WO2007001329A3 - Cryptographic key management - Google Patents

Cryptographic key management Download PDF

Info

Publication number
WO2007001329A3
WO2007001329A3 PCT/US2005/026804 US2005026804W WO2007001329A3 WO 2007001329 A3 WO2007001329 A3 WO 2007001329A3 US 2005026804 W US2005026804 W US 2005026804W WO 2007001329 A3 WO2007001329 A3 WO 2007001329A3
Authority
WO
WIPO (PCT)
Prior art keywords
cryptographic
group
cryptographic key
public
private
Prior art date
Application number
PCT/US2005/026804
Other languages
French (fr)
Other versions
WO2007001329A2 (en
Inventor
Gerald D Kimmel
Francis J Adamouski
Ersin L Domangue
Wayne R Kimmel
James G Lightburn
Leonard R Viola
Original Assignee
Infoassure Inc
Gerald D Kimmel
Francis J Adamouski
Ersin L Domangue
Wayne R Kimmel
James G Lightburn
Leonard R Viola
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Infoassure Inc, Gerald D Kimmel, Francis J Adamouski, Ersin L Domangue, Wayne R Kimmel, James G Lightburn, Leonard R Viola filed Critical Infoassure Inc
Publication of WO2007001329A2 publication Critical patent/WO2007001329A2/en
Publication of WO2007001329A3 publication Critical patent/WO2007001329A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/065Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Abstract

A cryptographic coalition administrator for managing information access across multiple organizations includes a communications interface configured to communicate electronically transmit and receive information, a memory configured to store pairs of public and private cryptographic keys associated with different levels of access, and a key manager configured to : distribute cryptographic key sets, of public cryptographic keys and private cryptographic keys, to first and second organizations of members; determine a first group of members in the first organization to have authorization to exchange information with a second group sharing cryptographic parameters, and public and private cryptographic keys; and distribute a first cryptographic key set, from the cryptographic key sets, to the first group, the first group having a first sensitivity level at least as high as a second sensitivity level associated with the first cryptographic key set.
PCT/US2005/026804 2004-07-29 2005-07-29 Cryptographic key management WO2007001329A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US59194404P 2004-07-29 2004-07-29
US60/591,944 2004-07-29

Publications (2)

Publication Number Publication Date
WO2007001329A2 WO2007001329A2 (en) 2007-01-04
WO2007001329A3 true WO2007001329A3 (en) 2009-04-16

Family

ID=35787850

Family Applications (4)

Application Number Title Priority Date Filing Date
PCT/US2005/026802 WO2007001328A2 (en) 2004-07-29 2005-07-29 Information-centric security
PCT/US2005/026908 WO2006020426A2 (en) 2004-07-29 2005-07-29 Cryptographic key construct
PCT/US2005/026907 WO2006015182A2 (en) 2004-07-29 2005-07-29 Object access level
PCT/US2005/026804 WO2007001329A2 (en) 2004-07-29 2005-07-29 Cryptographic key management

Family Applications Before (3)

Application Number Title Priority Date Filing Date
PCT/US2005/026802 WO2007001328A2 (en) 2004-07-29 2005-07-29 Information-centric security
PCT/US2005/026908 WO2006020426A2 (en) 2004-07-29 2005-07-29 Cryptographic key construct
PCT/US2005/026907 WO2006015182A2 (en) 2004-07-29 2005-07-29 Object access level

Country Status (2)

Country Link
US (4) US7715565B2 (en)
WO (4) WO2007001328A2 (en)

Families Citing this family (174)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2270622B1 (en) 2003-06-05 2016-08-24 Intertrust Technologies Corporation Interoperable systems and methods for peer-to-peer service orchestration
US8031865B2 (en) * 2004-01-08 2011-10-04 Encryption Solutions, Inc. Multiple level security system and method for encrypting data within documents
US8131674B2 (en) 2004-06-25 2012-03-06 Apple Inc. Methods and systems for managing data
US9081872B2 (en) 2004-06-25 2015-07-14 Apple Inc. Methods and systems for managing permissions data and/or indexes
US20050289127A1 (en) * 2004-06-25 2005-12-29 Dominic Giampaolo Methods and systems for managing data
WO2007001328A2 (en) * 2004-07-29 2007-01-04 Infoassure, Inc. Information-centric security
WO2006085430A1 (en) * 2005-02-10 2006-08-17 Nec Corporation Member certificate acquiring device, member certificate issuing device, group signing device, and group signature verifying device
EP1742475A1 (en) * 2005-07-07 2007-01-10 Nagravision S.A. Method to control access to enciphered data
EP1929423A2 (en) * 2005-09-16 2008-06-11 Koninklijke Philips Electronics N.V. Cryptographic role-based access control
US9626667B2 (en) * 2005-10-18 2017-04-18 Intertrust Technologies Corporation Digital rights management engine systems and methods
US20070204078A1 (en) * 2006-02-09 2007-08-30 Intertrust Technologies Corporation Digital rights management engine systems and methods
US20070172041A1 (en) * 2005-10-18 2007-07-26 Intertrust Technologies Corporation Digital rights management engine systems and methods
US7788484B2 (en) * 2005-11-30 2010-08-31 Microsoft Corporation Using hierarchical identity based cryptography for authenticating outbound mail
US7647630B2 (en) * 2005-12-15 2010-01-12 International Business Machines Corporation Associating security information with information objects in a data processing system
US20070143601A1 (en) * 2005-12-15 2007-06-21 Arroyo Diana J System and method for authorizing information flows
US9059866B2 (en) 2005-12-30 2015-06-16 Remec Broadband Wireless Holdings, Inc. Digital microwave radio system and method with encryption
US8731007B2 (en) 2005-12-30 2014-05-20 Remec Broadband Wireless, Llc Digital microwave radio link with a variety of ports
US8711888B2 (en) 2005-12-30 2014-04-29 Remec Broadband Wireless Llc Digital microwave radio link with adaptive data rate
US7499552B2 (en) * 2006-01-11 2009-03-03 International Business Machines Corporation Cipher method and system for verifying a decryption of an encrypted user data key
US20070180259A1 (en) * 2006-01-20 2007-08-02 Bulot Earl J Secure Personal Medical Process
US20100235924A1 (en) * 2006-01-20 2010-09-16 Bulot Earl J Secure Personal Medical Process
US9137012B2 (en) * 2006-02-03 2015-09-15 Emc Corporation Wireless authentication methods and apparatus
FR2898002B1 (en) * 2006-02-28 2008-06-27 Thales Sa METHOD FOR MANAGING AND CONTROLLING ACCESS KEYS TO SERVICES IN A COMMUNICATION SYSTEM
CA2546148A1 (en) * 2006-05-09 2007-11-09 Nikolajs Volkovs Method, system and computer program for polynomial based hashing and message authentication coding with separate generation of spectrums
US8090944B2 (en) * 2006-07-05 2012-01-03 Rockstar Bidco Lp Method and apparatus for authenticating users of an emergency communication network
US20080028214A1 (en) * 2006-07-28 2008-01-31 Ronald Tafoya Secure flash media for medical records
US7941640B1 (en) * 2006-08-25 2011-05-10 Marvell International Ltd. Secure processors having encoded instructions
US8887296B2 (en) * 2006-12-12 2014-11-11 The Boeing Company Method and system for object-based multi-level security in a service oriented architecture
US9064135B1 (en) * 2006-12-12 2015-06-23 Marvell International Ltd. Hardware implemented key management system and method
US8015224B1 (en) * 2006-12-27 2011-09-06 Marvell International Ltd. Entropy source for random number generation
US20080222423A1 (en) * 2007-03-06 2008-09-11 Secude International System and method for providing secure authentication of devices awakened from powered sleep state
US8391479B2 (en) * 2007-03-07 2013-03-05 Research In Motion Limited Combining interleaving with fixed-sequence windowing in an elliptic curve scalar multiplication
US8683549B2 (en) * 2007-03-23 2014-03-25 Microsoft Corporation Secure data storage and retrieval incorporating human participation
US8443191B2 (en) 2007-04-09 2013-05-14 Objective Interface Systems, Inc. System and method for accessing information resources using cryptographic authorization permits
US7773753B2 (en) * 2007-06-28 2010-08-10 Aladdin Knowledge Systems Ltd. Efficient remotely-keyed symmetric cryptography for digital rights management
US8646045B1 (en) * 2007-07-26 2014-02-04 United Services Automobile Association (Usaa) Bank speech authentication
US20090034734A1 (en) * 2007-07-31 2009-02-05 Viasat, Inc. Multi-Level Key Manager
CN102932136B (en) * 2007-09-14 2017-05-17 安全第一公司 Systems and methods for managing cryptographic keys
US20090077371A1 (en) * 2007-09-14 2009-03-19 Valicore Technologies, Inc. Systems and methods for a template-based encryption management system
US8160247B2 (en) * 2007-09-27 2012-04-17 Adobe Systems Incorporated Providing local storage service to applications that run in an application execution environment
FR2925732B1 (en) * 2007-12-21 2010-02-12 Sagem Securite GENERATION AND USE OF A BIOMETRIC KEY
AU2008344948A1 (en) * 2007-12-27 2009-07-09 Safend Ltd. System and method for contextual and behavioral based data access control
US8117447B2 (en) * 2008-01-10 2012-02-14 Industrial Technology Research Institute Authentication method employing elliptic curve cryptography
CA2621147C (en) * 2008-02-15 2013-10-08 Connotech Experts-Conseils Inc. Method of bootstrapping an authenticated data session configuration
US8380981B2 (en) 2008-05-16 2013-02-19 Objective Interface Systems, Inc. System and method that uses cryptographic certificates to define groups of entities
EP2300940A4 (en) * 2008-05-16 2011-10-19 Objective Interface Systems Inc System and method that uses cryptographic certificates to define groups of entities
US9832069B1 (en) 2008-05-30 2017-11-28 F5 Networks, Inc. Persistence based on server response in an IP multimedia subsystem (IMS)
US9323681B2 (en) 2008-09-18 2016-04-26 Avere Systems, Inc. File storage system, cache appliance, and method
US8214404B2 (en) 2008-07-11 2012-07-03 Avere Systems, Inc. Media aware distributed data layout
GB0813298D0 (en) * 2008-07-19 2008-08-27 Univ St Andrews Multipad encryption
WO2010012109A1 (en) * 2008-08-01 2010-02-04 Volkovs System and method for the calculation of a polynomial-based hash function and the erindale-plus hashing algorithm
US8966250B2 (en) * 2008-09-08 2015-02-24 Salesforce.Com, Inc. Appliance, system, method and corresponding software components for encrypting and processing data
US8190636B2 (en) * 2008-09-30 2012-05-29 Nokia Corporation Method, apparatus and computer program product for providing object privilege modification
US8595804B2 (en) * 2008-11-06 2013-11-26 At&T Intellectual Property I, L.P. System and method for device security with a plurality of authentication modes
US8381279B2 (en) * 2009-02-13 2013-02-19 Microsoft Corporation Constraining a login to a subset of access rights
US8364984B2 (en) 2009-03-13 2013-01-29 Microsoft Corporation Portable secure data files
US20100241668A1 (en) * 2009-03-17 2010-09-23 Microsoft Corporation Local Computer Account Management at Domain Level
US20100275265A1 (en) * 2009-04-27 2010-10-28 Michael Stephen Fiske System for securing transactions across insecure networks
US9047477B2 (en) * 2009-05-26 2015-06-02 Microsoft Technology Licensing, Llc Distributed key encryption in servers
US10454674B1 (en) * 2009-11-16 2019-10-22 Arm Limited System, method, and device of authenticated encryption of messages
WO2011058533A2 (en) * 2009-11-16 2011-05-19 Discretix Technologies Ltd. Methods circuits devices and systems for provisioning of cryptographic data to one or more electronic devices
US9231758B2 (en) * 2009-11-16 2016-01-05 Arm Technologies Israel Ltd. System, device, and method of provisioning cryptographic data to electronic devices
GB201000288D0 (en) * 2010-01-11 2010-02-24 Scentrics Information Security System and method of enforcing a computer policy
US9191200B1 (en) * 2010-10-07 2015-11-17 L-3 Communications Corp. System and method for changing the security level of a communications terminal during operation
JP2013539295A (en) * 2010-10-15 2013-10-17 サーティコム コーポレーション Authenticated encryption of digital signatures with message recovery
US10162553B2 (en) 2010-11-24 2018-12-25 Western Digital Technologies, Inc. Methods and systems for object level de-duplication for solid state devices
US9058497B2 (en) 2010-12-23 2015-06-16 Microsoft Technology Licensing, Llc Cryptographic key management
US8699710B2 (en) * 2011-01-28 2014-04-15 Royal Canadian Mint/Monnaie Royale Canadienne Controlled security domains
DE112012000358B4 (en) 2011-03-02 2019-08-14 International Business Machines Corporation Cross-company data exchange
US9432342B1 (en) * 2011-03-08 2016-08-30 Ciphercloud, Inc. System and method to anonymize data transmitted to a destination computing device
US9264230B2 (en) 2011-03-14 2016-02-16 International Business Machines Corporation Secure key management
US20120257743A1 (en) * 2011-04-10 2012-10-11 Van Der Veen Peter H Multiple independent encryption domains
JP6047553B2 (en) 2011-04-11 2016-12-21 インタートラスト テクノロジーズ コーポレイション Systems and methods for information security
US8619990B2 (en) 2011-04-27 2013-12-31 International Business Machines Corporation Secure key creation
US8566913B2 (en) 2011-05-04 2013-10-22 International Business Machines Corporation Secure key management
US8789210B2 (en) 2011-05-04 2014-07-22 International Business Machines Corporation Key usage policies for cryptographic keys
US8755527B2 (en) 2011-05-04 2014-06-17 International Business Machines Corporation Key management policies for cryptographic keys
US8634561B2 (en) * 2011-05-04 2014-01-21 International Business Machines Corporation Secure key management
US8914635B2 (en) * 2011-07-25 2014-12-16 Grey Heron Technologies, Llc Method and system for establishing secure communications using composite key cryptography
WO2013016514A1 (en) * 2011-07-26 2013-01-31 Mine Safety Appliances Company Incident management and monitoring systems and methods
US8752143B2 (en) * 2011-08-15 2014-06-10 Bank Of America Corporation Method and apparatus for token-based reassignment of privileges
DE112011105678T5 (en) * 2011-09-28 2014-07-17 Hewlett-Packard Development Company, L.P. Unlock a storage device
US10797864B2 (en) 2011-11-21 2020-10-06 Combined Conditional Access Development And Support, Llc System and method for authenticating data while minimizing bandwidth
DE112013000473T5 (en) 2012-02-01 2014-09-18 International Business Machines Corporation Method for optimizing the processing of data with restricted access
US9069634B2 (en) * 2012-03-09 2015-06-30 Blackberry Limited Signature representation of data with aliasing across synonyms
GB201205661D0 (en) * 2012-03-30 2012-05-16 Bae Systems Plc Security
US9116969B2 (en) 2012-04-30 2015-08-25 International Business Machines Corporation Generation of electronic pedigree
US8625805B1 (en) 2012-07-16 2014-01-07 Wickr Inc. Digital security bubble
US9397992B1 (en) * 2013-10-23 2016-07-19 Emc Corporation Authentication using color-shape pairings
US9430634B1 (en) 2012-10-23 2016-08-30 Emc Corporation Authentication using gesture passwords
US10430839B2 (en) * 2012-12-12 2019-10-01 Cisco Technology, Inc. Distributed advertisement insertion in content-centric networks
CN103051628B (en) * 2012-12-21 2016-05-11 微梦创科网络科技(中国)有限公司 Obtain the method and system of authentication token based on server
CN103905197B (en) * 2012-12-30 2018-04-13 北京握奇数据系统有限公司 A kind of method that SIM card and external equipment are bound and verified
CN103929303B (en) * 2013-01-11 2018-06-26 华立科技股份有限公司 A kind of key management apparatus of metering automation system
US8891773B2 (en) * 2013-02-11 2014-11-18 Lsi Corporation System and method for key wrapping to allow secure access to media by multiple authorities with modifiable permissions
US10078524B2 (en) * 2013-03-01 2018-09-18 Hewlett Packard Enterprise Development Lp Secure configuration of a headless networking device
US9853979B1 (en) * 2013-03-11 2017-12-26 Amazon Technologies, Inc. Immediate policy effectiveness in eventually consistent systems
US9380023B2 (en) * 2013-05-13 2016-06-28 Owl Computing Technologies, Inc. Enterprise cross-domain solution having configurable data filters
US10129260B1 (en) 2013-06-25 2018-11-13 Wickr Inc. Mutual privacy management
US9830089B1 (en) 2013-06-25 2017-11-28 Wickr Inc. Digital data sanitization
US10567349B2 (en) 2013-06-25 2020-02-18 Wickr Inc. Secure time-to-live
US9866591B1 (en) 2013-06-25 2018-01-09 Wickr Inc. Enterprise messaging platform
US9779261B2 (en) 2013-09-20 2017-10-03 Oracle International Corporation Entity security implied by an asset in a repository system
US9396338B2 (en) 2013-10-15 2016-07-19 Intuit Inc. Method and system for providing a secure secrets proxy
US9384362B2 (en) * 2013-10-14 2016-07-05 Intuit Inc. Method and system for distributing secrets
US9894069B2 (en) 2013-11-01 2018-02-13 Intuit Inc. Method and system for automatically managing secret application and maintenance
US9467477B2 (en) * 2013-11-06 2016-10-11 Intuit Inc. Method and system for automatically managing secrets in multiple data security jurisdiction zones
US9444818B2 (en) 2013-11-01 2016-09-13 Intuit Inc. Method and system for automatically managing secure communications in multiple communications jurisdiction zones
US9691044B2 (en) * 2013-11-05 2017-06-27 Bank Of America Corporation Application shell login role based access control
US9282122B2 (en) 2014-04-30 2016-03-08 Intuit Inc. Method and apparatus for multi-tenancy secrets management
EP2884692B1 (en) * 2013-12-13 2020-05-20 Nxp B.V. Updating software on a secure element
US9698976B1 (en) 2014-02-24 2017-07-04 Wickr Inc. Key management and dynamic perfect forward secrecy
GB2523759A (en) 2014-03-04 2015-09-09 Ibm Method for processing of restricted data
US20210182863A1 (en) * 2014-04-23 2021-06-17 Minkasu, Inc. Authenticating Transactions Using Biometric Authentication
US9584530B1 (en) 2014-06-27 2017-02-28 Wickr Inc. In-band identity verification and man-in-the-middle defense
WO2016004162A1 (en) * 2014-07-03 2016-01-07 Apple Inc. Methods and apparatus for establishing a secure communication channel
US10037286B2 (en) * 2014-08-26 2018-07-31 Red Hat, Inc. Private partition with hardware unlocking
WO2016033610A1 (en) 2014-08-29 2016-03-03 Visa International Service Association Methods for secure cryptogram generation
US9288050B1 (en) 2014-09-25 2016-03-15 International Business Machines Corporation Unified storage and management of cryptographic keys and certificates
US10089439B2 (en) 2014-10-28 2018-10-02 Stryker Sustainability Solutions, Inc. Medical device with cryptosystem and method of implementing the same
US9489508B2 (en) * 2014-11-13 2016-11-08 Seagate Technology Llc Device functionality access control using unique device credentials
US9654288B1 (en) 2014-12-11 2017-05-16 Wickr Inc. Securing group communications
US9191391B1 (en) * 2014-12-19 2015-11-17 Architecture Technology Corporation Cross-domain object models for securely sharing information between network security domains
CN112260826B (en) 2015-01-27 2023-12-26 维萨国际服务协会 Method for secure credential provisioning
US10910089B2 (en) 2015-03-20 2021-02-02 Universal Patient Key, Inc. Methods and systems providing centralized encryption key management for sharing data across diverse entities
US10116441B1 (en) * 2015-06-11 2018-10-30 Amazon Technologies, Inc. Enhanced-security random data
EP3151502B1 (en) 2015-09-29 2018-08-15 Siemens Aktiengesellschaft Variously encrypted transmission of object data
US11115393B2 (en) * 2015-10-27 2021-09-07 Line Corporation Message server, method for operating message server and computer-readable recording medium
US9584493B1 (en) 2015-12-18 2017-02-28 Wickr Inc. Decentralized authoritative messaging
US10291607B1 (en) 2016-02-02 2019-05-14 Wickr Inc. Providing real-time events to applications
US9596079B1 (en) 2016-04-14 2017-03-14 Wickr Inc. Secure telecommunications
US9590958B1 (en) 2016-04-14 2017-03-07 Wickr Inc. Secure file transfer
WO2017214217A1 (en) 2016-06-08 2017-12-14 Open Invention Network Llc Delivering data to multiple devices of a recipient
US11350270B2 (en) * 2016-06-22 2022-05-31 Saronikos Trading And Services, Unipessoal Lda Method, software, apparatus, electronic device, server and storage medium for ensuring privacy of communication
EP3866388B1 (en) * 2016-08-10 2022-11-30 Nextlabs, Inc. Sharing encrypted documents within and outside an organization
CN117692170A (en) 2016-09-15 2024-03-12 美商纳兹控股有限责任公司 Communication method and device, method and system for folding data and computer
US11393046B1 (en) * 2017-01-17 2022-07-19 Intuit Inc. System and method for perpetual rekeying of various data columns with a frequency and encryption strength based on the sensitivity of the data columns
US10303895B1 (en) 2017-01-19 2019-05-28 Intuit Inc. System and method for perpetual rekeying of various data columns with respective encryption keys and on alternating bases
WO2018160530A1 (en) 2017-02-28 2018-09-07 Leviton Manufacturing Co., Inc. Communication enabled circuit breakers
US10333703B2 (en) 2017-03-01 2019-06-25 International Business Machines Corporation Key exchange process
US10936711B2 (en) 2017-04-18 2021-03-02 Intuit Inc. Systems and mechanism to control the lifetime of an access token dynamically based on access token use
US10686765B2 (en) * 2017-04-19 2020-06-16 International Business Machines Corporation Data access levels
US11463439B2 (en) * 2017-04-21 2022-10-04 Qwerx Inc. Systems and methods for device authentication and protection of communication on a system on chip
US10122699B1 (en) * 2017-05-31 2018-11-06 InfoSci, LLC Systems and methods for ephemeral shared data set management and communication protection
US11194562B2 (en) * 2017-05-19 2021-12-07 Blackberry Limited Method and system for hardware identification and software update control
US11004548B1 (en) 2017-09-20 2021-05-11 Datavant, Inc. System for providing de-identified mortality indicators in healthcare data
US10635829B1 (en) 2017-11-28 2020-04-28 Intuit Inc. Method and system for granting permissions to parties within an organization
KR102005158B1 (en) * 2017-11-29 2019-07-29 신한카드 주식회사 Apparatus of generating credit virtual currency and apparatus of managing credit virtual currency
US11537748B2 (en) 2018-01-26 2022-12-27 Datavant, Inc. Self-contained system for de-identifying unstructured data in healthcare records
US11120144B1 (en) 2018-04-12 2021-09-14 Datavant, Inc. Methods and systems providing central management of distributed de-identification and tokenization software for sharing data
US11042668B1 (en) 2018-04-12 2021-06-22 Datavant, Inc. System for preparing data for expert certification and monitoring data over time to ensure compliance with certified boundary conditions
US11080423B1 (en) 2018-04-13 2021-08-03 Datavant, Inc. System for simulating a de-identified healthcare data set and creating simulated personal data while retaining profile of authentic data
US10430606B1 (en) 2018-04-30 2019-10-01 Aras Corporation System and method for implementing domain based access control on queries of a self-describing data system
US11368445B2 (en) * 2018-05-21 2022-06-21 Amazon Technologies, Inc. Local encryption for single sign-on
US11126754B2 (en) * 2018-11-30 2021-09-21 BicDroid Inc. Personalized and cryptographically secure access control in operating systems
US11743254B2 (en) * 2019-08-12 2023-08-29 Lenovo (Singapore) Pte. Ltd. Device authentication across unsecure network
US11520878B2 (en) * 2019-11-26 2022-12-06 Red Hat, Inc. Using a trusted execution environment for a proof-of-work key wrapping scheme that restricts execution based on device capabilities
US11263310B2 (en) * 2019-11-26 2022-03-01 Red Hat, Inc. Using a trusted execution environment for a proof-of-work key wrapping scheme that verifies remote device capabilities
US11887072B2 (en) * 2019-12-11 2024-01-30 Bitt Inc. Digital currency minting in a system of network nodes implementing a distributed ledger
US11431689B2 (en) * 2020-01-10 2022-08-30 Lennox Industries Inc. Secure payload delivery
US11265144B2 (en) 2020-03-09 2022-03-01 International Business Machines Corporation Consistent ciphertext creation
US11411952B2 (en) * 2020-04-02 2022-08-09 Verizon Patent And Licensing Inc. Systems and methods for multi-level authentication
WO2021206934A1 (en) 2020-04-09 2021-10-14 Nuts Holdings, Llc Nuts: flexible hierarchy object graphs
US11368287B2 (en) * 2020-05-19 2022-06-21 International Business Machines Corporation Identification of a creator of an encrypted object
US11276258B2 (en) 2020-06-15 2022-03-15 Delphian Systems, LLC Enhanced security for contactless access card system
US11640289B2 (en) * 2020-08-24 2023-05-02 Rockwell Collins, Inc. Microservices cloud-native architecture for ubiquitous simulation as a service
US20220085983A1 (en) * 2020-09-14 2022-03-17 Hewlett Packard Enterprise Development Lp Encryption keys from storage systems
US11755779B1 (en) 2020-09-30 2023-09-12 Datavant, Inc. Linking of tokenized trial data to other tokenized data
US11223489B1 (en) 2021-02-23 2022-01-11 Garantir LLC Advanced security control implementation of proxied cryptographic keys
US11757634B2 (en) 2021-03-30 2023-09-12 Bank Of America Corporation System for secure client-side cryptographic key retrieval using cryptographic key splitting and wrapping
US11418329B1 (en) 2021-05-28 2022-08-16 Garantir LLC Shared secret implementation of proxied cryptographic keys
US11218317B1 (en) 2021-05-28 2022-01-04 Garantir LLC Secure enclave implementation of proxied cryptographic keys
CN113395271A (en) * 2021-06-07 2021-09-14 武汉卓尔信息科技有限公司 Data security access method in cloud computing platform and cloud computing platform
US11502827B1 (en) * 2021-09-03 2022-11-15 Garantir LLC Exporting remote cryptographic keys

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7181620B1 (en) * 2001-11-09 2007-02-20 Cisco Technology, Inc. Method and apparatus providing secure initialization of network devices using a cryptographic key distribution approach

Family Cites Families (120)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5265221A (en) * 1989-03-20 1993-11-23 Tandem Computers Access restriction facility method and apparatus
US5201000A (en) * 1991-09-27 1993-04-06 International Business Machines Corporation Method for generating public and private key pairs without using a passphrase
US5276901A (en) * 1991-12-16 1994-01-04 International Business Machines Corporation System for controlling group access to objects using group access control folder and group identification as individual user
US6850252B1 (en) 1999-10-05 2005-02-01 Steven M. Hoffberg Intelligent electronic appliance system and method
AU4373493A (en) 1992-05-15 1993-12-13 Tecsec, Incorporated Voice and data encryption device
US5369707A (en) * 1993-01-27 1994-11-29 Tecsec Incorporated Secure network method and apparatus
US5375169A (en) * 1993-05-28 1994-12-20 Tecsec, Incorporated Cryptographic key management method and apparatus
US5440290A (en) 1993-06-07 1995-08-08 Tecsec Incorporated Proximity detection device for protection of personnel against exposure to hazardous radio frequency radiation
US5369702A (en) 1993-10-18 1994-11-29 Tecsec Incorporated Distributed cryptographic object method
US5680452A (en) 1993-10-18 1997-10-21 Tecsec Inc. Distributed cryptographic object method
US5432851A (en) * 1993-10-21 1995-07-11 Tecsec Incorporated Personal computer access control system
US5651109A (en) * 1993-12-29 1997-07-22 Lucent Technologies Inc. Memory structure for configuring a terminal device
US6813769B1 (en) 1997-10-28 2004-11-02 Microsoft Corporation Server application components with control over state duration
JP4095680B2 (en) * 1994-08-01 2008-06-04 富士通株式会社 Security management method for card type storage device and card type storage device
EP0697662B1 (en) * 1994-08-15 2001-05-30 International Business Machines Corporation Method and system for advanced role-based access control in distributed and centralized computer systems
JP2000503154A (en) 1996-01-11 2000-03-14 エムアールジェイ インコーポレイテッド System for controlling access and distribution of digital ownership
JP3090021B2 (en) 1996-02-14 2000-09-18 富士ゼロックス株式会社 Electronic document management device
US6272538B1 (en) * 1996-07-30 2001-08-07 Micron Technology, Inc. Method and system for establishing a security perimeter in computer networks
US6055637A (en) * 1996-09-27 2000-04-25 Electronic Data Systems Corporation System and method for accessing enterprise-wide resources by presenting to the resource a temporary credential
US6023765A (en) * 1996-12-06 2000-02-08 The United States Of America As Represented By The Secretary Of Commerce Implementation of role-based access control in multi-level secure systems
US5845068A (en) 1996-12-18 1998-12-01 Sun Microsystems, Inc. Multilevel security port methods, apparatuses, and computer program products
US6229445B1 (en) 1997-01-13 2001-05-08 Tecsec, Incorporated RF identification process and apparatus
US6885747B1 (en) 1997-02-13 2005-04-26 Tec.Sec, Inc. Cryptographic key split combiner
US6105132A (en) 1997-02-20 2000-08-15 Novell, Inc. Computer network graded authentication system and method
US5920630A (en) * 1997-02-25 1999-07-06 United States Of America Method of public key cryptography that includes key escrow
IL120420A (en) * 1997-03-10 1999-12-31 Security 7 Software Ltd Method and system for preventing the downloading and execution of executable objects
US6041411A (en) 1997-03-28 2000-03-21 Wyatt; Stuart Alan Method for defining and verifying user access rights to a computer information
US6742050B1 (en) 1997-03-31 2004-05-25 Intel Corporation Inter-object messaging
US5991877A (en) 1997-04-03 1999-11-23 Lockheed Martin Corporation Object-oriented trusted application framework
US6694433B1 (en) * 1997-05-08 2004-02-17 Tecsec, Inc. XML encryption scheme
US6229894B1 (en) 1997-07-14 2001-05-08 Entrust Technologies, Ltd. Method and apparatus for access to user-specific encryption information
US6014666A (en) * 1997-10-28 2000-01-11 Microsoft Corporation Declarative and programmatic access control of component-based server applications using roles
US5890161A (en) 1997-10-28 1999-03-30 Microsoft Corporation Automatic transaction processing of component-based server applications
US5958004A (en) 1997-10-28 1999-09-28 Microsoft Corporation Disabling and enabling transaction committal in transactional application components
US6134594A (en) 1997-10-28 2000-10-17 Microsoft Corporation Multi-user, multiple tier distributed application architecture with single-user access control of middle tier objects
US6202066B1 (en) 1997-11-19 2001-03-13 The United States Of America As Represented By The Secretary Of Commerce Implementation of role/group permission association using object access type
US6044466A (en) 1997-11-25 2000-03-28 International Business Machines Corp. Flexible and dynamic derivation of permissions
US6141754A (en) * 1997-11-28 2000-10-31 International Business Machines Corporation Integrated method and system for controlling information access and distribution
US6088679A (en) * 1997-12-01 2000-07-11 The United States Of America As Represented By The Secretary Of Commerce Workflow management employing role-based access control
US6490680B1 (en) * 1997-12-04 2002-12-03 Tecsec Incorporated Access control and authorization system
US6622247B1 (en) * 1997-12-19 2003-09-16 Hewlett-Packard Development Company, Lp Method for certifying the authenticity of digital objects by an authentication authority and for certifying their compliance by a testing authority
EP1050133B2 (en) * 1998-01-02 2009-05-27 Cryptography Research Inc. Leak-resistant cryptographic method and apparatus
US6754820B1 (en) 2001-01-30 2004-06-22 Tecsec, Inc. Multiple level access system
US7095852B2 (en) * 1998-02-13 2006-08-22 Tecsec, Inc. Cryptographic key split binder for use with tagged data elements
US6357010B1 (en) * 1998-02-17 2002-03-12 Secure Computing Corporation System and method for controlling access to documents stored on an internal network
JPH11313102A (en) 1998-02-27 1999-11-09 Fujitsu Ltd Access control list generation method and its device
US6453419B1 (en) * 1998-03-18 2002-09-17 Secure Computing Corporation System and method for implementing a security policy
US7096494B1 (en) * 1998-05-05 2006-08-22 Chen Jay C Cryptographic system and method for electronic transactions
US6901426B1 (en) * 1998-05-08 2005-05-31 E-Talk Corporation System and method for providing access privileges for users in a performance evaluation system
US6587857B1 (en) 1998-06-30 2003-07-01 Citicorp Development Center, Inc. System and method for warehousing and retrieving data
US6075865A (en) 1998-07-01 2000-06-13 Tecsec Incorporated Cryptographic communication process and apparatus
US6321334B1 (en) * 1998-07-15 2001-11-20 Microsoft Corporation Administering permissions associated with a security zone in a computer system security model
US6473791B1 (en) 1998-08-17 2002-10-29 Microsoft Corporation Object load balancing
US6442620B1 (en) * 1998-08-17 2002-08-27 Microsoft Corporation Environment extensibility and automatic services for component applications using contexts, policies and activators
US7111173B1 (en) * 1998-09-01 2006-09-19 Tecsec, Inc. Encryption process including a biometric unit
US6311278B1 (en) * 1998-09-09 2001-10-30 Sanctum Ltd. Method and system for extracting application protocol characteristics
US6324646B1 (en) 1998-09-11 2001-11-27 International Business Machines Corporation Method and system for securing confidential data in a computer network
US6115709A (en) * 1998-09-18 2000-09-05 Tacit Knowledge Systems, Inc. Method and system for constructing a knowledge profile of a user having unrestricted and restricted access portions according to respective levels of confidence of content of the portions
AU6401999A (en) 1998-09-28 2000-04-17 Argus Systems Group, Inc. Trusted compartmentalized computer operating system
JP2000124887A (en) * 1998-10-14 2000-04-28 Fuji Xerox Co Ltd Enciphering/decoding method for group unit, and method and device for signature
US6684330B1 (en) 1998-10-16 2004-01-27 Tecsec, Inc. Cryptographic information and flow control
US6560337B1 (en) * 1998-10-28 2003-05-06 International Business Machines Corporation Systems, methods and computer program products for reducing effective key length of ciphers using one-way cryptographic functions and an initial key
US6678705B1 (en) 1998-11-16 2004-01-13 At&T Corp. System for archiving electronic documents using messaging groupware
US6487665B1 (en) 1998-11-30 2002-11-26 Microsoft Corporation Object security boundaries
US6385724B1 (en) * 1998-11-30 2002-05-07 Microsoft Corporation Automatic object caller chain with declarative impersonation and transitive trust
US6574736B1 (en) * 1998-11-30 2003-06-03 Microsoft Corporation Composable roles
US20030172280A1 (en) * 1998-12-04 2003-09-11 Scheidt Edward M. Access control and authorization system
US6499109B1 (en) 1998-12-08 2002-12-24 Networks Associates Technology, Inc. Method and apparatus for securing software distributed over a network
US6578143B1 (en) * 1998-12-18 2003-06-10 Qualcomm Incorporated Method for negotiating weakened keys in encryption systems
US6574733B1 (en) * 1999-01-25 2003-06-03 Entrust Technologies Limited Centralized secure backup system and method
US6529949B1 (en) * 2000-02-07 2003-03-04 Interactual Technologies, Inc. System, method and article of manufacture for remote unlocking of local content located on a client device
US6769130B1 (en) 2000-01-20 2004-07-27 Interactual Technologies, Inc. System, method and article of manufacture for late synchronization during the execution of a multimedia event on a plurality of client computers
US6721713B1 (en) 1999-05-27 2004-04-13 Andersen Consulting Llp Business alliance identification in a web architecture framework
US6536037B1 (en) 1999-05-27 2003-03-18 Accenture Llp Identification of redundancies and omissions among components of a web based architecture
US6519571B1 (en) * 1999-05-27 2003-02-11 Accenture Llp Dynamic customer profile management
US6615166B1 (en) * 1999-05-27 2003-09-02 Accenture Llp Prioritizing components of a network framework required for implementation of technology
US6473794B1 (en) * 1999-05-27 2002-10-29 Accenture Llp System for establishing plan to test components of web based framework by displaying pictorial representation and conveying indicia coded components of existing network framework
US6289450B1 (en) * 1999-05-28 2001-09-11 Authentica, Inc. Information security architecture for encrypting documents for remote access while maintaining access control
US6687375B1 (en) * 1999-06-02 2004-02-03 International Business Machines Corporation Generating user-dependent keys and random numbers
CA2277633C (en) * 1999-07-19 2009-10-20 Certicom Corp. Split-key key-agreement protocol
US6668322B1 (en) * 1999-08-05 2003-12-23 Sun Microsystems, Inc. Access management system and method employing secure credentials
US6609198B1 (en) * 1999-08-05 2003-08-19 Sun Microsystems, Inc. Log-on service providing credential level change without loss of session continuity
US7606731B2 (en) * 1999-08-17 2009-10-20 Mcclung Iii Guy Lamonte Price guarantee methods and systems
US6370573B1 (en) 1999-08-31 2002-04-09 Accenture Llp System, method and article of manufacture for managing an environment of a development architecture framework
US6324647B1 (en) * 1999-08-31 2001-11-27 Michel K. Bowman-Amuah System, method and article of manufacture for security management in a development architecture framework
US6405364B1 (en) * 1999-08-31 2002-06-11 Accenture Llp Building techniques in a development architecture framework
US6662357B1 (en) 1999-08-31 2003-12-09 Accenture Llp Managing information in an integrated development architecture framework
US6256773B1 (en) 1999-08-31 2001-07-03 Accenture Llp System, method and article of manufacture for configuration management in a development architecture framework
US6748555B1 (en) * 1999-09-09 2004-06-08 Microsoft Corporation Object-based software management
US6853988B1 (en) * 1999-09-20 2005-02-08 Security First Corporation Cryptographic server with provisions for interoperability between cryptographic systems
US6629081B1 (en) * 1999-12-22 2003-09-30 Accenture Llp Account settlement and financing in an e-commerce environment
US6757898B1 (en) * 2000-01-18 2004-06-29 Mckesson Information Solutions, Inc. Electronic provider—patient interface system
JP2001211154A (en) * 2000-01-25 2001-08-03 Murata Mach Ltd Secret key generating method, ciphering method, and cipher communication method
US6629105B1 (en) 2000-02-19 2003-09-30 Novell, Inc. Facilitating user administration of directory trees
ATE414943T1 (en) 2000-03-03 2008-12-15 Ibm SYSTEM FOR DETERMINING WEAKNESSES OF WEB APPLICATIONS
US6701345B1 (en) 2000-04-13 2004-03-02 Accenture Llp Providing a notification when a plurality of users are altering similar data in a health care solution environment
CN1142653C (en) * 2000-04-28 2004-03-17 杨宏伟 Dynamic password authentication system and method
US6658415B1 (en) 2000-04-28 2003-12-02 International Business Machines Corporation Monitoring and managing user access to content via a universally accessible database
US6453791B1 (en) * 2000-05-25 2002-09-24 Kyle Seitzinger Concealable body armor briefs
US6877094B1 (en) * 2000-07-28 2005-04-05 Sun Microsystems, Inc. Method and apparatus for authentication and payment for devices participating in Jini communities
US7039392B2 (en) * 2000-10-10 2006-05-02 Freescale Semiconductor System and method for providing device authentication in a wireless network
US6871231B2 (en) 2001-01-03 2005-03-22 Ipac Acquisition Subsidiary I, Llc Role-based access to image metadata
US6871232B2 (en) 2001-03-06 2005-03-22 International Business Machines Corporation Method and system for third party resource provisioning management
WO2002078238A2 (en) * 2001-03-27 2002-10-03 Microsoft Corporation Distributed, scalable cryptographic acces control
JP2004537095A (en) * 2001-04-24 2004-12-09 ヒューレット・パッカード・カンパニー Information security system
US6768988B2 (en) 2001-05-29 2004-07-27 Sun Microsystems, Inc. Method and system for incorporating filtered roles in a directory system
US6785686B2 (en) * 2001-05-29 2004-08-31 Sun Microsystems, Inc. Method and system for creating and utilizing managed roles in a directory system
US6918107B2 (en) 2001-07-02 2005-07-12 Bea Systems, Inc. Programming language extensions for processing data representation language objects and related applications
US6754884B1 (en) 2001-07-02 2004-06-22 Bea Systems, Inc. Programming language extensions for processing XML objects and related applications
JP3904432B2 (en) * 2001-11-16 2007-04-11 株式会社ルネサステクノロジ Information processing device
US6859810B2 (en) 2001-12-10 2005-02-22 Bea Systems, Inc. Declarative specification and engine for non-isomorphic data mapping
US7299364B2 (en) * 2002-04-09 2007-11-20 The Regents Of The University Of Michigan Method and system to maintain application data secure and authentication token for use therein
US6768968B2 (en) * 2002-04-18 2004-07-27 International Business Machines Corporation Method and system of an integrated simulation tool using business patterns and scripts
US7240046B2 (en) * 2002-09-04 2007-07-03 International Business Machines Corporation Row-level security in a relational database management system
US7424115B2 (en) * 2003-01-30 2008-09-09 Nokia Corporation Generating asymmetric keys in a telecommunications system
US20050015602A1 (en) * 2003-04-28 2005-01-20 Rees Robert Thomas Owen Method and apparatus for passing data securely between parties
US7515717B2 (en) * 2003-07-31 2009-04-07 International Business Machines Corporation Security containers for document components
US20050289343A1 (en) * 2004-06-23 2005-12-29 Sun Microsystems, Inc. Systems and methods for binding a hardware component and a platform
WO2007001328A2 (en) * 2004-07-29 2007-01-04 Infoassure, Inc. Information-centric security
US8166296B2 (en) * 2004-10-20 2012-04-24 Broadcom Corporation User authentication system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7181620B1 (en) * 2001-11-09 2007-02-20 Cisco Technology, Inc. Method and apparatus providing secure initialization of network devices using a cryptographic key distribution approach

Also Published As

Publication number Publication date
WO2006020426A3 (en) 2009-04-16
WO2006015182A3 (en) 2007-03-01
US20060218400A1 (en) 2006-09-28
US20060053285A1 (en) 2006-03-09
WO2007001328A3 (en) 2009-04-09
WO2007001329A2 (en) 2007-01-04
US7711120B2 (en) 2010-05-04
US7739501B2 (en) 2010-06-15
US20060050870A1 (en) 2006-03-09
WO2006020426A2 (en) 2006-02-23
WO2006015182A2 (en) 2006-02-09
US7715565B2 (en) 2010-05-11
US20060242407A1 (en) 2006-10-26
WO2007001328A2 (en) 2007-01-04

Similar Documents

Publication Publication Date Title
WO2007001329A3 (en) Cryptographic key management
Wex et al. Trust issues for vehicular ad hoc networks
CN102412967B (en) Data transmission system and method
WO2006033997A3 (en) System and method for providing authorized access to digital content
WO2008121157A3 (en) Cryptographic key management system facilitating secure access of data portions to corresponding groups of users
WO2007012035A3 (en) Wagering game with encryption and authentication
CN107203344A (en) A kind of date storage method and data-storage system
CN107833139A (en) Transaction data processing method, device, computer equipment and storage medium
CN106059763B (en) The properties base multi-mechanism hierarchical Ciphertext policy weight encryption method of cloud environment
WO2006113206B1 (en) Providing fresh session keys
WO2001003364A8 (en) Dual encryption protocol for scalable secure group communication
WO1999034554A3 (en) Administration and utilization of secret fresh random numbers in a networked environment
WO2006005047A3 (en) System and method for consolidating, securing and automating out-of-band access to nodes in a data network
EP2003812A3 (en) Method and device for managing cryptographic keys in secret communications network
WO2009105280A3 (en) Systems and methods for secure workgroup management and communication
WO2007121190A3 (en) Method and apparatus for binding multiple authentications
WO2010023148A3 (en) Method and system for policy based lifecycle management of virtual software appliances
CN110147684A (en) For realizing the method and apparatus of block chain data-privacy protection
WO2005101831A3 (en) Distributed management in authorized domain
GB2442916A (en) Securely storing and accessing data
WO2006055853A3 (en) System and method for providing authorized access to digital content
CN106686010A (en) Multi-mechanism attribute-based encryption method supporting strategy dynamic updating
CN104871168A (en) Resource protection on un-trusted devices
CA2489127A1 (en) Techniques for dynamically establishing and managing authentication and trust relationships
Yang et al. Group time-based one-time passwords and its application to efficient privacy-preserving proof of location

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase