WO2006015182A3 - Object access level - Google Patents
Object access level Download PDFInfo
- Publication number
- WO2006015182A3 WO2006015182A3 PCT/US2005/026907 US2005026907W WO2006015182A3 WO 2006015182 A3 WO2006015182 A3 WO 2006015182A3 US 2005026907 W US2005026907 W US 2005026907W WO 2006015182 A3 WO2006015182 A3 WO 2006015182A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- sensitivity level
- token key
- encrypt
- key
- authentication information
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Abstract
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US59194404P | 2004-07-29 | 2004-07-29 | |
US60/591,944 | 2004-07-29 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2006015182A2 WO2006015182A2 (en) | 2006-02-09 |
WO2006015182A3 true WO2006015182A3 (en) | 2007-03-01 |
Family
ID=35787850
Family Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2005/026908 WO2006020426A2 (en) | 2004-07-29 | 2005-07-29 | Cryptographic key construct |
PCT/US2005/026802 WO2007001328A2 (en) | 2004-07-29 | 2005-07-29 | Information-centric security |
PCT/US2005/026907 WO2006015182A2 (en) | 2004-07-29 | 2005-07-29 | Object access level |
PCT/US2005/026804 WO2007001329A2 (en) | 2004-07-29 | 2005-07-29 | Cryptographic key management |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2005/026908 WO2006020426A2 (en) | 2004-07-29 | 2005-07-29 | Cryptographic key construct |
PCT/US2005/026802 WO2007001328A2 (en) | 2004-07-29 | 2005-07-29 | Information-centric security |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2005/026804 WO2007001329A2 (en) | 2004-07-29 | 2005-07-29 | Cryptographic key management |
Country Status (2)
Country | Link |
---|---|
US (4) | US7739501B2 (en) |
WO (4) | WO2006020426A2 (en) |
Families Citing this family (174)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8234387B2 (en) * | 2003-06-05 | 2012-07-31 | Intertrust Technologies Corp. | Interoperable systems and methods for peer-to-peer service orchestration |
US8031865B2 (en) * | 2004-01-08 | 2011-10-04 | Encryption Solutions, Inc. | Multiple level security system and method for encrypting data within documents |
US20050289127A1 (en) * | 2004-06-25 | 2005-12-29 | Dominic Giampaolo | Methods and systems for managing data |
US9081872B2 (en) | 2004-06-25 | 2015-07-14 | Apple Inc. | Methods and systems for managing permissions data and/or indexes |
US8131674B2 (en) | 2004-06-25 | 2012-03-06 | Apple Inc. | Methods and systems for managing data |
WO2006020426A2 (en) * | 2004-07-29 | 2006-02-23 | Infoassure, Inc. | Cryptographic key construct |
EP1848143A4 (en) * | 2005-02-10 | 2010-04-14 | Nec Corp | Member certificate acquiring device, member certificate issuing device, group signing device, and group signature verifying device |
EP1742475A1 (en) * | 2005-07-07 | 2007-01-10 | Nagravision S.A. | Method to control access to enciphered data |
WO2007031955A2 (en) * | 2005-09-16 | 2007-03-22 | Koninklijke Philips Electronics, N.V. | Cryptographic role-based access control |
US8776216B2 (en) * | 2005-10-18 | 2014-07-08 | Intertrust Technologies Corporation | Digital rights management engine systems and methods |
US20070204078A1 (en) * | 2006-02-09 | 2007-08-30 | Intertrust Technologies Corporation | Digital rights management engine systems and methods |
US9626667B2 (en) * | 2005-10-18 | 2017-04-18 | Intertrust Technologies Corporation | Digital rights management engine systems and methods |
US7788484B2 (en) * | 2005-11-30 | 2010-08-31 | Microsoft Corporation | Using hierarchical identity based cryptography for authenticating outbound mail |
US7647630B2 (en) * | 2005-12-15 | 2010-01-12 | International Business Machines Corporation | Associating security information with information objects in a data processing system |
US20070143601A1 (en) | 2005-12-15 | 2007-06-21 | Arroyo Diana J | System and method for authorizing information flows |
US8711888B2 (en) | 2005-12-30 | 2014-04-29 | Remec Broadband Wireless Llc | Digital microwave radio link with adaptive data rate |
US8731007B2 (en) | 2005-12-30 | 2014-05-20 | Remec Broadband Wireless, Llc | Digital microwave radio link with a variety of ports |
US9059866B2 (en) | 2005-12-30 | 2015-06-16 | Remec Broadband Wireless Holdings, Inc. | Digital microwave radio system and method with encryption |
US7499552B2 (en) * | 2006-01-11 | 2009-03-03 | International Business Machines Corporation | Cipher method and system for verifying a decryption of an encrypted user data key |
US20070180259A1 (en) * | 2006-01-20 | 2007-08-02 | Bulot Earl J | Secure Personal Medical Process |
US20100235924A1 (en) * | 2006-01-20 | 2010-09-16 | Bulot Earl J | Secure Personal Medical Process |
US9137012B2 (en) | 2006-02-03 | 2015-09-15 | Emc Corporation | Wireless authentication methods and apparatus |
FR2898002B1 (en) * | 2006-02-28 | 2008-06-27 | Thales Sa | METHOD FOR MANAGING AND CONTROLLING ACCESS KEYS TO SERVICES IN A COMMUNICATION SYSTEM |
CA2546148A1 (en) * | 2006-05-09 | 2007-11-09 | Nikolajs Volkovs | Method, system and computer program for polynomial based hashing and message authentication coding with separate generation of spectrums |
US8090944B2 (en) * | 2006-07-05 | 2012-01-03 | Rockstar Bidco Lp | Method and apparatus for authenticating users of an emergency communication network |
US20080028214A1 (en) * | 2006-07-28 | 2008-01-31 | Ronald Tafoya | Secure flash media for medical records |
US7941640B1 (en) * | 2006-08-25 | 2011-05-10 | Marvell International Ltd. | Secure processors having encoded instructions |
US8887296B2 (en) * | 2006-12-12 | 2014-11-11 | The Boeing Company | Method and system for object-based multi-level security in a service oriented architecture |
US9064135B1 (en) * | 2006-12-12 | 2015-06-23 | Marvell International Ltd. | Hardware implemented key management system and method |
US8015224B1 (en) * | 2006-12-27 | 2011-09-06 | Marvell International Ltd. | Entropy source for random number generation |
WO2008109150A1 (en) * | 2007-03-06 | 2008-09-12 | Secude International | System and method for providing secure authentication of devices awakened from powered sleep state |
US8391479B2 (en) * | 2007-03-07 | 2013-03-05 | Research In Motion Limited | Combining interleaving with fixed-sequence windowing in an elliptic curve scalar multiplication |
US8683549B2 (en) * | 2007-03-23 | 2014-03-25 | Microsoft Corporation | Secure data storage and retrieval incorporating human participation |
US8443191B2 (en) | 2007-04-09 | 2013-05-14 | Objective Interface Systems, Inc. | System and method for accessing information resources using cryptographic authorization permits |
US7773753B2 (en) * | 2007-06-28 | 2010-08-10 | Aladdin Knowledge Systems Ltd. | Efficient remotely-keyed symmetric cryptography for digital rights management |
US8646045B1 (en) * | 2007-07-26 | 2014-02-04 | United Services Automobile Association (Usaa) | Bank speech authentication |
WO2009018483A1 (en) * | 2007-07-31 | 2009-02-05 | Viasat, Inc. | Input output access controller |
WO2009035674A1 (en) * | 2007-09-14 | 2009-03-19 | Security First Corporation | Systems and methods for managing cryptographic keys |
US20090077371A1 (en) * | 2007-09-14 | 2009-03-19 | Valicore Technologies, Inc. | Systems and methods for a template-based encryption management system |
US8160247B2 (en) * | 2007-09-27 | 2012-04-17 | Adobe Systems Incorporated | Providing local storage service to applications that run in an application execution environment |
FR2925732B1 (en) * | 2007-12-21 | 2010-02-12 | Sagem Securite | GENERATION AND USE OF A BIOMETRIC KEY |
EP2243238A4 (en) * | 2007-12-27 | 2011-03-16 | Safend Ltd | System and method for contextual and behavioral based data access control |
US8117447B2 (en) * | 2008-01-10 | 2012-02-14 | Industrial Technology Research Institute | Authentication method employing elliptic curve cryptography |
CA2621147C (en) * | 2008-02-15 | 2013-10-08 | Connotech Experts-Conseils Inc. | Method of bootstrapping an authenticated data session configuration |
US8380981B2 (en) | 2008-05-16 | 2013-02-19 | Objective Interface Systems, Inc. | System and method that uses cryptographic certificates to define groups of entities |
WO2009139750A1 (en) * | 2008-05-16 | 2009-11-19 | Objective Interface Systems | System and method that uses cryptographic certificates to define groups of entities |
US9832069B1 (en) | 2008-05-30 | 2017-11-28 | F5 Networks, Inc. | Persistence based on server response in an IP multimedia subsystem (IMS) |
US8214404B2 (en) | 2008-07-11 | 2012-07-03 | Avere Systems, Inc. | Media aware distributed data layout |
US9323681B2 (en) * | 2008-09-18 | 2016-04-26 | Avere Systems, Inc. | File storage system, cache appliance, and method |
GB0813298D0 (en) * | 2008-07-19 | 2008-08-27 | Univ St Andrews | Multipad encryption |
WO2010012109A1 (en) * | 2008-08-01 | 2010-02-04 | Volkovs | System and method for the calculation of a polynomial-based hash function and the erindale-plus hashing algorithm |
EP2366229A4 (en) * | 2008-09-08 | 2012-08-15 | Confidato Security Solutions Ltd | An appliance, system, method and corresponding software components for encrypting and processing data |
US8190636B2 (en) * | 2008-09-30 | 2012-05-29 | Nokia Corporation | Method, apparatus and computer program product for providing object privilege modification |
US8595804B2 (en) * | 2008-11-06 | 2013-11-26 | At&T Intellectual Property I, L.P. | System and method for device security with a plurality of authentication modes |
US8381279B2 (en) * | 2009-02-13 | 2013-02-19 | Microsoft Corporation | Constraining a login to a subset of access rights |
US8364984B2 (en) | 2009-03-13 | 2013-01-29 | Microsoft Corporation | Portable secure data files |
US20100241668A1 (en) * | 2009-03-17 | 2010-09-23 | Microsoft Corporation | Local Computer Account Management at Domain Level |
US20100275265A1 (en) * | 2009-04-27 | 2010-10-28 | Michael Stephen Fiske | System for securing transactions across insecure networks |
US9047477B2 (en) * | 2009-05-26 | 2015-06-02 | Microsoft Technology Licensing, Llc | Distributed key encryption in servers |
WO2011058533A2 (en) * | 2009-11-16 | 2011-05-19 | Discretix Technologies Ltd. | Methods circuits devices and systems for provisioning of cryptographic data to one or more electronic devices |
US9231758B2 (en) | 2009-11-16 | 2016-01-05 | Arm Technologies Israel Ltd. | System, device, and method of provisioning cryptographic data to electronic devices |
US10454674B1 (en) * | 2009-11-16 | 2019-10-22 | Arm Limited | System, method, and device of authenticated encryption of messages |
GB201000288D0 (en) * | 2010-01-11 | 2010-02-24 | Scentrics Information Security | System and method of enforcing a computer policy |
US9191200B1 (en) * | 2010-10-07 | 2015-11-17 | L-3 Communications Corp. | System and method for changing the security level of a communications terminal during operation |
JP2013539295A (en) * | 2010-10-15 | 2013-10-17 | サーティコム コーポレーション | Authenticated encryption of digital signatures with message recovery |
US10162553B2 (en) | 2010-11-24 | 2018-12-25 | Western Digital Technologies, Inc. | Methods and systems for object level de-duplication for solid state devices |
US9058497B2 (en) | 2010-12-23 | 2015-06-16 | Microsoft Technology Licensing, Llc | Cryptographic key management |
AU2012210978B2 (en) * | 2011-01-28 | 2015-11-26 | Royal Canadian Mint/Monnaie Royal Canadienne | Controlled security domains |
DE112012000358B4 (en) | 2011-03-02 | 2019-08-14 | International Business Machines Corporation | Cross-company data exchange |
US9432342B1 (en) * | 2011-03-08 | 2016-08-30 | Ciphercloud, Inc. | System and method to anonymize data transmitted to a destination computing device |
US9264230B2 (en) | 2011-03-14 | 2016-02-16 | International Business Machines Corporation | Secure key management |
CA2773293A1 (en) * | 2011-04-10 | 2012-10-10 | Qnx Software Systems Limited | Multiple independent encryption domains |
CN103597488B (en) | 2011-04-11 | 2016-08-24 | 英特托拉斯技术公司 | Information safety system and method |
US8619990B2 (en) | 2011-04-27 | 2013-12-31 | International Business Machines Corporation | Secure key creation |
US8755527B2 (en) | 2011-05-04 | 2014-06-17 | International Business Machines Corporation | Key management policies for cryptographic keys |
US8634561B2 (en) * | 2011-05-04 | 2014-01-21 | International Business Machines Corporation | Secure key management |
US8789210B2 (en) | 2011-05-04 | 2014-07-22 | International Business Machines Corporation | Key usage policies for cryptographic keys |
US8566913B2 (en) | 2011-05-04 | 2013-10-22 | International Business Machines Corporation | Secure key management |
US8914635B2 (en) * | 2011-07-25 | 2014-12-16 | Grey Heron Technologies, Llc | Method and system for establishing secure communications using composite key cryptography |
WO2013016514A1 (en) * | 2011-07-26 | 2013-01-31 | Mine Safety Appliances Company | Incident management and monitoring systems and methods |
US8752143B2 (en) * | 2011-08-15 | 2014-06-10 | Bank Of America Corporation | Method and apparatus for token-based reassignment of privileges |
GB2508532B (en) * | 2011-09-28 | 2020-05-06 | Hewlett Packard Development Co | Unlocking a storage device |
US10797864B2 (en) * | 2011-11-21 | 2020-10-06 | Combined Conditional Access Development And Support, Llc | System and method for authenticating data while minimizing bandwidth |
GB2513798B (en) | 2012-02-01 | 2021-03-03 | Finjan Blue Inc | A method for optimizing processing of restricted-access data |
US9069634B2 (en) * | 2012-03-09 | 2015-06-30 | Blackberry Limited | Signature representation of data with aliasing across synonyms |
GB201205661D0 (en) * | 2012-03-30 | 2012-05-16 | Bae Systems Plc | Security |
US9116969B2 (en) | 2012-04-30 | 2015-08-25 | International Business Machines Corporation | Generation of electronic pedigree |
US8625805B1 (en) | 2012-07-16 | 2014-01-07 | Wickr Inc. | Digital security bubble |
US9397992B1 (en) * | 2013-10-23 | 2016-07-19 | Emc Corporation | Authentication using color-shape pairings |
US9430634B1 (en) | 2012-10-23 | 2016-08-30 | Emc Corporation | Authentication using gesture passwords |
US10430839B2 (en) * | 2012-12-12 | 2019-10-01 | Cisco Technology, Inc. | Distributed advertisement insertion in content-centric networks |
CN103051628B (en) * | 2012-12-21 | 2016-05-11 | 微梦创科网络科技(中国)有限公司 | Obtain the method and system of authentication token based on server |
CN103905197B (en) * | 2012-12-30 | 2018-04-13 | 北京握奇数据系统有限公司 | A kind of method that SIM card and external equipment are bound and verified |
CN103929303B (en) * | 2013-01-11 | 2018-06-26 | 华立科技股份有限公司 | A kind of key management apparatus of metering automation system |
US8891773B2 (en) * | 2013-02-11 | 2014-11-18 | Lsi Corporation | System and method for key wrapping to allow secure access to media by multiple authorities with modifiable permissions |
US10078524B2 (en) * | 2013-03-01 | 2018-09-18 | Hewlett Packard Enterprise Development Lp | Secure configuration of a headless networking device |
US9853979B1 (en) * | 2013-03-11 | 2017-12-26 | Amazon Technologies, Inc. | Immediate policy effectiveness in eventually consistent systems |
US9380023B2 (en) * | 2013-05-13 | 2016-06-28 | Owl Computing Technologies, Inc. | Enterprise cross-domain solution having configurable data filters |
US9866591B1 (en) | 2013-06-25 | 2018-01-09 | Wickr Inc. | Enterprise messaging platform |
US9830089B1 (en) | 2013-06-25 | 2017-11-28 | Wickr Inc. | Digital data sanitization |
US10129260B1 (en) | 2013-06-25 | 2018-11-13 | Wickr Inc. | Mutual privacy management |
US10567349B2 (en) | 2013-06-25 | 2020-02-18 | Wickr Inc. | Secure time-to-live |
US9779261B2 (en) * | 2013-09-20 | 2017-10-03 | Oracle International Corporation | Entity security implied by an asset in a repository system |
US9396338B2 (en) | 2013-10-15 | 2016-07-19 | Intuit Inc. | Method and system for providing a secure secrets proxy |
US9384362B2 (en) * | 2013-10-14 | 2016-07-05 | Intuit Inc. | Method and system for distributing secrets |
US9444818B2 (en) | 2013-11-01 | 2016-09-13 | Intuit Inc. | Method and system for automatically managing secure communications in multiple communications jurisdiction zones |
US9894069B2 (en) | 2013-11-01 | 2018-02-13 | Intuit Inc. | Method and system for automatically managing secret application and maintenance |
US9467477B2 (en) | 2013-11-06 | 2016-10-11 | Intuit Inc. | Method and system for automatically managing secrets in multiple data security jurisdiction zones |
US9691044B2 (en) * | 2013-11-05 | 2017-06-27 | Bank Of America Corporation | Application shell login role based access control |
US9282122B2 (en) | 2014-04-30 | 2016-03-08 | Intuit Inc. | Method and apparatus for multi-tenancy secrets management |
EP2884692B1 (en) * | 2013-12-13 | 2020-05-20 | Nxp B.V. | Updating software on a secure element |
US9698976B1 (en) | 2014-02-24 | 2017-07-04 | Wickr Inc. | Key management and dynamic perfect forward secrecy |
GB2523759A (en) | 2014-03-04 | 2015-09-09 | Ibm | Method for processing of restricted data |
US20210182863A1 (en) * | 2014-04-23 | 2021-06-17 | Minkasu, Inc. | Authenticating Transactions Using Biometric Authentication |
US9584530B1 (en) | 2014-06-27 | 2017-02-28 | Wickr Inc. | In-band identity verification and man-in-the-middle defense |
US9722975B2 (en) * | 2014-07-03 | 2017-08-01 | Apple Inc. | Methods and apparatus for establishing a secure communication channel |
US10037286B2 (en) * | 2014-08-26 | 2018-07-31 | Red Hat, Inc. | Private partition with hardware unlocking |
BR112017002747A2 (en) | 2014-08-29 | 2018-01-30 | Visa Int Service Ass | computer implemented method, and, computer system. |
US9288050B1 (en) * | 2014-09-25 | 2016-03-15 | International Business Machines Corporation | Unified storage and management of cryptographic keys and certificates |
US10089439B2 (en) | 2014-10-28 | 2018-10-02 | Stryker Sustainability Solutions, Inc. | Medical device with cryptosystem and method of implementing the same |
US9489508B2 (en) * | 2014-11-13 | 2016-11-08 | Seagate Technology Llc | Device functionality access control using unique device credentials |
US9654288B1 (en) | 2014-12-11 | 2017-05-16 | Wickr Inc. | Securing group communications |
US9191391B1 (en) * | 2014-12-19 | 2015-11-17 | Architecture Technology Corporation | Cross-domain object models for securely sharing information between network security domains |
US10461933B2 (en) | 2015-01-27 | 2019-10-29 | Visa International Service Association | Methods for secure credential provisioning |
US10910089B2 (en) | 2015-03-20 | 2021-02-02 | Universal Patient Key, Inc. | Methods and systems providing centralized encryption key management for sharing data across diverse entities |
US10116441B1 (en) * | 2015-06-11 | 2018-10-30 | Amazon Technologies, Inc. | Enhanced-security random data |
EP3151502B1 (en) * | 2015-09-29 | 2018-08-15 | Siemens Aktiengesellschaft | Variously encrypted transmission of object data |
US11115393B2 (en) * | 2015-10-27 | 2021-09-07 | Line Corporation | Message server, method for operating message server and computer-readable recording medium |
US9584493B1 (en) | 2015-12-18 | 2017-02-28 | Wickr Inc. | Decentralized authoritative messaging |
US10291607B1 (en) | 2016-02-02 | 2019-05-14 | Wickr Inc. | Providing real-time events to applications |
US9596079B1 (en) | 2016-04-14 | 2017-03-14 | Wickr Inc. | Secure telecommunications |
US9590958B1 (en) | 2016-04-14 | 2017-03-07 | Wickr Inc. | Secure file transfer |
WO2017214212A1 (en) | 2016-06-08 | 2017-12-14 | Open Invention Network Llc | Dynamic outgoing message modification |
EP3476147A1 (en) * | 2016-06-22 | 2019-05-01 | Saronikos Trading and Services, Unipessoal Lda | Method, software, apparatus, electronic device, server and storage medium for ensuring privacy of communication |
EP3866388B1 (en) * | 2016-08-10 | 2022-11-30 | Nextlabs, Inc. | Sharing encrypted documents within and outside an organization |
US10503933B2 (en) | 2016-09-15 | 2019-12-10 | Nuts Holdings, Llc | Structured data folding with transmutations |
US11393046B1 (en) * | 2017-01-17 | 2022-07-19 | Intuit Inc. | System and method for perpetual rekeying of various data columns with a frequency and encryption strength based on the sensitivity of the data columns |
US10303895B1 (en) | 2017-01-19 | 2019-05-28 | Intuit Inc. | System and method for perpetual rekeying of various data columns with respective encryption keys and on alternating bases |
CA3054821A1 (en) | 2017-02-28 | 2018-09-07 | Leviton Manufacturing Co., Inc. | Communication enabled circuit breakers and circuit breaker panels |
US10333703B2 (en) | 2017-03-01 | 2019-06-25 | International Business Machines Corporation | Key exchange process |
US10936711B2 (en) | 2017-04-18 | 2021-03-02 | Intuit Inc. | Systems and mechanism to control the lifetime of an access token dynamically based on access token use |
US10686765B2 (en) * | 2017-04-19 | 2020-06-16 | International Business Machines Corporation | Data access levels |
US10122699B1 (en) * | 2017-05-31 | 2018-11-06 | InfoSci, LLC | Systems and methods for ephemeral shared data set management and communication protection |
US11463439B2 (en) * | 2017-04-21 | 2022-10-04 | Qwerx Inc. | Systems and methods for device authentication and protection of communication on a system on chip |
US11194562B2 (en) * | 2017-05-19 | 2021-12-07 | Blackberry Limited | Method and system for hardware identification and software update control |
US11004548B1 (en) | 2017-09-20 | 2021-05-11 | Datavant, Inc. | System for providing de-identified mortality indicators in healthcare data |
US10635829B1 (en) | 2017-11-28 | 2020-04-28 | Intuit Inc. | Method and system for granting permissions to parties within an organization |
KR102005158B1 (en) * | 2017-11-29 | 2019-07-29 | 신한카드 주식회사 | Apparatus of generating credit virtual currency and apparatus of managing credit virtual currency |
US11537748B2 (en) | 2018-01-26 | 2022-12-27 | Datavant, Inc. | Self-contained system for de-identifying unstructured data in healthcare records |
US11120144B1 (en) | 2018-04-12 | 2021-09-14 | Datavant, Inc. | Methods and systems providing central management of distributed de-identification and tokenization software for sharing data |
US11042668B1 (en) | 2018-04-12 | 2021-06-22 | Datavant, Inc. | System for preparing data for expert certification and monitoring data over time to ensure compliance with certified boundary conditions |
US11080423B1 (en) | 2018-04-13 | 2021-08-03 | Datavant, Inc. | System for simulating a de-identified healthcare data set and creating simulated personal data while retaining profile of authentic data |
US10430606B1 (en) | 2018-04-30 | 2019-10-01 | Aras Corporation | System and method for implementing domain based access control on queries of a self-describing data system |
US11368445B2 (en) * | 2018-05-21 | 2022-06-21 | Amazon Technologies, Inc. | Local encryption for single sign-on |
WO2020107104A1 (en) * | 2018-11-30 | 2020-06-04 | BicDroid Inc. | Personalized and cryptographically secure access control in operating systems |
US11743254B2 (en) * | 2019-08-12 | 2023-08-29 | Lenovo (Singapore) Pte. Ltd. | Device authentication across unsecure network |
US11263310B2 (en) * | 2019-11-26 | 2022-03-01 | Red Hat, Inc. | Using a trusted execution environment for a proof-of-work key wrapping scheme that verifies remote device capabilities |
US11520878B2 (en) * | 2019-11-26 | 2022-12-06 | Red Hat, Inc. | Using a trusted execution environment for a proof-of-work key wrapping scheme that restricts execution based on device capabilities |
US11887072B2 (en) * | 2019-12-11 | 2024-01-30 | Bitt Inc. | Digital currency minting in a system of network nodes implementing a distributed ledger |
US11431689B2 (en) * | 2020-01-10 | 2022-08-30 | Lennox Industries Inc. | Secure payload delivery |
US11265144B2 (en) | 2020-03-09 | 2022-03-01 | International Business Machines Corporation | Consistent ciphertext creation |
US11411952B2 (en) * | 2020-04-02 | 2022-08-09 | Verizon Patent And Licensing Inc. | Systems and methods for multi-level authentication |
EP4133397A4 (en) | 2020-04-09 | 2024-04-10 | Nuts Holdings Llc | Nuts: flexible hierarchy object graphs |
US11368287B2 (en) | 2020-05-19 | 2022-06-21 | International Business Machines Corporation | Identification of a creator of an encrypted object |
US11276258B2 (en) | 2020-06-15 | 2022-03-15 | Delphian Systems, LLC | Enhanced security for contactless access card system |
US11640289B2 (en) * | 2020-08-24 | 2023-05-02 | Rockwell Collins, Inc. | Microservices cloud-native architecture for ubiquitous simulation as a service |
US20220085983A1 (en) * | 2020-09-14 | 2022-03-17 | Hewlett Packard Enterprise Development Lp | Encryption keys from storage systems |
US11755779B1 (en) | 2020-09-30 | 2023-09-12 | Datavant, Inc. | Linking of tokenized trial data to other tokenized data |
US11223489B1 (en) | 2021-02-23 | 2022-01-11 | Garantir LLC | Advanced security control implementation of proxied cryptographic keys |
US11757634B2 (en) | 2021-03-30 | 2023-09-12 | Bank Of America Corporation | System for secure client-side cryptographic key retrieval using cryptographic key splitting and wrapping |
US11418329B1 (en) | 2021-05-28 | 2022-08-16 | Garantir LLC | Shared secret implementation of proxied cryptographic keys |
US11218317B1 (en) | 2021-05-28 | 2022-01-04 | Garantir LLC | Secure enclave implementation of proxied cryptographic keys |
CN113395271A (en) * | 2021-06-07 | 2021-09-14 | 武汉卓尔信息科技有限公司 | Data security access method in cloud computing platform and cloud computing platform |
US11502827B1 (en) * | 2021-09-03 | 2022-11-15 | Garantir LLC | Exporting remote cryptographic keys |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6381699B2 (en) * | 1998-01-02 | 2002-04-30 | Cryptography Research, Inc. | Leak-resistant cryptographic method and apparatus |
US6609198B1 (en) * | 1999-08-05 | 2003-08-19 | Sun Microsystems, Inc. | Log-on service providing credential level change without loss of session continuity |
Family Cites Families (119)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5265221A (en) | 1989-03-20 | 1993-11-23 | Tandem Computers | Access restriction facility method and apparatus |
US5201000A (en) * | 1991-09-27 | 1993-04-06 | International Business Machines Corporation | Method for generating public and private key pairs without using a passphrase |
US5276901A (en) | 1991-12-16 | 1994-01-04 | International Business Machines Corporation | System for controlling group access to objects using group access control folder and group identification as individual user |
US6850252B1 (en) | 1999-10-05 | 2005-02-01 | Steven M. Hoffberg | Intelligent electronic appliance system and method |
WO1993023938A1 (en) | 1992-05-15 | 1993-11-25 | Tecsec Incorporated | Voice and data encryption device |
US5369707A (en) | 1993-01-27 | 1994-11-29 | Tecsec Incorporated | Secure network method and apparatus |
US5375169A (en) | 1993-05-28 | 1994-12-20 | Tecsec, Incorporated | Cryptographic key management method and apparatus |
US5440290A (en) | 1993-06-07 | 1995-08-08 | Tecsec Incorporated | Proximity detection device for protection of personnel against exposure to hazardous radio frequency radiation |
US5369702A (en) * | 1993-10-18 | 1994-11-29 | Tecsec Incorporated | Distributed cryptographic object method |
US5680452A (en) * | 1993-10-18 | 1997-10-21 | Tecsec Inc. | Distributed cryptographic object method |
US5432851A (en) | 1993-10-21 | 1995-07-11 | Tecsec Incorporated | Personal computer access control system |
US5651109A (en) * | 1993-12-29 | 1997-07-22 | Lucent Technologies Inc. | Memory structure for configuring a terminal device |
US6813769B1 (en) | 1997-10-28 | 2004-11-02 | Microsoft Corporation | Server application components with control over state duration |
JP4095680B2 (en) * | 1994-08-01 | 2008-06-04 | 富士通株式会社 | Security management method for card type storage device and card type storage device |
DE69427347T2 (en) | 1994-08-15 | 2001-10-31 | Ibm | Process and system for improved access control based on the roles in distributed and centralized computer systems |
CA2242596C (en) | 1996-01-11 | 2012-06-19 | Mrj, Inc. | System for controlling access and distribution of digital property |
JP3090021B2 (en) | 1996-02-14 | 2000-09-18 | 富士ゼロックス株式会社 | Electronic document management device |
US6272538B1 (en) * | 1996-07-30 | 2001-08-07 | Micron Technology, Inc. | Method and system for establishing a security perimeter in computer networks |
US6055637A (en) * | 1996-09-27 | 2000-04-25 | Electronic Data Systems Corporation | System and method for accessing enterprise-wide resources by presenting to the resource a temporary credential |
US6023765A (en) * | 1996-12-06 | 2000-02-08 | The United States Of America As Represented By The Secretary Of Commerce | Implementation of role-based access control in multi-level secure systems |
US5845068A (en) | 1996-12-18 | 1998-12-01 | Sun Microsystems, Inc. | Multilevel security port methods, apparatuses, and computer program products |
US6229445B1 (en) | 1997-01-13 | 2001-05-08 | Tecsec, Incorporated | RF identification process and apparatus |
US6885747B1 (en) | 1997-02-13 | 2005-04-26 | Tec.Sec, Inc. | Cryptographic key split combiner |
US6105132A (en) | 1997-02-20 | 2000-08-15 | Novell, Inc. | Computer network graded authentication system and method |
US5920630A (en) * | 1997-02-25 | 1999-07-06 | United States Of America | Method of public key cryptography that includes key escrow |
IL120420A (en) | 1997-03-10 | 1999-12-31 | Security 7 Software Ltd | Method and system for preventing the downloading and execution of executable objects |
US6041411A (en) | 1997-03-28 | 2000-03-21 | Wyatt; Stuart Alan | Method for defining and verifying user access rights to a computer information |
US6742050B1 (en) | 1997-03-31 | 2004-05-25 | Intel Corporation | Inter-object messaging |
US5991877A (en) | 1997-04-03 | 1999-11-23 | Lockheed Martin Corporation | Object-oriented trusted application framework |
US6694433B1 (en) * | 1997-05-08 | 2004-02-17 | Tecsec, Inc. | XML encryption scheme |
US6229894B1 (en) | 1997-07-14 | 2001-05-08 | Entrust Technologies, Ltd. | Method and apparatus for access to user-specific encryption information |
US6014666A (en) | 1997-10-28 | 2000-01-11 | Microsoft Corporation | Declarative and programmatic access control of component-based server applications using roles |
US6134594A (en) | 1997-10-28 | 2000-10-17 | Microsoft Corporation | Multi-user, multiple tier distributed application architecture with single-user access control of middle tier objects |
US5890161A (en) | 1997-10-28 | 1999-03-30 | Microsoft Corporation | Automatic transaction processing of component-based server applications |
US5958004A (en) | 1997-10-28 | 1999-09-28 | Microsoft Corporation | Disabling and enabling transaction committal in transactional application components |
US6202066B1 (en) | 1997-11-19 | 2001-03-13 | The United States Of America As Represented By The Secretary Of Commerce | Implementation of role/group permission association using object access type |
US6044466A (en) | 1997-11-25 | 2000-03-28 | International Business Machines Corp. | Flexible and dynamic derivation of permissions |
US6141754A (en) | 1997-11-28 | 2000-10-31 | International Business Machines Corporation | Integrated method and system for controlling information access and distribution |
US6088679A (en) | 1997-12-01 | 2000-07-11 | The United States Of America As Represented By The Secretary Of Commerce | Workflow management employing role-based access control |
US6490680B1 (en) * | 1997-12-04 | 2002-12-03 | Tecsec Incorporated | Access control and authorization system |
US6622247B1 (en) * | 1997-12-19 | 2003-09-16 | Hewlett-Packard Development Company, Lp | Method for certifying the authenticity of digital objects by an authentication authority and for certifying their compliance by a testing authority |
US7095852B2 (en) * | 1998-02-13 | 2006-08-22 | Tecsec, Inc. | Cryptographic key split binder for use with tagged data elements |
US6754820B1 (en) | 2001-01-30 | 2004-06-22 | Tecsec, Inc. | Multiple level access system |
US6357010B1 (en) * | 1998-02-17 | 2002-03-12 | Secure Computing Corporation | System and method for controlling access to documents stored on an internal network |
JPH11313102A (en) | 1998-02-27 | 1999-11-09 | Fujitsu Ltd | Access control list generation method and its device |
US6453419B1 (en) | 1998-03-18 | 2002-09-17 | Secure Computing Corporation | System and method for implementing a security policy |
US7096494B1 (en) * | 1998-05-05 | 2006-08-22 | Chen Jay C | Cryptographic system and method for electronic transactions |
US6901426B1 (en) | 1998-05-08 | 2005-05-31 | E-Talk Corporation | System and method for providing access privileges for users in a performance evaluation system |
US6587857B1 (en) | 1998-06-30 | 2003-07-01 | Citicorp Development Center, Inc. | System and method for warehousing and retrieving data |
US6075865A (en) * | 1998-07-01 | 2000-06-13 | Tecsec Incorporated | Cryptographic communication process and apparatus |
US6321334B1 (en) | 1998-07-15 | 2001-11-20 | Microsoft Corporation | Administering permissions associated with a security zone in a computer system security model |
US6473791B1 (en) | 1998-08-17 | 2002-10-29 | Microsoft Corporation | Object load balancing |
US6442620B1 (en) * | 1998-08-17 | 2002-08-27 | Microsoft Corporation | Environment extensibility and automatic services for component applications using contexts, policies and activators |
US7111173B1 (en) * | 1998-09-01 | 2006-09-19 | Tecsec, Inc. | Encryption process including a biometric unit |
US6311278B1 (en) * | 1998-09-09 | 2001-10-30 | Sanctum Ltd. | Method and system for extracting application protocol characteristics |
US6324646B1 (en) | 1998-09-11 | 2001-11-27 | International Business Machines Corporation | Method and system for securing confidential data in a computer network |
US6115709A (en) | 1998-09-18 | 2000-09-05 | Tacit Knowledge Systems, Inc. | Method and system for constructing a knowledge profile of a user having unrestricted and restricted access portions according to respective levels of confidence of content of the portions |
US6289462B1 (en) | 1998-09-28 | 2001-09-11 | Argus Systems Group, Inc. | Trusted compartmentalized computer operating system |
JP2000124887A (en) * | 1998-10-14 | 2000-04-28 | Fuji Xerox Co Ltd | Enciphering/decoding method for group unit, and method and device for signature |
US6684330B1 (en) * | 1998-10-16 | 2004-01-27 | Tecsec, Inc. | Cryptographic information and flow control |
US6560337B1 (en) * | 1998-10-28 | 2003-05-06 | International Business Machines Corporation | Systems, methods and computer program products for reducing effective key length of ciphers using one-way cryptographic functions and an initial key |
US6678705B1 (en) | 1998-11-16 | 2004-01-13 | At&T Corp. | System for archiving electronic documents using messaging groupware |
US6574736B1 (en) | 1998-11-30 | 2003-06-03 | Microsoft Corporation | Composable roles |
US6487665B1 (en) | 1998-11-30 | 2002-11-26 | Microsoft Corporation | Object security boundaries |
US6385724B1 (en) | 1998-11-30 | 2002-05-07 | Microsoft Corporation | Automatic object caller chain with declarative impersonation and transitive trust |
US20030172280A1 (en) * | 1998-12-04 | 2003-09-11 | Scheidt Edward M. | Access control and authorization system |
US6499109B1 (en) | 1998-12-08 | 2002-12-24 | Networks Associates Technology, Inc. | Method and apparatus for securing software distributed over a network |
US6578143B1 (en) * | 1998-12-18 | 2003-06-10 | Qualcomm Incorporated | Method for negotiating weakened keys in encryption systems |
US6574733B1 (en) * | 1999-01-25 | 2003-06-03 | Entrust Technologies Limited | Centralized secure backup system and method |
US6529949B1 (en) | 2000-02-07 | 2003-03-04 | Interactual Technologies, Inc. | System, method and article of manufacture for remote unlocking of local content located on a client device |
US6769130B1 (en) | 2000-01-20 | 2004-07-27 | Interactual Technologies, Inc. | System, method and article of manufacture for late synchronization during the execution of a multimedia event on a plurality of client computers |
US6721713B1 (en) * | 1999-05-27 | 2004-04-13 | Andersen Consulting Llp | Business alliance identification in a web architecture framework |
US6615166B1 (en) | 1999-05-27 | 2003-09-02 | Accenture Llp | Prioritizing components of a network framework required for implementation of technology |
US6473794B1 (en) | 1999-05-27 | 2002-10-29 | Accenture Llp | System for establishing plan to test components of web based framework by displaying pictorial representation and conveying indicia coded components of existing network framework |
US6519571B1 (en) * | 1999-05-27 | 2003-02-11 | Accenture Llp | Dynamic customer profile management |
US6536037B1 (en) | 1999-05-27 | 2003-03-18 | Accenture Llp | Identification of redundancies and omissions among components of a web based architecture |
US6289450B1 (en) | 1999-05-28 | 2001-09-11 | Authentica, Inc. | Information security architecture for encrypting documents for remote access while maintaining access control |
US6687375B1 (en) * | 1999-06-02 | 2004-02-03 | International Business Machines Corporation | Generating user-dependent keys and random numbers |
CA2277633C (en) * | 1999-07-19 | 2009-10-20 | Certicom Corp. | Split-key key-agreement protocol |
US6668322B1 (en) * | 1999-08-05 | 2003-12-23 | Sun Microsystems, Inc. | Access management system and method employing secure credentials |
US7606731B2 (en) * | 1999-08-17 | 2009-10-20 | Mcclung Iii Guy Lamonte | Price guarantee methods and systems |
US6370573B1 (en) | 1999-08-31 | 2002-04-09 | Accenture Llp | System, method and article of manufacture for managing an environment of a development architecture framework |
US6405364B1 (en) | 1999-08-31 | 2002-06-11 | Accenture Llp | Building techniques in a development architecture framework |
US6256773B1 (en) | 1999-08-31 | 2001-07-03 | Accenture Llp | System, method and article of manufacture for configuration management in a development architecture framework |
US6324647B1 (en) * | 1999-08-31 | 2001-11-27 | Michel K. Bowman-Amuah | System, method and article of manufacture for security management in a development architecture framework |
US6662357B1 (en) | 1999-08-31 | 2003-12-09 | Accenture Llp | Managing information in an integrated development architecture framework |
US6748555B1 (en) * | 1999-09-09 | 2004-06-08 | Microsoft Corporation | Object-based software management |
US6853988B1 (en) | 1999-09-20 | 2005-02-08 | Security First Corporation | Cryptographic server with provisions for interoperability between cryptographic systems |
US6629081B1 (en) | 1999-12-22 | 2003-09-30 | Accenture Llp | Account settlement and financing in an e-commerce environment |
US6757898B1 (en) | 2000-01-18 | 2004-06-29 | Mckesson Information Solutions, Inc. | Electronic provider—patient interface system |
JP2001211154A (en) * | 2000-01-25 | 2001-08-03 | Murata Mach Ltd | Secret key generating method, ciphering method, and cipher communication method |
US6629105B1 (en) * | 2000-02-19 | 2003-09-30 | Novell, Inc. | Facilitating user administration of directory trees |
DE60136616D1 (en) | 2000-03-03 | 2009-01-02 | Ibm | SYSTEM FOR DETERMINING WEAKNESSES OF WEB APPLICATIONS |
US6701345B1 (en) * | 2000-04-13 | 2004-03-02 | Accenture Llp | Providing a notification when a plurality of users are altering similar data in a health care solution environment |
US6658415B1 (en) | 2000-04-28 | 2003-12-02 | International Business Machines Corporation | Monitoring and managing user access to content via a universally accessible database |
CN1142653C (en) * | 2000-04-28 | 2004-03-17 | 杨宏伟 | Dynamic password authentication system and method |
US6453791B1 (en) * | 2000-05-25 | 2002-09-24 | Kyle Seitzinger | Concealable body armor briefs |
US6877094B1 (en) | 2000-07-28 | 2005-04-05 | Sun Microsystems, Inc. | Method and apparatus for authentication and payment for devices participating in Jini communities |
US7039392B2 (en) * | 2000-10-10 | 2006-05-02 | Freescale Semiconductor | System and method for providing device authentication in a wireless network |
US6871231B2 (en) | 2001-01-03 | 2005-03-22 | Ipac Acquisition Subsidiary I, Llc | Role-based access to image metadata |
US6871232B2 (en) | 2001-03-06 | 2005-03-22 | International Business Machines Corporation | Method and system for third party resource provisioning management |
WO2002077747A2 (en) * | 2001-03-27 | 2002-10-03 | Microsoft Corporation | Distributed, scalable cryptographic access control |
US8909555B2 (en) * | 2001-04-24 | 2014-12-09 | Hewlett-Packard Development Company, L.P. | Information security system |
US6785686B2 (en) | 2001-05-29 | 2004-08-31 | Sun Microsystems, Inc. | Method and system for creating and utilizing managed roles in a directory system |
US6768988B2 (en) | 2001-05-29 | 2004-07-27 | Sun Microsystems, Inc. | Method and system for incorporating filtered roles in a directory system |
US6918107B2 (en) | 2001-07-02 | 2005-07-12 | Bea Systems, Inc. | Programming language extensions for processing data representation language objects and related applications |
US6754884B1 (en) * | 2001-07-02 | 2004-06-22 | Bea Systems, Inc. | Programming language extensions for processing XML objects and related applications |
US7181620B1 (en) * | 2001-11-09 | 2007-02-20 | Cisco Technology, Inc. | Method and apparatus providing secure initialization of network devices using a cryptographic key distribution approach |
JP3904432B2 (en) * | 2001-11-16 | 2007-04-11 | 株式会社ルネサステクノロジ | Information processing device |
US6859810B2 (en) | 2001-12-10 | 2005-02-22 | Bea Systems, Inc. | Declarative specification and engine for non-isomorphic data mapping |
US7299364B2 (en) * | 2002-04-09 | 2007-11-20 | The Regents Of The University Of Michigan | Method and system to maintain application data secure and authentication token for use therein |
US6768968B2 (en) * | 2002-04-18 | 2004-07-27 | International Business Machines Corporation | Method and system of an integrated simulation tool using business patterns and scripts |
US7240046B2 (en) * | 2002-09-04 | 2007-07-03 | International Business Machines Corporation | Row-level security in a relational database management system |
US7424115B2 (en) * | 2003-01-30 | 2008-09-09 | Nokia Corporation | Generating asymmetric keys in a telecommunications system |
US20050015602A1 (en) * | 2003-04-28 | 2005-01-20 | Rees Robert Thomas Owen | Method and apparatus for passing data securely between parties |
US7515717B2 (en) * | 2003-07-31 | 2009-04-07 | International Business Machines Corporation | Security containers for document components |
US20050289343A1 (en) * | 2004-06-23 | 2005-12-29 | Sun Microsystems, Inc. | Systems and methods for binding a hardware component and a platform |
WO2006020426A2 (en) * | 2004-07-29 | 2006-02-23 | Infoassure, Inc. | Cryptographic key construct |
US8166296B2 (en) * | 2004-10-20 | 2012-04-24 | Broadcom Corporation | User authentication system |
-
2005
- 2005-07-29 WO PCT/US2005/026908 patent/WO2006020426A2/en active Application Filing
- 2005-07-29 US US11/193,911 patent/US7739501B2/en active Active
- 2005-07-29 WO PCT/US2005/026802 patent/WO2007001328A2/en active Application Filing
- 2005-07-29 WO PCT/US2005/026907 patent/WO2006015182A2/en active Application Filing
- 2005-07-29 US US11/193,227 patent/US7711120B2/en active Active
- 2005-07-29 US US11/193,595 patent/US20060053285A1/en not_active Abandoned
- 2005-07-29 US US11/193,607 patent/US7715565B2/en active Active
- 2005-07-29 WO PCT/US2005/026804 patent/WO2007001329A2/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6381699B2 (en) * | 1998-01-02 | 2002-04-30 | Cryptography Research, Inc. | Leak-resistant cryptographic method and apparatus |
US6609198B1 (en) * | 1999-08-05 | 2003-08-19 | Sun Microsystems, Inc. | Log-on service providing credential level change without loss of session continuity |
Also Published As
Publication number | Publication date |
---|---|
US7715565B2 (en) | 2010-05-11 |
WO2007001328A2 (en) | 2007-01-04 |
US20060218400A1 (en) | 2006-09-28 |
WO2007001329A2 (en) | 2007-01-04 |
WO2006015182A2 (en) | 2006-02-09 |
US20060050870A1 (en) | 2006-03-09 |
WO2006020426A3 (en) | 2009-04-16 |
US7711120B2 (en) | 2010-05-04 |
US20060242407A1 (en) | 2006-10-26 |
WO2007001328A3 (en) | 2009-04-09 |
WO2006020426A2 (en) | 2006-02-23 |
WO2007001329A3 (en) | 2009-04-16 |
US20060053285A1 (en) | 2006-03-09 |
US7739501B2 (en) | 2010-06-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2006015182A3 (en) | Object access level | |
WO2007096871A3 (en) | Device, system and method of accessing a security token | |
SG152289A1 (en) | System and method for application authorization | |
NZ586279A (en) | System and method for securing data distributed by a first user to at least one recipient user | |
WO2007012814A3 (en) | Signature for access tokens | |
CA2569355C (en) | System and method for handling permits for user authentication tokens | |
EP1901238A3 (en) | Authentication and access control device | |
TW200701725A (en) | Automatic data encryption and access control based on bluetooth device proximity | |
TW200633487A (en) | Access rights | |
WO2008061138A3 (en) | Biometric access sensitivity | |
WO2008060725A3 (en) | Secure universal transaction system | |
HK1060201A1 (en) | Access control to computer resources based on external authentication | |
GB2449834A (en) | Identity and access management framework | |
ATE476045T1 (en) | CUSTOMER AUTHENTICATION USING A CHALLENGE PROVIDER | |
WO2004090802A3 (en) | Card device resource access control | |
WO2008060820A3 (en) | System and method for authenticating remote server access | |
WO2006052601A3 (en) | Authenticating a login | |
WO2006107318A3 (en) | Ability for developers to easily find or extend well known locations on a system | |
WO2007001635A3 (en) | Active content trust model | |
TW200627209A (en) | Method for enabling a trusted dialog for collection of sensitive data | |
WO2011006864A3 (en) | Method for reading attributes from an id token and one-time pass word generator | |
EP4274286A3 (en) | Secure login with authentication based on a visual representation of data | |
WO2005072492A3 (en) | Nonredirected authentication | |
WO2004044738A3 (en) | Techniques for supporting application-specific access controls with a separate server | |
WO2009151703A3 (en) | Computing input system with secure storage and method of operation thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |