WO2008147577A3 - Portable data encryption device with configurable security functionality and method for file encryption - Google Patents

Portable data encryption device with configurable security functionality and method for file encryption Download PDF

Info

Publication number
WO2008147577A3
WO2008147577A3 PCT/US2008/051729 US2008051729W WO2008147577A3 WO 2008147577 A3 WO2008147577 A3 WO 2008147577A3 US 2008051729 W US2008051729 W US 2008051729W WO 2008147577 A3 WO2008147577 A3 WO 2008147577A3
Authority
WO
WIPO (PCT)
Prior art keywords
file
encryption key
encryption
hashing
ciphertext
Prior art date
Application number
PCT/US2008/051729
Other languages
French (fr)
Other versions
WO2008147577A2 (en
Inventor
Robert R Jueneman
Duane J Linsenbardt
John N Young
William Reid Carlisle
Burton George Tregub
Original Assignee
Spyrus Inc
Robert R Jueneman
Duane J Linsenbardt
John N Young
William Reid Carlisle
Burton George Tregub
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Spyrus Inc, Robert R Jueneman, Duane J Linsenbardt, John N Young, William Reid Carlisle, Burton George Tregub filed Critical Spyrus Inc
Priority to EP08825845.4A priority Critical patent/EP2122900A4/en
Publication of WO2008147577A2 publication Critical patent/WO2008147577A2/en
Publication of WO2008147577A3 publication Critical patent/WO2008147577A3/en
Priority to IL199983A priority patent/IL199983A/en
Priority to IL236641A priority patent/IL236641A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/72Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0877Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2113Multi-level security, e.g. mandatory access control
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2153Using hardware token as a secondary aspect
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/24Key scheduling, i.e. generating round keys or sub-keys for block encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent

Abstract

A portable encryption device with logon access controlled by an encryption key, with an on board cryptographic processor for reconstituting the encryption key from a plurality of secrets generated by a secret sharing algorithm, optionally shrouded with external secrets using an invertible transform resistant to quantum computing attacks. Another embodiment provides file decryption controlled by a file encryption key, with the on board cryptographic processor reconstituting the file encryption key from a version of the file encryption key which has been shrouded with a network authorization code. A method for encryption of a plaintext file by hashing, compressing, and encrypting the plaintext file, hashing the ciphertext, hashing the plaintext hash and the ciphertext hash, and sealing the ciphertext together with the resulting hash. A portable encryption device for performing the method is also disclosed.
PCT/US2008/051729 2007-01-22 2008-01-22 Portable data encryption device with configurable security functionality and method for file encryption WO2008147577A2 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP08825845.4A EP2122900A4 (en) 2007-01-22 2008-01-22 Portable data encryption device with configurable security functionality and method for file encryption
IL199983A IL199983A (en) 2007-01-22 2009-07-21 Portable data encryption device with configurable security functionality and method for file encryption
IL236641A IL236641A (en) 2007-01-22 2015-01-11 Data encryption device with file decryption controlled by a file encryption key and method for controlling file encryption

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US88608707P 2007-01-22 2007-01-22
US60/886,087 2007-01-22

Publications (2)

Publication Number Publication Date
WO2008147577A2 WO2008147577A2 (en) 2008-12-04
WO2008147577A3 true WO2008147577A3 (en) 2009-03-26

Family

ID=39873427

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2008/051729 WO2008147577A2 (en) 2007-01-22 2008-01-22 Portable data encryption device with configurable security functionality and method for file encryption

Country Status (4)

Country Link
US (4) US20080263363A1 (en)
EP (1) EP2122900A4 (en)
IL (2) IL199983A (en)
WO (1) WO2008147577A2 (en)

Families Citing this family (358)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1276033B1 (en) * 2001-07-10 2012-03-14 Trident Microsystems (Far East) Ltd. Memory device with data protection in a processor
US9195397B2 (en) 2005-04-20 2015-11-24 Axxana (Israel) Ltd. Disaster-proof data recovery
EP2395432B1 (en) * 2005-04-20 2013-07-24 Axxana (Israel) Ltd. Remote data mirroring system
US7447908B2 (en) * 2005-05-09 2008-11-04 Silverbrook Research Pty Ltd Method of authenticating a print medium offline
AU2009200408B2 (en) * 2006-09-12 2012-05-10 Cpc Patent Technologies Pty Ltd Password generator
KR100782113B1 (en) * 2006-11-13 2007-12-05 삼성전자주식회사 Memory card system and method transmitting host identification information thereof
US20080263363A1 (en) * 2007-01-22 2008-10-23 Spyrus, Inc. Portable Data Encryption Device with Configurable Security Functionality and Method for File Encryption
KR100841982B1 (en) * 2007-02-08 2008-06-27 삼성전자주식회사 Memory card storing host identification information and access method thereof
US20080226082A1 (en) * 2007-03-12 2008-09-18 Storage Appliance Corporation Systems and methods for secure data backup
US8756659B2 (en) * 2007-04-19 2014-06-17 At&T Intellectual Property I, L.P. Access authorization servers, methods and computer program products employing wireless terminal location
US7706750B2 (en) * 2007-05-07 2010-04-27 Dell Products L.P. Enabling bluetooth support within a secondary and/or across multiple operating system partitions
EP2009605A1 (en) * 2007-06-28 2008-12-31 Gemplus Method of interaction with physical elements forming the content of a machine
US8070057B2 (en) 2007-09-12 2011-12-06 Devicefidelity, Inc. Switching between internal and external antennas
US9304555B2 (en) 2007-09-12 2016-04-05 Devicefidelity, Inc. Magnetically coupling radio frequency antennas
US9311766B2 (en) 2007-09-12 2016-04-12 Devicefidelity, Inc. Wireless communicating radio frequency signals
US20090069049A1 (en) 2007-09-12 2009-03-12 Devicefidelity, Inc. Interfacing transaction cards with host devices
US8915447B2 (en) 2007-09-12 2014-12-23 Devicefidelity, Inc. Amplifying radio frequency signals
US10783232B2 (en) * 2007-09-27 2020-09-22 Clevx, Llc Management system for self-encrypting managed devices with embedded wireless user authentication
US11190936B2 (en) 2007-09-27 2021-11-30 Clevx, Llc Wireless authentication system
US10778417B2 (en) 2007-09-27 2020-09-15 Clevx, Llc Self-encrypting module with embedded wireless user authentication
US10181055B2 (en) 2007-09-27 2019-01-15 Clevx, Llc Data security system with encryption
WO2009047751A2 (en) * 2007-10-08 2009-04-16 Axxana (Israel) Ltd. Fast data recovery system
US8543831B2 (en) * 2007-11-14 2013-09-24 Qimonda Ag System and method for establishing data connections between electronic devices
DE102007058975B4 (en) * 2007-12-07 2022-10-06 Bayerische Motoren Werke Aktiengesellschaft Vehicle electrical system of a motor vehicle with a master security module
US20090164804A1 (en) * 2007-12-25 2009-06-25 Sandisk Il Ltd. Secured storage device
CN101174295B (en) * 2008-01-16 2010-09-01 北京飞天诚信科技有限公司 Off-line DRM authentication method and system
US7937387B2 (en) * 2008-02-01 2011-05-03 Mandiant System and method for data preservation and retrieval
US8271736B2 (en) * 2008-02-07 2012-09-18 International Business Machines Corporation Data block frequency map dependent caching
US20110018754A1 (en) * 2008-03-28 2011-01-27 Akira Tojima Remote operation apparatus, operation target apparatus, method for controlling remote operation apparatus, method for controlling operation target apparatus, and remote operation system
FR2931336B1 (en) * 2008-05-19 2011-02-11 Eads Secure Networks METHODS AND DEVICES FOR TRANSMITTING AND AUTHENTICATING MESSAGES TO GUARANTEE THE AUTHENTICITY OF A SYSTEM
WO2009141752A2 (en) * 2008-05-19 2009-11-26 Axxana (Israel) Ltd. Resilient data storage in the presence of replication faults and rolling disasters
GB2460412B (en) * 2008-05-28 2012-09-19 Hewlett Packard Development Co Information sharing
US8832777B2 (en) 2009-03-02 2014-09-09 Headwater Partners I Llc Adapting network policies based on device service processor configuration
US8626115B2 (en) 2009-01-28 2014-01-07 Headwater Partners I Llc Wireless network service interfaces
US8346225B2 (en) 2009-01-28 2013-01-01 Headwater Partners I, Llc Quality of service for device assisted services
US8402111B2 (en) 2009-01-28 2013-03-19 Headwater Partners I, Llc Device assisted services install
US8340634B2 (en) 2009-01-28 2012-12-25 Headwater Partners I, Llc Enhanced roaming services and converged carrier networks with device assisted services and a proxy
US8391834B2 (en) 2009-01-28 2013-03-05 Headwater Partners I Llc Security techniques for device assisted services
US8275830B2 (en) 2009-01-28 2012-09-25 Headwater Partners I Llc Device assisted CDR creation, aggregation, mediation and billing
US8406748B2 (en) 2009-01-28 2013-03-26 Headwater Partners I Llc Adaptive ambient services
US8548428B2 (en) 2009-01-28 2013-10-01 Headwater Partners I Llc Device group partitions and settlement platform
US8635335B2 (en) 2009-01-28 2014-01-21 Headwater Partners I Llc System and method for wireless network offloading
US8589541B2 (en) 2009-01-28 2013-11-19 Headwater Partners I Llc Device-assisted services for protecting network capacity
US8630192B2 (en) 2009-01-28 2014-01-14 Headwater Partners I Llc Verifiable and accurate service usage monitoring for intermediate networking devices
FR2933510B1 (en) * 2008-07-04 2010-10-15 Oberthur Technologies PORTABLE ELECTRONIC DEVICE COMPRISING A PORTABLE APPLICATION AND A SECURE MODULE THAT CAN COMMUNICATE BETWEEN THEM, AND ASSOCIATED COMMUNICATION METHOD
US8286171B2 (en) 2008-07-21 2012-10-09 Workshare Technology, Inc. Methods and systems to fingerprint textual information using word runs
US8204220B2 (en) * 2008-09-18 2012-06-19 Sony Corporation Simulcrypt key sharing with hashed keys
CN101685425A (en) * 2008-09-28 2010-03-31 联想(北京)有限公司 Mobile storage device and method of encrypting same
TWI525452B (en) * 2008-10-02 2016-03-11 美國博通公司 Secure virtual machine manager
WO2010059747A2 (en) 2008-11-18 2010-05-27 Workshare Technology, Inc. Methods and systems for exact data match filtering
KR20100067415A (en) * 2008-12-11 2010-06-21 삼성전자주식회사 Electronic device and method for controlling output
US8296554B2 (en) * 2008-12-30 2012-10-23 Intel Corporation Pre-boot recovery of a locked computer system
KR101029758B1 (en) * 2008-12-31 2011-04-19 노틸러스효성 주식회사 A method for firmware updating in remote
WO2010076755A2 (en) * 2009-01-05 2010-07-08 Axxana (Israel) Ltd Disaster-proof storage unit having transmission capabilities
US9286493B2 (en) * 2009-01-07 2016-03-15 Clevx, Llc Encryption bridge system and method of operation thereof
US20110264954A1 (en) * 2009-01-12 2011-10-27 Axxana (Israel) Ltd. Disaster-proof data recovery
US9706061B2 (en) 2009-01-28 2017-07-11 Headwater Partners I Llc Service design center for device assisted services
US9647918B2 (en) 2009-01-28 2017-05-09 Headwater Research Llc Mobile device and method attributing media services network usage to requesting application
US9980146B2 (en) 2009-01-28 2018-05-22 Headwater Research Llc Communications device with secure data path processing agents
US9565707B2 (en) 2009-01-28 2017-02-07 Headwater Partners I Llc Wireless end-user device with wireless data attribution to multiple personas
US10779177B2 (en) 2009-01-28 2020-09-15 Headwater Research Llc Device group partitions and settlement platform
US9270559B2 (en) 2009-01-28 2016-02-23 Headwater Partners I Llc Service policy implementation for an end-user device having a control application or a proxy agent for routing an application traffic flow
US9557889B2 (en) 2009-01-28 2017-01-31 Headwater Partners I Llc Service plan design, user interfaces, application programming interfaces, and device management
US10841839B2 (en) 2009-01-28 2020-11-17 Headwater Research Llc Security, fraud detection, and fraud mitigation in device-assisted services systems
US10064055B2 (en) 2009-01-28 2018-08-28 Headwater Research Llc Security, fraud detection, and fraud mitigation in device-assisted services systems
US9755842B2 (en) 2009-01-28 2017-09-05 Headwater Research Llc Managing service user discovery and service launch object placement on a device
US9392462B2 (en) 2009-01-28 2016-07-12 Headwater Partners I Llc Mobile end-user device with agent limiting wireless data communication for specified background applications based on a stored policy
US10484858B2 (en) 2009-01-28 2019-11-19 Headwater Research Llc Enhanced roaming services and converged carrier networks with device assisted services and a proxy
US10492102B2 (en) 2009-01-28 2019-11-26 Headwater Research Llc Intermediate networking devices
US10237757B2 (en) 2009-01-28 2019-03-19 Headwater Research Llc System and method for wireless network offloading
US10200541B2 (en) 2009-01-28 2019-02-05 Headwater Research Llc Wireless end-user device with divided user space/kernel space traffic policy system
US9253663B2 (en) 2009-01-28 2016-02-02 Headwater Partners I Llc Controlling mobile device communications on a roaming network based on device state
US9578182B2 (en) 2009-01-28 2017-02-21 Headwater Partners I Llc Mobile device and service management
US10264138B2 (en) 2009-01-28 2019-04-16 Headwater Research Llc Mobile device and service management
US8793758B2 (en) 2009-01-28 2014-07-29 Headwater Partners I Llc Security, fraud detection, and fraud mitigation in device-assisted services systems
US9955332B2 (en) 2009-01-28 2018-04-24 Headwater Research Llc Method for child wireless device activation to subscriber account of a master wireless device
US9954975B2 (en) 2009-01-28 2018-04-24 Headwater Research Llc Enhanced curfew and protection associated with a device group
US9572019B2 (en) 2009-01-28 2017-02-14 Headwater Partners LLC Service selection set published to device agent with on-device service selection
US11218854B2 (en) 2009-01-28 2022-01-04 Headwater Research Llc Service plan design, user interfaces, application programming interfaces, and device management
US10326800B2 (en) 2009-01-28 2019-06-18 Headwater Research Llc Wireless network service interfaces
US10057775B2 (en) 2009-01-28 2018-08-21 Headwater Research Llc Virtualized policy and charging system
US8745191B2 (en) 2009-01-28 2014-06-03 Headwater Partners I Llc System and method for providing user notifications
US9858559B2 (en) 2009-01-28 2018-01-02 Headwater Research Llc Network service plan design
US10248996B2 (en) 2009-01-28 2019-04-02 Headwater Research Llc Method for operating a wireless end-user device mobile payment agent
US9351193B2 (en) 2009-01-28 2016-05-24 Headwater Partners I Llc Intermediate networking devices
US10798252B2 (en) 2009-01-28 2020-10-06 Headwater Research Llc System and method for providing user notifications
US10783581B2 (en) 2009-01-28 2020-09-22 Headwater Research Llc Wireless end-user device providing ambient or sponsored services
US10715342B2 (en) 2009-01-28 2020-07-14 Headwater Research Llc Managing service user discovery and service launch object placement on a device
US9571559B2 (en) 2009-01-28 2017-02-14 Headwater Partners I Llc Enhanced curfew and protection associated with a device group
US8296564B2 (en) * 2009-02-17 2012-10-23 Microsoft Corporation Communication channel access based on channel identifier and use policy
US20100215175A1 (en) * 2009-02-23 2010-08-26 Iron Mountain Incorporated Methods and systems for stripe blind encryption
US8145598B2 (en) * 2009-02-23 2012-03-27 Iron Mountain Incorporated Methods and systems for single instance storage of asset parts
US8090683B2 (en) * 2009-02-23 2012-01-03 Iron Mountain Incorporated Managing workflow communication in a distributed storage system
US8397051B2 (en) 2009-02-23 2013-03-12 Autonomy, Inc. Hybrid hash tables
US8229509B2 (en) 2009-02-27 2012-07-24 Microsoft Corporation Protective shroud for handheld device
DE102009013606B4 (en) * 2009-03-17 2013-11-07 Attila Landauer A storage device for preventing unauthorized use of data and methods for operating the same
US8539241B2 (en) 2009-03-25 2013-09-17 Pacid Technologies, Llc Method and system for securing communication
WO2010111438A2 (en) 2009-03-25 2010-09-30 Pacid Technologies, Llc System and method for protecting a secrets file
US10447474B2 (en) * 2009-04-20 2019-10-15 Pure Storage, Inc. Dispersed data storage system data decoding and decryption
US8744071B2 (en) * 2009-04-20 2014-06-03 Cleversafe, Inc. Dispersed data storage system data encryption and encoding
JP5446453B2 (en) * 2009-04-30 2014-03-19 ソニー株式会社 Information processing apparatus, electronic signature generation system, electronic signature key generation method, information processing method, and program
US20100287382A1 (en) * 2009-05-07 2010-11-11 John Charles Gyorffy Two-factor graphical password for text password and encryption key generation
US20100318782A1 (en) * 2009-06-12 2010-12-16 Microsoft Corporation Secure and private backup storage and processing for trusted computing and data services
US8321688B2 (en) * 2009-06-12 2012-11-27 Microsoft Corporation Secure and private backup storage and processing for trusted computing and data services
US9734356B2 (en) * 2009-06-29 2017-08-15 Clevx, Llc Encrypting portable media system and method of operation thereof
BRPI1010228A2 (en) * 2009-07-01 2018-02-20 Mandar Patil method for remotely controlling and monitoring data produced in desktop software
US8914874B2 (en) * 2009-07-21 2014-12-16 Microsoft Corporation Communication channel claim dependent security precautions
US8509449B2 (en) 2009-07-24 2013-08-13 Microsoft Corporation Key protector for a storage volume using multiple keys
JP5521479B2 (en) * 2009-10-14 2014-06-11 富士通株式会社 Program, data storage device and data storage system
WO2011047717A1 (en) * 2009-10-21 2011-04-28 Jennifer Kate Schofield Method for securing and retrieving a data file
US8874929B2 (en) * 2009-10-27 2014-10-28 Lockheed Martin Corporation Cross domain discovery
US9021124B2 (en) 2009-12-02 2015-04-28 Axxana (Israel) Ltd. Distributed intelligent network
CN102725737B (en) 2009-12-04 2016-04-20 密码研究公司 The encryption and decryption of anti-leak can be verified
US9104252B2 (en) * 2010-02-12 2015-08-11 Microsoft Technology Licensing, Llc Assignment of control of peripherals of a computing device
US8930713B2 (en) 2010-03-10 2015-01-06 Dell Products L.P. System and method for general purpose encryption of data
US9135471B2 (en) * 2010-03-10 2015-09-15 Dell Products L.P. System and method for encryption and decryption of data
US8312296B2 (en) 2010-03-10 2012-11-13 Dell Products L.P. System and method for recovering from an interrupted encryption and decryption operation performed on a volume
US8275996B1 (en) 2010-04-12 2012-09-25 Stephen Waller Melvin Incremental encryption of stored information
US8812875B1 (en) 2010-04-12 2014-08-19 Stephen Melvin Virtual self-destruction of stored information
US8429420B1 (en) * 2010-04-12 2013-04-23 Stephen Waller Melvin Time-based key management for encrypted information
US8462955B2 (en) 2010-06-03 2013-06-11 Microsoft Corporation Key protectors based on online keys
CN103415855B (en) * 2010-06-16 2017-08-08 威斯科数据安全国际有限公司 Mass-memory unit memory encryption method, system and device
US8635295B2 (en) 2010-11-29 2014-01-21 Workshare Technology, Inc. Methods and systems for monitoring documents exchanged over email applications
US10783326B2 (en) 2013-03-14 2020-09-22 Workshare, Ltd. System for tracking changes in a collaborative document editing environment
US11030163B2 (en) 2011-11-29 2021-06-08 Workshare, Ltd. System for tracking and displaying changes in a set of related electronic documents
US8972746B2 (en) * 2010-12-17 2015-03-03 Intel Corporation Technique for supporting multiple secure enclaves
US8634563B2 (en) 2010-12-17 2014-01-21 Microsoft Corporation Attribute based encryption using lattices
EP2474931A1 (en) * 2010-12-31 2012-07-11 Gemalto SA System providing an improved skimming resistance for an electronic identity document.
GB2486920A (en) * 2010-12-31 2012-07-04 Daniel Cvrcek USB data storage and generation device connected to a host computer as or as an interface to a Human Interface Device
US8516609B2 (en) 2011-02-11 2013-08-20 Bank Of America Corporation Personal encryption device
US8595507B2 (en) 2011-02-16 2013-11-26 Novell, Inc. Client-based authentication
US9231943B2 (en) 2011-02-16 2016-01-05 Novell, Inc. Client-based authentication
US9154826B2 (en) 2011-04-06 2015-10-06 Headwater Partners Ii Llc Distributing content and service launch objects to mobile devices
US9235532B2 (en) * 2011-06-03 2016-01-12 Apple Inc. Secure storage of full disk encryption keys
US10574729B2 (en) 2011-06-08 2020-02-25 Workshare Ltd. System and method for cross platform document sharing
US10963584B2 (en) 2011-06-08 2021-03-30 Workshare Ltd. Method and system for collaborative editing of a remotely stored document
US9613340B2 (en) 2011-06-14 2017-04-04 Workshare Ltd. Method and system for shared document approval
US9948676B2 (en) 2013-07-25 2018-04-17 Workshare, Ltd. System and method for securing documents prior to transmission
US9170990B2 (en) 2013-03-14 2015-10-27 Workshare Limited Method and system for document retrieval with selective document comparison
US10880359B2 (en) 2011-12-21 2020-12-29 Workshare, Ltd. System and method for cross platform document sharing
US8817976B2 (en) * 2011-06-24 2014-08-26 Gregory Scott Callen Reversible cipher
GB201111554D0 (en) * 2011-07-06 2011-08-24 Business Partners Ltd Search index
EP2732397B1 (en) * 2011-07-12 2020-02-26 Hewlett-Packard Development Company, L.P. Computing device including a port and a guest domain
US10102383B2 (en) * 2011-08-19 2018-10-16 Quintessencelabs Pty Ltd. Permanently erasing mechanism for encryption information
WO2013033424A1 (en) * 2011-08-31 2013-03-07 AppCard, Inc. Apparatus and method for collecting and manipulating transaction data
US9811667B2 (en) * 2011-09-21 2017-11-07 Mcafee, Inc. System and method for grouping computer vulnerabilities
US8479021B2 (en) * 2011-09-29 2013-07-02 Pacid Technologies, Llc Secure island computing system and method
US8649820B2 (en) 2011-11-07 2014-02-11 Blackberry Limited Universal integrated circuit card apparatus and related methods
US9503259B2 (en) * 2012-02-09 2016-11-22 Irdeto B.V. System and method for generating and protecting cryptographic keys
DE102013203357B4 (en) * 2012-03-01 2022-01-20 GM Global Technology Operations LLC (n. d. Ges. d. Staates Delaware) METHOD OF ESTABLISHING COMMUNICATION BETWEEN DEVICES IN A VEHICLE
EP2634993B1 (en) * 2012-03-01 2017-01-11 Certicom Corp. Devices and methods for connecting client devices to a network
US8936199B2 (en) 2012-04-13 2015-01-20 Blackberry Limited UICC apparatus and related methods
USD703208S1 (en) 2012-04-13 2014-04-22 Blackberry Limited UICC apparatus
USD701864S1 (en) * 2012-04-23 2014-04-01 Blackberry Limited UICC apparatus
US9021255B1 (en) * 2012-06-29 2015-04-28 Emc Corporation Techniques for multiple independent verifications for digital certificates
US9996480B2 (en) * 2012-07-18 2018-06-12 Analog Devices, Inc. Resilient device authentication system with metadata binding
US9904788B2 (en) * 2012-08-08 2018-02-27 Amazon Technologies, Inc. Redundant key management
AU2013216623B2 (en) * 2012-08-16 2018-07-05 Berkeley Information Technology Pty Ltd A device configured to manage secure ingestion of documents into an information system, and methods for operating such a device
ES2912265T3 (en) * 2012-08-30 2022-05-25 Triad Nat Security Llc Multi-factor authentication using quantum communication
US9390280B2 (en) * 2012-09-16 2016-07-12 Angel Secure Networks, Inc. System and method for obtaining keys to access protected information
EP2912588A4 (en) * 2012-10-25 2016-06-29 Intel Corp Anti-theft in firmware
US9357382B2 (en) * 2012-10-31 2016-05-31 Intellisist, Inc. Computer-implemented system and method for validating call connections
CN103793819B (en) * 2012-10-31 2017-12-19 天地融科技股份有限公司 transaction system and method
US8806200B2 (en) * 2012-11-30 2014-08-12 Prakash Baskaran Method and system for securing electronic data
US8897450B2 (en) * 2012-12-19 2014-11-25 Verifyle, Inc. System, processing device, computer program and method, to transparently encrypt and store data objects such that owners of the data object and permitted viewers are able to view decrypted data objects after entering user selected passwords
US9076018B2 (en) 2012-12-19 2015-07-07 Clevx, Llc Encryption key generation in encrypted storage devices
US9026888B2 (en) * 2012-12-21 2015-05-05 Intel Corporation Method, system and apparatus for providing access to error correction information
EP2951746B1 (en) * 2013-01-29 2019-10-30 BlackBerry Limited System and method of enhancing security of a wireless device through usage pattern detection
US10162426B2 (en) * 2013-02-20 2018-12-25 Sony Interactive Entertainment Inc. Character string input system
WO2014159862A1 (en) 2013-03-14 2014-10-02 Headwater Partners I Llc Automated credential porting for mobile devices
US11567907B2 (en) 2013-03-14 2023-01-31 Workshare, Ltd. Method and system for comparing document versions encoded in a hierarchical representation
US8949960B2 (en) * 2013-03-15 2015-02-03 Google Inc. Privacy preserving knowledge and factor possession tests for persistent authentication
JP5859484B2 (en) * 2013-05-31 2016-02-10 京セラドキュメントソリューションズ株式会社 Image forming apparatus, file browsing control system, and image forming method
JP6211818B2 (en) * 2013-06-11 2017-10-11 株式会社東芝 COMMUNICATION DEVICE, COMMUNICATION METHOD, PROGRAM, AND COMMUNICATION SYSTEM
WO2015004327A1 (en) * 2013-07-08 2015-01-15 Tuukka Korhonen Method and device for file encryption
US9369289B1 (en) 2013-07-17 2016-06-14 Google Inc. Methods and systems for performing secure authenticated updates of authentication credentials
US10911492B2 (en) 2013-07-25 2021-02-02 Workshare Ltd. System and method for securing documents prior to transmission
US9684805B2 (en) * 2013-08-20 2017-06-20 Janus Technologies, Inc. Method and apparatus for securing computer interfaces
WO2015056169A1 (en) 2013-10-16 2015-04-23 Axxana (Israel) Ltd. Zero-transaction-loss recovery for database systems
US9342331B2 (en) 2013-10-21 2016-05-17 International Business Machines Corporation Secure virtualized mobile cellular device
WO2015062904A1 (en) * 2013-10-28 2015-05-07 Kmaas Aps A system and a method for management of confidential data
US10548007B2 (en) 2013-11-15 2020-01-28 Here Global B.V. Security operations for wireless devices
CN104658073A (en) * 2013-11-20 2015-05-27 鸿富锦精密工业(武汉)有限公司 Iris key and method for unlocking electronic apparatus therewith
US20150172920A1 (en) * 2013-12-16 2015-06-18 Mourad Ben Ayed System for proximity based encryption and decryption
CN106063182B (en) * 2013-12-31 2019-11-19 威斯科数据安全国际有限公司 Electric endorsement method, system and equipment
EP2905922A1 (en) * 2014-02-10 2015-08-12 Thomson Licensing Signing method delivering a partial signature associated to a message, threshold signing method, signature verification method, and corresponding computer program and electronic devices
JP6359285B2 (en) * 2014-02-17 2018-07-18 株式会社東芝 Quantum key distribution apparatus, quantum key distribution system, and quantum key distribution method
WO2015142765A1 (en) 2014-03-17 2015-09-24 Coinbase, Inc Bitcoin host computer system
US10298555B2 (en) * 2014-04-04 2019-05-21 Zettaset, Inc. Securing files under the semi-trusted user threat model using per-file key encryption
US10873454B2 (en) 2014-04-04 2020-12-22 Zettaset, Inc. Cloud storage encryption with variable block sizes
US10043029B2 (en) 2014-04-04 2018-08-07 Zettaset, Inc. Cloud storage encryption
WO2015153698A2 (en) * 2014-04-05 2015-10-08 Azoulai Avi Secured private network and storage device
US11423169B1 (en) * 2014-04-14 2022-08-23 Goknown Llc System, method and apparatus for securely storing data on public networks
US9825925B2 (en) * 2014-06-11 2017-11-21 Bijit Hore Method and apparatus for securing sensitive data in a cloud storage system
US20150382190A1 (en) * 2014-06-25 2015-12-31 Qualcomm Incorporated Enhanced secure identity generation
GB2513260B (en) * 2014-06-27 2018-06-13 PQ Solutions Ltd System and method for quorum-based data recovery
US10083311B2 (en) * 2014-06-30 2018-09-25 Konica Minolta Laboratory U.S.A., Inc. Cryptographic key
US9378383B2 (en) 2014-08-21 2016-06-28 Seagate Technology Llc Location based disk drive access
US10721062B2 (en) 2014-09-24 2020-07-21 Hewlett Packard Enterprise Development Lp Utilizing error correction for secure secret sharing
US9526032B2 (en) * 2014-09-26 2016-12-20 Apple Inc. Network bandwidth sharing for small mobile devices
US9774591B2 (en) 2014-10-15 2017-09-26 Airbnb, Inc. Password manipulation for secure account creation and verification through third-party servers
US10326590B2 (en) * 2014-11-11 2019-06-18 Intel Corporation Technologies for trusted device on-boarding
TWI570711B (en) * 2014-12-12 2017-02-11 魏如隆 Dynamic spectrum audio encryption device and method thereof
US11182551B2 (en) 2014-12-29 2021-11-23 Workshare Ltd. System and method for determining document version geneology
US10133723B2 (en) 2014-12-29 2018-11-20 Workshare Ltd. System and method for determining document version geneology
US10187363B2 (en) 2014-12-31 2019-01-22 Visa International Service Association Hybrid integration of software development kit with secure execution environment
US10592682B2 (en) * 2015-02-20 2020-03-17 Mitsubishi Electric Corporation Data storage apparatus, data processing method, and computer readable medium adding a user attribute of a revoked user to an embedded decryption condition while encrypted data remains in an encrypted state
CN107409274B (en) 2015-03-06 2020-09-15 苹果公司 Determining when to establish a connection between a mobile client and a proxy device
US20160269403A1 (en) * 2015-03-12 2016-09-15 Wiacts Inc. Multi-factor user authentication
EP3070900A1 (en) * 2015-03-16 2016-09-21 Thomson Licensing Method and system of access of a mobile terminal to information in an area
US9565169B2 (en) * 2015-03-30 2017-02-07 Microsoft Technology Licensing, Llc Device theft protection associating a device identifier and a user identifier
CN106161402B (en) * 2015-04-22 2019-07-16 阿里巴巴集团控股有限公司 Encryption equipment key injected system, method and device based on cloud environment
US9735958B2 (en) 2015-05-19 2017-08-15 Coinbase, Inc. Key ceremony of a security system forming part of a host computer for cryptographic transactions
US9900769B2 (en) 2015-05-29 2018-02-20 Nagravision S.A. Methods and systems for establishing an encrypted-audio session
US11283604B2 (en) * 2015-05-29 2022-03-22 Microsoft Technology Licensing, Llc Sharing encrypted data with enhanced security by removing unencrypted metadata
US10122767B2 (en) 2015-05-29 2018-11-06 Nagravision S.A. Systems and methods for conducting secure VOIP multi-party calls
US9891882B2 (en) 2015-06-01 2018-02-13 Nagravision S.A. Methods and systems for conveying encrypted data to a communication device
US10379958B2 (en) 2015-06-03 2019-08-13 Axxana (Israel) Ltd. Fast archiving for database systems
US10356059B2 (en) 2015-06-04 2019-07-16 Nagravision S.A. Methods and systems for communication-session arrangement on behalf of cryptographic endpoints
EP3119031A1 (en) * 2015-07-16 2017-01-18 ABB Schweiz AG Encryption scheme using multiple parties
US11763013B2 (en) 2015-08-07 2023-09-19 Workshare, Ltd. Transaction document management system and method
US11329980B2 (en) * 2015-08-21 2022-05-10 Veridium Ip Limited System and method for biometric protocol standards
CN106470345B (en) 2015-08-21 2020-02-14 阿里巴巴集团控股有限公司 Video encryption transmission method, video decryption method, video encryption transmission device, video decryption device and video encryption transmission system
HK1204847A2 (en) * 2015-09-16 2015-12-04 英基科技有限公司 A time card punching system
US10044514B1 (en) * 2015-09-25 2018-08-07 Xilinx, Inc. Secure external key storage for programmable ICS
US9852300B2 (en) * 2015-09-25 2017-12-26 Saife, Inc. Secure audit logging
CN105224848B (en) * 2015-10-15 2019-06-21 京东方科技集团股份有限公司 A kind of equipment authentication method, apparatus and system
US10387636B2 (en) 2015-10-20 2019-08-20 Vivint, Inc. Secure unlock of a device
KR101777698B1 (en) * 2015-10-27 2017-09-12 라인 가부시키가이샤 User terminal, method and computer for receiving and sending messages
US11115393B2 (en) * 2015-10-27 2021-09-07 Line Corporation Message server, method for operating message server and computer-readable recording medium
US10380070B2 (en) * 2015-11-12 2019-08-13 International Business Machines Corporation Reading and writing a header and record on tape
CN105515764B (en) * 2015-12-08 2019-06-07 北京元心科技有限公司 A kind of method and apparatus for protecting key safety in the terminal
US9515401B1 (en) 2016-01-04 2016-12-06 International Business Machines Corporation Elastomeric electrical connector structure joining two hardware planes at right angles to each other
WO2017123433A1 (en) * 2016-01-04 2017-07-20 Clevx, Llc Data security system with encryption
US10559902B2 (en) 2016-01-04 2020-02-11 International Business Machines Corporation Electrical connection management using a card
US10270801B2 (en) * 2016-01-25 2019-04-23 Oath Inc. Compromised password detection based on abuse and attempted abuse
US20170230352A1 (en) * 2016-02-06 2017-08-10 Xiaoqing Chen Method and System for Securing Data
CN107086908B (en) 2016-02-15 2021-07-06 阿里巴巴集团控股有限公司 Quantum key distribution method and device
CN107086907B (en) 2016-02-15 2020-07-07 阿里巴巴集团控股有限公司 Key synchronization and packaging transfer method and device for quantum key distribution process
WO2017151080A1 (en) * 2016-03-03 2017-09-08 Сэргий Валэрийовыч АРТЭМЭНКО Personal identification system
JP6728799B2 (en) * 2016-03-11 2020-07-22 日本電気株式会社 Cryptographic communication system, cryptographic communication method, security chip, communication device, control method thereof, and control program
US10230522B1 (en) 2016-03-24 2019-03-12 Amazon Technologies, Inc. Network access control
US20190114439A1 (en) * 2016-04-01 2019-04-18 Telefonica Digital Espana, S.L.U. Method and system for protecting a computer file from a possible encryption performed by malicious code
US9590958B1 (en) 2016-04-14 2017-03-07 Wickr Inc. Secure file transfer
CN107347058B (en) 2016-05-06 2021-07-23 阿里巴巴集团控股有限公司 Data encryption method, data decryption method, device and system
CN105844120B (en) * 2016-05-05 2019-06-14 北京元心科技有限公司 A kind of method and system of integrated Encryption Algorithm
CN107370546B (en) 2016-05-11 2020-06-26 阿里巴巴集团控股有限公司 Eavesdropping detection method, data sending method, device and system
CN107404461B (en) 2016-05-19 2021-01-26 阿里巴巴集团控股有限公司 Data secure transmission method, client and server method, device and system
US10289835B1 (en) * 2016-06-13 2019-05-14 EMC IP Holding Company LLC Token seed protection for multi-factor authentication systems
US20170372085A1 (en) * 2016-06-28 2017-12-28 HGST Netherlands B.V. Protecting data in a storage device
US20180034787A1 (en) * 2016-08-01 2018-02-01 Vormetric, Inc. Data encryption key sharing for a storage system
WO2018029464A1 (en) * 2016-08-08 2018-02-15 Record Sure Limited A method of generating a secure record of a conversation
US10523423B2 (en) * 2016-08-10 2019-12-31 Nextlabs, Inc. Sharing encrypted documents within and outside an organization
CN107959567B (en) 2016-10-14 2021-07-27 阿里巴巴集团控股有限公司 Data storage method, data acquisition method, device and system
CN107959656B (en) 2016-10-14 2021-08-31 阿里巴巴集团控股有限公司 Data security guarantee system, method and device
CN107959566A (en) 2016-10-14 2018-04-24 阿里巴巴集团控股有限公司 Quantal data key agreement system and quantal data cryptographic key negotiation method
US10621351B2 (en) 2016-11-01 2020-04-14 Raptor Engineering, LLC. Systems and methods for tamper-resistant verification of firmware with a trusted platform module
US10191818B2 (en) * 2016-11-14 2019-01-29 Sap Se Filtered replication of data in distributed system of data centers
US10404667B2 (en) * 2016-11-17 2019-09-03 Bank Of America Corporation Secure, autonomous file encryption and decryption
US10164778B2 (en) 2016-12-15 2018-12-25 Alibaba Group Holding Limited Method and system for distributing attestation key and certificate in trusted computing
CN107005577B (en) * 2017-01-25 2021-06-25 深圳市汇顶科技股份有限公司 Fingerprint data processing method and processing device
US9992022B1 (en) 2017-02-06 2018-06-05 Northern Trust Corporation Systems and methods for digital identity management and permission controls within distributed network nodes
CN107070881B (en) * 2017-02-20 2020-11-27 北京古盘创世科技发展有限公司 Key management method, system and user terminal
US10360359B2 (en) * 2017-03-07 2019-07-23 International Business Machines Corporation Enabling single finger tap user authentication and application launch and login using fingerprint scanning on a display screen
US10592326B2 (en) 2017-03-08 2020-03-17 Axxana (Israel) Ltd. Method and apparatus for data loss assessment
CN108667608B (en) 2017-03-28 2021-07-27 阿里巴巴集团控股有限公司 Method, device and system for protecting data key
CN108667773B (en) 2017-03-30 2021-03-12 阿里巴巴集团控股有限公司 Network protection system, method, device and server
CN108736981A (en) 2017-04-19 2018-11-02 阿里巴巴集团控股有限公司 It is a kind of wirelessly to throw screen method, apparatus and system
US11270012B2 (en) 2017-04-21 2022-03-08 Hewlett-Packard Development Company, L.P. Encryption key shares to different devices for rendering
US10505723B1 (en) 2017-04-26 2019-12-10 Wells Fargo Bank, N.A. Secret sharing information management and security system
US10211979B2 (en) * 2017-05-19 2019-02-19 Swfl, Inc. Systems and methods securing an autonomous device
CA3060873A1 (en) * 2017-05-22 2018-11-29 Becton, Dickinson And Company Systems, apparatuses and methods for secure wireless pairing between two devices using embedded out-of-band (oob) key generation
US10154031B1 (en) 2017-06-12 2018-12-11 Ironclad Encryption Corporation User-wearable secured devices provided assuring authentication and validation of data storage and transmission
US10616192B2 (en) 2017-06-12 2020-04-07 Daniel Maurice Lerner Devices that utilize random tokens which direct dynamic random access
US10764282B2 (en) 2017-06-12 2020-09-01 Daniel Maurice Lerner Protected and secured user-wearable devices for assured authentication and validation of data storage and transmission that utilize securitized containers
US10623384B2 (en) 2017-06-12 2020-04-14 Daniel Maurice Lerner Combined hidden dynamic random-access devices utilizing selectable keys and key locators for communicating randomized data together with sub-channels and coded encryption keys
US10171435B1 (en) 2017-06-12 2019-01-01 Ironclad Encryption Corporation Devices that utilize random tokens which direct dynamic random access
US10154015B1 (en) 2017-06-12 2018-12-11 Ironclad Encryption Corporation Executable coded cipher keys
US10158613B1 (en) 2017-06-12 2018-12-18 Ironclad Encryption Corporation Combined hidden dynamic random-access devices utilizing selectable keys and key locators for communicating randomized data together with sub-channels and coded encryption keys
US10171444B1 (en) 2017-06-12 2019-01-01 Ironclad Encryption Corporation Securitization of temporal digital communications via authentication and validation for wireless user and access devices
US10154016B1 (en) 2017-06-12 2018-12-11 Ironclad Encryption Corporation Devices for transmitting and communicating randomized data utilizing sub-channels
US10645070B2 (en) 2017-06-12 2020-05-05 Daniel Maurice Lerner Securitization of temporal digital communications via authentication and validation for wireless user and access devices
US10154021B1 (en) 2017-06-12 2018-12-11 Ironclad Encryption Corporation Securitization of temporal digital communications with authentication and validation of user and access devices
US10650139B2 (en) 2017-06-12 2020-05-12 Daniel Maurice Lerner Securing temporal digital communications via authentication and validation for wireless user and access devices with securitized containers
CN107483192B (en) * 2017-08-25 2020-08-11 科华恒盛股份有限公司 Data transmission method and device based on quantum communication
GB2566107B (en) * 2017-09-05 2019-11-27 Istorage Ltd Methods and systems of securely transferring data
US11677743B2 (en) * 2017-09-28 2023-06-13 Fortinet, Inc. Ethernet key
JP6818220B2 (en) * 2017-10-19 2021-01-20 三菱電機株式会社 Key sharing device, key sharing method and key sharing program
GB2571059A (en) * 2017-11-30 2019-08-21 Bae Systems Plc Methods of decrypting disk images, and decryption-enabling devices
CN107908932B (en) * 2017-12-10 2020-10-13 吕文华 Digital currency anti-counterfeiting and verification method, system and equipment based on L algorithm
US9990504B1 (en) 2017-12-18 2018-06-05 Northern Trust Corporation Systems and methods for generating and maintaining immutable digital meeting records within distributed network nodes
JP6943196B2 (en) * 2018-02-05 2021-09-29 日本電信電話株式会社 Control system and control method
WO2019157503A1 (en) 2018-02-12 2019-08-15 Massachusetts Institute Of Technology Systems and methods for providing secure communications using a protocol engine
US10212599B1 (en) * 2018-02-19 2019-02-19 Nxp B.V. Method for preventing unauthorized use of electronic accessories
US11277421B2 (en) * 2018-02-20 2022-03-15 Citrix Systems, Inc. Systems and methods for detecting and thwarting attacks on an IT environment
US11115216B2 (en) * 2018-03-20 2021-09-07 Micro Focus Llc Perturbation-based order preserving pseudonymization of data
US10673626B2 (en) * 2018-03-30 2020-06-02 Spyrus, Inc. Threshold secret share authentication proof and secure blockchain voting with hardware security modules
WO2019195691A1 (en) 2018-04-05 2019-10-10 Daniel Maurice Lerner Discrete blockchain and blockchain communications
WO2019231445A1 (en) * 2018-05-31 2019-12-05 Hewlett-Packard Development Company, L.P. Trusted sequence for computing devices via hashes
US11627132B2 (en) * 2018-06-13 2023-04-11 International Business Machines Corporation Key-based cross domain registration and authorization
US10708050B2 (en) 2018-06-19 2020-07-07 TokenEx, LLC Multivariate encryption systems and methods
US10484770B1 (en) 2018-06-26 2019-11-19 Amazon Technologies, Inc. Display device with transverse planar microphone arrays
FR3085815B1 (en) * 2018-07-11 2022-07-15 Ledger SECURITY GOVERNANCE OF THE PROCESSING OF A DIGITAL REQUEST
US11449586B2 (en) 2018-07-20 2022-09-20 Massachusetts Institute Of Technology Authenticated intention
CN108900552B (en) * 2018-08-16 2019-10-15 北京海泰方圆科技股份有限公司 Cryptographic key distribution method and device, key acquisition method and device
US11171953B2 (en) 2018-08-16 2021-11-09 Hewlett Packard Enterprise Development Lp Secret sharing-based onboarding authentication
CN109450620B (en) 2018-10-12 2020-11-10 创新先进技术有限公司 Method for sharing security application in mobile terminal and mobile terminal
US11188719B1 (en) 2018-10-22 2021-11-30 Wells Fargo Bank, N.A. Predictive text system
GB2578767B (en) * 2018-11-07 2023-01-18 Istorage Ltd Methods and systems of securely transferring data
EP3654576B1 (en) * 2018-11-16 2021-07-28 Siemens Aktiengesellschaft Computer-implemented method for error-correction-encoding and encrypting of a file
US11140139B2 (en) * 2018-11-21 2021-10-05 Microsoft Technology Licensing, Llc Adaptive decoder selection for cryptographic key generation
US10938574B2 (en) * 2018-11-26 2021-03-02 T-Mobile Usa, Inc. Cryptographic font script with integrated signature for verification
US11394543B2 (en) 2018-12-13 2022-07-19 Coinbase, Inc. System and method for secure sensitive data storage and recovery
US11316144B1 (en) 2018-12-13 2022-04-26 Amazon Technologies, Inc. Lithium-ion batteries with solid electrolyte membranes
CN109992994A (en) * 2019-03-04 2019-07-09 众安信息技术服务有限公司 A kind of personnel file management method and system based on block chain
US10951415B2 (en) * 2019-03-13 2021-03-16 Digital 14 Llc System, method, and computer program product for implementing zero round trip secure communications based on noisy secrets with a polynomial secret sharing scheme
US11240026B2 (en) * 2019-05-16 2022-02-01 Blackberry Limited Devices and methods of managing data
CN114730420A (en) 2019-08-01 2022-07-08 科恩巴斯公司 System and method for generating signatures
US11347859B2 (en) * 2019-08-01 2022-05-31 Dell Products L.P. Systems and methods for leveraging authentication for cross operating system single sign on (SSO) capabilities
US11411728B2 (en) * 2019-08-19 2022-08-09 Red Hat, Inc. Proof-of-work key wrapping with individual key fragments
US11303437B2 (en) * 2019-08-19 2022-04-12 Red Hat, Inc. Proof-of-work key wrapping with key thresholding
US11271734B2 (en) 2019-08-19 2022-03-08 Red Hat, Inc. Proof-of-work key wrapping for verifying device capabilities
US11424920B2 (en) * 2019-08-19 2022-08-23 Red Hat, Inc. Proof-of-work key wrapping for cryptographically controlling data access
US11436352B2 (en) 2019-08-19 2022-09-06 Red Hat, Inc. Proof-of-work key wrapping for restricting data execution based on device capabilities
US11411938B2 (en) 2019-08-19 2022-08-09 Red Hat, Inc. Proof-of-work key wrapping with integrated key fragments
US11316839B2 (en) 2019-08-19 2022-04-26 Red Hat, Inc. Proof-of-work key wrapping for temporally restricting data access
US11212082B2 (en) * 2019-09-30 2021-12-28 Pq Solutions Limited Ciphertext based quorum cryptosystem
US11943350B2 (en) * 2019-10-16 2024-03-26 Coinbase, Inc. Systems and methods for re-using cold storage keys
US11328080B2 (en) * 2019-11-18 2022-05-10 Frostbyte, Llc Cryptographic key management
KR20210064854A (en) * 2019-11-26 2021-06-03 삼성전자주식회사 Memory controller, storage device including the same, and operating method of the memory controller
CN112861144B (en) * 2019-11-28 2022-06-07 深圳信息职业技术学院 Data encryption and decryption method, device and computer readable storage medium
US11429519B2 (en) 2019-12-23 2022-08-30 Alibaba Group Holding Limited System and method for facilitating reduction of latency and mitigation of write amplification in a multi-tenancy storage drive
EP3860035A1 (en) * 2020-01-29 2021-08-04 Sebastien Armleder Storing and determining a data element
US11271911B2 (en) 2020-02-26 2022-03-08 Amera Lot Inc. Method and apparatus for imprinting private key on IoT
US11258602B2 (en) * 2020-02-26 2022-02-22 Amera IoT Inc. Method and apparatus for secure private key storage on IoT device
US11256783B2 (en) * 2020-02-26 2022-02-22 Amera IoT Inc. Method and apparatus for simultaneous key generation on device and server for secure communication
US10817590B1 (en) * 2020-02-26 2020-10-27 Amera IoT Inc. Method and apparatus for creating and using quantum resistant keys
US11563568B2 (en) * 2020-02-27 2023-01-24 Comcast Cable Communications, Llc Scalable content restriction
US11223470B1 (en) 2020-03-06 2022-01-11 Wells Fargo Bank, N.A. Post-quantum cryptography side chain
US11483141B2 (en) 2020-06-03 2022-10-25 Capital One Services, Llc Key broker for a network monitoring device, and applications thereof
US11336542B2 (en) 2020-06-03 2022-05-17 Capital One Services, Llc Network packet capture manager
US11349647B2 (en) 2020-06-03 2022-05-31 Capital One Services, Llc Key broker for a network monitoring device, and applications thereof
CA3181309A1 (en) * 2020-06-03 2021-12-09 John Watson A network monitoring device, and applications thereof
US20210406851A1 (en) * 2020-06-25 2021-12-30 Ncr Corporation Zero Client Self-Service Terminal (SST) with Middleware Delivered Services
US20220209944A1 (en) * 2020-12-30 2022-06-30 John A. Nix Secure Server Digital Signature Generation For Post-Quantum Cryptography Key Encapsulations
US11461084B2 (en) * 2021-03-05 2022-10-04 EMC IP Holding Company LLC Optimizing docker image encryption—kubernetes using shamir secrets to enforce multiple constraints in container runtime environment
US11792645B2 (en) 2021-03-10 2023-10-17 Qualcomm Incorporated Authenticating plaintext and ciphertext in a vehicle-to-everything (V2X) message
WO2022191908A1 (en) * 2021-03-10 2022-09-15 Qualcomm Incorporated Authenticating plaintext and ciphertext in a vehicle-to-everything (v2x) message
US20220303137A1 (en) * 2021-03-17 2022-09-22 Apple Inc. Pairing protocol for peripherals with a secure function
US11610004B2 (en) * 2021-04-14 2023-03-21 Bank Of America Corporation System for implementing enhanced file encryption technique
CN113179161B (en) * 2021-04-22 2022-11-08 平安消费金融有限公司 Method and device for replacing secret key, computer equipment and storage medium
IT202100016706A1 (en) * 2021-06-25 2022-12-25 Epityon S R L S Integral password recovery method without clear storage with verification system
GB2608435B (en) * 2021-07-02 2023-07-12 Worldr Tech Limited System and method for managing transparent data encryption of database
GB2606782A (en) * 2021-10-19 2022-11-23 Istorage Ltd Portable encryption device
CN113938278B (en) * 2021-10-25 2024-03-15 北京计算机技术及应用研究所 Key management and protection method for encrypted hard disk
US11706225B1 (en) 2022-05-02 2023-07-18 Bank Of America Corporation System for source independent but source value dependent transfer monitoring
CN115694817B (en) * 2022-10-27 2023-07-14 亿铸科技(杭州)有限责任公司 Method and device for improving internal data security of in-memory computing chip
CN116089986B (en) * 2023-04-07 2023-08-25 深圳天谷信息科技有限公司 Electronic document management method, device, equipment and medium capable of configuring security policy

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001060254A (en) * 1999-06-15 2001-03-06 Matsushita Electric Ind Co Ltd Deciphering processor performing deciphering process for specific area in content data
US20020164033A1 (en) * 2001-03-06 2002-11-07 Sanguthevar Rajasekaran Efficient techniques for sharing a secret
US20060130129A1 (en) * 2003-06-13 2006-06-15 Huafeng Dai Authentication method based on private space of the usb flash memory media
US20060242423A1 (en) * 2005-04-22 2006-10-26 Kussmaul John W Isolated authentication device and associated methods

Family Cites Families (59)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5677953A (en) * 1993-09-14 1997-10-14 Spyrus, Inc. System and method for access control for portable data storage media
IL110891A (en) * 1993-09-14 1999-03-12 Spyrus System and method for data access control
US5536164A (en) * 1995-05-05 1996-07-16 Electra Form, Inc. Flexible hot manifold assembly for injection molding machines
US5857025A (en) * 1996-09-09 1999-01-05 Intelligent Security Systems, Inc. Electronic encryption device and method
US5937063A (en) * 1996-09-30 1999-08-10 Intel Corporation Secure boot
US5937066A (en) * 1996-10-02 1999-08-10 International Business Machines Corporation Two-phase cryptographic key recovery system
GB9621274D0 (en) * 1996-10-11 1996-11-27 Certicom Corp Signature protocol for mail delivery
US6035041A (en) * 1997-04-28 2000-03-07 Certco, Inc. Optimal-resilience, proactive, public-key cryptographic system and method
US6122742A (en) * 1997-06-18 2000-09-19 Young; Adam Lucas Auto-recoverable and auto-certifiable cryptosystem with unescrowed signing keys
US6088802A (en) * 1997-06-04 2000-07-11 Spyrus, Inc. Peripheral device with integrated security functionality
US6003135A (en) * 1997-06-04 1999-12-14 Spyrus, Inc. Modular security device
US6134660A (en) * 1997-06-30 2000-10-17 Telcordia Technologies, Inc. Method for revoking computer backup files using cryptographic techniques
US6708273B1 (en) * 1997-09-16 2004-03-16 Safenet, Inc. Apparatus and method for implementing IPSEC transforms within an integrated circuit
US6981149B1 (en) * 1998-01-27 2005-12-27 Spyrus, Inc. Secure, easy and/or irreversible customization of cryptographic device
US6292898B1 (en) * 1998-02-04 2001-09-18 Spyrus, Inc. Active erasure of electronically stored data upon tamper detection
US6848050B1 (en) * 1998-04-16 2005-01-25 Citicorp Development Center, Inc. System and method for alternative encryption techniques
US6055508A (en) * 1998-06-05 2000-04-25 Yeda Research And Development Co. Ltd. Method for secure accounting and auditing on a communications network
US6295602B1 (en) * 1998-12-30 2001-09-25 Spyrus, Inc. Event-driven serialization of access to shared resources
AU776027C (en) * 1999-03-08 2005-04-07 Spyrus, Inc. Method and system for enforcing access to a computing resource using a licensing attribute certificate
US6901145B1 (en) * 1999-04-08 2005-05-31 Lucent Technologies Inc. Generation of repeatable cryptographic key based on varying parameters
US6971022B1 (en) * 1999-06-15 2005-11-29 Matsushita Electric Industrial Co., Ltd. Cryptographic apparatus for performing cryptography on a specified area of content data
US6816965B1 (en) * 1999-07-16 2004-11-09 Spyrus, Inc. Method and system for a policy enforcing module
US6970849B1 (en) * 1999-12-17 2005-11-29 Microsoft Corporation Inter-server communication using request with encrypted parameter
EP1624609B1 (en) * 2000-01-21 2011-08-24 Sony Computer Entertainment Inc. Encryption data processing apparatus and method
US7000108B1 (en) * 2000-05-02 2006-02-14 International Business Machines Corporation System, apparatus and method for presentation and manipulation of personal information syntax objects
EP2955652A1 (en) * 2000-06-16 2015-12-16 MIH Technology Holdings BV Methods and systems to distribute content via a network utilizing distributed conditional access agents and secure agents, and to perform digital rights management (drm)
AU7182701A (en) * 2000-07-06 2002-01-21 David Paul Felsher Information record infrastructure, system and method
US7313825B2 (en) * 2000-11-13 2007-12-25 Digital Doors, Inc. Data security system and method for portable device
US7143437B2 (en) * 2001-01-12 2006-11-28 Siemens Medical Solutions Health Services Corporation System and user interface for managing user access to network compatible applications
US20020129261A1 (en) * 2001-03-08 2002-09-12 Cromer Daryl Carvis Apparatus and method for encrypting and decrypting data recorded on portable cryptographic tokens
US20030037237A1 (en) * 2001-04-09 2003-02-20 Jean-Paul Abgrall Systems and methods for computer device authentication
US7088821B2 (en) * 2001-05-03 2006-08-08 Cheman Shaik Absolute public key cryptographic system and method surviving private-key compromise with other advantages
US7257844B2 (en) * 2001-07-31 2007-08-14 Marvell International Ltd. System and method for enhanced piracy protection in a wireless personal communication device
GB0119629D0 (en) * 2001-08-10 2001-10-03 Cryptomathic As Data certification method and apparatus
US7266699B2 (en) * 2001-08-30 2007-09-04 Application Security, Inc. Cryptographic infrastructure for encrypting a database
US20030046534A1 (en) * 2001-08-31 2003-03-06 Alldredge Robert L. Method and apparatus for secured electronic commerce
KR100529550B1 (en) * 2001-10-18 2005-11-22 한국전자통신연구원 Method for modifying authority of a certificate of authentication using information of a biometrics in a pki infrastructure
US7043643B1 (en) * 2001-12-06 2006-05-09 Adaptec, Inc. Method and apparatus for operating a computer in a secure mode
US6928476B2 (en) * 2002-08-23 2005-08-09 Mirra, Inc. Peer to peer remote data storage and collaboration
GB0221639D0 (en) * 2002-09-17 2002-10-30 Hewlett Packard Co Method and apparatus for printing
US7849016B2 (en) * 2002-12-18 2010-12-07 Vincent So Internet-based data content rental system and method
US7257717B2 (en) * 2003-04-01 2007-08-14 Fineart Technology Co., Ltd Method with the functions of virtual space and data encryption and invisibility
EP1678869A1 (en) * 2003-10-08 2006-07-12 Stephan J. Engberg Method and sytem for establishing a communication using privacy enhancing techniques
FR2864387B1 (en) * 2003-12-23 2006-04-28 Eads Telecom METHOD AND DEVICE FOR TRANSMITTING INFORMATION WITH VERIFICATION OF INVOLUNTARY OR VOLUNTARY TRANSMISSION ERRORS
US7930503B2 (en) * 2004-01-26 2011-04-19 Hewlett-Packard Development Company, L.P. Method and apparatus for operating multiple security modules
US20060075263A1 (en) * 2004-03-15 2006-04-06 Jesse Taylor System and method for security and file retrieval from remote computer
US8050409B2 (en) * 2004-04-02 2011-11-01 University Of Cincinnati Threshold and identity-based key management and authentication for wireless ad hoc networks
US8015211B2 (en) * 2004-04-21 2011-09-06 Architecture Technology Corporation Secure peer-to-peer object storage system
CN1947372A (en) * 2004-04-23 2007-04-11 松下电器产业株式会社 Personal information management device, distributed key storage device, and personal information management system
US7590236B1 (en) * 2004-06-04 2009-09-15 Voltage Security, Inc. Identity-based-encryption system
US7693286B2 (en) * 2004-07-14 2010-04-06 Intel Corporation Method of delivering direct proof private keys in signed groups to devices using a distribution CD
US7639799B2 (en) * 2004-12-14 2009-12-29 Microsoft Corporation Cryptographically processing data based on a Cassels-Tate pairing
US20060182277A1 (en) * 2005-02-14 2006-08-17 Tricipher, Inc. Roaming utilizing an asymmetric key pair
JP4961798B2 (en) * 2005-05-20 2012-06-27 株式会社日立製作所 Encrypted communication method and system
US7814318B1 (en) * 2005-09-27 2010-10-12 Oracle America, Inc. Scalable file system configured to make files permanently unreadable
US7587045B2 (en) * 2005-10-03 2009-09-08 Kabushiki Kaisha Toshiba System and method for securing document transmittal
US20080263363A1 (en) * 2007-01-22 2008-10-23 Spyrus, Inc. Portable Data Encryption Device with Configurable Security Functionality and Method for File Encryption
KR101520617B1 (en) * 2007-04-17 2015-05-15 삼성전자주식회사 Method for encrypting message for keeping integrity of message and apparatus and Method for decrypting message for keeping integrity of message and apparatus
WO2010019918A1 (en) * 2008-08-15 2010-02-18 Qualys, Inc. System and method for performing remote security assessment of firewalled computer

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001060254A (en) * 1999-06-15 2001-03-06 Matsushita Electric Ind Co Ltd Deciphering processor performing deciphering process for specific area in content data
US20020164033A1 (en) * 2001-03-06 2002-11-07 Sanguthevar Rajasekaran Efficient techniques for sharing a secret
US20060130129A1 (en) * 2003-06-13 2006-06-15 Huafeng Dai Authentication method based on private space of the usb flash memory media
US20060242423A1 (en) * 2005-04-22 2006-10-26 Kussmaul John W Isolated authentication device and associated methods

Also Published As

Publication number Publication date
US9521123B2 (en) 2016-12-13
EP2122900A4 (en) 2014-07-23
WO2008147577A2 (en) 2008-12-04
IL236641A (en) 2017-03-30
US20080263363A1 (en) 2008-10-23
US20160021109A1 (en) 2016-01-21
US20130046993A1 (en) 2013-02-21
EP2122900A2 (en) 2009-11-25
IL199983A0 (en) 2010-04-15
IL199983A (en) 2015-01-29
IL236641A0 (en) 2015-02-26
US20160021068A1 (en) 2016-01-21
US9049010B2 (en) 2015-06-02

Similar Documents

Publication Publication Date Title
WO2008147577A3 (en) Portable data encryption device with configurable security functionality and method for file encryption
US9143317B2 (en) Protecting against white box attacks using column rotation
GB2572088A (en) Controlling access to a locked space using cryptographic keys stored on a blockchain
WO2014083335A3 (en) A method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors
US9608822B2 (en) Method for generating an HTML document that contains encrypted files and the code necessary for decrypting them when a valid passphrase is provided
EP3035641A1 (en) Method for file upload to cloud storage system, download method and device
WO2007069236A3 (en) Method and system for usage of block cipher encryption
CN105656621A (en) Safety management method for cryptographic device
US20150215117A1 (en) White box encryption apparatus and method
TW200701791A (en) Method and apparatus for encrypting and decrypting digital data
CN106411515B (en) The method and system for promoting key safety are split to key using cipher machine
CN105406969A (en) Apparatus And Method For Data Encryption
WO2014113132A3 (en) Method for secure symbol comparison
US9654279B2 (en) Security module for secure function execution on untrusted platform
EP3311320A1 (en) Accelerated encryption and decryption of files with shared secret and method therefor
MX2018007696A (en) Method and system for enhancing the security of a transaction.
KR20170097509A (en) Operation method based on white-box cryptography and security apparatus for performing the method
EP3035584B1 (en) Using single white-box implementation with multiple external encodings
CN110298186A (en) A kind of non-key data encipher-decipher method based on dynamic reconfigurable crypto chip
WO2008154049A3 (en) Cryptographically controlling access to documents
US20230153445A1 (en) Enhanced security systems and methods using a hybrid security solution
Hussien et al. Scheme for ensuring data security on cloud data storage in a semi-trusted third party auditor
CN103491384A (en) Encrypting method and device of video and decrypting method and device of video
CN103532958A (en) Method for encrypting website resources
Kapusta et al. Secure data sharing with fast access revocation through untrusted clouds

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08825845

Country of ref document: EP

Kind code of ref document: A2

WWE Wipo information: entry into national phase

Ref document number: 199983

Country of ref document: IL

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 1422/MUMNP/2009

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: 2008825845

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 236641

Country of ref document: IL