1
(en)
|
1998-01-15 |
2001-02-27 |
Microsoft Corporation |
Methods and apparatus for building attribute transition probability models for use in pre-fetching resources
|
US6185679B1
(en)
|
1998-02-23 |
2001-02-06 |
International Business Machines Corporation |
Method and apparatus for a symmetric block cipher using multiple stages with type-1 and type-3 feistel networks
|
JP3659791B2
(ja)
|
1998-03-23 |
2005-06-15 |
インターナショナル・ビジネス・マシーンズ・コーポレーション |
小時間鍵生成の方法及びシステム
|
US6336186B1
(en)
|
1998-07-02 |
2002-01-01 |
Networks Associates Technology, Inc. |
Cryptographic system and methodology for creating and managing crypto policy on certificate servers
|
JP3939453B2
(ja)
|
1999-01-22 |
2007-07-04 |
三菱電機株式会社 |
情報仲介システム
|
US6356941B1
(en)
|
1999-02-22 |
2002-03-12 |
Cyber-Ark Software Ltd. |
Network vaults
|
US6505299B1
(en)
|
1999-03-01 |
2003-01-07 |
Sharp Laboratories Of America, Inc. |
Digital image scrambling for image coding systems
|
US20020135611A1
(en)
|
1999-03-04 |
2002-09-26 |
Trevor Deosaran |
Remote performance management to accelerate distributed processes
|
US6546492B1
(en)
|
1999-03-26 |
2003-04-08 |
Ericsson Inc. |
System for secure controlled electronic memory updates via networks
|
GB2348568A
(en)
*
|
1999-03-31 |
2000-10-04 |
Ibm |
Enabling conformance to legislative requirements for mobile devices
|
JP2000295209A
(ja)
|
1999-04-09 |
2000-10-20 |
Ntt Data Corp |
鍵管理方法、鍵管理システム及び記録媒体
|
JP4132530B2
(ja)
|
2000-01-24 |
2008-08-13 |
株式会社リコー |
電子保存装置
|
US6721713B1
(en)
|
1999-05-27 |
2004-04-13 |
Andersen Consulting Llp |
Business alliance identification in a web architecture framework
|
GB9913165D0
(en)
*
|
1999-06-08 |
1999-08-04 |
Secr Defence |
Access control in a web environment
|
US7882247B2
(en)
|
1999-06-11 |
2011-02-01 |
Netmotion Wireless, Inc. |
Method and apparatus for providing secure connectivity in mobile and other intermittent computing environments
|
US8868914B2
(en)
|
1999-07-02 |
2014-10-21 |
Steven W. Teppler |
System and methods for distributing trusted time
|
SE9904094D0
(sv)
|
1999-11-12 |
1999-11-12 |
Protegrity Research & Dev |
Method for reencryption of a database
|
CA2365236A1
(fr)
|
2000-01-21 |
2001-07-26 |
Sony Corporation |
Systeme d'authentification de donnees
|
US6826609B1
(en)
|
2000-03-31 |
2004-11-30 |
Tumbleweed Communications Corp. |
Policy enforcement in a secure data file delivery system
|
US20050195743A1
(en)
|
2000-04-03 |
2005-09-08 |
P-Cube Ltd. |
Real time charging of pre-paid accounts
|
DE10025626A1
(de)
|
2000-05-24 |
2001-11-29 |
Deutsche Telekom Ag |
Verschlüsseln von abzuspeichernden Daten in einem IV-System
|
US6611863B1
(en)
|
2000-06-05 |
2003-08-26 |
Intel Corporation |
Automatic device assignment through programmable device discovery for policy based network management
|
US8538843B2
(en)
|
2000-07-17 |
2013-09-17 |
Galactic Computing Corporation Bvi/Bc |
Method and system for operating an E-commerce service provider
|
US20030021417A1
(en)
|
2000-10-20 |
2003-01-30 |
Ognjen Vasic |
Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data
|
US7362868B2
(en)
|
2000-10-20 |
2008-04-22 |
Eruces, Inc. |
Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data
|
JP2002140534A
(ja)
|
2000-11-01 |
2002-05-17 |
Sony Corp |
ログ管理構成を持つコンテンツ配信システムおよびコンテンツ配信方法
|
US6986040B1
(en)
|
2000-11-03 |
2006-01-10 |
Citrix Systems, Inc. |
System and method of exploiting the security of a secure communication channel to secure a non-secure communication channel
|
AU2002224119A1
(en)
|
2000-11-28 |
2002-06-11 |
Fujitsu Limited |
Data terminal for managing ciphered content data and license acquired by software
|
US6978376B2
(en)
*
|
2000-12-15 |
2005-12-20 |
Authentica, Inc. |
Information security architecture for encrypting documents for remote access while maintaining access control
|
US7085834B2
(en)
|
2000-12-22 |
2006-08-01 |
Oracle International Corporation |
Determining a user's groups
|
US7493391B2
(en)
|
2001-02-12 |
2009-02-17 |
International Business Machines Corporation |
System for automated session resource clean-up by determining whether server resources have been held by client longer than preset thresholds
|
US7181017B1
(en)
|
2001-03-23 |
2007-02-20 |
David Felsher |
System and method for secure three-party communications
|
US7050583B2
(en)
|
2001-03-29 |
2006-05-23 |
Etreppid Technologies, Llc |
Method and apparatus for streaming data using rotating cryptographic keys
|
US20030037237A1
(en)
|
2001-04-09 |
2003-02-20 |
Jean-Paul Abgrall |
Systems and methods for computer device authentication
|
US6934702B2
(en)
|
2001-05-04 |
2005-08-23 |
Sun Microsystems, Inc. |
Method and system of routing messages in a distributed search network
|
JP2007037197A
(ja)
|
2001-08-01 |
2007-02-08 |
Matsushita Electric Ind Co Ltd |
暗号化データ配信システム
|
CA2358048A1
(fr)
|
2001-09-25 |
2003-03-25 |
Luis Rueda |
Systeme de chiffrement servant a proteger des donnees
|
CA2358980A1
(fr)
|
2001-10-12 |
2003-04-12 |
Karthika Technologies Inc. |
Architecture de securite repartie pour reseaux de stockage
|
US7200747B2
(en)
|
2001-10-31 |
2007-04-03 |
Hewlett-Packard Development Company, L.P. |
System for ensuring data privacy and user differentiation in a distributed file system
|
US7333616B1
(en)
|
2001-11-14 |
2008-02-19 |
Omniva Corp. |
Approach for managing access to messages using encryption key management policies
|
US7243366B2
(en)
|
2001-11-15 |
2007-07-10 |
General Instrument Corporation |
Key management protocol and authentication system for secure internet protocol rights management architecture
|
US20020076044A1
(en)
|
2001-11-16 |
2002-06-20 |
Paul Pires |
Method of and system for encrypting messages, generating encryption keys and producing secure session keys
|
US7865446B2
(en)
|
2001-12-11 |
2011-01-04 |
International Businesss Machines Corporation |
Method for secure electronic commercial transaction on-line processing
|
US7392390B2
(en)
|
2001-12-12 |
2008-06-24 |
Valve Corporation |
Method and system for binding kerberos-style authenticators to single clients
|
JP4291970B2
(ja)
|
2001-12-20 |
2009-07-08 |
富士通株式会社 |
暗号処理装置
|
US7117366B2
(en)
|
2002-01-08 |
2006-10-03 |
International Business Machines Corporation |
Public key based authentication method for transaction delegation in service-based computing environments
|
JP2003208355A
(ja)
*
|
2002-01-11 |
2003-07-25 |
Hitachi Ltd |
データ記憶装置ならびにデータバックアップ方法およびデータリストア方法
|
US7376967B1
(en)
|
2002-01-14 |
2008-05-20 |
F5 Networks, Inc. |
Method and system for performing asynchronous cryptographic operations
|
US7146009B2
(en)
|
2002-02-05 |
2006-12-05 |
Surety, Llc |
Secure electronic messaging system requiring key retrieval for deriving decryption keys
|
JP3897613B2
(ja)
|
2002-02-27 |
2007-03-28 |
株式会社日立製作所 |
公開鍵暗号方式における登録局サーバの運用方法、登録局サーバ、及びプログラム
|
US7400733B1
(en)
|
2002-02-27 |
2008-07-15 |
Atheros Communications, Inc. |
Key refresh at the MAC layer
|
US20030188188A1
(en)
|
2002-03-15 |
2003-10-02 |
Microsoft Corporation |
Time-window-constrained multicast for future delivery multicast
|
US7890771B2
(en)
|
2002-04-17 |
2011-02-15 |
Microsoft Corporation |
Saving and retrieving data based on public key encryption
|
US20030217126A1
(en)
|
2002-05-14 |
2003-11-20 |
Polcha Andrew J. |
System and method for automatically configuring remote computer
|
US6965674B2
(en)
|
2002-05-21 |
2005-11-15 |
Wavelink Corporation |
System and method for providing WLAN security through synchronized update and rotation of WEP keys
|
CN1672352A
(zh)
|
2002-05-23 |
2005-09-21 |
爱特梅尔股份有限公司 |
基于先进加密标准(aes)的硬件密码机
|
US20040009815A1
(en)
|
2002-06-26 |
2004-01-15 |
Zotto Banjamin O. |
Managing access to content
|
JP2005533438A
(ja)
|
2002-07-12 |
2005-11-04 |
イングリアン ネットワークス インコーポレーテッド |
ネットワークに付随する暗号化
|
US7844717B2
(en)
|
2003-07-18 |
2010-11-30 |
Herz Frederick S M |
Use of proxy servers and pseudonymous transactions to maintain individual's privacy in the competitive business of maintaining personal history databases
|
US7620680B1
(en)
|
2002-08-15 |
2009-11-17 |
Microsoft Corporation |
Fast byzantine paxos
|
US7877607B2
(en)
|
2002-08-30 |
2011-01-25 |
Hewlett-Packard Development Company, L.P. |
Tamper-evident data management
|
FR2844656B1
(fr)
|
2002-09-18 |
2005-01-28 |
France Telecom |
Procede de signature electronique, programme et serveur pour la mise en oeuvre du procede
|
US8064508B1
(en)
|
2002-09-19 |
2011-11-22 |
Silicon Image, Inc. |
Equalizer with controllably weighted parallel high pass and low pass filters and receiver including such an equalizer
|
JP2004126716A
(ja)
*
|
2002-09-30 |
2004-04-22 |
Fujitsu Ltd |
広域分散ストレージシステムを利用したデータ格納方法、その方法をコンピュータに実現させるプログラム、記録媒体、及び広域分散ストレージシステムにおける制御装置
|
US20040107345A1
(en)
|
2002-10-21 |
2004-06-03 |
Brandt David D. |
System and methodology providing automation security protocols and intrusion detection in an industrial controller environment
|
US7565419B1
(en)
|
2002-11-22 |
2009-07-21 |
Symantec Operating Corporation |
Conflict resolution in a peer to peer network
|
FR2848052B1
(fr)
|
2002-11-29 |
2005-03-18 |
Orange France |
Systeme et procede de selection dans un terminal pour une architecture dediee a un reseau de communication
|
US20040143733A1
(en)
|
2003-01-16 |
2004-07-22 |
Cloverleaf Communication Co. |
Secure network data storage mediator
|
US20050021712A1
(en)
|
2003-01-24 |
2005-01-27 |
Constantin Chassapis |
Multi-user, multi-device remote access system
|
US7003117B2
(en)
*
|
2003-02-05 |
2006-02-21 |
Voltage Security, Inc. |
Identity-based encryption system for secure data distribution
|
DE10306268A1
(de)
|
2003-02-14 |
2004-08-26 |
Michael Sack |
Verfahren zum Übermitteln eines Nutzerdatensatzes an eine Anwenderstation
|
ATE490511T1
(de)
*
|
2003-02-28 |
2010-12-15 |
Research In Motion Ltd |
System und verfahren zum schutz von daten in einem kommunikationsgerät
|
GB2400699B
(en)
|
2003-04-17 |
2006-07-05 |
Hewlett Packard Development Co |
Security data provision method and apparatus and data recovery method and system
|
US7093147B2
(en)
|
2003-04-25 |
2006-08-15 |
Hewlett-Packard Development Company, L.P. |
Dynamically selecting processor cores for overall power efficiency
|
US20050015471A1
(en)
|
2003-07-18 |
2005-01-20 |
Zhang Pu Paul |
Secure cluster configuration data set transfer protocol
|
US7697690B2
(en)
|
2003-07-21 |
2010-04-13 |
Hewlett-Packard Development Company, L.P. |
Windowed backward key rotation
|
JP4062206B2
(ja)
|
2003-08-01 |
2008-03-19 |
日本電気株式会社 |
署名復号サービスシステム及びプログラム
|
JP4437650B2
(ja)
|
2003-08-25 |
2010-03-24 |
株式会社日立製作所 |
ストレージシステム
|
JP2005151529A
(ja)
|
2003-10-20 |
2005-06-09 |
Sony Corp |
データ伝送方法、データ伝送装置及びデータ受信装置
|
US7694151B1
(en)
*
|
2003-11-20 |
2010-04-06 |
Johnson Richard C |
Architecture, system, and method for operating on encrypted and/or hidden information
|
US7421079B2
(en)
|
2003-12-09 |
2008-09-02 |
Northrop Grumman Corporation |
Method and apparatus for secure key replacement
|
US8065720B1
(en)
|
2004-01-06 |
2011-11-22 |
Novell, Inc. |
Techniques for managing secure communications
|
JP2005197912A
(ja)
|
2004-01-06 |
2005-07-21 |
Nippon Telegr & Teleph Corp <Ntt> |
情報開示制御方法、情報開示制御プログラム、ならびに、耐タンパ装置
|
US7296023B2
(en)
|
2004-01-15 |
2007-11-13 |
International Business Machines Corporation |
Method and apparatus for persistent real-time collaboration
|
JP2005258801A
(ja)
|
2004-03-11 |
2005-09-22 |
Matsushita Electric Ind Co Ltd |
個人認証システム
|
US8086702B2
(en)
|
2005-03-16 |
2011-12-27 |
Icontrol Networks, Inc. |
Takeover processes in security network integrated with premise security system
|
EP2267625A3
(fr)
|
2004-04-19 |
2015-08-05 |
Lumension Security S.A. |
Autorisation locale et centralisée en ligne de fichiers exécutables
|
WO2005102016A2
(fr)
|
2004-04-26 |
2005-11-03 |
Jp Morgan Chase Bank |
Systeme et procede d'acheminement de messages
|
US7894604B2
(en)
|
2004-05-17 |
2011-02-22 |
Mitsubishi Electric Corporation |
Quantum cryptographic communication apparatus
|
US20050273629A1
(en)
|
2004-06-04 |
2005-12-08 |
Vitalsource Technologies |
System, method and computer program product for providing digital rights management of protected content
|
US20060010323A1
(en)
|
2004-07-07 |
2006-01-12 |
Xerox Corporation |
Method for a repository to provide access to a document, and a repository arranged in accordance with the same method
|
US7979731B2
(en)
|
2004-07-15 |
2011-07-12 |
Panasonic Corporation |
Time authentication device, time authentication method, computer program, recording medium, integrated circuit, and time authentication system
|
US20060021018A1
(en)
|
2004-07-21 |
2006-01-26 |
International Business Machines Corporation |
Method and system for enabling trust infrastructure support for federated user lifecycle management
|
US20060048222A1
(en)
|
2004-08-27 |
2006-03-02 |
O'connor Clint H |
Secure electronic delivery seal for information handling system
|
US7814314B2
(en)
|
2004-08-31 |
2010-10-12 |
Ntt Docomo, Inc. |
Revocation of cryptographic digital certificates
|
CA2622404A1
(fr)
|
2004-09-15 |
2006-03-23 |
Adesso Systems, Inc. |
Systeme et procede pour la gestion de donnees dans un systeme informatique distribue
|
JP2006099548A
(ja)
|
2004-09-30 |
2006-04-13 |
Hitachi Ltd |
データ共有システム、データ共有方法、データ保有者デバイスおよびデータサーバ
|
US7756808B2
(en)
|
2004-10-14 |
2010-07-13 |
Sap Ag |
Apparatus and product of manufacture for using condition data structures separately from rule data structures in business transactions
|
US20060089163A1
(en)
|
2004-10-22 |
2006-04-27 |
Jean Khawand |
Method and system for delivering messages
|
US7970625B2
(en)
|
2004-11-04 |
2011-06-28 |
Dr Systems, Inc. |
Systems and methods for retrieval of medical data
|
US8315387B2
(en)
|
2004-11-05 |
2012-11-20 |
Nucrypt Llc |
System and method for data transmission over arbitrary media using physical encryption
|
US7873782B2
(en)
|
2004-11-05 |
2011-01-18 |
Data Robotics, Inc. |
Filesystem-aware block storage system, apparatus, and method
|
US7899189B2
(en)
*
|
2004-12-09 |
2011-03-01 |
International Business Machines Corporation |
Apparatus, system, and method for transparent end-to-end security of storage data in a client-server environment
|
US20070168292A1
(en)
*
|
2004-12-21 |
2007-07-19 |
Fabrice Jogand-Coulomb |
Memory system with versatile content control
|
US7607164B2
(en)
|
2004-12-23 |
2009-10-20 |
Microsoft Corporation |
Systems and processes for managing policy change in a distributed enterprise
|
US7707288B2
(en)
|
2005-01-06 |
2010-04-27 |
International Business Machines Corporation |
Automatically building a locally managed virtual node grouping to handle a grid job requiring a degree of resource parallelism within a grid environment
|
JP4714482B2
(ja)
|
2005-02-28 |
2011-06-29 |
株式会社日立製作所 |
暗号通信システムおよび方法
|
US7900247B2
(en)
|
2005-03-14 |
2011-03-01 |
Microsoft Corporation |
Trusted third party authentication for web services
|
US7774826B1
(en)
|
2005-03-18 |
2010-08-10 |
Novell, Inc. |
System and method for determining effective policy profiles in a client-server architecture
|
US20110209053A1
(en)
*
|
2005-11-23 |
2011-08-25 |
Beyondcore, Inc. |
Shuffling Documents Containing Restricted Information
|
JP4622627B2
(ja)
|
2005-03-30 |
2011-02-02 |
ブラザー工業株式会社 |
通信装置、通信システム及びプログラム
|
US8554916B2
(en)
|
2005-04-11 |
2013-10-08 |
Accenture Global Services Gmbh |
Service delivery platform and development of new client business models
|
US8051487B2
(en)
|
2005-05-09 |
2011-11-01 |
Trend Micro Incorporated |
Cascading security architecture
|
US8973008B2
(en)
|
2005-05-10 |
2015-03-03 |
Oracle America, Inc. |
Combining different resource types
|
JP2006319543A
(ja)
|
2005-05-11 |
2006-11-24 |
Nec Corp |
コンテンツ再生システム、携帯端末、コンテンツ再生方法、およびコンテンツ再生管理プログラム
|
US8312064B1
(en)
|
2005-05-11 |
2012-11-13 |
Symantec Corporation |
Method and apparatus for securing documents using a position dependent file system
|
US8028329B2
(en)
|
2005-06-13 |
2011-09-27 |
Iamsecureonline, Inc. |
Proxy authentication network
|
US7639819B2
(en)
|
2005-06-16 |
2009-12-29 |
Oracle International Corporation |
Method and apparatus for using an external security device to secure data in a database
|
US8295492B2
(en)
|
2005-06-27 |
2012-10-23 |
Wells Fargo Bank, N.A. |
Automated key management system
|
US7784087B2
(en)
|
2005-08-04 |
2010-08-24 |
Toshiba Corporation |
System and method for securely sharing electronic documents
|
US8917159B2
(en)
|
2005-08-19 |
2014-12-23 |
CLARKE William McALLISTER |
Fully secure item-level tagging
|
US8566607B2
(en)
|
2005-08-26 |
2013-10-22 |
International Business Machines Corporation |
Cryptography methods and apparatus used with a processor
|
US20070055921A1
(en)
|
2005-08-30 |
2007-03-08 |
Challenor Timothy W |
Document editing system
|
US20070055862A1
(en)
*
|
2005-09-08 |
2007-03-08 |
Interdigital Technology Corporation |
Method and system for distributing data
|
JP2007081482A
(ja)
|
2005-09-09 |
2007-03-29 |
Canon Inc |
端末認証方法及びその装置、プログラム
|
US8218770B2
(en)
*
|
2005-09-13 |
2012-07-10 |
Agere Systems Inc. |
Method and apparatus for secure key management and protection
|
US7873166B2
(en)
*
|
2005-09-13 |
2011-01-18 |
Avaya Inc. |
Method for undetectably impeding key strength of encryption usage for products exported outside the U.S
|
US7680905B1
(en)
|
2005-09-30 |
2010-03-16 |
Emc Corporation |
Methods and system for viewing SAN resources
|
US9055093B2
(en)
|
2005-10-21 |
2015-06-09 |
Kevin R. Borders |
Method, system and computer program product for detecting at least one of security threats and undesirable computer files
|
JP4569464B2
(ja)
|
2005-12-20 |
2010-10-27 |
沖電気工業株式会社 |
マルチホップネットワークにおける鍵更新システム,鍵管理装置,通信端末および鍵情報構築方法
|
US20070143851A1
(en)
|
2005-12-21 |
2007-06-21 |
Fiberlink |
Method and systems for controlling access to computing resources based on known security vulnerabilities
|
US8972449B2
(en)
|
2005-12-29 |
2015-03-03 |
Nextlabs, Inc. |
Preventing conflicts of interests between two or more groups
|
US8832048B2
(en)
|
2005-12-29 |
2014-09-09 |
Nextlabs, Inc. |
Techniques and system to monitor and log access of information based on system and user context using policies
|
US7716240B2
(en)
|
2005-12-29 |
2010-05-11 |
Nextlabs, Inc. |
Techniques and system to deploy policies intelligently
|
US20070174429A1
(en)
|
2006-01-24 |
2007-07-26 |
Citrix Systems, Inc. |
Methods and servers for establishing a connection between a client system and a virtual machine hosting a requested computing environment
|
US7912994B2
(en)
|
2006-01-27 |
2011-03-22 |
Apple Inc. |
Reducing connection time for mass storage class peripheral by internally prefetching file data into local cache in response to connection to host
|
EP1826944B1
(fr)
|
2006-02-27 |
2009-05-13 |
Research In Motion Limited |
Procédé de personnalisation d'une politique IT standardisée
|
US7925023B2
(en)
|
2006-03-03 |
2011-04-12 |
Oracle International Corporation |
Method and apparatus for managing cryptographic keys
|
US7801128B2
(en)
|
2006-03-31 |
2010-09-21 |
Amazon Technologies, Inc. |
Managing communications between computing nodes
|
US7751570B2
(en)
|
2006-04-04 |
2010-07-06 |
Oracle International Corporation |
Method and apparatus for managing cryptographic keys
|
US8064604B2
(en)
|
2006-04-04 |
2011-11-22 |
Oracle International Corporation |
Method and apparatus for facilitating role-based cryptographic key management for a database
|
JP2007293468A
(ja)
|
2006-04-24 |
2007-11-08 |
Fujifilm Corp |
プリントサービスシステムおよびプリント処理方法
|
US9002018B2
(en)
|
2006-05-09 |
2015-04-07 |
Sync Up Technologies Corporation |
Encryption key exchange system and method
|
US20080005024A1
(en)
|
2006-05-17 |
2008-01-03 |
Carter Kirkwood |
Document authentication system
|
US20070283446A1
(en)
|
2006-06-05 |
2007-12-06 |
Kabushiki Kaisha Toshiba |
System and method for secure handling of scanned documents
|
US9053460B2
(en)
|
2006-06-12 |
2015-06-09 |
International Business Machines Corporation |
Rule management using a configuration database
|
US20080019516A1
(en)
|
2006-06-22 |
2008-01-24 |
Entriq Inc. |
Enforced delay of access to digital content
|
WO2007148945A2
(fr)
|
2006-06-22 |
2007-12-27 |
Lg Electronics Inc. |
Procédé de retransmission de données dans un système de communication mobile
|
US20080022376A1
(en)
|
2006-06-23 |
2008-01-24 |
Lenovo (Beijing) Limited |
System and method for hardware access control
|
JP4943751B2
(ja)
|
2006-07-04 |
2012-05-30 |
株式会社内田洋行 |
電子データアクセス制御システム、プログラム及び情報記憶媒体
|
CN101102186B
(zh)
|
2006-07-04 |
2012-01-04 |
华为技术有限公司 |
通用鉴权框架推送业务实现方法
|
US8108670B2
(en)
|
2006-07-13 |
2012-01-31 |
Intel Corporation |
Client apparatus and method with key manager
|
US20080028464A1
(en)
|
2006-07-25 |
2008-01-31 |
Michael Paul Bringle |
Systems and Methods for Data Processing Anomaly Prevention and Detection
|
US8689287B2
(en)
|
2006-08-17 |
2014-04-01 |
Northrop Grumman Systems Corporation |
Federated credentialing system and method
|
US20080072066A1
(en)
*
|
2006-08-21 |
2008-03-20 |
Motorola, Inc. |
Method and apparatus for authenticating applications to secure services
|
US20100316219A1
(en)
|
2007-08-06 |
2010-12-16 |
David Boubion |
Systems and methods for simultaneous integrated multiencrypted rotating key communication
|
US7953978B2
(en)
|
2006-09-07 |
2011-05-31 |
International Business Machines Corporation |
Key generation and retrieval using key servers
|
US8407806B2
(en)
|
2006-09-29 |
2013-03-26 |
Purusharth Agrawal |
Digital data distribution detection, deterrence and disablement system and method
|
US8122432B2
(en)
|
2006-10-04 |
2012-02-21 |
International Business Machines Corporation |
Rule management using a configuration database
|
GB2443244A
(en)
|
2006-10-05 |
2008-04-30 |
Hewlett Packard Development Co |
Authenticated Encryption Method and Apparatus
|
US20100095118A1
(en)
|
2006-10-12 |
2010-04-15 |
Rsa Security Inc. |
Cryptographic key management system facilitating secure access of data portions to corresponding groups of users
|
WO2008054329A1
(fr)
|
2006-10-31 |
2008-05-08 |
Agency For Science, Technology And Research |
Dispositif et procédé de génération et de distribution de permission d'accès à un objet numérique
|
JP4712017B2
(ja)
|
2006-11-13 |
2011-06-29 |
韓國電子通信研究院 |
ストリーム暗号を利用したメッセージ認証コード生成方法とストリーム暗号を利用した認証暗号化方法及びストリーム暗号を利用した認証復号化方法
|
US8213602B2
(en)
|
2006-11-27 |
2012-07-03 |
Broadcom Corporation |
Method and system for encrypting and decrypting a transport stream using multiple algorithms
|
JP4847301B2
(ja)
|
2006-11-28 |
2011-12-28 |
富士通株式会社 |
コンテンツ保護システム,コンテンツ保護用デバイスおよびコンテンツ保護方法
|
US8526621B2
(en)
|
2006-12-01 |
2013-09-03 |
President And Fellows Of Harvard College |
Method and apparatus for time-lapse cryptography
|
MX2009006201A
(es)
|
2006-12-12 |
2009-06-22 |
Fraunhofer Ges Forschung |
Codificador, decodificador y metodos para codificar y decodificar segmentos de datos que representan una corriente de datos del dominio temporal.
|
US20080172562A1
(en)
|
2007-01-12 |
2008-07-17 |
Christian Cachin |
Encryption and authentication of data and for decryption and verification of authenticity of data
|
US7870398B2
(en)
|
2007-01-25 |
2011-01-11 |
International Business Machines Corporation |
Integrity assurance of query result from database service provider
|
US7937432B2
(en)
|
2007-02-16 |
2011-05-03 |
Red Hat, Inc. |
State transition management according to a workflow management policy
|
KR101391152B1
(ko)
|
2007-04-05 |
2014-05-02 |
삼성전자주식회사 |
Ums 기기의 컨텐츠를 보호하기 위한 방법 및 장치
|
US8218761B2
(en)
|
2007-04-06 |
2012-07-10 |
Oracle International Corporation |
Method and apparatus for generating random data-encryption keys
|
CA2684229A1
(fr)
|
2007-04-12 |
2008-10-23 |
Ncipher Corporation Ltd. |
Procede et systeme pour identifier et gerer des cles
|
JP4964714B2
(ja)
*
|
2007-09-05 |
2012-07-04 |
株式会社日立製作所 |
ストレージ装置及びデータの管理方法
|
US8145762B2
(en)
*
|
2007-05-22 |
2012-03-27 |
Kount Inc. |
Collecting information regarding consumer click-through traffic
|
US9413686B2
(en)
|
2007-06-04 |
2016-08-09 |
Qualcomm Incorporated |
Establishing a unique end-to-end management key
|
US9003488B2
(en)
|
2007-06-06 |
2015-04-07 |
Datavalet Technologies |
System and method for remote device recognition at public hotspots
|
JP2008306418A
(ja)
|
2007-06-07 |
2008-12-18 |
Kddi Corp |
ネットワーク負荷軽減システム、ネットワーク負荷軽減方法およびプログラム
|
US20080319909A1
(en)
|
2007-06-25 |
2008-12-25 |
Perkins George S |
System and method for managing the lifecycle of encryption keys
|
MX2010000619A
(es)
|
2007-07-17 |
2010-05-17 |
William Howard Peirson Jr |
Sistemas y procesos para obtener y manejar firmas electronicas para documentos de transacciones de bienes raices.
|
JP4287485B2
(ja)
|
2007-07-30 |
2009-07-01 |
日立ソフトウエアエンジニアリング株式会社 |
情報処理装置及び方法、コンピュータ読み取り可能な記録媒体、並びに、外部記憶媒体
|
US8111828B2
(en)
|
2007-07-31 |
2012-02-07 |
Hewlett-Packard Development Company, L.P. |
Management of cryptographic keys for securing stored data
|
WO2009029842A1
(fr)
|
2007-08-31 |
2009-03-05 |
Exegy Incorporated |
Procédé et appareil pour un chiffrement/déchiffrement accéléré par voie matérielle
|
US7894626B2
(en)
|
2007-08-31 |
2011-02-22 |
Xerox Corporation |
System and method for the generation of multiple angle correlation-based digital watermarks
|
US8645715B2
(en)
*
|
2007-09-11 |
2014-02-04 |
International Business Machines Corporation |
Configuring host settings to specify an encryption setting and a key label referencing a key encryption key to use to encrypt an encryption key provided to a storage drive to use to encrypt data from the host
|
US8140847B1
(en)
|
2007-09-18 |
2012-03-20 |
Jianqing Wu |
Digital safe
|
CN101399661A
(zh)
|
2007-09-27 |
2009-04-01 |
华为技术有限公司 |
一种组密钥管理中的合法邻居认证方法和装置
|
CN101400059B
(zh)
|
2007-09-28 |
2010-12-08 |
华为技术有限公司 |
一种active状态下的密钥更新方法和设备
|
US8131663B1
(en)
|
2007-10-12 |
2012-03-06 |
Bonamy Taylor |
Apparatus for generating software logic rules by flowchart design
|
US8549278B2
(en)
|
2007-10-20 |
2013-10-01 |
Blackout, Inc. |
Rights management services-based file encryption system and method
|
WO2009060283A1
(fr)
|
2007-11-05 |
2009-05-14 |
Synaptic Laboratories Limited |
Procédé et appareil pour une communication sécurisée
|
WO2009070727A2
(fr)
|
2007-11-27 |
2009-06-04 |
Regulus Group, Llc. |
Système de facturation et de paiement
|
US8387127B1
(en)
|
2007-11-28 |
2013-02-26 |
Network Appliance, Inc. |
Storage security appliance with out-of-band management capabilities
|
KR100980831B1
(ko)
|
2007-12-12 |
2010-09-10 |
한국전자통신연구원 |
일회용 패스워드를 이용한 신뢰성 있는 통신 시스템 및방법
|
US8495357B2
(en)
|
2007-12-19 |
2013-07-23 |
International Business Machines Corporation |
Data security policy enforcement
|
US8060596B1
(en)
|
2007-12-26 |
2011-11-15 |
Symantec Corporation |
Methods and systems for normalizing data loss prevention categorization information
|
US8175276B2
(en)
|
2008-02-04 |
2012-05-08 |
Freescale Semiconductor, Inc. |
Encryption apparatus with diverse key retention schemes
|
JP4896054B2
(ja)
|
2008-03-06 |
2012-03-14 |
イートライアル株式会社 |
個人情報管理装置,個人情報管理プログラムおよび個人情報管理システム
|
US8893285B2
(en)
|
2008-03-14 |
2014-11-18 |
Mcafee, Inc. |
Securing data using integrated host-based data loss agent with encryption detection
|
US8681990B2
(en)
|
2008-03-28 |
2014-03-25 |
International Business Machines Corporation |
Renewal management for data items
|
JP4526574B2
(ja)
|
2008-03-31 |
2010-08-18 |
富士通株式会社 |
暗号データ管理システム、および暗号データ管理方法
|
US8225106B2
(en)
|
2008-04-02 |
2012-07-17 |
Protegrity Corporation |
Differential encryption utilizing trust modes
|
US8494168B1
(en)
|
2008-04-28 |
2013-07-23 |
Netapp, Inc. |
Locating cryptographic keys stored in a cache
|
US8589697B2
(en)
|
2008-04-30 |
2013-11-19 |
Netapp, Inc. |
Discarding sensitive data from persistent point-in-time image
|
US8601258B2
(en)
*
|
2008-05-05 |
2013-12-03 |
Kip Cr P1 Lp |
Method for configuring centralized encryption policies for devices
|
US20100088126A1
(en)
|
2008-05-05 |
2010-04-08 |
Vito Iaia |
Real time data distribution system
|
US8423483B2
(en)
|
2008-05-16 |
2013-04-16 |
Carnegie Mellon University |
User-controllable learning of policies
|
US20090300356A1
(en)
|
2008-05-27 |
2009-12-03 |
Crandell Jeffrey L |
Remote storage encryption system
|
US9069599B2
(en)
|
2008-06-19 |
2015-06-30 |
Servicemesh, Inc. |
System and method for a cloud computing abstraction layer with security zone facilities
|
US20100014662A1
(en)
|
2008-06-19 |
2010-01-21 |
Sami Antti Jutila |
Method, apparatus and computer program product for providing trusted storage of temporary subscriber data
|
WO2009157142A1
(fr)
|
2008-06-23 |
2009-12-30 |
パナソニック株式会社 |
Dispositif de traitement d’informations, procédé de gestion de clé de chiffrement, programme informatique et circuit intégré
|
US8261320B1
(en)
|
2008-06-30 |
2012-09-04 |
Symantec Corporation |
Systems and methods for securely managing access to data
|
GB0811897D0
(en)
|
2008-06-30 |
2008-07-30 |
Steed Darren |
Intelligent file encapsulation
|
US8005859B2
(en)
|
2008-07-09 |
2011-08-23 |
The Go Daddy Group, Inc. |
Maintaining contact with a document storage file owner
|
US8245039B2
(en)
|
2008-07-18 |
2012-08-14 |
Bridgewater Systems Corp. |
Extensible authentication protocol authentication and key agreement (EAP-AKA) optimization
|
JP4620146B2
(ja)
|
2008-07-18 |
2011-01-26 |
株式会社東芝 |
情報処理装置及び認証方法
|
JP4922262B2
(ja)
|
2008-07-30 |
2012-04-25 |
株式会社オートネットワーク技術研究所 |
制御装置
|
US8069053B2
(en)
|
2008-08-13 |
2011-11-29 |
Hartford Fire Insurance Company |
Systems and methods for de-identification of personal data
|
JP2010072916A
(ja)
|
2008-09-18 |
2010-04-02 |
Hitachi Software Eng Co Ltd |
データ保護システム及びデータ保護方法
|
US8826443B1
(en)
|
2008-09-18 |
2014-09-02 |
Symantec Corporation |
Selective removal of protected content from web requests sent to an interactive website
|
US8302170B2
(en)
|
2008-09-22 |
2012-10-30 |
Bespoke Innovations S.A.R.L. |
Method for enhancing network application security
|
US9742555B2
(en)
|
2008-09-25 |
2017-08-22 |
Nokia Technologies Oy |
Encryption/identification using array of resonators at transmitter and receiver
|
US8804950B1
(en)
|
2008-09-30 |
2014-08-12 |
Juniper Networks, Inc. |
Methods and apparatus for producing a hash value based on a hash function
|
PT2342114E
(pt)
|
2008-10-27 |
2013-02-07 |
Siemens Sas |
Método de encaminhamento de dados entre pelo menos um veículo guiado e uma rede de terra
|
US8695090B2
(en)
|
2008-10-31 |
2014-04-08 |
Symantec Corporation |
Data loss protection through application data access classification
|
US7992055B1
(en)
|
2008-11-07 |
2011-08-02 |
Netapp, Inc. |
System and method for providing autosupport for a security system
|
US8909925B2
(en)
*
|
2008-11-17 |
2014-12-09 |
Prakash Baskaran |
System to secure electronic content, enforce usage policies and provide configurable functionalities
|
JP2010124071A
(ja)
|
2008-11-17 |
2010-06-03 |
Toshiba Corp |
通信装置、通信方法及びプログラム
|
US8392682B2
(en)
|
2008-12-17 |
2013-03-05 |
Unisys Corporation |
Storage security using cryptographic splitting
|
JP2010128824A
(ja)
|
2008-11-27 |
2010-06-10 |
Hitachi Software Eng Co Ltd |
ポリシーグループ識別子を利用したクライアント制御システム
|
CN101753302B
(zh)
|
2008-12-09 |
2012-07-04 |
北大方正集团有限公司 |
一种保证sip通信安全的方法和系统
|
US8230050B1
(en)
|
2008-12-10 |
2012-07-24 |
Amazon Technologies, Inc. |
Providing access to configurable private computer networks
|
US8185931B1
(en)
|
2008-12-19 |
2012-05-22 |
Quantcast Corporation |
Method and system for preserving privacy related to networked media consumption activities
|
US8613040B2
(en)
|
2008-12-22 |
2013-12-17 |
Symantec Corporation |
Adaptive data loss prevention policies
|
US8051187B2
(en)
|
2008-12-22 |
2011-11-01 |
Check Point Software Technologies Ltd. |
Methods for automatic categorization of internal and external communication for preventing data loss
|
US8565118B2
(en)
|
2008-12-30 |
2013-10-22 |
Juniper Networks, Inc. |
Methods and apparatus for distributed dynamic network provisioning
|
US8555089B2
(en)
|
2009-01-08 |
2013-10-08 |
Panasonic Corporation |
Program execution apparatus, control method, control program, and integrated circuit
|
US8699704B2
(en)
|
2010-01-13 |
2014-04-15 |
Entropic Communications, Inc. |
Secure node admission in a communication network
|
US8738932B2
(en)
|
2009-01-16 |
2014-05-27 |
Teleputers, Llc |
System and method for processor-based security
|
US8341427B2
(en)
*
|
2009-02-16 |
2012-12-25 |
Microsoft Corporation |
Trusted cloud computing and services framework
|
US9165154B2
(en)
|
2009-02-16 |
2015-10-20 |
Microsoft Technology Licensing, Llc |
Trusted cloud computing and services framework
|
US8245037B1
(en)
|
2009-02-17 |
2012-08-14 |
Amazon Technologies, Inc. |
Encryption key management
|
CA2752752C
(fr)
|
2009-02-27 |
2015-09-15 |
Certicom Corp. |
Systeme et procede de communication securisee avec des compteurs electroniques
|
US9106617B2
(en)
*
|
2009-03-10 |
2015-08-11 |
At&T Intellectual Property I, L.P. |
Methods, systems and computer program products for authenticating computer processing devices and transferring both encrypted and unencrypted data therebetween
|
US9015789B2
(en)
|
2009-03-17 |
2015-04-21 |
Sophos Limited |
Computer security lock down methods
|
US8572758B1
(en)
*
|
2009-03-30 |
2013-10-29 |
Symantec Corporation |
DLP-enforced loss scanning, sequestering, and content indexing
|
US20100250965A1
(en)
|
2009-03-31 |
2010-09-30 |
Olson Christopher H |
Apparatus and method for implementing instruction support for the advanced encryption standard (aes) algorithm
|
US8654970B2
(en)
|
2009-03-31 |
2014-02-18 |
Oracle America, Inc. |
Apparatus and method for implementing instruction support for the data encryption standard (DES) algorithm
|
US8411867B2
(en)
*
|
2009-04-06 |
2013-04-02 |
Broadcom Corporation |
Scalable and secure key management for cryptographic data processing
|
US20100266132A1
(en)
*
|
2009-04-15 |
2010-10-21 |
Microsoft Corporation |
Service-based key escrow and security for device data
|
US7996564B2
(en)
|
2009-04-16 |
2011-08-09 |
International Business Machines Corporation |
Remote asynchronous data mover
|
US9672189B2
(en)
|
2009-04-20 |
2017-06-06 |
Check Point Software Technologies, Ltd. |
Methods for effective network-security inspection in virtualized environments
|
US8516264B2
(en)
|
2009-10-09 |
2013-08-20 |
Lsi Corporation |
Interlocking plain text passwords to data encryption keys
|
US8251283B1
(en)
|
2009-05-08 |
2012-08-28 |
Oberon Labs, LLC |
Token authentication using spatial characteristics
|
BRPI1013062A2
(pt)
|
2009-05-19 |
2016-04-05 |
Security First Corp |
sistemas e métodos para proteger dados na nuvem
|
US8752180B2
(en)
*
|
2009-05-26 |
2014-06-10 |
Symantec Corporation |
Behavioral engine for identifying patterns of confidential data use
|
US8296434B1
(en)
|
2009-05-28 |
2012-10-23 |
Amazon Technologies, Inc. |
Providing dynamically scaling computing load balancing
|
US8284945B2
(en)
|
2009-06-02 |
2012-10-09 |
Hewlett-Packard Development Company, L.P. |
Automatic change of symmetrical encryption key
|
US20100318782A1
(en)
|
2009-06-12 |
2010-12-16 |
Microsoft Corporation |
Secure and private backup storage and processing for trusted computing and data services
|
US8321956B2
(en)
*
|
2009-06-17 |
2012-11-27 |
Microsoft Corporation |
Remote access control of storage devices
|
US9031876B2
(en)
|
2009-06-19 |
2015-05-12 |
Hewlett-Packard Development Company, L.P. |
Managing keys for encrypted shared documents
|
GB2471282B
(en)
|
2009-06-22 |
2015-02-18 |
Barclays Bank Plc |
Method and system for provision of cryptographic services
|
US20100333116A1
(en)
|
2009-06-30 |
2010-12-30 |
Anand Prahlad |
Cloud gateway system for managing data storage to cloud storage sites
|
JP2011019129A
(ja)
|
2009-07-09 |
2011-01-27 |
Nec Corp |
データ管理システム及びデータ管理方法
|
US8799322B2
(en)
*
|
2009-07-24 |
2014-08-05 |
Cisco Technology, Inc. |
Policy driven cloud storage management and cloud storage policy router
|
US8321560B1
(en)
|
2009-08-13 |
2012-11-27 |
Symantec Corporation |
Systems and methods for preventing data loss from files sent from endpoints
|
JPWO2011024298A1
(ja)
*
|
2009-08-28 |
2013-01-24 |
リプレックス株式会社 |
サービスシステム
|
US8560848B2
(en)
|
2009-09-02 |
2013-10-15 |
Marvell World Trade Ltd. |
Galois/counter mode encryption in a wireless network
|
US8224796B1
(en)
|
2009-09-11 |
2012-07-17 |
Symantec Corporation |
Systems and methods for preventing data loss on external devices
|
US9311465B2
(en)
|
2009-09-21 |
2016-04-12 |
James McNulty |
Secure information storage and retrieval apparatus and method
|
IL201351A0
(en)
|
2009-10-01 |
2010-05-31 |
Michael Feldbau |
Device and method for electronic signature via proxy
|
US9043877B2
(en)
|
2009-10-06 |
2015-05-26 |
International Business Machines Corporation |
Temporarily providing higher privileges for computing system to user identifier
|
US8578504B2
(en)
|
2009-10-07 |
2013-11-05 |
Ca, Inc. |
System and method for data leakage prevention
|
US8458186B2
(en)
|
2009-11-06 |
2013-06-04 |
Symantec Corporation |
Systems and methods for processing and managing object-related data for use by a plurality of applications
|
US9552497B2
(en)
|
2009-11-10 |
2017-01-24 |
Mcafee, Inc. |
System and method for preventing data loss using virtual machine wrapped applications
|
US20110119487A1
(en)
*
|
2009-11-13 |
2011-05-19 |
Velocite Systems, LLC |
System and method for encryption rekeying
|
US8572369B2
(en)
|
2009-12-11 |
2013-10-29 |
Sap Ag |
Security for collaboration services
|
US10348693B2
(en)
|
2009-12-15 |
2019-07-09 |
Microsoft Technology Licensing, Llc |
Trustworthy extensible markup language for trustworthy computing and data services
|
CN102656591B
(zh)
|
2009-12-18 |
2015-12-16 |
皇家飞利浦电子股份有限公司 |
使用基于属性的加密的数字权利管理
|
CN101741547B
(zh)
|
2009-12-18 |
2012-05-23 |
西安西电捷通无线网络通信股份有限公司 |
节点间保密通信方法及系统
|
US8478996B2
(en)
|
2009-12-21 |
2013-07-02 |
International Business Machines Corporation |
Secure Kerberized access of encrypted file system
|
GB201000288D0
(en)
|
2010-01-11 |
2010-02-24 |
Scentrics Information Security |
System and method of enforcing a computer policy
|
US8650129B2
(en)
|
2010-01-20 |
2014-02-11 |
American Express Travel Related Services Company, Inc. |
Dynamically reacting policies and protections for securing mobile financial transaction data in transit
|
JP5375976B2
(ja)
|
2010-01-22 |
2013-12-25 |
富士通株式会社 |
認証方法、認証システムおよび認証プログラム
|
JP5070305B2
(ja)
|
2010-01-29 |
2012-11-14 |
株式会社日本総合研究所 |
取引中継方法および取引中継システム
|
US8527549B2
(en)
*
|
2010-02-22 |
2013-09-03 |
Sookasa Inc. |
Cloud based operating and virtual file system
|
US8468455B2
(en)
|
2010-02-24 |
2013-06-18 |
Novell, Inc. |
System and method for providing virtual desktop extensions on a client desktop
|
JP2011175578A
(ja)
*
|
2010-02-25 |
2011-09-08 |
Hitachi Solutions Ltd |
データバックアップシステム及びデータバックアップ方法
|
CA2692677C
(fr)
|
2010-02-26 |
2017-10-03 |
Xtreme Mobility Inc. |
Systeme securise de facturation et methode applicable a un appareil mobile
|
US20110213971A1
(en)
|
2010-03-01 |
2011-09-01 |
Nokia Corporation |
Method and apparatus for providing rights management at file system level
|
US8930713B2
(en)
*
|
2010-03-10 |
2015-01-06 |
Dell Products L.P. |
System and method for general purpose encryption of data
|
US8621220B2
(en)
|
2010-03-11 |
2013-12-31 |
Ebay Inc. |
Systems and methods for identity encapsulated cryptography
|
US10672286B2
(en)
|
2010-03-14 |
2020-06-02 |
Kryterion, Inc. |
Cloud based test environment
|
US8370648B1
(en)
|
2010-03-15 |
2013-02-05 |
Emc International Company |
Writing and reading encrypted data using time-based encryption keys
|
US8667269B2
(en)
|
2010-04-02 |
2014-03-04 |
Suridx, Inc. |
Efficient, secure, cloud-based identity services
|
US8555059B2
(en)
|
2010-04-16 |
2013-10-08 |
Microsoft Corporation |
Secure local update of content management software
|
EP2378451B1
(fr)
|
2010-04-19 |
2018-07-04 |
Vodafone Holding GmbH |
Authentification d'utilisateur dans un service à base d'étiquettes
|
US8300831B2
(en)
*
|
2010-04-26 |
2012-10-30 |
International Business Machines Corporation |
Redundant key server encryption environment
|
US8473324B2
(en)
|
2010-04-30 |
2013-06-25 |
Bank Of America Corporation |
Assessment of risk associated with international cross border data movement
|
US8856300B2
(en)
|
2010-05-18 |
2014-10-07 |
At&T Intellectual Property I, L.P. |
End-to-end secure cloud computing
|
US8601600B1
(en)
*
|
2010-05-18 |
2013-12-03 |
Google Inc. |
Storing encrypted objects
|
US9160738B2
(en)
|
2010-05-27 |
2015-10-13 |
Microsoft Corporation |
Delegation-based authorization
|
US8447986B2
(en)
*
|
2010-06-23 |
2013-05-21 |
Microsoft Corporation |
Accessing restricted content based on proximity
|
US8443367B1
(en)
|
2010-07-16 |
2013-05-14 |
Vmware, Inc. |
Federated management in a distributed environment
|
EP2599027B1
(fr)
*
|
2010-07-28 |
2017-07-19 |
Nextlabs, Inc. |
Protection des documents grâce à des règles et à un chiffrement
|
US8769269B2
(en)
*
|
2010-08-12 |
2014-07-01 |
International Business Machines Corporation |
Cloud data management
|
US20120079289A1
(en)
|
2010-09-27 |
2012-03-29 |
Skymedi Corporation |
Secure erase system for a solid state non-volatile memory device
|
US8416709B1
(en)
|
2010-09-28 |
2013-04-09 |
Amazon Technologies, Inc. |
Network data transmission analysis management
|
US8555383B1
(en)
|
2010-09-28 |
2013-10-08 |
Amazon Technologies, Inc. |
Network data transmission auditing
|
US8565108B1
(en)
|
2010-09-28 |
2013-10-22 |
Amazon Technologies, Inc. |
Network data transmission analysis
|
JP2012073374A
(ja)
|
2010-09-28 |
2012-04-12 |
Fujikura Ltd |
光ファイバ切断装置
|
US8504837B2
(en)
|
2010-10-15 |
2013-08-06 |
Rockwell Automation Technologies, Inc. |
Security model for industrial devices
|
US9961550B2
(en)
|
2010-11-04 |
2018-05-01 |
Itron Networked Solutions, Inc. |
Physically secured authorization for utility applications
|
US20120114118A1
(en)
|
2010-11-05 |
2012-05-10 |
Samsung Electronics Co., Ltd. |
Key rotation in live adaptive streaming
|
US8832726B2
(en)
|
2010-11-17 |
2014-09-09 |
Verizon Patent And Licensing Inc. |
Video streaming entitlement determined based on the location of the viewer
|
US8401186B2
(en)
|
2010-11-29 |
2013-03-19 |
Beijing Z&W Technology Consulting Co., Ltd. |
Cloud storage data access method, apparatus and system based on OTP
|
JP5437222B2
(ja)
|
2010-12-01 |
2014-03-12 |
本田技研工業株式会社 |
燃料電池スタック
|
US8713362B2
(en)
|
2010-12-01 |
2014-04-29 |
International Business Machines Corporation |
Obviation of recovery of data store consistency for application I/O errors
|
US8565422B2
(en)
|
2010-12-03 |
2013-10-22 |
Salesforce.Com, Inc. |
Method and system for enryption key versioning and key rotation in a multi-tenant environment
|
US9311495B2
(en)
*
|
2010-12-09 |
2016-04-12 |
International Business Machines Corporation |
Method and apparatus for associating data loss protection (DLP) policies with endpoints
|
KR101145766B1
(ko)
|
2010-12-10 |
2012-05-16 |
고려대학교 산학협력단 |
보안 서비스 제공 시스템 및 방법
|
US9094291B1
(en)
*
|
2010-12-14 |
2015-07-28 |
Symantec Corporation |
Partial risk score calculation for a data object
|
US8352749B2
(en)
|
2010-12-17 |
2013-01-08 |
Google Inc. |
Local trusted services manager for a contactless smart card
|
CN102130768B
(zh)
|
2010-12-20 |
2012-11-07 |
西安西电捷通无线网络通信股份有限公司 |
一种具有链路层加解密能力的终端设备及其数据处理方法
|
US9183045B2
(en)
*
|
2010-12-21 |
2015-11-10 |
Mo-Dv, Inc. |
System and method for data collection and exchange with protected memory devices
|
US9306741B1
(en)
|
2010-12-22 |
2016-04-05 |
Emc Corporation |
Updating keys for use in authentication
|
US8538020B1
(en)
*
|
2010-12-29 |
2013-09-17 |
Amazon Technologies, Inc. |
Hybrid client-server cryptography for network applications
|
US8971539B2
(en)
*
|
2010-12-30 |
2015-03-03 |
Verisign, Inc. |
Management of SSL certificate escrow
|
EP2472819B1
(fr)
*
|
2010-12-31 |
2016-03-23 |
Regify S.A. |
Systèmes et procédés pour fournier et utiliser un réseau de communication sécurisé
|
US20120173881A1
(en)
*
|
2011-01-03 |
2012-07-05 |
Patient Always First |
Method & Apparatus for Remote Information Capture, Storage, and Retrieval
|
US8478858B2
(en)
|
2011-02-01 |
2013-07-02 |
Limelight Networks, Inc. |
Policy management for content storage in content delivery networks
|
JP6332970B2
(ja)
|
2011-02-11 |
2018-05-30 |
シーメンス・ヘルスケア・ダイアグノスティックス・インコーポレーテッドSiemens Healthcare Diagnostics Inc. |
安全なソフトウェアの更新のためのシステム及び方法
|
US8588426B2
(en)
|
2011-02-21 |
2013-11-19 |
Blackberry Limited |
Methods and apparatus to secure communications in a mobile network
|
JP5564453B2
(ja)
|
2011-02-25 |
2014-07-30 |
株式会社エヌ・ティ・ティ・データ |
情報処理システム、及び情報処理方法
|
US9130937B1
(en)
|
2011-03-07 |
2015-09-08 |
Raytheon Company |
Validating network communications
|
CA2829197A1
(fr)
|
2011-03-07 |
2012-09-13 |
Security First Corp. |
Systeme et procede de partage de fichiers securises
|
US9119017B2
(en)
|
2011-03-18 |
2015-08-25 |
Zscaler, Inc. |
Cloud based mobile device security and policy enforcement
|
EP2503480A1
(fr)
*
|
2011-03-22 |
2012-09-26 |
Smals Vzw |
Procédé et dispositifs pour l'accès et l'échange de données sécurisées
|
JP5676331B2
(ja)
|
2011-03-24 |
2015-02-25 |
株式会社東芝 |
ルートノード及びプログラム
|
US8379857B1
(en)
|
2011-03-30 |
2013-02-19 |
Google Inc. |
Secure key distribution for private communication in an unsecured communication channel
|
US8965827B2
(en)
|
2011-03-30 |
2015-02-24 |
Computer Sciences Corporation |
Rules execution platform system and method
|
US8843734B2
(en)
|
2011-04-04 |
2014-09-23 |
Nextlabs, Inc. |
Protecting information using policies and encryption
|
US8789210B2
(en)
*
|
2011-05-04 |
2014-07-22 |
International Business Machines Corporation |
Key usage policies for cryptographic keys
|
US8850593B2
(en)
|
2011-05-12 |
2014-09-30 |
Hewlett-Packard Development Company, L.P. |
Data management using a virtual machine-data image
|
US9076020B2
(en)
|
2011-05-13 |
2015-07-07 |
Microsoft Technology Licensing, Llc |
Protected mode for mobile communication and other devices
|
US8544070B2
(en)
|
2011-05-16 |
2013-09-24 |
Novell, Inc. |
Techniques for non repudiation of storage in cloud or shared storage environments
|
US9690941B2
(en)
*
|
2011-05-17 |
2017-06-27 |
Microsoft Technology Licensing, Llc |
Policy bound key creation and re-wrap service
|
US9306737B2
(en)
*
|
2011-05-18 |
2016-04-05 |
Citrix Systems, Inc. |
Systems and methods for secure handling of data
|
US9049023B2
(en)
|
2011-05-24 |
2015-06-02 |
Zeutro Llc |
Outsourcing the decryption of functional encryption ciphertexts
|
US8752127B2
(en)
|
2011-05-26 |
2014-06-10 |
First Data Corporation |
Systems and methods for identifying devices by a trusted service manager
|
KR20120134509A
(ko)
|
2011-06-02 |
2012-12-12 |
삼성전자주식회사 |
어플리케이션 개발 시스템에서 디바이스용 어플리케이션을 생성 및 설치하기 위한 장치 및 방법
|
US20130031155A1
(en)
*
|
2011-06-06 |
2013-01-31 |
Topia Technology, Inc. |
Electronic file sharing
|
US8516244B2
(en)
|
2011-06-10 |
2013-08-20 |
Zeutro Llc |
System, apparatus and method for decentralizing attribute-based encryption information
|
US20120323990A1
(en)
|
2011-06-15 |
2012-12-20 |
Microsoft Corporation |
Efficient state reconciliation
|
US20120323786A1
(en)
|
2011-06-16 |
2012-12-20 |
OneID Inc. |
Method and system for delayed authorization of online transactions
|
US8891772B2
(en)
|
2011-06-17 |
2014-11-18 |
Microsoft Corporation |
Cloud key escrow system
|
US8806204B2
(en)
|
2011-06-20 |
2014-08-12 |
Liaison Technologies, Inc. |
Systems and methods for maintaining data security across multiple active domains
|
US8850516B1
(en)
*
|
2011-06-22 |
2014-09-30 |
Emc Corporation |
Virtual private cloud that provides enterprise grade functionality and compliance
|
US10237060B2
(en)
*
|
2011-06-23 |
2019-03-19 |
Microsoft Technology Licensing, Llc |
Media agnostic, distributed, and defendable data retention
|
US8751807B2
(en)
|
2011-06-23 |
2014-06-10 |
Azuki Systems Inc. |
Method and system for secure over-the-top live video delivery
|
US8862889B2
(en)
*
|
2011-07-02 |
2014-10-14 |
Eastcliff LLC |
Protocol for controlling access to encryption keys
|
US9009315B2
(en)
|
2011-07-28 |
2015-04-14 |
Telefonaktiebolaget L M Ericsson (Publ) |
Hierarchical delegation and reservation of lookup keys
|
US9015469B2
(en)
|
2011-07-28 |
2015-04-21 |
Cloudflare, Inc. |
Supporting secure sessions in a cloud-based proxy service
|
US8788881B2
(en)
|
2011-08-17 |
2014-07-22 |
Lookout, Inc. |
System and method for mobile device push communications
|
US8798273B2
(en)
|
2011-08-19 |
2014-08-05 |
International Business Machines Corporation |
Extending credential type to group Key Management Interoperability Protocol (KMIP) clients
|
US9203613B2
(en)
*
|
2011-09-29 |
2015-12-01 |
Amazon Technologies, Inc. |
Techniques for client constructed sessions
|
US9467424B2
(en)
*
|
2011-10-07 |
2016-10-11 |
Salesforce.Com, Inc. |
Methods and systems for proxying data
|
US8655989B2
(en)
|
2011-10-14 |
2014-02-18 |
Sap Ag |
Business network access protocol for the business network
|
US20130103834A1
(en)
|
2011-10-21 |
2013-04-25 |
Blue Coat Systems, Inc. |
Multi-Tenant NATting for Segregating Traffic Through a Cloud Service
|
US8788843B2
(en)
|
2011-10-28 |
2014-07-22 |
LogMeln, Inc. |
Storing user data in a service provider cloud without exposing user-specific secrets to the service provider
|
US8950005B1
(en)
|
2011-11-04 |
2015-02-03 |
Symantec Corporation |
Method and system for protecting content of sensitive web applications
|
US8639928B2
(en)
*
|
2011-12-05 |
2014-01-28 |
Certicom Corp. |
System and method for mounting encrypted data based on availability of a key on a network
|
WO2013084054A1
(fr)
|
2011-12-08 |
2013-06-13 |
Dark Matter Labs Inc. |
Création et rotation de clé pour le chiffrement de données
|
KR101888382B1
(ko)
*
|
2011-12-16 |
2018-09-21 |
삼성전자 주식회사 |
복수 키 활용 지원 저장 장치
|
US8639951B2
(en)
|
2011-12-19 |
2014-01-28 |
International Business Machines Corporation |
States for breakout appliance in a mobile data network
|
US8954758B2
(en)
|
2011-12-20 |
2015-02-10 |
Nicolas LEOUTSARAKOS |
Password-less security and protection of online digital assets
|
US8873754B2
(en)
|
2011-12-20 |
2014-10-28 |
Huawei Technologies Co., Ltd. |
Proxy-based encryption method, proxy-based decryption method, network equipment, network device and system
|
US9515999B2
(en)
|
2011-12-21 |
2016-12-06 |
Ssh Communications Security Oyj |
Automated access, key, certificate, and credential management
|
EP2798784B1
(fr)
|
2011-12-27 |
2019-10-23 |
Cisco Technology, Inc. |
Système et procédé de gestion de services sur réseau
|
US9449183B2
(en)
*
|
2012-01-28 |
2016-09-20 |
Jianqing Wu |
Secure file drawer and safe
|
US9038083B2
(en)
|
2012-02-09 |
2015-05-19 |
Citrix Systems, Inc. |
Virtual machine provisioning based on tagged physical resources in a cloud computing environment
|
US9268947B1
(en)
|
2012-03-15 |
2016-02-23 |
Dataguise Inc. |
Method and system for managing information associated with sensitive information in an enterprise
|
JP6098636B2
(ja)
|
2012-03-28 |
2017-03-22 |
ソニー株式会社 |
情報処理装置、情報処理システム、情報処理方法及びプログラム
|
US9262496B2
(en)
|
2012-03-30 |
2016-02-16 |
Commvault Systems, Inc. |
Unified access to personal data
|
US8695101B2
(en)
|
2012-04-09 |
2014-04-08 |
International Business Machines Corporation |
Data privacy engine
|
US9160722B2
(en)
|
2012-04-30 |
2015-10-13 |
Anchorfree, Inc. |
System and method for securing user information on social networks
|
US9548962B2
(en)
|
2012-05-11 |
2017-01-17 |
Alcatel Lucent |
Apparatus and method for providing a fluid security layer
|
US9117084B2
(en)
*
|
2012-05-15 |
2015-08-25 |
Ixia |
Methods, systems, and computer readable media for measuring detection accuracy of a security device using benign traffic
|
US8964990B1
(en)
|
2012-05-17 |
2015-02-24 |
Amazon Technologies, Inc. |
Automating key rotation in a distributed system
|
US9237446B2
(en)
|
2012-05-24 |
2016-01-12 |
Blackberry Limited |
System and method for controlling access to media content
|
US9590959B2
(en)
|
2013-02-12 |
2017-03-07 |
Amazon Technologies, Inc. |
Data security service
|
US9112704B2
(en)
|
2012-06-22 |
2015-08-18 |
Ologn Technologies Ag |
Systems, methods and apparatuses for securing root certificates
|
US9563891B2
(en)
|
2012-07-09 |
2017-02-07 |
Google Inc. |
Systems, methods, and computer program products for integrating third party services with a mobile wallet
|
US8713633B2
(en)
|
2012-07-13 |
2014-04-29 |
Sophos Limited |
Security access protection for user data stored in a cloud computing facility
|
US9400890B2
(en)
|
2012-08-10 |
2016-07-26 |
Qualcomm Incorporated |
Method and devices for selective RAM scrambling
|
US20140115327A1
(en)
|
2012-10-22 |
2014-04-24 |
Microsoft Corporation |
Trust services data encryption for multiple parties
|
WO2014070134A2
(fr)
|
2012-10-29 |
2014-05-08 |
Empire Technology Development Llc |
Sécurité de machine virtuelle basée sur quorum
|
US9137222B2
(en)
*
|
2012-10-31 |
2015-09-15 |
Vmware, Inc. |
Crypto proxy for cloud storage services
|
US8713311B1
(en)
|
2012-11-07 |
2014-04-29 |
Google Inc. |
Encryption using alternate authentication key
|
CN104838354A
(zh)
|
2012-11-30 |
2015-08-12 |
惠普发展公司,有限责任合伙企业 |
运行代理以在云系统中执行自动化任务
|
US8997197B2
(en)
|
2012-12-12 |
2015-03-31 |
Citrix Systems, Inc. |
Encryption-based data access management
|
US9705674B2
(en)
|
2013-02-12 |
2017-07-11 |
Amazon Technologies, Inc. |
Federated key management
|
US9367697B1
(en)
|
2013-02-12 |
2016-06-14 |
Amazon Technologies, Inc. |
Data security with a security module
|
US9288184B1
(en)
|
2013-05-16 |
2016-03-15 |
Wizards Of The Coast Llc |
Distributed customer data management network handling personally identifiable information
|
US9246944B1
(en)
*
|
2013-05-28 |
2016-01-26 |
Symantec Corporation |
Systems and methods for enforcing data loss prevention policies on mobile devices
|