WO1994001821A1 - Trusted path subsystem for workstations - Google Patents
Trusted path subsystem for workstations Download PDFInfo
- Publication number
- WO1994001821A1 WO1994001821A1 PCT/US1993/006511 US9306511W WO9401821A1 WO 1994001821 A1 WO1994001821 A1 WO 1994001821A1 US 9306511 W US9306511 W US 9306511W WO 9401821 A1 WO9401821 A1 WO 9401821A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- input
- trusted
- workstation
- output device
- data
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/42—User authentication using separate channels for security data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/84—Protecting input, output or interconnection devices output devices, e.g. displays or monitors
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0806—Details of the card
- G07F7/0813—Specific details related to card security
- G07F7/0826—Embedded security module
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/009—Trust
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2153—Using hardware token as a secondary aspect
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP93917094A EP0649546A1 (en) | 1992-07-10 | 1993-07-09 | Trusted path subsystem for workstations |
JP6503552A JPH07509086A (en) | 1992-07-10 | 1993-07-09 | Trusted path subsystem for workstations |
CA002139744A CA2139744A1 (en) | 1992-07-10 | 1993-07-09 | Trusted path subsystems for workstations |
AU46726/93A AU663406B2 (en) | 1992-07-10 | 1993-07-09 | Trusted path subsystem for workstations |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US07/911,900 US5596718A (en) | 1992-07-10 | 1992-07-10 | Secure computer network using trusted path subsystem which encrypts/decrypts and communicates with user through local workstation user I/O devices without utilizing workstation processor |
US07/911,900 | 1992-07-10 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1994001821A1 true WO1994001821A1 (en) | 1994-01-20 |
Family
ID=25431073
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US1993/006511 WO1994001821A1 (en) | 1992-07-10 | 1993-07-09 | Trusted path subsystem for workstations |
Country Status (7)
Country | Link |
---|---|
US (2) | US5596718A (en) |
EP (1) | EP0649546A1 (en) |
JP (1) | JPH07509086A (en) |
AU (1) | AU663406B2 (en) |
CA (1) | CA2139744A1 (en) |
IL (1) | IL106304A0 (en) |
WO (1) | WO1994001821A1 (en) |
Cited By (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0674253A1 (en) * | 1994-03-15 | 1995-09-27 | Kabushiki Kaisha Toshiba | Shared file editing system with file content secrecy, version management and asynchronous editing |
EP0750812A1 (en) * | 1994-03-18 | 1997-01-02 | Innovonics, Inc. | Methods and apparatus for interfacing an encryption module with a personal computer |
WO1997016779A2 (en) * | 1995-11-03 | 1997-05-09 | Esd Information Technology Entwicklungs Gmbh | Input security and transactions unit and process for input security and transactions involving digital information |
EP0825511A2 (en) * | 1996-08-23 | 1998-02-25 | Hewlett-Packard Company | Method and apparatus for trusted processing |
WO1998009209A1 (en) * | 1996-08-30 | 1998-03-05 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
WO1998019243A2 (en) * | 1996-10-30 | 1998-05-07 | Myspace Ab | Method and security system for processing a security critical activity |
ES2117495A1 (en) * | 1994-05-18 | 1998-08-01 | Penta 3 S A | Cryptography system. |
WO1998040983A1 (en) * | 1997-03-14 | 1998-09-17 | Innovonics, Inc. | Methods and apparatus for securely encrypting data in conjunction with a personal computer |
EP0929024A1 (en) * | 1998-01-07 | 1999-07-14 | Ian David Evans | Method and apparatus for preventing unintentional perusal of computer display information |
EP1056014A1 (en) * | 1999-05-28 | 2000-11-29 | Hewlett-Packard Company | System for providing a trustworthy user interface |
EP1055989A1 (en) * | 1999-05-28 | 2000-11-29 | Hewlett-Packard Company | System for digitally signing a document |
US6658568B1 (en) | 1995-02-13 | 2003-12-02 | Intertrust Technologies Corporation | Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management |
US6760840B1 (en) | 1994-03-15 | 2004-07-06 | Kabushiki Kaisha Toshiba | File editing system and shared file editing system with file content secrecy, file version management, and asynchronous editing |
FR2850813A1 (en) * | 2003-01-31 | 2004-08-06 | France Telecom | Electronic transaction securing device for use in electronic commerce, has analyzing unit to analyze intercepted signals from control, and quantifying unit retransmitting information quantified in secured mode to telephone |
FR2850772A1 (en) * | 2003-01-31 | 2004-08-06 | France Telecom | Electronic transaction securing device for use in electronic commerce, has analyzing unit to retransmit intercepted signals to processing unit without modification if they are not in order of passage in secured mode |
US6895503B2 (en) | 2001-05-31 | 2005-05-17 | Contentguard Holdings, Inc. | Method and apparatus for hierarchical assignment of rights to documents and documents having such rights |
US6996840B1 (en) | 1998-12-18 | 2006-02-07 | Myspace Ab | Method for executing a security critical activity |
GB2421093A (en) * | 2004-12-07 | 2006-06-14 | Symbian Software Ltd | Trusted user interface |
US7236455B1 (en) | 1999-02-15 | 2007-06-26 | Hewlett-Packard Development Company, L.P. | Communications between modules of a computing apparatus |
WO2010071947A1 (en) | 2008-12-24 | 2010-07-01 | The Commonwealth Of Australia | Digital video guard |
DE102009014572A1 (en) * | 2009-03-24 | 2010-09-30 | Giesecke & Devrient Gmbh | Method and device for the secure forwarding of input data |
US7882566B2 (en) | 2003-10-24 | 2011-02-01 | Microsoft Corporation | Providing secure input to a system with a high-assurance execution environment |
US7917749B2 (en) | 1995-02-13 | 2011-03-29 | Intertrust Technologies Corporation | Systems and methods for secure transaction management and electronic rights protection |
US7925898B2 (en) | 1996-08-12 | 2011-04-12 | Intertrust Technologies Corp. | Systems and methods using cryptography to protect secure computing environments |
US8510226B2 (en) | 1996-02-26 | 2013-08-13 | Graphon Corporation | Method for synchronous encryption between a client and a licensing agent |
US8584245B2 (en) | 2001-06-04 | 2013-11-12 | Hewlett-Packard Development Company, L.P. | Identifying a trusted computing entity |
US8639625B1 (en) | 1995-02-13 | 2014-01-28 | Intertrust Technologies Corporation | Systems and methods for secure transaction management and electronic rights protection |
US8862517B2 (en) | 2001-05-31 | 2014-10-14 | Contentguard Holdings, Inc. | Digital rights management of content when content is a future live event |
US8892473B2 (en) | 2001-05-31 | 2014-11-18 | Contentguard Holdings, Inc. | Method and system for subscription digital rights management |
US9953328B2 (en) | 1994-11-23 | 2018-04-24 | Contentguard Holdings, Inc. | Method and system for conducting transactions between repositories |
Families Citing this family (191)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5577209A (en) * | 1991-07-11 | 1996-11-19 | Itt Corporation | Apparatus and method for providing multi-level security for communication among computers and terminals on a network |
US6813769B1 (en) | 1997-10-28 | 2004-11-02 | Microsoft Corporation | Server application components with control over state duration |
AU700279B2 (en) * | 1994-05-26 | 1998-12-24 | Commonwealth Of Australia, The | Secure computer architecture |
WO1995033239A1 (en) * | 1994-05-26 | 1995-12-07 | The Commonwealth Of Australia | Secure computer architecture |
US6948070B1 (en) * | 1995-02-13 | 2005-09-20 | Intertrust Technologies Corporation | Systems and methods for secure transaction management and electronic rights protection |
US7095854B1 (en) | 1995-02-13 | 2006-08-22 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US6108787A (en) * | 1995-03-31 | 2000-08-22 | The Commonwealth Of Australia | Method and means for interconnecting different security level networks |
US5757924A (en) * | 1995-09-18 | 1998-05-26 | Digital Secured Networks Techolognies, Inc. | Network security device which performs MAC address translation without affecting the IP address |
US5713018A (en) * | 1995-09-27 | 1998-01-27 | Sun Microsystems, Inc. | System and method for providing safe SQL-level access to a database |
JP3982848B2 (en) * | 1995-10-19 | 2007-09-26 | 富士通株式会社 | Security level control device and network communication system |
US5748888A (en) * | 1996-05-29 | 1998-05-05 | Compaq Computer Corporation | Method and apparatus for providing secure and private keyboard communications in computer systems |
US6272538B1 (en) * | 1996-07-30 | 2001-08-07 | Micron Technology, Inc. | Method and system for establishing a security perimeter in computer networks |
US6993582B2 (en) * | 1996-07-30 | 2006-01-31 | Micron Technology Inc. | Mixed enclave operation in a computer network |
US5828753A (en) | 1996-10-25 | 1998-10-27 | Intel Corporation | Circuit and method for ensuring interconnect security within a multi-chip integrated circuit package |
US6006228A (en) * | 1996-12-11 | 1999-12-21 | Ncr Corporation | Assigning security levels to particular documents on a document by document basis in a database |
IL130774A0 (en) | 1997-01-03 | 2001-01-28 | Fortress Technologies Inc | Improved network security device |
US5978918A (en) * | 1997-01-17 | 1999-11-02 | Secure.Net Corporation | Security process for public networks |
SE508844C2 (en) * | 1997-02-19 | 1998-11-09 | Postgirot Bank Ab | Procedure for access control with SIM card |
US6182222B1 (en) * | 1997-03-25 | 2001-01-30 | Electronic Data Systems Corporation | Secure data storage system and method |
US6212636B1 (en) | 1997-05-01 | 2001-04-03 | Itt Manufacturing Enterprises | Method for establishing trust in a computer network via association |
US6014666A (en) * | 1997-10-28 | 2000-01-11 | Microsoft Corporation | Declarative and programmatic access control of component-based server applications using roles |
US5890161A (en) | 1997-10-28 | 1999-03-30 | Microsoft Corporation | Automatic transaction processing of component-based server applications |
US7076784B1 (en) | 1997-10-28 | 2006-07-11 | Microsoft Corporation | Software component execution management using context objects for tracking externally-defined intrinsic properties of executing software components within an execution environment |
US5958004A (en) | 1997-10-28 | 1999-09-28 | Microsoft Corporation | Disabling and enabling transaction committal in transactional application components |
US6134594A (en) | 1997-10-28 | 2000-10-17 | Microsoft Corporation | Multi-user, multiple tier distributed application architecture with single-user access control of middle tier objects |
US6631425B1 (en) | 1997-10-28 | 2003-10-07 | Microsoft Corporation | Just-in-time activation and as-soon-as-possible deactivation or server application components |
US5960080A (en) * | 1997-11-07 | 1999-09-28 | Justsystem Pittsburgh Research Center | Method for transforming message containing sensitive information |
US6128735A (en) * | 1997-11-25 | 2000-10-03 | Motorola, Inc. | Method and system for securely transferring a data set in a data communications system |
US6330610B1 (en) * | 1997-12-04 | 2001-12-11 | Eric E. Docter | Multi-stage data filtering system employing multiple filtering criteria |
WO1999028838A1 (en) * | 1997-12-04 | 1999-06-10 | Aveo, Inc. | Method and apparatus for multi-stage data filtering by a single device |
EP0935182A1 (en) * | 1998-01-09 | 1999-08-11 | Hewlett-Packard Company | Secure printing |
DE29804510U1 (en) * | 1998-03-13 | 1998-05-28 | Deutschmann Ingo | Terminal for chip cards |
US7096358B2 (en) * | 1998-05-07 | 2006-08-22 | Maz Technologies, Inc. | Encrypting file system |
WO1999060504A1 (en) | 1998-05-15 | 1999-11-25 | Unicast Communications Corporation | A technique for implementing browser-initiated network-distributed advertising and for interstitially displaying an advertisement |
US6304973B1 (en) * | 1998-08-06 | 2001-10-16 | Cryptek Secure Communications, Llc | Multi-level security network system |
IL126259A0 (en) * | 1998-09-17 | 1999-05-09 | Redler Yeshayahu | Secure data entry peripheral device |
WO2000019324A1 (en) * | 1998-09-28 | 2000-04-06 | Argus Systems Group, Inc. | Trusted compartmentalized computer operating system |
IL136745A0 (en) * | 1998-10-14 | 2001-06-14 | Ultra Information Systems Llc | System and method of authenticating a key and transmitting secure data |
US6138239A (en) * | 1998-11-13 | 2000-10-24 | N★Able Technologies, Inc. | Method and system for authenticating and utilizing secure resources in a computer system |
US6487665B1 (en) | 1998-11-30 | 2002-11-26 | Microsoft Corporation | Object security boundaries |
US6385724B1 (en) | 1998-11-30 | 2002-05-07 | Microsoft Corporation | Automatic object caller chain with declarative impersonation and transitive trust |
US6574736B1 (en) | 1998-11-30 | 2003-06-03 | Microsoft Corporation | Composable roles |
EP1035461A3 (en) * | 1999-03-11 | 2004-04-14 | BDC - EDV Consulting GmbH | Terminal for secure data confirmation and corresponding method |
US6396400B1 (en) | 1999-07-26 | 2002-05-28 | Epstein, Iii Edwin A. | Security system and enclosure to protect data contained therein |
KR20010011667A (en) * | 1999-07-29 | 2001-02-15 | 이종우 | Keyboard having secure function and system using the same |
US6684335B1 (en) | 1999-08-19 | 2004-01-27 | Epstein, Iii Edwin A. | Resistance cell architecture |
US6351817B1 (en) * | 1999-10-27 | 2002-02-26 | Terence T. Flyntz | Multi-level secure computer with token-based access control |
US6389542B1 (en) * | 1999-10-27 | 2002-05-14 | Terence T. Flyntz | Multi-level secure computer with token-based access control |
US6643783B2 (en) | 1999-10-27 | 2003-11-04 | Terence T. Flyntz | Multi-level secure computer with token-based access control |
US6430561B1 (en) * | 1999-10-29 | 2002-08-06 | International Business Machines Corporation | Security policy for protection of files on a storage device |
US6854026B1 (en) | 1999-12-29 | 2005-02-08 | General Electric Company | Methods and systems for interfacing small devices to computer networks |
AU2001235936A1 (en) * | 2000-02-23 | 2001-09-03 | Smart Lite Digital Solutions Inc. | Integrated pointing device-smartcard transaction security system |
US6510344B1 (en) * | 2000-03-22 | 2003-01-21 | Ge Medical Systems Information Technologies, Inc. | Procedure alarm silence feature for medical telemetry system |
AUPQ724700A0 (en) * | 2000-05-02 | 2000-05-25 | Canon Kabushiki Kaisha | Printing using secure pickup |
US7318050B1 (en) * | 2000-05-08 | 2008-01-08 | Verizon Corporate Services Group Inc. | Biometric certifying authorities |
US20050044405A1 (en) * | 2000-05-11 | 2005-02-24 | Spraggs Lynn D. | System and method of securing a computer from unauthorized access |
CA2447451C (en) * | 2000-05-12 | 2013-02-12 | Xtreamlok Pty. Ltd. | Information security method and system |
US8086697B2 (en) * | 2005-06-28 | 2011-12-27 | Claria Innovations, Llc | Techniques for displaying impressions in documents delivered over a computer network |
US7475404B2 (en) | 2000-05-18 | 2009-01-06 | Maquis Techtrix Llc | System and method for implementing click-through for browser executed software including ad proxy and proxy cookie caching |
FR2809892B1 (en) * | 2000-05-31 | 2002-09-06 | Gemplus Card Int | METHOD OF PROTECTION AGAINST FRAUDULENT MODIFICATION OF DATA SENT TO A SECURE ELECTRONIC MEDIUM |
DE10027051A1 (en) * | 2000-06-02 | 2001-12-13 | Deutsche Telekom Mobil | Process and arrangement for securing a human-machine dialogue |
US6895502B1 (en) | 2000-06-08 | 2005-05-17 | Curriculum Corporation | Method and system for securely displaying and confirming request to perform operation on host computer |
CA2310538A1 (en) * | 2000-06-09 | 2001-12-09 | Christopher Kirchmann | Data line interrupter switch |
US7493486B1 (en) * | 2000-06-09 | 2009-02-17 | Verizon Laboratories, Inc. | Method and apparatus for supporting cryptographic-related activities in a public key infrastructure |
US20030058274A1 (en) * | 2000-11-17 | 2003-03-27 | Jake Hill | Interface device |
EP1280036A3 (en) * | 2001-05-26 | 2004-06-09 | Hartmut Jahn | Method and system for the creation of cryptographic texts or documents |
CA2351898A1 (en) * | 2001-06-26 | 2002-12-26 | Predrag Zivic | Information security model |
WO2003003170A1 (en) * | 2001-06-27 | 2003-01-09 | Nokia Corporation | Personal user device and method for selecting a secured user input/ output mode in a personal user device |
US7313824B1 (en) | 2001-07-13 | 2007-12-25 | Liquid Machines, Inc. | Method for protecting digital content from unauthorized use by automatically and dynamically integrating a content-protection agent |
KR100378586B1 (en) * | 2001-08-29 | 2003-04-03 | 테커스 (주) | Anti Keylog method of ActiveX base and equipment thereof |
GB2379299B (en) * | 2001-09-04 | 2006-02-08 | Imagination Tech Ltd | A texturing system |
US7269737B2 (en) * | 2001-09-21 | 2007-09-11 | Pay By Touch Checking Resources, Inc. | System and method for biometric authorization for financial transactions |
US7316029B1 (en) * | 2001-10-25 | 2008-01-01 | Sprint Communications Company L.P. | Network security services architecture |
US20030105830A1 (en) * | 2001-12-03 | 2003-06-05 | Duc Pham | Scalable network media access controller and methods |
US7380130B2 (en) * | 2001-12-04 | 2008-05-27 | Microsoft Corporation | Methods and systems for authentication of components in a graphics system |
EP1329787B1 (en) * | 2002-01-16 | 2019-08-28 | Texas Instruments Incorporated | Secure mode indicator for smart phone or PDA |
US20090254994A1 (en) | 2002-02-18 | 2009-10-08 | David Lynch Waterson | Security methods and systems |
US7779062B2 (en) * | 2004-08-18 | 2010-08-17 | Ripple Effects Holdings Limited | System for preventing keystroke logging software from accessing or identifying keystrokes |
US20050120230A1 (en) * | 2002-02-18 | 2005-06-02 | Waterson David L. | System for preventing a computer virus accessing email addresses |
EP1503536A1 (en) * | 2002-05-09 | 2005-02-02 | Niigata Seimitsu Co., Ltd. | Encryption device, encryption method, and encryption system |
US7069515B1 (en) * | 2002-05-21 | 2006-06-27 | Claria Corporation | Method and apparatus for displaying messages in computer systems |
AUPS265302A0 (en) * | 2002-05-30 | 2002-06-20 | Mcom Solutions Inc | Display device and funds transaction device including the display device |
US7085933B2 (en) * | 2002-06-11 | 2006-08-01 | Lenvo (Singapore) Pte, Ltd. | Computer system apparatus and method for improved assurance of authentication |
US7284277B2 (en) | 2002-07-15 | 2007-10-16 | Hewlett-Packard Development Company, L.P. | Secured printing |
US7334124B2 (en) * | 2002-07-22 | 2008-02-19 | Vormetric, Inc. | Logical access block processing protocol for transparent secure file storage |
US6931530B2 (en) | 2002-07-22 | 2005-08-16 | Vormetric, Inc. | Secure network file access controller implementing access control and auditing |
US8180051B1 (en) * | 2002-10-07 | 2012-05-15 | Cisco Technology, Inc | Methods and apparatus for securing communications of a user operated device |
US7143288B2 (en) * | 2002-10-16 | 2006-11-28 | Vormetric, Inc. | Secure file system server architecture and methods |
US7603341B2 (en) | 2002-11-05 | 2009-10-13 | Claria Corporation | Updating the content of a presentation vehicle in a computer network |
KR20040054493A (en) * | 2002-12-18 | 2004-06-25 | 텍사스 인스트루먼츠 인코포레이티드 | Secure mode indicator for smart phone or pda |
US7559083B2 (en) * | 2003-01-14 | 2009-07-07 | Microsoft Corporation | Method and apparatus for generating secured attention sequence |
US7370209B2 (en) * | 2003-01-30 | 2008-05-06 | Hewlett-Packard Development Company, L.P. | Systems and methods for increasing the difficulty of data sniffing |
US20040162992A1 (en) * | 2003-02-19 | 2004-08-19 | Sami Vikash Krishna | Internet privacy protection device |
US20040165211A1 (en) * | 2003-02-20 | 2004-08-26 | Herrmann William I. | Print authorization via an authorization device |
US20040221171A1 (en) * | 2003-05-02 | 2004-11-04 | Ahmed Ahmed Awad E. | Intrusion detector based on mouse dynamics analysis |
US7469343B2 (en) * | 2003-05-02 | 2008-12-23 | Microsoft Corporation | Dynamic substitution of USB data for on-the-fly encryption/decryption |
US20040268143A1 (en) * | 2003-06-30 | 2004-12-30 | Poisner David I. | Trusted input for mobile platform transactions |
US8984644B2 (en) | 2003-07-01 | 2015-03-17 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US9100431B2 (en) | 2003-07-01 | 2015-08-04 | Securityprofiling, Llc | Computer program product and apparatus for multi-path remediation |
US9118708B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Multi-path remediation |
US9118711B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US9350752B2 (en) | 2003-07-01 | 2016-05-24 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US9118709B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US20070113272A2 (en) | 2003-07-01 | 2007-05-17 | Securityprofiling, Inc. | Real-time vulnerability monitoring |
US9118710B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | System, method, and computer program product for reporting an occurrence in different manners |
JP2005050286A (en) * | 2003-07-31 | 2005-02-24 | Fujitsu Ltd | Network-node machine and information network system |
US8122361B2 (en) * | 2003-10-23 | 2012-02-21 | Microsoft Corporation | Providing a graphical user interface in a system with a high-assurance execution environment |
US7496768B2 (en) | 2003-10-24 | 2009-02-24 | Microsoft Corporation | Providing secure input and output to a trusted agent in a system with a high-assurance execution environment |
US7581097B2 (en) * | 2003-12-23 | 2009-08-25 | Lenovo Pte Ltd | Apparatus, system, and method for secure communications from a human interface device |
FR2865594A1 (en) * | 2004-01-27 | 2005-07-29 | France Telecom | Computer system, has group of system resources that is compatible with and under control of computer device when it is connected to system, where set of temporary data stored on system units is deleted, when device is disconnected |
US7861006B2 (en) | 2004-03-23 | 2010-12-28 | Mcnulty Scott | Apparatus, method and system for a tunneling client access point |
US8719591B1 (en) | 2004-05-14 | 2014-05-06 | Radix Holdings, Llc | Secure data entry |
US7797750B2 (en) * | 2004-08-10 | 2010-09-14 | Newport Scientific Research Llc | Data security system |
US8255413B2 (en) * | 2004-08-19 | 2012-08-28 | Carhamm Ltd., Llc | Method and apparatus for responding to request for information-personalization |
US8078602B2 (en) * | 2004-12-17 | 2011-12-13 | Claria Innovations, Llc | Search engine for a computer network |
WO2006034713A1 (en) * | 2004-09-29 | 2006-04-06 | Sagem Denmark A/S | Secure display for atm |
US20060085562A1 (en) * | 2004-10-14 | 2006-04-20 | Blaho Bruce E | Devices and methods for remote computing using a network processor |
US7797728B2 (en) * | 2004-10-27 | 2010-09-14 | Intel Corporation | Mechanism to generate restricted and unrestricted execution environments |
US7693863B2 (en) * | 2004-12-20 | 2010-04-06 | Claria Corporation | Method and device for publishing cross-network user behavioral data |
US20070180228A1 (en) * | 2005-02-18 | 2007-08-02 | Ulf Mattsson | Dynamic loading of hardware security modules |
DE102005008433A1 (en) * | 2005-02-24 | 2006-08-31 | Giesecke & Devrient Gmbh | Safety module for smart card, has interface receiving input data e.g. password, from input device, where input data from interface are processed using individual data and without transmitting data to another interface in operation mode |
US8073866B2 (en) * | 2005-03-17 | 2011-12-06 | Claria Innovations, Llc | Method for providing content to an internet user based on the user's demonstrated content preferences |
US7661126B2 (en) * | 2005-04-01 | 2010-02-09 | Microsoft Corporation | Systems and methods for authenticating a user interface to a computer user |
US7565535B2 (en) * | 2005-05-06 | 2009-07-21 | Microsoft Corporation | Systems and methods for demonstrating authenticity of a virtual machine using a security image |
US7549064B2 (en) | 2005-05-10 | 2009-06-16 | Hewlett-Packard Development Company, L.P. | Secure circuit assembly |
US8645683B1 (en) | 2005-08-11 | 2014-02-04 | Aaron T. Emigh | Verified navigation |
US20070061592A1 (en) * | 2005-09-14 | 2007-03-15 | Zhi-Heng Nian | Computer input device with security protection and method thereof |
US8250151B2 (en) * | 2005-10-12 | 2012-08-21 | Bloomberg Finance L.P. | System and method for providing secure data transmission |
US7954092B2 (en) * | 2005-12-24 | 2011-05-31 | International Business Machines Corporation | Creating an assured execution environment for at least one computer program executable on a computer system |
US8146164B2 (en) * | 2006-01-24 | 2012-03-27 | Eshun Kobi O | Method and apparatus for thwarting spyware |
US7681230B2 (en) * | 2006-02-28 | 2010-03-16 | Harris Corporation | Data synchronization for a secure electronic device |
US8041947B2 (en) * | 2006-03-23 | 2011-10-18 | Harris Corporation | Computer architecture for an electronic device providing SLS access to MLS file system with trusted loading and protection of program execution memory |
US8060744B2 (en) * | 2006-03-23 | 2011-11-15 | Harris Corporation | Computer architecture for an electronic device providing single-level secure access to multi-level secure file system |
US8127145B2 (en) * | 2006-03-23 | 2012-02-28 | Harris Corporation | Computer architecture for an electronic device providing a secure file system |
TW200737900A (en) * | 2006-03-30 | 2007-10-01 | Jmicron Technology Corp | Method and device for enhancing security of data processing |
US7979714B2 (en) * | 2006-06-02 | 2011-07-12 | Harris Corporation | Authentication and access control device |
US9747426B2 (en) * | 2006-08-31 | 2017-08-29 | Invention Science Fund I, Llc | Handling masquerading elements |
US8555396B2 (en) * | 2006-08-31 | 2013-10-08 | The Invention Science Fund I, Llc | Authenticatable displayed content |
US8327155B2 (en) * | 2006-08-31 | 2012-12-04 | The Invention Science Fund I, Llc | Screening for masquerading content |
US8640248B2 (en) * | 2006-08-31 | 2014-01-28 | The Invention Science Fund I, Llc | Handling masquerading elements |
IL180020A (en) * | 2006-12-12 | 2013-03-24 | Waterfall Security Solutions Ltd | Encryption -and decryption-enabled interfaces |
IL180748A (en) * | 2007-01-16 | 2013-03-24 | Waterfall Security Solutions Ltd | Secure archive |
US8095977B2 (en) * | 2007-01-19 | 2012-01-10 | Microsoft Corporation | Secure PIN transmission |
US20080263672A1 (en) * | 2007-04-18 | 2008-10-23 | Hewlett-Packard Development Company L.P. | Protecting sensitive data intended for a remote application |
US8302200B2 (en) | 2007-04-27 | 2012-10-30 | Tl Digital Systems L.L.C. | Protected intra-system interconnect for digital rights management in electrical computers and digital data processing systems |
US20100031321A1 (en) | 2007-06-11 | 2010-02-04 | Protegrity Corporation | Method and system for preventing impersonation of computer system user |
IL187492A0 (en) * | 2007-09-06 | 2008-02-09 | Human Interface Security Ltd | Information protection device |
US8010998B2 (en) * | 2007-10-25 | 2011-08-30 | International Business Machines Corporation | Techniques for limiting remote control of a computer system |
TW200929974A (en) * | 2007-11-19 | 2009-07-01 | Ibm | System and method for performing electronic transactions |
US8161541B2 (en) * | 2007-12-13 | 2012-04-17 | Alcatel Lucent | Ethernet connectivity fault management with user verification option |
US8291501B2 (en) * | 2008-02-08 | 2012-10-16 | Cheng Holdings, Llc | Validation of protected intra-system interconnects for digital rights management in electrical computers and digital data processing systems |
IL192043A0 (en) * | 2008-06-10 | 2009-02-11 | Human Interface Security Ltd | User interface for secure data entry |
US8214890B2 (en) * | 2008-08-27 | 2012-07-03 | Microsoft Corporation | Login authentication using a trusted device |
IL194943A0 (en) * | 2008-10-27 | 2009-09-22 | Human Interface Security Ltd | Verification of data transmitted by computer |
DE102008055991A1 (en) * | 2008-11-05 | 2010-05-12 | Prehkeytec Gmbh | Keyboard and method for secure transmission of data |
DE102008062872A1 (en) * | 2008-12-17 | 2010-06-24 | Universität Tübingen | Method for bi-directional transmission of click position information of smart card between server of bank and personal computer system of bank customer in online banking process, involves determining symbols associated to line surface |
CA2650163C (en) * | 2008-12-18 | 2013-07-23 | Her Majesty The Queen In Right Of Canada, As Represented By The Ministerof National Defence | System and method for secure provision of key credential information |
US20100186070A1 (en) | 2009-01-22 | 2010-07-22 | Mcalear James A | System, device and method for secure provision of key credential information |
US9135948B2 (en) * | 2009-07-03 | 2015-09-15 | Microsoft Technology Licensing, Llc | Optical medium with added descriptor to reduce counterfeiting |
EP2406749B1 (en) * | 2009-03-13 | 2018-06-13 | Assa Abloy Ab | Transfer device for sensitive material such as a cryptographic key |
US9032058B2 (en) * | 2009-03-13 | 2015-05-12 | Assa Abloy Ab | Use of SNMP for management of small footprint devices |
EP2228746A1 (en) * | 2009-03-13 | 2010-09-15 | Assa Abloy Ab | Realization of access control conditions as boolean expressions in credential authentications |
US8521821B2 (en) * | 2009-03-17 | 2013-08-27 | Brigham Young University | Encrypted email based upon trusted overlays |
US9092962B1 (en) * | 2010-04-16 | 2015-07-28 | Kontek Industries, Inc. | Diversity networks and methods for secure communications |
US20120079281A1 (en) * | 2010-06-28 | 2012-03-29 | Lionstone Capital Corporation | Systems and methods for diversification of encryption algorithms and obfuscation symbols, symbol spaces and/or schemas |
US9767840B2 (en) * | 2011-08-18 | 2017-09-19 | Apple Inc. | Securing protected content during video playback |
US20130047261A1 (en) * | 2011-08-19 | 2013-02-21 | Graeme John Proudler | Data Access Control |
WO2013081406A1 (en) * | 2011-12-02 | 2013-06-06 | Samsung Electronics Co., Ltd. | Method and apparatus for securing touch input |
KR101925806B1 (en) * | 2011-12-02 | 2018-12-07 | 삼성전자 주식회사 | Method and apparatus for securing touch input |
US8615656B2 (en) * | 2012-01-09 | 2013-12-24 | The Mitre Corporation | Secure remote peripheral encryption tunnel |
US20130305391A1 (en) * | 2012-05-14 | 2013-11-14 | Rosemount Aerospace, Inc. | Common Computing Apparatus Providing Distinct Non-Certified And Certified Computing Platforms |
US9450586B2 (en) | 2012-10-02 | 2016-09-20 | Hewlett Packard Enterprise Development Lp | Security shield assembly |
GB201218389D0 (en) | 2012-10-12 | 2012-11-28 | Uni I Olso | Multi-mode computer with selector |
US8918893B2 (en) | 2012-10-29 | 2014-12-23 | Hewlett-Packard Development Company, L.P. | Managing a fault condition by a security module |
US9858324B2 (en) | 2013-06-13 | 2018-01-02 | Northrop Grumman Systems Corporation | Trusted download toolkit |
JP6299093B2 (en) * | 2013-06-26 | 2018-03-28 | 富士通株式会社 | Terminal apparatus, information processing apparatus, input program, and input method |
CN104463028B (en) * | 2013-09-25 | 2018-06-22 | 中国银联股份有限公司 | Safe mode reminding method and the mobile equipment for realizing this method |
IL235175A (en) | 2014-10-19 | 2017-08-31 | Frenkel Lior | Secure remote desktop |
US9537833B2 (en) | 2014-12-31 | 2017-01-03 | Google Inc. | Secure host communications |
US9547773B2 (en) | 2014-12-31 | 2017-01-17 | Google Inc. | Secure event log management |
US9760727B2 (en) | 2014-12-31 | 2017-09-12 | Google Inc. | Secure host interactions |
DE102015103740A1 (en) | 2015-03-13 | 2016-09-15 | Phoenix Contact Gmbh & Co. Kg | Method and device for processing and transmitting data within a functionally safe electrical, electronic or programmable electronic system |
CN106464488A (en) * | 2015-08-28 | 2017-02-22 | 华为技术有限公司 | Information transmission method and mobile device |
IL250010B (en) | 2016-02-14 | 2020-04-30 | Waterfall Security Solutions Ltd | Secure connection with protected facilities |
JP6274678B2 (en) * | 2016-08-10 | 2018-02-07 | インテル・コーポレーション | Reliable service interaction |
WO2018051236A1 (en) | 2016-09-13 | 2018-03-22 | Silverfort Ltd. | Protection of authentication tokens |
US11108741B2 (en) * | 2017-02-12 | 2021-08-31 | Noam Camiel | System and method for the separation of systems that work together |
US10771439B2 (en) | 2017-06-28 | 2020-09-08 | Microsoft Technology Licensing, Llc | Shielded networks for virtual machines |
IL258379A (en) * | 2018-03-26 | 2018-05-31 | Kazuar Advanced Tech Ltd | Remote secured terminal |
US11416620B1 (en) | 2019-11-01 | 2022-08-16 | Sprint Communications Company L.P. | Data communication service in a trusted execution environment (TEE) at the network edge |
EP4100943A4 (en) * | 2020-02-03 | 2023-07-19 | Tritium Holdings Pty Ltd | Method and apparatus for secure display of electronic information |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0096628A2 (en) * | 1982-06-02 | 1983-12-21 | Digital Equipment Corporation | Apparatus for combining a video signal with graphics and text from a computer |
EP0192243A2 (en) | 1985-02-21 | 1986-08-27 | Secure Computing Technology Corporation | Method of protecting system files and data processing unit for implementing said method |
EP0443423A2 (en) * | 1990-02-13 | 1991-08-28 | Digital Equipment Corporation | Method for executing trust-path commands |
WO1992017958A1 (en) | 1991-03-28 | 1992-10-15 | Secure Computing Corporation | Secure computer interface |
Family Cites Families (46)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2258112A5 (en) * | 1973-11-30 | 1975-08-08 | Honeywell Bull Soc Ind | |
US3956615A (en) * | 1974-06-25 | 1976-05-11 | Ibm Corporation | Transaction execution system with secure data storage and communications |
US4104721A (en) * | 1976-12-30 | 1978-08-01 | International Business Machines Corporation | Hierarchical security mechanism for dynamically assigning security levels to object programs |
US4227253A (en) * | 1977-12-05 | 1980-10-07 | International Business Machines Corporation | Cryptographic communication security for multiple domain networks |
US4238854A (en) * | 1977-12-05 | 1980-12-09 | International Business Machines Corporation | Cryptographic file security for single domain networks |
US4352952A (en) * | 1978-06-12 | 1982-10-05 | Motorola Inc. | Data security module |
US4264782A (en) * | 1979-06-29 | 1981-04-28 | International Business Machines Corporation | Method and apparatus for transaction and identity verification |
JPS5650680A (en) * | 1979-09-29 | 1981-05-07 | Pioneer Electronic Corp | Line monitor device for two-way data communication system |
US4442484A (en) * | 1980-10-14 | 1984-04-10 | Intel Corporation | Microprocessor memory management and protection mechanism |
US4368357A (en) * | 1980-11-14 | 1983-01-11 | International Telephone And Telegraph Corporation | Bypass apparatus for use in secure communication systems |
US4438824A (en) * | 1981-04-22 | 1984-03-27 | Siemens Corporation | Apparatus and method for cryptographic identity verification |
US4575797A (en) * | 1981-05-22 | 1986-03-11 | Data General Corporation | Digital data processing system incorporating object-based addressing and capable of executing instructions belonging to several instruction sets |
US4578530A (en) * | 1981-06-26 | 1986-03-25 | Visa U.S.A., Inc. | End-to-end encryption system and method of operation |
US4648031A (en) * | 1982-06-21 | 1987-03-03 | International Business Machines Corporation | Method and apparatus for restarting a computing system |
US4825050A (en) * | 1983-09-13 | 1989-04-25 | Transaction Security Corporation | Security transaction system for financial data |
SE442249B (en) * | 1983-11-17 | 1985-12-09 | Ericsson Telefon Ab L M | PROCEDURE AND DEVICE FOR VERIFICATION OF PERSONAL IDENTIFICATION NUMBER AND CHECKING INSERT NUMBER SERIES IN IDENTIFICATION MEDIA |
US4621321A (en) * | 1984-02-16 | 1986-11-04 | Honeywell Inc. | Secure data processing system architecture |
US4652698A (en) * | 1984-08-13 | 1987-03-24 | Ncr Corporation | Method and system for providing system security in a remote terminal environment |
US4998279A (en) * | 1984-11-30 | 1991-03-05 | Weiss Kenneth P | Method and apparatus for personal verification utilizing nonpredictable codes and biocharacteristics |
US4817147A (en) * | 1985-11-18 | 1989-03-28 | General Datacomm, Inc. | Intelligent synchronous modem and communication system incorporating the same |
US4922534A (en) * | 1985-11-18 | 1990-05-01 | General Datacomm, Inc. | Intelligent synchronous modem and communication system incorporating the same |
US4815128A (en) * | 1986-07-03 | 1989-03-21 | Motorola, Inc. | Gateway system and method for interconnecting telephone calls with a digital voice protected radio network |
JPH01175057A (en) * | 1987-12-28 | 1989-07-11 | Toshiba Corp | Dynamic control method for security |
US4918653A (en) * | 1988-01-28 | 1990-04-17 | International Business Machines Corporation | Trusted path mechanism for an operating system |
US4885789A (en) * | 1988-02-01 | 1989-12-05 | International Business Machines Corporation | Remote trusted path mechanism for telnet |
GB2217949B (en) * | 1988-03-29 | 1992-08-05 | Aisin Seiki | Data encryption |
US4980913A (en) * | 1988-04-19 | 1990-12-25 | Vindicator Corporation | Security system network |
US4888801A (en) * | 1988-05-02 | 1989-12-19 | Motorola, Inc. | Hierarchical key management system |
JPH0294836A (en) * | 1988-09-30 | 1990-04-05 | Aisin Seiki Co Ltd | Privacy telephone communication controller |
US4981371A (en) * | 1989-02-17 | 1991-01-01 | Itt Corporation | Integrated I/O interface for communication terminal |
US4965568A (en) * | 1989-03-01 | 1990-10-23 | Atalla Martin M | Multilevel security apparatus and method with personal key |
JP3103850B2 (en) * | 1989-03-07 | 2000-10-30 | アイシン精機株式会社 | Secret communication control device |
US5065429A (en) * | 1989-04-03 | 1991-11-12 | Lang Gerald S | Method and apparatus for protecting material on storage media |
JPH03232381A (en) * | 1990-02-08 | 1991-10-16 | Canon Inc | Facsimile equipment |
US5070528A (en) * | 1990-06-29 | 1991-12-03 | Digital Equipment Corporation | Generic encryption technique for communication networks |
US5062136A (en) * | 1990-09-12 | 1991-10-29 | The United States Of America As Represented By The Secretary Of The Navy | Telecommunications system and method |
US5283828A (en) * | 1991-03-01 | 1994-02-01 | Hughes Training, Inc. | Architecture for utilizing coprocessing systems to increase performance in security adapted computer systems |
JP3209343B2 (en) * | 1991-03-12 | 2001-09-17 | キヤノン株式会社 | Facsimile apparatus and control method thereof |
US5148479A (en) * | 1991-03-20 | 1992-09-15 | International Business Machines Corp. | Authentication protocols in communication networks |
NO173418C (en) * | 1991-04-29 | 1993-12-08 | Alcatel Stk As | communication Network |
US5166977A (en) * | 1991-05-31 | 1992-11-24 | Encrypto, Inc. | Protocol converter for a secure fax transmission system |
US5228083A (en) * | 1991-06-28 | 1993-07-13 | Digital Equipment Corporation | Cryptographic processing in a communication network, using a single cryptographic engine |
US5179591A (en) * | 1991-10-16 | 1993-01-12 | Motorola, Inc. | Method for algorithm independent cryptographic key management |
US5276735A (en) * | 1992-04-17 | 1994-01-04 | Secure Computing Corporation | Data enclave and trusted path system |
US5410599A (en) * | 1992-05-15 | 1995-04-25 | Tecsec, Incorporated | Voice and data encryption device |
US5351136A (en) * | 1992-07-10 | 1994-09-27 | Industrial Technology Research Institute | Facsimile apparatus and method for sending and receiving private information |
-
1992
- 1992-07-10 US US07/911,900 patent/US5596718A/en not_active Expired - Lifetime
-
1993
- 1993-07-09 AU AU46726/93A patent/AU663406B2/en not_active Ceased
- 1993-07-09 WO PCT/US1993/006511 patent/WO1994001821A1/en not_active Application Discontinuation
- 1993-07-09 EP EP93917094A patent/EP0649546A1/en not_active Ceased
- 1993-07-09 CA CA002139744A patent/CA2139744A1/en not_active Abandoned
- 1993-07-09 JP JP6503552A patent/JPH07509086A/en active Pending
- 1993-07-11 IL IL106304A patent/IL106304A0/en unknown
-
1996
- 1996-09-18 US US08/714,319 patent/US5822435A/en not_active Expired - Lifetime
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0096628A2 (en) * | 1982-06-02 | 1983-12-21 | Digital Equipment Corporation | Apparatus for combining a video signal with graphics and text from a computer |
EP0192243A2 (en) | 1985-02-21 | 1986-08-27 | Secure Computing Technology Corporation | Method of protecting system files and data processing unit for implementing said method |
EP0443423A2 (en) * | 1990-02-13 | 1991-08-28 | Digital Equipment Corporation | Method for executing trust-path commands |
WO1992017958A1 (en) | 1991-03-28 | 1992-10-15 | Secure Computing Corporation | Secure computer interface |
Non-Patent Citations (2)
Title |
---|
J.EPSTEIN ET AL: "Evolution of a Trusted B3 Window Prototype", IEEE SYMPOSIUM ON SECURITY AND PRIVACY,, 4 May 1992 (1992-05-04), OAKLAND, US;, pages 226 - 239 * |
J.PICCIOTTO ET AL: "Privileges and Their Use by Trusted Applications", PROC. FALL JOINT COMPUTER CONF.,, 25 October 1987 (1987-10-25), DALLAS, US;, pages 411 - 420 * |
Cited By (50)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6760840B1 (en) | 1994-03-15 | 2004-07-06 | Kabushiki Kaisha Toshiba | File editing system and shared file editing system with file content secrecy, file version management, and asynchronous editing |
US7631185B2 (en) | 1994-03-15 | 2009-12-08 | Kabushiki Kaisha Toshiba | File editing system and shared file editing system with file content secrecy, file version management, and asynchronous editing |
EP0674253A1 (en) * | 1994-03-15 | 1995-09-27 | Kabushiki Kaisha Toshiba | Shared file editing system with file content secrecy, version management and asynchronous editing |
US5835601A (en) * | 1994-03-15 | 1998-11-10 | Kabushiki Kaisha Toshiba | File editing system and shared file editing system with file content secrecy, file version management, and asynchronous editing |
EP0750812A1 (en) * | 1994-03-18 | 1997-01-02 | Innovonics, Inc. | Methods and apparatus for interfacing an encryption module with a personal computer |
EP0750812A4 (en) * | 1994-03-18 | 1998-10-28 | Innovonics Inc | Methods and apparatus for interfacing an encryption module with a personal computer |
ES2117495A1 (en) * | 1994-05-18 | 1998-08-01 | Penta 3 S A | Cryptography system. |
US9953328B2 (en) | 1994-11-23 | 2018-04-24 | Contentguard Holdings, Inc. | Method and system for conducting transactions between repositories |
US8181021B2 (en) | 1995-02-13 | 2012-05-15 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US8055913B2 (en) | 1995-02-13 | 2011-11-08 | Intertrust Technologies Corporation | Systems and methods for secure transaction management and electronic rights protection |
US8543842B2 (en) | 1995-02-13 | 2013-09-24 | Intertrust Technologies Corporation | System and methods for secure transaction management and electronics rights protection |
US8639625B1 (en) | 1995-02-13 | 2014-01-28 | Intertrust Technologies Corporation | Systems and methods for secure transaction management and electronic rights protection |
US6658568B1 (en) | 1995-02-13 | 2003-12-02 | Intertrust Technologies Corporation | Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management |
US7917749B2 (en) | 1995-02-13 | 2011-03-29 | Intertrust Technologies Corporation | Systems and methods for secure transaction management and electronic rights protection |
WO1997016779A3 (en) * | 1995-11-03 | 1997-08-07 | Esd Information Technology Ent | Input security and transactions unit and process for input security and transactions involving digital information |
WO1997016779A2 (en) * | 1995-11-03 | 1997-05-09 | Esd Information Technology Entwicklungs Gmbh | Input security and transactions unit and process for input security and transactions involving digital information |
US8510226B2 (en) | 1996-02-26 | 2013-08-13 | Graphon Corporation | Method for synchronous encryption between a client and a licensing agent |
US7925898B2 (en) | 1996-08-12 | 2011-04-12 | Intertrust Technologies Corp. | Systems and methods using cryptography to protect secure computing environments |
EP0825511A2 (en) * | 1996-08-23 | 1998-02-25 | Hewlett-Packard Company | Method and apparatus for trusted processing |
US5841869A (en) * | 1996-08-23 | 1998-11-24 | Cheyenne Property Trust | Method and apparatus for trusted processing |
EP0825511A3 (en) * | 1996-08-23 | 1998-05-06 | Hewlett-Packard Company | Method and apparatus for trusted processing |
US8533851B2 (en) | 1996-08-30 | 2013-09-10 | Intertrust Technologies Corporation | Systems and methods for secure transaction management and electronic rights protection |
WO1998009209A1 (en) * | 1996-08-30 | 1998-03-05 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US8291238B2 (en) | 1996-08-30 | 2012-10-16 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
WO1998019243A2 (en) * | 1996-10-30 | 1998-05-07 | Myspace Ab | Method and security system for processing a security critical activity |
AU735711B2 (en) * | 1996-10-30 | 2001-07-12 | Myspace Ab | Method and security system for processing a security critical activity |
US6618809B1 (en) | 1996-10-30 | 2003-09-09 | Myspace Ab | Method and security system for processing a security critical activity |
WO1998019243A3 (en) * | 1996-10-30 | 1998-06-18 | Myspace Ab | Method and security system for processing a security critical activity |
WO1998040983A1 (en) * | 1997-03-14 | 1998-09-17 | Innovonics, Inc. | Methods and apparatus for securely encrypting data in conjunction with a personal computer |
EP0929024A1 (en) * | 1998-01-07 | 1999-07-14 | Ian David Evans | Method and apparatus for preventing unintentional perusal of computer display information |
US6996840B1 (en) | 1998-12-18 | 2006-02-07 | Myspace Ab | Method for executing a security critical activity |
US7236455B1 (en) | 1999-02-15 | 2007-06-26 | Hewlett-Packard Development Company, L.P. | Communications between modules of a computing apparatus |
WO2000073913A1 (en) * | 1999-05-28 | 2000-12-07 | Hewlett-Packard Company | System for providing a trustworthy user interface |
EP1056014A1 (en) * | 1999-05-28 | 2000-11-29 | Hewlett-Packard Company | System for providing a trustworthy user interface |
US7302585B1 (en) | 1999-05-28 | 2007-11-27 | Hewlett-Packard Development Company, L.P. | System for providing a trustworthy user interface |
US7904730B2 (en) | 1999-05-28 | 2011-03-08 | Hewlett-Packard Development Company, L.P. | System for providing a trustworthy user interface |
EP1055989A1 (en) * | 1999-05-28 | 2000-11-29 | Hewlett-Packard Company | System for digitally signing a document |
WO2000073879A1 (en) * | 1999-05-28 | 2000-12-07 | Hewlett-Packard Company | System for digitally signing a document |
US6895503B2 (en) | 2001-05-31 | 2005-05-17 | Contentguard Holdings, Inc. | Method and apparatus for hierarchical assignment of rights to documents and documents having such rights |
US8862517B2 (en) | 2001-05-31 | 2014-10-14 | Contentguard Holdings, Inc. | Digital rights management of content when content is a future live event |
US8869293B2 (en) | 2001-05-31 | 2014-10-21 | Contentguard Holdings, Inc. | Method and apparatus for hierarchical assignment of rights to documents and documents having such rights |
US8892473B2 (en) | 2001-05-31 | 2014-11-18 | Contentguard Holdings, Inc. | Method and system for subscription digital rights management |
US8584245B2 (en) | 2001-06-04 | 2013-11-12 | Hewlett-Packard Development Company, L.P. | Identifying a trusted computing entity |
EP1447777A1 (en) * | 2003-01-31 | 2004-08-18 | France Telecom | Method and device for securing of transactions executed at an unsecured terminal |
FR2850772A1 (en) * | 2003-01-31 | 2004-08-06 | France Telecom | Electronic transaction securing device for use in electronic commerce, has analyzing unit to retransmit intercepted signals to processing unit without modification if they are not in order of passage in secured mode |
FR2850813A1 (en) * | 2003-01-31 | 2004-08-06 | France Telecom | Electronic transaction securing device for use in electronic commerce, has analyzing unit to analyze intercepted signals from control, and quantifying unit retransmitting information quantified in secured mode to telephone |
US7882566B2 (en) | 2003-10-24 | 2011-02-01 | Microsoft Corporation | Providing secure input to a system with a high-assurance execution environment |
GB2421093A (en) * | 2004-12-07 | 2006-06-14 | Symbian Software Ltd | Trusted user interface |
WO2010071947A1 (en) | 2008-12-24 | 2010-07-01 | The Commonwealth Of Australia | Digital video guard |
DE102009014572A1 (en) * | 2009-03-24 | 2010-09-30 | Giesecke & Devrient Gmbh | Method and device for the secure forwarding of input data |
Also Published As
Publication number | Publication date |
---|---|
IL106304A0 (en) | 1993-11-15 |
JPH07509086A (en) | 1995-10-05 |
AU4672693A (en) | 1994-01-31 |
US5822435A (en) | 1998-10-13 |
AU663406B2 (en) | 1995-10-05 |
CA2139744A1 (en) | 1994-01-20 |
EP0649546A1 (en) | 1995-04-26 |
US5596718A (en) | 1997-01-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5822435A (en) | Trusted path subsystem for workstations | |
US8255683B2 (en) | E-mail firewall with policy-based cryptosecurity | |
US5832228A (en) | System and method for providing multi-level security in computer devices utilized with non-secure networks | |
US7069437B2 (en) | Multi-level security network system | |
US6272538B1 (en) | Method and system for establishing a security perimeter in computer networks | |
EP1546896B1 (en) | Method and apparatus for multi-level security implementation | |
US20070226789A1 (en) | System and method for providing secure internetwork services via an assured pipeline | |
US20020046350A1 (en) | Method and system for establishing an audit trail to protect objects distributed over a network | |
US20030177376A1 (en) | Framework for maintaining information security in computer networks | |
US20030237005A1 (en) | Method and system for protecting digital objects distributed over a network by electronic mail | |
EP2807560A1 (en) | Privileged access auditing | |
JPH08227397A (en) | Method and apparatus for remote certification for public circuit | |
CN114175580B (en) | Enhanced secure encryption and decryption system | |
US7404212B2 (en) | Apparatus and methods for intercepting, examining and controlling code, data and files and their transfer | |
CN112948870A (en) | Electronic document security management method and management system based on big data | |
KR20010078727A (en) | Security assurance method for computer and medium recording program thereof | |
GB2347057A (en) | Extension of X.509 certificates to simultaneously support multiple cryptographic algorithms | |
Ito et al. | Group cipher system for intranet security | |
Barker et al. | The role of trust in protected mail | |
WO2005084177A2 (en) | Secure data management system with mobile data management capability | |
Axner | Security devices prevent the compromise of network resources | |
KR20040009394A (en) | Information secure system with PKI technology | |
Schubert et al. | Security considerations in the delivery of Web-based applications: a case study | |
Lu | Security of communication in computer networks (key management, verification) | |
JPH10173643A (en) | Information access control system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AT AU BB BG BR BY CA CH CZ DE DK ES FI GB HU JP KP KR KZ LK LU MG MN MW NL NO NZ PL PT RO RU SD SE SK UA VN |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH DE DK ES FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN ML MR NE SN TD TG |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2139744 Country of ref document: CA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1993917094 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 1993917094 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWR | Wipo information: refused in national office |
Ref document number: 1993917094 Country of ref document: EP |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 1993917094 Country of ref document: EP |