SG11201807964UA - System and methods for decrypting network traffic in a virtualized environment - Google Patents
System and methods for decrypting network traffic in a virtualized environmentInfo
- Publication number
- SG11201807964UA SG11201807964UA SG11201807964UA SG11201807964UA SG11201807964UA SG 11201807964U A SG11201807964U A SG 11201807964UA SG 11201807964U A SG11201807964U A SG 11201807964UA SG 11201807964U A SG11201807964U A SG 11201807964UA SG 11201807964U A SG11201807964U A SG 11201807964UA
- Authority
- SG
- Singapore
- Prior art keywords
- international
- pct
- virtual machine
- memory pages
- methods
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/02—Addressing or allocation; Relocation
- G06F12/08—Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
- G06F12/10—Address translation
- G06F12/1009—Address translation using page tables, e.g. page table structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45504—Abstract machines for programme code execution, e.g. Java virtual machine [JVM], interpreters, emulators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/166—Implementing security features at a particular protocol layer at the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3249—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2212/00—Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
- G06F2212/15—Use in a specific computing environment
- G06F2212/154—Networked environment
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
INTERNATIONAL APPLICATION PUBLISHED UNDER THE PATENT COOPERATION TREATY (PCT) (19) World Intellectual Property -, Organization 11111111011110111010101111101011111011101011101110111110111101111101111011111 International Bureau 0.. .... .. ..... ..... (10) International Publication Number (43) International Publication Date WO 2017/174418 Al 12 October 2017(12.10.2017) WIPO I PCT (51) International Patent Classification: AO, AT, AU, AZ, BA, BB, BG, BH, BN, BR, BW, BY, GOOF 21/56 (2013.01) BZ, CA, CH, CL, CN, CO, CR, CU, CZ, DE, DJ, DK, DM, DO, DZ, EC, EE, EG, ES, FL GB, GD, GE, GH, GM, GT, (21) International Application Number: HN, HR, HU, ID, IL, IN, IR, IS, JP, KE, KG, KH, KN, PCT/EP2017/057422 KP, KR, KW, KZ, LA, LC, LK, LR, LS, LU, LY, MA, (22) International Filing Date: MD, ME, MG, MK, MN, MW, MX, MY, MZ, NA, NG, 29 March 2017 (29.03.2017) NI, NO, NZ, OM, PA, PE, PG, PH, PL, PT, QA, RO, RS, RU, RW, SA, SC, SD, SE, SG, SK, SL, SM, ST, SV, SY, (25) Filing Language: English TH, TJ, TM, TN, TR, TT, TZ, UA, UG, US, UZ, VC, VN, (26) Publication Language: English ZA, ZM, ZW. (30) Priority Data: (84) Designated States (unless otherwise indicated, for every 62/317,804 4 April 2016 (04.04.2016) US kind of regional protection available): ARIPO (BW, GH, 15/471,981 28 March 2017 (28.03.2017) US GM, KE, LR, LS, MW, MZ, NA, RW, SD, SL, ST, SZ, TZ, UG, ZM, ZW), Eurasian (AM, AZ, BY, KG, KZ, RU, (71) Applicant: BITDEFENDER IPR MANAGEMENT TJ, TM), European (AL, AT, BE, BG, CH, CY, CZ, DE, LTD [CY/CY]; Kreontos 12, 1076 Nicosia (CY). DK, EE, ES, FI, FR, GB, GR, HR, HU, IE, IS, IT, LT, LU, LV, MC, MK, MT, NL, NO, PL, PT, RO, RS, SE, SI, SK, (72) Inventor: CARAGEA, Radu; Ale. Emil Botta nr. 3 bl. M105 sc.1 et.6 ap. 25, Sector 3, 031073 Bucuresti (RO). SM, TR), OAPI (BF, BJ, CF, CG, CL CM, GA, GN, GQ, GW, KM, ML, MR, NE, SN, TD, TG). (74) Agent: TULUCA, Doina; Bd. Lacul Tei 56, bl. 19, sc. B, Published: ap. 52, sector 2, 020392 Bucuresti (RO). — with international search report (Art. 21(3)) (81) Designated States (unless otherwise indicated, for every kind of national protection available): AE, AG, AL, AM, _ (54) Title: SYSTEM AND METHODS FOR DECRYPTING NETWORK TRAFFIC IN A VIRTUALIZED ENVIRONMENT 32 Guest virtual machine 36a 36b 44 pp App. 1 -- 1 I h , 01. I 34 agent Guest OS L — — J 30 Hypervisor Introspection engine Network filter 42 11 12 (lent system hardware GC 40 1-1 FIG. 3 71' 71' IN 1-1 ----. (57) : Described systems and methods enable a decryption of encrypted communication between a client system and a re - IN mote party, for applications such as detection and analysis of malicious software, intrusion detection, and surveillance, among oth - C ers. The client system executes a virtual machine and an introspection engine outside the virtual machine. The introspection engine ei is configured to identify memory pages whose contents have changed between a first session event (e.g., a ServerHello message) and O a second session event (e.g., a ClientFinished message). The respective memory pages are likely to contain encryption key material for the respective communication session. A decryption engine may then attempt to decrypt an encrypted payload of the respective communication session using information derived from the content of the identified memory pages.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201662317804P | 2016-04-04 | 2016-04-04 | |
US15/471,981 US10116630B2 (en) | 2016-04-04 | 2017-03-28 | Systems and methods for decrypting network traffic in a virtualized environment |
PCT/EP2017/057422 WO2017174418A1 (en) | 2016-04-04 | 2017-03-29 | System and methods for decrypting network traffic in a virtualized environment |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11201807964UA true SG11201807964UA (en) | 2018-10-30 |
Family
ID=59962053
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11201807964UA SG11201807964UA (en) | 2016-04-04 | 2017-03-29 | System and methods for decrypting network traffic in a virtualized environment |
Country Status (13)
Country | Link |
---|---|
US (2) | US10116630B2 (en) |
EP (1) | EP3440584B1 (en) |
JP (1) | JP6857193B2 (en) |
KR (1) | KR102041584B1 (en) |
CN (1) | CN108885665B (en) |
AU (1) | AU2017247547B2 (en) |
CA (1) | CA3018021C (en) |
ES (1) | ES2827007T3 (en) |
HK (1) | HK1257399A1 (en) |
IL (1) | IL261826B (en) |
RU (1) | RU2738021C2 (en) |
SG (1) | SG11201807964UA (en) |
WO (1) | WO2017174418A1 (en) |
Families Citing this family (42)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10805331B2 (en) | 2010-09-24 | 2020-10-13 | BitSight Technologies, Inc. | Information technology security assessment system |
US9438615B2 (en) | 2013-09-09 | 2016-09-06 | BitSight Technologies, Inc. | Security risk management |
US10979328B2 (en) * | 2017-03-31 | 2021-04-13 | Intel Corporation | Resource monitoring |
US10462182B2 (en) * | 2017-05-12 | 2019-10-29 | Vmware, Inc. | Thin agent-based SSL offloading |
US10903985B2 (en) * | 2017-08-25 | 2021-01-26 | Keysight Technologies Singapore (Sales) Pte. Ltd. | Monitoring encrypted network traffic flows in a virtual environment using dynamic session key acquisition techniques |
US10565376B1 (en) * | 2017-09-11 | 2020-02-18 | Palo Alto Networks, Inc. | Efficient program deobfuscation through system API instrumentation |
US10733290B2 (en) * | 2017-10-26 | 2020-08-04 | Western Digital Technologies, Inc. | Device-based anti-malware |
US10257219B1 (en) | 2018-03-12 | 2019-04-09 | BitSight Technologies, Inc. | Correlated risk in cybersecurity |
US11055411B2 (en) * | 2018-05-10 | 2021-07-06 | Acronis International Gmbh | System and method for protection against ransomware attacks |
US10893030B2 (en) | 2018-08-10 | 2021-01-12 | Keysight Technologies, Inc. | Methods, systems, and computer readable media for implementing bandwidth limitations on specific application traffic at a proxy element |
US11310246B2 (en) * | 2018-08-10 | 2022-04-19 | Cisco Technology, Inc. | Endpoint-assisted inspection of encrypted network traffic |
US11374971B2 (en) * | 2018-08-24 | 2022-06-28 | Micro Focus Llc | Deception server deployment |
EP3623982B1 (en) | 2018-09-12 | 2021-05-19 | British Telecommunications public limited company | Ransomware remediation |
EP3850514B1 (en) | 2018-09-12 | 2023-09-20 | British Telecommunications public limited company | Encryption key seed determination |
EP3623980B1 (en) * | 2018-09-12 | 2021-04-28 | British Telecommunications public limited company | Ransomware encryption algorithm determination |
EP3853719A1 (en) * | 2018-09-17 | 2021-07-28 | Telefonaktiebolaget Lm Ericsson (Publ) | Bit register in shared memory indicating the processor and the software handlers |
US10949547B2 (en) * | 2018-10-05 | 2021-03-16 | Google Llc | Enclave fork support |
US11200323B2 (en) | 2018-10-17 | 2021-12-14 | BitSight Technologies, Inc. | Systems and methods for forecasting cybersecurity ratings based on event-rate scenarios |
US10521583B1 (en) * | 2018-10-25 | 2019-12-31 | BitSight Technologies, Inc. | Systems and methods for remote detection of software through browser webinjects |
US11403409B2 (en) | 2019-03-08 | 2022-08-02 | International Business Machines Corporation | Program interruptions for page importing/exporting |
US11206128B2 (en) | 2019-03-08 | 2021-12-21 | International Business Machines Corporation | Secure paging with page change detection |
US11347869B2 (en) * | 2019-03-08 | 2022-05-31 | International Business Machines Corporation | Secure interface control high-level page management |
US11222123B2 (en) | 2019-04-22 | 2022-01-11 | Cyberark Software Ltd. | Securing privileged virtualized execution instances from penetrating a virtual host environment |
US10735430B1 (en) * | 2019-04-22 | 2020-08-04 | Cyberark Software Ltd. | Systems and methods for dynamically enrolling virtualized execution instances and managing secure communications between virtualized execution instances and clients |
US12058113B2 (en) | 2019-06-19 | 2024-08-06 | Amazon Technologies, Inc. | Hybrid key exchanges for double-hulled encryption |
US10726136B1 (en) | 2019-07-17 | 2020-07-28 | BitSight Technologies, Inc. | Systems and methods for generating security improvement plans for entities |
US11956265B2 (en) | 2019-08-23 | 2024-04-09 | BitSight Technologies, Inc. | Systems and methods for inferring entity relationships via network communications of users or user devices |
US11032244B2 (en) | 2019-09-30 | 2021-06-08 | BitSight Technologies, Inc. | Systems and methods for determining asset importance in security risk management |
US11113665B1 (en) | 2020-03-12 | 2021-09-07 | Evan Chase Rose | Distributed terminals network management, systems, interfaces and workflows |
US10873578B1 (en) | 2019-12-09 | 2020-12-22 | Evan Chase Rose | Biometric authentication, decentralized learning framework, and adaptive security protocols in distributed terminal network |
US10902705B1 (en) | 2019-12-09 | 2021-01-26 | Evan Chase Rose | Biometric authentication, decentralized learning framework, and adaptive security protocols in distributed terminal network |
US11200548B2 (en) | 2019-12-09 | 2021-12-14 | Evan Chase Rose | Graphical user interface and operator console management system for distributed terminal network |
US10893067B1 (en) | 2020-01-31 | 2021-01-12 | BitSight Technologies, Inc. | Systems and methods for rapidly generating security ratings |
KR20210117682A (en) * | 2020-03-20 | 2021-09-29 | 라인 가부시키가이샤 | Method and system for detecting malware using memory map |
US11023585B1 (en) | 2020-05-27 | 2021-06-01 | BitSight Technologies, Inc. | Systems and methods for managing cybersecurity alerts |
US11611540B2 (en) * | 2020-07-01 | 2023-03-21 | Vmware, Inc. | Protection of authentication data of a server cluster |
US11442770B2 (en) * | 2020-10-13 | 2022-09-13 | BedRock Systems, Inc. | Formally verified trusted computing base with active security and policy enforcement |
US11734042B2 (en) | 2020-12-10 | 2023-08-22 | Red Hat, Inc. | Providing supplemental information to a guest operating system by a hypervisor |
US11659005B2 (en) * | 2020-12-16 | 2023-05-23 | Dell Products, L.P. | Systems and methods for self-protecting and self-refreshing workspaces |
CN112583591A (en) * | 2020-12-23 | 2021-03-30 | 维沃移动通信有限公司 | Application program control method and device |
JP7340585B2 (en) * | 2021-12-14 | 2023-09-07 | 株式会社日立製作所 | Vulnerability management system and vulnerability management method |
CN114760153A (en) * | 2022-06-14 | 2022-07-15 | 北京升鑫网络科技有限公司 | Real-time decryption method and device for encrypted traffic and electronic equipment |
Family Cites Families (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7685635B2 (en) * | 2005-03-11 | 2010-03-23 | Microsoft Corporation | Systems and methods for multi-level intercept processing in a virtual machine environment |
US8001543B2 (en) * | 2005-10-08 | 2011-08-16 | International Business Machines Corporation | Direct-memory access between input/output device and physical memory within virtual machine environment |
FR2899749B1 (en) * | 2006-04-07 | 2008-07-04 | Groupe Ecoles Telecomm | IDENTITY PROTECTION METHOD, DEVICES, AND CORRESPONDING COMPUTER PROGRAM PRODUCT |
US8001381B2 (en) * | 2008-02-26 | 2011-08-16 | Motorola Solutions, Inc. | Method and system for mutual authentication of nodes in a wireless communication network |
US8090797B2 (en) * | 2009-05-02 | 2012-01-03 | Citrix Systems, Inc. | Methods and systems for launching applications into existing isolation environments |
US8327059B2 (en) * | 2009-09-30 | 2012-12-04 | Vmware, Inc. | System and method to enhance memory protection for programs in a virtual machine environment |
JP5717164B2 (en) * | 2009-10-07 | 2015-05-13 | 日本電気株式会社 | Computer system and computer system maintenance method |
US8661436B2 (en) * | 2009-12-14 | 2014-02-25 | Citrix Systems, Inc. | Dynamically controlling virtual machine access to optical disc drive by selective locking to a transacting virtual machine determined from a transaction stream of the drive |
EP2577448A4 (en) * | 2010-05-30 | 2014-07-09 | Hewlett Packard Development Co | Virtual machine code injection |
US8489889B1 (en) * | 2010-09-17 | 2013-07-16 | Symantec Corporation | Method and apparatus for restricting access to encrypted data |
US9053053B2 (en) * | 2010-11-29 | 2015-06-09 | International Business Machines Corporation | Efficiently determining identical pieces of memory used by virtual machines |
IL209960A0 (en) * | 2010-12-13 | 2011-02-28 | Comitari Technologies Ltd | Web element spoofing prevention system and method |
WO2012092261A2 (en) * | 2010-12-29 | 2012-07-05 | Citrix Systems, Inc. | Systems and methods for multi-level tagging of encrypted items for additional security and efficient encrypted item determination |
US8984478B2 (en) * | 2011-10-03 | 2015-03-17 | Cisco Technology, Inc. | Reorganization of virtualized computer programs |
US8656482B1 (en) * | 2012-08-20 | 2014-02-18 | Bitdefender IPR Management Ltd. | Secure communication using a trusted virtual machine |
US9176838B2 (en) * | 2012-10-19 | 2015-11-03 | Intel Corporation | Encrypted data inspection in a network environment |
US9571507B2 (en) * | 2012-10-21 | 2017-02-14 | Mcafee, Inc. | Providing a virtual security appliance architecture to a virtual cloud infrastructure |
US9438488B2 (en) * | 2012-11-09 | 2016-09-06 | Citrix Systems, Inc. | Systems and methods for appflow for datastream |
US8910238B2 (en) | 2012-11-13 | 2014-12-09 | Bitdefender IPR Management Ltd. | Hypervisor-based enterprise endpoint protection |
US9396011B2 (en) * | 2013-03-12 | 2016-07-19 | Qualcomm Incorporated | Algorithm and apparatus to deploy virtual machine monitor on demand |
US9407519B2 (en) | 2013-03-15 | 2016-08-02 | Vmware, Inc. | Virtual network flow monitoring |
US9117080B2 (en) * | 2013-07-05 | 2015-08-25 | Bitdefender IPR Management Ltd. | Process evaluation for malware detection in virtual machines |
US9507727B2 (en) * | 2013-07-17 | 2016-11-29 | Bitdefender IPR Management Ltd. | Page fault injection in virtual machines |
US9602498B2 (en) | 2013-10-17 | 2017-03-21 | Fortinet, Inc. | Inline inspection of security protocols |
US9319380B2 (en) * | 2014-03-20 | 2016-04-19 | Bitdefender IPR Management Ltd. | Below-OS security solution for distributed network endpoints |
US20150288659A1 (en) * | 2014-04-03 | 2015-10-08 | Bitdefender IPR Management Ltd. | Systems and Methods for Mutual Integrity Attestation Between A Network Endpoint And A Network Appliance |
CN104461678B (en) * | 2014-11-03 | 2017-11-24 | 中国科学院信息工程研究所 | A kind of method and system that cryptographic service is provided in virtualized environment |
-
2017
- 2017-03-28 US US15/471,981 patent/US10116630B2/en active Active
- 2017-03-29 KR KR1020187029897A patent/KR102041584B1/en active IP Right Grant
- 2017-03-29 JP JP2018552231A patent/JP6857193B2/en active Active
- 2017-03-29 CA CA3018021A patent/CA3018021C/en active Active
- 2017-03-29 AU AU2017247547A patent/AU2017247547B2/en active Active
- 2017-03-29 CN CN201780022020.0A patent/CN108885665B/en active Active
- 2017-03-29 SG SG11201807964UA patent/SG11201807964UA/en unknown
- 2017-03-29 EP EP17715652.8A patent/EP3440584B1/en active Active
- 2017-03-29 WO PCT/EP2017/057422 patent/WO2017174418A1/en active Application Filing
- 2017-03-29 RU RU2018132840A patent/RU2738021C2/en active
- 2017-03-29 ES ES17715652T patent/ES2827007T3/en active Active
-
2018
- 2018-09-17 IL IL261826A patent/IL261826B/en active IP Right Grant
- 2018-10-29 US US16/173,490 patent/US10257170B2/en active Active
- 2018-12-26 HK HK18116607.1A patent/HK1257399A1/en unknown
Also Published As
Publication number | Publication date |
---|---|
US10257170B2 (en) | 2019-04-09 |
EP3440584A1 (en) | 2019-02-13 |
JP2019516294A (en) | 2019-06-13 |
IL261826B (en) | 2021-02-28 |
CA3018021A1 (en) | 2017-10-12 |
US10116630B2 (en) | 2018-10-30 |
CN108885665A (en) | 2018-11-23 |
KR20180129830A (en) | 2018-12-05 |
KR102041584B1 (en) | 2019-11-06 |
CA3018021C (en) | 2021-12-28 |
IL261826A (en) | 2018-10-31 |
AU2017247547A1 (en) | 2018-10-11 |
JP6857193B2 (en) | 2021-04-14 |
CN108885665B (en) | 2022-04-08 |
ES2827007T3 (en) | 2021-05-19 |
HK1257399A1 (en) | 2019-10-18 |
RU2018132840A3 (en) | 2020-06-17 |
EP3440584B1 (en) | 2020-07-29 |
US20170289109A1 (en) | 2017-10-05 |
RU2018132840A (en) | 2020-05-12 |
WO2017174418A1 (en) | 2017-10-12 |
RU2738021C2 (en) | 2020-12-07 |
AU2017247547B2 (en) | 2021-07-08 |
US20190068561A1 (en) | 2019-02-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG11201807964UA (en) | System and methods for decrypting network traffic in a virtualized environment | |
SG11202000097TA (en) | Secure storage device | |
SG11201905456UA (en) | Addressing a trusted execution environment using encryption key | |
SG11201809963XA (en) | Application framework using blockchain-based asset ownership | |
SG11201804022SA (en) | Systems and methods for digital identity management and permission controls within distributed network nodes | |
SG11201809866PA (en) | Cryptographic applications for a blockchain system | |
SG11201804506RA (en) | Systems and methods for rendering multiple levels of detail | |
SG11201811213XA (en) | Updating virtual memory addresses of target application functionalities for an updated version of application binary code | |
SG11201905463TA (en) | Abstract enclave identity | |
SG11201804697PA (en) | Method and system for distributed cryptographic key provisioning and storage via elliptic curve cryptography | |
SG11201806650VA (en) | Systems and methods for providing a personal distributed ledger | |
SG11201807307VA (en) | System and method for aerial system discrimination and action | |
SG11201811240XA (en) | Systems and methods for route planning | |
SG11201905461VA (en) | Data sealing with a sealing enclave | |
SG11201807025SA (en) | Crispr/cas systems for c-1 fixing bacteria | |
SG11201906151QA (en) | System for free-space optical communication and lidar | |
SG11201805919PA (en) | Virtual network, hot swapping, hot scaling, and disaster recovery for containers | |
SG11201803785RA (en) | Distributed systems for secure storage and retrieval of encrypted biological specimen data | |
SG11201906575QA (en) | Continuous learning for intrusion detection | |
SG11201805795WA (en) | Systems and methods for securing and disseminating time sensitive information using a blockchain | |
SG11201908666VA (en) | Secure order matching by distributing data and processing across multiple segregated computation nodes | |
SG11201808708RA (en) | Heterocyclic amides useful as protein modulators | |
SG11201900969SA (en) | Access stratum security for efficient packet processing | |
SG11201907820SA (en) | Inhibitors of (alpha-v)(beta-6) integrin | |
SG11201808929PA (en) | Systems and methods for secure storage of user information in a user profile |