CN104137466B - 操作计算设备的方法及计算设备 - Google Patents
操作计算设备的方法及计算设备 Download PDFInfo
- Publication number
- CN104137466B CN104137466B CN201380011109.9A CN201380011109A CN104137466B CN 104137466 B CN104137466 B CN 104137466B CN 201380011109 A CN201380011109 A CN 201380011109A CN 104137466 B CN104137466 B CN 104137466B
- Authority
- CN
- China
- Prior art keywords
- data
- application program
- data access
- key
- computing device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
- G06F21/445—Program or device authentication by mutual authentication, e.g. between devices or programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
- H04L67/125—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
Claims (20)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201261604894P | 2012-02-29 | 2012-02-29 | |
US61/604,894 | 2012-02-29 | ||
PCT/US2013/027954 WO2013130555A2 (en) | 2012-02-29 | 2013-02-27 | Method of operating a computing device, computing device and computer program |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104137466A CN104137466A (zh) | 2014-11-05 |
CN104137466B true CN104137466B (zh) | 2018-03-30 |
Family
ID=49004599
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201380011109.9A Active CN104137466B (zh) | 2012-02-29 | 2013-02-27 | 操作计算设备的方法及计算设备 |
Country Status (4)
Country | Link |
---|---|
US (1) | US9385996B2 (zh) |
EP (1) | EP2820792B1 (zh) |
CN (1) | CN104137466B (zh) |
WO (1) | WO2013130555A2 (zh) |
Families Citing this family (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8955067B2 (en) | 2012-09-12 | 2015-02-10 | Capital One, Na | System and method for providing controlled application programming interface security |
US9400801B1 (en) | 2013-02-07 | 2016-07-26 | Parallels IP Holdings GmbH | System and method for local file management and editing utilizing remote applications |
US9350714B2 (en) * | 2013-11-19 | 2016-05-24 | Globalfoundries Inc. | Data encryption at the client and server level |
US9729520B2 (en) * | 2014-05-05 | 2017-08-08 | Citrix Systems, Inc. | Facilitating communication between mobile applications |
US9760704B2 (en) * | 2014-05-23 | 2017-09-12 | Blackberry Limited | Security apparatus session sharing |
CA2959794C (en) | 2014-09-08 | 2023-09-19 | Good Technology Holdings Limited | Monitoring user activity |
US10838761B2 (en) | 2014-09-08 | 2020-11-17 | Blackberry Limited | Shared lock state |
WO2016100095A1 (en) * | 2014-12-15 | 2016-06-23 | Good Technology Corporation | Secure storage |
US10033704B2 (en) * | 2015-11-29 | 2018-07-24 | International Business Machines Corporation | Securing enterprise data on mobile devices |
US10038551B2 (en) * | 2015-11-29 | 2018-07-31 | International Business Machines Corporation | Securing enterprise data on mobile devices |
US20170163607A1 (en) * | 2015-12-03 | 2017-06-08 | Microsoft Technology Licensing, Llc | Establishing a Communication Event Using Secure Signalling |
US9733992B1 (en) * | 2016-05-27 | 2017-08-15 | Huawei Technologies Co., Ltd. | Inter-process communication between containers |
US11197331B2 (en) * | 2016-06-10 | 2021-12-07 | Apple Inc. | Zero-round-trip-time connectivity over the wider area network |
US10158610B2 (en) * | 2016-07-06 | 2018-12-18 | Adp, Llc | Secure application communication system |
US11128452B2 (en) * | 2017-03-25 | 2021-09-21 | AVAST Software s.r.o. | Encrypted data sharing with a hierarchical key structure |
US10985915B2 (en) * | 2017-04-12 | 2021-04-20 | Blackberry Limited | Encrypting data in a pre-associated state |
CA3141024A1 (en) * | 2019-07-12 | 2021-01-21 | Joshua Vedell | Data protection and recovery systems and methods |
SG10201906806XA (en) * | 2019-07-23 | 2021-02-25 | Mastercard International Inc | Methods and computing devices for auto-submission of user authentication credential |
FR3103987A1 (fr) * | 2019-11-29 | 2021-06-04 | Sagemcom Broadband Sas | Procede de securisation de flux de donnees entre un equipement de communication et un terminal distant, equipement mettant en oeuvre le procede |
US11777720B2 (en) * | 2020-06-12 | 2023-10-03 | Nagravision Sàrl | Distributed anonymized compliant encryption management system |
CN112199713B (zh) * | 2020-12-03 | 2021-03-16 | 成都中科大旗软件股份有限公司 | 一种ios***软件运行算法的混淆加密方法 |
US11968296B2 (en) | 2021-03-09 | 2024-04-23 | Micron Technology, Inc. | Utilization of a memory device for per-user encryption |
US20240176876A1 (en) * | 2022-11-30 | 2024-05-30 | Island Technology, Inc. | Kernel-based protection of computer processes |
Family Cites Families (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6219423B1 (en) * | 1995-12-29 | 2001-04-17 | Intel Corporation | System and method for digitally signing a digital agreement between remotely located nodes |
US6272631B1 (en) * | 1997-06-30 | 2001-08-07 | Microsoft Corporation | Protected storage of core data secrets |
US6098056A (en) | 1997-11-24 | 2000-08-01 | International Business Machines Corporation | System and method for controlling access rights to and security of digital content in a distributed information system, e.g., Internet |
US6697489B1 (en) | 1999-03-30 | 2004-02-24 | Sony Corporation | Method and apparatus for securing control words |
US20020047892A1 (en) * | 2000-05-18 | 2002-04-25 | Gonsalves Charles J. | Video messaging and video answering apparatus |
US7181017B1 (en) | 2001-03-23 | 2007-02-20 | David Felsher | System and method for secure three-party communications |
EP1470497A1 (en) | 2002-01-12 | 2004-10-27 | Coretrust, Inc. | Method and system for the information protection of digital content |
US7062656B2 (en) * | 2002-02-22 | 2006-06-13 | International Busness Machines Corporation | Method for providing secure access to information held in a shared respiratory |
US20060143453A1 (en) * | 2002-06-19 | 2006-06-29 | Secured Communications, Inc | Inter-authentication method and device |
US7287269B2 (en) * | 2002-07-29 | 2007-10-23 | International Buiness Machines Corporation | System and method for authenticating and configuring computing devices |
CN100380337C (zh) | 2002-08-09 | 2008-04-09 | 威斯托公司 | 用于阻止访问被破解的远程设备上的数据的***和方法 |
US7302570B2 (en) | 2003-08-19 | 2007-11-27 | International Business Machines Corporation | Apparatus, system, and method for authorized remote access to a target system |
WO2005043802A1 (en) * | 2003-10-20 | 2005-05-12 | Drm Technologies, Llc | Securing digital content system and method |
US20050182966A1 (en) * | 2004-02-17 | 2005-08-18 | Duc Pham | Secure interprocess communications binding system and methods |
US7591012B2 (en) * | 2004-03-02 | 2009-09-15 | Microsoft Corporation | Dynamic negotiation of encryption protocols |
US20060195689A1 (en) * | 2005-02-28 | 2006-08-31 | Carsten Blecken | Authenticated and confidential communication between software components executing in un-trusted environments |
WO2006125112A2 (en) | 2005-05-19 | 2006-11-23 | Fusionone, Inc. | Remote cell phone auto destruct |
US20070014403A1 (en) | 2005-07-18 | 2007-01-18 | Creative Technology Ltd. | Controlling distribution of protected content |
CA2553081C (en) | 2006-07-24 | 2015-08-25 | Diversinet Corp. | A method for binding a security element to a mobile device |
US20090249492A1 (en) * | 2006-09-21 | 2009-10-01 | Hans Martin Boesgaard Sorensen | Fabrication of computer executable program files from source code |
CA2676289C (en) | 2007-01-19 | 2018-01-02 | Research In Motion Limited | Selectively wiping a remote device |
US8219821B2 (en) | 2007-03-27 | 2012-07-10 | Netapp, Inc. | System and method for signature based data container recognition |
US8369526B2 (en) * | 2008-02-12 | 2013-02-05 | Discretix Technologies Ltd. | Device, system, and method of securely executing applications |
JP2009258860A (ja) | 2008-04-14 | 2009-11-05 | Sony Corp | 情報処理装置および方法、記録媒体、プログラム、並びに情報処理システム |
US20090262926A1 (en) | 2008-04-16 | 2009-10-22 | Infineon Technologies Ag | Method and apparatus for generating a cryptographic key |
US8781127B2 (en) * | 2008-09-05 | 2014-07-15 | Vixs Systems, Inc. | Device with privileged memory and applications thereof |
US8443411B2 (en) | 2008-11-26 | 2013-05-14 | At&T Intellectual Property I, Lp | System and method to distribute video-on-demand content |
KR101881303B1 (ko) | 2011-11-08 | 2018-08-28 | 삼성전자주식회사 | 애플리케이션 데이터 보호를 위한 휴대용 단말기의 장치 및 방법 |
-
2013
- 2013-02-27 CN CN201380011109.9A patent/CN104137466B/zh active Active
- 2013-02-27 WO PCT/US2013/027954 patent/WO2013130555A2/en active Application Filing
- 2013-02-27 EP EP13754649.5A patent/EP2820792B1/en active Active
- 2013-02-28 US US13/780,191 patent/US9385996B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
US9385996B2 (en) | 2016-07-05 |
US20130227279A1 (en) | 2013-08-29 |
EP2820792A2 (en) | 2015-01-07 |
WO2013130555A3 (en) | 2013-12-19 |
EP2820792B1 (en) | 2019-06-12 |
EP2820792A4 (en) | 2015-11-11 |
WO2013130555A2 (en) | 2013-09-06 |
CN104137466A (zh) | 2014-11-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104137466B (zh) | 操作计算设备的方法及计算设备 | |
CN104145444B (zh) | 操作计算设备的方法、计算设备及计算机程序 | |
CN104145446B (zh) | 操作计算设备的方法、计算设备及计算机程序 | |
JP6609010B2 (ja) | 複数許可データセキュリティ及びアクセス | |
CN110535833B (zh) | 一种基于区块链的数据共享控制方法 | |
CN105027107B (zh) | 迁移计算资源的计算机实现的方法及计算*** | |
US11675922B2 (en) | Secure storage of and access to files through a web application | |
US20140282840A1 (en) | Managing data handling policies | |
KR20140093716A (ko) | 컴퓨팅 장치를 보안화하는 방법 | |
US10990692B2 (en) | Managing data handling policies | |
CN103841113A (zh) | 一种基于用户模式文件***的安全网络文件*** | |
KR20220039779A (ko) | 강화된 보안 암호화 및 복호화 시스템 | |
WO2019083379A1 (en) | DATA TRANSMISSION | |
JP5678150B2 (ja) | ユーザ端末、鍵管理システム、及びプログラム | |
CN108494724A (zh) | 基于多授权机构属性加密算法的云存储加密***及方法 | |
JP2015138336A (ja) | 電子データの管理方法、そのためのプログラム及び、プログラムの記録媒体 | |
US20140282838A1 (en) | Managing data handling policies | |
JP6778033B2 (ja) | 持ち出しファイル簡易暗号化システムおよび持ち出しファイル簡易暗号化プログラム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C41 | Transfer of patent application or patent right or utility model | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20170116 Address after: Voight, Canada Applicant after: Good Technology Holdings Limited Address before: Delaware Applicant before: Visto Corp. |
|
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20180118 Address after: Voight, Ontario, Canada Applicant after: Blackberry Ltd. Address before: Voight, Canada Applicant before: Good Technology Holdings Limited |
|
GR01 | Patent grant | ||
GR01 | Patent grant |