WO2006020426A3 - Cryptographic key construct - Google Patents

Cryptographic key construct Download PDF

Info

Publication number
WO2006020426A3
WO2006020426A3 PCT/US2005/026908 US2005026908W WO2006020426A3 WO 2006020426 A3 WO2006020426 A3 WO 2006020426A3 US 2005026908 W US2005026908 W US 2005026908W WO 2006020426 A3 WO2006020426 A3 WO 2006020426A3
Authority
WO
WIPO (PCT)
Prior art keywords
cryptographic key
write
key
computer
read
Prior art date
Application number
PCT/US2005/026908
Other languages
French (fr)
Other versions
WO2006020426A2 (en
Inventor
Gerald D Kimmel
Ersin L Domangue
Original Assignee
Infoassure Inc
Gerald D Kimmel
Ersin L Domangue
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Infoassure Inc, Gerald D Kimmel, Ersin L Domangue filed Critical Infoassure Inc
Publication of WO2006020426A2 publication Critical patent/WO2006020426A2/en
Publication of WO2006020426A3 publication Critical patent/WO2006020426A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/065Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Abstract

A computer program, for producing a cryptographic key label for use in exchanging information between first and second organizations of members, resides on a computer-readable medium includes computer-readable instructions configured to cause a computer to: produce a read-write cryptographic key using at least one base value; produce a write-only cryptographic key using the read-write cryptographic key; combine a first identifier, uniquely associated with the first organization, and a second identifier, uniquely associated with the key label to be produced, using a one-way function to produce a pedigree; and associate the pedigree with the read-write key and the write-only key to form the cryptographic key label.
PCT/US2005/026908 2004-07-29 2005-07-29 Cryptographic key construct WO2006020426A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US59194404P 2004-07-29 2004-07-29
US60/591,944 2004-07-29

Publications (2)

Publication Number Publication Date
WO2006020426A2 WO2006020426A2 (en) 2006-02-23
WO2006020426A3 true WO2006020426A3 (en) 2009-04-16

Family

ID=35787850

Family Applications (4)

Application Number Title Priority Date Filing Date
PCT/US2005/026908 WO2006020426A2 (en) 2004-07-29 2005-07-29 Cryptographic key construct
PCT/US2005/026802 WO2007001328A2 (en) 2004-07-29 2005-07-29 Information-centric security
PCT/US2005/026804 WO2007001329A2 (en) 2004-07-29 2005-07-29 Cryptographic key management
PCT/US2005/026907 WO2006015182A2 (en) 2004-07-29 2005-07-29 Object access level

Family Applications After (3)

Application Number Title Priority Date Filing Date
PCT/US2005/026802 WO2007001328A2 (en) 2004-07-29 2005-07-29 Information-centric security
PCT/US2005/026804 WO2007001329A2 (en) 2004-07-29 2005-07-29 Cryptographic key management
PCT/US2005/026907 WO2006015182A2 (en) 2004-07-29 2005-07-29 Object access level

Country Status (2)

Country Link
US (4) US7711120B2 (en)
WO (4) WO2006020426A2 (en)

Families Citing this family (174)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AP2005003476A0 (en) * 2003-06-05 2005-12-31 Intertrust Tech Corp Interoperable systems and methods for peer-to-peerservice orchestration.
US8031865B2 (en) * 2004-01-08 2011-10-04 Encryption Solutions, Inc. Multiple level security system and method for encrypting data within documents
US9081872B2 (en) 2004-06-25 2015-07-14 Apple Inc. Methods and systems for managing permissions data and/or indexes
US8131674B2 (en) 2004-06-25 2012-03-06 Apple Inc. Methods and systems for managing data
US20050289127A1 (en) * 2004-06-25 2005-12-29 Dominic Giampaolo Methods and systems for managing data
WO2006020426A2 (en) * 2004-07-29 2006-02-23 Infoassure, Inc. Cryptographic key construct
EP1848143A4 (en) * 2005-02-10 2010-04-14 Nec Corp Member certificate acquiring device, member certificate issuing device, group signing device, and group signature verifying device
EP1742475A1 (en) * 2005-07-07 2007-01-10 Nagravision S.A. Method to control access to enciphered data
US9858433B2 (en) * 2005-09-16 2018-01-02 Koninklijke Philips N.V. Cryptographic role-based access control
AU2006304655B2 (en) * 2005-10-18 2012-08-16 Intertrust Technologies Corporation Methods for digital rights management
US9626667B2 (en) * 2005-10-18 2017-04-18 Intertrust Technologies Corporation Digital rights management engine systems and methods
US20070204078A1 (en) * 2006-02-09 2007-08-30 Intertrust Technologies Corporation Digital rights management engine systems and methods
US7788484B2 (en) * 2005-11-30 2010-08-31 Microsoft Corporation Using hierarchical identity based cryptography for authenticating outbound mail
US20070143601A1 (en) * 2005-12-15 2007-06-21 Arroyo Diana J System and method for authorizing information flows
US7647630B2 (en) * 2005-12-15 2010-01-12 International Business Machines Corporation Associating security information with information objects in a data processing system
US8711888B2 (en) 2005-12-30 2014-04-29 Remec Broadband Wireless Llc Digital microwave radio link with adaptive data rate
US9059866B2 (en) * 2005-12-30 2015-06-16 Remec Broadband Wireless Holdings, Inc. Digital microwave radio system and method with encryption
US8731007B2 (en) 2005-12-30 2014-05-20 Remec Broadband Wireless, Llc Digital microwave radio link with a variety of ports
US7499552B2 (en) * 2006-01-11 2009-03-03 International Business Machines Corporation Cipher method and system for verifying a decryption of an encrypted user data key
US20100235924A1 (en) * 2006-01-20 2010-09-16 Bulot Earl J Secure Personal Medical Process
US20070180259A1 (en) * 2006-01-20 2007-08-02 Bulot Earl J Secure Personal Medical Process
US9137012B2 (en) 2006-02-03 2015-09-15 Emc Corporation Wireless authentication methods and apparatus
FR2898002B1 (en) * 2006-02-28 2008-06-27 Thales Sa METHOD FOR MANAGING AND CONTROLLING ACCESS KEYS TO SERVICES IN A COMMUNICATION SYSTEM
CA2546148A1 (en) * 2006-05-09 2007-11-09 Nikolajs Volkovs Method, system and computer program for polynomial based hashing and message authentication coding with separate generation of spectrums
US8090944B2 (en) * 2006-07-05 2012-01-03 Rockstar Bidco Lp Method and apparatus for authenticating users of an emergency communication network
US20080028214A1 (en) * 2006-07-28 2008-01-31 Ronald Tafoya Secure flash media for medical records
US7941640B1 (en) * 2006-08-25 2011-05-10 Marvell International Ltd. Secure processors having encoded instructions
US9064135B1 (en) * 2006-12-12 2015-06-23 Marvell International Ltd. Hardware implemented key management system and method
US8887296B2 (en) * 2006-12-12 2014-11-11 The Boeing Company Method and system for object-based multi-level security in a service oriented architecture
US8015224B1 (en) * 2006-12-27 2011-09-06 Marvell International Ltd. Entropy source for random number generation
WO2008109150A1 (en) * 2007-03-06 2008-09-12 Secude International System and method for providing secure authentication of devices awakened from powered sleep state
US8391479B2 (en) * 2007-03-07 2013-03-05 Research In Motion Limited Combining interleaving with fixed-sequence windowing in an elliptic curve scalar multiplication
US8683549B2 (en) * 2007-03-23 2014-03-25 Microsoft Corporation Secure data storage and retrieval incorporating human participation
US8443191B2 (en) 2007-04-09 2013-05-14 Objective Interface Systems, Inc. System and method for accessing information resources using cryptographic authorization permits
US7773753B2 (en) * 2007-06-28 2010-08-10 Aladdin Knowledge Systems Ltd. Efficient remotely-keyed symmetric cryptography for digital rights management
US8646045B1 (en) * 2007-07-26 2014-02-04 United Services Automobile Association (Usaa) Bank speech authentication
WO2009018483A1 (en) * 2007-07-31 2009-02-05 Viasat, Inc. Input output access controller
US20090077371A1 (en) * 2007-09-14 2009-03-19 Valicore Technologies, Inc. Systems and methods for a template-based encryption management system
CN103152170A (en) * 2007-09-14 2013-06-12 安全第一公司 Systems and methods for managing cryptographic keys
US8160247B2 (en) * 2007-09-27 2012-04-17 Adobe Systems Incorporated Providing local storage service to applications that run in an application execution environment
FR2925732B1 (en) * 2007-12-21 2010-02-12 Sagem Securite GENERATION AND USE OF A BIOMETRIC KEY
US20110126293A1 (en) * 2007-12-27 2011-05-26 Pavel Berengoltz System and method for contextual and behavioral based data access control
US8117447B2 (en) * 2008-01-10 2012-02-14 Industrial Technology Research Institute Authentication method employing elliptic curve cryptography
CA2621147C (en) * 2008-02-15 2013-10-08 Connotech Experts-Conseils Inc. Method of bootstrapping an authenticated data session configuration
AU2008356253A1 (en) * 2008-05-16 2009-11-19 Objective Interface Systems, Inc. System and method that uses cryptographic certificates to define groups of entities
US8380981B2 (en) * 2008-05-16 2013-02-19 Objective Interface Systems, Inc. System and method that uses cryptographic certificates to define groups of entities
US9832069B1 (en) 2008-05-30 2017-11-28 F5 Networks, Inc. Persistence based on server response in an IP multimedia subsystem (IMS)
US8214404B2 (en) 2008-07-11 2012-07-03 Avere Systems, Inc. Media aware distributed data layout
US9323681B2 (en) 2008-09-18 2016-04-26 Avere Systems, Inc. File storage system, cache appliance, and method
GB0813298D0 (en) * 2008-07-19 2008-08-27 Univ St Andrews Multipad encryption
CA2769682C (en) * 2008-08-01 2015-03-03 Nikolajs Volkovs System and method for the calculation of a polynomial-based hash function and the erindale-plus hashing algorithm
WO2010026561A2 (en) * 2008-09-08 2010-03-11 Confidato Security Solutions Ltd. An appliance, system, method and corresponding software components for encrypting and processing data
US8190636B2 (en) * 2008-09-30 2012-05-29 Nokia Corporation Method, apparatus and computer program product for providing object privilege modification
US8595804B2 (en) * 2008-11-06 2013-11-26 At&T Intellectual Property I, L.P. System and method for device security with a plurality of authentication modes
US8381279B2 (en) * 2009-02-13 2013-02-19 Microsoft Corporation Constraining a login to a subset of access rights
US8364984B2 (en) 2009-03-13 2013-01-29 Microsoft Corporation Portable secure data files
US20100241668A1 (en) * 2009-03-17 2010-09-23 Microsoft Corporation Local Computer Account Management at Domain Level
US20100275265A1 (en) * 2009-04-27 2010-10-28 Michael Stephen Fiske System for securing transactions across insecure networks
US9047477B2 (en) * 2009-05-26 2015-06-02 Microsoft Technology Licensing, Llc Distributed key encryption in servers
US9231758B2 (en) * 2009-11-16 2016-01-05 Arm Technologies Israel Ltd. System, device, and method of provisioning cryptographic data to electronic devices
US10454674B1 (en) * 2009-11-16 2019-10-22 Arm Limited System, method, and device of authenticated encryption of messages
TWI517653B (en) * 2009-11-16 2016-01-11 Arm科技有限公司 An electronic device and method for cryptographic material provisioning
GB201000288D0 (en) * 2010-01-11 2010-02-24 Scentrics Information Security System and method of enforcing a computer policy
US9191200B1 (en) * 2010-10-07 2015-11-17 L-3 Communications Corp. System and method for changing the security level of a communications terminal during operation
EP2442483A3 (en) * 2010-10-15 2012-08-15 Certicom Corp. Elliptic curve Pinstov Vanstone signature scheme with authenticated message recovery
US10162553B2 (en) 2010-11-24 2018-12-25 Western Digital Technologies, Inc. Methods and systems for object level de-duplication for solid state devices
US9058497B2 (en) * 2010-12-23 2015-06-16 Microsoft Technology Licensing, Llc Cryptographic key management
AU2012210978B2 (en) * 2011-01-28 2015-11-26 Royal Canadian Mint/Monnaie Royal Canadienne Controlled security domains
DE112012000358B4 (en) 2011-03-02 2019-08-14 International Business Machines Corporation Cross-company data exchange
US9432342B1 (en) * 2011-03-08 2016-08-30 Ciphercloud, Inc. System and method to anonymize data transmitted to a destination computing device
US9264230B2 (en) 2011-03-14 2016-02-16 International Business Machines Corporation Secure key management
CA2773293A1 (en) * 2011-04-10 2012-10-10 Qnx Software Systems Limited Multiple independent encryption domains
WO2012142178A2 (en) 2011-04-11 2012-10-18 Intertrust Technologies Corporation Information security systems and methods
US8619990B2 (en) 2011-04-27 2013-12-31 International Business Machines Corporation Secure key creation
US8566913B2 (en) 2011-05-04 2013-10-22 International Business Machines Corporation Secure key management
US8789210B2 (en) 2011-05-04 2014-07-22 International Business Machines Corporation Key usage policies for cryptographic keys
US8755527B2 (en) 2011-05-04 2014-06-17 International Business Machines Corporation Key management policies for cryptographic keys
US8634561B2 (en) * 2011-05-04 2014-01-21 International Business Machines Corporation Secure key management
US8914635B2 (en) * 2011-07-25 2014-12-16 Grey Heron Technologies, Llc Method and system for establishing secure communications using composite key cryptography
WO2013016514A1 (en) * 2011-07-26 2013-01-31 Mine Safety Appliances Company Incident management and monitoring systems and methods
US8752143B2 (en) * 2011-08-15 2014-06-10 Bank Of America Corporation Method and apparatus for token-based reassignment of privileges
JP5837208B2 (en) 2011-09-28 2015-12-24 ヒューレット−パッカード デベロップメント カンパニー エル.ピー.Hewlett‐Packard Development Company, L.P. Unlock storage device
US10797864B2 (en) 2011-11-21 2020-10-06 Combined Conditional Access Development And Support, Llc System and method for authenticating data while minimizing bandwidth
GB2513798B (en) 2012-02-01 2021-03-03 Finjan Blue Inc A method for optimizing processing of restricted-access data
US9069634B2 (en) * 2012-03-09 2015-06-30 Blackberry Limited Signature representation of data with aliasing across synonyms
GB201205661D0 (en) * 2012-03-30 2012-05-16 Bae Systems Plc Security
US9116969B2 (en) 2012-04-30 2015-08-25 International Business Machines Corporation Generation of electronic pedigree
US8707454B1 (en) 2012-07-16 2014-04-22 Wickr Inc. Multi party messaging
US9430634B1 (en) 2012-10-23 2016-08-30 Emc Corporation Authentication using gesture passwords
US9397992B1 (en) * 2013-10-23 2016-07-19 Emc Corporation Authentication using color-shape pairings
US10430839B2 (en) * 2012-12-12 2019-10-01 Cisco Technology, Inc. Distributed advertisement insertion in content-centric networks
CN103051628B (en) * 2012-12-21 2016-05-11 微梦创科网络科技(中国)有限公司 Obtain the method and system of authentication token based on server
CN103905197B (en) * 2012-12-30 2018-04-13 北京握奇数据系统有限公司 A kind of method that SIM card and external equipment are bound and verified
CN103929303B (en) * 2013-01-11 2018-06-26 华立科技股份有限公司 A kind of key management apparatus of metering automation system
US8891773B2 (en) * 2013-02-11 2014-11-18 Lsi Corporation System and method for key wrapping to allow secure access to media by multiple authorities with modifiable permissions
US10078524B2 (en) * 2013-03-01 2018-09-18 Hewlett Packard Enterprise Development Lp Secure configuration of a headless networking device
US9853979B1 (en) * 2013-03-11 2017-12-26 Amazon Technologies, Inc. Immediate policy effectiveness in eventually consistent systems
US9380023B2 (en) * 2013-05-13 2016-06-28 Owl Computing Technologies, Inc. Enterprise cross-domain solution having configurable data filters
US10129260B1 (en) 2013-06-25 2018-11-13 Wickr Inc. Mutual privacy management
US9866591B1 (en) 2013-06-25 2018-01-09 Wickr Inc. Enterprise messaging platform
US9830089B1 (en) 2013-06-25 2017-11-28 Wickr Inc. Digital data sanitization
US10567349B2 (en) 2013-06-25 2020-02-18 Wickr Inc. Secure time-to-live
US9779261B2 (en) 2013-09-20 2017-10-03 Oracle International Corporation Entity security implied by an asset in a repository system
US9384362B2 (en) * 2013-10-14 2016-07-05 Intuit Inc. Method and system for distributing secrets
US9396338B2 (en) 2013-10-15 2016-07-19 Intuit Inc. Method and system for providing a secure secrets proxy
US9894069B2 (en) 2013-11-01 2018-02-13 Intuit Inc. Method and system for automatically managing secret application and maintenance
US9467477B2 (en) * 2013-11-06 2016-10-11 Intuit Inc. Method and system for automatically managing secrets in multiple data security jurisdiction zones
US9444818B2 (en) 2013-11-01 2016-09-13 Intuit Inc. Method and system for automatically managing secure communications in multiple communications jurisdiction zones
US9691044B2 (en) * 2013-11-05 2017-06-27 Bank Of America Corporation Application shell login role based access control
US9282122B2 (en) 2014-04-30 2016-03-08 Intuit Inc. Method and apparatus for multi-tenancy secrets management
EP2884692B1 (en) * 2013-12-13 2020-05-20 Nxp B.V. Updating software on a secure element
US9698976B1 (en) 2014-02-24 2017-07-04 Wickr Inc. Key management and dynamic perfect forward secrecy
GB2523759A (en) 2014-03-04 2015-09-09 Ibm Method for processing of restricted data
US20210182863A1 (en) * 2014-04-23 2021-06-17 Minkasu, Inc. Authenticating Transactions Using Biometric Authentication
US9584530B1 (en) 2014-06-27 2017-02-28 Wickr Inc. In-band identity verification and man-in-the-middle defense
EP3164960B1 (en) * 2014-07-03 2019-05-15 Apple Inc. Methods and apparatus for establishing a secure communication channel
US10037286B2 (en) * 2014-08-26 2018-07-31 Red Hat, Inc. Private partition with hardware unlocking
CN111756533B (en) 2014-08-29 2023-07-04 维萨国际服务协会 System, method and storage medium for secure password generation
US9288050B1 (en) * 2014-09-25 2016-03-15 International Business Machines Corporation Unified storage and management of cryptographic keys and certificates
US10089439B2 (en) 2014-10-28 2018-10-02 Stryker Sustainability Solutions, Inc. Medical device with cryptosystem and method of implementing the same
US9489508B2 (en) * 2014-11-13 2016-11-08 Seagate Technology Llc Device functionality access control using unique device credentials
US9654288B1 (en) 2014-12-11 2017-05-16 Wickr Inc. Securing group communications
US9191391B1 (en) * 2014-12-19 2015-11-17 Architecture Technology Corporation Cross-domain object models for securely sharing information between network security domains
CN112260826B (en) 2015-01-27 2023-12-26 维萨国际服务协会 Method for secure credential provisioning
US10910089B2 (en) 2015-03-20 2021-02-02 Universal Patient Key, Inc. Methods and systems providing centralized encryption key management for sharing data across diverse entities
US10116441B1 (en) * 2015-06-11 2018-10-30 Amazon Technologies, Inc. Enhanced-security random data
EP3151502B1 (en) * 2015-09-29 2018-08-15 Siemens Aktiengesellschaft Variously encrypted transmission of object data
US11115393B2 (en) * 2015-10-27 2021-09-07 Line Corporation Message server, method for operating message server and computer-readable recording medium
US9584493B1 (en) 2015-12-18 2017-02-28 Wickr Inc. Decentralized authoritative messaging
US10291607B1 (en) 2016-02-02 2019-05-14 Wickr Inc. Providing real-time events to applications
US9596079B1 (en) 2016-04-14 2017-03-14 Wickr Inc. Secure telecommunications
US9602477B1 (en) 2016-04-14 2017-03-21 Wickr Inc. Secure file transfer
WO2017214212A1 (en) * 2016-06-08 2017-12-14 Open Invention Network Llc Dynamic outgoing message modification
US11350270B2 (en) * 2016-06-22 2022-05-31 Saronikos Trading And Services, Unipessoal Lda Method, software, apparatus, electronic device, server and storage medium for ensuring privacy of communication
EP3866388B1 (en) * 2016-08-10 2022-11-30 Nextlabs, Inc. Sharing encrypted documents within and outside an organization
KR20240038828A (en) 2016-09-15 2024-03-25 너츠 홀딩스 엘엘씨 Encrypted userdata transit and storage
US11393046B1 (en) * 2017-01-17 2022-07-19 Intuit Inc. System and method for perpetual rekeying of various data columns with a frequency and encryption strength based on the sensitivity of the data columns
US10303895B1 (en) 2017-01-19 2019-05-28 Intuit Inc. System and method for perpetual rekeying of various data columns with respective encryption keys and on alternating bases
WO2018160530A1 (en) * 2017-02-28 2018-09-07 Leviton Manufacturing Co., Inc. Communication enabled circuit breakers
US10333703B2 (en) 2017-03-01 2019-06-25 International Business Machines Corporation Key exchange process
US10936711B2 (en) 2017-04-18 2021-03-02 Intuit Inc. Systems and mechanism to control the lifetime of an access token dynamically based on access token use
US10686765B2 (en) * 2017-04-19 2020-06-16 International Business Machines Corporation Data access levels
US11463439B2 (en) * 2017-04-21 2022-10-04 Qwerx Inc. Systems and methods for device authentication and protection of communication on a system on chip
US10122699B1 (en) * 2017-05-31 2018-11-06 InfoSci, LLC Systems and methods for ephemeral shared data set management and communication protection
US11194562B2 (en) * 2017-05-19 2021-12-07 Blackberry Limited Method and system for hardware identification and software update control
US11004548B1 (en) 2017-09-20 2021-05-11 Datavant, Inc. System for providing de-identified mortality indicators in healthcare data
US10635829B1 (en) 2017-11-28 2020-04-28 Intuit Inc. Method and system for granting permissions to parties within an organization
KR102005158B1 (en) * 2017-11-29 2019-07-29 신한카드 주식회사 Apparatus of generating credit virtual currency and apparatus of managing credit virtual currency
US11537748B2 (en) 2018-01-26 2022-12-27 Datavant, Inc. Self-contained system for de-identifying unstructured data in healthcare records
US11042668B1 (en) 2018-04-12 2021-06-22 Datavant, Inc. System for preparing data for expert certification and monitoring data over time to ensure compliance with certified boundary conditions
US11120144B1 (en) 2018-04-12 2021-09-14 Datavant, Inc. Methods and systems providing central management of distributed de-identification and tokenization software for sharing data
US11080423B1 (en) 2018-04-13 2021-08-03 Datavant, Inc. System for simulating a de-identified healthcare data set and creating simulated personal data while retaining profile of authentic data
US10430606B1 (en) 2018-04-30 2019-10-01 Aras Corporation System and method for implementing domain based access control on queries of a self-describing data system
US11368445B2 (en) * 2018-05-21 2022-06-21 Amazon Technologies, Inc. Local encryption for single sign-on
EP3887979A4 (en) * 2018-11-30 2022-10-12 BicDroid Inc. Personalized and cryptographically secure access control in operating systems
US11743254B2 (en) * 2019-08-12 2023-08-29 Lenovo (Singapore) Pte. Ltd. Device authentication across unsecure network
US11263310B2 (en) * 2019-11-26 2022-03-01 Red Hat, Inc. Using a trusted execution environment for a proof-of-work key wrapping scheme that verifies remote device capabilities
US11520878B2 (en) * 2019-11-26 2022-12-06 Red Hat, Inc. Using a trusted execution environment for a proof-of-work key wrapping scheme that restricts execution based on device capabilities
US11887072B2 (en) * 2019-12-11 2024-01-30 Bitt Inc. Digital currency minting in a system of network nodes implementing a distributed ledger
US11431689B2 (en) * 2020-01-10 2022-08-30 Lennox Industries Inc. Secure payload delivery
US11265144B2 (en) 2020-03-09 2022-03-01 International Business Machines Corporation Consistent ciphertext creation
US11411952B2 (en) * 2020-04-02 2022-08-09 Verizon Patent And Licensing Inc. Systems and methods for multi-level authentication
WO2021206934A1 (en) 2020-04-09 2021-10-14 Nuts Holdings, Llc Nuts: flexible hierarchy object graphs
US11368287B2 (en) 2020-05-19 2022-06-21 International Business Machines Corporation Identification of a creator of an encrypted object
US11276258B2 (en) 2020-06-15 2022-03-15 Delphian Systems, LLC Enhanced security for contactless access card system
US11640289B2 (en) * 2020-08-24 2023-05-02 Rockwell Collins, Inc. Microservices cloud-native architecture for ubiquitous simulation as a service
US20220085983A1 (en) * 2020-09-14 2022-03-17 Hewlett Packard Enterprise Development Lp Encryption keys from storage systems
US11755779B1 (en) 2020-09-30 2023-09-12 Datavant, Inc. Linking of tokenized trial data to other tokenized data
US11223489B1 (en) 2021-02-23 2022-01-11 Garantir LLC Advanced security control implementation of proxied cryptographic keys
US11757634B2 (en) 2021-03-30 2023-09-12 Bank Of America Corporation System for secure client-side cryptographic key retrieval using cryptographic key splitting and wrapping
US11418329B1 (en) 2021-05-28 2022-08-16 Garantir LLC Shared secret implementation of proxied cryptographic keys
US11218317B1 (en) 2021-05-28 2022-01-04 Garantir LLC Secure enclave implementation of proxied cryptographic keys
CN113395271A (en) * 2021-06-07 2021-09-14 武汉卓尔信息科技有限公司 Data security access method in cloud computing platform and cloud computing platform
US11502827B1 (en) * 2021-09-03 2022-11-15 Garantir LLC Exporting remote cryptographic keys

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030110372A1 (en) * 2001-04-24 2003-06-12 Proudler Graeme John Information security system
US6622247B1 (en) * 1997-12-19 2003-09-16 Hewlett-Packard Development Company, Lp Method for certifying the authenticity of digital objects by an authentication authority and for certifying their compliance by a testing authority
US20040208316A1 (en) * 1998-02-13 2004-10-21 Wack C. Jay Cryptographic key split binder for use with tagged data elements

Family Cites Families (118)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5265221A (en) 1989-03-20 1993-11-23 Tandem Computers Access restriction facility method and apparatus
US5201000A (en) * 1991-09-27 1993-04-06 International Business Machines Corporation Method for generating public and private key pairs without using a passphrase
US5276901A (en) * 1991-12-16 1994-01-04 International Business Machines Corporation System for controlling group access to objects using group access control folder and group identification as individual user
US6850252B1 (en) 1999-10-05 2005-02-01 Steven M. Hoffberg Intelligent electronic appliance system and method
US5410599A (en) 1992-05-15 1995-04-25 Tecsec, Incorporated Voice and data encryption device
US5369707A (en) * 1993-01-27 1994-11-29 Tecsec Incorporated Secure network method and apparatus
US5375169A (en) 1993-05-28 1994-12-20 Tecsec, Incorporated Cryptographic key management method and apparatus
US5440290A (en) 1993-06-07 1995-08-08 Tecsec Incorporated Proximity detection device for protection of personnel against exposure to hazardous radio frequency radiation
US5369702A (en) 1993-10-18 1994-11-29 Tecsec Incorporated Distributed cryptographic object method
US5680452A (en) 1993-10-18 1997-10-21 Tecsec Inc. Distributed cryptographic object method
US5432851A (en) 1993-10-21 1995-07-11 Tecsec Incorporated Personal computer access control system
US5651109A (en) * 1993-12-29 1997-07-22 Lucent Technologies Inc. Memory structure for configuring a terminal device
US6813769B1 (en) * 1997-10-28 2004-11-02 Microsoft Corporation Server application components with control over state duration
JP4095680B2 (en) * 1994-08-01 2008-06-04 富士通株式会社 Security management method for card type storage device and card type storage device
EP0697662B1 (en) 1994-08-15 2001-05-30 International Business Machines Corporation Method and system for advanced role-based access control in distributed and centralized computer systems
JP2000503154A (en) 1996-01-11 2000-03-14 エムアールジェイ インコーポレイテッド System for controlling access and distribution of digital ownership
JP3090021B2 (en) * 1996-02-14 2000-09-18 富士ゼロックス株式会社 Electronic document management device
US6272538B1 (en) * 1996-07-30 2001-08-07 Micron Technology, Inc. Method and system for establishing a security perimeter in computer networks
US6055637A (en) * 1996-09-27 2000-04-25 Electronic Data Systems Corporation System and method for accessing enterprise-wide resources by presenting to the resource a temporary credential
US6023765A (en) 1996-12-06 2000-02-08 The United States Of America As Represented By The Secretary Of Commerce Implementation of role-based access control in multi-level secure systems
US5845068A (en) 1996-12-18 1998-12-01 Sun Microsystems, Inc. Multilevel security port methods, apparatuses, and computer program products
US6229445B1 (en) 1997-01-13 2001-05-08 Tecsec, Incorporated RF identification process and apparatus
US6885747B1 (en) 1997-02-13 2005-04-26 Tec.Sec, Inc. Cryptographic key split combiner
US6105132A (en) 1997-02-20 2000-08-15 Novell, Inc. Computer network graded authentication system and method
US5920630A (en) * 1997-02-25 1999-07-06 United States Of America Method of public key cryptography that includes key escrow
IL120420A (en) 1997-03-10 1999-12-31 Security 7 Software Ltd Method and system for preventing the downloading and execution of executable objects
US6041411A (en) * 1997-03-28 2000-03-21 Wyatt; Stuart Alan Method for defining and verifying user access rights to a computer information
US6742050B1 (en) 1997-03-31 2004-05-25 Intel Corporation Inter-object messaging
US5991877A (en) * 1997-04-03 1999-11-23 Lockheed Martin Corporation Object-oriented trusted application framework
US6694433B1 (en) * 1997-05-08 2004-02-17 Tecsec, Inc. XML encryption scheme
US6229894B1 (en) * 1997-07-14 2001-05-08 Entrust Technologies, Ltd. Method and apparatus for access to user-specific encryption information
US5890161A (en) * 1997-10-28 1999-03-30 Microsoft Corporation Automatic transaction processing of component-based server applications
US5958004A (en) * 1997-10-28 1999-09-28 Microsoft Corporation Disabling and enabling transaction committal in transactional application components
US6134594A (en) 1997-10-28 2000-10-17 Microsoft Corporation Multi-user, multiple tier distributed application architecture with single-user access control of middle tier objects
US6014666A (en) 1997-10-28 2000-01-11 Microsoft Corporation Declarative and programmatic access control of component-based server applications using roles
US6202066B1 (en) 1997-11-19 2001-03-13 The United States Of America As Represented By The Secretary Of Commerce Implementation of role/group permission association using object access type
US6044466A (en) * 1997-11-25 2000-03-28 International Business Machines Corp. Flexible and dynamic derivation of permissions
US6141754A (en) 1997-11-28 2000-10-31 International Business Machines Corporation Integrated method and system for controlling information access and distribution
US6088679A (en) * 1997-12-01 2000-07-11 The United States Of America As Represented By The Secretary Of Commerce Workflow management employing role-based access control
US6490680B1 (en) 1997-12-04 2002-12-03 Tecsec Incorporated Access control and authorization system
WO1999035782A1 (en) * 1998-01-02 1999-07-15 Cryptography Research, Inc. Leak-resistant cryptographic method and apparatus
US6754820B1 (en) 2001-01-30 2004-06-22 Tecsec, Inc. Multiple level access system
US6357010B1 (en) 1998-02-17 2002-03-12 Secure Computing Corporation System and method for controlling access to documents stored on an internal network
JPH11313102A (en) 1998-02-27 1999-11-09 Fujitsu Ltd Access control list generation method and its device
US6453419B1 (en) 1998-03-18 2002-09-17 Secure Computing Corporation System and method for implementing a security policy
US7096494B1 (en) * 1998-05-05 2006-08-22 Chen Jay C Cryptographic system and method for electronic transactions
US6901426B1 (en) 1998-05-08 2005-05-31 E-Talk Corporation System and method for providing access privileges for users in a performance evaluation system
US6587857B1 (en) 1998-06-30 2003-07-01 Citicorp Development Center, Inc. System and method for warehousing and retrieving data
US6075865A (en) * 1998-07-01 2000-06-13 Tecsec Incorporated Cryptographic communication process and apparatus
US6321334B1 (en) * 1998-07-15 2001-11-20 Microsoft Corporation Administering permissions associated with a security zone in a computer system security model
US6442620B1 (en) * 1998-08-17 2002-08-27 Microsoft Corporation Environment extensibility and automatic services for component applications using contexts, policies and activators
US6473791B1 (en) 1998-08-17 2002-10-29 Microsoft Corporation Object load balancing
US7111173B1 (en) * 1998-09-01 2006-09-19 Tecsec, Inc. Encryption process including a biometric unit
US6311278B1 (en) 1998-09-09 2001-10-30 Sanctum Ltd. Method and system for extracting application protocol characteristics
US6324646B1 (en) 1998-09-11 2001-11-27 International Business Machines Corporation Method and system for securing confidential data in a computer network
US6115709A (en) 1998-09-18 2000-09-05 Tacit Knowledge Systems, Inc. Method and system for constructing a knowledge profile of a user having unrestricted and restricted access portions according to respective levels of confidence of content of the portions
JP2002526830A (en) * 1998-09-28 2002-08-20 アーガス システムズ グループ,インク. Compartmentalized trust computer operating system
JP2000124887A (en) * 1998-10-14 2000-04-28 Fuji Xerox Co Ltd Enciphering/decoding method for group unit, and method and device for signature
US6684330B1 (en) 1998-10-16 2004-01-27 Tecsec, Inc. Cryptographic information and flow control
US6560337B1 (en) * 1998-10-28 2003-05-06 International Business Machines Corporation Systems, methods and computer program products for reducing effective key length of ciphers using one-way cryptographic functions and an initial key
US6678705B1 (en) * 1998-11-16 2004-01-13 At&T Corp. System for archiving electronic documents using messaging groupware
US6385724B1 (en) * 1998-11-30 2002-05-07 Microsoft Corporation Automatic object caller chain with declarative impersonation and transitive trust
US6574736B1 (en) 1998-11-30 2003-06-03 Microsoft Corporation Composable roles
US6487665B1 (en) * 1998-11-30 2002-11-26 Microsoft Corporation Object security boundaries
US20030172280A1 (en) * 1998-12-04 2003-09-11 Scheidt Edward M. Access control and authorization system
US6499109B1 (en) 1998-12-08 2002-12-24 Networks Associates Technology, Inc. Method and apparatus for securing software distributed over a network
US6578143B1 (en) * 1998-12-18 2003-06-10 Qualcomm Incorporated Method for negotiating weakened keys in encryption systems
US6574733B1 (en) * 1999-01-25 2003-06-03 Entrust Technologies Limited Centralized secure backup system and method
US6769130B1 (en) 2000-01-20 2004-07-27 Interactual Technologies, Inc. System, method and article of manufacture for late synchronization during the execution of a multimedia event on a plurality of client computers
US6529949B1 (en) * 2000-02-07 2003-03-04 Interactual Technologies, Inc. System, method and article of manufacture for remote unlocking of local content located on a client device
US6615166B1 (en) * 1999-05-27 2003-09-02 Accenture Llp Prioritizing components of a network framework required for implementation of technology
US6519571B1 (en) 1999-05-27 2003-02-11 Accenture Llp Dynamic customer profile management
US6536037B1 (en) * 1999-05-27 2003-03-18 Accenture Llp Identification of redundancies and omissions among components of a web based architecture
US6721713B1 (en) * 1999-05-27 2004-04-13 Andersen Consulting Llp Business alliance identification in a web architecture framework
US6473794B1 (en) 1999-05-27 2002-10-29 Accenture Llp System for establishing plan to test components of web based framework by displaying pictorial representation and conveying indicia coded components of existing network framework
US6289450B1 (en) 1999-05-28 2001-09-11 Authentica, Inc. Information security architecture for encrypting documents for remote access while maintaining access control
US6687375B1 (en) * 1999-06-02 2004-02-03 International Business Machines Corporation Generating user-dependent keys and random numbers
CA2277633C (en) * 1999-07-19 2009-10-20 Certicom Corp. Split-key key-agreement protocol
US6609198B1 (en) * 1999-08-05 2003-08-19 Sun Microsystems, Inc. Log-on service providing credential level change without loss of session continuity
US6668322B1 (en) * 1999-08-05 2003-12-23 Sun Microsystems, Inc. Access management system and method employing secure credentials
US7606731B2 (en) * 1999-08-17 2009-10-20 Mcclung Iii Guy Lamonte Price guarantee methods and systems
US6662357B1 (en) 1999-08-31 2003-12-09 Accenture Llp Managing information in an integrated development architecture framework
US6370573B1 (en) 1999-08-31 2002-04-09 Accenture Llp System, method and article of manufacture for managing an environment of a development architecture framework
US6256773B1 (en) * 1999-08-31 2001-07-03 Accenture Llp System, method and article of manufacture for configuration management in a development architecture framework
US6324647B1 (en) 1999-08-31 2001-11-27 Michel K. Bowman-Amuah System, method and article of manufacture for security management in a development architecture framework
US6405364B1 (en) * 1999-08-31 2002-06-11 Accenture Llp Building techniques in a development architecture framework
US6748555B1 (en) 1999-09-09 2004-06-08 Microsoft Corporation Object-based software management
US6853988B1 (en) 1999-09-20 2005-02-08 Security First Corporation Cryptographic server with provisions for interoperability between cryptographic systems
US6629081B1 (en) * 1999-12-22 2003-09-30 Accenture Llp Account settlement and financing in an e-commerce environment
US6757898B1 (en) 2000-01-18 2004-06-29 Mckesson Information Solutions, Inc. Electronic provider—patient interface system
JP2001211154A (en) * 2000-01-25 2001-08-03 Murata Mach Ltd Secret key generating method, ciphering method, and cipher communication method
US6629105B1 (en) 2000-02-19 2003-09-30 Novell, Inc. Facilitating user administration of directory trees
WO2001065330A2 (en) 2000-03-03 2001-09-07 Sanctum Ltd. System for determining web application vulnerabilities
US6701345B1 (en) 2000-04-13 2004-03-02 Accenture Llp Providing a notification when a plurality of users are altering similar data in a health care solution environment
US6658415B1 (en) 2000-04-28 2003-12-02 International Business Machines Corporation Monitoring and managing user access to content via a universally accessible database
CN1142653C (en) * 2000-04-28 2004-03-17 杨宏伟 Dynamic password authentication system and method
US6453791B1 (en) * 2000-05-25 2002-09-24 Kyle Seitzinger Concealable body armor briefs
US6877094B1 (en) 2000-07-28 2005-04-05 Sun Microsystems, Inc. Method and apparatus for authentication and payment for devices participating in Jini communities
US7039392B2 (en) * 2000-10-10 2006-05-02 Freescale Semiconductor System and method for providing device authentication in a wireless network
US6871231B2 (en) 2001-01-03 2005-03-22 Ipac Acquisition Subsidiary I, Llc Role-based access to image metadata
US6871232B2 (en) 2001-03-06 2005-03-22 International Business Machines Corporation Method and system for third party resource provisioning management
AU2002307015A1 (en) * 2001-03-27 2002-10-08 Microsoft Corporation Distributed, scalable cryptographic access control
US6768988B2 (en) 2001-05-29 2004-07-27 Sun Microsystems, Inc. Method and system for incorporating filtered roles in a directory system
US6785686B2 (en) 2001-05-29 2004-08-31 Sun Microsystems, Inc. Method and system for creating and utilizing managed roles in a directory system
US6918107B2 (en) 2001-07-02 2005-07-12 Bea Systems, Inc. Programming language extensions for processing data representation language objects and related applications
US6754884B1 (en) 2001-07-02 2004-06-22 Bea Systems, Inc. Programming language extensions for processing XML objects and related applications
US7181620B1 (en) * 2001-11-09 2007-02-20 Cisco Technology, Inc. Method and apparatus providing secure initialization of network devices using a cryptographic key distribution approach
JP3904432B2 (en) * 2001-11-16 2007-04-11 株式会社ルネサステクノロジ Information processing device
US6859810B2 (en) * 2001-12-10 2005-02-22 Bea Systems, Inc. Declarative specification and engine for non-isomorphic data mapping
US7299364B2 (en) * 2002-04-09 2007-11-20 The Regents Of The University Of Michigan Method and system to maintain application data secure and authentication token for use therein
US6768968B2 (en) * 2002-04-18 2004-07-27 International Business Machines Corporation Method and system of an integrated simulation tool using business patterns and scripts
US7240046B2 (en) * 2002-09-04 2007-07-03 International Business Machines Corporation Row-level security in a relational database management system
US7424115B2 (en) * 2003-01-30 2008-09-09 Nokia Corporation Generating asymmetric keys in a telecommunications system
US20050015602A1 (en) * 2003-04-28 2005-01-20 Rees Robert Thomas Owen Method and apparatus for passing data securely between parties
US7515717B2 (en) * 2003-07-31 2009-04-07 International Business Machines Corporation Security containers for document components
US20050289343A1 (en) * 2004-06-23 2005-12-29 Sun Microsystems, Inc. Systems and methods for binding a hardware component and a platform
WO2006020426A2 (en) * 2004-07-29 2006-02-23 Infoassure, Inc. Cryptographic key construct
US8166296B2 (en) * 2004-10-20 2012-04-24 Broadcom Corporation User authentication system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6622247B1 (en) * 1997-12-19 2003-09-16 Hewlett-Packard Development Company, Lp Method for certifying the authenticity of digital objects by an authentication authority and for certifying their compliance by a testing authority
US20040208316A1 (en) * 1998-02-13 2004-10-21 Wack C. Jay Cryptographic key split binder for use with tagged data elements
US20030110372A1 (en) * 2001-04-24 2003-06-12 Proudler Graeme John Information security system

Also Published As

Publication number Publication date
US20060053285A1 (en) 2006-03-09
WO2007001329A3 (en) 2009-04-16
WO2007001328A3 (en) 2009-04-09
WO2007001328A2 (en) 2007-01-04
US7739501B2 (en) 2010-06-15
US20060242407A1 (en) 2006-10-26
US7715565B2 (en) 2010-05-11
WO2007001329A2 (en) 2007-01-04
WO2006015182A3 (en) 2007-03-01
US20060050870A1 (en) 2006-03-09
US20060218400A1 (en) 2006-09-28
WO2006015182A2 (en) 2006-02-09
US7711120B2 (en) 2010-05-04
WO2006020426A2 (en) 2006-02-23

Similar Documents

Publication Publication Date Title
WO2006020426A3 (en) Cryptographic key construct
USD550277S1 (en) Aldi sued type face font
WO2007012035A3 (en) Wagering game with encryption and authentication
WO2006038733A3 (en) Representation of sheet metal part models
WO2006014805A3 (en) Presentation instrument security arrangement and methods
WO2007050234A3 (en) System for obtaining reviews using selections created by user base
WO2005116586A3 (en) Method for modifying navigation information
WO2006036955A3 (en) Gift registry system
WO2006130685A3 (en) User created social networks
WO2008045991A3 (en) Extended transactions
WO2008045981A3 (en) Virtual network of real-world entities
WO2004104727A3 (en) User customizable enterprise workflow management application
WO2006023877A3 (en) Methods, systems, and apparatuses for extended enterprise commerce
WO2006039502A3 (en) Index processing
WO2007103574A3 (en) Dynamic credit score alteration
WO2007044865A3 (en) Information nervous system
WO2007001640A3 (en) Data centric workflows
WO2006124225A3 (en) Creation of game elements using location information
WO2006111973A3 (en) A three dimensional optical information carrier and a method of manufacturing thereof
DE60313468D1 (en) STORAGE SERVICES AND SYSTEMS
TW200701008A (en) Custom application builder for supply chain management
WO2006116431A3 (en) Tamper resistant presentation instruments and methods
WO2009063317A3 (en) Presentation of auxiliary content via a content presentation device
WO2006023305A8 (en) Engine control module and method for use in engine system manufacture
DE60210118D1 (en) SAFETY DEVICE FOR MASS STORAGE

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase