IN2015KN00455A - - Google Patents
Info
- Publication number
- IN2015KN00455A IN2015KN00455A IN455KON2015A IN2015KN00455A IN 2015KN00455 A IN2015KN00455 A IN 2015KN00455A IN 455KON2015 A IN455KON2015 A IN 455KON2015A IN 2015KN00455 A IN2015KN00455 A IN 2015KN00455A
- Authority
- IN
- India
- Prior art keywords
- different
- software components
- data packet
- data packets
- data
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/034—Test or assess a computer or a system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/24—Key scheduling, i.e. generating round keys or sub-keys for block encryption
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
- Storage Device Security (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Retry When Errors Occur (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Approaches for providing a secure computational environment are disclosed. In certain implementations, a secure computational environment may be provided by: limiting exploitable or potentially exploitable sub components in software components; replacing software components with corresponding known good software components without regard to whether the software components have been compromised or potentially compromised; combining different information to be transmitted into different slices of a data packet and/or encrypting the slices using different cryptographic schemes; processing a data packet having data slices associated with different information that are encrypted using different cryptographic schemes; securing information using data packets having headers that start at different positions within a data packet with respect to other data packets; processing data packets having headers that start at different positions within a data packet with respect to other data packets; or utilizing other approaches.
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201261684745P | 2012-08-18 | 2012-08-18 | |
US201261684744P | 2012-08-18 | 2012-08-18 | |
US201261684746P | 2012-08-18 | 2012-08-18 | |
US201261684743P | 2012-08-18 | 2012-08-18 | |
PCT/US2013/055449 WO2014031494A2 (en) | 2012-08-18 | 2013-08-16 | System and method for providing a secure computational environment |
Publications (1)
Publication Number | Publication Date |
---|---|
IN2015KN00455A true IN2015KN00455A (en) | 2015-07-17 |
Family
ID=50100946
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
IN455KON2015 IN2015KN00455A (en) | 2012-08-18 | 2013-08-16 |
Country Status (10)
Country | Link |
---|---|
US (8) | US8819836B2 (en) |
EP (1) | EP2885739B1 (en) |
JP (1) | JP6382196B2 (en) |
KR (1) | KR20150070105A (en) |
CN (2) | CN107979612A (en) |
AU (2) | AU2013306094A1 (en) |
CA (1) | CA2882136A1 (en) |
IL (1) | IL237219B (en) |
IN (1) | IN2015KN00455A (en) |
WO (1) | WO2014031494A2 (en) |
Families Citing this family (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
IL210169A0 (en) | 2010-12-22 | 2011-03-31 | Yehuda Binder | System and method for routing-based internet security |
IN2015KN00455A (en) | 2012-08-18 | 2015-07-17 | Luminal Inc | |
US9231921B2 (en) * | 2013-08-20 | 2016-01-05 | Janus Technologies, Inc. | System and architecture for secure computer devices |
US9756074B2 (en) | 2013-12-26 | 2017-09-05 | Fireeye, Inc. | System and method for IPS and VM-based detection of suspicious objects |
US10084813B2 (en) * | 2014-06-24 | 2018-09-25 | Fireeye, Inc. | Intrusion prevention and remedy system |
US20160170739A1 (en) * | 2014-12-15 | 2016-06-16 | Dimitar Kapashikov | Alter application behaviour during runtime |
US9591022B2 (en) | 2014-12-17 | 2017-03-07 | The Boeing Company | Computer defenses and counterattacks |
US11651367B2 (en) * | 2015-09-18 | 2023-05-16 | International Business Machines Corporation | Security in a communication network |
US10341194B2 (en) | 2015-10-05 | 2019-07-02 | Fugue, Inc. | System and method for building, optimizing, and enforcing infrastructure on a cloud based computing environment |
US20180034847A1 (en) * | 2016-07-27 | 2018-02-01 | Fugue, Inc. | Regeneration and generational mutation for security and fidelity in software defined networks |
US10666443B2 (en) * | 2016-10-18 | 2020-05-26 | Red Hat, Inc. | Continued verification and monitoring of application code in containerized execution environment |
US10691837B1 (en) * | 2017-06-02 | 2020-06-23 | Apple Inc. | Multi-user storage volume encryption via secure enclave |
US10346157B2 (en) * | 2017-07-31 | 2019-07-09 | Qualcomm Incorporated | Patch infrastructure for ROM firmware |
EP3547122B1 (en) * | 2018-03-27 | 2023-06-07 | CODESYS Holding GmbH | A method and system for replacing a software component of a runtime system |
US11709946B2 (en) | 2018-06-06 | 2023-07-25 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US11588838B2 (en) | 2018-06-06 | 2023-02-21 | Reliaquest Holdings, Llc | Threat mitigation system and method |
US11461461B2 (en) | 2018-07-17 | 2022-10-04 | Mergebase Software Inc. | Systems and methods for managing and securing computer systems |
US10785128B1 (en) | 2018-11-21 | 2020-09-22 | Candid Partners, LLC | System, apparatus and method for deploying infrastructure to the cloud |
US10990370B1 (en) | 2018-11-21 | 2021-04-27 | Candid Labs, Inc. | System, apparatus and method for deploying infrastructure to the cloud |
US10872029B1 (en) | 2018-11-21 | 2020-12-22 | Candid Partners, LLC | System, apparatus and method for deploying infrastructure to the cloud |
US11599644B2 (en) * | 2019-05-17 | 2023-03-07 | Walmart Apollo, Llc | Blocking insecure code with locking |
USD926809S1 (en) | 2019-06-05 | 2021-08-03 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
USD926810S1 (en) | 2019-06-05 | 2021-08-03 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
USD926811S1 (en) | 2019-06-06 | 2021-08-03 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
USD926200S1 (en) | 2019-06-06 | 2021-07-27 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
USD926782S1 (en) | 2019-06-06 | 2021-08-03 | Reliaquest Holdings, Llc | Display screen or portion thereof with a graphical user interface |
US11343089B2 (en) * | 2019-07-10 | 2022-05-24 | Tunnel VUE Inc. | Cryptography system and method |
CN112714097A (en) * | 2019-10-25 | 2021-04-27 | 华为技术有限公司 | Secure communication method, device and system |
US11968187B2 (en) * | 2020-10-23 | 2024-04-23 | Secturion Systems, Inc. | Multi-independent level security for high performance computing and data storage systems |
US11921878B2 (en) * | 2021-01-21 | 2024-03-05 | Servicenow, Inc. | Database security through obfuscation |
Family Cites Families (71)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5444850A (en) | 1993-08-04 | 1995-08-22 | Trend Micro Devices Incorporated | Method and apparatus for controlling network and workstation access prior to workstation boot |
US5832492A (en) | 1995-09-05 | 1998-11-03 | Compaq Computer Corporation | Method of scheduling interrupts to the linked lists of transfer descriptors scheduled at intervals on a serial bus |
US6199203B1 (en) * | 1998-07-21 | 2001-03-06 | Hewlett-Packard Company | Memory management techniques for on-line replaceable software |
US6501995B1 (en) | 1999-06-30 | 2002-12-31 | The Foxboro Company | Process control system and method with improved distribution, installation and validation of components |
US7284274B1 (en) * | 2001-01-18 | 2007-10-16 | Cigital, Inc. | System and method for identifying and eliminating vulnerabilities in computer software applications |
US20020178375A1 (en) | 2001-01-31 | 2002-11-28 | Harris Corporation | Method and system for protecting against malicious mobile code |
US7350207B2 (en) | 2001-05-25 | 2008-03-25 | Tellabs Operations, Inc. | Rule-based system and method for downloading computer software over a network |
US8205193B2 (en) * | 2001-06-11 | 2012-06-19 | Hewlett-Packard Development Company, L.P. | Runtime updating of virtual machine class files |
US7188163B2 (en) | 2001-11-26 | 2007-03-06 | Sun Microsystems, Inc. | Dynamic reconfiguration of applications on a server |
US20030147369A1 (en) | 2001-12-24 | 2003-08-07 | Singh Ram Naresh | Secure wireless transfer of data between different computing devices |
US7292691B2 (en) * | 2002-01-02 | 2007-11-06 | Sony Corporation | Progressive video refresh slice detection |
US7254586B2 (en) * | 2002-06-28 | 2007-08-07 | Microsoft Corporation | Secure and opaque type library providing secure data protection of variables |
US7486678B1 (en) | 2002-07-03 | 2009-02-03 | Greenfield Networks | Multi-slice network processor |
JP2004164351A (en) * | 2002-11-14 | 2004-06-10 | Hitachi Ltd | Improper program correction method and device for computer system |
US20060165232A1 (en) * | 2002-12-16 | 2006-07-27 | Dzevdet Burazerovic | Method and apparatus to encrypt video data streams |
US7716736B2 (en) * | 2003-04-17 | 2010-05-11 | Cybersoft, Inc. | Apparatus, methods and articles of manufacture for computer virus testing |
US7134121B2 (en) | 2003-06-12 | 2006-11-07 | International Business Machines Corporation | Installing fixes based on usage |
US7149897B2 (en) * | 2003-07-25 | 2006-12-12 | The United States Of America As Represented By The Secretary Of The Navy | Systems and methods for providing increased computer security |
US7275213B2 (en) | 2003-08-11 | 2007-09-25 | Ricoh Company, Ltd. | Configuring a graphical user interface on a multifunction peripheral |
US7533377B2 (en) | 2003-09-29 | 2009-05-12 | International Business Machines Corporation | Achieving autonomic behavior in an operating system via a hot-swapping mechanism |
US7735078B1 (en) | 2003-10-30 | 2010-06-08 | Oracle America, Inc. | System and method for software patching for cross-platform products |
US8332943B2 (en) * | 2004-02-17 | 2012-12-11 | Microsoft Corporation | Tiered object-related trust decisions |
US7848332B2 (en) | 2004-11-15 | 2010-12-07 | Cisco Technology, Inc. | Method and apparatus for classifying a network protocol and aligning a network protocol header relative to cache line boundary |
US20060185018A1 (en) * | 2005-02-17 | 2006-08-17 | Microsoft Corporation | Systems and methods for shielding an identified vulnerability |
US8800042B2 (en) * | 2005-05-16 | 2014-08-05 | Hewlett-Packard Development Company, L.P. | Secure web application development and execution environment |
US7779399B2 (en) * | 2005-05-16 | 2010-08-17 | Armorize Technologies, Inc. | System and method for securing web application code and verifying correctness of software |
CN1881908A (en) * | 2005-06-13 | 2006-12-20 | 华为技术有限公司 | Method for measuring MPLS network performance parameter |
US20070016961A1 (en) * | 2005-07-11 | 2007-01-18 | Vogler Dean H | Application revocation using an application revocation list in a portable electronic device |
US7650492B2 (en) * | 2005-07-19 | 2010-01-19 | Microsoft Corporation | Automatic update of computer-readable components to support a trusted environment |
US20070074187A1 (en) * | 2005-09-29 | 2007-03-29 | O'brien Thomas E | Method and apparatus for inserting code fixes into applications at runtime |
US20070091926A1 (en) | 2005-10-21 | 2007-04-26 | Apostolopoulos John G | Method for optimizing portions of data from a plurality of data streams at a transcoding node |
US7756834B2 (en) * | 2005-11-03 | 2010-07-13 | I365 Inc. | Malware and spyware attack recovery system and method |
US7809670B2 (en) * | 2005-12-09 | 2010-10-05 | Microsoft Corporation | Classification of malware using clustering that orders events in accordance with the time of occurance |
US7761503B2 (en) * | 2006-01-06 | 2010-07-20 | Microsoft Corporation | Peer distribution point feature for system management server |
US7697529B2 (en) | 2006-02-28 | 2010-04-13 | Cisco Technology, Inc. | Fabric channel control apparatus and method |
WO2007147495A2 (en) * | 2006-06-21 | 2007-12-27 | Wibu-Systems Ag | Method and system for intrusion detection |
US20080022374A1 (en) | 2006-06-29 | 2008-01-24 | Research In Motion Limited | System and method for securely communicating with a server |
WO2008007456A1 (en) | 2006-07-13 | 2008-01-17 | Seiko Epson Corporation | Network system, computer, network system application providing method, network system application execution method, and program |
IL177756A (en) | 2006-08-29 | 2014-11-30 | Lior Frenkel | Encryption-based attack prevention |
US8234641B2 (en) | 2006-10-17 | 2012-07-31 | Managelq, Inc. | Compliance-based adaptations in managed virtual systems |
US7809955B2 (en) | 2006-10-17 | 2010-10-05 | Blue Ridge Networks, Inc. | Trustable communities for a computer system |
US8218539B2 (en) * | 2006-10-18 | 2012-07-10 | Broadcom Corporation | Flexible packet field processor |
JP5042315B2 (en) | 2006-10-19 | 2012-10-03 | チェックマークス リミテッド | Detect security vulnerabilities in source code |
IL180748A (en) * | 2007-01-16 | 2013-03-24 | Waterfall Security Solutions Ltd | Secure archive |
US8011010B2 (en) * | 2007-04-17 | 2011-08-30 | Microsoft Corporation | Using antimalware technologies to perform offline scanning of virtual machine images |
US20090076628A1 (en) * | 2007-09-18 | 2009-03-19 | David Mark Smith | Methods and apparatus to upgrade and provide control redundancy in process plants |
US8332838B2 (en) * | 2007-11-14 | 2012-12-11 | Continental Automotive Systems, Inc. | Systems and methods for updating device software |
ATE522861T1 (en) | 2007-12-13 | 2011-09-15 | Ericsson Telefon Ab L M | FIRMWARE UPDATE ON AN ELECTRONIC DEVICE |
US20090247293A1 (en) | 2008-03-26 | 2009-10-01 | Aristocrat Technologies Australia Pty Limited | Gaming machine |
US9189628B2 (en) | 2008-04-10 | 2015-11-17 | Adobe Systems Incorporated | Data driven system for responding to security vulnerability |
US20100049373A1 (en) * | 2008-08-25 | 2010-02-25 | Gm Global Technology Operations, Inc. | Method for modular software removal |
DE102008061480A1 (en) * | 2008-10-06 | 2010-04-08 | Siemens Aktiengesellschaft | Method and apparatus for exchanging a component of a computer system |
US8051287B2 (en) | 2008-10-15 | 2011-11-01 | Adobe Systems Incorporated | Imparting real-time priority-based network communications in an encrypted communication session |
US8208494B2 (en) | 2008-12-03 | 2012-06-26 | Gigamon Llc | Intelligent packet slicing |
US9046995B2 (en) * | 2009-04-09 | 2015-06-02 | On24, Inc. | Editing of two dimensional software consumables within a complex three dimensional spatial application and method |
CN101625641A (en) * | 2009-08-05 | 2010-01-13 | 天津大学 | Trusted software development method based on security defect knowledge base |
US8407800B2 (en) * | 2009-11-24 | 2013-03-26 | Honeywell International Inc. | Method for software vulnerability flow analysis, generation of vulnerability-covering code, and multi-generation of functionally-equivalent code |
US9639347B2 (en) | 2009-12-21 | 2017-05-02 | International Business Machines Corporation | Updating a firmware package |
US20120066672A1 (en) * | 2010-03-16 | 2012-03-15 | Salesforce.Com, Inc. | Systems and Methods for Implementing Upgradeable Subscriber-Controlled Managed Package Components in a Multi-Tenant Environment |
US20110258701A1 (en) | 2010-04-14 | 2011-10-20 | Raytheon Company | Protecting A Virtualization System Against Computer Attacks |
US8739150B2 (en) | 2010-05-28 | 2014-05-27 | Smartshift Gmbh | Systems and methods for dynamically replacing code objects via conditional pattern templates |
US9672022B2 (en) * | 2010-06-23 | 2017-06-06 | Microsoft Technology Licensing, Llc | Applications including multiple experience modules |
US8640206B2 (en) | 2010-08-20 | 2014-01-28 | Regis J. Betsch | System and method for controlling access to information stored at plurality of sites |
IL210169A0 (en) * | 2010-12-22 | 2011-03-31 | Yehuda Binder | System and method for routing-based internet security |
CN103688550B (en) | 2011-02-11 | 2019-01-22 | 英特尔公司 | Method, equipment and device for the Media Stream by passing through mechanism |
CN102073823A (en) * | 2011-02-25 | 2011-05-25 | 天津大学 | Defect analysis based software creditability evaluating method |
CN202067259U (en) * | 2011-04-18 | 2011-12-07 | 宁波天一职业技术学院 | Software testing device |
US20130081007A1 (en) * | 2011-09-27 | 2013-03-28 | International Business Machines Corporation | Providing continuous application availability during application update |
US8745746B1 (en) | 2012-03-07 | 2014-06-03 | Symantec Corporation | Systems and methods for addressing security vulnerabilities on computing devices |
US8756698B2 (en) | 2012-08-10 | 2014-06-17 | Nopsec Inc. | Method and system for managing computer system vulnerabilities |
IN2015KN00455A (en) | 2012-08-18 | 2015-07-17 | Luminal Inc |
-
2013
- 2013-08-16 IN IN455KON2015 patent/IN2015KN00455A/en unknown
- 2013-08-16 CN CN201711385266.2A patent/CN107979612A/en active Pending
- 2013-08-16 JP JP2015527673A patent/JP6382196B2/en active Active
- 2013-08-16 WO PCT/US2013/055449 patent/WO2014031494A2/en active Application Filing
- 2013-08-16 US US13/969,158 patent/US8819836B2/en active Active
- 2013-08-16 US US13/969,216 patent/US8755522B2/en active Active
- 2013-08-16 CA CA2882136A patent/CA2882136A1/en not_active Abandoned
- 2013-08-16 EP EP13831764.9A patent/EP2885739B1/en active Active
- 2013-08-16 US US13/969,181 patent/US9003372B2/en active Active
- 2013-08-16 KR KR1020157006867A patent/KR20150070105A/en not_active Application Discontinuation
- 2013-08-16 AU AU2013306094A patent/AU2013306094A1/en not_active Abandoned
- 2013-08-16 CN CN201380049976.1A patent/CN104769606B/en active Active
-
2014
- 2014-06-16 US US14/305,500 patent/US9014373B2/en active Active
- 2014-08-25 US US14/467,933 patent/US9003525B2/en active Active
-
2015
- 2015-02-12 IL IL237219A patent/IL237219B/en active IP Right Grant
- 2015-04-06 US US14/679,831 patent/US9461823B2/en active Active
- 2015-04-06 US US14/679,811 patent/US9385866B2/en active Active
- 2015-04-20 US US14/691,436 patent/US9847878B2/en active Active
-
2019
- 2019-04-12 AU AU2019202562A patent/AU2019202562A1/en not_active Abandoned
Also Published As
Publication number | Publication date |
---|---|
CA2882136A1 (en) | 2014-02-27 |
US9003525B2 (en) | 2015-04-07 |
US8819836B2 (en) | 2014-08-26 |
CN104769606A (en) | 2015-07-08 |
US20140052979A1 (en) | 2014-02-20 |
CN104769606B (en) | 2018-01-26 |
IL237219B (en) | 2018-08-30 |
WO2014031494A3 (en) | 2014-06-19 |
US20140053274A1 (en) | 2014-02-20 |
JP6382196B2 (en) | 2018-08-29 |
EP2885739B1 (en) | 2019-10-02 |
JP2015531928A (en) | 2015-11-05 |
KR20150070105A (en) | 2015-06-24 |
US20140380043A1 (en) | 2014-12-25 |
US20150229474A1 (en) | 2015-08-13 |
AU2013306094A1 (en) | 2015-03-05 |
US20150213271A1 (en) | 2015-07-30 |
US20140380487A1 (en) | 2014-12-25 |
US9014373B2 (en) | 2015-04-21 |
US9847878B2 (en) | 2017-12-19 |
US8755522B2 (en) | 2014-06-17 |
WO2014031494A2 (en) | 2014-02-27 |
IL237219A0 (en) | 2015-04-30 |
US9003372B2 (en) | 2015-04-07 |
US20140053273A1 (en) | 2014-02-20 |
US20150213270A1 (en) | 2015-07-30 |
US9385866B2 (en) | 2016-07-05 |
AU2019202562A1 (en) | 2019-05-02 |
EP2885739A2 (en) | 2015-06-24 |
CN107979612A (en) | 2018-05-01 |
EP2885739A4 (en) | 2016-08-10 |
US9461823B2 (en) | 2016-10-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
IN2015KN00455A (en) | ||
WO2014059136A3 (en) | Techniqued for secure data exchange | |
MX2015014636A (en) | File security method and apparatus for same. | |
EP2582086A4 (en) | Cryptosystem, cryptographic communication method, encryption device, key-generating device, decryption device, content server device, program, and recording medium | |
EP2565862A4 (en) | Encryption processing system, key generation device, encryption device, decryption device, signature processing system, signature device and verification device | |
EP2613472A4 (en) | Encryption processing system, key generation device, encryption device, decryption device, encryption processing method, and encryption processing program | |
GB2509422A (en) | Decryption and encryption of application data | |
WO2014070134A3 (en) | Quorum-based virtual machine security | |
WO2009155002A3 (en) | Time of day encryption using tdma timing | |
EP2905715A4 (en) | Method, system and terminal for encrypting/decrypting application program on communication terminal | |
PH12015500102A1 (en) | Method, device and system for encrypting and decrypting image | |
AU2012225621A8 (en) | Secure file sharing method and system | |
EP2882132A4 (en) | Shared secret key generation device, encryption device, decryption device, shared secret key generation method, encryption method, decryption method, and program | |
SG11201708750TA (en) | Network system, and methods of encrypting data, decrypting encrypted data in the same | |
EP2667538A4 (en) | Encryption system, encryption processing method for encryption system, encryption device, encryption program, decryption device, decryption program, setup device, setup program, key generation device, key generation program, key assignment device and key assignment program | |
PL2664098T3 (en) | Methods and systems for distributing cryptographic data to authenticated recipients | |
GB2503164A (en) | Cross enterprise communication | |
EP2884690A4 (en) | Re-encryption key generation device, re-encryption device, encryption device, decryption device, and program | |
EP2525340A4 (en) | Confidential search system and encryption processing system | |
WO2012087692A3 (en) | System and method for secure communications in a communication system | |
EP2503533A4 (en) | Cipher processing system, key generating device, key delegating device, encrypting device, decrypting device, cipher processing method, and cipher processing program | |
GB2512249A (en) | Secure peer discovery and authentication using a shared secret | |
EP2947810A4 (en) | Encryption system, re-encryption key generation device, re-encryption device, encryption method and encryption program | |
WO2013104837A8 (en) | Method of encryption protected against side channel attacks | |
EP2523178A4 (en) | Encryption processing system, key generation device, key devolvement device, encryption device, decoding device, encryption processing method, and encryption processing program |