CA2584525A1 - Secure data parser method and system - Google Patents
Secure data parser method and system Download PDFInfo
- Publication number
- CA2584525A1 CA2584525A1 CA002584525A CA2584525A CA2584525A1 CA 2584525 A1 CA2584525 A1 CA 2584525A1 CA 002584525 A CA002584525 A CA 002584525A CA 2584525 A CA2584525 A CA 2584525A CA 2584525 A1 CA2584525 A1 CA 2584525A1
- Authority
- CA
- Canada
- Prior art keywords
- data
- portions
- data set
- subset
- restoring
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1074—Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
- H04L67/1078—Resource delivery mechanisms
- H04L67/108—Resource delivery mechanisms characterised by resources being split in blocks or fragments
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/14—Multichannel or multilink protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/08—Error detection or correction by redundancy in data representation, e.g. by using checking codes
- G06F11/10—Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's
- G06F11/1076—Parity data used in redundant arrays of independent storages, e.g. in RAID systems
- G06F11/1092—Rebuilding, e.g. when physically replacing a failing disk
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Abstract
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. The secure data parser may be used to protect data in motion by splitting original data into portions of data, that may be communicated using multiple communications paths.
Claims (85)
1. A method for securing communication of a data set from a first location to a second location, the method comprising:
generating at the first location at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set;
communicating from the first location to the second location the at least two portions of data over at least one communications path, wherein the at least two portions of data are communicated separately from each other; and restoring at the second location the data set from at least a subset of the at least two portions of data.
generating at the first location at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set;
communicating from the first location to the second location the at least two portions of data over at least one communications path, wherein the at least two portions of data are communicated separately from each other; and restoring at the second location the data set from at least a subset of the at least two portions of data.
2. The method of claim 1 wherein the communicating comprises communicating the at least two portions of data on separate communications paths in parallel.
3. The method of claim 1 wherein the communicating comprises communicating that at least two portions of data on a single communications path in a serial transmission.
4. The method of claim 1 wherein the generating is accomplished using an email application.
5. The method of claim 1 wherein the generating is accomplished using a video broadcasting application.
6. The method of claim 1 wherein the communicating over the at least one communications path comprises communicating over a wireless communications path.
7. The method of claim 6, wherein the communicating over the wireless communications path comprises communicating over the wireless communications path using an 802.11 protocol.
8. The method of claim 6, wherein the communicating over the wireless communications path comprises communicating over the wireless communications path using Bluetooth.
9. The method of claim 6, wherein the communicating over the wireless communications path comprises communicating over a wireless LAN.
10. The method of claim 6, wherein the communicating over the wireless communications path comprises communicating over a cellular network.
11. The method of claim 6, wherein the communicating over the wireless communications path comprises communicating over a peer to peer wireless network.
12. The method of claim 6, wherein the communicating over the wireless communications path comprises communicating over a hub based wireless network.
13. The method of claim 6, wherein the communicating over the wireless communications path comprises communicating over a satellite transmission.
14. The method of claim 1 wherein at least one of the first location and the second location is a computer peripheral device.
15. The method of claim 1 wherein at least one of the first location and the second location is a PDA device.
16. The method of claim 1 wherein at least one of the first location and the second location is a storage device.
17. The method of claim 1 wherein the communicating over the at least one communications path comprises communicating over a wired communications path.
18. A method for securing a data set, the method comprising:
generating at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set;
storing the at least two portions of data on at least two data depositories, wherein the at least two data depositories are physically separate from each other; and using at least one of the at least two portions of data stored on at least one of the at least two data depositories as an authentication key stored in an authentication depository in order to restore the data set.
generating at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set;
storing the at least two portions of data on at least two data depositories, wherein the at least two data depositories are physically separate from each other; and using at least one of the at least two portions of data stored on at least one of the at least two data depositories as an authentication key stored in an authentication depository in order to restore the data set.
19. The method of claim 18 wherein the authentication depository is a physical token device.
20. The method of claim 18 further comprising restoring the data set when the authentication depository is coupled to at least a subset of the at least two data depositories.
21. The method of claim 20 further comprising removing access to the data set when the authentication depository is no longer coupled to the at least a subset of the at least two data depositories.
22. A method for securing a data set, the method comprising:
generating at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set;
generating respective integrity information for each of the at least two portions of data;
writing the respective integrity information to each of the at least two portions of data;
storing each of the at least two portions of data separately; and restoring the data set from at least a subset of the at least two portions of data when the respective integrity information of the at least a subset of the at least two portions of data has been verified.
generating at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set;
generating respective integrity information for each of the at least two portions of data;
writing the respective integrity information to each of the at least two portions of data;
storing each of the at least two portions of data separately; and restoring the data set from at least a subset of the at least two portions of data when the respective integrity information of the at least a subset of the at least two portions of data has been verified.
23. The method of claim 22, wherein the integrity information is generated using a hash algorithm.
24. The method of claim 22, wherein the integrity information is generated using a MAC
signature.
signature.
25. The method of claim 22, wherein the integrity information is generated using a digital signature.
26. A method for securing a data set, the method comprising:
generating at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set;
storing each of the at least two portions of data separately; and restoring the data set from at least a subset of the at least two portions of data, wherein at least one particular portion of data is required in order to restore the data set.
generating at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set;
storing each of the at least two portions of data separately; and restoring the data set from at least a subset of the at least two portions of data, wherein at least one particular portion of data is required in order to restore the data set.
27. The method of claim 26 further comprising encrypting at least one of the at least two portions of data, the at least one of the at least two portions of data comprising the at least one particular portion of data.
28. The method of claim 27 wherein the encrypting comprises encrypting at least one of the at least two portions of data according to a first encryption key and at least one other of the at two least portions of data according to a second encryption key.
29. The method of claim 27 wherein the encrypting comprises encrypting at least one of the at least two portion of data using a public key that may be decrypted using a private key.
30. A method for securing a data set, the method comprising:
generating at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set, and wherein the probability that data from the data set is distributed to at least one of the at least two portions of data is less than the probability that data from the data set is distributed to a remainder of the at least two portions of data;
storing each of the at least two portions of data separately; and restoring the data set from at least a subset of the at least two portions of data.
generating at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set, and wherein the probability that data from the data set is distributed to at least one of the at least two portions of data is less than the probability that data from the data set is distributed to a remainder of the at least two portions of data;
storing each of the at least two portions of data separately; and restoring the data set from at least a subset of the at least two portions of data.
31. A method for securing a data set, the method comprising:
generating at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set, and wherein at least one of the at least two portions of data has a predetermined size;
storing each of the at least two portions of data separately; and restoring the data set from at least a subset of the at least two portions of data.
generating at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set, and wherein at least one of the at least two portions of data has a predetermined size;
storing each of the at least two portions of data separately; and restoring the data set from at least a subset of the at least two portions of data.
32. The method of claim 31 wherein the generating the at least two portions of data comprises using a splitting key having a splitting key size and wherein the predetermined size is the splitting key size.
33. The method of claim 31 further comprising encrypting the data set with an encryption key having an encryption key size prior to the generating the at least two portions of data and wherein the predetermined size is the encryption key size.
34. A method for securing a data set, the method comprising:
generating at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set, and wherein the probability that data from the data set is distributed to each of the at least two portions of data is substantially equal;
storing each of the at least two portions of data separately; and restoring the data set from at least a subset of the at least two portions of data.
generating at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set, and wherein the probability that data from the data set is distributed to each of the at least two portions of data is substantially equal;
storing each of the at least two portions of data separately; and restoring the data set from at least a subset of the at least two portions of data.
35. A method for securing a data set, the method comprising:
generating, according to a splitting key, at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set;
generating, according to a Shamir algorithm, splitting key information that is capable of being used to generate the splitting key, wherein the splitting key information is distributed among the at least two portions of data;
storing each of the at least two portions of data separately; and restoring the data set from at least a subset of the at least two portions of data.
generating, according to a splitting key, at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set;
generating, according to a Shamir algorithm, splitting key information that is capable of being used to generate the splitting key, wherein the splitting key information is distributed among the at least two portions of data;
storing each of the at least two portions of data separately; and restoring the data set from at least a subset of the at least two portions of data.
36. The method of claim 35 wherein restoring the data set comprises restoring the splitting key from the splitting key information from at least a subset of the at least two portions of data.
37. A method for securing a data set, the method comprising:
encrypting the data set using an encryption key;
generating at least two portions of data from the encrypted data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the encrypted data set;
generating, according to a Shamir algorithm, encryption key information that is capable of being used to generate the encryption key, wherein the splitting key information is distributed among the at least two portions of data;
storing each of the at least two portions of data separately; and restoring the encrypted data set from at least a subset of the at least two portions of data.
encrypting the data set using an encryption key;
generating at least two portions of data from the encrypted data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the encrypted data set;
generating, according to a Shamir algorithm, encryption key information that is capable of being used to generate the encryption key, wherein the splitting key information is distributed among the at least two portions of data;
storing each of the at least two portions of data separately; and restoring the encrypted data set from at least a subset of the at least two portions of data.
38. The method of claim 37 further comprising:
restoring the encryption key from the encryption key information from at least a subset of the at least two portions of data; and restoring the data set from the encrypted data set and the encryption key.
restoring the encryption key from the encryption key information from at least a subset of the at least two portions of data; and restoring the data set from the encrypted data set and the encryption key.
39. A method for securing a data set, the method comprising:
generating at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set;
encrypting the at least two portions of data using the encryption key;
generating, according to a Shamir algorithm, encryption key information that is capable of being used to generate the encryption key, wherein the splitting key information is distributed among the at least two portions of data;
storing the at least two encrypted portions of data separately from each other; and restoring the data set using a subset of the at least two encrypted portion of data.
generating at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set;
encrypting the at least two portions of data using the encryption key;
generating, according to a Shamir algorithm, encryption key information that is capable of being used to generate the encryption key, wherein the splitting key information is distributed among the at least two portions of data;
storing the at least two encrypted portions of data separately from each other; and restoring the data set using a subset of the at least two encrypted portion of data.
40. The method of claim 39 wherein restoring the data set comprises restoring the splitting key from the splitting key information from at least a subset of the at least two portions of data.
41. A method for securing a data set, the method comprising:
determining a number of portions of data into which to distribute the data set;
generating a substantially random number;
determining into which of the portions of data to distribute each unit of data from the data set based on corresponding data from the substantially random number and distributing accordingly;
storing the portions of data separately;
and restoring the data set from at least a subset of the portions of data.
determining a number of portions of data into which to distribute the data set;
generating a substantially random number;
determining into which of the portions of data to distribute each unit of data from the data set based on corresponding data from the substantially random number and distributing accordingly;
storing the portions of data separately;
and restoring the data set from at least a subset of the portions of data.
42. The method of claim 41 wherein the determining into which of the portions of data to distribute each unit of data from the data set comprises determining into which of the portions of data to distribute each unit of data from the data set based on a hash function of corresponding data from the substantially random number.
43. The method of claim 41 wherein the unit of data is a bit.
44. The method of claim 41 wherein the size of the substantially random number is a multiple, M, of the size of the data set and wherein the determining into which of the portions of data to distribute each unit of data from the data set comprises determining into which of the portions of data to distribute each unit of data from the data set based on a hash function of a corresponding M bits from the substantially random number.
45. The method of claim 44 wherein the multiple, M, is 8 and wherein the determining into which of the portions of data to distribute each unit of data from the data set based on a hash function of a corresponding M bits from the substantially random number comprises determining into which of the portions of data to distribute each bit of data from the data set based on a hash function of a corresponding byte from the substantially random number.
46. The method of claim 41 further comprising appending redundancy data to each of the portions of data.
47. A method for securing a data set, the method comprising:
determining a number of portions of data into which to distribute the data set;
generating a substantially random number;
for each unit of data of the data set, splitting the unit of data into a left segment and a right segment by determining, based on correspodning data from the substantially random number, a splitting location wherein bits to the left of the splitting location represent the left segment and bits to the right of the splitting location represent the right segment;
determining into which of the portions of data to distribute each of the left segment and the right segment of each unit of data from the data set based on corresponding data from the substantially random number and distributing accordingly;
storing the portions of data separately;
and restoring the data set from at least a subset of the portions of data.
determining a number of portions of data into which to distribute the data set;
generating a substantially random number;
for each unit of data of the data set, splitting the unit of data into a left segment and a right segment by determining, based on correspodning data from the substantially random number, a splitting location wherein bits to the left of the splitting location represent the left segment and bits to the right of the splitting location represent the right segment;
determining into which of the portions of data to distribute each of the left segment and the right segment of each unit of data from the data set based on corresponding data from the substantially random number and distributing accordingly;
storing the portions of data separately;
and restoring the data set from at least a subset of the portions of data.
48. The method of claim 47 wherein the splitting the unit of data into the left segment and the right segment comprises splitting the unit of data into the left segment and the right segment based on a hash function of a corresponding data from the substantially random number.
49. The method of claim 47 wherein the unit of data is a byte.
50. The method of claim 47 wherein generating the substantially random number comprises generating the substantially random number of size equal to the size of the data set.
51. The method of claim 50 wherein the unit of data is a byte and wherein the splitting the unit of data into the left segment and the right segment comprises splitting the unit of data into the left segment and the right segment based on a hash function of a corresponding unit of data from the substantially random number.
52. The method of claim 47 wherein the determining into which of the portions of data to distribute each of the left segment and the right segment comprises determining into which of the portions of data to distribute each of the left segment and the right segment of each unit of data from the data set based on corresponding data from the substantially random number and based on a table containing an array of all possible distributions of the right segment and the left.
53. The method of 47 wherein the determining into which of the portions of data to distribute each of the left segment and the right segment comprises determining into which of the portions of data to distribute each of the left segment and the right segment of each unit of data from the data set based on a hash function of corresponding data from the substantially random number and based on a table containing an array of all possible distributions of the right segment and the left segment, wherein the hash function of the corresponding data from the substantially random number indicates which entry in the table to use, the entry indicating a destination portion for the left segment and a destination portion for the right segment.
54. The method of claim 53 wherein:
generating the substantially random number comprises generating the substantially random number of size equal to the size of the data set;
the unit of data is a byte; and the corresponding data is a corresponding unit of data.
generating the substantially random number comprises generating the substantially random number of size equal to the size of the data set;
the unit of data is a byte; and the corresponding data is a corresponding unit of data.
55. A method for securing a data set, the method comprising:
encrypting the data set using an encryption key;
transforming the encryption key using an All or Nothing Transform into a transformed encryption key;
generating at least two portions of data from the encrypted data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the encrypted data set;
generating tranformed encryption key information that is capable of being used to generate the transformed encryption key, wherein the transformed encryption key information is distributed among the at least two portions of data;
storing each of the at least two portions of data separately; and restoring the encrypted data set from at least a subset of the at least two portions of data.
encrypting the data set using an encryption key;
transforming the encryption key using an All or Nothing Transform into a transformed encryption key;
generating at least two portions of data from the encrypted data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the encrypted data set;
generating tranformed encryption key information that is capable of being used to generate the transformed encryption key, wherein the transformed encryption key information is distributed among the at least two portions of data;
storing each of the at least two portions of data separately; and restoring the encrypted data set from at least a subset of the at least two portions of data.
56. The method of claim 55 further comprising:
restoring the transformed encryption key from at least a subset of the at least two portions of data;
restoring the encryption key from the transformed encryption key; and decrypting the encrypted data set.
restoring the transformed encryption key from at least a subset of the at least two portions of data;
restoring the encryption key from the transformed encryption key; and decrypting the encrypted data set.
57. A method for securing a data set, the method comprising:
generating at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set;
encrypting each of the at least two portions of data using an encryption key into at least two portions of encrypted data;
transforming the encryption key using an All or Nothing Transform into a transformed encryption key;
generating transformed encryption key information that is capable of being used to generate the transformed encryption key, wherein the transformed encryption key information is distributed among the at least two portions of data;
storing each of the at least two portions of encrypted data separately; and restoring the data set from at least a subset of the at least two portions of data.
generating at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set;
encrypting each of the at least two portions of data using an encryption key into at least two portions of encrypted data;
transforming the encryption key using an All or Nothing Transform into a transformed encryption key;
generating transformed encryption key information that is capable of being used to generate the transformed encryption key, wherein the transformed encryption key information is distributed among the at least two portions of data;
storing each of the at least two portions of encrypted data separately; and restoring the data set from at least a subset of the at least two portions of data.
58. The method of claim 57 wherein the restoring comprises:
restoring the transformed encryption key from at least a subset of the at least two portions data;
restoring the encryption key from the transformed encryption key; and decrypting the at least a subset of the at least two portions of data.
restoring the transformed encryption key from at least a subset of the at least two portions data;
restoring the encryption key from the transformed encryption key; and decrypting the at least a subset of the at least two portions of data.
59. A method for securing a data set, the method comprising:
generating, using a splitting key, at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set;
transforming the splitting key using an All or Nothing Transform into a transformed splitting key;
generating transformed splitting key information that is capable of being used to generate the transformed splitting key, wherein the transformed splitting key information is distributed among the at least two portions of data;
storing each of the at least two portions of data separately; and restoring the data set from at least a subset of the at least two portions of data.
generating, using a splitting key, at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set;
transforming the splitting key using an All or Nothing Transform into a transformed splitting key;
generating transformed splitting key information that is capable of being used to generate the transformed splitting key, wherein the transformed splitting key information is distributed among the at least two portions of data;
storing each of the at least two portions of data separately; and restoring the data set from at least a subset of the at least two portions of data.
60. The method of claim 59 wherein the restoring comprises:
restoring the transformed splitting key from at least a subset of the at least two portions of data; and restoring the splitting key from the transformed splitting key.
restoring the transformed splitting key from at least a subset of the at least two portions of data; and restoring the splitting key from the transformed splitting key.
61. A method for securing a data set, the method comprising:
encrypting the data set using an encryption key into an encrypted data set;
encrypting the encryption key;
generating at least two portions of data from the encrypted data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the encrypted data set;
storing each of the at least two portions of the encrypted data set separately;
restoring the encrypted data set from at least a subset of the at least two portions of the encrypted data set;
decrypting the encryption key; and decrypting the data set from the encrypted data set using the encryption key.
encrypting the data set using an encryption key into an encrypted data set;
encrypting the encryption key;
generating at least two portions of data from the encrypted data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the encrypted data set;
storing each of the at least two portions of the encrypted data set separately;
restoring the encrypted data set from at least a subset of the at least two portions of the encrypted data set;
decrypting the encryption key; and decrypting the data set from the encrypted data set using the encryption key.
62. The method of claim 61 wherein the encryption key is encrypted using a workgroup key.
63. A method for securing a data set, the method comprising:
generating at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set;
encrypting the at least two portions of data using an encryption key into at least two encrypted portions of data;
encrypting the encryption key;
storing each of the at least two encrypted portions of data separately; and restoring the data set from at least a subset of the at least two encrypted portions of data, the restoring comprising:
decrypting the encryption key, and decrypting the at least a subset of the at least two encrypted portions of data using the encryption key.
generating at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set;
encrypting the at least two portions of data using an encryption key into at least two encrypted portions of data;
encrypting the encryption key;
storing each of the at least two encrypted portions of data separately; and restoring the data set from at least a subset of the at least two encrypted portions of data, the restoring comprising:
decrypting the encryption key, and decrypting the at least a subset of the at least two encrypted portions of data using the encryption key.
64. The method of claim 63 wherein the encryption key is encrypted using a workgroup key.
65. A method for securing a data set, the method comprising:
generating, using a splitting key, at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set;
encrypting the splitting key using an encryption key;
storing each of the at least two portions of the data set separately; and restoring the data set from at least a subset of the at least two portions of the data set, the restoring comprising:
decrypting the splitting key, and restoring, using the splitting key, the data set from the at least a subset of the at least two portions of data.
generating, using a splitting key, at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set;
encrypting the splitting key using an encryption key;
storing each of the at least two portions of the data set separately; and restoring the data set from at least a subset of the at least two portions of the data set, the restoring comprising:
decrypting the splitting key, and restoring, using the splitting key, the data set from the at least a subset of the at least two portions of data.
66. The method of claim 65 wherein the splitting key is encrypted using a workgroup key.
67. A method for securing a data set, the method comprising:
determining a number of portions of data into which to distribute the data set;
sequentially distributing substantially equal shares of data from the data set into each of the data portions, respectively;
appending redundancy data to each of the portions of data;
storing each of the data portions separately; and restoring the data set from a subset of the data portions.
determining a number of portions of data into which to distribute the data set;
sequentially distributing substantially equal shares of data from the data set into each of the data portions, respectively;
appending redundancy data to each of the portions of data;
storing each of the data portions separately; and restoring the data set from a subset of the data portions.
68. A method for securing a data set, the method comprising:
determining a number of portions of data into which to distribute the data set;
sequentially distributing the data set, one bit at a time, into each of the data portions, respectively, in a round-robin manner until all bits of the data set have been distributed;
appending redundancy data to each of the portions of data;
storing each of the data portions separately; and restoring the data set from a subset of the data portions.
determining a number of portions of data into which to distribute the data set;
sequentially distributing the data set, one bit at a time, into each of the data portions, respectively, in a round-robin manner until all bits of the data set have been distributed;
appending redundancy data to each of the portions of data;
storing each of the data portions separately; and restoring the data set from a subset of the data portions.
69. A system for securing communication of a data set from a first location to a second location, the system comprising:
a first processor for generating at the first location at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set;
at least one communications path over which are communicated the at least two portions of data from the first location to the second location, wherein the at least two portions of data are communicated separately from each other; and a second processor for restoring at the second location the data set from at least a subset of the at least two portions of data.
a first processor for generating at the first location at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set;
at least one communications path over which are communicated the at least two portions of data from the first location to the second location, wherein the at least two portions of data are communicated separately from each other; and a second processor for restoring at the second location the data set from at least a subset of the at least two portions of data.
70. The system of claim 69 wherein the at least two portions of data are communicated on separate communications paths in parallel.
71. The system of claim 69 wherein the at least two portions of data are communicated on a single communications path in a serial transmission.
72. The system of claim 69 wherein the first processor is used in conjunction with an email application.
73. The system of claim 69 wherein the first processor is used in conjunction with a video broadcasting application.
74. The system of claim 69 wherein the at least one communications path comprises a wireless communications path.
75. The system of claim 74, wherein the wireless communications path comprises an 802.11 protocol communications path.
76. The system of claim 74, wherein the wireless communications path comprises a Bluetooth communications path.
77. The system of claim 74, wherein the wireless communications path comprises a wireless LAN.
78. The system of claim 74, wherein the wireless communications path comprises a cellular network.
79. The system of claim 74, wherein the wireless communications path comprises a peer to peer wireless network.
80. The system of claim 74, wherein the wireless communications path comprises a hub based wireless network.
81. The system of claim 74, wherein wireless communications path comprises a satellite communications path.
82. The system of claim 69 wherein at least one of the first location and the second location is a computer peripheral device.
83. The system of claim 69 wherein at least one of the first location and the second location is a PDA device.
84. The system of claim 69 wherein at least one of the first location and the second location is a storage device.
85. The system of claim 69 wherein the at least one communications path comprises a wired communications path.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA2780816A CA2780816A1 (en) | 2004-10-25 | 2005-10-25 | Secure data parser method and system |
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US62214604P | 2004-10-25 | 2004-10-25 | |
US60/622,146 | 2004-10-25 | ||
US71818505P | 2005-09-16 | 2005-09-16 | |
US60/718,185 | 2005-09-16 | ||
PCT/US2005/038806 WO2006047694A1 (en) | 2004-10-25 | 2005-10-25 | Secure data parser method and system |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2780816A Division CA2780816A1 (en) | 2004-10-25 | 2005-10-25 | Secure data parser method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2584525A1 true CA2584525A1 (en) | 2006-05-04 |
CA2584525C CA2584525C (en) | 2012-09-25 |
Family
ID=35912925
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2922172A Abandoned CA2922172A1 (en) | 2004-10-25 | 2005-10-25 | Secure data parser method and system |
CA2584525A Expired - Fee Related CA2584525C (en) | 2004-10-25 | 2005-10-25 | Secure data parser method and system |
CA2922200A Abandoned CA2922200A1 (en) | 2004-10-25 | 2005-10-25 | Secure data parser method and system |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2922172A Abandoned CA2922172A1 (en) | 2004-10-25 | 2005-10-25 | Secure data parser method and system |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2922200A Abandoned CA2922200A1 (en) | 2004-10-25 | 2005-10-25 | Secure data parser method and system |
Country Status (7)
Country | Link |
---|---|
US (19) | US8266438B2 (en) |
EP (1) | EP1825412A1 (en) |
CN (2) | CN101375284B (en) |
AU (1) | AU2005299317A1 (en) |
BR (1) | BRPI0517026A (en) |
CA (3) | CA2922172A1 (en) |
WO (1) | WO2006047694A1 (en) |
Families Citing this family (336)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8291240B2 (en) * | 1921-06-13 | 2012-10-16 | International Business Machines Corporation | Securely storing data |
US7953671B2 (en) | 1999-08-31 | 2011-05-31 | American Express Travel Related Services Company, Inc. | Methods and apparatus for conducting electronic transactions |
US7343351B1 (en) | 1999-08-31 | 2008-03-11 | American Express Travel Related Services Company, Inc. | Methods and apparatus for conducting electronic transactions |
US7889052B2 (en) | 2001-07-10 | 2011-02-15 | Xatra Fund Mx, Llc | Authorizing payment subsequent to RF transactions |
US7391865B2 (en) * | 1999-09-20 | 2008-06-24 | Security First Corporation | Secure data parser method and system |
US7260724B1 (en) * | 1999-09-20 | 2007-08-21 | Security First Corporation | Context sensitive dynamic authentication in a cryptographic system |
WO2002016288A1 (en) * | 2000-08-23 | 2002-02-28 | Wool Research Organisation Of New Zealand (Inc.) | A composting apparatus with internal transport system |
US7006629B2 (en) * | 2000-12-19 | 2006-02-28 | International Business Machines Corporation | Method and system for processing a data set |
US7725427B2 (en) | 2001-05-25 | 2010-05-25 | Fred Bishop | Recurrent billing maintenance with radio frequency payment devices |
US20040236699A1 (en) | 2001-07-10 | 2004-11-25 | American Express Travel Related Services Company, Inc. | Method and system for hand geometry recognition biometrics on a fob |
US9031880B2 (en) | 2001-07-10 | 2015-05-12 | Iii Holdings 1, Llc | Systems and methods for non-traditional payment using biometric data |
US8294552B2 (en) | 2001-07-10 | 2012-10-23 | Xatra Fund Mx, Llc | Facial scan biometrics on a payment device |
US7249112B2 (en) | 2002-07-09 | 2007-07-24 | American Express Travel Related Services Company, Inc. | System and method for assigning a funding source for a radio frequency identification device |
US9454752B2 (en) | 2001-07-10 | 2016-09-27 | Chartoleaux Kg Limited Liability Company | Reload protocol at a transaction processing entity |
US7360689B2 (en) | 2001-07-10 | 2008-04-22 | American Express Travel Related Services Company, Inc. | Method and system for proffering multiple biometrics for use with a FOB |
US7303120B2 (en) | 2001-07-10 | 2007-12-04 | American Express Travel Related Services Company, Inc. | System for biometric security using a FOB |
US8279042B2 (en) | 2001-07-10 | 2012-10-02 | Xatra Fund Mx, Llc | Iris scan biometrics on a payment device |
US8548927B2 (en) | 2001-07-10 | 2013-10-01 | Xatra Fund Mx, Llc | Biometric registration for facilitating an RF transaction |
US7668750B2 (en) | 2001-07-10 | 2010-02-23 | David S Bonalle | Securing RF transactions using a transactions counter |
US8001054B1 (en) | 2001-07-10 | 2011-08-16 | American Express Travel Related Services Company, Inc. | System and method for generating an unpredictable number using a seeded algorithm |
US7735725B1 (en) | 2001-07-10 | 2010-06-15 | Fred Bishop | Processing an RF transaction using a routing number |
US9024719B1 (en) | 2001-07-10 | 2015-05-05 | Xatra Fund Mx, Llc | RF transaction system and method for storing user personal data |
US6805287B2 (en) | 2002-09-12 | 2004-10-19 | American Express Travel Related Services Company, Inc. | System and method for converting a stored value card to a credit card |
US9614772B1 (en) | 2003-10-20 | 2017-04-04 | F5 Networks, Inc. | System and method for directing network traffic in tunneling applications |
US20060000898A1 (en) * | 2004-07-01 | 2006-01-05 | American Express Travel Related Services Company, Inc. | Method and system for vascular pattern recognition biometrics on a smartcard |
US7318550B2 (en) | 2004-07-01 | 2008-01-15 | American Express Travel Related Services Company, Inc. | Biometric safeguard method for use with a smartcard |
EP1825412A1 (en) | 2004-10-25 | 2007-08-29 | Rick L. Orsini | Secure data parser method and system |
GB0424490D0 (en) * | 2004-11-05 | 2004-12-08 | Ibm | Management of persistence in a data processing system |
US9172685B2 (en) * | 2005-01-31 | 2015-10-27 | Unisys Corporation | System and method for providing a secure book device using cryptographically secure communications across secure networks |
US10007807B2 (en) * | 2008-12-30 | 2018-06-26 | Unisys Corporation | Simultaneous state-based cryptographic splitting in a secure storage appliance |
US20100162004A1 (en) * | 2008-12-23 | 2010-06-24 | David Dodgson | Storage of cryptographically-split data blocks at geographically-separated locations |
US20060242410A1 (en) * | 2005-04-26 | 2006-10-26 | Microsoft Corporation | Mobile device authentication with a data source using self-signed certificates |
WO2006130991A1 (en) * | 2005-06-10 | 2006-12-14 | Davies Traverse A | Method of and system for encryption and authentication |
CA2510366C (en) | 2005-06-14 | 2013-02-26 | Certicom Corp. | System and method for remote device registration |
US7836306B2 (en) * | 2005-06-29 | 2010-11-16 | Microsoft Corporation | Establishing secure mutual trust using an insecure password |
US20070245413A1 (en) * | 2005-07-05 | 2007-10-18 | Viasat, Inc. | Trusted Cryptographic Switch |
US20070061567A1 (en) * | 2005-09-10 | 2007-03-15 | Glen Day | Digital information protection system |
US20070075125A1 (en) * | 2005-09-30 | 2007-04-05 | Muscat Robert G | Packaging and process of authenticating packaging |
US20080022098A1 (en) * | 2005-09-30 | 2008-01-24 | Muscat Robert G | Authentication process |
CN105978683A (en) | 2005-11-18 | 2016-09-28 | 安全第公司 | Secure data parser method and system |
US8447695B2 (en) * | 2006-01-05 | 2013-05-21 | International Business Machines Corporation | System and method for processing feedback entries received from software |
US20070186281A1 (en) * | 2006-01-06 | 2007-08-09 | Mcalister Donald K | Securing network traffic using distributed key generation and dissemination over secure tunnels |
SG169991A1 (en) * | 2006-02-28 | 2011-04-29 | Certicom Corp | System and method for product registration |
US8607044B2 (en) * | 2006-04-25 | 2013-12-10 | Verisign, Inc. | Privacy enhanced identity scheme using an un-linkable identifier |
KR101346734B1 (en) * | 2006-05-12 | 2014-01-03 | 삼성전자주식회사 | Multi certificate revocation list support method and apparatus for digital rights management |
US20070283143A1 (en) * | 2006-06-06 | 2007-12-06 | Kabushiki Kaisha Toshiba | System and method for certificate-based client registration via a document processing device |
US20070288323A1 (en) * | 2006-06-07 | 2007-12-13 | Dani Halevy | Method and System for Verifying the Integrity of an On-Line Vendor |
US8082574B2 (en) * | 2006-08-11 | 2011-12-20 | Certes Networks, Inc. | Enforcing security groups in network of data processors |
US20080072281A1 (en) * | 2006-09-14 | 2008-03-20 | Willis Ronald B | Enterprise data protection management for providing secure communication in a network |
US8284943B2 (en) * | 2006-09-27 | 2012-10-09 | Certes Networks, Inc. | IP encryption over resilient BGP/MPLS IP VPN |
US8001607B2 (en) * | 2006-09-27 | 2011-08-16 | Direct Computer Resources, Inc. | System and method for obfuscation of data across an enterprise |
US20080083011A1 (en) * | 2006-09-29 | 2008-04-03 | Mcalister Donald | Protocol/API between a key server (KAP) and an enforcement point (PEP) |
US8239677B2 (en) * | 2006-10-10 | 2012-08-07 | Equifax Inc. | Verification and authentication systems and methods |
CN101569132B (en) | 2006-11-07 | 2013-04-17 | 安全第一公司 | Systems and methods for distributing and securing data |
EP1921858A1 (en) * | 2006-11-09 | 2008-05-14 | Thomson Licensing | Method and device for managing a transmission of keys |
US8418241B2 (en) | 2006-11-14 | 2013-04-09 | Broadcom Corporation | Method and system for traffic engineering in secured networks |
US7548890B2 (en) | 2006-11-21 | 2009-06-16 | Verient, Inc. | Systems and methods for identification and authentication of a user |
US20080120507A1 (en) * | 2006-11-21 | 2008-05-22 | Shakkarwar Rajesh G | Methods and systems for authentication of a user |
EP2095221A4 (en) * | 2006-11-21 | 2010-08-18 | Verient Inc | Systems and methods for identification and authentication of a user |
US7620600B2 (en) * | 2006-11-21 | 2009-11-17 | Verient, Inc. | Systems and methods for multiple sessions during an on-line transaction |
US8661520B2 (en) * | 2006-11-21 | 2014-02-25 | Rajesh G. Shakkarwar | Systems and methods for identification and authentication of a user |
AT504634B1 (en) * | 2006-12-04 | 2008-11-15 | Hofstaedter Gernot Dr | METHOD FOR TRANSFERRING ENCRYPTED MESSAGES |
US8904080B2 (en) | 2006-12-05 | 2014-12-02 | Security First Corp. | Tape backup method |
US7933835B2 (en) | 2007-01-17 | 2011-04-26 | The Western Union Company | Secure money transfer systems and methods using biometric keys associated therewith |
US8818904B2 (en) * | 2007-01-17 | 2014-08-26 | The Western Union Company | Generation systems and methods for transaction identifiers having biometric keys associated therewith |
US7864762B2 (en) * | 2007-02-14 | 2011-01-04 | Cipheroptics, Inc. | Ethernet encryption over resilient virtual private LAN services |
US8639800B2 (en) | 2007-02-16 | 2014-01-28 | Forescout Technologies, Inc. | Method and device for determining network device status |
US20080276299A1 (en) * | 2007-04-02 | 2008-11-06 | Samsung Electronics Co., Ltd. | Wireless terminal apparatus and method of protecting system resources |
US8181039B2 (en) * | 2007-04-13 | 2012-05-15 | Microsoft Corporation | Disc drive counterfeiting countermeasure |
US7707298B2 (en) * | 2007-05-10 | 2010-04-27 | Microsoft Corporation | Secure sharing of LOB bound information in client applications |
US8233624B2 (en) * | 2007-05-25 | 2012-07-31 | Splitstreem Oy | Method and apparatus for securing data in a memory device |
JP4995667B2 (en) * | 2007-08-28 | 2012-08-08 | 富士通株式会社 | Information processing apparatus, server apparatus, information processing program, and method |
CN102932136B (en) | 2007-09-14 | 2017-05-17 | 安全第一公司 | Systems and methods for managing cryptographic keys |
US8375219B2 (en) * | 2007-10-24 | 2013-02-12 | Microsoft Corporation | Program and operation verification |
US7636789B2 (en) * | 2007-11-27 | 2009-12-22 | Microsoft Corporation | Rate-controllable peer-to-peer data stream routing |
US8401906B2 (en) * | 2007-12-12 | 2013-03-19 | At&T Intellectual Property I, L.P. | Financial transaction authentication servers, methods, and computer program products for facilitating financial transactions between buyers and sellers |
EP2106642A4 (en) * | 2008-01-07 | 2015-12-02 | Security First Corp | Systems and methods for securing data using multi-factor or keyed dispersal |
FR2926381A1 (en) * | 2008-01-11 | 2009-07-17 | Sagem Securite Sa | METHOD OF SECURE TRANSFER OF DATA |
CN103281190B (en) | 2008-02-22 | 2018-03-09 | 安全第一公司 | Systems and methods for secure workgroup management and communication |
US8656499B1 (en) * | 2008-03-14 | 2014-02-18 | Sprint Spectrum L.P. | Client-side bit-stripping system and method |
US8498416B2 (en) * | 2008-05-05 | 2013-07-30 | Qualcomm Incorporated | Validation of stored or incoming messages |
US9832069B1 (en) | 2008-05-30 | 2017-11-28 | F5 Networks, Inc. | Persistence based on server response in an IP multimedia subsystem (IMS) |
US9063897B2 (en) * | 2008-06-26 | 2015-06-23 | Microsoft Technology Licensing, Llc | Policy-based secure information disclosure |
US8762969B2 (en) * | 2008-08-07 | 2014-06-24 | Microsoft Corporation | Immutable parsing |
US20100162003A1 (en) * | 2008-12-23 | 2010-06-24 | David Dodgson | Retrieval of cryptographically-split data blocks from fastest-responding storage devices |
US20100162002A1 (en) * | 2008-12-23 | 2010-06-24 | David Dodgson | Virtual tape backup arrangement using cryptographically split storage |
US20100232604A1 (en) * | 2009-03-11 | 2010-09-16 | Sony Corporation | Controlling access to content using multiple encryptions |
US10447474B2 (en) * | 2009-04-20 | 2019-10-15 | Pure Storage, Inc. | Dispersed data storage system data decoding and decryption |
US8744071B2 (en) * | 2009-04-20 | 2014-06-03 | Cleversafe, Inc. | Dispersed data storage system data encryption and encoding |
CN102428686A (en) * | 2009-05-19 | 2012-04-25 | 安全第一公司 | Systems and methods for securing data in the cloud |
CN101577615B (en) * | 2009-06-02 | 2013-09-11 | 中兴通讯股份有限公司 | Data transfer method and device |
US8875219B2 (en) * | 2009-07-30 | 2014-10-28 | Blackberry Limited | Apparatus and method for controlled sharing of personal information |
US20110072489A1 (en) * | 2009-09-23 | 2011-03-24 | Gilad Parann-Nissany | Methods, devices, and media for securely utilizing a non-secured, distributed, virtualized network resource with applications to cloud-computing security and management |
US20190297169A1 (en) * | 2009-10-29 | 2019-09-26 | International Business Machines Corporation | Determining how to service requests based on several indicators |
EP2504973B1 (en) | 2009-11-25 | 2016-11-16 | Security First Corp. | Systems and methods for securing data in motion |
US10348693B2 (en) | 2009-12-15 | 2019-07-09 | Microsoft Technology Licensing, Llc | Trustworthy extensible markup language for trustworthy computing and data services |
US9537650B2 (en) | 2009-12-15 | 2017-01-03 | Microsoft Technology Licensing, Llc | Verifiable trust for data through wrapper composition |
US11301592B2 (en) | 2010-01-28 | 2022-04-12 | Pure Storage, Inc. | Distributed storage with data obfuscation and method for use therewith |
US8959366B2 (en) * | 2010-01-28 | 2015-02-17 | Cleversafe, Inc. | De-sequencing encoded data slices |
US20190108366A1 (en) * | 2010-01-28 | 2019-04-11 | International Business Machines Corporation | Secure data transmission utilizing distributed storage |
JP2013524352A (en) | 2010-03-31 | 2013-06-17 | セキュリティー ファースト コーポレイション | System and method for securing data in motion |
US9135434B2 (en) * | 2010-04-19 | 2015-09-15 | Appcentral, Inc. | System and method for third party creation of applications for mobile appliances |
US8824492B2 (en) | 2010-05-28 | 2014-09-02 | Drc Computer Corporation | Accelerator system for remote data storage |
CN101854404B (en) * | 2010-06-04 | 2013-08-07 | 中国科学院计算机网络信息中心 | Method and device for detecting anomaly of domain name system |
US9319625B2 (en) * | 2010-06-25 | 2016-04-19 | Sony Corporation | Content transfer system and communication terminal |
US8407324B2 (en) * | 2010-07-01 | 2013-03-26 | Raytheon Company | Dynamic modification of the address of a proxy |
US20120028609A1 (en) * | 2010-07-27 | 2012-02-02 | John Hruska | Secure financial transaction system using a registered mobile device |
WO2012021734A1 (en) | 2010-08-11 | 2012-02-16 | Orsini Rick L | Systems and methods for secure multi-tenant data storage |
US9275071B2 (en) | 2010-08-12 | 2016-03-01 | Security First Corp. | Systems and methods for secure remote storage |
CN106372499A (en) | 2010-08-18 | 2017-02-01 | 安全第公司 | Systems and methods for securing virtual machine computing environments |
EP2619939A2 (en) | 2010-09-20 | 2013-07-31 | Rick L. Orsini | Systems and methods for secure data sharing |
CA2813758C (en) * | 2010-10-08 | 2023-01-03 | Brian Lee Moffat | Private data sharing system |
CN102158385B (en) * | 2010-11-23 | 2013-12-11 | 东莞宇龙通信科技有限公司 | Data information transmission device and method applied to mobile terminal |
US8583911B1 (en) | 2010-12-29 | 2013-11-12 | Amazon Technologies, Inc. | Network application encryption with server-side key management |
US8538020B1 (en) * | 2010-12-29 | 2013-09-17 | Amazon Technologies, Inc. | Hybrid client-server cryptography for network applications |
US9094379B1 (en) | 2010-12-29 | 2015-07-28 | Amazon Technologies, Inc. | Transparent client-side cryptography for network applications |
AU2015202657B2 (en) * | 2011-01-27 | 2016-02-04 | Security First Corp. | Systems and Methods for Securing Data |
US8677148B2 (en) | 2011-01-27 | 2014-03-18 | Security First Corp. | Systems and methods for securing data |
WO2012112323A2 (en) | 2011-02-15 | 2012-08-23 | Korrelate, Inc. | A dual blind method and system for attributing activity to a user |
US8874990B2 (en) * | 2011-04-01 | 2014-10-28 | Cleversafe, Inc. | Pre-fetching data segments stored in a dispersed storage network |
US10298684B2 (en) | 2011-04-01 | 2019-05-21 | International Business Machines Corporation | Adaptive replication of dispersed data to improve data access performance |
US11418580B2 (en) | 2011-04-01 | 2022-08-16 | Pure Storage, Inc. | Selective generation of secure signatures in a distributed storage network |
US20120254972A1 (en) * | 2011-04-04 | 2012-10-04 | International Business Machines Corporation | Trust system |
US9778912B2 (en) * | 2011-05-27 | 2017-10-03 | Cassy Holdings Llc | Stochastic processing of an information stream by a processing architecture generated by operation of non-deterministic data used to select data processing modules |
US9235532B2 (en) * | 2011-06-03 | 2016-01-12 | Apple Inc. | Secure storage of full disk encryption keys |
US10068084B2 (en) * | 2011-06-27 | 2018-09-04 | General Electric Company | Method and system of location-aware certificate based authentication |
CN102300093A (en) * | 2011-08-31 | 2011-12-28 | 华中科技大学 | Encrypting method for distributing data file |
US9232001B1 (en) * | 2011-11-14 | 2016-01-05 | Google Inc. | Client-server communication using a set identifier |
US20130238900A1 (en) * | 2011-12-12 | 2013-09-12 | Cleversafe, Inc. | Dispersed storage network secure hierarchical file directory |
US10666596B2 (en) | 2011-12-12 | 2020-05-26 | Pure Storage, Inc. | Messaging via a shared memory of a distributed computing system |
US10176045B2 (en) | 2011-12-12 | 2019-01-08 | International Business Machines Corporation | Internet based shared memory in a distributed computing system |
KR101632817B1 (en) * | 2012-03-09 | 2016-06-22 | 엠파이어 테크놀로지 디벨롭먼트 엘엘씨 | Cloud computing secure data storage |
US20130246800A1 (en) * | 2012-03-19 | 2013-09-19 | Microchip Technology Incorporated | Enhancing Security of Sensor Data for a System Via an Embedded Controller |
CN103368902A (en) * | 2012-03-27 | 2013-10-23 | 湖南亲安网络科技有限公司 | Data interaction method |
KR101684042B1 (en) * | 2012-03-28 | 2016-12-07 | 인텔 코포레이션 | Shared buffers for processing elements on a network device |
US9973335B2 (en) * | 2012-03-28 | 2018-05-15 | Intel Corporation | Shared buffers for processing elements on a network device |
US8868517B2 (en) * | 2012-03-29 | 2014-10-21 | Lsi Corporation | Scatter gather list for data integrity |
US8976960B2 (en) | 2012-04-02 | 2015-03-10 | Apple Inc. | Methods and apparatus for correlation protected processing of cryptographic operations |
US9916456B2 (en) | 2012-04-06 | 2018-03-13 | Security First Corp. | Systems and methods for securing and restoring virtual machines |
WO2013173251A2 (en) | 2012-05-13 | 2013-11-21 | Invention Mine Llc | Wireless transmission with channel state perturbation |
EP2665223A1 (en) * | 2012-05-16 | 2013-11-20 | Alcatel Lucent | Method for protecting confidentiality of a file distributed and stored at a plurality of storage service providers |
CN102693399B (en) * | 2012-05-18 | 2015-05-27 | 朱晓阳 | System and method for on-line separation and recovery of electronic documents |
EP2680037A1 (en) * | 2012-06-27 | 2014-01-01 | Astrium Limited | Authentication of satellite navigation signals |
US9323950B2 (en) | 2012-07-19 | 2016-04-26 | Atmel Corporation | Generating signatures using a secure device |
US8875254B2 (en) * | 2012-08-07 | 2014-10-28 | International Business Machines Corporation | Cache sharing of enterprise data among peers via an enterprise server |
US20140053056A1 (en) * | 2012-08-16 | 2014-02-20 | Qualcomm Incorporated | Pre-processing of scripts in web browsers |
US9898445B2 (en) | 2012-08-16 | 2018-02-20 | Qualcomm Incorporated | Resource prefetching via sandboxed execution |
US20140053064A1 (en) | 2012-08-16 | 2014-02-20 | Qualcomm Incorporated | Predicting the usage of document resources |
KR101355080B1 (en) | 2012-08-23 | 2014-01-27 | 모트렉스(주) | System for syndicating the original of digital contents for contents provider and method thereof |
KR101355081B1 (en) | 2012-08-23 | 2014-01-27 | 모트렉스(주) | System for syndicating the original of digital contents for personal users and method thereof |
AU2013308905B2 (en) * | 2012-08-28 | 2018-12-13 | Visa International Service Association | Protecting assets on a device |
KR101451214B1 (en) * | 2012-09-14 | 2014-10-15 | 주식회사 엘지씨엔에스 | Payment method, server performing the same, storage media storing the same and system performing the same |
US9390280B2 (en) * | 2012-09-16 | 2016-07-12 | Angel Secure Networks, Inc. | System and method for obtaining keys to access protected information |
US20140089670A1 (en) * | 2012-09-27 | 2014-03-27 | Atmel Corporation | Unique code in message for signature generation in asymmetric cryptographic device |
US8935769B2 (en) * | 2012-09-28 | 2015-01-13 | Liveensure, Inc. | Method for mobile security via multi-factor context authentication |
US9177177B1 (en) * | 2012-10-04 | 2015-11-03 | Symantec Corporation | Systems and methods for securing storage space |
US8942379B2 (en) * | 2012-10-17 | 2015-01-27 | Cisco Technology, Inc. | Timeslot encryption in an optical transport network |
US20160042198A1 (en) | 2012-10-19 | 2016-02-11 | Pearson Education, Inc. | Deidentified access of content |
US8984650B2 (en) | 2012-10-19 | 2015-03-17 | Pearson Education, Inc. | Privacy server for protecting personally identifiable information |
US8893292B2 (en) * | 2012-11-14 | 2014-11-18 | Mitsubishi Electric Research Laboratories, Inc. | Privacy preserving statistical analysis for distributed databases |
JP2014103590A (en) * | 2012-11-21 | 2014-06-05 | Toshiba Corp | Communication device, communication method, system, and program |
US10304047B2 (en) * | 2012-12-07 | 2019-05-28 | Visa International Service Association | Token generating component |
US9430655B1 (en) * | 2012-12-28 | 2016-08-30 | Emc Corporation | Split tokenization |
WO2014105834A1 (en) * | 2012-12-30 | 2014-07-03 | Feliciano Raymond Richard | Method and apparatus for encrypting and decrypting data |
EP2956887A1 (en) | 2013-02-13 | 2015-12-23 | Security First Corp. | Systems and methods for a cryptographic file system layer |
US9245137B2 (en) | 2013-03-04 | 2016-01-26 | International Business Machines Corporation | Management of digital information |
US20140258718A1 (en) * | 2013-03-07 | 2014-09-11 | Asymptote Security Llc | Method and system for secure transmission of biometric data |
US9118467B2 (en) | 2013-03-13 | 2015-08-25 | Atmel Corporation | Generating keys using secure hardware |
US9953317B2 (en) * | 2013-03-13 | 2018-04-24 | Shopkeep.Com, Inc. | Method and system for secure key rotation |
US9215075B1 (en) | 2013-03-15 | 2015-12-15 | Poltorak Technologies Llc | System and method for secure relayed communications from an implantable medical device |
US9323766B2 (en) | 2013-03-15 | 2016-04-26 | Metrix Instrument Co., Lp | Data collection device and method |
US10270748B2 (en) | 2013-03-22 | 2019-04-23 | Nok Nok Labs, Inc. | Advanced authentication techniques and applications |
US9396320B2 (en) * | 2013-03-22 | 2016-07-19 | Nok Nok Labs, Inc. | System and method for non-intrusive, privacy-preserving authentication |
US9887983B2 (en) | 2013-10-29 | 2018-02-06 | Nok Nok Labs, Inc. | Apparatus and method for implementing composite authenticators |
EP2989740B1 (en) | 2013-04-24 | 2019-04-03 | Nec Corporation | Method and system for encrypting data |
WO2014174045A1 (en) * | 2013-04-24 | 2014-10-30 | Nec Europe Ltd. | Method and system for enforcing access control policies on data |
US9667530B2 (en) | 2013-05-06 | 2017-05-30 | International Business Machines Corporation | Privacy preserving query method and system for use in federated coalition networks |
US10177896B2 (en) | 2013-05-13 | 2019-01-08 | Amir Keyvan Khandani | Methods for training of full-duplex wireless systems |
US9917817B1 (en) * | 2013-06-10 | 2018-03-13 | EMC IP Holding Company LLC | Selective encryption of outgoing data |
US9553982B2 (en) * | 2013-07-06 | 2017-01-24 | Newvoicemedia, Ltd. | System and methods for tamper proof interaction recording and timestamping |
KR20150015233A (en) * | 2013-07-31 | 2015-02-10 | 삼성전자주식회사 | Apparatus for Processing Image, Method for Providing Personalizaton Service, and Computer-readable Medium |
JP6381187B2 (en) * | 2013-08-09 | 2018-08-29 | キヤノン株式会社 | Information processing apparatus, information processing method, and program |
US9584488B2 (en) | 2013-08-09 | 2017-02-28 | Introspective Power, Inc. | Data encryption cipher using rotating ports |
US9584313B2 (en) | 2013-08-09 | 2017-02-28 | Introspective Power, Inc. | Streaming one time pad cipher using rotating ports for data encryption |
US9208340B2 (en) * | 2013-08-28 | 2015-12-08 | Chung Jong Lee | Parallel data processing system based on location control and method thereof |
GB2519119A (en) | 2013-10-10 | 2015-04-15 | Ibm | Linear network coding in a dynamic distributed federated database |
JP6552184B2 (en) * | 2014-01-14 | 2019-07-31 | キヤノン株式会社 | INFORMATION PROCESSING APPARATUS AND METHOD THEREOF |
US9754097B2 (en) | 2014-02-21 | 2017-09-05 | Liveensure, Inc. | Method for peer to peer mobile context authentication |
KR101888903B1 (en) * | 2014-03-03 | 2018-08-17 | 인텔 코포레이션 | Methods and apparatus for migrating keys |
US9461973B2 (en) * | 2014-03-19 | 2016-10-04 | Bluefin Payment Systems, LLC | Systems and methods for decryption as a service |
DK3120593T3 (en) * | 2014-03-19 | 2019-04-01 | Bluefin Payment Sys Llc | SYSTEMS AND PROCEDURE FOR MANUFACTURING FINGERPRINTING FOR CRYPTIC DEVICES |
US11256798B2 (en) | 2014-03-19 | 2022-02-22 | Bluefin Payment Systems Llc | Systems and methods for decryption as a service |
CN103945283B (en) * | 2014-04-02 | 2017-10-10 | 网易(杭州)网络有限公司 | A kind of digital content protection method and equipment |
EP3129912B1 (en) | 2014-04-10 | 2019-09-11 | Atomizer Group, LLC | Method and system for securing data |
US9654469B1 (en) | 2014-05-02 | 2017-05-16 | Nok Nok Labs, Inc. | Web-based user authentication techniques and applications |
US9104889B1 (en) * | 2014-05-07 | 2015-08-11 | Data Guard Solutions, Inc. | Encryption on computing device |
GB2526367A (en) * | 2014-05-23 | 2015-11-25 | Ibm | Password-based authentication |
EP3155754B1 (en) | 2014-06-13 | 2018-10-24 | Bicdroid Inc. | Methods, systems and computer program product for providing encryption on a plurality of devices |
US9703979B1 (en) | 2014-06-13 | 2017-07-11 | BicDroid Inc. | Methods and computer program products for encryption key generation and management |
GB2513260B (en) * | 2014-06-27 | 2018-06-13 | PQ Solutions Ltd | System and method for quorum-based data recovery |
CN104901932A (en) * | 2014-07-30 | 2015-09-09 | 易兴旺 | Secure login method based on CPK (Combined Public Key Cryptosystem) identity authentication technology |
KR101687287B1 (en) * | 2014-08-18 | 2017-01-02 | 남기원 | Individual data managing system and method of the same |
EP3202080A1 (en) * | 2014-09-30 | 2017-08-09 | NEC Europe Ltd. | Method and system for at least partially updating data encrypted with an all-or-nothing encryption scheme |
US10546439B2 (en) | 2014-10-29 | 2020-01-28 | Paypal, Inc. | Wearable device with user authentication interface |
WO2016081942A2 (en) * | 2014-11-21 | 2016-05-26 | Security First Corp. | Gateway for cloud-based secure storage |
US20160191511A1 (en) | 2014-12-24 | 2016-06-30 | Paypal Inc. | Wearable device authentication |
JP5860556B1 (en) * | 2015-02-06 | 2016-02-16 | 日本電信電話株式会社 | Inconsistency detection method, inconsistency detection system, inconsistency detection apparatus, and program |
US9773119B2 (en) * | 2015-02-25 | 2017-09-26 | Sap Se | Parallel and hierarchical password protection on specific document sections |
US10211987B2 (en) * | 2015-04-27 | 2019-02-19 | Cisco Technology, Inc. | Transport mechanism for carrying in-band metadata for network path proof of transit |
CN104951928B (en) * | 2015-06-30 | 2019-01-22 | 梅卓军 | System and method for electronic license information interaction |
JP2017041784A (en) * | 2015-08-20 | 2017-02-23 | 富士通株式会社 | Communication terminal apparatus, communication network system, and communication method |
CN105208005B (en) * | 2015-08-25 | 2019-10-11 | 宇龙计算机通信科技(深圳)有限公司 | A kind of fingerprint verification method, connection equipment and terminal device |
WO2017033442A1 (en) * | 2015-08-26 | 2017-03-02 | 日本電気株式会社 | Information processing device, authentication system, authentication method, and recording medium for recording computer program |
CN105260668B (en) * | 2015-10-10 | 2018-07-24 | 北京搜狗科技发展有限公司 | A kind of file encrypting method and electronic equipment |
US10601781B2 (en) | 2015-10-12 | 2020-03-24 | Servicenow, Inc. | Selective encryption delineation |
US11575524B2 (en) | 2015-10-12 | 2023-02-07 | Servicenow, Inc. | Selective encryption delineation |
US10320761B2 (en) | 2015-11-02 | 2019-06-11 | Servicenow, Inc. | Selective encryption configuration |
CN105282171B (en) * | 2015-11-06 | 2018-04-27 | 北京大学深圳研究生院 | A kind of safe and reliable distributed cloud storage method |
US10623339B2 (en) | 2015-12-17 | 2020-04-14 | Hewlett Packard Enterprise Development Lp | Reduced orthogonal network policy set selection |
US10198595B2 (en) | 2015-12-22 | 2019-02-05 | Walmart Apollo, Llc | Data breach detection system |
US10419401B2 (en) * | 2016-01-08 | 2019-09-17 | Capital One Services, Llc | Methods and systems for securing data in the public cloud |
US10354653B1 (en) | 2016-01-19 | 2019-07-16 | United Services Automobile Association (Usaa) | Cooperative delegation for digital assistants |
US10482255B2 (en) | 2016-02-16 | 2019-11-19 | Atmel Corporation | Controlled secure code authentication |
US10474823B2 (en) | 2016-02-16 | 2019-11-12 | Atmel Corporation | Controlled secure code authentication |
EP3395031B1 (en) * | 2016-02-19 | 2021-11-24 | NEC Corporation | Method for providing a proof of retrievability |
US20170243225A1 (en) * | 2016-02-24 | 2017-08-24 | Mastercard International Incorporated | Systems and methods for using multi-party computation for biometric authentication |
CN105721148B (en) * | 2016-04-12 | 2019-01-18 | 武汉珈铭汉象教育科技有限公司 | A kind of data file encryption method and system based on double random numbers |
US10616197B2 (en) | 2016-04-18 | 2020-04-07 | Atmel Corporation | Message authentication with secure code verification |
US10778295B2 (en) | 2016-05-02 | 2020-09-15 | Amir Keyvan Khandani | Instantaneous beamforming exploiting user physical signatures |
US11356272B2 (en) * | 2016-05-19 | 2022-06-07 | Telefonaktiebolaget Lm Ericsson (Publ) | Methods and devices for handling hash-tree based data signatures |
EP3485389B1 (en) * | 2016-07-13 | 2023-10-04 | Nsknox Technologies Ltd | Methods and systems for a redundantly-secure data store using independent networks |
US10445235B2 (en) * | 2016-07-29 | 2019-10-15 | Seagate Technology Llc | Weighted data striping |
US10769635B2 (en) | 2016-08-05 | 2020-09-08 | Nok Nok Labs, Inc. | Authentication techniques including speech and/or lip movement analysis |
US10637853B2 (en) | 2016-08-05 | 2020-04-28 | Nok Nok Labs, Inc. | Authentication techniques including speech and/or lip movement analysis |
US10169152B2 (en) * | 2016-09-12 | 2019-01-01 | International Business Machines Corporation | Resilient data storage and retrieval |
US10659398B2 (en) | 2016-10-03 | 2020-05-19 | Nohold, Inc. | Interactive virtual conversation interface systems and methods |
DE102016120558A1 (en) * | 2016-10-27 | 2018-05-03 | Infineon Technologies Ag | DATA PROCESSING DEVICE AND METHOD FOR CRYPTOGRAPHIC PROCESSING OF DATA |
US9742742B1 (en) | 2016-11-18 | 2017-08-22 | Vaultara LLC | Secure data transfer system and method |
LU93377B1 (en) * | 2016-12-15 | 2018-07-03 | Luxembourg Inst Science & Tech List | P2p network data distribution and retrieval using blockchain log |
US10237070B2 (en) | 2016-12-31 | 2019-03-19 | Nok Nok Labs, Inc. | System and method for sharing keys across authenticators |
US10680798B2 (en) * | 2017-02-15 | 2020-06-09 | Nxp Usa, Inc. | Masking storage transfer to protect against attacks |
US10846415B1 (en) * | 2017-03-02 | 2020-11-24 | Arebus, LLC | Computing device compatible encryption and decryption |
SG11201908666VA (en) * | 2017-03-21 | 2019-10-30 | Tora Holdings Inc | Secure order matching by distributing data and processing across multiple segregated computation nodes |
US11356445B2 (en) * | 2017-03-28 | 2022-06-07 | Amazon Technologies, Inc. | Data access interface for clustered devices |
US10530752B2 (en) | 2017-03-28 | 2020-01-07 | Amazon Technologies, Inc. | Efficient device provision |
US10621055B2 (en) | 2017-03-28 | 2020-04-14 | Amazon Technologies, Inc. | Adaptive data recovery for clustered data devices |
US10700766B2 (en) | 2017-04-19 | 2020-06-30 | Amir Keyvan Khandani | Noise cancelling amplify-and-forward (in-band) relay with self-interference cancellation |
US11258582B2 (en) * | 2017-05-01 | 2022-02-22 | Qbrics, Inc. | Distributed system and method for encryption of blockchain payloads |
US11711350B2 (en) | 2017-06-02 | 2023-07-25 | Bluefin Payment Systems Llc | Systems and processes for vaultless tokenization and encryption |
US11070534B2 (en) | 2019-05-13 | 2021-07-20 | Bluefin Payment Systems Llc | Systems and processes for vaultless tokenization and encryption |
WO2018223130A1 (en) | 2017-06-02 | 2018-12-06 | Bluefin Payment Systems Llc | Systems and methods for managing a payment terminal via a web browser |
US10026283B1 (en) | 2017-06-20 | 2018-07-17 | International Business Machines Corporation | Multi-sensor intrusion detection system |
US11032067B2 (en) * | 2017-07-03 | 2021-06-08 | Stmicroelectronics S.R.L. | Hardware secure module, related processing system, integrated circuit, device and method |
WO2019012329A1 (en) | 2017-07-10 | 2019-01-17 | Vchain Technology Limited | Method and system for data security within independent computer systems and digital networks |
WO2019032556A1 (en) * | 2017-08-10 | 2019-02-14 | Ctm Insights Llc | Method for securing data utilizing microshard™ fragmentation |
CN113765657B (en) | 2017-08-28 | 2023-10-24 | 创新先进技术有限公司 | Key data processing method, device and server |
US10831935B2 (en) * | 2017-08-31 | 2020-11-10 | Pure Storage, Inc. | Encryption management with host-side data reduction |
US10997620B2 (en) * | 2017-09-18 | 2021-05-04 | Vertigo Studios, Llc | Blockchain-enabled system for controlling advertiser access to personal user data |
US11212089B2 (en) * | 2017-10-04 | 2021-12-28 | Amir Keyvan Khandani | Methods for secure data storage |
US11539686B2 (en) * | 2017-10-12 | 2022-12-27 | Mx Technologies, Inc. | Data aggregation management based on credentials |
WO2019075384A1 (en) * | 2017-10-12 | 2019-04-18 | Bluefin Payment Systems Llc | Systems and methods for parsing and decrypting payloads |
US10439804B2 (en) * | 2017-10-27 | 2019-10-08 | EMC IP Holding Company LLC | Data encrypting system with encryption service module and supporting infrastructure for transparently providing encryption services to encryption service consumer processes across encryption service state changes |
US11734231B2 (en) * | 2017-10-30 | 2023-08-22 | AtomBeam Technologies Inc. | System and methods for bandwidth-efficient encoding of genomic data |
US11132503B2 (en) | 2017-10-30 | 2021-09-28 | Nohold, Inc. | Query a system via natural language NLP2X |
US10582027B2 (en) | 2017-11-04 | 2020-03-03 | Cisco Technology, Inc. | In-band metadata export and removal at intermediate nodes |
US11868995B2 (en) | 2017-11-27 | 2024-01-09 | Nok Nok Labs, Inc. | Extending a secure key storage for transaction confirmation and cryptocurrency |
MX2020005746A (en) * | 2017-12-06 | 2020-08-20 | Zamna Tech Limited | Method and system for data security, validation, verification and provenance within independent computer systems and digital networks. |
CN109962776B (en) * | 2017-12-25 | 2022-02-08 | 亚旭电脑股份有限公司 | Encryption method and decryption method |
US10623181B2 (en) | 2018-01-02 | 2020-04-14 | Bank Of America Corporation | Security system utilizing vaultless tokenization and encryption |
CN107979615B (en) * | 2018-01-05 | 2020-07-03 | 新华三信息安全技术有限公司 | Message encryption sending and authentication method, device, client and firewall |
EP3738063A4 (en) * | 2018-01-08 | 2021-10-06 | Paperclip Inc. | Methods for securing data |
US11831409B2 (en) | 2018-01-12 | 2023-11-28 | Nok Nok Labs, Inc. | System and method for binding verifiable claims |
US11012144B2 (en) | 2018-01-16 | 2021-05-18 | Amir Keyvan Khandani | System and methods for in-band relaying |
US20190227857A1 (en) * | 2018-01-25 | 2019-07-25 | salesforce com, inc | Smart clipboard for secure data transfer |
EP3528468B1 (en) * | 2018-02-20 | 2021-04-07 | Nokia Technologies Oy | Profile information sharing |
US11431494B2 (en) * | 2018-03-15 | 2022-08-30 | Atakama LLC | Passwordless security system for data-at-rest |
JP7010365B2 (en) * | 2018-03-19 | 2022-01-26 | 日本電信電話株式会社 | Parameter setting units, arithmetic units, their methods, and programs |
US10623278B2 (en) | 2018-03-20 | 2020-04-14 | Cisco Technology, Inc. | Reactive mechanism for in-situ operation, administration, and maintenance traffic |
US10826896B2 (en) | 2018-03-27 | 2020-11-03 | Bank Of America Corporation | Enhanced biometric data and systems for processing events using enhanced biometric data |
US10817598B2 (en) | 2018-03-27 | 2020-10-27 | Bank Of America Corporation | Enhanced biometric data and systems for processing events using enhanced biometric data |
US20210019971A1 (en) * | 2018-04-17 | 2021-01-21 | Coinbase, Inc. | Offline storage system and method of use |
CN108875384A (en) * | 2018-06-06 | 2018-11-23 | 国云科技股份有限公司 | A kind of business risk data safety emerging system and its implementation |
US11042661B2 (en) * | 2018-06-08 | 2021-06-22 | Weka.IO Ltd. | Encryption for a distributed filesystem |
US11562083B2 (en) * | 2018-07-30 | 2023-01-24 | Hewlett Packard Enterprise Development Lp | Data access management for a composition |
JP2020022057A (en) * | 2018-07-31 | 2020-02-06 | 株式会社東芝 | Encrypted data generation apparatus, digital signature generation apparatus, data generation apparatus with digital signature, and data generation system with digital signature |
WO2020028950A1 (en) * | 2018-08-07 | 2020-02-13 | Haventec Pty Ltd | A method and system for securing data |
US11550951B2 (en) | 2018-09-18 | 2023-01-10 | Inspired Patents, Llc | Interoperable digital social recorder of multi-threaded smart routed media |
US11044077B2 (en) * | 2018-09-25 | 2021-06-22 | Mcafee, Llc | Modifiable client-side encrypted data in the cloud |
US10656876B1 (en) * | 2018-11-12 | 2020-05-19 | Cohesity, Inc. | Cloud edition and retrieve |
JP7190336B2 (en) * | 2018-11-15 | 2022-12-15 | 富士通株式会社 | Communication device, communication method, and communication program |
CN109889324A (en) * | 2018-12-27 | 2019-06-14 | 深圳市安云信息科技有限公司 | Encrypt storage method, storage medium and device |
US11924327B2 (en) * | 2019-01-09 | 2024-03-05 | British Telecommunications Public Limited Company | Variable data protection |
EP3681094B1 (en) * | 2019-01-09 | 2021-11-10 | British Telecommunications public limited company | Impeding data access |
US10937339B2 (en) * | 2019-01-10 | 2021-03-02 | Bank Of America Corporation | Digital cryptosystem with re-derivable hybrid keys |
CN109921856B (en) * | 2019-01-25 | 2021-01-15 | 长沙天仪空间科技研究院有限公司 | Low-speed communication method and system based on light flicker of low-orbit satellite |
KR20200100481A (en) * | 2019-02-18 | 2020-08-26 | 삼성전자주식회사 | Electronic device for authenticating biometric information and operating method thereof |
CN110011786B (en) * | 2019-03-20 | 2022-03-18 | 中国电子科技集团公司第三十研究所 | High-safety IP secret communication method |
CA3058242C (en) * | 2019-03-29 | 2022-05-31 | Alibaba Group Holding Limited | Managing cryptographic keys based on identity information |
CA3057398C (en) | 2019-03-29 | 2021-07-06 | Alibaba Group Holding Limited | Securely performing cryptographic operations |
EP3610607B1 (en) | 2019-03-29 | 2021-08-25 | Advanced New Technologies Co., Ltd. | Cryptographic key management based on identity information |
US11792024B2 (en) | 2019-03-29 | 2023-10-17 | Nok Nok Labs, Inc. | System and method for efficient challenge-response authentication |
CA3058012C (en) | 2019-03-29 | 2021-05-11 | Alibaba Group Holding Limited | Cryptography chip with identity verification |
US11303452B2 (en) | 2019-04-03 | 2022-04-12 | Keychainx Ag | Biometric digital signature generation for identity verification |
US11777715B2 (en) | 2019-05-15 | 2023-10-03 | Amir Keyvan Khandani | Method and apparatus for generating shared secrets |
EP3973687A4 (en) * | 2019-05-22 | 2023-09-13 | Myota, Inc. | Method and system for distributed data storage with enhanced security, resilience, and control |
WO2020257123A1 (en) * | 2019-06-16 | 2020-12-24 | Planaria Corp. | Systems and methods for blockchain-based authentication |
US11288396B2 (en) | 2019-06-18 | 2022-03-29 | International Business Machines Corporation | Data security through physical separation of data |
JP7344543B2 (en) * | 2019-07-12 | 2023-09-14 | シスナ株式会社 | Valuables management system |
HRP20230073T1 (en) * | 2019-07-16 | 2023-03-17 | Lleidanetworks Serveis Telemàtics, S.A. | Method for electronically signing contracts |
US11288349B2 (en) * | 2019-07-16 | 2022-03-29 | Sokken Corporation | System and method for authentication using biometric hash strings |
US10972256B2 (en) * | 2019-07-18 | 2021-04-06 | Ante Deng | Architectural secure system for digital file in cyberspace |
US11151277B1 (en) * | 2019-07-25 | 2021-10-19 | EMC IP Holding Company LLC | Method to recover encrypted structured files |
US20220405765A1 (en) * | 2019-11-18 | 2022-12-22 | Omnibek Ip Holding Llc | Know your customer (kyc) and anti-money laundering (aml) verification in a multi-decentralized private blockchains network |
US11528259B2 (en) | 2019-12-13 | 2022-12-13 | TripleBlind, Inc. | Systems and methods for providing a systemic error in artificial intelligence algorithms |
US11431688B2 (en) | 2019-12-13 | 2022-08-30 | TripleBlind, Inc. | Systems and methods for providing a modified loss function in federated-split learning |
US11582203B2 (en) | 2019-12-13 | 2023-02-14 | TripleBlind, Inc. | Systems and methods for encrypting data and algorithms |
CN111212425B (en) * | 2020-01-10 | 2022-07-12 | 中国联合网络通信集团有限公司 | Access method, server and terminal |
US20210256145A1 (en) * | 2020-02-17 | 2021-08-19 | International Business Machines Corporation | Preservation of privacy in large datasets |
CN111431586B (en) * | 2020-04-17 | 2021-09-21 | 中国电子科技集团公司第三十八研究所 | Satellite network safety communication method |
US11593498B2 (en) | 2020-06-09 | 2023-02-28 | International Business Machines Corporation | Distribution of user specific data elements in a replication environment |
US20210383021A1 (en) * | 2020-06-09 | 2021-12-09 | Drfirst.Com, Inc. | Anonymized interface for ticket based authentication |
CN111800267A (en) * | 2020-07-10 | 2020-10-20 | 信雅达系统工程股份有限公司 | Password service support system with unified management |
CN111935122B (en) * | 2020-07-31 | 2022-09-20 | 重庆小雨点小额贷款有限公司 | Data security processing method and device |
CN112235112B (en) * | 2020-09-03 | 2022-03-18 | 中国电子科技集团公司第三十研究所 | Zero-semantic and one-time pad-based IP encryption method, system and storage medium |
US11343085B2 (en) * | 2020-09-19 | 2022-05-24 | International Business Machines Corporation | Threshold encryption for broadcast content |
US11601418B2 (en) | 2020-10-14 | 2023-03-07 | Bank Of America Corporation | System for increasing authentication complexity for access to online systems |
WO2022109215A1 (en) * | 2020-11-20 | 2022-05-27 | TripleBlind, Inc. | Systems and methods for providing a blind de-identification of privacy data |
US11201866B1 (en) | 2020-12-29 | 2021-12-14 | Inductive Automation, LLC | Secure identity provider authentication for native application to access web service |
SE2150206A1 (en) * | 2021-02-26 | 2022-08-27 | Fingerprint Cards Anacatum Ip Ab | Enrolling biometrics with mutual trust through 3rd party |
CN113642986B (en) * | 2021-08-02 | 2024-04-16 | 上海示右智能科技有限公司 | Method for constructing digital notarization |
US11625377B1 (en) | 2022-02-03 | 2023-04-11 | TripleBlind, Inc. | Systems and methods for enabling two parties to find an intersection between private data sets without learning anything other than the intersection of the datasets |
US11539679B1 (en) | 2022-02-04 | 2022-12-27 | TripleBlind, Inc. | Systems and methods for providing a quantum-proof key exchange |
US11962706B2 (en) * | 2022-02-07 | 2024-04-16 | Bank Of America Corporation | Hosting account linking services to enable dynamic authentication and multi-computer event processing |
US20230297723A1 (en) * | 2022-03-18 | 2023-09-21 | Jpmorgan Chase Bank, N.A. | System and method for password-less authentication through digital driving license |
CN115186305B (en) * | 2022-09-13 | 2022-12-16 | 中国电子信息产业集团有限公司 | Method for constructing data element model and producing data element |
CN115550066B (en) * | 2022-11-28 | 2023-04-04 | 中国电子信息产业集团有限公司 | Data element security encryption calculation method and device and electronic equipment |
Family Cites Families (473)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6292568B1 (en) | 1966-12-16 | 2001-09-18 | Scientific-Atlanta, Inc. | Representing entitlements to service in a conditional access system |
US4453074A (en) * | 1981-10-19 | 1984-06-05 | American Express Company | Protection system for intelligent cards |
US4802220A (en) | 1985-03-20 | 1989-01-31 | American Telephone And Telegraph Company, At&T Bell Laboratories | Method and apparatus for multi-channel communication security |
US4924513A (en) * | 1987-09-25 | 1990-05-08 | Digital Equipment Corporation | Apparatus and method for secure transmission of data over an unsecure transmission channel |
US5485474A (en) * | 1988-02-25 | 1996-01-16 | The President And Fellows Of Harvard College | Scheme for information dispersal and reconstruction |
FR2632469B1 (en) | 1988-06-03 | 1991-08-02 | Pailles Jean Claude | SECURE DATA COMMUNICATION DEVICE |
EP0354774B1 (en) | 1988-08-11 | 1996-04-10 | International Business Machines Corporation | Data cryptography using control vectors |
US4932057A (en) * | 1988-10-17 | 1990-06-05 | Grumman Aerospace Corporation | Parallel transmission to mask data radiation |
JP2525098Y2 (en) * | 1988-10-21 | 1997-02-05 | シンガー日鋼 株式会社 | Sewing machine thread trimmer |
US5016274A (en) * | 1988-11-08 | 1991-05-14 | Silvio Micali | On-line/off-line digital signing |
GB2237670B (en) | 1989-11-03 | 1993-04-07 | De La Rue Syst | Reciprocal transfer system |
US5682425A (en) | 1990-04-23 | 1997-10-28 | Canon Kabushiki Kaisha | Information signal transmission system |
US5010572A (en) * | 1990-04-27 | 1991-04-23 | Hughes Aircraft Company | Distributed information system having automatic invocation of key management negotiations protocol and method |
US5051745A (en) | 1990-08-21 | 1991-09-24 | Pkware, Inc. | String searcher, and compressor using same |
US5177342A (en) | 1990-11-09 | 1993-01-05 | Visa International Service Association | Transaction approval system |
JPH04297157A (en) | 1991-03-14 | 1992-10-21 | Mitsubishi Electric Corp | Data ciphering device |
US5163096A (en) | 1991-06-06 | 1992-11-10 | International Business Machines Corporation | Storage protection utilizing public storage key control |
US5239659A (en) | 1991-06-19 | 1993-08-24 | Storage Technology Corporation | Phantom duplex copy group apparatus for a disk drive array data storge subsystem |
US5150407A (en) | 1991-12-16 | 1992-09-22 | Chan Steve S C | Secured data storage devices |
US5748147A (en) | 1992-03-04 | 1998-05-05 | Motorola Inc | Position locating rescue transceiver |
GB2264798A (en) | 1992-03-04 | 1993-09-08 | Hitachi Ltd | High speed access control |
US5276735A (en) | 1992-04-17 | 1994-01-04 | Secure Computing Corporation | Data enclave and trusted path system |
US5375244A (en) | 1992-05-29 | 1994-12-20 | At&T Corp. | System and method for granting access to a resource |
US5268963A (en) | 1992-06-09 | 1993-12-07 | Audio Digital Imaging Inc. | System for encoding personalized identification for storage on memory storage devices |
US5267314A (en) * | 1992-11-17 | 1993-11-30 | Leon Stambler | Secure transaction system and method utilized therein |
US5533051A (en) | 1993-03-12 | 1996-07-02 | The James Group | Method for data compression |
US5450099A (en) | 1993-04-08 | 1995-09-12 | Eastman Kodak Company | Thermal line printer with staggered head segments and overlap compensation |
JP2550864B2 (en) * | 1993-05-31 | 1996-11-06 | 日本電気株式会社 | Decentralized control method and apparatus for job execution |
GB9323489D0 (en) * | 1993-11-08 | 1994-01-05 | Ncr Int Inc | Self-service business system |
DK0739560T3 (en) | 1994-01-13 | 2001-10-01 | Certco Inc | Cryptographic system and method with key deposit function |
US6473860B1 (en) * | 1994-04-07 | 2002-10-29 | Hark C. Chan | Information distribution and processing system |
US5666514A (en) | 1994-07-01 | 1997-09-09 | Board Of Trustees Of The Leland Stanford Junior University | Cache memory containing extra status bits to indicate memory regions where logging of data should occur |
US5748735A (en) * | 1994-07-18 | 1998-05-05 | Bell Atlantic Network Services, Inc. | Securing E-mail communications and encrypted file storage using yaksha split private key asymmetric cryptography |
US5719938A (en) | 1994-08-01 | 1998-02-17 | Lucent Technologies Inc. | Methods for providing secure access to shared information |
US5623549A (en) | 1995-01-30 | 1997-04-22 | Ritter; Terry F. | Cipher mechanisms with fencing and balanced block mixing |
CN100452071C (en) * | 1995-02-13 | 2009-01-14 | 英特特拉斯特技术公司 | Systems and methods for secure transaction management and electronic rights protection |
US7133845B1 (en) | 1995-02-13 | 2006-11-07 | Intertrust Technologies Corp. | System and methods for secure transaction management and electronic rights protection |
US7069451B1 (en) * | 1995-02-13 | 2006-06-27 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
JP4083218B2 (en) * | 1995-06-05 | 2008-04-30 | サートコ・インコーポレーテッド | Multi-step digital signature method and system |
US5623546A (en) | 1995-06-23 | 1997-04-22 | Motorola, Inc. | Encryption method and system for portable data |
US5790677A (en) * | 1995-06-29 | 1998-08-04 | Microsoft Corporation | System and method for secure electronic commerce transactions |
US5768382A (en) * | 1995-11-22 | 1998-06-16 | Walker Asset Management Limited Partnership | Remote-auditing of computer generated outcomes and authenticated biling and access control system using cryptographic and other protocols |
JP3502200B2 (en) * | 1995-08-30 | 2004-03-02 | 株式会社日立製作所 | Cryptographic communication system |
AR003524A1 (en) | 1995-09-08 | 1998-08-05 | Cyber Sign Japan Inc | A VERIFICATION SERVER TO BE USED IN THE AUTHENTICATION OF COMPUTER NETWORKS. |
US5638445A (en) | 1995-09-19 | 1997-06-10 | Microsoft Corporation | Blind encryption |
US5717758A (en) * | 1995-11-02 | 1998-02-10 | Micall; Silvio | Witness-based certificate revocation system |
US5666416A (en) | 1995-10-24 | 1997-09-09 | Micali; Silvio | Certificate revocation system |
US6449730B2 (en) | 1995-10-24 | 2002-09-10 | Seachange Technology, Inc. | Loosely coupled mass storage computer cluster |
US6345314B1 (en) | 1995-10-27 | 2002-02-05 | International Business Machines Corporation | Technique to minimize data transfer between two computers |
US6301659B1 (en) | 1995-11-02 | 2001-10-09 | Silvio Micali | Tree-based certificate revocation system |
US6026163A (en) * | 1995-12-13 | 2000-02-15 | Micali; Silvio | Distributed split-key cryptosystem and applications |
US5615269A (en) * | 1996-02-22 | 1997-03-25 | Micali; Silvio | Ideal electronic negotiations |
JP2000503154A (en) | 1996-01-11 | 2000-03-14 | エムアールジェイ インコーポレイテッド | System for controlling access and distribution of digital ownership |
US5768519A (en) * | 1996-01-18 | 1998-06-16 | Microsoft Corporation | Method and apparatus for merging user accounts from a source security domain into a target security domain |
US5761306A (en) * | 1996-02-22 | 1998-06-02 | Visa International Service Association | Key replacement in a public key cryptosystem |
JPH09238132A (en) | 1996-02-29 | 1997-09-09 | Oki Electric Ind Co Ltd | Portable terminal communication system and its communication method |
US5768388A (en) | 1996-03-01 | 1998-06-16 | Goldwasser; Shafi | Time delayed key escrow |
US5995630A (en) | 1996-03-07 | 1999-11-30 | Dew Engineering And Development Limited | Biometric input with encryption |
US5666414A (en) | 1996-03-21 | 1997-09-09 | Micali; Silvio | Guaranteed partial key-escrow |
US5673316A (en) | 1996-03-29 | 1997-09-30 | International Business Machines Corporation | Creation and distribution of cryptographic envelope |
JPH09284272A (en) * | 1996-04-19 | 1997-10-31 | Canon Inc | Ciphering system, signature system, key common share system, identity proving system and device for the systems |
JP3540511B2 (en) | 1996-06-18 | 2004-07-07 | 株式会社東芝 | Electronic signature verification device |
US5823948A (en) | 1996-07-08 | 1998-10-20 | Rlis, Inc. | Medical records, documentation, tracking and order entry system |
US6072876A (en) | 1996-07-26 | 2000-06-06 | Nippon Telegraph And Telephone Corporation | Method and system for depositing private key used in RSA cryptosystem |
US6292782B1 (en) | 1996-09-09 | 2001-09-18 | Philips Electronics North America Corp. | Speech recognition and verification system enabling authorized data transmission over networked computer systems |
US5937066A (en) * | 1996-10-02 | 1999-08-10 | International Business Machines Corporation | Two-phase cryptographic key recovery system |
GB2318486B (en) * | 1996-10-16 | 2001-03-28 | Ibm | Data communications system |
US6061790A (en) * | 1996-11-20 | 2000-05-09 | Starfish Software, Inc. | Network computer system with remote user data encipher methodology |
US5903652A (en) * | 1996-11-25 | 1999-05-11 | Microsoft Corporation | System and apparatus for monitoring secure information in a computer network |
WO1998024025A1 (en) | 1996-11-27 | 1998-06-04 | 1Vision Software, L.L.C. | File directory and file navigation system |
US6125186A (en) | 1996-11-28 | 2000-09-26 | Fujitsu Limited | Encryption communication system using an agent and a storage medium for storing that agent |
FI105137B (en) | 1996-12-02 | 2000-06-15 | Nokia Networks Oy | Improved broadcasting in a packet network |
US5917913A (en) * | 1996-12-04 | 1999-06-29 | Wang; Ynjiun Paul | Portable electronic authorization devices and methods therefor |
US5966444A (en) | 1996-12-06 | 1999-10-12 | Yuan; Chuan K. | Method and system for establishing a cryptographic key agreement using linear protocols |
US5903882A (en) * | 1996-12-13 | 1999-05-11 | Certco, Llc | Reliance server for electronic transaction system |
JPH10198272A (en) | 1996-12-27 | 1998-07-31 | Canon Inc | Key managing method, ciphering system, and decentralized digital signature system with hierarchy |
US6009173A (en) | 1997-01-31 | 1999-12-28 | Motorola, Inc. | Encryption and decryption method and apparatus |
US5940507A (en) * | 1997-02-11 | 1999-08-17 | Connected Corporation | Secure file archive through encryption key management |
US20010050990A1 (en) | 1997-02-19 | 2001-12-13 | Frank Wells Sudia | Method for initiating a stream-oriented encrypted communication |
JP3656688B2 (en) | 1997-03-31 | 2005-06-08 | 栄司 岡本 | Cryptographic data recovery method and key registration system |
US6119229A (en) | 1997-04-11 | 2000-09-12 | The Brodia Group | Virtual property system |
JP3611864B2 (en) * | 1997-04-24 | 2005-01-19 | 松下電器産業株式会社 | Data transfer method |
US6023508A (en) * | 1997-05-22 | 2000-02-08 | Currency Scientific, Inc. | Polymorphic data structures for secure operation of a virtual cash system |
JP3595145B2 (en) | 1997-06-02 | 2004-12-02 | 三菱電機株式会社 | Cryptographic communication system |
US6240183B1 (en) * | 1997-06-19 | 2001-05-29 | Brian E. Marchant | Security apparatus for data transmission with dynamic random encryption |
US6085976A (en) * | 1998-05-22 | 2000-07-11 | Sehr; Richard P. | Travel system and methods utilizing multi-application passenger cards |
US6307940B1 (en) | 1997-06-25 | 2001-10-23 | Canon Kabushiki Kaisha | Communication network for encrypting/deciphering communication text while updating encryption key, a communication terminal thereof, and a communication method thereof |
US6959383B1 (en) | 1997-07-10 | 2005-10-25 | Yamaha Corporation | Method and device for incorporating additional information into main information through electronic watermaking technique |
US6229894B1 (en) * | 1997-07-14 | 2001-05-08 | Entrust Technologies, Ltd. | Method and apparatus for access to user-specific encryption information |
US6078888A (en) | 1997-07-16 | 2000-06-20 | Gilbarco Inc. | Cryptography security for remote dispenser transactions |
US6058188A (en) | 1997-07-24 | 2000-05-02 | International Business Machines Corporation | Method and apparatus for interoperable validation of key recovery information in a cryptographic system |
WO1999005818A1 (en) | 1997-07-28 | 1999-02-04 | The Director Government Communications Headquarters | Split-key cryptographic system and method |
SE511881C2 (en) * | 1997-08-08 | 1999-12-13 | Ericsson Telefon Ab L M | Method and arrangement for transmitting packet information in a digital telecommunication system |
US6856383B1 (en) * | 1997-09-05 | 2005-02-15 | Security First Corp. | Relief object image generator |
US5991414A (en) | 1997-09-12 | 1999-11-23 | International Business Machines Corporation | Method and apparatus for the secure distributed storage and retrieval of information |
US6094485A (en) * | 1997-09-18 | 2000-07-25 | Netscape Communications Corporation | SSL step-up |
US6125349A (en) | 1997-10-01 | 2000-09-26 | At&T Corp. | Method and apparatus using digital credentials and other electronic certificates for electronic transactions |
JP3604264B2 (en) | 1997-10-06 | 2004-12-22 | 株式会社東芝 | Caller terminal device, network system, and call information monitoring method |
US6092201A (en) * | 1997-10-24 | 2000-07-18 | Entrust Technologies | Method and apparatus for extending secure communication operations via a shared list |
US6084968A (en) | 1997-10-29 | 2000-07-04 | Motorola, Inc. | Security token and method for wireless applications |
US6446204B1 (en) | 1997-10-31 | 2002-09-03 | Oracle Corporation | Method and apparatus for implementing an extensible authentication mechanism in a web application server |
US6073237A (en) * | 1997-11-06 | 2000-06-06 | Cybercash, Inc. | Tamper resistant method and apparatus |
US6301664B1 (en) | 1997-11-18 | 2001-10-09 | Telcordia Technologies, Inc. | Method and system for non-malleable and non-interactive cryptographic commitment in a network |
US6151395A (en) | 1997-12-04 | 2000-11-21 | Cisco Technology, Inc. | System and method for regenerating secret keys in diffie-hellman communication sessions |
US6185685B1 (en) * | 1997-12-11 | 2001-02-06 | International Business Machines Corporation | Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same |
US6453416B1 (en) | 1997-12-19 | 2002-09-17 | Koninklijke Philips Electronics N.V. | Secure proxy signing device and method of use |
US6415373B1 (en) | 1997-12-24 | 2002-07-02 | Avid Technology, Inc. | Computer system and process for transferring multiple high bandwidth streams of data between multiple storage units and multiple applications in a scalable and reliable manner |
RU2124814C1 (en) | 1997-12-24 | 1999-01-10 | Молдовян Николай Андреевич | Method for encoding of digital data |
EP0936805A1 (en) * | 1998-02-12 | 1999-08-18 | Hewlett-Packard Company | Document transfer systems |
US5974144A (en) | 1998-02-25 | 1999-10-26 | Cipheractive Ltd. | System for encryption of partitioned data blocks utilizing public key methods and random numbers |
EP1062560A1 (en) | 1998-03-11 | 2000-12-27 | Cha! Technologies, Inc. | Automatically invoked intermediation process for network purchases |
US6324650B1 (en) | 1998-03-16 | 2001-11-27 | John W.L. Ogilvie | Message content protection and conditional disclosure |
US6134550A (en) | 1998-03-18 | 2000-10-17 | Entrust Technologies Limited | Method and apparatus for use in determining validity of a certificate in a communication system employing trusted paths |
US6553493B1 (en) * | 1998-04-28 | 2003-04-22 | Verisign, Inc. | Secure mapping and aliasing of private keys used in public key cryptography |
US7096494B1 (en) * | 1998-05-05 | 2006-08-22 | Chen Jay C | Cryptographic system and method for electronic transactions |
WO1999057845A1 (en) * | 1998-05-07 | 1999-11-11 | Ferre Herrero Angel Jose | Randomization-encryption system |
US6981141B1 (en) | 1998-05-07 | 2005-12-27 | Maz Technologies, Inc | Transparent encryption and decryption with algorithm independent cryptographic engine that allows for containerization of encrypted files |
US6438690B1 (en) * | 1998-06-04 | 2002-08-20 | International Business Machines Corp. | Vault controller based registration application serving web based registration authorities and end users for conducting electronic commerce in secure end-to-end distributed information system |
US6519262B1 (en) | 1998-06-10 | 2003-02-11 | Trw Inc. | Time division multiplex approach for multiple transmitter broadcasting |
US6308273B1 (en) | 1998-06-12 | 2001-10-23 | Microsoft Corporation | Method and system of security location discrimination |
US6445794B1 (en) | 1998-06-24 | 2002-09-03 | Benyamin Ron | System and method for synchronizing one time pad encryption keys for secure communication and access control |
US6615347B1 (en) | 1998-06-30 | 2003-09-02 | Verisign, Inc. | Digital certificate cross-referencing |
US6336186B1 (en) * | 1998-07-02 | 2002-01-01 | Networks Associates Technology, Inc. | Cryptographic system and methodology for creating and managing crypto policy on certificate servers |
US6363481B1 (en) | 1998-08-03 | 2002-03-26 | Nortel Networks Limited | Method and apparatus for secure data storage using distributed databases |
US6289509B1 (en) | 1998-09-01 | 2001-09-11 | Pkware, Inc. | Software patch generator |
US7111173B1 (en) | 1998-09-01 | 2006-09-19 | Tecsec, Inc. | Encryption process including a biometric unit |
US6385727B1 (en) | 1998-09-25 | 2002-05-07 | Hughes Electronics Corporation | Apparatus for providing a secure processing environment |
US6345101B1 (en) * | 1998-10-07 | 2002-02-05 | Jayant Shukla | Cryptographic method and apparatus for data communication and storage |
DE19847944A1 (en) | 1998-10-09 | 2000-04-13 | Deutsche Telekom Ag | Establishing a common key between a central station and a group of subscribers involves using public mathematical group, higher order element of group and threshold process |
US6684330B1 (en) * | 1998-10-16 | 2004-01-27 | Tecsec, Inc. | Cryptographic information and flow control |
US6269432B1 (en) * | 1998-10-23 | 2001-07-31 | Ericsson, Inc. | Distributed transactional processing system having redundant data |
WO2000028471A1 (en) | 1998-11-06 | 2000-05-18 | Ethentica, Inc. | Relief object sensor adaptor |
US6260125B1 (en) | 1998-12-09 | 2001-07-10 | Ncr Corporation | Asynchronous write queues, reconstruction and check-pointing in disk-mirroring applications |
US6347143B1 (en) | 1998-12-15 | 2002-02-12 | Philips Electronics No. America Corp. | Cryptographic device with encryption blocks connected parallel |
JP2000181803A (en) | 1998-12-18 | 2000-06-30 | Fujitsu Ltd | Electronic data keeping device with key management function and method therefor |
US6182214B1 (en) | 1999-01-08 | 2001-01-30 | Bay Networks, Inc. | Exchanging a secret over an unreliable network |
DE19906432C1 (en) | 1999-02-16 | 2000-06-21 | Fraunhofer Ges Forschung | Second data stream generation method from first stream including start and functional audiovisual, data blocks, involves insertion of origination information |
FI107205B (en) | 1999-02-16 | 2001-06-15 | Sonera Oyj | A method to secure information |
US6356941B1 (en) * | 1999-02-22 | 2002-03-12 | Cyber-Ark Software Ltd. | Network vaults |
US6256737B1 (en) * | 1999-03-09 | 2001-07-03 | Bionetrix Systems Corporation | System, method and computer program product for allowing access to enterprise resources using biometric devices |
CA2267395C (en) | 1999-03-30 | 2002-07-09 | Ibm Canada Limited-Ibm Canada Limitee | Method and system for managing keys for encrypted data |
US6473858B1 (en) | 1999-04-16 | 2002-10-29 | Digeo, Inc. | Method and apparatus for broadcasting data with access control |
US6625734B1 (en) | 1999-04-26 | 2003-09-23 | Disappearing, Inc. | Controlling and tracking access to disseminated information |
WO2000074298A1 (en) | 1999-05-26 | 2000-12-07 | Ascom Hasler Mailing Systems, Inc. | Technique for split knowledge backup and recovery of a cryptographic key |
US6687375B1 (en) * | 1999-06-02 | 2004-02-03 | International Business Machines Corporation | Generating user-dependent keys and random numbers |
US7450717B1 (en) | 1999-06-08 | 2008-11-11 | General Instruments Corporation | Self authentication ciphertext chaining |
US6957334B1 (en) | 1999-06-23 | 2005-10-18 | Mastercard International Incorporated | Method and system for secure guaranteed transactions over a computer network |
US20010051902A1 (en) | 1999-06-28 | 2001-12-13 | Messner Marc A. | Method for performing secure internet transactions |
AU6053700A (en) * | 1999-06-28 | 2001-01-31 | Starpay.Com, Inc. | Apparatus and method for performing secure network transactions |
US6240188B1 (en) | 1999-07-06 | 2001-05-29 | Matsushita Electric Industrial Co., Ltd. | Distributed group key management scheme for secure many-to-many communication |
US6557123B1 (en) | 1999-08-02 | 2003-04-29 | Inostor Corporation | Data redundancy methods and apparatus |
US6289455B1 (en) | 1999-09-02 | 2001-09-11 | Crypotography Research, Inc. | Method and apparatus for preventing piracy of digital content |
US7260724B1 (en) | 1999-09-20 | 2007-08-21 | Security First Corporation | Context sensitive dynamic authentication in a cryptographic system |
US6853988B1 (en) | 1999-09-20 | 2005-02-08 | Security First Corporation | Cryptographic server with provisions for interoperability between cryptographic systems |
EP1218813A1 (en) | 1999-09-20 | 2002-07-03 | Ethentica, Inc. | Context sensitive dynamic authentication in a cryptographic system |
US7391865B2 (en) * | 1999-09-20 | 2008-06-24 | Security First Corporation | Secure data parser method and system |
US20030005094A1 (en) | 1999-09-30 | 2003-01-02 | Ruixi Yuan | Two-mode operational scheme for managing service availability of a network gateway |
US6505216B1 (en) | 1999-10-01 | 2003-01-07 | Emc Corporation | Methods and apparatus for backing-up and restoring files using multiple trails |
US6978367B1 (en) | 1999-10-21 | 2005-12-20 | International Business Machines Corporation | Selective data encryption using style sheet processing for decryption by a client proxy |
US6662299B1 (en) | 1999-10-28 | 2003-12-09 | Pgp Corporation | Method and apparatus for reconstituting an encryption key based on multiple user responses |
US6449719B1 (en) * | 1999-11-09 | 2002-09-10 | Widevine Technologies, Inc. | Process and streaming server for encrypting a data stream |
US7363361B2 (en) | 2000-08-18 | 2008-04-22 | Akamai Technologies, Inc. | Secure content delivery system |
US7203956B2 (en) | 1999-12-22 | 2007-04-10 | Transnexus, Inc. | System and method for the secure enrollment of devices with a clearinghouse server for internet telephony and multimedia communications |
US6701303B1 (en) | 1999-12-23 | 2004-03-02 | International Business Machines, Corp. | E-commerce system and method of operation enabling a user to conduct transactions with multiple retailers without certification and/or trusted electronic paths |
CA2329460A1 (en) | 1999-12-24 | 2001-06-24 | Matsushita Electric Industrial Co., Ltd. | Data terminal, data distribution system, and internet telephone system |
DE60044179D1 (en) * | 1999-12-28 | 2010-05-27 | Sony Corp | System and method for the commercial traffic of images |
EP1670235A1 (en) | 1999-12-28 | 2006-06-14 | Sony Corporation | A portable music player |
CA2398265A1 (en) | 2000-01-24 | 2001-07-26 | The University Of Manitoba | Method and system for segmented file transfer |
US7304990B2 (en) | 2000-02-03 | 2007-12-04 | Bandwiz Inc. | Method of encoding and transmitting data over a communication medium through division and segmentation |
US7412462B2 (en) * | 2000-02-18 | 2008-08-12 | Burnside Acquisition, Llc | Data repository and method for promoting network storage of data |
JP3499810B2 (en) * | 2000-03-06 | 2004-02-23 | 株式会社東芝 | ENCRYPTION DEVICE, ENCRYPTION METHOD, COMPUTER-READABLE RECORDING MEDIUM CONTAINING PROGRAM FOR FUNCTIONING COMPUTER AS ENCRYPTION DEVICE, AND COMPUTER READING RECORDING PROGRAM FOR FUNCTIONING COMPUTER AS DECRYPTION DEVICE, DECRYPTION METHOD, AND DECRYPTION DEVICE Possible recording media |
US6879988B2 (en) | 2000-03-09 | 2005-04-12 | Pkware | System and method for manipulating and managing computer archive files |
WO2001069392A2 (en) * | 2000-03-16 | 2001-09-20 | Boden Scott T | Method and apparatus for secure and fault tolerant data storage |
US7039189B1 (en) | 2000-03-17 | 2006-05-02 | International Business Machines Corporation | Stream continuity enforcement |
US7650376B1 (en) | 2000-03-27 | 2010-01-19 | Blumenau Trevor I | Content distribution system for distributing content over a network, with particular applicability to distributing high-bandwidth content |
US7181542B2 (en) | 2000-04-12 | 2007-02-20 | Corente, Inc. | Method and system for managing and configuring virtual private networks |
US7085854B2 (en) | 2000-04-12 | 2006-08-01 | Corente, Inc. | Methods and systems for enabling communication between a processor and a network operations center |
US20020016926A1 (en) | 2000-04-27 | 2002-02-07 | Nguyen Thomas T. | Method and apparatus for integrating tunneling protocols with standard routing protocols |
US7076651B2 (en) | 2000-05-01 | 2006-07-11 | Safenet, Inc. | System and method for highly secure data communications |
US6807649B1 (en) | 2000-05-23 | 2004-10-19 | Hewlett-Packard Development Company, L.P. | Encryption keys for multiple drive fault tolerance |
US6931549B1 (en) | 2000-05-25 | 2005-08-16 | Stamps.Com | Method and apparatus for secure data storage and retrieval |
US6898285B1 (en) | 2000-06-02 | 2005-05-24 | General Instrument Corporation | System to deliver encrypted access control information to support interoperability between digital information processing/control equipment |
KR100423191B1 (en) | 2000-06-08 | 2004-03-18 | 인터내셔널 비지네스 머신즈 코포레이션 | Improving secure server performance with pre-processed data ready for secure protocol transfer |
FR2810138B1 (en) * | 2000-06-08 | 2005-02-11 | Bull Cp8 | METHOD FOR SECURE STORAGE OF SENSITIVE DATA IN A MEMORY OF AN ELECTRONIC CHIP-BASED SYSTEM, IN PARTICULAR A CHIP CARD, AND ON-BOARD SYSTEM IMPLEMENTING THE METHOD |
US7693992B2 (en) * | 2000-06-14 | 2010-04-06 | Disney Enterprises, Inc. | Technique for providing access to data |
US7305085B2 (en) * | 2000-06-30 | 2007-12-04 | Kabushiki Kaisha Toshiba | Encryption apparatus and method, and decryption apparatus and method based on block encryption |
US7587368B2 (en) | 2000-07-06 | 2009-09-08 | David Paul Felsher | Information record infrastructure, system and method |
US6915436B1 (en) | 2000-08-02 | 2005-07-05 | International Business Machines Corporation | System and method to verify availability of a back-up secure tunnel |
US6789189B2 (en) | 2000-08-04 | 2004-09-07 | First Data Corporation | Managing account database in ABDS system |
US6947557B1 (en) | 2000-08-14 | 2005-09-20 | International Business Machines Corporation | Method and program product for maintaining security of publicly distributed information |
US20020031230A1 (en) | 2000-08-15 | 2002-03-14 | Sweet William B. | Method and apparatus for a web-based application service model for security management |
AUPQ993100A0 (en) | 2000-09-06 | 2000-09-28 | Software Engineering Australia (Western Australia) Limited | System and method for transmitting and storing sensitive data transmitted over a communications network |
US7165175B1 (en) | 2000-09-06 | 2007-01-16 | Widevine Technologies, Inc. | Apparatus, system and method for selectively encrypting different portions of data sent over a network |
SE0003440D0 (en) | 2000-09-26 | 2000-09-26 | Landala Naet Ab | Communication system |
CN1347225A (en) | 2000-10-09 | 2002-05-01 | 杨高雄 | Safety control method for copyright |
US7143289B2 (en) | 2000-10-30 | 2006-11-28 | Geocodex Llc | System and method for delivering encrypted information in a communication network using location identity and key tables |
WO2002037749A1 (en) | 2000-11-03 | 2002-05-10 | Fusionone, Inc. | Secure authentication of users via intermediate parties |
US7191252B2 (en) * | 2000-11-13 | 2007-03-13 | Digital Doors, Inc. | Data security system and method adjunct to e-mail, browser or telecom program |
US7322047B2 (en) | 2000-11-13 | 2008-01-22 | Digital Doors, Inc. | Data security system and method associated with data mining |
US7349987B2 (en) * | 2000-11-13 | 2008-03-25 | Digital Doors, Inc. | Data security system and method with parsing and dispersion techniques |
US7313825B2 (en) * | 2000-11-13 | 2007-12-25 | Digital Doors, Inc. | Data security system and method for portable device |
US7103915B2 (en) | 2000-11-13 | 2006-09-05 | Digital Doors, Inc. | Data security system and method |
US7669051B2 (en) | 2000-11-13 | 2010-02-23 | DigitalDoors, Inc. | Data security system and method with multiple independent levels of security |
US7140044B2 (en) | 2000-11-13 | 2006-11-21 | Digital Doors, Inc. | Data security system and method for separation of user communities |
US20030058274A1 (en) * | 2000-11-17 | 2003-03-27 | Jake Hill | Interface device |
KR100471018B1 (en) * | 2000-11-28 | 2005-03-08 | 스미도모쥬기가이고교 가부시키가이샤 | Gap adjustment apparatus and gap adjustment method for adjusting gap between two objects |
US20020129235A1 (en) | 2001-01-11 | 2002-09-12 | Ryuichi Okamoto | Digital data distributing system |
US20020071566A1 (en) * | 2000-12-11 | 2002-06-13 | Kurn David Michael | Computer system employing a split-secret cryptographic key linked to a password-based cryptographic key security scheme |
US20020075844A1 (en) | 2000-12-15 | 2002-06-20 | Hagen W. Alexander | Integrating public and private network resources for optimized broadband wireless access and method |
US6675261B2 (en) | 2000-12-22 | 2004-01-06 | Oblix, Inc. | Request based caching of data store data |
US20030084020A1 (en) * | 2000-12-22 | 2003-05-01 | Li Shu | Distributed fault tolerant and secure storage |
JP4074057B2 (en) | 2000-12-28 | 2008-04-09 | 株式会社東芝 | Method for sharing encrypted data area among tamper resistant processors |
US20040133606A1 (en) | 2003-01-02 | 2004-07-08 | Z-Force Communications, Inc. | Directory aggregation for files distributed over a plurality of servers in a switched file system |
AU2002234258A1 (en) | 2001-01-22 | 2002-07-30 | Sun Microsystems, Inc. | Peer-to-peer network computing platform |
US7440953B2 (en) * | 2001-01-25 | 2008-10-21 | Content Directions, Inc. | Apparatus, method and system for directory quality assurance |
DE10110049A1 (en) | 2001-03-02 | 2002-09-05 | Bosch Gmbh Robert | Encryption of program data for use in control devices or controllers, involves using decryption key within the control device, to reduce the amount of data to transfer |
US7277958B2 (en) | 2001-03-12 | 2007-10-02 | Edgestream, Inc. | Re-assembly of streaming files from separate connections |
US7043637B2 (en) | 2001-03-21 | 2006-05-09 | Microsoft Corporation | On-disk file format for a serverless distributed file system |
US7050583B2 (en) | 2001-03-29 | 2006-05-23 | Etreppid Technologies, Llc | Method and apparatus for streaming data using rotating cryptographic keys |
JP2002314549A (en) | 2001-04-18 | 2002-10-25 | Nec Corp | User authentication system and user authentication method used for the same |
US7349539B2 (en) * | 2001-05-04 | 2008-03-25 | Hewlett-Packard Development Company, L.P. | Encoding and encrypting devices for secure scalable data streaming |
US6938155B2 (en) | 2001-05-24 | 2005-08-30 | International Business Machines Corporation | System and method for multiple virtual private network authentication schemes |
US7003662B2 (en) | 2001-05-24 | 2006-02-21 | International Business Machines Corporation | System and method for dynamically determining CRL locations and access methods |
US20020178240A1 (en) | 2001-05-24 | 2002-11-28 | International Business Machines Corporation | System and method for selectively confirming digital certificates in a virtual private network |
DE10129285C2 (en) * | 2001-06-18 | 2003-01-09 | Hans-Joachim Mueschenborn | Encryption procedure with arbitrary selectable one-time keys |
US20030023958A1 (en) | 2001-07-17 | 2003-01-30 | Patel Mukesh K. | Intermediate language accelerator chip |
EP1413119B1 (en) * | 2001-08-04 | 2006-05-17 | Kontiki, Inc. | Method and apparatus for facilitating distributed delivery of content across a computer network |
US6745209B2 (en) * | 2001-08-15 | 2004-06-01 | Iti, Inc. | Synchronization of plural databases in a database replication system |
EP1284568A1 (en) | 2001-08-17 | 2003-02-19 | Siemens Aktiengesellschaft | Method and data processing unit for the transmission of data through different interfaces |
US7171685B2 (en) | 2001-08-23 | 2007-01-30 | International Business Machines Corporation | Standard format specification for automatically configuring IP security tunnels |
JP2003076647A (en) | 2001-08-31 | 2003-03-14 | Hitachi Ltd | Mail transmitting/receiving method, and device using it |
US20030051159A1 (en) * | 2001-09-11 | 2003-03-13 | Mccown Steven H | Secure media transmission with incremental decryption |
US7228337B1 (en) | 2001-09-11 | 2007-06-05 | Cisco Technology, Inc. | Methods and apparatus for providing a network service to a virtual machine |
US7085827B2 (en) | 2001-09-20 | 2006-08-01 | Hitachi, Ltd. | Integrated service management system for remote customer support |
US20030061481A1 (en) | 2001-09-26 | 2003-03-27 | David Levine | Secure broadcast system and method |
US20050210243A1 (en) | 2001-09-28 | 2005-09-22 | Archard Paul L | System and method for improving client response times using an integrated security and packet optimization framework |
CA2358980A1 (en) | 2001-10-12 | 2003-04-12 | Karthika Technologies Inc. | Distributed security architecture for storage area networks (san) |
JP2003132234A (en) | 2001-10-23 | 2003-05-09 | Global Friendship Inc | Electronic information delivery system available for trial |
US20030084397A1 (en) | 2001-10-31 | 2003-05-01 | Exanet Co. | Apparatus and method for a distributed raid |
GB2381916B (en) | 2001-11-08 | 2005-03-23 | Ncr Int Inc | Biometrics template |
WO2003042988A1 (en) | 2001-11-15 | 2003-05-22 | Sony Corporation | System and method for controlling the use and duplication of digital content distributed on removable media |
US7069464B2 (en) | 2001-11-21 | 2006-06-27 | Interdigital Technology Corporation | Hybrid parallel/serial bus interface |
US7921288B1 (en) | 2001-12-12 | 2011-04-05 | Hildebrand Hal S | System and method for providing different levels of key security for controlling access to secured items |
KR100463842B1 (en) | 2001-12-27 | 2004-12-29 | 한국전자통신연구원 | Apparatus for managing key in afile security system and method for managing security key |
JP2003229843A (en) * | 2002-01-31 | 2003-08-15 | Sony Corp | Streaming system and streaming method, client terminal and contents data decoding method, stream server and stream distribution method, authoring device and authoring method, and program and recording medium |
TWI259366B (en) | 2002-02-20 | 2006-08-01 | Nagracard Sa | Data block storing method in a memory |
US20030167408A1 (en) * | 2002-03-01 | 2003-09-04 | Fitzpatrick Gregory P. | Randomized bit dispersal of sensitive data sets |
US20030178355A1 (en) | 2002-03-25 | 2003-09-25 | Dale Beach | Reverse osmosis tank with integral quick release fitting |
US20030188153A1 (en) | 2002-04-02 | 2003-10-02 | Demoff Jeff S. | System and method for mirroring data using a server |
JP4110098B2 (en) | 2002-04-11 | 2008-07-02 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Computer apparatus, computer apparatus security setting method, and program |
US20030204602A1 (en) | 2002-04-26 | 2003-10-30 | Hudson Michael D. | Mediated multi-source peer content delivery network architecture |
JP4211282B2 (en) | 2002-05-14 | 2009-01-21 | ソニー株式会社 | Data storage method, data storage system, data recording control device, data recording command device, data receiving device, and information processing terminal |
US7116665B2 (en) | 2002-06-04 | 2006-10-03 | Fortinet, Inc. | Methods and systems for a distributed provider edge |
US7203844B1 (en) | 2002-06-20 | 2007-04-10 | Oxford William V | Method and system for a recursive security protocol for digital copyright control |
GB2389929A (en) | 2002-06-21 | 2003-12-24 | Armoursoft Ltd | Computer Encryption Systems |
US20030236943A1 (en) | 2002-06-24 | 2003-12-25 | Delaney William P. | Method and systems for flyby raid parity generation |
US7213158B2 (en) | 2002-06-28 | 2007-05-01 | Lenovo (Singapore) Pte. Ltd. | Distributed autonomic backup |
US7111303B2 (en) | 2002-07-16 | 2006-09-19 | International Business Machines Corporation | Virtual machine operating system LAN |
US20040022390A1 (en) | 2002-08-02 | 2004-02-05 | Mcdonald Jeremy D. | System and method for data protection and secure sharing of information over a computer network |
US7469340B2 (en) | 2002-08-07 | 2008-12-23 | Kryptiq Corporation | Selective encryption of electronic messages and data |
US7107385B2 (en) | 2002-08-09 | 2006-09-12 | Network Appliance, Inc. | Storage virtualization by layering virtual disk objects on a file system |
US7234063B1 (en) | 2002-08-27 | 2007-06-19 | Cisco Technology, Inc. | Method and apparatus for generating pairwise cryptographic transforms based on group keys |
US20040078542A1 (en) | 2002-10-14 | 2004-04-22 | Fuller William Tracy | Systems and methods for transparent expansion and management of online electronic storage |
US7191410B1 (en) | 2002-12-02 | 2007-03-13 | Sap Ag | Managing information display |
US7428751B2 (en) * | 2002-12-05 | 2008-09-23 | Microsoft Corporation | Secure recovery in a serverless distributed file system |
JP2004185573A (en) | 2002-12-06 | 2004-07-02 | Nec Infrontia Corp | Data writing method and device |
US7565688B2 (en) | 2002-12-23 | 2009-07-21 | Hewlett-Packard Development Company, L.P. | Network demonstration techniques |
US7072917B2 (en) | 2003-04-24 | 2006-07-04 | Neopath Networks, Inc. | Extended storage capacity for a network file server |
US7774593B2 (en) * | 2003-04-24 | 2010-08-10 | Panasonic Corporation | Encrypted packet, processing device, method, program, and program recording medium |
US7478427B2 (en) | 2003-05-05 | 2009-01-13 | Alcatel-Lucent Usa Inc. | Method and apparatus for providing adaptive VPN to enable different security levels in virtual private networks (VPNs) |
FI118619B (en) * | 2003-05-16 | 2008-01-15 | Jarmo Talvitie | Method and system for encrypting and storing information |
US7356818B2 (en) | 2003-06-24 | 2008-04-08 | International Business Machines Corporation | Virtual machine communicating to external device without going through other virtual machines by using a list of IP addresses managed only by a single virtual machine monitor |
US7448080B2 (en) | 2003-06-30 | 2008-11-04 | Nokia, Inc. | Method for implementing secure corporate communication |
US7730543B1 (en) | 2003-06-30 | 2010-06-01 | Satyajit Nath | Method and system for enabling users of a group shared across multiple file security systems to access secured files |
US20050036623A1 (en) | 2003-08-15 | 2005-02-17 | Ming-Jye Sheu | Methods and apparatus for distribution of global encryption key in a wireless transport network |
US7590840B2 (en) | 2003-09-26 | 2009-09-15 | Randy Langer | Method and system for authorizing client devices to receive secured data streams |
US7827409B2 (en) | 2003-10-07 | 2010-11-02 | Koolspan, Inc. | Remote secure authorization |
KR100561846B1 (en) | 2003-10-08 | 2006-03-16 | 삼성전자주식회사 | Weighted secret sharing and recovering method |
US7594275B2 (en) | 2003-10-14 | 2009-09-22 | Microsoft Corporation | Digital rights management system |
JP2005136739A (en) | 2003-10-30 | 2005-05-26 | Furukawa Electric Co Ltd:The | Data relay method, data relay device and data relay system |
US7596570B1 (en) * | 2003-11-04 | 2009-09-29 | Emigh Aaron T | Data sharing |
US7346925B2 (en) | 2003-12-11 | 2008-03-18 | Microsoft Corporation | Firewall tunneling and security service |
US7609687B2 (en) | 2003-12-15 | 2009-10-27 | Panasonic Corporation | Home agent apparatus, mobile router communication system, and communication method |
US20050132060A1 (en) | 2003-12-15 | 2005-06-16 | Richard Mo | Systems and methods for preventing spam and denial of service attacks in messaging, packet multimedia, and other networks |
US7222062B2 (en) | 2003-12-23 | 2007-05-22 | Intel Corporation | Method and system to support a trusted set of operational environments using emulated trusted hardware |
US7346773B2 (en) | 2004-01-12 | 2008-03-18 | Cisco Technology, Inc. | Enabling stateless server-based pre-shared secrets |
US7305706B2 (en) | 2004-01-15 | 2007-12-04 | Cisco Technology, Inc. | Establishing a virtual private network for a road warrior |
JP4489455B2 (en) | 2004-02-16 | 2010-06-23 | 株式会社日立製作所 | Disk control device and control method of disk control device |
US10375023B2 (en) | 2004-02-20 | 2019-08-06 | Nokia Technologies Oy | System, method and computer program product for accessing at least one virtual private network |
JP2005244379A (en) | 2004-02-25 | 2005-09-08 | Nec Commun Syst Ltd | Vpn system, vpn apparatus, and encryption key distribution method used for them |
EP1723741B1 (en) * | 2004-03-09 | 2013-07-10 | Thomson Licensing | Secure data transmission via multichannel entitlement management and control |
US7760988B2 (en) | 2004-03-09 | 2010-07-20 | Panasonic Corporation | Content use device and recording medium |
WO2005091141A1 (en) | 2004-03-19 | 2005-09-29 | Zakrytoe Aktsionernoe Obschestvo 'intel A/O' | Failover and load balancing |
JP4601979B2 (en) | 2004-03-22 | 2010-12-22 | エヌ・ティ・ティ・コムウェア株式会社 | Certificate mutual authentication system and certificate mutual authentication method |
US7535905B2 (en) | 2004-03-31 | 2009-05-19 | Microsoft Corporation | Signing and validating session initiation protocol routing headers |
ATE509321T1 (en) | 2004-04-02 | 2011-05-15 | Panasonic Corp | SYSTEM FOR DETECTING UNAUTHORIZED CONTENT |
US7940932B2 (en) | 2004-04-08 | 2011-05-10 | Texas Instruments Incorporated | Methods, apparatus, and systems for securing SIM (subscriber identity module) personalization and other data on a first processor and secure communication of the SIM data to a second processor |
US7188203B2 (en) | 2004-05-25 | 2007-03-06 | Hewlett-Packard Development Company, L.P. | Method and apparatus for dynamic suppression of spurious interrupts |
US7506170B2 (en) | 2004-05-28 | 2009-03-17 | Microsoft Corporation | Method for secure access to multiple secure networks |
US7203871B2 (en) * | 2004-06-03 | 2007-04-10 | Cisco Technology, Inc. | Arrangement in a network node for secure storage and retrieval of encoded data distributed among multiple network nodes |
US20050289218A1 (en) | 2004-06-28 | 2005-12-29 | Rothman Michael A | Method to enable remote storage utilization |
US20060075225A1 (en) | 2004-06-30 | 2006-04-06 | Flynn James P | Digital content protection for peer to peer networks |
US7254837B2 (en) | 2004-07-13 | 2007-08-07 | Fields Daniel M | Apparatus and method for storing and distributing encrypted digital content |
US9264384B1 (en) | 2004-07-22 | 2016-02-16 | Oracle International Corporation | Resource virtualization mechanism including virtual host bus adapters |
US8412685B2 (en) | 2004-07-26 | 2013-04-02 | Riverbed Technology, Inc. | Method and system for managing data |
US8185947B2 (en) | 2006-07-12 | 2012-05-22 | Avaya Inc. | System, method and apparatus for securely exchanging security keys and monitoring links in a IP communications network |
US7428754B2 (en) | 2004-08-17 | 2008-09-23 | The Mitre Corporation | System for secure computing using defense-in-depth architecture |
US20060046728A1 (en) | 2004-08-27 | 2006-03-02 | Samsung Electronics Co., Ltd. | Cellular mobile communication system and method using heterogeneous wireless network |
US7174385B2 (en) * | 2004-09-03 | 2007-02-06 | Microsoft Corporation | System and method for receiver-driven streaming in a peer-to-peer network |
US20060075222A1 (en) | 2004-10-06 | 2006-04-06 | Seamus Moloney | System for personal group management based on subscriber certificates |
EP1645992A1 (en) | 2004-10-08 | 2006-04-12 | Philip Morris Products S.A. | Methods and systems for marking, tracking and authentication of products |
WO2006042155A2 (en) | 2004-10-08 | 2006-04-20 | E-Klone, Inc. | Floating vector scrambling methods and apparatus |
TWI310275B (en) | 2004-10-19 | 2009-05-21 | Nec Corp | Virtual private network gateway device and hosting system |
US7472105B2 (en) | 2004-10-19 | 2008-12-30 | Palo Alto Research Center Incorporated | System and method for providing private inference control |
EP1825412A1 (en) | 2004-10-25 | 2007-08-29 | Rick L. Orsini | Secure data parser method and system |
US7831995B2 (en) | 2004-10-29 | 2010-11-09 | CORE, SDI, Inc. | Establishing and enforcing security and privacy policies in web-based applications |
JP4390808B2 (en) | 2004-11-17 | 2009-12-24 | 富士通株式会社 | Portable wireless terminal and security system thereof |
JP4713881B2 (en) | 2004-12-16 | 2011-06-29 | パナソニック電工株式会社 | Tunnel automatic setting device, tunnel automatic setting method, and tunnel automatic setting program |
FR2880485B1 (en) | 2005-01-06 | 2007-03-16 | Canon Europa Nv Naamlooze Venn | METHODS FOR STORING AND READING CONTENT, SUCH AS A CONTENT PROTECTION PROTOCOL, CORRESPONDING SOURCE, STORAGE DEVICES AND RECEIVER. |
US8700729B2 (en) | 2005-01-21 | 2014-04-15 | Robin Dua | Method and apparatus for managing credentials through a wireless network |
US20100162004A1 (en) | 2008-12-23 | 2010-06-24 | David Dodgson | Storage of cryptographically-split data blocks at geographically-separated locations |
US20080072035A1 (en) | 2005-01-31 | 2008-03-20 | Johnson Robert A | Securing multicast data |
US7188230B2 (en) * | 2005-02-15 | 2007-03-06 | Hitachi, Ltd. | Method of assuring data integrity on storage volumes |
US8250643B2 (en) | 2005-02-28 | 2012-08-21 | Nec Corporation | Communication device, communication system, communication method, and program |
US7596741B2 (en) | 2005-04-11 | 2009-09-29 | Hewlett-Packard Development Company, L.P. | Packet protection for header modification |
US20060282681A1 (en) | 2005-05-27 | 2006-12-14 | Scheidt Edward M | Cryptographic configuration control |
US7577689B1 (en) | 2005-06-15 | 2009-08-18 | Adobe Systems Incorporated | Method and system to archive data |
WO2006138696A2 (en) | 2005-06-17 | 2006-12-28 | Genizon Biosciences, Inc. | Genemap of the human genes associated with longevity |
US7627125B2 (en) | 2005-06-23 | 2009-12-01 | Efunds Corporation | Key loading systems and methods |
JP4321501B2 (en) | 2005-06-29 | 2009-08-26 | ブラザー工業株式会社 | Image forming apparatus |
US8195976B2 (en) | 2005-06-29 | 2012-06-05 | International Business Machines Corporation | Fault-tolerance and fault-containment models for zoning clustered application silos into continuous availability and high availability zones in clustered systems during recovery and maintenance |
US8352782B2 (en) | 2005-09-30 | 2013-01-08 | Cleversafe, Inc. | Range based rebuilder for use with a dispersed data storage network |
US8880799B2 (en) * | 2005-09-30 | 2014-11-04 | Cleversafe, Inc. | Rebuilding data on a dispersed storage network |
US7546427B2 (en) * | 2005-09-30 | 2009-06-09 | Cleversafe, Inc. | System for rebuilding dispersed data |
US7499905B2 (en) | 2005-10-17 | 2009-03-03 | Cisco Technology, Inc. | Method and apparatus for accessing information based on distributed file system (DFS) paths |
TWI298128B (en) | 2005-10-20 | 2008-06-21 | Ind Tech Res Inst | Method and system for managing distributed storage of digital contents |
EP1839405B1 (en) * | 2005-10-27 | 2013-04-24 | NDS Limited | Network security system |
CN105978683A (en) | 2005-11-18 | 2016-09-28 | 安全第公司 | Secure data parser method and system |
JP4482630B2 (en) * | 2005-11-21 | 2010-06-16 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Communication apparatus and communication method |
US20070124584A1 (en) | 2005-11-30 | 2007-05-31 | Microsoft Corporation | Proving ownership of shared information to a third party |
JP4635855B2 (en) | 2005-12-13 | 2011-02-23 | 株式会社日立製作所 | Data communication method and system |
US20070143315A1 (en) | 2005-12-21 | 2007-06-21 | Alan Stone | Inter-partition communication in a virtualization environment |
EP1969836A1 (en) | 2005-12-29 | 2008-09-17 | United Video Properties, Inc. | Systems and methods for accessing media program options based on program segment interest |
US20070157025A1 (en) | 2005-12-30 | 2007-07-05 | Intel Corporation | Method and system for providing security and reliability to collaborative applications |
US7649992B2 (en) * | 2006-01-06 | 2010-01-19 | Fujitsu Limited | Apparatuses for encoding, decoding, and authenticating data in cipher block chaining messaging authentication code |
EP2030115A4 (en) * | 2006-05-31 | 2012-08-22 | Ibm | Method and system for transformation of logical data objects for storage |
JP2007334836A (en) | 2006-06-19 | 2007-12-27 | Canon Inc | Information processor, data holding device and control method therefor, computer program, and storage medium |
US20080046752A1 (en) | 2006-08-09 | 2008-02-21 | Stefan Berger | Method, system, and program product for remotely attesting to a state of a computer system |
US8040850B2 (en) | 2006-08-21 | 2011-10-18 | Qualcomm Incorporated | Advanced internet protocol with flash-OFDM methods and systems |
US7865741B1 (en) | 2006-08-23 | 2011-01-04 | Netapp, Inc. | System and method for securely replicating a configuration database of a security appliance |
US8397083B1 (en) | 2006-08-23 | 2013-03-12 | Netapp, Inc. | System and method for efficiently deleting a file from secure storage served by a storage system |
US8761401B2 (en) | 2006-08-28 | 2014-06-24 | Motorola Mobility Llc | System and method for secure key distribution to manufactured products |
US20080126614A1 (en) | 2006-09-26 | 2008-05-29 | Giap Yong Ooi | Input/output (I/O) device virtualization using hardware |
JP4816375B2 (en) | 2006-09-28 | 2011-11-16 | 富士ゼロックス株式会社 | Information processing system, information processing apparatus, and program |
CN101155183B (en) | 2006-09-29 | 2012-02-08 | 松下电器产业株式会社 | Method and network device for processing nest-shaped internet security protocol channel |
US8190905B1 (en) | 2006-09-29 | 2012-05-29 | Netapp, Inc. | Authorizing administrative operations using a split knowledge protocol |
JP2008103936A (en) | 2006-10-18 | 2008-05-01 | Toshiba Corp | Secret information management device, and secret information management system |
US8060088B2 (en) | 2006-11-07 | 2011-11-15 | Nokia Corporation | Method, network element and communication system for optimized selection of an agent entity as well as modules of the network element |
CN101569132B (en) * | 2006-11-07 | 2013-04-17 | 安全第一公司 | Systems and methods for distributing and securing data |
DE102006055480A1 (en) | 2006-11-24 | 2008-05-29 | Bayer Innovation Gmbh | Coding method, decoding method, codec and data carrier for holographic storage |
GB2446199A (en) * | 2006-12-01 | 2008-08-06 | David Irvine | Secure, decentralised and anonymous peer-to-peer network |
US8904080B2 (en) * | 2006-12-05 | 2014-12-02 | Security First Corp. | Tape backup method |
US8112622B2 (en) | 2006-12-08 | 2012-02-07 | Broadcom Corporation | Chaining port scheme for network security |
US20080147821A1 (en) * | 2006-12-19 | 2008-06-19 | Dietrich Bradley W | Managed peer-to-peer content backup service system and method using dynamic content dispersal to plural storage nodes |
US8161543B2 (en) | 2006-12-22 | 2012-04-17 | Aruba Networks, Inc. | VLAN tunneling |
US20080155051A1 (en) | 2006-12-23 | 2008-06-26 | Simpletech, Inc. | Direct file transfer system and method for a computer network |
CN101212393B (en) | 2006-12-29 | 2010-10-13 | 华为技术有限公司 | Medium independent switching message transmission method, system, and device |
US8468244B2 (en) | 2007-01-05 | 2013-06-18 | Digital Doors, Inc. | Digital information infrastructure and method for security designated data and with granular data stores |
US8958562B2 (en) * | 2007-01-16 | 2015-02-17 | Voltage Security, Inc. | Format-preserving cryptographic systems |
FR2912020B1 (en) | 2007-01-26 | 2009-03-06 | Thales Sa | METHOD FOR SECURING THE TRANSMISSION OF INFORMATION. |
US8892905B2 (en) | 2007-03-21 | 2014-11-18 | Oracle International Corporation | Method and apparatus for performing selective encryption/decryption in a data storage system |
JP2008250369A (en) | 2007-03-29 | 2008-10-16 | Sorun Corp | Management method of secrete data file, management system and proxy server therefor |
JP2008250931A (en) | 2007-03-30 | 2008-10-16 | Toshiba Corp | System for restoring distributed information, information utilizing device, and verification device |
US20080297326A1 (en) | 2007-03-30 | 2008-12-04 | Skyetek, Inc. | Low Cost RFID Tag Security And Privacy System And Method |
JP2008250779A (en) | 2007-03-30 | 2008-10-16 | Hitachi Ltd | Storage control device having encryption function, data encryption method, and storage system |
US8140676B2 (en) | 2007-04-10 | 2012-03-20 | Apertio Limited | Data access in distributed server systems |
CA2684229A1 (en) | 2007-04-12 | 2008-10-23 | Ncipher Corporation Ltd. | Method and system for identifying and managing keys |
JP4900816B2 (en) | 2007-05-11 | 2012-03-21 | 株式会社日立製作所 | Storage control device and control method of storage control device |
GB0709527D0 (en) | 2007-05-18 | 2007-06-27 | Surfcontrol Plc | Electronic messaging system, message processing apparatus and message processing method |
TWI402698B (en) | 2007-05-24 | 2013-07-21 | Via Tech Inc | Data distribution access method and system |
EP2158532A1 (en) | 2007-06-14 | 2010-03-03 | Tech-Linx Sdn. Bhd. | Presentation system |
US7926090B2 (en) | 2007-07-13 | 2011-04-12 | Erf Wireless, Inc. | Separate secure networks over a non-secure network |
US8189769B2 (en) | 2007-07-31 | 2012-05-29 | Apple Inc. | Systems and methods for encrypting data |
US8032741B2 (en) | 2007-08-22 | 2011-10-04 | Intel Corporation | Method and apparatus for virtualization of a multi-context hardware trusted platform module (TPM) |
WO2009032712A2 (en) | 2007-08-29 | 2009-03-12 | Nirvanix, Inc. | Method and system for moving requested files from one storage location to another |
CN102932136B (en) | 2007-09-14 | 2017-05-17 | 安全第一公司 | Systems and methods for managing cryptographic keys |
US8307443B2 (en) | 2007-09-28 | 2012-11-06 | Microsoft Corporation | Securing anti-virus software with virtualization |
WO2009046400A1 (en) | 2007-10-05 | 2009-04-09 | Interdigital Technology Corporation | Techniques for secure channelization between uicc and a terminal |
US20090097657A1 (en) | 2007-10-05 | 2009-04-16 | Scheidt Edward M | Constructive Channel Key |
JP2009111437A (en) | 2007-10-26 | 2009-05-21 | Hitachi Ltd | Network system |
US8261265B2 (en) | 2007-10-30 | 2012-09-04 | Vmware, Inc. | Transparent VMM-assisted user-mode execution control transfer |
CN101179356A (en) | 2007-11-28 | 2008-05-14 | 中国海洋石油总公司 | Data transmitting, receiving method and device |
US9349127B2 (en) | 2007-11-29 | 2016-05-24 | Visa Usa Inc. | Serial number and payment data based payment card processing |
US7548556B1 (en) | 2007-12-14 | 2009-06-16 | Raptor Networks Technology, Inc. | Secure communication through a network fabric |
US7392403B1 (en) | 2007-12-19 | 2008-06-24 | International Business Machines Corporation | Systems, methods and computer program products for high availability enhancements of virtual security module servers |
JP2009157584A (en) | 2007-12-26 | 2009-07-16 | Hitachi Ltd | Computing system, storage system, and remote copy method |
EP2106642A4 (en) | 2008-01-07 | 2015-12-02 | Security First Corp | Systems and methods for securing data using multi-factor or keyed dispersal |
US8855316B2 (en) | 2008-01-25 | 2014-10-07 | Qinetiq Limited | Quantum cryptography apparatus |
CN103281190B (en) | 2008-02-22 | 2018-03-09 | 安全第一公司 | Systems and methods for secure workgroup management and communication |
US8473779B2 (en) | 2008-02-29 | 2013-06-25 | Assurance Software And Hardware Solutions, Llc | Systems and methods for error correction and detection, isolation, and recovery of faults in a fail-in-place storage array |
US8959199B2 (en) | 2008-03-18 | 2015-02-17 | Reduxio Systems Ltd. | Network storage system for a download intensive environment |
US20090292930A1 (en) | 2008-04-24 | 2009-11-26 | Marano Robert F | System, method and apparatus for assuring authenticity and permissible use of electronic documents |
US8755322B2 (en) | 2008-04-24 | 2014-06-17 | Nokia Corporation | Method, apparatus, and computer program product for providing internet protocol multicast transport |
US9209975B2 (en) | 2008-10-15 | 2015-12-08 | Ricoh Company, Ltd. | Secure access of electronic documents and data from client terminal |
US9235705B2 (en) | 2008-05-19 | 2016-01-12 | Wontok, Inc. | Secure virtualization system software |
US8352740B2 (en) | 2008-05-23 | 2013-01-08 | Microsoft Corporation | Secure execution environment on external device |
US8837491B2 (en) | 2008-05-27 | 2014-09-16 | Glue Networks | Regional virtual VPN |
US8615084B2 (en) | 2008-05-29 | 2013-12-24 | Red Hat, Inc. | Extending a secret bit string to safeguard the secret |
US8397084B2 (en) | 2008-06-12 | 2013-03-12 | Microsoft Corporation | Single instance storage of encrypted data |
US20090316892A1 (en) | 2008-06-20 | 2009-12-24 | Candelore Brant L | Crypto micro-module using IEEE 1394 for stream descrambling |
US20100005028A1 (en) | 2008-07-07 | 2010-01-07 | International Business Machines Corporation | Method and apparatus for interconnecting a plurality of virtual world environments |
EP2148488A1 (en) | 2008-07-24 | 2010-01-27 | Irdeto Access B.V. | Peer-to-peer content distribution |
US7995764B2 (en) | 2008-08-28 | 2011-08-09 | Red Hat, Inc. | Sharing a secret using hyperplanes over GF(2m) |
TW201015322A (en) | 2008-10-08 | 2010-04-16 | Ee Solutions Inc | Method and system for data secured data recovery |
CN102273127A (en) | 2008-11-14 | 2011-12-07 | Oki半导体株式会社 | Confidential information transmission method, confidential information transmission system, and confidential information transmission device |
US20100153703A1 (en) | 2008-12-17 | 2010-06-17 | David Dodgson | Storage security using cryptographic splitting |
US8135980B2 (en) | 2008-12-23 | 2012-03-13 | Unisys Corporation | Storage availability using cryptographic splitting |
US20100162001A1 (en) * | 2008-12-23 | 2010-06-24 | David Dodgson | Secure network attached storage device using cryptographic settings |
US20100169662A1 (en) * | 2008-12-30 | 2010-07-01 | Scott Summers | Simultaneous state-based cryptographic splitting in a secure storage appliance |
EP2359296B1 (en) | 2008-11-17 | 2021-08-18 | Unisys Corporation | Simultaneous state-based cryptographic splitting in a secure storage appliance |
US20100154053A1 (en) * | 2008-12-17 | 2010-06-17 | David Dodgson | Storage security using cryptographic splitting |
US20100125730A1 (en) | 2008-11-17 | 2010-05-20 | David Dodgson | Block-level data storage security system |
US20100161964A1 (en) | 2008-12-23 | 2010-06-24 | David Dodgson | Storage communities of interest using cryptographic splitting |
US20100150341A1 (en) * | 2008-12-17 | 2010-06-17 | David Dodgson | Storage security using cryptographic splitting |
US20100162003A1 (en) * | 2008-12-23 | 2010-06-24 | David Dodgson | Retrieval of cryptographically-split data blocks from fastest-responding storage devices |
US20100161981A1 (en) * | 2008-12-23 | 2010-06-24 | David Dodgson | Storage communities of interest using cryptographic splitting |
US8392682B2 (en) * | 2008-12-17 | 2013-03-05 | Unisys Corporation | Storage security using cryptographic splitting |
US9008314B2 (en) | 2008-11-18 | 2015-04-14 | Verizon Patent And Licensing Inc. | Secure wireless communications |
CN101409714A (en) | 2008-11-18 | 2009-04-15 | 华南理工大学 | Firewall system based on virtual machine |
US7987262B2 (en) | 2008-11-19 | 2011-07-26 | Accenture Global Services Limited | Cloud computing assessment tool |
US8095800B2 (en) | 2008-11-20 | 2012-01-10 | General Dynamics C4 System, Inc. | Secure configuration of programmable logic device |
US8151333B2 (en) * | 2008-11-24 | 2012-04-03 | Microsoft Corporation | Distributed single sign on technologies including privacy protection and proactive updating |
US7930519B2 (en) | 2008-12-17 | 2011-04-19 | Advanced Micro Devices, Inc. | Processor with coprocessor interfacing functional unit for forwarding result from coprocessor to retirement unit |
US20100158244A1 (en) | 2008-12-23 | 2010-06-24 | Inventec Corporation | Communication encryption method for supporting remote monitoring and control system |
JP5637552B2 (en) | 2009-02-17 | 2014-12-10 | 日本電気株式会社 | Storage system |
US8473757B2 (en) | 2009-02-18 | 2013-06-25 | Cisco Technology, Inc. | Protecting digital data such as images on a device with image acquisition capabilities |
US8464252B2 (en) | 2009-02-27 | 2013-06-11 | Red Hat, Inc. | Per process virtual machines |
US8732468B2 (en) | 2009-03-09 | 2014-05-20 | The Regents Of The University Of Michigan | Protecting hardware circuit design by secret sharing |
US20100235833A1 (en) | 2009-03-13 | 2010-09-16 | Liquid Computing Corporation | Methods and systems for providing secure image mobility |
US8135748B2 (en) | 2009-04-10 | 2012-03-13 | PHD Virtual Technologies | Virtual machine data replication |
US9483656B2 (en) | 2009-04-20 | 2016-11-01 | International Business Machines Corporation | Efficient and secure data storage utilizing a dispersed data storage system |
WO2010127266A1 (en) | 2009-05-01 | 2010-11-04 | Citrix Systems, Inc. | Systems and methods for providing a virtual appliance in an application delivery fabric |
US8578076B2 (en) | 2009-05-01 | 2013-11-05 | Citrix Systems, Inc. | Systems and methods for establishing a cloud bridge between virtual storage resources |
CN102428686A (en) | 2009-05-19 | 2012-04-25 | 安全第一公司 | Systems and methods for securing data in the cloud |
US8321688B2 (en) | 2009-06-12 | 2012-11-27 | Microsoft Corporation | Secure and private backup storage and processing for trusted computing and data services |
US8352941B1 (en) | 2009-06-29 | 2013-01-08 | Emc Corporation | Scalable and secure high-level storage access for cloud computing platforms |
US20110035497A1 (en) | 2009-08-05 | 2011-02-10 | Dynamic Network Services, Inc. | System and method for providing global server load balancing |
US8402246B1 (en) | 2009-08-28 | 2013-03-19 | Violin Memory, Inc. | Alignment adjustment in a tiered storage system |
EP2309700B1 (en) | 2009-10-08 | 2013-02-27 | Alcatel Lucent | A method and a system for transferring data in a telecommunication network, a server, a storage, a computer program and a computer program product |
US20110085667A1 (en) | 2009-10-09 | 2011-04-14 | Adgregate Markets, Inc. | Various methods and apparatuses for securing an application container |
EP2504973B1 (en) | 2009-11-25 | 2016-11-16 | Security First Corp. | Systems and methods for securing data in motion |
US9268466B2 (en) | 2009-12-09 | 2016-02-23 | Citrix Systems, Inc. | Methods and systems for updating a dock with a user interface element representative of a remote application |
US8037187B2 (en) | 2009-12-11 | 2011-10-11 | International Business Machines Corporation | Resource exchange management within a cloud computing environment |
US8341115B1 (en) | 2009-12-26 | 2012-12-25 | Emc Corporation | Dynamically switching between synchronous and asynchronous replication |
US8239655B2 (en) | 2010-01-18 | 2012-08-07 | Vmware, Inc. | Virtual target addressing during direct data access via VF of IO storage adapter |
JP2013524352A (en) | 2010-03-31 | 2013-06-17 | セキュリティー ファースト コーポレイション | System and method for securing data in motion |
US20110258257A1 (en) | 2010-04-20 | 2011-10-20 | Cisco Technology, Inc. | Proximity aggregated network topology algorithm (panta) |
US8824492B2 (en) | 2010-05-28 | 2014-09-02 | Drc Computer Corporation | Accelerator system for remote data storage |
WO2012021734A1 (en) | 2010-08-11 | 2012-02-16 | Orsini Rick L | Systems and methods for secure multi-tenant data storage |
US9275071B2 (en) | 2010-08-12 | 2016-03-01 | Security First Corp. | Systems and methods for secure remote storage |
US8489699B2 (en) | 2010-08-13 | 2013-07-16 | Vmware, Inc. | Live migration of virtual machine during direct access to storage over SR IOV adapter |
CN106372499A (en) | 2010-08-18 | 2017-02-01 | 安全第公司 | Systems and methods for securing virtual machine computing environments |
US8397288B2 (en) | 2010-08-25 | 2013-03-12 | Itron, Inc. | System and method for operation of open connections for secure network communications |
EP2619939A2 (en) | 2010-09-20 | 2013-07-31 | Rick L. Orsini | Systems and methods for secure data sharing |
US8831677B2 (en) | 2010-11-17 | 2014-09-09 | Antony-Euclid C. Villa-Real | Customer-controlled instant-response anti-fraud/anti-identity theft devices (with true-personal identity verification), method and systems for secured global applications in personal/business e-banking, e-commerce, e-medical/health insurance checker, e-education/research/invention, e-disaster advisor, e-immigration, e-airport/aircraft security, e-military/e-law enforcement, with or without NFC component and system, with cellular/satellite phone/internet/multi-media functions |
US9196305B2 (en) | 2011-01-28 | 2015-11-24 | Apple Inc. | Smart transitions |
US8839363B2 (en) | 2011-04-18 | 2014-09-16 | Bank Of America Corporation | Trusted hardware for attesting to authenticity in a cloud environment |
US8601134B1 (en) | 2011-06-30 | 2013-12-03 | Amazon Technologies, Inc. | Remote storage gateway management using gateway-initiated connections |
US9268651B1 (en) | 2012-10-31 | 2016-02-23 | Amazon Technologies, Inc. | Efficient recovery of storage gateway cached volumes |
US9092633B2 (en) | 2013-01-17 | 2015-07-28 | International Business Machines Corporation | Authorizing removable medium access |
GB2513260B (en) | 2014-06-27 | 2018-06-13 | PQ Solutions Ltd | System and method for quorum-based data recovery |
US9842227B2 (en) * | 2014-09-23 | 2017-12-12 | FHOOSH, Inc. | Secure high speed data storage, access, recovery, and transmission |
US9954680B1 (en) | 2015-12-18 | 2018-04-24 | EMC IP Holding Company LLC | Secure management of a master encryption key in a split-key based distributed computing environment |
-
2005
- 2005-10-25 EP EP05823998A patent/EP1825412A1/en not_active Ceased
- 2005-10-25 BR BRPI0517026-5A patent/BRPI0517026A/en not_active Application Discontinuation
- 2005-10-25 CA CA2922172A patent/CA2922172A1/en not_active Abandoned
- 2005-10-25 CN CN2005800418685A patent/CN101375284B/en not_active Expired - Fee Related
- 2005-10-25 WO PCT/US2005/038806 patent/WO2006047694A1/en active Application Filing
- 2005-10-25 CN CN201110440272.XA patent/CN102609640B/en not_active Expired - Fee Related
- 2005-10-25 US US11/258,839 patent/US8266438B2/en active Active
- 2005-10-25 CA CA2584525A patent/CA2584525C/en not_active Expired - Fee Related
- 2005-10-25 CA CA2922200A patent/CA2922200A1/en not_active Abandoned
- 2005-10-25 AU AU2005299317A patent/AU2005299317A1/en not_active Abandoned
-
2012
- 2012-02-10 US US13/371,361 patent/US8271802B2/en active Active
- 2012-02-10 US US13/371,363 patent/US9294444B2/en active Active
- 2012-02-10 US US13/371,364 patent/US9935923B2/en active Active
- 2012-05-10 US US13/468,562 patent/US8904194B2/en active Active
- 2012-05-10 US US13/468,584 patent/US9294445B2/en active Active
- 2012-05-10 US US13/468,428 patent/US9985932B2/en active Active
- 2012-05-10 US US13/468,605 patent/US9009848B2/en active Active
- 2012-05-10 US US13/468,450 patent/US9047475B2/en active Active
- 2012-05-10 US US13/468,383 patent/US9338140B2/en active Active
- 2012-05-10 US US13/468,523 patent/US8769699B2/en active Active
-
2013
- 2013-06-11 US US13/915,518 patent/US9177159B2/en active Active
- 2013-06-11 US US13/915,081 patent/US9992170B2/en active Active
- 2013-06-11 US US13/915,570 patent/US9871770B2/en active Active
-
2014
- 2014-08-29 US US14/473,813 patent/US9135456B2/en active Active
-
2015
- 2015-05-12 US US14/710,528 patent/US9906500B2/en active Active
- 2015-08-17 US US14/828,377 patent/US20150381582A1/en not_active Abandoned
-
2018
- 2018-05-11 US US15/977,748 patent/US11178116B2/en active Active
-
2023
- 2023-04-05 US US18/131,229 patent/US20230239276A1/en active Pending
Also Published As
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2584525A1 (en) | Secure data parser method and system | |
US7634659B2 (en) | Roaming hardware paired encryption key generation | |
US7197142B2 (en) | System and methods for a vernam stream cipher | |
EP1839405B1 (en) | Network security system | |
US9483656B2 (en) | Efficient and secure data storage utilizing a dispersed data storage system | |
US5796830A (en) | Interoperable cryptographic key recovery system | |
US8218759B2 (en) | System and method for encrypting data | |
US7260215B2 (en) | Method for encryption in an un-trusted environment | |
US8396218B2 (en) | Cryptographic module distribution system, apparatus, and program | |
US20070061572A1 (en) | Authentication system and remotely-distributed storage system | |
US20180262326A1 (en) | Protecting white-box feistel network implementation against fault attack | |
US9602273B2 (en) | Implementing key scheduling for white-box DES implementation | |
JP3927501B2 (en) | TCPA migratable keys | |
US20130191639A1 (en) | System and method for securing communications between devices | |
US8681975B2 (en) | Encryption method and apparatus using composition of ciphers | |
US20090060184A1 (en) | Systems and Methods for Providing Autonomous Security | |
EP3291480B1 (en) | Secure data transmission | |
WO2003032133A3 (en) | Distributed security architecture for storage area networks (san) | |
CN106953723B (en) | Splitting and merging method for preventing DFA attack | |
WO2012071717A1 (en) | Data encryption and decryption method and device | |
US20030210791A1 (en) | Key management | |
JP2004512734A (en) | Generating a common encryption key | |
CA2585987A1 (en) | System and method for protecting master encryption keys | |
CN111654511A (en) | Chained data encryption method, chained data decryption method and corresponding systems | |
US20220191017A1 (en) | Key management system providing secure management of cryptographic keys, and methods of operating the same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKLA | Lapsed |
Effective date: 20191025 |