CA2584525A1 - Secure data parser method and system - Google Patents

Secure data parser method and system Download PDF

Info

Publication number
CA2584525A1
CA2584525A1 CA002584525A CA2584525A CA2584525A1 CA 2584525 A1 CA2584525 A1 CA 2584525A1 CA 002584525 A CA002584525 A CA 002584525A CA 2584525 A CA2584525 A CA 2584525A CA 2584525 A1 CA2584525 A1 CA 2584525A1
Authority
CA
Canada
Prior art keywords
data
portions
data set
subset
restoring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA002584525A
Other languages
French (fr)
Other versions
CA2584525C (en
Inventor
Rick L. Orsini
Mark S. O'hare
Roger Davenport
Steven Winick
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Security First Corp
Original Assignee
Rick L. Orsini
Mark S. O'hare
Roger Davenport
Steven Winick
Security First Corp.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=35912925&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=CA2584525(A1) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Rick L. Orsini, Mark S. O'hare, Roger Davenport, Steven Winick, Security First Corp. filed Critical Rick L. Orsini
Priority to CA2780816A priority Critical patent/CA2780816A1/en
Publication of CA2584525A1 publication Critical patent/CA2584525A1/en
Application granted granted Critical
Publication of CA2584525C publication Critical patent/CA2584525C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1074Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
    • H04L67/1078Resource delivery mechanisms
    • H04L67/108Resource delivery mechanisms characterised by resources being split in blocks or fragments
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/14Multichannel or multilink protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/08Error detection or correction by redundancy in data representation, e.g. by using checking codes
    • G06F11/10Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's
    • G06F11/1076Parity data used in redundant arrays of independent storages, e.g. in RAID systems
    • G06F11/1092Rebuilding, e.g. when physically replacing a failing disk
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Abstract

A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. The secure data parser may be used to protect data in motion by splitting original data into portions of data, that may be communicated using multiple communications paths.

Claims (85)

1. A method for securing communication of a data set from a first location to a second location, the method comprising:

generating at the first location at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set;
communicating from the first location to the second location the at least two portions of data over at least one communications path, wherein the at least two portions of data are communicated separately from each other; and restoring at the second location the data set from at least a subset of the at least two portions of data.
2. The method of claim 1 wherein the communicating comprises communicating the at least two portions of data on separate communications paths in parallel.
3. The method of claim 1 wherein the communicating comprises communicating that at least two portions of data on a single communications path in a serial transmission.
4. The method of claim 1 wherein the generating is accomplished using an email application.
5. The method of claim 1 wherein the generating is accomplished using a video broadcasting application.
6. The method of claim 1 wherein the communicating over the at least one communications path comprises communicating over a wireless communications path.
7. The method of claim 6, wherein the communicating over the wireless communications path comprises communicating over the wireless communications path using an 802.11 protocol.
8. The method of claim 6, wherein the communicating over the wireless communications path comprises communicating over the wireless communications path using Bluetooth.
9. The method of claim 6, wherein the communicating over the wireless communications path comprises communicating over a wireless LAN.
10. The method of claim 6, wherein the communicating over the wireless communications path comprises communicating over a cellular network.
11. The method of claim 6, wherein the communicating over the wireless communications path comprises communicating over a peer to peer wireless network.
12. The method of claim 6, wherein the communicating over the wireless communications path comprises communicating over a hub based wireless network.
13. The method of claim 6, wherein the communicating over the wireless communications path comprises communicating over a satellite transmission.
14. The method of claim 1 wherein at least one of the first location and the second location is a computer peripheral device.
15. The method of claim 1 wherein at least one of the first location and the second location is a PDA device.
16. The method of claim 1 wherein at least one of the first location and the second location is a storage device.
17. The method of claim 1 wherein the communicating over the at least one communications path comprises communicating over a wired communications path.
18. A method for securing a data set, the method comprising:
generating at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set;

storing the at least two portions of data on at least two data depositories, wherein the at least two data depositories are physically separate from each other; and using at least one of the at least two portions of data stored on at least one of the at least two data depositories as an authentication key stored in an authentication depository in order to restore the data set.
19. The method of claim 18 wherein the authentication depository is a physical token device.
20. The method of claim 18 further comprising restoring the data set when the authentication depository is coupled to at least a subset of the at least two data depositories.
21. The method of claim 20 further comprising removing access to the data set when the authentication depository is no longer coupled to the at least a subset of the at least two data depositories.
22. A method for securing a data set, the method comprising:
generating at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set;

generating respective integrity information for each of the at least two portions of data;

writing the respective integrity information to each of the at least two portions of data;

storing each of the at least two portions of data separately; and restoring the data set from at least a subset of the at least two portions of data when the respective integrity information of the at least a subset of the at least two portions of data has been verified.
23. The method of claim 22, wherein the integrity information is generated using a hash algorithm.
24. The method of claim 22, wherein the integrity information is generated using a MAC
signature.
25. The method of claim 22, wherein the integrity information is generated using a digital signature.
26. A method for securing a data set, the method comprising:
generating at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set;
storing each of the at least two portions of data separately; and restoring the data set from at least a subset of the at least two portions of data, wherein at least one particular portion of data is required in order to restore the data set.
27. The method of claim 26 further comprising encrypting at least one of the at least two portions of data, the at least one of the at least two portions of data comprising the at least one particular portion of data.
28. The method of claim 27 wherein the encrypting comprises encrypting at least one of the at least two portions of data according to a first encryption key and at least one other of the at two least portions of data according to a second encryption key.
29. The method of claim 27 wherein the encrypting comprises encrypting at least one of the at least two portion of data using a public key that may be decrypted using a private key.
30. A method for securing a data set, the method comprising:

generating at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set, and wherein the probability that data from the data set is distributed to at least one of the at least two portions of data is less than the probability that data from the data set is distributed to a remainder of the at least two portions of data;

storing each of the at least two portions of data separately; and restoring the data set from at least a subset of the at least two portions of data.
31. A method for securing a data set, the method comprising:

generating at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set, and wherein at least one of the at least two portions of data has a predetermined size;
storing each of the at least two portions of data separately; and restoring the data set from at least a subset of the at least two portions of data.
32. The method of claim 31 wherein the generating the at least two portions of data comprises using a splitting key having a splitting key size and wherein the predetermined size is the splitting key size.
33. The method of claim 31 further comprising encrypting the data set with an encryption key having an encryption key size prior to the generating the at least two portions of data and wherein the predetermined size is the encryption key size.
34. A method for securing a data set, the method comprising:

generating at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set, and wherein the probability that data from the data set is distributed to each of the at least two portions of data is substantially equal;
storing each of the at least two portions of data separately; and restoring the data set from at least a subset of the at least two portions of data.
35. A method for securing a data set, the method comprising:

generating, according to a splitting key, at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set;
generating, according to a Shamir algorithm, splitting key information that is capable of being used to generate the splitting key, wherein the splitting key information is distributed among the at least two portions of data;
storing each of the at least two portions of data separately; and restoring the data set from at least a subset of the at least two portions of data.
36. The method of claim 35 wherein restoring the data set comprises restoring the splitting key from the splitting key information from at least a subset of the at least two portions of data.
37. A method for securing a data set, the method comprising:

encrypting the data set using an encryption key;

generating at least two portions of data from the encrypted data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the encrypted data set;

generating, according to a Shamir algorithm, encryption key information that is capable of being used to generate the encryption key, wherein the splitting key information is distributed among the at least two portions of data;

storing each of the at least two portions of data separately; and restoring the encrypted data set from at least a subset of the at least two portions of data.
38. The method of claim 37 further comprising:
restoring the encryption key from the encryption key information from at least a subset of the at least two portions of data; and restoring the data set from the encrypted data set and the encryption key.
39. A method for securing a data set, the method comprising:

generating at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set;

encrypting the at least two portions of data using the encryption key;

generating, according to a Shamir algorithm, encryption key information that is capable of being used to generate the encryption key, wherein the splitting key information is distributed among the at least two portions of data;

storing the at least two encrypted portions of data separately from each other; and restoring the data set using a subset of the at least two encrypted portion of data.
40. The method of claim 39 wherein restoring the data set comprises restoring the splitting key from the splitting key information from at least a subset of the at least two portions of data.
41. A method for securing a data set, the method comprising:

determining a number of portions of data into which to distribute the data set;
generating a substantially random number;
determining into which of the portions of data to distribute each unit of data from the data set based on corresponding data from the substantially random number and distributing accordingly;
storing the portions of data separately;
and restoring the data set from at least a subset of the portions of data.
42. The method of claim 41 wherein the determining into which of the portions of data to distribute each unit of data from the data set comprises determining into which of the portions of data to distribute each unit of data from the data set based on a hash function of corresponding data from the substantially random number.
43. The method of claim 41 wherein the unit of data is a bit.
44. The method of claim 41 wherein the size of the substantially random number is a multiple, M, of the size of the data set and wherein the determining into which of the portions of data to distribute each unit of data from the data set comprises determining into which of the portions of data to distribute each unit of data from the data set based on a hash function of a corresponding M bits from the substantially random number.
45. The method of claim 44 wherein the multiple, M, is 8 and wherein the determining into which of the portions of data to distribute each unit of data from the data set based on a hash function of a corresponding M bits from the substantially random number comprises determining into which of the portions of data to distribute each bit of data from the data set based on a hash function of a corresponding byte from the substantially random number.
46. The method of claim 41 further comprising appending redundancy data to each of the portions of data.
47. A method for securing a data set, the method comprising:
determining a number of portions of data into which to distribute the data set;

generating a substantially random number;
for each unit of data of the data set, splitting the unit of data into a left segment and a right segment by determining, based on correspodning data from the substantially random number, a splitting location wherein bits to the left of the splitting location represent the left segment and bits to the right of the splitting location represent the right segment;

determining into which of the portions of data to distribute each of the left segment and the right segment of each unit of data from the data set based on corresponding data from the substantially random number and distributing accordingly;
storing the portions of data separately;
and restoring the data set from at least a subset of the portions of data.
48. The method of claim 47 wherein the splitting the unit of data into the left segment and the right segment comprises splitting the unit of data into the left segment and the right segment based on a hash function of a corresponding data from the substantially random number.
49. The method of claim 47 wherein the unit of data is a byte.
50. The method of claim 47 wherein generating the substantially random number comprises generating the substantially random number of size equal to the size of the data set.
51. The method of claim 50 wherein the unit of data is a byte and wherein the splitting the unit of data into the left segment and the right segment comprises splitting the unit of data into the left segment and the right segment based on a hash function of a corresponding unit of data from the substantially random number.
52. The method of claim 47 wherein the determining into which of the portions of data to distribute each of the left segment and the right segment comprises determining into which of the portions of data to distribute each of the left segment and the right segment of each unit of data from the data set based on corresponding data from the substantially random number and based on a table containing an array of all possible distributions of the right segment and the left.
53. The method of 47 wherein the determining into which of the portions of data to distribute each of the left segment and the right segment comprises determining into which of the portions of data to distribute each of the left segment and the right segment of each unit of data from the data set based on a hash function of corresponding data from the substantially random number and based on a table containing an array of all possible distributions of the right segment and the left segment, wherein the hash function of the corresponding data from the substantially random number indicates which entry in the table to use, the entry indicating a destination portion for the left segment and a destination portion for the right segment.
54. The method of claim 53 wherein:
generating the substantially random number comprises generating the substantially random number of size equal to the size of the data set;
the unit of data is a byte; and the corresponding data is a corresponding unit of data.
55. A method for securing a data set, the method comprising:

encrypting the data set using an encryption key;

transforming the encryption key using an All or Nothing Transform into a transformed encryption key;

generating at least two portions of data from the encrypted data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the encrypted data set;

generating tranformed encryption key information that is capable of being used to generate the transformed encryption key, wherein the transformed encryption key information is distributed among the at least two portions of data;

storing each of the at least two portions of data separately; and restoring the encrypted data set from at least a subset of the at least two portions of data.
56. The method of claim 55 further comprising:

restoring the transformed encryption key from at least a subset of the at least two portions of data;

restoring the encryption key from the transformed encryption key; and decrypting the encrypted data set.
57. A method for securing a data set, the method comprising:
generating at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set;

encrypting each of the at least two portions of data using an encryption key into at least two portions of encrypted data;

transforming the encryption key using an All or Nothing Transform into a transformed encryption key;

generating transformed encryption key information that is capable of being used to generate the transformed encryption key, wherein the transformed encryption key information is distributed among the at least two portions of data;

storing each of the at least two portions of encrypted data separately; and restoring the data set from at least a subset of the at least two portions of data.
58. The method of claim 57 wherein the restoring comprises:

restoring the transformed encryption key from at least a subset of the at least two portions data;

restoring the encryption key from the transformed encryption key; and decrypting the at least a subset of the at least two portions of data.
59. A method for securing a data set, the method comprising:

generating, using a splitting key, at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set;

transforming the splitting key using an All or Nothing Transform into a transformed splitting key;

generating transformed splitting key information that is capable of being used to generate the transformed splitting key, wherein the transformed splitting key information is distributed among the at least two portions of data;

storing each of the at least two portions of data separately; and restoring the data set from at least a subset of the at least two portions of data.
60. The method of claim 59 wherein the restoring comprises:

restoring the transformed splitting key from at least a subset of the at least two portions of data; and restoring the splitting key from the transformed splitting key.
61. A method for securing a data set, the method comprising:

encrypting the data set using an encryption key into an encrypted data set;
encrypting the encryption key;
generating at least two portions of data from the encrypted data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the encrypted data set;

storing each of the at least two portions of the encrypted data set separately;
restoring the encrypted data set from at least a subset of the at least two portions of the encrypted data set;
decrypting the encryption key; and decrypting the data set from the encrypted data set using the encryption key.
62. The method of claim 61 wherein the encryption key is encrypted using a workgroup key.
63. A method for securing a data set, the method comprising:

generating at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set;

encrypting the at least two portions of data using an encryption key into at least two encrypted portions of data;

encrypting the encryption key;
storing each of the at least two encrypted portions of data separately; and restoring the data set from at least a subset of the at least two encrypted portions of data, the restoring comprising:

decrypting the encryption key, and decrypting the at least a subset of the at least two encrypted portions of data using the encryption key.
64. The method of claim 63 wherein the encryption key is encrypted using a workgroup key.
65. A method for securing a data set, the method comprising:

generating, using a splitting key, at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set;

encrypting the splitting key using an encryption key;

storing each of the at least two portions of the data set separately; and restoring the data set from at least a subset of the at least two portions of the data set, the restoring comprising:

decrypting the splitting key, and restoring, using the splitting key, the data set from the at least a subset of the at least two portions of data.
66. The method of claim 65 wherein the splitting key is encrypted using a workgroup key.
67. A method for securing a data set, the method comprising:

determining a number of portions of data into which to distribute the data set;

sequentially distributing substantially equal shares of data from the data set into each of the data portions, respectively;

appending redundancy data to each of the portions of data;
storing each of the data portions separately; and restoring the data set from a subset of the data portions.
68. A method for securing a data set, the method comprising:

determining a number of portions of data into which to distribute the data set;

sequentially distributing the data set, one bit at a time, into each of the data portions, respectively, in a round-robin manner until all bits of the data set have been distributed;

appending redundancy data to each of the portions of data;

storing each of the data portions separately; and restoring the data set from a subset of the data portions.
69. A system for securing communication of a data set from a first location to a second location, the system comprising:

a first processor for generating at the first location at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random distribution of a respective subset of the data set;
at least one communications path over which are communicated the at least two portions of data from the first location to the second location, wherein the at least two portions of data are communicated separately from each other; and a second processor for restoring at the second location the data set from at least a subset of the at least two portions of data.
70. The system of claim 69 wherein the at least two portions of data are communicated on separate communications paths in parallel.
71. The system of claim 69 wherein the at least two portions of data are communicated on a single communications path in a serial transmission.
72. The system of claim 69 wherein the first processor is used in conjunction with an email application.
73. The system of claim 69 wherein the first processor is used in conjunction with a video broadcasting application.
74. The system of claim 69 wherein the at least one communications path comprises a wireless communications path.
75. The system of claim 74, wherein the wireless communications path comprises an 802.11 protocol communications path.
76. The system of claim 74, wherein the wireless communications path comprises a Bluetooth communications path.
77. The system of claim 74, wherein the wireless communications path comprises a wireless LAN.
78. The system of claim 74, wherein the wireless communications path comprises a cellular network.
79. The system of claim 74, wherein the wireless communications path comprises a peer to peer wireless network.
80. The system of claim 74, wherein the wireless communications path comprises a hub based wireless network.
81. The system of claim 74, wherein wireless communications path comprises a satellite communications path.
82. The system of claim 69 wherein at least one of the first location and the second location is a computer peripheral device.
83. The system of claim 69 wherein at least one of the first location and the second location is a PDA device.
84. The system of claim 69 wherein at least one of the first location and the second location is a storage device.
85. The system of claim 69 wherein the at least one communications path comprises a wired communications path.
CA2584525A 2004-10-25 2005-10-25 Secure data parser method and system Expired - Fee Related CA2584525C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CA2780816A CA2780816A1 (en) 2004-10-25 2005-10-25 Secure data parser method and system

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US62214604P 2004-10-25 2004-10-25
US60/622,146 2004-10-25
US71818505P 2005-09-16 2005-09-16
US60/718,185 2005-09-16
PCT/US2005/038806 WO2006047694A1 (en) 2004-10-25 2005-10-25 Secure data parser method and system

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CA2780816A Division CA2780816A1 (en) 2004-10-25 2005-10-25 Secure data parser method and system

Publications (2)

Publication Number Publication Date
CA2584525A1 true CA2584525A1 (en) 2006-05-04
CA2584525C CA2584525C (en) 2012-09-25

Family

ID=35912925

Family Applications (3)

Application Number Title Priority Date Filing Date
CA2922172A Abandoned CA2922172A1 (en) 2004-10-25 2005-10-25 Secure data parser method and system
CA2584525A Expired - Fee Related CA2584525C (en) 2004-10-25 2005-10-25 Secure data parser method and system
CA2922200A Abandoned CA2922200A1 (en) 2004-10-25 2005-10-25 Secure data parser method and system

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CA2922172A Abandoned CA2922172A1 (en) 2004-10-25 2005-10-25 Secure data parser method and system

Family Applications After (1)

Application Number Title Priority Date Filing Date
CA2922200A Abandoned CA2922200A1 (en) 2004-10-25 2005-10-25 Secure data parser method and system

Country Status (7)

Country Link
US (19) US8266438B2 (en)
EP (1) EP1825412A1 (en)
CN (2) CN101375284B (en)
AU (1) AU2005299317A1 (en)
BR (1) BRPI0517026A (en)
CA (3) CA2922172A1 (en)
WO (1) WO2006047694A1 (en)

Families Citing this family (336)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8291240B2 (en) * 1921-06-13 2012-10-16 International Business Machines Corporation Securely storing data
US7953671B2 (en) 1999-08-31 2011-05-31 American Express Travel Related Services Company, Inc. Methods and apparatus for conducting electronic transactions
US7343351B1 (en) 1999-08-31 2008-03-11 American Express Travel Related Services Company, Inc. Methods and apparatus for conducting electronic transactions
US7889052B2 (en) 2001-07-10 2011-02-15 Xatra Fund Mx, Llc Authorizing payment subsequent to RF transactions
US7391865B2 (en) * 1999-09-20 2008-06-24 Security First Corporation Secure data parser method and system
US7260724B1 (en) * 1999-09-20 2007-08-21 Security First Corporation Context sensitive dynamic authentication in a cryptographic system
WO2002016288A1 (en) * 2000-08-23 2002-02-28 Wool Research Organisation Of New Zealand (Inc.) A composting apparatus with internal transport system
US7006629B2 (en) * 2000-12-19 2006-02-28 International Business Machines Corporation Method and system for processing a data set
US7725427B2 (en) 2001-05-25 2010-05-25 Fred Bishop Recurrent billing maintenance with radio frequency payment devices
US20040236699A1 (en) 2001-07-10 2004-11-25 American Express Travel Related Services Company, Inc. Method and system for hand geometry recognition biometrics on a fob
US9031880B2 (en) 2001-07-10 2015-05-12 Iii Holdings 1, Llc Systems and methods for non-traditional payment using biometric data
US8294552B2 (en) 2001-07-10 2012-10-23 Xatra Fund Mx, Llc Facial scan biometrics on a payment device
US7249112B2 (en) 2002-07-09 2007-07-24 American Express Travel Related Services Company, Inc. System and method for assigning a funding source for a radio frequency identification device
US9454752B2 (en) 2001-07-10 2016-09-27 Chartoleaux Kg Limited Liability Company Reload protocol at a transaction processing entity
US7360689B2 (en) 2001-07-10 2008-04-22 American Express Travel Related Services Company, Inc. Method and system for proffering multiple biometrics for use with a FOB
US7303120B2 (en) 2001-07-10 2007-12-04 American Express Travel Related Services Company, Inc. System for biometric security using a FOB
US8279042B2 (en) 2001-07-10 2012-10-02 Xatra Fund Mx, Llc Iris scan biometrics on a payment device
US8548927B2 (en) 2001-07-10 2013-10-01 Xatra Fund Mx, Llc Biometric registration for facilitating an RF transaction
US7668750B2 (en) 2001-07-10 2010-02-23 David S Bonalle Securing RF transactions using a transactions counter
US8001054B1 (en) 2001-07-10 2011-08-16 American Express Travel Related Services Company, Inc. System and method for generating an unpredictable number using a seeded algorithm
US7735725B1 (en) 2001-07-10 2010-06-15 Fred Bishop Processing an RF transaction using a routing number
US9024719B1 (en) 2001-07-10 2015-05-05 Xatra Fund Mx, Llc RF transaction system and method for storing user personal data
US6805287B2 (en) 2002-09-12 2004-10-19 American Express Travel Related Services Company, Inc. System and method for converting a stored value card to a credit card
US9614772B1 (en) 2003-10-20 2017-04-04 F5 Networks, Inc. System and method for directing network traffic in tunneling applications
US20060000898A1 (en) * 2004-07-01 2006-01-05 American Express Travel Related Services Company, Inc. Method and system for vascular pattern recognition biometrics on a smartcard
US7318550B2 (en) 2004-07-01 2008-01-15 American Express Travel Related Services Company, Inc. Biometric safeguard method for use with a smartcard
EP1825412A1 (en) 2004-10-25 2007-08-29 Rick L. Orsini Secure data parser method and system
GB0424490D0 (en) * 2004-11-05 2004-12-08 Ibm Management of persistence in a data processing system
US9172685B2 (en) * 2005-01-31 2015-10-27 Unisys Corporation System and method for providing a secure book device using cryptographically secure communications across secure networks
US10007807B2 (en) * 2008-12-30 2018-06-26 Unisys Corporation Simultaneous state-based cryptographic splitting in a secure storage appliance
US20100162004A1 (en) * 2008-12-23 2010-06-24 David Dodgson Storage of cryptographically-split data blocks at geographically-separated locations
US20060242410A1 (en) * 2005-04-26 2006-10-26 Microsoft Corporation Mobile device authentication with a data source using self-signed certificates
WO2006130991A1 (en) * 2005-06-10 2006-12-14 Davies Traverse A Method of and system for encryption and authentication
CA2510366C (en) 2005-06-14 2013-02-26 Certicom Corp. System and method for remote device registration
US7836306B2 (en) * 2005-06-29 2010-11-16 Microsoft Corporation Establishing secure mutual trust using an insecure password
US20070245413A1 (en) * 2005-07-05 2007-10-18 Viasat, Inc. Trusted Cryptographic Switch
US20070061567A1 (en) * 2005-09-10 2007-03-15 Glen Day Digital information protection system
US20070075125A1 (en) * 2005-09-30 2007-04-05 Muscat Robert G Packaging and process of authenticating packaging
US20080022098A1 (en) * 2005-09-30 2008-01-24 Muscat Robert G Authentication process
CN105978683A (en) 2005-11-18 2016-09-28 安全第公司 Secure data parser method and system
US8447695B2 (en) * 2006-01-05 2013-05-21 International Business Machines Corporation System and method for processing feedback entries received from software
US20070186281A1 (en) * 2006-01-06 2007-08-09 Mcalister Donald K Securing network traffic using distributed key generation and dissemination over secure tunnels
SG169991A1 (en) * 2006-02-28 2011-04-29 Certicom Corp System and method for product registration
US8607044B2 (en) * 2006-04-25 2013-12-10 Verisign, Inc. Privacy enhanced identity scheme using an un-linkable identifier
KR101346734B1 (en) * 2006-05-12 2014-01-03 삼성전자주식회사 Multi certificate revocation list support method and apparatus for digital rights management
US20070283143A1 (en) * 2006-06-06 2007-12-06 Kabushiki Kaisha Toshiba System and method for certificate-based client registration via a document processing device
US20070288323A1 (en) * 2006-06-07 2007-12-13 Dani Halevy Method and System for Verifying the Integrity of an On-Line Vendor
US8082574B2 (en) * 2006-08-11 2011-12-20 Certes Networks, Inc. Enforcing security groups in network of data processors
US20080072281A1 (en) * 2006-09-14 2008-03-20 Willis Ronald B Enterprise data protection management for providing secure communication in a network
US8284943B2 (en) * 2006-09-27 2012-10-09 Certes Networks, Inc. IP encryption over resilient BGP/MPLS IP VPN
US8001607B2 (en) * 2006-09-27 2011-08-16 Direct Computer Resources, Inc. System and method for obfuscation of data across an enterprise
US20080083011A1 (en) * 2006-09-29 2008-04-03 Mcalister Donald Protocol/API between a key server (KAP) and an enforcement point (PEP)
US8239677B2 (en) * 2006-10-10 2012-08-07 Equifax Inc. Verification and authentication systems and methods
CN101569132B (en) 2006-11-07 2013-04-17 安全第一公司 Systems and methods for distributing and securing data
EP1921858A1 (en) * 2006-11-09 2008-05-14 Thomson Licensing Method and device for managing a transmission of keys
US8418241B2 (en) 2006-11-14 2013-04-09 Broadcom Corporation Method and system for traffic engineering in secured networks
US7548890B2 (en) 2006-11-21 2009-06-16 Verient, Inc. Systems and methods for identification and authentication of a user
US20080120507A1 (en) * 2006-11-21 2008-05-22 Shakkarwar Rajesh G Methods and systems for authentication of a user
EP2095221A4 (en) * 2006-11-21 2010-08-18 Verient Inc Systems and methods for identification and authentication of a user
US7620600B2 (en) * 2006-11-21 2009-11-17 Verient, Inc. Systems and methods for multiple sessions during an on-line transaction
US8661520B2 (en) * 2006-11-21 2014-02-25 Rajesh G. Shakkarwar Systems and methods for identification and authentication of a user
AT504634B1 (en) * 2006-12-04 2008-11-15 Hofstaedter Gernot Dr METHOD FOR TRANSFERRING ENCRYPTED MESSAGES
US8904080B2 (en) 2006-12-05 2014-12-02 Security First Corp. Tape backup method
US7933835B2 (en) 2007-01-17 2011-04-26 The Western Union Company Secure money transfer systems and methods using biometric keys associated therewith
US8818904B2 (en) * 2007-01-17 2014-08-26 The Western Union Company Generation systems and methods for transaction identifiers having biometric keys associated therewith
US7864762B2 (en) * 2007-02-14 2011-01-04 Cipheroptics, Inc. Ethernet encryption over resilient virtual private LAN services
US8639800B2 (en) 2007-02-16 2014-01-28 Forescout Technologies, Inc. Method and device for determining network device status
US20080276299A1 (en) * 2007-04-02 2008-11-06 Samsung Electronics Co., Ltd. Wireless terminal apparatus and method of protecting system resources
US8181039B2 (en) * 2007-04-13 2012-05-15 Microsoft Corporation Disc drive counterfeiting countermeasure
US7707298B2 (en) * 2007-05-10 2010-04-27 Microsoft Corporation Secure sharing of LOB bound information in client applications
US8233624B2 (en) * 2007-05-25 2012-07-31 Splitstreem Oy Method and apparatus for securing data in a memory device
JP4995667B2 (en) * 2007-08-28 2012-08-08 富士通株式会社 Information processing apparatus, server apparatus, information processing program, and method
CN102932136B (en) 2007-09-14 2017-05-17 安全第一公司 Systems and methods for managing cryptographic keys
US8375219B2 (en) * 2007-10-24 2013-02-12 Microsoft Corporation Program and operation verification
US7636789B2 (en) * 2007-11-27 2009-12-22 Microsoft Corporation Rate-controllable peer-to-peer data stream routing
US8401906B2 (en) * 2007-12-12 2013-03-19 At&T Intellectual Property I, L.P. Financial transaction authentication servers, methods, and computer program products for facilitating financial transactions between buyers and sellers
EP2106642A4 (en) * 2008-01-07 2015-12-02 Security First Corp Systems and methods for securing data using multi-factor or keyed dispersal
FR2926381A1 (en) * 2008-01-11 2009-07-17 Sagem Securite Sa METHOD OF SECURE TRANSFER OF DATA
CN103281190B (en) 2008-02-22 2018-03-09 安全第一公司 Systems and methods for secure workgroup management and communication
US8656499B1 (en) * 2008-03-14 2014-02-18 Sprint Spectrum L.P. Client-side bit-stripping system and method
US8498416B2 (en) * 2008-05-05 2013-07-30 Qualcomm Incorporated Validation of stored or incoming messages
US9832069B1 (en) 2008-05-30 2017-11-28 F5 Networks, Inc. Persistence based on server response in an IP multimedia subsystem (IMS)
US9063897B2 (en) * 2008-06-26 2015-06-23 Microsoft Technology Licensing, Llc Policy-based secure information disclosure
US8762969B2 (en) * 2008-08-07 2014-06-24 Microsoft Corporation Immutable parsing
US20100162003A1 (en) * 2008-12-23 2010-06-24 David Dodgson Retrieval of cryptographically-split data blocks from fastest-responding storage devices
US20100162002A1 (en) * 2008-12-23 2010-06-24 David Dodgson Virtual tape backup arrangement using cryptographically split storage
US20100232604A1 (en) * 2009-03-11 2010-09-16 Sony Corporation Controlling access to content using multiple encryptions
US10447474B2 (en) * 2009-04-20 2019-10-15 Pure Storage, Inc. Dispersed data storage system data decoding and decryption
US8744071B2 (en) * 2009-04-20 2014-06-03 Cleversafe, Inc. Dispersed data storage system data encryption and encoding
CN102428686A (en) * 2009-05-19 2012-04-25 安全第一公司 Systems and methods for securing data in the cloud
CN101577615B (en) * 2009-06-02 2013-09-11 中兴通讯股份有限公司 Data transfer method and device
US8875219B2 (en) * 2009-07-30 2014-10-28 Blackberry Limited Apparatus and method for controlled sharing of personal information
US20110072489A1 (en) * 2009-09-23 2011-03-24 Gilad Parann-Nissany Methods, devices, and media for securely utilizing a non-secured, distributed, virtualized network resource with applications to cloud-computing security and management
US20190297169A1 (en) * 2009-10-29 2019-09-26 International Business Machines Corporation Determining how to service requests based on several indicators
EP2504973B1 (en) 2009-11-25 2016-11-16 Security First Corp. Systems and methods for securing data in motion
US10348693B2 (en) 2009-12-15 2019-07-09 Microsoft Technology Licensing, Llc Trustworthy extensible markup language for trustworthy computing and data services
US9537650B2 (en) 2009-12-15 2017-01-03 Microsoft Technology Licensing, Llc Verifiable trust for data through wrapper composition
US11301592B2 (en) 2010-01-28 2022-04-12 Pure Storage, Inc. Distributed storage with data obfuscation and method for use therewith
US8959366B2 (en) * 2010-01-28 2015-02-17 Cleversafe, Inc. De-sequencing encoded data slices
US20190108366A1 (en) * 2010-01-28 2019-04-11 International Business Machines Corporation Secure data transmission utilizing distributed storage
JP2013524352A (en) 2010-03-31 2013-06-17 セキュリティー ファースト コーポレイション System and method for securing data in motion
US9135434B2 (en) * 2010-04-19 2015-09-15 Appcentral, Inc. System and method for third party creation of applications for mobile appliances
US8824492B2 (en) 2010-05-28 2014-09-02 Drc Computer Corporation Accelerator system for remote data storage
CN101854404B (en) * 2010-06-04 2013-08-07 中国科学院计算机网络信息中心 Method and device for detecting anomaly of domain name system
US9319625B2 (en) * 2010-06-25 2016-04-19 Sony Corporation Content transfer system and communication terminal
US8407324B2 (en) * 2010-07-01 2013-03-26 Raytheon Company Dynamic modification of the address of a proxy
US20120028609A1 (en) * 2010-07-27 2012-02-02 John Hruska Secure financial transaction system using a registered mobile device
WO2012021734A1 (en) 2010-08-11 2012-02-16 Orsini Rick L Systems and methods for secure multi-tenant data storage
US9275071B2 (en) 2010-08-12 2016-03-01 Security First Corp. Systems and methods for secure remote storage
CN106372499A (en) 2010-08-18 2017-02-01 安全第公司 Systems and methods for securing virtual machine computing environments
EP2619939A2 (en) 2010-09-20 2013-07-31 Rick L. Orsini Systems and methods for secure data sharing
CA2813758C (en) * 2010-10-08 2023-01-03 Brian Lee Moffat Private data sharing system
CN102158385B (en) * 2010-11-23 2013-12-11 东莞宇龙通信科技有限公司 Data information transmission device and method applied to mobile terminal
US8583911B1 (en) 2010-12-29 2013-11-12 Amazon Technologies, Inc. Network application encryption with server-side key management
US8538020B1 (en) * 2010-12-29 2013-09-17 Amazon Technologies, Inc. Hybrid client-server cryptography for network applications
US9094379B1 (en) 2010-12-29 2015-07-28 Amazon Technologies, Inc. Transparent client-side cryptography for network applications
AU2015202657B2 (en) * 2011-01-27 2016-02-04 Security First Corp. Systems and Methods for Securing Data
US8677148B2 (en) 2011-01-27 2014-03-18 Security First Corp. Systems and methods for securing data
WO2012112323A2 (en) 2011-02-15 2012-08-23 Korrelate, Inc. A dual blind method and system for attributing activity to a user
US8874990B2 (en) * 2011-04-01 2014-10-28 Cleversafe, Inc. Pre-fetching data segments stored in a dispersed storage network
US10298684B2 (en) 2011-04-01 2019-05-21 International Business Machines Corporation Adaptive replication of dispersed data to improve data access performance
US11418580B2 (en) 2011-04-01 2022-08-16 Pure Storage, Inc. Selective generation of secure signatures in a distributed storage network
US20120254972A1 (en) * 2011-04-04 2012-10-04 International Business Machines Corporation Trust system
US9778912B2 (en) * 2011-05-27 2017-10-03 Cassy Holdings Llc Stochastic processing of an information stream by a processing architecture generated by operation of non-deterministic data used to select data processing modules
US9235532B2 (en) * 2011-06-03 2016-01-12 Apple Inc. Secure storage of full disk encryption keys
US10068084B2 (en) * 2011-06-27 2018-09-04 General Electric Company Method and system of location-aware certificate based authentication
CN102300093A (en) * 2011-08-31 2011-12-28 华中科技大学 Encrypting method for distributing data file
US9232001B1 (en) * 2011-11-14 2016-01-05 Google Inc. Client-server communication using a set identifier
US20130238900A1 (en) * 2011-12-12 2013-09-12 Cleversafe, Inc. Dispersed storage network secure hierarchical file directory
US10666596B2 (en) 2011-12-12 2020-05-26 Pure Storage, Inc. Messaging via a shared memory of a distributed computing system
US10176045B2 (en) 2011-12-12 2019-01-08 International Business Machines Corporation Internet based shared memory in a distributed computing system
KR101632817B1 (en) * 2012-03-09 2016-06-22 엠파이어 테크놀로지 디벨롭먼트 엘엘씨 Cloud computing secure data storage
US20130246800A1 (en) * 2012-03-19 2013-09-19 Microchip Technology Incorporated Enhancing Security of Sensor Data for a System Via an Embedded Controller
CN103368902A (en) * 2012-03-27 2013-10-23 湖南亲安网络科技有限公司 Data interaction method
KR101684042B1 (en) * 2012-03-28 2016-12-07 인텔 코포레이션 Shared buffers for processing elements on a network device
US9973335B2 (en) * 2012-03-28 2018-05-15 Intel Corporation Shared buffers for processing elements on a network device
US8868517B2 (en) * 2012-03-29 2014-10-21 Lsi Corporation Scatter gather list for data integrity
US8976960B2 (en) 2012-04-02 2015-03-10 Apple Inc. Methods and apparatus for correlation protected processing of cryptographic operations
US9916456B2 (en) 2012-04-06 2018-03-13 Security First Corp. Systems and methods for securing and restoring virtual machines
WO2013173251A2 (en) 2012-05-13 2013-11-21 Invention Mine Llc Wireless transmission with channel state perturbation
EP2665223A1 (en) * 2012-05-16 2013-11-20 Alcatel Lucent Method for protecting confidentiality of a file distributed and stored at a plurality of storage service providers
CN102693399B (en) * 2012-05-18 2015-05-27 朱晓阳 System and method for on-line separation and recovery of electronic documents
EP2680037A1 (en) * 2012-06-27 2014-01-01 Astrium Limited Authentication of satellite navigation signals
US9323950B2 (en) 2012-07-19 2016-04-26 Atmel Corporation Generating signatures using a secure device
US8875254B2 (en) * 2012-08-07 2014-10-28 International Business Machines Corporation Cache sharing of enterprise data among peers via an enterprise server
US20140053056A1 (en) * 2012-08-16 2014-02-20 Qualcomm Incorporated Pre-processing of scripts in web browsers
US9898445B2 (en) 2012-08-16 2018-02-20 Qualcomm Incorporated Resource prefetching via sandboxed execution
US20140053064A1 (en) 2012-08-16 2014-02-20 Qualcomm Incorporated Predicting the usage of document resources
KR101355080B1 (en) 2012-08-23 2014-01-27 모트렉스(주) System for syndicating the original of digital contents for contents provider and method thereof
KR101355081B1 (en) 2012-08-23 2014-01-27 모트렉스(주) System for syndicating the original of digital contents for personal users and method thereof
AU2013308905B2 (en) * 2012-08-28 2018-12-13 Visa International Service Association Protecting assets on a device
KR101451214B1 (en) * 2012-09-14 2014-10-15 주식회사 엘지씨엔에스 Payment method, server performing the same, storage media storing the same and system performing the same
US9390280B2 (en) * 2012-09-16 2016-07-12 Angel Secure Networks, Inc. System and method for obtaining keys to access protected information
US20140089670A1 (en) * 2012-09-27 2014-03-27 Atmel Corporation Unique code in message for signature generation in asymmetric cryptographic device
US8935769B2 (en) * 2012-09-28 2015-01-13 Liveensure, Inc. Method for mobile security via multi-factor context authentication
US9177177B1 (en) * 2012-10-04 2015-11-03 Symantec Corporation Systems and methods for securing storage space
US8942379B2 (en) * 2012-10-17 2015-01-27 Cisco Technology, Inc. Timeslot encryption in an optical transport network
US20160042198A1 (en) 2012-10-19 2016-02-11 Pearson Education, Inc. Deidentified access of content
US8984650B2 (en) 2012-10-19 2015-03-17 Pearson Education, Inc. Privacy server for protecting personally identifiable information
US8893292B2 (en) * 2012-11-14 2014-11-18 Mitsubishi Electric Research Laboratories, Inc. Privacy preserving statistical analysis for distributed databases
JP2014103590A (en) * 2012-11-21 2014-06-05 Toshiba Corp Communication device, communication method, system, and program
US10304047B2 (en) * 2012-12-07 2019-05-28 Visa International Service Association Token generating component
US9430655B1 (en) * 2012-12-28 2016-08-30 Emc Corporation Split tokenization
WO2014105834A1 (en) * 2012-12-30 2014-07-03 Feliciano Raymond Richard Method and apparatus for encrypting and decrypting data
EP2956887A1 (en) 2013-02-13 2015-12-23 Security First Corp. Systems and methods for a cryptographic file system layer
US9245137B2 (en) 2013-03-04 2016-01-26 International Business Machines Corporation Management of digital information
US20140258718A1 (en) * 2013-03-07 2014-09-11 Asymptote Security Llc Method and system for secure transmission of biometric data
US9118467B2 (en) 2013-03-13 2015-08-25 Atmel Corporation Generating keys using secure hardware
US9953317B2 (en) * 2013-03-13 2018-04-24 Shopkeep.Com, Inc. Method and system for secure key rotation
US9215075B1 (en) 2013-03-15 2015-12-15 Poltorak Technologies Llc System and method for secure relayed communications from an implantable medical device
US9323766B2 (en) 2013-03-15 2016-04-26 Metrix Instrument Co., Lp Data collection device and method
US10270748B2 (en) 2013-03-22 2019-04-23 Nok Nok Labs, Inc. Advanced authentication techniques and applications
US9396320B2 (en) * 2013-03-22 2016-07-19 Nok Nok Labs, Inc. System and method for non-intrusive, privacy-preserving authentication
US9887983B2 (en) 2013-10-29 2018-02-06 Nok Nok Labs, Inc. Apparatus and method for implementing composite authenticators
EP2989740B1 (en) 2013-04-24 2019-04-03 Nec Corporation Method and system for encrypting data
WO2014174045A1 (en) * 2013-04-24 2014-10-30 Nec Europe Ltd. Method and system for enforcing access control policies on data
US9667530B2 (en) 2013-05-06 2017-05-30 International Business Machines Corporation Privacy preserving query method and system for use in federated coalition networks
US10177896B2 (en) 2013-05-13 2019-01-08 Amir Keyvan Khandani Methods for training of full-duplex wireless systems
US9917817B1 (en) * 2013-06-10 2018-03-13 EMC IP Holding Company LLC Selective encryption of outgoing data
US9553982B2 (en) * 2013-07-06 2017-01-24 Newvoicemedia, Ltd. System and methods for tamper proof interaction recording and timestamping
KR20150015233A (en) * 2013-07-31 2015-02-10 삼성전자주식회사 Apparatus for Processing Image, Method for Providing Personalizaton Service, and Computer-readable Medium
JP6381187B2 (en) * 2013-08-09 2018-08-29 キヤノン株式会社 Information processing apparatus, information processing method, and program
US9584488B2 (en) 2013-08-09 2017-02-28 Introspective Power, Inc. Data encryption cipher using rotating ports
US9584313B2 (en) 2013-08-09 2017-02-28 Introspective Power, Inc. Streaming one time pad cipher using rotating ports for data encryption
US9208340B2 (en) * 2013-08-28 2015-12-08 Chung Jong Lee Parallel data processing system based on location control and method thereof
GB2519119A (en) 2013-10-10 2015-04-15 Ibm Linear network coding in a dynamic distributed federated database
JP6552184B2 (en) * 2014-01-14 2019-07-31 キヤノン株式会社 INFORMATION PROCESSING APPARATUS AND METHOD THEREOF
US9754097B2 (en) 2014-02-21 2017-09-05 Liveensure, Inc. Method for peer to peer mobile context authentication
KR101888903B1 (en) * 2014-03-03 2018-08-17 인텔 코포레이션 Methods and apparatus for migrating keys
US9461973B2 (en) * 2014-03-19 2016-10-04 Bluefin Payment Systems, LLC Systems and methods for decryption as a service
DK3120593T3 (en) * 2014-03-19 2019-04-01 Bluefin Payment Sys Llc SYSTEMS AND PROCEDURE FOR MANUFACTURING FINGERPRINTING FOR CRYPTIC DEVICES
US11256798B2 (en) 2014-03-19 2022-02-22 Bluefin Payment Systems Llc Systems and methods for decryption as a service
CN103945283B (en) * 2014-04-02 2017-10-10 网易(杭州)网络有限公司 A kind of digital content protection method and equipment
EP3129912B1 (en) 2014-04-10 2019-09-11 Atomizer Group, LLC Method and system for securing data
US9654469B1 (en) 2014-05-02 2017-05-16 Nok Nok Labs, Inc. Web-based user authentication techniques and applications
US9104889B1 (en) * 2014-05-07 2015-08-11 Data Guard Solutions, Inc. Encryption on computing device
GB2526367A (en) * 2014-05-23 2015-11-25 Ibm Password-based authentication
EP3155754B1 (en) 2014-06-13 2018-10-24 Bicdroid Inc. Methods, systems and computer program product for providing encryption on a plurality of devices
US9703979B1 (en) 2014-06-13 2017-07-11 BicDroid Inc. Methods and computer program products for encryption key generation and management
GB2513260B (en) * 2014-06-27 2018-06-13 PQ Solutions Ltd System and method for quorum-based data recovery
CN104901932A (en) * 2014-07-30 2015-09-09 易兴旺 Secure login method based on CPK (Combined Public Key Cryptosystem) identity authentication technology
KR101687287B1 (en) * 2014-08-18 2017-01-02 남기원 Individual data managing system and method of the same
EP3202080A1 (en) * 2014-09-30 2017-08-09 NEC Europe Ltd. Method and system for at least partially updating data encrypted with an all-or-nothing encryption scheme
US10546439B2 (en) 2014-10-29 2020-01-28 Paypal, Inc. Wearable device with user authentication interface
WO2016081942A2 (en) * 2014-11-21 2016-05-26 Security First Corp. Gateway for cloud-based secure storage
US20160191511A1 (en) 2014-12-24 2016-06-30 Paypal Inc. Wearable device authentication
JP5860556B1 (en) * 2015-02-06 2016-02-16 日本電信電話株式会社 Inconsistency detection method, inconsistency detection system, inconsistency detection apparatus, and program
US9773119B2 (en) * 2015-02-25 2017-09-26 Sap Se Parallel and hierarchical password protection on specific document sections
US10211987B2 (en) * 2015-04-27 2019-02-19 Cisco Technology, Inc. Transport mechanism for carrying in-band metadata for network path proof of transit
CN104951928B (en) * 2015-06-30 2019-01-22 梅卓军 System and method for electronic license information interaction
JP2017041784A (en) * 2015-08-20 2017-02-23 富士通株式会社 Communication terminal apparatus, communication network system, and communication method
CN105208005B (en) * 2015-08-25 2019-10-11 宇龙计算机通信科技(深圳)有限公司 A kind of fingerprint verification method, connection equipment and terminal device
WO2017033442A1 (en) * 2015-08-26 2017-03-02 日本電気株式会社 Information processing device, authentication system, authentication method, and recording medium for recording computer program
CN105260668B (en) * 2015-10-10 2018-07-24 北京搜狗科技发展有限公司 A kind of file encrypting method and electronic equipment
US10601781B2 (en) 2015-10-12 2020-03-24 Servicenow, Inc. Selective encryption delineation
US11575524B2 (en) 2015-10-12 2023-02-07 Servicenow, Inc. Selective encryption delineation
US10320761B2 (en) 2015-11-02 2019-06-11 Servicenow, Inc. Selective encryption configuration
CN105282171B (en) * 2015-11-06 2018-04-27 北京大学深圳研究生院 A kind of safe and reliable distributed cloud storage method
US10623339B2 (en) 2015-12-17 2020-04-14 Hewlett Packard Enterprise Development Lp Reduced orthogonal network policy set selection
US10198595B2 (en) 2015-12-22 2019-02-05 Walmart Apollo, Llc Data breach detection system
US10419401B2 (en) * 2016-01-08 2019-09-17 Capital One Services, Llc Methods and systems for securing data in the public cloud
US10354653B1 (en) 2016-01-19 2019-07-16 United Services Automobile Association (Usaa) Cooperative delegation for digital assistants
US10482255B2 (en) 2016-02-16 2019-11-19 Atmel Corporation Controlled secure code authentication
US10474823B2 (en) 2016-02-16 2019-11-12 Atmel Corporation Controlled secure code authentication
EP3395031B1 (en) * 2016-02-19 2021-11-24 NEC Corporation Method for providing a proof of retrievability
US20170243225A1 (en) * 2016-02-24 2017-08-24 Mastercard International Incorporated Systems and methods for using multi-party computation for biometric authentication
CN105721148B (en) * 2016-04-12 2019-01-18 武汉珈铭汉象教育科技有限公司 A kind of data file encryption method and system based on double random numbers
US10616197B2 (en) 2016-04-18 2020-04-07 Atmel Corporation Message authentication with secure code verification
US10778295B2 (en) 2016-05-02 2020-09-15 Amir Keyvan Khandani Instantaneous beamforming exploiting user physical signatures
US11356272B2 (en) * 2016-05-19 2022-06-07 Telefonaktiebolaget Lm Ericsson (Publ) Methods and devices for handling hash-tree based data signatures
EP3485389B1 (en) * 2016-07-13 2023-10-04 Nsknox Technologies Ltd Methods and systems for a redundantly-secure data store using independent networks
US10445235B2 (en) * 2016-07-29 2019-10-15 Seagate Technology Llc Weighted data striping
US10769635B2 (en) 2016-08-05 2020-09-08 Nok Nok Labs, Inc. Authentication techniques including speech and/or lip movement analysis
US10637853B2 (en) 2016-08-05 2020-04-28 Nok Nok Labs, Inc. Authentication techniques including speech and/or lip movement analysis
US10169152B2 (en) * 2016-09-12 2019-01-01 International Business Machines Corporation Resilient data storage and retrieval
US10659398B2 (en) 2016-10-03 2020-05-19 Nohold, Inc. Interactive virtual conversation interface systems and methods
DE102016120558A1 (en) * 2016-10-27 2018-05-03 Infineon Technologies Ag DATA PROCESSING DEVICE AND METHOD FOR CRYPTOGRAPHIC PROCESSING OF DATA
US9742742B1 (en) 2016-11-18 2017-08-22 Vaultara LLC Secure data transfer system and method
LU93377B1 (en) * 2016-12-15 2018-07-03 Luxembourg Inst Science & Tech List P2p network data distribution and retrieval using blockchain log
US10237070B2 (en) 2016-12-31 2019-03-19 Nok Nok Labs, Inc. System and method for sharing keys across authenticators
US10680798B2 (en) * 2017-02-15 2020-06-09 Nxp Usa, Inc. Masking storage transfer to protect against attacks
US10846415B1 (en) * 2017-03-02 2020-11-24 Arebus, LLC Computing device compatible encryption and decryption
SG11201908666VA (en) * 2017-03-21 2019-10-30 Tora Holdings Inc Secure order matching by distributing data and processing across multiple segregated computation nodes
US11356445B2 (en) * 2017-03-28 2022-06-07 Amazon Technologies, Inc. Data access interface for clustered devices
US10530752B2 (en) 2017-03-28 2020-01-07 Amazon Technologies, Inc. Efficient device provision
US10621055B2 (en) 2017-03-28 2020-04-14 Amazon Technologies, Inc. Adaptive data recovery for clustered data devices
US10700766B2 (en) 2017-04-19 2020-06-30 Amir Keyvan Khandani Noise cancelling amplify-and-forward (in-band) relay with self-interference cancellation
US11258582B2 (en) * 2017-05-01 2022-02-22 Qbrics, Inc. Distributed system and method for encryption of blockchain payloads
US11711350B2 (en) 2017-06-02 2023-07-25 Bluefin Payment Systems Llc Systems and processes for vaultless tokenization and encryption
US11070534B2 (en) 2019-05-13 2021-07-20 Bluefin Payment Systems Llc Systems and processes for vaultless tokenization and encryption
WO2018223130A1 (en) 2017-06-02 2018-12-06 Bluefin Payment Systems Llc Systems and methods for managing a payment terminal via a web browser
US10026283B1 (en) 2017-06-20 2018-07-17 International Business Machines Corporation Multi-sensor intrusion detection system
US11032067B2 (en) * 2017-07-03 2021-06-08 Stmicroelectronics S.R.L. Hardware secure module, related processing system, integrated circuit, device and method
WO2019012329A1 (en) 2017-07-10 2019-01-17 Vchain Technology Limited Method and system for data security within independent computer systems and digital networks
WO2019032556A1 (en) * 2017-08-10 2019-02-14 Ctm Insights Llc Method for securing data utilizing microshard™ fragmentation
CN113765657B (en) 2017-08-28 2023-10-24 创新先进技术有限公司 Key data processing method, device and server
US10831935B2 (en) * 2017-08-31 2020-11-10 Pure Storage, Inc. Encryption management with host-side data reduction
US10997620B2 (en) * 2017-09-18 2021-05-04 Vertigo Studios, Llc Blockchain-enabled system for controlling advertiser access to personal user data
US11212089B2 (en) * 2017-10-04 2021-12-28 Amir Keyvan Khandani Methods for secure data storage
US11539686B2 (en) * 2017-10-12 2022-12-27 Mx Technologies, Inc. Data aggregation management based on credentials
WO2019075384A1 (en) * 2017-10-12 2019-04-18 Bluefin Payment Systems Llc Systems and methods for parsing and decrypting payloads
US10439804B2 (en) * 2017-10-27 2019-10-08 EMC IP Holding Company LLC Data encrypting system with encryption service module and supporting infrastructure for transparently providing encryption services to encryption service consumer processes across encryption service state changes
US11734231B2 (en) * 2017-10-30 2023-08-22 AtomBeam Technologies Inc. System and methods for bandwidth-efficient encoding of genomic data
US11132503B2 (en) 2017-10-30 2021-09-28 Nohold, Inc. Query a system via natural language NLP2X
US10582027B2 (en) 2017-11-04 2020-03-03 Cisco Technology, Inc. In-band metadata export and removal at intermediate nodes
US11868995B2 (en) 2017-11-27 2024-01-09 Nok Nok Labs, Inc. Extending a secure key storage for transaction confirmation and cryptocurrency
MX2020005746A (en) * 2017-12-06 2020-08-20 Zamna Tech Limited Method and system for data security, validation, verification and provenance within independent computer systems and digital networks.
CN109962776B (en) * 2017-12-25 2022-02-08 亚旭电脑股份有限公司 Encryption method and decryption method
US10623181B2 (en) 2018-01-02 2020-04-14 Bank Of America Corporation Security system utilizing vaultless tokenization and encryption
CN107979615B (en) * 2018-01-05 2020-07-03 新华三信息安全技术有限公司 Message encryption sending and authentication method, device, client and firewall
EP3738063A4 (en) * 2018-01-08 2021-10-06 Paperclip Inc. Methods for securing data
US11831409B2 (en) 2018-01-12 2023-11-28 Nok Nok Labs, Inc. System and method for binding verifiable claims
US11012144B2 (en) 2018-01-16 2021-05-18 Amir Keyvan Khandani System and methods for in-band relaying
US20190227857A1 (en) * 2018-01-25 2019-07-25 salesforce com, inc Smart clipboard for secure data transfer
EP3528468B1 (en) * 2018-02-20 2021-04-07 Nokia Technologies Oy Profile information sharing
US11431494B2 (en) * 2018-03-15 2022-08-30 Atakama LLC Passwordless security system for data-at-rest
JP7010365B2 (en) * 2018-03-19 2022-01-26 日本電信電話株式会社 Parameter setting units, arithmetic units, their methods, and programs
US10623278B2 (en) 2018-03-20 2020-04-14 Cisco Technology, Inc. Reactive mechanism for in-situ operation, administration, and maintenance traffic
US10826896B2 (en) 2018-03-27 2020-11-03 Bank Of America Corporation Enhanced biometric data and systems for processing events using enhanced biometric data
US10817598B2 (en) 2018-03-27 2020-10-27 Bank Of America Corporation Enhanced biometric data and systems for processing events using enhanced biometric data
US20210019971A1 (en) * 2018-04-17 2021-01-21 Coinbase, Inc. Offline storage system and method of use
CN108875384A (en) * 2018-06-06 2018-11-23 国云科技股份有限公司 A kind of business risk data safety emerging system and its implementation
US11042661B2 (en) * 2018-06-08 2021-06-22 Weka.IO Ltd. Encryption for a distributed filesystem
US11562083B2 (en) * 2018-07-30 2023-01-24 Hewlett Packard Enterprise Development Lp Data access management for a composition
JP2020022057A (en) * 2018-07-31 2020-02-06 株式会社東芝 Encrypted data generation apparatus, digital signature generation apparatus, data generation apparatus with digital signature, and data generation system with digital signature
WO2020028950A1 (en) * 2018-08-07 2020-02-13 Haventec Pty Ltd A method and system for securing data
US11550951B2 (en) 2018-09-18 2023-01-10 Inspired Patents, Llc Interoperable digital social recorder of multi-threaded smart routed media
US11044077B2 (en) * 2018-09-25 2021-06-22 Mcafee, Llc Modifiable client-side encrypted data in the cloud
US10656876B1 (en) * 2018-11-12 2020-05-19 Cohesity, Inc. Cloud edition and retrieve
JP7190336B2 (en) * 2018-11-15 2022-12-15 富士通株式会社 Communication device, communication method, and communication program
CN109889324A (en) * 2018-12-27 2019-06-14 深圳市安云信息科技有限公司 Encrypt storage method, storage medium and device
US11924327B2 (en) * 2019-01-09 2024-03-05 British Telecommunications Public Limited Company Variable data protection
EP3681094B1 (en) * 2019-01-09 2021-11-10 British Telecommunications public limited company Impeding data access
US10937339B2 (en) * 2019-01-10 2021-03-02 Bank Of America Corporation Digital cryptosystem with re-derivable hybrid keys
CN109921856B (en) * 2019-01-25 2021-01-15 长沙天仪空间科技研究院有限公司 Low-speed communication method and system based on light flicker of low-orbit satellite
KR20200100481A (en) * 2019-02-18 2020-08-26 삼성전자주식회사 Electronic device for authenticating biometric information and operating method thereof
CN110011786B (en) * 2019-03-20 2022-03-18 中国电子科技集团公司第三十研究所 High-safety IP secret communication method
CA3058242C (en) * 2019-03-29 2022-05-31 Alibaba Group Holding Limited Managing cryptographic keys based on identity information
CA3057398C (en) 2019-03-29 2021-07-06 Alibaba Group Holding Limited Securely performing cryptographic operations
EP3610607B1 (en) 2019-03-29 2021-08-25 Advanced New Technologies Co., Ltd. Cryptographic key management based on identity information
US11792024B2 (en) 2019-03-29 2023-10-17 Nok Nok Labs, Inc. System and method for efficient challenge-response authentication
CA3058012C (en) 2019-03-29 2021-05-11 Alibaba Group Holding Limited Cryptography chip with identity verification
US11303452B2 (en) 2019-04-03 2022-04-12 Keychainx Ag Biometric digital signature generation for identity verification
US11777715B2 (en) 2019-05-15 2023-10-03 Amir Keyvan Khandani Method and apparatus for generating shared secrets
EP3973687A4 (en) * 2019-05-22 2023-09-13 Myota, Inc. Method and system for distributed data storage with enhanced security, resilience, and control
WO2020257123A1 (en) * 2019-06-16 2020-12-24 Planaria Corp. Systems and methods for blockchain-based authentication
US11288396B2 (en) 2019-06-18 2022-03-29 International Business Machines Corporation Data security through physical separation of data
JP7344543B2 (en) * 2019-07-12 2023-09-14 シスナ株式会社 Valuables management system
HRP20230073T1 (en) * 2019-07-16 2023-03-17 Lleidanetworks Serveis Telemàtics, S.A. Method for electronically signing contracts
US11288349B2 (en) * 2019-07-16 2022-03-29 Sokken Corporation System and method for authentication using biometric hash strings
US10972256B2 (en) * 2019-07-18 2021-04-06 Ante Deng Architectural secure system for digital file in cyberspace
US11151277B1 (en) * 2019-07-25 2021-10-19 EMC IP Holding Company LLC Method to recover encrypted structured files
US20220405765A1 (en) * 2019-11-18 2022-12-22 Omnibek Ip Holding Llc Know your customer (kyc) and anti-money laundering (aml) verification in a multi-decentralized private blockchains network
US11528259B2 (en) 2019-12-13 2022-12-13 TripleBlind, Inc. Systems and methods for providing a systemic error in artificial intelligence algorithms
US11431688B2 (en) 2019-12-13 2022-08-30 TripleBlind, Inc. Systems and methods for providing a modified loss function in federated-split learning
US11582203B2 (en) 2019-12-13 2023-02-14 TripleBlind, Inc. Systems and methods for encrypting data and algorithms
CN111212425B (en) * 2020-01-10 2022-07-12 中国联合网络通信集团有限公司 Access method, server and terminal
US20210256145A1 (en) * 2020-02-17 2021-08-19 International Business Machines Corporation Preservation of privacy in large datasets
CN111431586B (en) * 2020-04-17 2021-09-21 中国电子科技集团公司第三十八研究所 Satellite network safety communication method
US11593498B2 (en) 2020-06-09 2023-02-28 International Business Machines Corporation Distribution of user specific data elements in a replication environment
US20210383021A1 (en) * 2020-06-09 2021-12-09 Drfirst.Com, Inc. Anonymized interface for ticket based authentication
CN111800267A (en) * 2020-07-10 2020-10-20 信雅达系统工程股份有限公司 Password service support system with unified management
CN111935122B (en) * 2020-07-31 2022-09-20 重庆小雨点小额贷款有限公司 Data security processing method and device
CN112235112B (en) * 2020-09-03 2022-03-18 中国电子科技集团公司第三十研究所 Zero-semantic and one-time pad-based IP encryption method, system and storage medium
US11343085B2 (en) * 2020-09-19 2022-05-24 International Business Machines Corporation Threshold encryption for broadcast content
US11601418B2 (en) 2020-10-14 2023-03-07 Bank Of America Corporation System for increasing authentication complexity for access to online systems
WO2022109215A1 (en) * 2020-11-20 2022-05-27 TripleBlind, Inc. Systems and methods for providing a blind de-identification of privacy data
US11201866B1 (en) 2020-12-29 2021-12-14 Inductive Automation, LLC Secure identity provider authentication for native application to access web service
SE2150206A1 (en) * 2021-02-26 2022-08-27 Fingerprint Cards Anacatum Ip Ab Enrolling biometrics with mutual trust through 3rd party
CN113642986B (en) * 2021-08-02 2024-04-16 上海示右智能科技有限公司 Method for constructing digital notarization
US11625377B1 (en) 2022-02-03 2023-04-11 TripleBlind, Inc. Systems and methods for enabling two parties to find an intersection between private data sets without learning anything other than the intersection of the datasets
US11539679B1 (en) 2022-02-04 2022-12-27 TripleBlind, Inc. Systems and methods for providing a quantum-proof key exchange
US11962706B2 (en) * 2022-02-07 2024-04-16 Bank Of America Corporation Hosting account linking services to enable dynamic authentication and multi-computer event processing
US20230297723A1 (en) * 2022-03-18 2023-09-21 Jpmorgan Chase Bank, N.A. System and method for password-less authentication through digital driving license
CN115186305B (en) * 2022-09-13 2022-12-16 中国电子信息产业集团有限公司 Method for constructing data element model and producing data element
CN115550066B (en) * 2022-11-28 2023-04-04 中国电子信息产业集团有限公司 Data element security encryption calculation method and device and electronic equipment

Family Cites Families (473)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6292568B1 (en) 1966-12-16 2001-09-18 Scientific-Atlanta, Inc. Representing entitlements to service in a conditional access system
US4453074A (en) * 1981-10-19 1984-06-05 American Express Company Protection system for intelligent cards
US4802220A (en) 1985-03-20 1989-01-31 American Telephone And Telegraph Company, At&T Bell Laboratories Method and apparatus for multi-channel communication security
US4924513A (en) * 1987-09-25 1990-05-08 Digital Equipment Corporation Apparatus and method for secure transmission of data over an unsecure transmission channel
US5485474A (en) * 1988-02-25 1996-01-16 The President And Fellows Of Harvard College Scheme for information dispersal and reconstruction
FR2632469B1 (en) 1988-06-03 1991-08-02 Pailles Jean Claude SECURE DATA COMMUNICATION DEVICE
EP0354774B1 (en) 1988-08-11 1996-04-10 International Business Machines Corporation Data cryptography using control vectors
US4932057A (en) * 1988-10-17 1990-06-05 Grumman Aerospace Corporation Parallel transmission to mask data radiation
JP2525098Y2 (en) * 1988-10-21 1997-02-05 シンガー日鋼 株式会社 Sewing machine thread trimmer
US5016274A (en) * 1988-11-08 1991-05-14 Silvio Micali On-line/off-line digital signing
GB2237670B (en) 1989-11-03 1993-04-07 De La Rue Syst Reciprocal transfer system
US5682425A (en) 1990-04-23 1997-10-28 Canon Kabushiki Kaisha Information signal transmission system
US5010572A (en) * 1990-04-27 1991-04-23 Hughes Aircraft Company Distributed information system having automatic invocation of key management negotiations protocol and method
US5051745A (en) 1990-08-21 1991-09-24 Pkware, Inc. String searcher, and compressor using same
US5177342A (en) 1990-11-09 1993-01-05 Visa International Service Association Transaction approval system
JPH04297157A (en) 1991-03-14 1992-10-21 Mitsubishi Electric Corp Data ciphering device
US5163096A (en) 1991-06-06 1992-11-10 International Business Machines Corporation Storage protection utilizing public storage key control
US5239659A (en) 1991-06-19 1993-08-24 Storage Technology Corporation Phantom duplex copy group apparatus for a disk drive array data storge subsystem
US5150407A (en) 1991-12-16 1992-09-22 Chan Steve S C Secured data storage devices
US5748147A (en) 1992-03-04 1998-05-05 Motorola Inc Position locating rescue transceiver
GB2264798A (en) 1992-03-04 1993-09-08 Hitachi Ltd High speed access control
US5276735A (en) 1992-04-17 1994-01-04 Secure Computing Corporation Data enclave and trusted path system
US5375244A (en) 1992-05-29 1994-12-20 At&T Corp. System and method for granting access to a resource
US5268963A (en) 1992-06-09 1993-12-07 Audio Digital Imaging Inc. System for encoding personalized identification for storage on memory storage devices
US5267314A (en) * 1992-11-17 1993-11-30 Leon Stambler Secure transaction system and method utilized therein
US5533051A (en) 1993-03-12 1996-07-02 The James Group Method for data compression
US5450099A (en) 1993-04-08 1995-09-12 Eastman Kodak Company Thermal line printer with staggered head segments and overlap compensation
JP2550864B2 (en) * 1993-05-31 1996-11-06 日本電気株式会社 Decentralized control method and apparatus for job execution
GB9323489D0 (en) * 1993-11-08 1994-01-05 Ncr Int Inc Self-service business system
DK0739560T3 (en) 1994-01-13 2001-10-01 Certco Inc Cryptographic system and method with key deposit function
US6473860B1 (en) * 1994-04-07 2002-10-29 Hark C. Chan Information distribution and processing system
US5666514A (en) 1994-07-01 1997-09-09 Board Of Trustees Of The Leland Stanford Junior University Cache memory containing extra status bits to indicate memory regions where logging of data should occur
US5748735A (en) * 1994-07-18 1998-05-05 Bell Atlantic Network Services, Inc. Securing E-mail communications and encrypted file storage using yaksha split private key asymmetric cryptography
US5719938A (en) 1994-08-01 1998-02-17 Lucent Technologies Inc. Methods for providing secure access to shared information
US5623549A (en) 1995-01-30 1997-04-22 Ritter; Terry F. Cipher mechanisms with fencing and balanced block mixing
CN100452071C (en) * 1995-02-13 2009-01-14 英特特拉斯特技术公司 Systems and methods for secure transaction management and electronic rights protection
US7133845B1 (en) 1995-02-13 2006-11-07 Intertrust Technologies Corp. System and methods for secure transaction management and electronic rights protection
US7069451B1 (en) * 1995-02-13 2006-06-27 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
JP4083218B2 (en) * 1995-06-05 2008-04-30 サートコ・インコーポレーテッド Multi-step digital signature method and system
US5623546A (en) 1995-06-23 1997-04-22 Motorola, Inc. Encryption method and system for portable data
US5790677A (en) * 1995-06-29 1998-08-04 Microsoft Corporation System and method for secure electronic commerce transactions
US5768382A (en) * 1995-11-22 1998-06-16 Walker Asset Management Limited Partnership Remote-auditing of computer generated outcomes and authenticated biling and access control system using cryptographic and other protocols
JP3502200B2 (en) * 1995-08-30 2004-03-02 株式会社日立製作所 Cryptographic communication system
AR003524A1 (en) 1995-09-08 1998-08-05 Cyber Sign Japan Inc A VERIFICATION SERVER TO BE USED IN THE AUTHENTICATION OF COMPUTER NETWORKS.
US5638445A (en) 1995-09-19 1997-06-10 Microsoft Corporation Blind encryption
US5717758A (en) * 1995-11-02 1998-02-10 Micall; Silvio Witness-based certificate revocation system
US5666416A (en) 1995-10-24 1997-09-09 Micali; Silvio Certificate revocation system
US6449730B2 (en) 1995-10-24 2002-09-10 Seachange Technology, Inc. Loosely coupled mass storage computer cluster
US6345314B1 (en) 1995-10-27 2002-02-05 International Business Machines Corporation Technique to minimize data transfer between two computers
US6301659B1 (en) 1995-11-02 2001-10-09 Silvio Micali Tree-based certificate revocation system
US6026163A (en) * 1995-12-13 2000-02-15 Micali; Silvio Distributed split-key cryptosystem and applications
US5615269A (en) * 1996-02-22 1997-03-25 Micali; Silvio Ideal electronic negotiations
JP2000503154A (en) 1996-01-11 2000-03-14 エムアールジェイ インコーポレイテッド System for controlling access and distribution of digital ownership
US5768519A (en) * 1996-01-18 1998-06-16 Microsoft Corporation Method and apparatus for merging user accounts from a source security domain into a target security domain
US5761306A (en) * 1996-02-22 1998-06-02 Visa International Service Association Key replacement in a public key cryptosystem
JPH09238132A (en) 1996-02-29 1997-09-09 Oki Electric Ind Co Ltd Portable terminal communication system and its communication method
US5768388A (en) 1996-03-01 1998-06-16 Goldwasser; Shafi Time delayed key escrow
US5995630A (en) 1996-03-07 1999-11-30 Dew Engineering And Development Limited Biometric input with encryption
US5666414A (en) 1996-03-21 1997-09-09 Micali; Silvio Guaranteed partial key-escrow
US5673316A (en) 1996-03-29 1997-09-30 International Business Machines Corporation Creation and distribution of cryptographic envelope
JPH09284272A (en) * 1996-04-19 1997-10-31 Canon Inc Ciphering system, signature system, key common share system, identity proving system and device for the systems
JP3540511B2 (en) 1996-06-18 2004-07-07 株式会社東芝 Electronic signature verification device
US5823948A (en) 1996-07-08 1998-10-20 Rlis, Inc. Medical records, documentation, tracking and order entry system
US6072876A (en) 1996-07-26 2000-06-06 Nippon Telegraph And Telephone Corporation Method and system for depositing private key used in RSA cryptosystem
US6292782B1 (en) 1996-09-09 2001-09-18 Philips Electronics North America Corp. Speech recognition and verification system enabling authorized data transmission over networked computer systems
US5937066A (en) * 1996-10-02 1999-08-10 International Business Machines Corporation Two-phase cryptographic key recovery system
GB2318486B (en) * 1996-10-16 2001-03-28 Ibm Data communications system
US6061790A (en) * 1996-11-20 2000-05-09 Starfish Software, Inc. Network computer system with remote user data encipher methodology
US5903652A (en) * 1996-11-25 1999-05-11 Microsoft Corporation System and apparatus for monitoring secure information in a computer network
WO1998024025A1 (en) 1996-11-27 1998-06-04 1Vision Software, L.L.C. File directory and file navigation system
US6125186A (en) 1996-11-28 2000-09-26 Fujitsu Limited Encryption communication system using an agent and a storage medium for storing that agent
FI105137B (en) 1996-12-02 2000-06-15 Nokia Networks Oy Improved broadcasting in a packet network
US5917913A (en) * 1996-12-04 1999-06-29 Wang; Ynjiun Paul Portable electronic authorization devices and methods therefor
US5966444A (en) 1996-12-06 1999-10-12 Yuan; Chuan K. Method and system for establishing a cryptographic key agreement using linear protocols
US5903882A (en) * 1996-12-13 1999-05-11 Certco, Llc Reliance server for electronic transaction system
JPH10198272A (en) 1996-12-27 1998-07-31 Canon Inc Key managing method, ciphering system, and decentralized digital signature system with hierarchy
US6009173A (en) 1997-01-31 1999-12-28 Motorola, Inc. Encryption and decryption method and apparatus
US5940507A (en) * 1997-02-11 1999-08-17 Connected Corporation Secure file archive through encryption key management
US20010050990A1 (en) 1997-02-19 2001-12-13 Frank Wells Sudia Method for initiating a stream-oriented encrypted communication
JP3656688B2 (en) 1997-03-31 2005-06-08 栄司 岡本 Cryptographic data recovery method and key registration system
US6119229A (en) 1997-04-11 2000-09-12 The Brodia Group Virtual property system
JP3611864B2 (en) * 1997-04-24 2005-01-19 松下電器産業株式会社 Data transfer method
US6023508A (en) * 1997-05-22 2000-02-08 Currency Scientific, Inc. Polymorphic data structures for secure operation of a virtual cash system
JP3595145B2 (en) 1997-06-02 2004-12-02 三菱電機株式会社 Cryptographic communication system
US6240183B1 (en) * 1997-06-19 2001-05-29 Brian E. Marchant Security apparatus for data transmission with dynamic random encryption
US6085976A (en) * 1998-05-22 2000-07-11 Sehr; Richard P. Travel system and methods utilizing multi-application passenger cards
US6307940B1 (en) 1997-06-25 2001-10-23 Canon Kabushiki Kaisha Communication network for encrypting/deciphering communication text while updating encryption key, a communication terminal thereof, and a communication method thereof
US6959383B1 (en) 1997-07-10 2005-10-25 Yamaha Corporation Method and device for incorporating additional information into main information through electronic watermaking technique
US6229894B1 (en) * 1997-07-14 2001-05-08 Entrust Technologies, Ltd. Method and apparatus for access to user-specific encryption information
US6078888A (en) 1997-07-16 2000-06-20 Gilbarco Inc. Cryptography security for remote dispenser transactions
US6058188A (en) 1997-07-24 2000-05-02 International Business Machines Corporation Method and apparatus for interoperable validation of key recovery information in a cryptographic system
WO1999005818A1 (en) 1997-07-28 1999-02-04 The Director Government Communications Headquarters Split-key cryptographic system and method
SE511881C2 (en) * 1997-08-08 1999-12-13 Ericsson Telefon Ab L M Method and arrangement for transmitting packet information in a digital telecommunication system
US6856383B1 (en) * 1997-09-05 2005-02-15 Security First Corp. Relief object image generator
US5991414A (en) 1997-09-12 1999-11-23 International Business Machines Corporation Method and apparatus for the secure distributed storage and retrieval of information
US6094485A (en) * 1997-09-18 2000-07-25 Netscape Communications Corporation SSL step-up
US6125349A (en) 1997-10-01 2000-09-26 At&T Corp. Method and apparatus using digital credentials and other electronic certificates for electronic transactions
JP3604264B2 (en) 1997-10-06 2004-12-22 株式会社東芝 Caller terminal device, network system, and call information monitoring method
US6092201A (en) * 1997-10-24 2000-07-18 Entrust Technologies Method and apparatus for extending secure communication operations via a shared list
US6084968A (en) 1997-10-29 2000-07-04 Motorola, Inc. Security token and method for wireless applications
US6446204B1 (en) 1997-10-31 2002-09-03 Oracle Corporation Method and apparatus for implementing an extensible authentication mechanism in a web application server
US6073237A (en) * 1997-11-06 2000-06-06 Cybercash, Inc. Tamper resistant method and apparatus
US6301664B1 (en) 1997-11-18 2001-10-09 Telcordia Technologies, Inc. Method and system for non-malleable and non-interactive cryptographic commitment in a network
US6151395A (en) 1997-12-04 2000-11-21 Cisco Technology, Inc. System and method for regenerating secret keys in diffie-hellman communication sessions
US6185685B1 (en) * 1997-12-11 2001-02-06 International Business Machines Corporation Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same
US6453416B1 (en) 1997-12-19 2002-09-17 Koninklijke Philips Electronics N.V. Secure proxy signing device and method of use
US6415373B1 (en) 1997-12-24 2002-07-02 Avid Technology, Inc. Computer system and process for transferring multiple high bandwidth streams of data between multiple storage units and multiple applications in a scalable and reliable manner
RU2124814C1 (en) 1997-12-24 1999-01-10 Молдовян Николай Андреевич Method for encoding of digital data
EP0936805A1 (en) * 1998-02-12 1999-08-18 Hewlett-Packard Company Document transfer systems
US5974144A (en) 1998-02-25 1999-10-26 Cipheractive Ltd. System for encryption of partitioned data blocks utilizing public key methods and random numbers
EP1062560A1 (en) 1998-03-11 2000-12-27 Cha! Technologies, Inc. Automatically invoked intermediation process for network purchases
US6324650B1 (en) 1998-03-16 2001-11-27 John W.L. Ogilvie Message content protection and conditional disclosure
US6134550A (en) 1998-03-18 2000-10-17 Entrust Technologies Limited Method and apparatus for use in determining validity of a certificate in a communication system employing trusted paths
US6553493B1 (en) * 1998-04-28 2003-04-22 Verisign, Inc. Secure mapping and aliasing of private keys used in public key cryptography
US7096494B1 (en) * 1998-05-05 2006-08-22 Chen Jay C Cryptographic system and method for electronic transactions
WO1999057845A1 (en) * 1998-05-07 1999-11-11 Ferre Herrero Angel Jose Randomization-encryption system
US6981141B1 (en) 1998-05-07 2005-12-27 Maz Technologies, Inc Transparent encryption and decryption with algorithm independent cryptographic engine that allows for containerization of encrypted files
US6438690B1 (en) * 1998-06-04 2002-08-20 International Business Machines Corp. Vault controller based registration application serving web based registration authorities and end users for conducting electronic commerce in secure end-to-end distributed information system
US6519262B1 (en) 1998-06-10 2003-02-11 Trw Inc. Time division multiplex approach for multiple transmitter broadcasting
US6308273B1 (en) 1998-06-12 2001-10-23 Microsoft Corporation Method and system of security location discrimination
US6445794B1 (en) 1998-06-24 2002-09-03 Benyamin Ron System and method for synchronizing one time pad encryption keys for secure communication and access control
US6615347B1 (en) 1998-06-30 2003-09-02 Verisign, Inc. Digital certificate cross-referencing
US6336186B1 (en) * 1998-07-02 2002-01-01 Networks Associates Technology, Inc. Cryptographic system and methodology for creating and managing crypto policy on certificate servers
US6363481B1 (en) 1998-08-03 2002-03-26 Nortel Networks Limited Method and apparatus for secure data storage using distributed databases
US6289509B1 (en) 1998-09-01 2001-09-11 Pkware, Inc. Software patch generator
US7111173B1 (en) 1998-09-01 2006-09-19 Tecsec, Inc. Encryption process including a biometric unit
US6385727B1 (en) 1998-09-25 2002-05-07 Hughes Electronics Corporation Apparatus for providing a secure processing environment
US6345101B1 (en) * 1998-10-07 2002-02-05 Jayant Shukla Cryptographic method and apparatus for data communication and storage
DE19847944A1 (en) 1998-10-09 2000-04-13 Deutsche Telekom Ag Establishing a common key between a central station and a group of subscribers involves using public mathematical group, higher order element of group and threshold process
US6684330B1 (en) * 1998-10-16 2004-01-27 Tecsec, Inc. Cryptographic information and flow control
US6269432B1 (en) * 1998-10-23 2001-07-31 Ericsson, Inc. Distributed transactional processing system having redundant data
WO2000028471A1 (en) 1998-11-06 2000-05-18 Ethentica, Inc. Relief object sensor adaptor
US6260125B1 (en) 1998-12-09 2001-07-10 Ncr Corporation Asynchronous write queues, reconstruction and check-pointing in disk-mirroring applications
US6347143B1 (en) 1998-12-15 2002-02-12 Philips Electronics No. America Corp. Cryptographic device with encryption blocks connected parallel
JP2000181803A (en) 1998-12-18 2000-06-30 Fujitsu Ltd Electronic data keeping device with key management function and method therefor
US6182214B1 (en) 1999-01-08 2001-01-30 Bay Networks, Inc. Exchanging a secret over an unreliable network
DE19906432C1 (en) 1999-02-16 2000-06-21 Fraunhofer Ges Forschung Second data stream generation method from first stream including start and functional audiovisual, data blocks, involves insertion of origination information
FI107205B (en) 1999-02-16 2001-06-15 Sonera Oyj A method to secure information
US6356941B1 (en) * 1999-02-22 2002-03-12 Cyber-Ark Software Ltd. Network vaults
US6256737B1 (en) * 1999-03-09 2001-07-03 Bionetrix Systems Corporation System, method and computer program product for allowing access to enterprise resources using biometric devices
CA2267395C (en) 1999-03-30 2002-07-09 Ibm Canada Limited-Ibm Canada Limitee Method and system for managing keys for encrypted data
US6473858B1 (en) 1999-04-16 2002-10-29 Digeo, Inc. Method and apparatus for broadcasting data with access control
US6625734B1 (en) 1999-04-26 2003-09-23 Disappearing, Inc. Controlling and tracking access to disseminated information
WO2000074298A1 (en) 1999-05-26 2000-12-07 Ascom Hasler Mailing Systems, Inc. Technique for split knowledge backup and recovery of a cryptographic key
US6687375B1 (en) * 1999-06-02 2004-02-03 International Business Machines Corporation Generating user-dependent keys and random numbers
US7450717B1 (en) 1999-06-08 2008-11-11 General Instruments Corporation Self authentication ciphertext chaining
US6957334B1 (en) 1999-06-23 2005-10-18 Mastercard International Incorporated Method and system for secure guaranteed transactions over a computer network
US20010051902A1 (en) 1999-06-28 2001-12-13 Messner Marc A. Method for performing secure internet transactions
AU6053700A (en) * 1999-06-28 2001-01-31 Starpay.Com, Inc. Apparatus and method for performing secure network transactions
US6240188B1 (en) 1999-07-06 2001-05-29 Matsushita Electric Industrial Co., Ltd. Distributed group key management scheme for secure many-to-many communication
US6557123B1 (en) 1999-08-02 2003-04-29 Inostor Corporation Data redundancy methods and apparatus
US6289455B1 (en) 1999-09-02 2001-09-11 Crypotography Research, Inc. Method and apparatus for preventing piracy of digital content
US7260724B1 (en) 1999-09-20 2007-08-21 Security First Corporation Context sensitive dynamic authentication in a cryptographic system
US6853988B1 (en) 1999-09-20 2005-02-08 Security First Corporation Cryptographic server with provisions for interoperability between cryptographic systems
EP1218813A1 (en) 1999-09-20 2002-07-03 Ethentica, Inc. Context sensitive dynamic authentication in a cryptographic system
US7391865B2 (en) * 1999-09-20 2008-06-24 Security First Corporation Secure data parser method and system
US20030005094A1 (en) 1999-09-30 2003-01-02 Ruixi Yuan Two-mode operational scheme for managing service availability of a network gateway
US6505216B1 (en) 1999-10-01 2003-01-07 Emc Corporation Methods and apparatus for backing-up and restoring files using multiple trails
US6978367B1 (en) 1999-10-21 2005-12-20 International Business Machines Corporation Selective data encryption using style sheet processing for decryption by a client proxy
US6662299B1 (en) 1999-10-28 2003-12-09 Pgp Corporation Method and apparatus for reconstituting an encryption key based on multiple user responses
US6449719B1 (en) * 1999-11-09 2002-09-10 Widevine Technologies, Inc. Process and streaming server for encrypting a data stream
US7363361B2 (en) 2000-08-18 2008-04-22 Akamai Technologies, Inc. Secure content delivery system
US7203956B2 (en) 1999-12-22 2007-04-10 Transnexus, Inc. System and method for the secure enrollment of devices with a clearinghouse server for internet telephony and multimedia communications
US6701303B1 (en) 1999-12-23 2004-03-02 International Business Machines, Corp. E-commerce system and method of operation enabling a user to conduct transactions with multiple retailers without certification and/or trusted electronic paths
CA2329460A1 (en) 1999-12-24 2001-06-24 Matsushita Electric Industrial Co., Ltd. Data terminal, data distribution system, and internet telephone system
DE60044179D1 (en) * 1999-12-28 2010-05-27 Sony Corp System and method for the commercial traffic of images
EP1670235A1 (en) 1999-12-28 2006-06-14 Sony Corporation A portable music player
CA2398265A1 (en) 2000-01-24 2001-07-26 The University Of Manitoba Method and system for segmented file transfer
US7304990B2 (en) 2000-02-03 2007-12-04 Bandwiz Inc. Method of encoding and transmitting data over a communication medium through division and segmentation
US7412462B2 (en) * 2000-02-18 2008-08-12 Burnside Acquisition, Llc Data repository and method for promoting network storage of data
JP3499810B2 (en) * 2000-03-06 2004-02-23 株式会社東芝 ENCRYPTION DEVICE, ENCRYPTION METHOD, COMPUTER-READABLE RECORDING MEDIUM CONTAINING PROGRAM FOR FUNCTIONING COMPUTER AS ENCRYPTION DEVICE, AND COMPUTER READING RECORDING PROGRAM FOR FUNCTIONING COMPUTER AS DECRYPTION DEVICE, DECRYPTION METHOD, AND DECRYPTION DEVICE Possible recording media
US6879988B2 (en) 2000-03-09 2005-04-12 Pkware System and method for manipulating and managing computer archive files
WO2001069392A2 (en) * 2000-03-16 2001-09-20 Boden Scott T Method and apparatus for secure and fault tolerant data storage
US7039189B1 (en) 2000-03-17 2006-05-02 International Business Machines Corporation Stream continuity enforcement
US7650376B1 (en) 2000-03-27 2010-01-19 Blumenau Trevor I Content distribution system for distributing content over a network, with particular applicability to distributing high-bandwidth content
US7181542B2 (en) 2000-04-12 2007-02-20 Corente, Inc. Method and system for managing and configuring virtual private networks
US7085854B2 (en) 2000-04-12 2006-08-01 Corente, Inc. Methods and systems for enabling communication between a processor and a network operations center
US20020016926A1 (en) 2000-04-27 2002-02-07 Nguyen Thomas T. Method and apparatus for integrating tunneling protocols with standard routing protocols
US7076651B2 (en) 2000-05-01 2006-07-11 Safenet, Inc. System and method for highly secure data communications
US6807649B1 (en) 2000-05-23 2004-10-19 Hewlett-Packard Development Company, L.P. Encryption keys for multiple drive fault tolerance
US6931549B1 (en) 2000-05-25 2005-08-16 Stamps.Com Method and apparatus for secure data storage and retrieval
US6898285B1 (en) 2000-06-02 2005-05-24 General Instrument Corporation System to deliver encrypted access control information to support interoperability between digital information processing/control equipment
KR100423191B1 (en) 2000-06-08 2004-03-18 인터내셔널 비지네스 머신즈 코포레이션 Improving secure server performance with pre-processed data ready for secure protocol transfer
FR2810138B1 (en) * 2000-06-08 2005-02-11 Bull Cp8 METHOD FOR SECURE STORAGE OF SENSITIVE DATA IN A MEMORY OF AN ELECTRONIC CHIP-BASED SYSTEM, IN PARTICULAR A CHIP CARD, AND ON-BOARD SYSTEM IMPLEMENTING THE METHOD
US7693992B2 (en) * 2000-06-14 2010-04-06 Disney Enterprises, Inc. Technique for providing access to data
US7305085B2 (en) * 2000-06-30 2007-12-04 Kabushiki Kaisha Toshiba Encryption apparatus and method, and decryption apparatus and method based on block encryption
US7587368B2 (en) 2000-07-06 2009-09-08 David Paul Felsher Information record infrastructure, system and method
US6915436B1 (en) 2000-08-02 2005-07-05 International Business Machines Corporation System and method to verify availability of a back-up secure tunnel
US6789189B2 (en) 2000-08-04 2004-09-07 First Data Corporation Managing account database in ABDS system
US6947557B1 (en) 2000-08-14 2005-09-20 International Business Machines Corporation Method and program product for maintaining security of publicly distributed information
US20020031230A1 (en) 2000-08-15 2002-03-14 Sweet William B. Method and apparatus for a web-based application service model for security management
AUPQ993100A0 (en) 2000-09-06 2000-09-28 Software Engineering Australia (Western Australia) Limited System and method for transmitting and storing sensitive data transmitted over a communications network
US7165175B1 (en) 2000-09-06 2007-01-16 Widevine Technologies, Inc. Apparatus, system and method for selectively encrypting different portions of data sent over a network
SE0003440D0 (en) 2000-09-26 2000-09-26 Landala Naet Ab Communication system
CN1347225A (en) 2000-10-09 2002-05-01 杨高雄 Safety control method for copyright
US7143289B2 (en) 2000-10-30 2006-11-28 Geocodex Llc System and method for delivering encrypted information in a communication network using location identity and key tables
WO2002037749A1 (en) 2000-11-03 2002-05-10 Fusionone, Inc. Secure authentication of users via intermediate parties
US7191252B2 (en) * 2000-11-13 2007-03-13 Digital Doors, Inc. Data security system and method adjunct to e-mail, browser or telecom program
US7322047B2 (en) 2000-11-13 2008-01-22 Digital Doors, Inc. Data security system and method associated with data mining
US7349987B2 (en) * 2000-11-13 2008-03-25 Digital Doors, Inc. Data security system and method with parsing and dispersion techniques
US7313825B2 (en) * 2000-11-13 2007-12-25 Digital Doors, Inc. Data security system and method for portable device
US7103915B2 (en) 2000-11-13 2006-09-05 Digital Doors, Inc. Data security system and method
US7669051B2 (en) 2000-11-13 2010-02-23 DigitalDoors, Inc. Data security system and method with multiple independent levels of security
US7140044B2 (en) 2000-11-13 2006-11-21 Digital Doors, Inc. Data security system and method for separation of user communities
US20030058274A1 (en) * 2000-11-17 2003-03-27 Jake Hill Interface device
KR100471018B1 (en) * 2000-11-28 2005-03-08 스미도모쥬기가이고교 가부시키가이샤 Gap adjustment apparatus and gap adjustment method for adjusting gap between two objects
US20020129235A1 (en) 2001-01-11 2002-09-12 Ryuichi Okamoto Digital data distributing system
US20020071566A1 (en) * 2000-12-11 2002-06-13 Kurn David Michael Computer system employing a split-secret cryptographic key linked to a password-based cryptographic key security scheme
US20020075844A1 (en) 2000-12-15 2002-06-20 Hagen W. Alexander Integrating public and private network resources for optimized broadband wireless access and method
US6675261B2 (en) 2000-12-22 2004-01-06 Oblix, Inc. Request based caching of data store data
US20030084020A1 (en) * 2000-12-22 2003-05-01 Li Shu Distributed fault tolerant and secure storage
JP4074057B2 (en) 2000-12-28 2008-04-09 株式会社東芝 Method for sharing encrypted data area among tamper resistant processors
US20040133606A1 (en) 2003-01-02 2004-07-08 Z-Force Communications, Inc. Directory aggregation for files distributed over a plurality of servers in a switched file system
AU2002234258A1 (en) 2001-01-22 2002-07-30 Sun Microsystems, Inc. Peer-to-peer network computing platform
US7440953B2 (en) * 2001-01-25 2008-10-21 Content Directions, Inc. Apparatus, method and system for directory quality assurance
DE10110049A1 (en) 2001-03-02 2002-09-05 Bosch Gmbh Robert Encryption of program data for use in control devices or controllers, involves using decryption key within the control device, to reduce the amount of data to transfer
US7277958B2 (en) 2001-03-12 2007-10-02 Edgestream, Inc. Re-assembly of streaming files from separate connections
US7043637B2 (en) 2001-03-21 2006-05-09 Microsoft Corporation On-disk file format for a serverless distributed file system
US7050583B2 (en) 2001-03-29 2006-05-23 Etreppid Technologies, Llc Method and apparatus for streaming data using rotating cryptographic keys
JP2002314549A (en) 2001-04-18 2002-10-25 Nec Corp User authentication system and user authentication method used for the same
US7349539B2 (en) * 2001-05-04 2008-03-25 Hewlett-Packard Development Company, L.P. Encoding and encrypting devices for secure scalable data streaming
US6938155B2 (en) 2001-05-24 2005-08-30 International Business Machines Corporation System and method for multiple virtual private network authentication schemes
US7003662B2 (en) 2001-05-24 2006-02-21 International Business Machines Corporation System and method for dynamically determining CRL locations and access methods
US20020178240A1 (en) 2001-05-24 2002-11-28 International Business Machines Corporation System and method for selectively confirming digital certificates in a virtual private network
DE10129285C2 (en) * 2001-06-18 2003-01-09 Hans-Joachim Mueschenborn Encryption procedure with arbitrary selectable one-time keys
US20030023958A1 (en) 2001-07-17 2003-01-30 Patel Mukesh K. Intermediate language accelerator chip
EP1413119B1 (en) * 2001-08-04 2006-05-17 Kontiki, Inc. Method and apparatus for facilitating distributed delivery of content across a computer network
US6745209B2 (en) * 2001-08-15 2004-06-01 Iti, Inc. Synchronization of plural databases in a database replication system
EP1284568A1 (en) 2001-08-17 2003-02-19 Siemens Aktiengesellschaft Method and data processing unit for the transmission of data through different interfaces
US7171685B2 (en) 2001-08-23 2007-01-30 International Business Machines Corporation Standard format specification for automatically configuring IP security tunnels
JP2003076647A (en) 2001-08-31 2003-03-14 Hitachi Ltd Mail transmitting/receiving method, and device using it
US20030051159A1 (en) * 2001-09-11 2003-03-13 Mccown Steven H Secure media transmission with incremental decryption
US7228337B1 (en) 2001-09-11 2007-06-05 Cisco Technology, Inc. Methods and apparatus for providing a network service to a virtual machine
US7085827B2 (en) 2001-09-20 2006-08-01 Hitachi, Ltd. Integrated service management system for remote customer support
US20030061481A1 (en) 2001-09-26 2003-03-27 David Levine Secure broadcast system and method
US20050210243A1 (en) 2001-09-28 2005-09-22 Archard Paul L System and method for improving client response times using an integrated security and packet optimization framework
CA2358980A1 (en) 2001-10-12 2003-04-12 Karthika Technologies Inc. Distributed security architecture for storage area networks (san)
JP2003132234A (en) 2001-10-23 2003-05-09 Global Friendship Inc Electronic information delivery system available for trial
US20030084397A1 (en) 2001-10-31 2003-05-01 Exanet Co. Apparatus and method for a distributed raid
GB2381916B (en) 2001-11-08 2005-03-23 Ncr Int Inc Biometrics template
WO2003042988A1 (en) 2001-11-15 2003-05-22 Sony Corporation System and method for controlling the use and duplication of digital content distributed on removable media
US7069464B2 (en) 2001-11-21 2006-06-27 Interdigital Technology Corporation Hybrid parallel/serial bus interface
US7921288B1 (en) 2001-12-12 2011-04-05 Hildebrand Hal S System and method for providing different levels of key security for controlling access to secured items
KR100463842B1 (en) 2001-12-27 2004-12-29 한국전자통신연구원 Apparatus for managing key in afile security system and method for managing security key
JP2003229843A (en) * 2002-01-31 2003-08-15 Sony Corp Streaming system and streaming method, client terminal and contents data decoding method, stream server and stream distribution method, authoring device and authoring method, and program and recording medium
TWI259366B (en) 2002-02-20 2006-08-01 Nagracard Sa Data block storing method in a memory
US20030167408A1 (en) * 2002-03-01 2003-09-04 Fitzpatrick Gregory P. Randomized bit dispersal of sensitive data sets
US20030178355A1 (en) 2002-03-25 2003-09-25 Dale Beach Reverse osmosis tank with integral quick release fitting
US20030188153A1 (en) 2002-04-02 2003-10-02 Demoff Jeff S. System and method for mirroring data using a server
JP4110098B2 (en) 2002-04-11 2008-07-02 インターナショナル・ビジネス・マシーンズ・コーポレーション Computer apparatus, computer apparatus security setting method, and program
US20030204602A1 (en) 2002-04-26 2003-10-30 Hudson Michael D. Mediated multi-source peer content delivery network architecture
JP4211282B2 (en) 2002-05-14 2009-01-21 ソニー株式会社 Data storage method, data storage system, data recording control device, data recording command device, data receiving device, and information processing terminal
US7116665B2 (en) 2002-06-04 2006-10-03 Fortinet, Inc. Methods and systems for a distributed provider edge
US7203844B1 (en) 2002-06-20 2007-04-10 Oxford William V Method and system for a recursive security protocol for digital copyright control
GB2389929A (en) 2002-06-21 2003-12-24 Armoursoft Ltd Computer Encryption Systems
US20030236943A1 (en) 2002-06-24 2003-12-25 Delaney William P. Method and systems for flyby raid parity generation
US7213158B2 (en) 2002-06-28 2007-05-01 Lenovo (Singapore) Pte. Ltd. Distributed autonomic backup
US7111303B2 (en) 2002-07-16 2006-09-19 International Business Machines Corporation Virtual machine operating system LAN
US20040022390A1 (en) 2002-08-02 2004-02-05 Mcdonald Jeremy D. System and method for data protection and secure sharing of information over a computer network
US7469340B2 (en) 2002-08-07 2008-12-23 Kryptiq Corporation Selective encryption of electronic messages and data
US7107385B2 (en) 2002-08-09 2006-09-12 Network Appliance, Inc. Storage virtualization by layering virtual disk objects on a file system
US7234063B1 (en) 2002-08-27 2007-06-19 Cisco Technology, Inc. Method and apparatus for generating pairwise cryptographic transforms based on group keys
US20040078542A1 (en) 2002-10-14 2004-04-22 Fuller William Tracy Systems and methods for transparent expansion and management of online electronic storage
US7191410B1 (en) 2002-12-02 2007-03-13 Sap Ag Managing information display
US7428751B2 (en) * 2002-12-05 2008-09-23 Microsoft Corporation Secure recovery in a serverless distributed file system
JP2004185573A (en) 2002-12-06 2004-07-02 Nec Infrontia Corp Data writing method and device
US7565688B2 (en) 2002-12-23 2009-07-21 Hewlett-Packard Development Company, L.P. Network demonstration techniques
US7072917B2 (en) 2003-04-24 2006-07-04 Neopath Networks, Inc. Extended storage capacity for a network file server
US7774593B2 (en) * 2003-04-24 2010-08-10 Panasonic Corporation Encrypted packet, processing device, method, program, and program recording medium
US7478427B2 (en) 2003-05-05 2009-01-13 Alcatel-Lucent Usa Inc. Method and apparatus for providing adaptive VPN to enable different security levels in virtual private networks (VPNs)
FI118619B (en) * 2003-05-16 2008-01-15 Jarmo Talvitie Method and system for encrypting and storing information
US7356818B2 (en) 2003-06-24 2008-04-08 International Business Machines Corporation Virtual machine communicating to external device without going through other virtual machines by using a list of IP addresses managed only by a single virtual machine monitor
US7448080B2 (en) 2003-06-30 2008-11-04 Nokia, Inc. Method for implementing secure corporate communication
US7730543B1 (en) 2003-06-30 2010-06-01 Satyajit Nath Method and system for enabling users of a group shared across multiple file security systems to access secured files
US20050036623A1 (en) 2003-08-15 2005-02-17 Ming-Jye Sheu Methods and apparatus for distribution of global encryption key in a wireless transport network
US7590840B2 (en) 2003-09-26 2009-09-15 Randy Langer Method and system for authorizing client devices to receive secured data streams
US7827409B2 (en) 2003-10-07 2010-11-02 Koolspan, Inc. Remote secure authorization
KR100561846B1 (en) 2003-10-08 2006-03-16 삼성전자주식회사 Weighted secret sharing and recovering method
US7594275B2 (en) 2003-10-14 2009-09-22 Microsoft Corporation Digital rights management system
JP2005136739A (en) 2003-10-30 2005-05-26 Furukawa Electric Co Ltd:The Data relay method, data relay device and data relay system
US7596570B1 (en) * 2003-11-04 2009-09-29 Emigh Aaron T Data sharing
US7346925B2 (en) 2003-12-11 2008-03-18 Microsoft Corporation Firewall tunneling and security service
US7609687B2 (en) 2003-12-15 2009-10-27 Panasonic Corporation Home agent apparatus, mobile router communication system, and communication method
US20050132060A1 (en) 2003-12-15 2005-06-16 Richard Mo Systems and methods for preventing spam and denial of service attacks in messaging, packet multimedia, and other networks
US7222062B2 (en) 2003-12-23 2007-05-22 Intel Corporation Method and system to support a trusted set of operational environments using emulated trusted hardware
US7346773B2 (en) 2004-01-12 2008-03-18 Cisco Technology, Inc. Enabling stateless server-based pre-shared secrets
US7305706B2 (en) 2004-01-15 2007-12-04 Cisco Technology, Inc. Establishing a virtual private network for a road warrior
JP4489455B2 (en) 2004-02-16 2010-06-23 株式会社日立製作所 Disk control device and control method of disk control device
US10375023B2 (en) 2004-02-20 2019-08-06 Nokia Technologies Oy System, method and computer program product for accessing at least one virtual private network
JP2005244379A (en) 2004-02-25 2005-09-08 Nec Commun Syst Ltd Vpn system, vpn apparatus, and encryption key distribution method used for them
EP1723741B1 (en) * 2004-03-09 2013-07-10 Thomson Licensing Secure data transmission via multichannel entitlement management and control
US7760988B2 (en) 2004-03-09 2010-07-20 Panasonic Corporation Content use device and recording medium
WO2005091141A1 (en) 2004-03-19 2005-09-29 Zakrytoe Aktsionernoe Obschestvo 'intel A/O' Failover and load balancing
JP4601979B2 (en) 2004-03-22 2010-12-22 エヌ・ティ・ティ・コムウェア株式会社 Certificate mutual authentication system and certificate mutual authentication method
US7535905B2 (en) 2004-03-31 2009-05-19 Microsoft Corporation Signing and validating session initiation protocol routing headers
ATE509321T1 (en) 2004-04-02 2011-05-15 Panasonic Corp SYSTEM FOR DETECTING UNAUTHORIZED CONTENT
US7940932B2 (en) 2004-04-08 2011-05-10 Texas Instruments Incorporated Methods, apparatus, and systems for securing SIM (subscriber identity module) personalization and other data on a first processor and secure communication of the SIM data to a second processor
US7188203B2 (en) 2004-05-25 2007-03-06 Hewlett-Packard Development Company, L.P. Method and apparatus for dynamic suppression of spurious interrupts
US7506170B2 (en) 2004-05-28 2009-03-17 Microsoft Corporation Method for secure access to multiple secure networks
US7203871B2 (en) * 2004-06-03 2007-04-10 Cisco Technology, Inc. Arrangement in a network node for secure storage and retrieval of encoded data distributed among multiple network nodes
US20050289218A1 (en) 2004-06-28 2005-12-29 Rothman Michael A Method to enable remote storage utilization
US20060075225A1 (en) 2004-06-30 2006-04-06 Flynn James P Digital content protection for peer to peer networks
US7254837B2 (en) 2004-07-13 2007-08-07 Fields Daniel M Apparatus and method for storing and distributing encrypted digital content
US9264384B1 (en) 2004-07-22 2016-02-16 Oracle International Corporation Resource virtualization mechanism including virtual host bus adapters
US8412685B2 (en) 2004-07-26 2013-04-02 Riverbed Technology, Inc. Method and system for managing data
US8185947B2 (en) 2006-07-12 2012-05-22 Avaya Inc. System, method and apparatus for securely exchanging security keys and monitoring links in a IP communications network
US7428754B2 (en) 2004-08-17 2008-09-23 The Mitre Corporation System for secure computing using defense-in-depth architecture
US20060046728A1 (en) 2004-08-27 2006-03-02 Samsung Electronics Co., Ltd. Cellular mobile communication system and method using heterogeneous wireless network
US7174385B2 (en) * 2004-09-03 2007-02-06 Microsoft Corporation System and method for receiver-driven streaming in a peer-to-peer network
US20060075222A1 (en) 2004-10-06 2006-04-06 Seamus Moloney System for personal group management based on subscriber certificates
EP1645992A1 (en) 2004-10-08 2006-04-12 Philip Morris Products S.A. Methods and systems for marking, tracking and authentication of products
WO2006042155A2 (en) 2004-10-08 2006-04-20 E-Klone, Inc. Floating vector scrambling methods and apparatus
TWI310275B (en) 2004-10-19 2009-05-21 Nec Corp Virtual private network gateway device and hosting system
US7472105B2 (en) 2004-10-19 2008-12-30 Palo Alto Research Center Incorporated System and method for providing private inference control
EP1825412A1 (en) 2004-10-25 2007-08-29 Rick L. Orsini Secure data parser method and system
US7831995B2 (en) 2004-10-29 2010-11-09 CORE, SDI, Inc. Establishing and enforcing security and privacy policies in web-based applications
JP4390808B2 (en) 2004-11-17 2009-12-24 富士通株式会社 Portable wireless terminal and security system thereof
JP4713881B2 (en) 2004-12-16 2011-06-29 パナソニック電工株式会社 Tunnel automatic setting device, tunnel automatic setting method, and tunnel automatic setting program
FR2880485B1 (en) 2005-01-06 2007-03-16 Canon Europa Nv Naamlooze Venn METHODS FOR STORING AND READING CONTENT, SUCH AS A CONTENT PROTECTION PROTOCOL, CORRESPONDING SOURCE, STORAGE DEVICES AND RECEIVER.
US8700729B2 (en) 2005-01-21 2014-04-15 Robin Dua Method and apparatus for managing credentials through a wireless network
US20100162004A1 (en) 2008-12-23 2010-06-24 David Dodgson Storage of cryptographically-split data blocks at geographically-separated locations
US20080072035A1 (en) 2005-01-31 2008-03-20 Johnson Robert A Securing multicast data
US7188230B2 (en) * 2005-02-15 2007-03-06 Hitachi, Ltd. Method of assuring data integrity on storage volumes
US8250643B2 (en) 2005-02-28 2012-08-21 Nec Corporation Communication device, communication system, communication method, and program
US7596741B2 (en) 2005-04-11 2009-09-29 Hewlett-Packard Development Company, L.P. Packet protection for header modification
US20060282681A1 (en) 2005-05-27 2006-12-14 Scheidt Edward M Cryptographic configuration control
US7577689B1 (en) 2005-06-15 2009-08-18 Adobe Systems Incorporated Method and system to archive data
WO2006138696A2 (en) 2005-06-17 2006-12-28 Genizon Biosciences, Inc. Genemap of the human genes associated with longevity
US7627125B2 (en) 2005-06-23 2009-12-01 Efunds Corporation Key loading systems and methods
JP4321501B2 (en) 2005-06-29 2009-08-26 ブラザー工業株式会社 Image forming apparatus
US8195976B2 (en) 2005-06-29 2012-06-05 International Business Machines Corporation Fault-tolerance and fault-containment models for zoning clustered application silos into continuous availability and high availability zones in clustered systems during recovery and maintenance
US8352782B2 (en) 2005-09-30 2013-01-08 Cleversafe, Inc. Range based rebuilder for use with a dispersed data storage network
US8880799B2 (en) * 2005-09-30 2014-11-04 Cleversafe, Inc. Rebuilding data on a dispersed storage network
US7546427B2 (en) * 2005-09-30 2009-06-09 Cleversafe, Inc. System for rebuilding dispersed data
US7499905B2 (en) 2005-10-17 2009-03-03 Cisco Technology, Inc. Method and apparatus for accessing information based on distributed file system (DFS) paths
TWI298128B (en) 2005-10-20 2008-06-21 Ind Tech Res Inst Method and system for managing distributed storage of digital contents
EP1839405B1 (en) * 2005-10-27 2013-04-24 NDS Limited Network security system
CN105978683A (en) 2005-11-18 2016-09-28 安全第公司 Secure data parser method and system
JP4482630B2 (en) * 2005-11-21 2010-06-16 インターナショナル・ビジネス・マシーンズ・コーポレーション Communication apparatus and communication method
US20070124584A1 (en) 2005-11-30 2007-05-31 Microsoft Corporation Proving ownership of shared information to a third party
JP4635855B2 (en) 2005-12-13 2011-02-23 株式会社日立製作所 Data communication method and system
US20070143315A1 (en) 2005-12-21 2007-06-21 Alan Stone Inter-partition communication in a virtualization environment
EP1969836A1 (en) 2005-12-29 2008-09-17 United Video Properties, Inc. Systems and methods for accessing media program options based on program segment interest
US20070157025A1 (en) 2005-12-30 2007-07-05 Intel Corporation Method and system for providing security and reliability to collaborative applications
US7649992B2 (en) * 2006-01-06 2010-01-19 Fujitsu Limited Apparatuses for encoding, decoding, and authenticating data in cipher block chaining messaging authentication code
EP2030115A4 (en) * 2006-05-31 2012-08-22 Ibm Method and system for transformation of logical data objects for storage
JP2007334836A (en) 2006-06-19 2007-12-27 Canon Inc Information processor, data holding device and control method therefor, computer program, and storage medium
US20080046752A1 (en) 2006-08-09 2008-02-21 Stefan Berger Method, system, and program product for remotely attesting to a state of a computer system
US8040850B2 (en) 2006-08-21 2011-10-18 Qualcomm Incorporated Advanced internet protocol with flash-OFDM methods and systems
US7865741B1 (en) 2006-08-23 2011-01-04 Netapp, Inc. System and method for securely replicating a configuration database of a security appliance
US8397083B1 (en) 2006-08-23 2013-03-12 Netapp, Inc. System and method for efficiently deleting a file from secure storage served by a storage system
US8761401B2 (en) 2006-08-28 2014-06-24 Motorola Mobility Llc System and method for secure key distribution to manufactured products
US20080126614A1 (en) 2006-09-26 2008-05-29 Giap Yong Ooi Input/output (I/O) device virtualization using hardware
JP4816375B2 (en) 2006-09-28 2011-11-16 富士ゼロックス株式会社 Information processing system, information processing apparatus, and program
CN101155183B (en) 2006-09-29 2012-02-08 松下电器产业株式会社 Method and network device for processing nest-shaped internet security protocol channel
US8190905B1 (en) 2006-09-29 2012-05-29 Netapp, Inc. Authorizing administrative operations using a split knowledge protocol
JP2008103936A (en) 2006-10-18 2008-05-01 Toshiba Corp Secret information management device, and secret information management system
US8060088B2 (en) 2006-11-07 2011-11-15 Nokia Corporation Method, network element and communication system for optimized selection of an agent entity as well as modules of the network element
CN101569132B (en) * 2006-11-07 2013-04-17 安全第一公司 Systems and methods for distributing and securing data
DE102006055480A1 (en) 2006-11-24 2008-05-29 Bayer Innovation Gmbh Coding method, decoding method, codec and data carrier for holographic storage
GB2446199A (en) * 2006-12-01 2008-08-06 David Irvine Secure, decentralised and anonymous peer-to-peer network
US8904080B2 (en) * 2006-12-05 2014-12-02 Security First Corp. Tape backup method
US8112622B2 (en) 2006-12-08 2012-02-07 Broadcom Corporation Chaining port scheme for network security
US20080147821A1 (en) * 2006-12-19 2008-06-19 Dietrich Bradley W Managed peer-to-peer content backup service system and method using dynamic content dispersal to plural storage nodes
US8161543B2 (en) 2006-12-22 2012-04-17 Aruba Networks, Inc. VLAN tunneling
US20080155051A1 (en) 2006-12-23 2008-06-26 Simpletech, Inc. Direct file transfer system and method for a computer network
CN101212393B (en) 2006-12-29 2010-10-13 华为技术有限公司 Medium independent switching message transmission method, system, and device
US8468244B2 (en) 2007-01-05 2013-06-18 Digital Doors, Inc. Digital information infrastructure and method for security designated data and with granular data stores
US8958562B2 (en) * 2007-01-16 2015-02-17 Voltage Security, Inc. Format-preserving cryptographic systems
FR2912020B1 (en) 2007-01-26 2009-03-06 Thales Sa METHOD FOR SECURING THE TRANSMISSION OF INFORMATION.
US8892905B2 (en) 2007-03-21 2014-11-18 Oracle International Corporation Method and apparatus for performing selective encryption/decryption in a data storage system
JP2008250369A (en) 2007-03-29 2008-10-16 Sorun Corp Management method of secrete data file, management system and proxy server therefor
JP2008250931A (en) 2007-03-30 2008-10-16 Toshiba Corp System for restoring distributed information, information utilizing device, and verification device
US20080297326A1 (en) 2007-03-30 2008-12-04 Skyetek, Inc. Low Cost RFID Tag Security And Privacy System And Method
JP2008250779A (en) 2007-03-30 2008-10-16 Hitachi Ltd Storage control device having encryption function, data encryption method, and storage system
US8140676B2 (en) 2007-04-10 2012-03-20 Apertio Limited Data access in distributed server systems
CA2684229A1 (en) 2007-04-12 2008-10-23 Ncipher Corporation Ltd. Method and system for identifying and managing keys
JP4900816B2 (en) 2007-05-11 2012-03-21 株式会社日立製作所 Storage control device and control method of storage control device
GB0709527D0 (en) 2007-05-18 2007-06-27 Surfcontrol Plc Electronic messaging system, message processing apparatus and message processing method
TWI402698B (en) 2007-05-24 2013-07-21 Via Tech Inc Data distribution access method and system
EP2158532A1 (en) 2007-06-14 2010-03-03 Tech-Linx Sdn. Bhd. Presentation system
US7926090B2 (en) 2007-07-13 2011-04-12 Erf Wireless, Inc. Separate secure networks over a non-secure network
US8189769B2 (en) 2007-07-31 2012-05-29 Apple Inc. Systems and methods for encrypting data
US8032741B2 (en) 2007-08-22 2011-10-04 Intel Corporation Method and apparatus for virtualization of a multi-context hardware trusted platform module (TPM)
WO2009032712A2 (en) 2007-08-29 2009-03-12 Nirvanix, Inc. Method and system for moving requested files from one storage location to another
CN102932136B (en) 2007-09-14 2017-05-17 安全第一公司 Systems and methods for managing cryptographic keys
US8307443B2 (en) 2007-09-28 2012-11-06 Microsoft Corporation Securing anti-virus software with virtualization
WO2009046400A1 (en) 2007-10-05 2009-04-09 Interdigital Technology Corporation Techniques for secure channelization between uicc and a terminal
US20090097657A1 (en) 2007-10-05 2009-04-16 Scheidt Edward M Constructive Channel Key
JP2009111437A (en) 2007-10-26 2009-05-21 Hitachi Ltd Network system
US8261265B2 (en) 2007-10-30 2012-09-04 Vmware, Inc. Transparent VMM-assisted user-mode execution control transfer
CN101179356A (en) 2007-11-28 2008-05-14 中国海洋石油总公司 Data transmitting, receiving method and device
US9349127B2 (en) 2007-11-29 2016-05-24 Visa Usa Inc. Serial number and payment data based payment card processing
US7548556B1 (en) 2007-12-14 2009-06-16 Raptor Networks Technology, Inc. Secure communication through a network fabric
US7392403B1 (en) 2007-12-19 2008-06-24 International Business Machines Corporation Systems, methods and computer program products for high availability enhancements of virtual security module servers
JP2009157584A (en) 2007-12-26 2009-07-16 Hitachi Ltd Computing system, storage system, and remote copy method
EP2106642A4 (en) 2008-01-07 2015-12-02 Security First Corp Systems and methods for securing data using multi-factor or keyed dispersal
US8855316B2 (en) 2008-01-25 2014-10-07 Qinetiq Limited Quantum cryptography apparatus
CN103281190B (en) 2008-02-22 2018-03-09 安全第一公司 Systems and methods for secure workgroup management and communication
US8473779B2 (en) 2008-02-29 2013-06-25 Assurance Software And Hardware Solutions, Llc Systems and methods for error correction and detection, isolation, and recovery of faults in a fail-in-place storage array
US8959199B2 (en) 2008-03-18 2015-02-17 Reduxio Systems Ltd. Network storage system for a download intensive environment
US20090292930A1 (en) 2008-04-24 2009-11-26 Marano Robert F System, method and apparatus for assuring authenticity and permissible use of electronic documents
US8755322B2 (en) 2008-04-24 2014-06-17 Nokia Corporation Method, apparatus, and computer program product for providing internet protocol multicast transport
US9209975B2 (en) 2008-10-15 2015-12-08 Ricoh Company, Ltd. Secure access of electronic documents and data from client terminal
US9235705B2 (en) 2008-05-19 2016-01-12 Wontok, Inc. Secure virtualization system software
US8352740B2 (en) 2008-05-23 2013-01-08 Microsoft Corporation Secure execution environment on external device
US8837491B2 (en) 2008-05-27 2014-09-16 Glue Networks Regional virtual VPN
US8615084B2 (en) 2008-05-29 2013-12-24 Red Hat, Inc. Extending a secret bit string to safeguard the secret
US8397084B2 (en) 2008-06-12 2013-03-12 Microsoft Corporation Single instance storage of encrypted data
US20090316892A1 (en) 2008-06-20 2009-12-24 Candelore Brant L Crypto micro-module using IEEE 1394 for stream descrambling
US20100005028A1 (en) 2008-07-07 2010-01-07 International Business Machines Corporation Method and apparatus for interconnecting a plurality of virtual world environments
EP2148488A1 (en) 2008-07-24 2010-01-27 Irdeto Access B.V. Peer-to-peer content distribution
US7995764B2 (en) 2008-08-28 2011-08-09 Red Hat, Inc. Sharing a secret using hyperplanes over GF(2m)
TW201015322A (en) 2008-10-08 2010-04-16 Ee Solutions Inc Method and system for data secured data recovery
CN102273127A (en) 2008-11-14 2011-12-07 Oki半导体株式会社 Confidential information transmission method, confidential information transmission system, and confidential information transmission device
US20100153703A1 (en) 2008-12-17 2010-06-17 David Dodgson Storage security using cryptographic splitting
US8135980B2 (en) 2008-12-23 2012-03-13 Unisys Corporation Storage availability using cryptographic splitting
US20100162001A1 (en) * 2008-12-23 2010-06-24 David Dodgson Secure network attached storage device using cryptographic settings
US20100169662A1 (en) * 2008-12-30 2010-07-01 Scott Summers Simultaneous state-based cryptographic splitting in a secure storage appliance
EP2359296B1 (en) 2008-11-17 2021-08-18 Unisys Corporation Simultaneous state-based cryptographic splitting in a secure storage appliance
US20100154053A1 (en) * 2008-12-17 2010-06-17 David Dodgson Storage security using cryptographic splitting
US20100125730A1 (en) 2008-11-17 2010-05-20 David Dodgson Block-level data storage security system
US20100161964A1 (en) 2008-12-23 2010-06-24 David Dodgson Storage communities of interest using cryptographic splitting
US20100150341A1 (en) * 2008-12-17 2010-06-17 David Dodgson Storage security using cryptographic splitting
US20100162003A1 (en) * 2008-12-23 2010-06-24 David Dodgson Retrieval of cryptographically-split data blocks from fastest-responding storage devices
US20100161981A1 (en) * 2008-12-23 2010-06-24 David Dodgson Storage communities of interest using cryptographic splitting
US8392682B2 (en) * 2008-12-17 2013-03-05 Unisys Corporation Storage security using cryptographic splitting
US9008314B2 (en) 2008-11-18 2015-04-14 Verizon Patent And Licensing Inc. Secure wireless communications
CN101409714A (en) 2008-11-18 2009-04-15 华南理工大学 Firewall system based on virtual machine
US7987262B2 (en) 2008-11-19 2011-07-26 Accenture Global Services Limited Cloud computing assessment tool
US8095800B2 (en) 2008-11-20 2012-01-10 General Dynamics C4 System, Inc. Secure configuration of programmable logic device
US8151333B2 (en) * 2008-11-24 2012-04-03 Microsoft Corporation Distributed single sign on technologies including privacy protection and proactive updating
US7930519B2 (en) 2008-12-17 2011-04-19 Advanced Micro Devices, Inc. Processor with coprocessor interfacing functional unit for forwarding result from coprocessor to retirement unit
US20100158244A1 (en) 2008-12-23 2010-06-24 Inventec Corporation Communication encryption method for supporting remote monitoring and control system
JP5637552B2 (en) 2009-02-17 2014-12-10 日本電気株式会社 Storage system
US8473757B2 (en) 2009-02-18 2013-06-25 Cisco Technology, Inc. Protecting digital data such as images on a device with image acquisition capabilities
US8464252B2 (en) 2009-02-27 2013-06-11 Red Hat, Inc. Per process virtual machines
US8732468B2 (en) 2009-03-09 2014-05-20 The Regents Of The University Of Michigan Protecting hardware circuit design by secret sharing
US20100235833A1 (en) 2009-03-13 2010-09-16 Liquid Computing Corporation Methods and systems for providing secure image mobility
US8135748B2 (en) 2009-04-10 2012-03-13 PHD Virtual Technologies Virtual machine data replication
US9483656B2 (en) 2009-04-20 2016-11-01 International Business Machines Corporation Efficient and secure data storage utilizing a dispersed data storage system
WO2010127266A1 (en) 2009-05-01 2010-11-04 Citrix Systems, Inc. Systems and methods for providing a virtual appliance in an application delivery fabric
US8578076B2 (en) 2009-05-01 2013-11-05 Citrix Systems, Inc. Systems and methods for establishing a cloud bridge between virtual storage resources
CN102428686A (en) 2009-05-19 2012-04-25 安全第一公司 Systems and methods for securing data in the cloud
US8321688B2 (en) 2009-06-12 2012-11-27 Microsoft Corporation Secure and private backup storage and processing for trusted computing and data services
US8352941B1 (en) 2009-06-29 2013-01-08 Emc Corporation Scalable and secure high-level storage access for cloud computing platforms
US20110035497A1 (en) 2009-08-05 2011-02-10 Dynamic Network Services, Inc. System and method for providing global server load balancing
US8402246B1 (en) 2009-08-28 2013-03-19 Violin Memory, Inc. Alignment adjustment in a tiered storage system
EP2309700B1 (en) 2009-10-08 2013-02-27 Alcatel Lucent A method and a system for transferring data in a telecommunication network, a server, a storage, a computer program and a computer program product
US20110085667A1 (en) 2009-10-09 2011-04-14 Adgregate Markets, Inc. Various methods and apparatuses for securing an application container
EP2504973B1 (en) 2009-11-25 2016-11-16 Security First Corp. Systems and methods for securing data in motion
US9268466B2 (en) 2009-12-09 2016-02-23 Citrix Systems, Inc. Methods and systems for updating a dock with a user interface element representative of a remote application
US8037187B2 (en) 2009-12-11 2011-10-11 International Business Machines Corporation Resource exchange management within a cloud computing environment
US8341115B1 (en) 2009-12-26 2012-12-25 Emc Corporation Dynamically switching between synchronous and asynchronous replication
US8239655B2 (en) 2010-01-18 2012-08-07 Vmware, Inc. Virtual target addressing during direct data access via VF of IO storage adapter
JP2013524352A (en) 2010-03-31 2013-06-17 セキュリティー ファースト コーポレイション System and method for securing data in motion
US20110258257A1 (en) 2010-04-20 2011-10-20 Cisco Technology, Inc. Proximity aggregated network topology algorithm (panta)
US8824492B2 (en) 2010-05-28 2014-09-02 Drc Computer Corporation Accelerator system for remote data storage
WO2012021734A1 (en) 2010-08-11 2012-02-16 Orsini Rick L Systems and methods for secure multi-tenant data storage
US9275071B2 (en) 2010-08-12 2016-03-01 Security First Corp. Systems and methods for secure remote storage
US8489699B2 (en) 2010-08-13 2013-07-16 Vmware, Inc. Live migration of virtual machine during direct access to storage over SR IOV adapter
CN106372499A (en) 2010-08-18 2017-02-01 安全第公司 Systems and methods for securing virtual machine computing environments
US8397288B2 (en) 2010-08-25 2013-03-12 Itron, Inc. System and method for operation of open connections for secure network communications
EP2619939A2 (en) 2010-09-20 2013-07-31 Rick L. Orsini Systems and methods for secure data sharing
US8831677B2 (en) 2010-11-17 2014-09-09 Antony-Euclid C. Villa-Real Customer-controlled instant-response anti-fraud/anti-identity theft devices (with true-personal identity verification), method and systems for secured global applications in personal/business e-banking, e-commerce, e-medical/health insurance checker, e-education/research/invention, e-disaster advisor, e-immigration, e-airport/aircraft security, e-military/e-law enforcement, with or without NFC component and system, with cellular/satellite phone/internet/multi-media functions
US9196305B2 (en) 2011-01-28 2015-11-24 Apple Inc. Smart transitions
US8839363B2 (en) 2011-04-18 2014-09-16 Bank Of America Corporation Trusted hardware for attesting to authenticity in a cloud environment
US8601134B1 (en) 2011-06-30 2013-12-03 Amazon Technologies, Inc. Remote storage gateway management using gateway-initiated connections
US9268651B1 (en) 2012-10-31 2016-02-23 Amazon Technologies, Inc. Efficient recovery of storage gateway cached volumes
US9092633B2 (en) 2013-01-17 2015-07-28 International Business Machines Corporation Authorizing removable medium access
GB2513260B (en) 2014-06-27 2018-06-13 PQ Solutions Ltd System and method for quorum-based data recovery
US9842227B2 (en) * 2014-09-23 2017-12-12 FHOOSH, Inc. Secure high speed data storage, access, recovery, and transmission
US9954680B1 (en) 2015-12-18 2018-04-24 EMC IP Holding Company LLC Secure management of a master encryption key in a split-key based distributed computing environment

Also Published As

Publication number Publication date
US8904194B2 (en) 2014-12-02
BRPI0517026A (en) 2008-09-30
CN102609640B (en) 2015-07-15
US20210152528A1 (en) 2021-05-20
US20120173883A1 (en) 2012-07-05
US20120222134A1 (en) 2012-08-30
CA2922200A1 (en) 2006-05-04
US9009848B2 (en) 2015-04-14
US20120166815A1 (en) 2012-06-28
WO2006047694A1 (en) 2006-05-04
US20150261973A1 (en) 2015-09-17
CN102609640A (en) 2012-07-25
US9047475B2 (en) 2015-06-02
AU2005299317A1 (en) 2006-05-04
US20130276074A1 (en) 2013-10-17
US9294444B2 (en) 2016-03-22
US11178116B2 (en) 2021-11-16
US20130283065A1 (en) 2013-10-24
US9338140B2 (en) 2016-05-10
CN101375284B (en) 2012-02-22
CA2584525C (en) 2012-09-25
US20140372770A1 (en) 2014-12-18
US9135456B2 (en) 2015-09-15
US20120159197A1 (en) 2012-06-21
US20120255035A1 (en) 2012-10-04
US20180367509A1 (en) 2018-12-20
US20060177061A1 (en) 2006-08-10
US20120221855A1 (en) 2012-08-30
US8769699B2 (en) 2014-07-01
EP1825412A1 (en) 2007-08-29
US8266438B2 (en) 2012-09-11
US9935923B2 (en) 2018-04-03
US9985932B2 (en) 2018-05-29
US20120221854A1 (en) 2012-08-30
US9871770B2 (en) 2018-01-16
US9992170B2 (en) 2018-06-05
US20230239276A1 (en) 2023-07-27
US9294445B2 (en) 2016-03-22
US20120226904A1 (en) 2012-09-06
US9177159B2 (en) 2015-11-03
US8271802B2 (en) 2012-09-18
US20120221856A1 (en) 2012-08-30
CA2922172A1 (en) 2006-05-04
US20150381582A1 (en) 2015-12-31
CN101375284A (en) 2009-02-25
US9906500B2 (en) 2018-02-27
US20130275768A1 (en) 2013-10-17
US20120255034A1 (en) 2012-10-04

Similar Documents

Publication Publication Date Title
CA2584525A1 (en) Secure data parser method and system
US7634659B2 (en) Roaming hardware paired encryption key generation
US7197142B2 (en) System and methods for a vernam stream cipher
EP1839405B1 (en) Network security system
US9483656B2 (en) Efficient and secure data storage utilizing a dispersed data storage system
US5796830A (en) Interoperable cryptographic key recovery system
US8218759B2 (en) System and method for encrypting data
US7260215B2 (en) Method for encryption in an un-trusted environment
US8396218B2 (en) Cryptographic module distribution system, apparatus, and program
US20070061572A1 (en) Authentication system and remotely-distributed storage system
US20180262326A1 (en) Protecting white-box feistel network implementation against fault attack
US9602273B2 (en) Implementing key scheduling for white-box DES implementation
JP3927501B2 (en) TCPA migratable keys
US20130191639A1 (en) System and method for securing communications between devices
US8681975B2 (en) Encryption method and apparatus using composition of ciphers
US20090060184A1 (en) Systems and Methods for Providing Autonomous Security
EP3291480B1 (en) Secure data transmission
WO2003032133A3 (en) Distributed security architecture for storage area networks (san)
CN106953723B (en) Splitting and merging method for preventing DFA attack
WO2012071717A1 (en) Data encryption and decryption method and device
US20030210791A1 (en) Key management
JP2004512734A (en) Generating a common encryption key
CA2585987A1 (en) System and method for protecting master encryption keys
CN111654511A (en) Chained data encryption method, chained data decryption method and corresponding systems
US20220191017A1 (en) Key management system providing secure management of cryptographic keys, and methods of operating the same

Legal Events

Date Code Title Description
EEER Examination request
MKLA Lapsed

Effective date: 20191025