Movatterモバイル変換


[0]ホーム

URL:


SG11201403482TA - Automated access, key, certificate, and credential management - Google Patents

Automated access, key, certificate, and credential management

Info

Publication number
SG11201403482TA
SG11201403482TASG11201403482TASG11201403482TASG11201403482TASG 11201403482T ASG11201403482T ASG 11201403482TASG 11201403482T ASG11201403482T ASG 11201403482TASG 11201403482T ASG11201403482T ASG 11201403482TASG 11201403482T ASG11201403482T ASG 11201403482TA
Authority
SG
Singapore
Prior art keywords
certificate
key
credential management
automated access
automated
Prior art date
Application number
SG11201403482TA
Inventor
Tatu J Ylönen
Original Assignee
Ssh Comm Security Oyj
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ssh Comm Security OyjfiledCriticalSsh Comm Security Oyj
Publication of SG11201403482TApublicationCriticalpatent/SG11201403482TA/en

Links

Classifications

Landscapes

SG11201403482TA2011-12-212012-12-21Automated access, key, certificate, and credential managementSG11201403482TA (en)

Applications Claiming Priority (6)

Application NumberPriority DateFiling DateTitle
US201161578389P2011-12-212011-12-21
US201261646978P2012-05-152012-05-15
US201261693278P2012-08-252012-08-25
US201261697768P2012-09-062012-09-06
US201261721278P2012-11-012012-11-01
PCT/FI2012/051294WO2013093209A1 (en)2011-12-212012-12-21Automated access, key, certificate, and credential management

Publications (1)

Publication NumberPublication Date
SG11201403482TAtrue SG11201403482TA (en)2014-07-30

Family

ID=48667820

Family Applications (1)

Application NumberTitlePriority DateFiling Date
SG11201403482TASG11201403482TA (en)2011-12-212012-12-21Automated access, key, certificate, and credential management

Country Status (4)

CountryLink
US (11)US9515999B2 (en)
EP (1)EP2792104B1 (en)
SG (1)SG11201403482TA (en)
WO (1)WO2013093209A1 (en)

Families Citing this family (427)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9762685B2 (en)2005-04-272017-09-12Live Nation Entertainment, Inc.Location-based task execution for enhanced data access
US20140379390A1 (en)2013-06-202014-12-25Live Nation Entertainment, Inc.Location-based presentations of ticket opportunities
US11843594B2 (en)2007-09-042023-12-12Live Nation Entertainment, Inc.Controlled token distribution to protect against malicious data and resource access
US10454674B1 (en)*2009-11-162019-10-22Arm LimitedSystem, method, and device of authenticated encryption of messages
US9231758B2 (en)2009-11-162016-01-05Arm Technologies Israel Ltd.System, device, and method of provisioning cryptographic data to electronic devices
US9781170B2 (en)2010-06-152017-10-03Live Nation Entertainment, Inc.Establishing communication links using routing protocols
US8782434B1 (en)2010-07-152014-07-15The Research Foundation For The State University Of New YorkSystem and method for validating program execution at run-time
US10003458B2 (en)2011-12-212018-06-19Ssh Communications Security Corp.User key management for the secure shell (SSH)
SG11201403482TA (en)2011-12-212014-07-30Ssh Comm Security OyjAutomated access, key, certificate, and credential management
US10084818B1 (en)2012-06-072018-09-25Amazon Technologies, Inc.Flexibly configurable data modification services
US10075471B2 (en)2012-06-072018-09-11Amazon Technologies, Inc.Data loss prevention techniques
US9590959B2 (en)2013-02-122017-03-07Amazon Technologies, Inc.Data security service
US9286491B2 (en)2012-06-072016-03-15Amazon Technologies, Inc.Virtual service provider zones
US10394946B2 (en)2012-09-072019-08-27Splunk Inc.Refining extraction rules based on selected text within events
US8751963B1 (en)2013-01-232014-06-10Splunk Inc.Real time indication of previously extracted data fields for regular expressions
US9753909B2 (en)2012-09-072017-09-05Splunk, Inc.Advanced field extractor with multiple positive examples
US8682906B1 (en)2013-01-232014-03-25Splunk Inc.Real time display of data field values based on manual editing of regular expressions
US9594814B2 (en)2012-09-072017-03-14Splunk Inc.Advanced field extractor with modification of an extracted field
US20140208217A1 (en)2013-01-222014-07-24Splunk Inc.Interface for managing splittable timestamps across event records
US9122873B2 (en)2012-09-142015-09-01The Research Foundation For The State University Of New YorkContinuous run-time validation of program execution: a practical approach
US9069782B2 (en)2012-10-012015-06-30The Research Foundation For The State University Of New YorkSystem and method for security and privacy aware virtual machine checkpointing
US9680813B2 (en)*2012-10-242017-06-13Cyber-Ark Software Ltd.User provisioning
CN103259656B (en)*2012-11-072016-08-31鹤山世达光电科技有限公司work transmission method and system
WO2014094857A1 (en)*2012-12-202014-06-26Telefonaktiebolaget L M Ericsson (Publ)Technique for enabling a client to provide a server entity
US9697629B1 (en)2013-01-222017-07-04Hypori, Inc.System, method and computer product for user performance and device resolution settings
US9380523B1 (en)2013-01-222016-06-28Hypori, Inc.System, method and computer program product for connecting roaming mobile devices to a virtual device platform
US9667703B1 (en)*2013-01-222017-05-30Hypori, Inc.System, method and computer program product for generating remote views in a virtual mobile device platform
US9380456B1 (en)2013-01-222016-06-28Hypori, Inc.System, method and computer program product for dynamically switching operating systems in a virtual mobile device platform
US9380562B1 (en)2013-01-222016-06-28Hypori, Inc.System, method and computer program product for providing notifications from a virtual device to a disconnected physical device
US9819593B1 (en)2013-01-222017-11-14Hypori, Inc.System, method and computer program product providing bypass mechanisms for a virtual mobile device platform
US9619673B1 (en)2013-01-222017-04-11Hypori, Inc.System, method and computer program product for capturing touch events for a virtual mobile device platform
US9152929B2 (en)2013-01-232015-10-06Splunk Inc.Real time display of statistics and values for selected regular expressions
US10211977B1 (en)*2013-02-122019-02-19Amazon Technologies, Inc.Secure management of information using a security module
US9705674B2 (en)2013-02-122017-07-11Amazon Technologies, Inc.Federated key management
US9930066B2 (en)2013-02-122018-03-27Nicira, Inc.Infrastructure level LAN security
US9367697B1 (en)2013-02-122016-06-14Amazon Technologies, Inc.Data security with a security module
US10467422B1 (en)2013-02-122019-11-05Amazon Technologies, Inc.Automatic key rotation
US9300464B1 (en)2013-02-122016-03-29Amazon Technologies, Inc.Probabilistic key rotation
KR101520247B1 (en)*2013-02-272015-05-15주식회사 케이티Method And System For Biometric Data Management
US9043593B2 (en)2013-03-112015-05-26International Business Machines CorporationSession attribute propagation through secure database server tiers
US9286305B2 (en)*2013-03-142016-03-15Fujitsu LimitedVirtual storage gate system
US10771247B2 (en)*2013-03-152020-09-08Commerce Signals, Inc.Key pair platform and system to manage federated trust networks in distributed advertising
US11222346B2 (en)2013-03-152022-01-11Commerce Signals, Inc.Method and systems for distributed signals for use with advertising
US9799042B2 (en)2013-03-152017-10-24Commerce Signals, Inc.Method and systems for distributed signals for use with advertising
US10803512B2 (en)2013-03-152020-10-13Commerce Signals, Inc.Graphical user interface for object discovery and mapping in open systems
US9317718B1 (en)2013-03-292016-04-19Secturion Systems, Inc.Security device with programmable systolic-matrix cryptographic module and programmable input/output interface
US9798899B1 (en)2013-03-292017-10-24Secturion Systems, Inc.Replaceable or removable physical interface input/output module
US9355279B1 (en)2013-03-292016-05-31Secturion Systems, Inc.Multi-tenancy architecture
US9374344B1 (en)2013-03-292016-06-21Secturion Systems, Inc.Secure end-to-end communication system
US9524399B1 (en)2013-04-012016-12-20Secturion Systems, Inc.Multi-level independent security architecture
US9832171B1 (en)2013-06-132017-11-28Amazon Technologies, Inc.Negotiating a session with a cryptographic domain
US9178888B2 (en)*2013-06-142015-11-03Go Daddy Operating Company, LLCMethod for domain control validation
EP3011430A4 (en)*2013-06-192017-02-08Hewlett-Packard Enterprise Development LPUnifying application log messages using runtime instrumentation
US9760697B1 (en)*2013-06-272017-09-12Interacvault Inc.Secure interactive electronic vault with dynamic access controls
US10681023B2 (en)2013-06-282020-06-09Ssh Communications Security OyjSelf-service portal for provisioning passwordless access
US9961052B2 (en)*2013-06-282018-05-01Extreme Networks, Inc.Virtualized host ID key sharing
EP2824888B1 (en)*2013-07-082020-04-01SSH Communications Security OyjTrust relationships in a computerized system
US10347286B2 (en)2013-07-252019-07-09Ssh Communications Security OyjDisplaying session audit logs
US8930576B1 (en)*2013-07-252015-01-06KE2 Therm Solutions, Inc.Secure communication network
US9100175B2 (en)2013-11-192015-08-04M2M And Iot Technologies, LlcEmbedded universal integrated circuit card supporting two-factor authentication
US9350550B2 (en)2013-09-102016-05-24M2M And Iot Technologies, LlcPower management and security for wireless modules in “machine-to-machine” communications
US10498530B2 (en)2013-09-272019-12-03Network-1 Technologies, Inc.Secure PKI communications for “machine-to-machine” modules, including key derivation by modules and authenticating public keys
US9485099B2 (en)*2013-10-252016-11-01Cliqr Technologies, Inc.Apparatus, systems and methods for agile enablement of secure communications for cloud based applications
US10700856B2 (en)2013-11-192020-06-30Network-1 Technologies, Inc.Key derivation for a module using an embedded universal integrated circuit card
JP6478486B2 (en)*2013-11-202019-03-06キヤノン株式会社 Information processing apparatus, control method thereof, and program
US9430212B2 (en)*2014-02-102016-08-30Netflix, Inc.Automatically generating volume images and launching virtual computing instances
US9218463B2 (en)2014-02-212015-12-22Venafi, Inc.Trust map management and user interface
US9485271B1 (en)*2014-03-112016-11-01Symantec CorporationSystems and methods for anomaly-based detection of compromised IT administration accounts
US10043029B2 (en)2014-04-042018-08-07Zettaset, Inc.Cloud storage encryption
US10298555B2 (en)2014-04-042019-05-21Zettaset, Inc.Securing files under the semi-trusted user threat model using per-file key encryption
US10873454B2 (en)2014-04-042020-12-22Zettaset, Inc.Cloud storage encryption with variable block sizes
US9363247B2 (en)2014-04-042016-06-07Zettaset, Inc.Method of securing files under the semi-trusted user threat model using symmetric keys and per-block key encryption
US10430779B2 (en)*2014-04-082019-10-01Capital One Services LlcSystems and methods for transacting at an ATM using a mobile device
US9397835B1 (en)2014-05-212016-07-19Amazon Technologies, Inc.Web of trust management in a distributed system
US20160149877A1 (en)*2014-06-052016-05-26Cavium, Inc.Systems and methods for cloud-based web service security management basedon hardware security module
US9674261B2 (en)*2014-06-102017-06-06Sap Portals Israel Ltd.ODBC access to external services
US9438421B1 (en)2014-06-272016-09-06Amazon Technologies, Inc.Supporting a fixed transaction rate with a variably-backed logical cryptographic key
US9792447B2 (en)2014-06-302017-10-17Nicira, Inc.Method and apparatus for differently encrypting different flows
US9712563B2 (en)2014-07-072017-07-18Cyber-Ark Software Ltd.Connection-specific communication management
US20160014077A1 (en)*2014-07-102016-01-14Aorato Ltd.System, Method and Process for Mitigating Advanced and Targeted Attacks with Authentication Error Injection
EP2985945A1 (en)*2014-08-152016-02-17CompuGroup Medical AGMethod for secure e-mail exchange
US10452850B2 (en)*2014-08-182019-10-22International Business Machines CorporationProtected shell for risk validation
US9866392B1 (en)2014-09-152018-01-09Amazon Technologies, Inc.Distributed system web of trust provisioning
US9288050B1 (en)2014-09-252016-03-15International Business Machines CorporationUnified storage and management of cryptographic keys and certificates
US10346631B2 (en)*2014-09-302019-07-09Entit Software LlcMetrics authorization based on a certificate
US9552485B1 (en)*2014-10-212017-01-24Amazon Technologies, Inc.Cryptographic material renewal
US10367646B1 (en)2014-10-212019-07-30Amazon Technologies, Inc.Cryptographic material distribution and management
CN105592011B (en)2014-10-232019-12-24阿里巴巴集团控股有限公司Account login method and device
US11399019B2 (en)2014-10-242022-07-26Netflix, Inc.Failure recovery mechanism to re-establish secured communications
US11533297B2 (en)*2014-10-242022-12-20Netflix, Inc.Secure communication channel with token renewal mechanism
US10303879B1 (en)*2014-11-062019-05-28Amazon Technologies, Inc.Multi-tenant trusted platform modules
GB2532415A (en)*2014-11-112016-05-25IbmProcessing a guest event in a hypervisor-controlled system
US9785765B2 (en)*2014-11-132017-10-10Microsoft Technology Licensing, LlcSystems and methods for differential access control based on secrets
US20160140653A1 (en)*2014-11-142016-05-19Ryan McKenzieVirtual currency bank
DE102014225418A1 (en)*2014-12-102016-06-16Siemens Aktiengesellschaft Method and device for monitoring a certification authority
US10587595B1 (en)*2014-12-302020-03-10Acronis International GmbhControlling access to content
US10223549B2 (en)*2015-01-212019-03-05Onion ID Inc.Techniques for facilitating secure, credential-free user access to resources
US9853977B1 (en)2015-01-262017-12-26Winklevoss Ip, LlcSystem, method, and program product for processing secure transactions within a cloud computing system
DE102015201298A1 (en)*2015-01-262016-07-28Robert Bosch Gmbh Method for the cryptographic processing of data
US10348727B2 (en)*2015-02-132019-07-09International Business Machines CorporationAutomatic key management using enterprise user identity management
US10454676B2 (en)*2015-02-132019-10-22International Business Machines CorporationAutomatic key management using enterprise user identity management
US20180054438A1 (en)*2015-03-022018-02-22Microsoft Technology Licensing, LlcProxy service for uploading data from a source to a destination
US9531536B2 (en)2015-03-042016-12-27Ssh Communications OyjShared keys in a computerized system
US10146931B1 (en)*2015-03-132018-12-04EMC IP Holding Company LLCOrganization-level password management employing user-device password vault
US9722987B2 (en)2015-03-132017-08-01Ssh Communications Security OyjAccess relationships in a computer system
US10454899B1 (en)*2015-03-162019-10-22Amazon Technologies, Inc.Controlling firewall ports in virtualized environments through public key cryptography
US10951473B1 (en)*2015-03-252021-03-16Amazon Technologies, Inc.Asynchronous fleet configuration service
US10528945B1 (en)2015-03-312020-01-07Square, Inc.Open ticket payment handling with incremental authorization
US10043162B1 (en)2015-03-312018-08-07Square, Inc.Open ticket payment handling with bill splitting
US9930050B2 (en)*2015-04-012018-03-27Hand Held Products, Inc.Device management proxy for secure devices
US9503449B1 (en)*2015-05-122016-11-22Payoda Inc.Application centric centralized certificate management system for managing certificates across data centers
US10102232B2 (en)*2015-05-142018-10-16Ssh Communications Security OyjStoring structured information
US11503035B2 (en)*2017-04-102022-11-15The University Of Memphis Research FoundationMulti-user permission strategy to access sensitive information
CN104869175B (en)*2015-06-162018-07-27腾讯科技(北京)有限公司Cross-platform account resource-sharing implementation method, apparatus and system
US9530260B1 (en)*2015-06-172016-12-27Toyota Motor Engineering & Manufacturing North America, Inc.Smart key registration notification system
US10432610B2 (en)*2015-06-302019-10-01Vmware, Inc.Automated monitoring and managing of certificates
US9819497B2 (en)*2015-06-302017-11-14Vmware, Inc.Automated provisioning of certificates
US20170048209A1 (en)*2015-07-142017-02-16Fmr LlcCrypto Key Recovery and Social Aggregating, Fractionally Efficient Transfer Guidance, Conditional Triggered Transaction, Datastructures, Apparatuses, Methods and Systems
JP5951094B1 (en)*2015-09-072016-07-13ヤフー株式会社 Generation device, terminal device, generation method, generation program, and authentication processing system
JP6122924B2 (en)2015-09-112017-04-26ヤフー株式会社 Providing device, terminal device, providing method, providing program, and authentication processing system
US9794064B2 (en)2015-09-172017-10-17Secturion Systems, Inc.Client(s) to cloud or remote server secure data or file object encryption gateway
CN105162668B (en)*2015-09-172018-09-18小米科技有限责任公司Connect method and device for removing
US11283774B2 (en)2015-09-172022-03-22Secturion Systems, Inc.Cloud storage using encryption gateway with certificate authority identification
US10332107B2 (en)2015-09-282019-06-25Mastercard International IncorporatedSecure shell file transfer protocol key administration
US10069817B2 (en)*2015-09-282018-09-04Mastercard International IncorporatedSecure file transfer with secure SSH key authentication
US9569757B1 (en)2015-09-302017-02-14Square, Inc.Anticipatory creation of point-of-sale data structures
CN108140090B (en)*2015-10-022021-11-09通力股份公司Access passenger conveyor control
US9729318B2 (en)*2015-10-052017-08-08International Business Machines CorporationUsing everyday objects as cryptographic keys
US9604541B1 (en)*2015-10-062017-03-28Samsung Electronics Co., Ltd.System and method for customizing a vehicle operating environment
US10084807B2 (en)*2015-10-162018-09-25Microsoft Technology Licensing, Llc.Detection of bypass vulnerabilities
US10708236B2 (en)2015-10-262020-07-07Secturion Systems, Inc.Multi-independent level secure (MILS) storage encryption
US10749854B2 (en)*2015-11-122020-08-18Microsoft Technology Licensing, LlcSingle sign-on identity management between local and remote systems
JP6579935B2 (en)*2015-12-092019-09-25キヤノン株式会社 Management apparatus, method and program
US10198595B2 (en)*2015-12-222019-02-05Walmart Apollo, LlcData breach detection system
US10318747B1 (en)*2015-12-302019-06-11Amazon Technologies, Inc.Block chain based authentication
EP3410757B1 (en)*2016-01-262019-12-18Soracom, Inc.Server and program
CN105718794B (en)*2016-01-272018-06-05华为技术有限公司The method and system of safeguard protection are carried out to virtual machine based on VTPM
US11424931B2 (en)*2016-01-272022-08-23Blackberry LimitedTrusted execution environment
KR101905771B1 (en)*2016-01-292018-10-11주식회사 엔오디비즈웨어Self defense security server with behavior and environment analysis and operating method thereof
US10599409B2 (en)2016-02-022020-03-24Blackberry LimitedApplication lifecycle operation queueing
US11611564B2 (en)*2016-02-152023-03-21Luigius CaramicoMethods and systems of dual-layer computer-system security
US10091243B2 (en)*2016-02-242018-10-02Qualcomm IncorporatedApparatus and method for securely connecting to a remote server
US11282310B1 (en)*2016-03-022022-03-22Geokey, Inc.System and method for location-based access control
US20170262279A1 (en)*2016-03-122017-09-14Wipro LimitedMethods and systems for developing user customizable web application frameworks
US10673697B2 (en)*2016-03-132020-06-02Cisco Technology, Inc.Bridging configuration changes for compliant devices
US10437853B2 (en)*2016-03-162019-10-08Microsoft Technology Licensing, LlcTracking data replication and discrepancies in incremental data audits
US10594731B2 (en)*2016-03-242020-03-17Snowflake Inc.Systems, methods, and devices for securely managing network connections
WO2017168775A1 (en)*2016-03-312017-10-05サトーホールディングス株式会社Server, information processing system, client terminal
CN107371155B (en)2016-05-132021-08-31华为技术有限公司 Communication security processing method, device and system
US10554683B1 (en)*2016-05-192020-02-04Board Of Trustees Of The University Of Alabama, For And On Behalf Of The University Of Alabama In HuntsvilleSystems and methods for preventing remote attacks against transportation systems
US10289991B1 (en)2016-06-132019-05-14Square, Inc.Utilizing APIs to facilitate open ticket synchronization
US10289992B1 (en)*2016-06-172019-05-14Square, Inc.Kitchen display interfaces with in flight capabilities
US10311420B1 (en)*2016-06-172019-06-04Square, Inc.Synchronizing open ticket functionality with kitchen display systems
US10360648B1 (en)2016-06-222019-07-23Square, Inc.Synchronizing KDS functionality with POS waitlist generation
US10321306B2 (en)*2016-06-242019-06-11Aerohive Networks, Inc.Network device selective synchronization
US11126565B2 (en)*2016-06-272021-09-21Hewlett Packard Enterprise Development LpEncrypted memory access using page table attributes
US10580062B1 (en)2016-06-282020-03-03Square, Inc.Integrating predefined templates with open ticket functionality
US10318451B2 (en)2016-06-302019-06-11Ge Aviation Systems LlcManagement of data transfers
US10200110B2 (en)2016-06-302019-02-05Ge Aviation Systems LlcAviation protocol conversion
US10819601B2 (en)2016-06-302020-10-27Ge Aviation Systems LlcWireless control unit server for conducting connectivity test
US10681132B2 (en)2016-06-302020-06-09Ge Aviation Systems LlcProtocol for communicating engine data to wireless communication unit
US10529150B2 (en)2016-06-302020-01-07Aviation Systems LLCRemote data loading for configuring wireless communication unit for communicating engine data
US10470114B2 (en)2016-06-302019-11-05General Electric CompanyWireless network selection
US10764747B2 (en)2016-06-302020-09-01Ge Aviation Systems LlcKey management for wireless communication system for communicating engine data
US10444748B2 (en)2016-06-302019-10-15Ge Aviation Systems LlcIn-situ measurement logging by wireless communication unit for communicating engine data
US10467016B2 (en)2016-06-302019-11-05General Electric CompanyManaging an image boot
US10712377B2 (en)2016-06-302020-07-14Ge Aviation Systems LlcAntenna diagnostics for wireless communication unit for communicating engine data
EP3497633A1 (en)*2016-08-092019-06-19AppViewX Inc.Application centric centralized certificate management system for managing certificates across data centers
US10530579B2 (en)2016-08-122020-01-07Venafi, Inc.Cryptographic key control based on debasing condition likelihood estimation
WO2018037439A1 (en)*2016-08-222018-03-01楽天株式会社Management system, management device, management method, program, and non-transitory computer-readable information recording medium
US10614229B2 (en)*2016-08-242020-04-07International Business Machines CorporationSecurity and privacy controls for remote-access support services
US10798073B2 (en)2016-08-262020-10-06Nicira, Inc.Secure key management protocol for distributed network encryption
CN106453675B (en)*2016-09-192022-07-08网宿科技股份有限公司302 jump method, URL (Uniform resource locator) generation method and system and domain name resolution method and system
US11184318B2 (en)*2016-09-192021-11-23Wangsu Science & Technology Co., Ltd.302 redirecting method, URL generating method and system, and domain-name resolving method and system
CN107948123B (en)2016-10-122021-01-12钉钉控股(开曼)有限公司File transmission method and device
CN109804378A (en)*2016-10-212019-05-24惠普发展公司 ,有限责任合伙企业BIOS safety
KR101886176B1 (en)*2016-10-252018-08-08시큐리티플랫폼 주식회사Memory device having booting part which is recordable only by owner
US11018860B2 (en)2016-10-282021-05-25Microsoft Technology Licensing, LlcHighly available and reliable secret distribution infrastructure
US10855464B2 (en)*2016-11-232020-12-01Vmware, Inc.Methods and apparatus to manage credentials in hyper-converged infrastructures
US10891370B2 (en)*2016-11-232021-01-12Blackberry LimitedPath-based access control for message-based operating systems
US11182203B2 (en)2016-12-062021-11-23Vmware, Inc.Systems and methods to orchestrate infrastructure installation of a hybrid system
US10338981B2 (en)2016-12-062019-07-02Vmware, IncSystems and methods to facilitate infrastructure installation checks and corrections in a distributed environment
US10462123B2 (en)2016-12-062019-10-29Vmware, Inc.Systems and methods for cloning an agent in a distributed environment
US10341327B2 (en)2016-12-062019-07-02Bank Of America CorporationEnabling secure connections by managing signer certificates
US11153297B2 (en)*2016-12-062021-10-19Vmware, Inc.Systems and methods to facilitate certificate and trust management across a distributed environment
US10666683B2 (en)*2016-12-072020-05-26Cisco Technology, Inc.User interface for low-touch security policy provisioning
US10326746B1 (en)*2016-12-202019-06-18Amazon Technologies, Inc.Access key retrieval service for clients
US10389722B2 (en)*2016-12-302019-08-20Ssh Communications Security OyjAccess relationships in a computer system
US11700258B2 (en)2016-12-302023-07-11Ssh Communications Security OyjAccess relationships in a computer system
US10374810B2 (en)*2017-01-052019-08-06Bank Of America CorporationMiddleware system validation tool
JP2018113493A (en)*2017-01-062018-07-19キヤノン株式会社 Client device, system, information processing method, and program
US10580242B2 (en)*2017-01-202020-03-03Macron International, Inc.Asset management system utilizing a mobile application
US11010352B2 (en)2017-01-232021-05-18Hysolate Ltd.Unified file system on air-gapped endpoints
US10699003B2 (en)2017-01-232020-06-30Hysolate Ltd.Virtual air-gapped endpoint, and methods thereof
US11150936B2 (en)*2017-01-232021-10-19Hysolate Ltd.Techniques for binding user identities to appropriate virtual machines with single sign-on
US11153322B2 (en)2017-01-232021-10-19Hysolate Ltd.Techniques for seamlessly launching applications in appropriate virtual machines
US10360353B2 (en)2017-02-082019-07-23International Business Machines CorporationExecution control of computer software instructions
US10574634B2 (en)*2017-02-102020-02-25Ssh Communications Security OyjManagement of authenticator information in a computer system
EP3364329B1 (en)*2017-02-212023-07-26Mastercard International IncorporatedSecurity architecture for device applications
US20180262349A1 (en)*2017-03-132018-09-13Honeywell International Inc.System and approach to deploy secure communication for a network
US12111944B2 (en)*2017-03-162024-10-08Jun YuMethod and system for policy based real time data file access control
CN106790308A (en)*2017-03-282017-05-31北京中电普华信息技术有限公司A kind of user authen method, apparatus and system
US10013560B1 (en)*2017-04-052018-07-03International Business Machines CorporationSecurely exchanging information during application startup
CN107094138B (en)*2017-04-112019-09-13郑州信大捷安信息技术股份有限公司A kind of smart home safe communication system and communication means
US10296425B2 (en)2017-04-202019-05-21Bank Of America CorporationOptimizing data processing across server clusters and data centers using checkpoint-based data replication
US11288167B2 (en)2017-04-252022-03-29Hnl Partners, LlcSystem and method for visualizing and measuring software assets
US11080162B2 (en)*2017-04-252021-08-03Hnl Partners, LlcSystem and method for visualizing and measuring software assets
KR20200027921A (en)*2017-04-282020-03-13아이언코어 랩스 인코포레이티드 Orthogonal access control for groups through multi-hop translation encryption
EP3402152B1 (en)*2017-05-082019-10-16Siemens AktiengesellschaftSystem-specific automated certificate management
US20180338007A1 (en)*2017-05-172018-11-22American Megatrends, Inc.System and method for providing extensible communication gateway with session pooling
US10412094B2 (en)*2017-05-252019-09-10GM Global Technology Operations LLCPrivileged, diagnostic link connector based network monitoring capabilities within a vehicle employing a gateway module used to isolate and secure vehicle networks
US10824476B1 (en)*2017-06-202020-11-03Amazon Technologies, Inc.Multi-homed computing instance processes
US11163910B2 (en)*2017-06-292021-11-02Salesforce.Com, Inc.Methods and systems for data migration
US10567360B2 (en)*2017-06-292020-02-18Vmware, Inc.SSH key validation in a hyper-converged computing environment
US10749689B1 (en)*2017-06-292020-08-18Salesforce.Com, Inc.Language-agnostic secure application development
US10644890B1 (en)2017-06-292020-05-05Salesforce.ComLanguage-agnostic secure application deployment
US20190007212A1 (en)*2017-06-302019-01-03Intel CorporationSecure unlock systems for locked devices
CN107343173B (en)*2017-07-192019-11-22中标慧安信息技术股份有限公司The method and device of intellectual access connection security protection video monitoring system headend equipment
US10416986B2 (en)*2017-07-202019-09-17Vmware, Inc.Automating application updates in a virtual computing environment
US11343095B2 (en)*2017-09-192022-05-24Microsoft Technology Licensing, LlcCryplet binding key graph
US11677743B2 (en)*2017-09-282023-06-13Fortinet, Inc.Ethernet key
US10943311B1 (en)2017-09-292021-03-09Square, Inc.Order fulfillment and tracking systems and methods
US10467559B1 (en)2017-09-292019-11-05Square, Inc.Order fulfillment and tracking systems and methods
CN107517224A (en)*2017-09-292017-12-26郑州云海信息技术有限公司 A method to realize password-free login of cluster nodes
US11658982B2 (en)*2017-10-062023-05-23Red Hat, Inc.Efficient authentication in a file system with multiple security groups
US10911439B2 (en)2017-10-122021-02-02Mx Technologies, Inc.Aggregation platform permissions
US20190138635A1 (en)*2017-11-062019-05-09Getalert Ltd.Methods Data Structures Circuits Devices Systems and Functionally Associated Machine Executable Code for Artificial Intelligence Based Situational Assessment
EP3714389B1 (en)*2017-11-202023-08-02Telefonaktiebolaget LM Ericsson (PUBL)Deployment of components of a distributed application to runtime environments
US12058160B1 (en)2017-11-222024-08-06Lacework, Inc.Generating computer code for remediating detected events
US11973784B1 (en)2017-11-272024-04-30Lacework, Inc.Natural language interface for an anomaly detection framework
US11785104B2 (en)2017-11-272023-10-10Lacework, Inc.Learning from similar cloud deployments
US12130878B1 (en)2017-11-272024-10-29Fortinet, Inc.Deduplication of monitored communications data in a cloud environment
US12368745B1 (en)2017-11-272025-07-22Fortinet, Inc.Using natural language queries to conduct an investigation of a monitored system
US20220232024A1 (en)2017-11-272022-07-21Lacework, Inc.Detecting deviations from typical user behavior
US12348545B1 (en)2017-11-272025-07-01Fortinet, Inc.Customizable generative artificial intelligence (‘AI’) assistant
US12309182B1 (en)2017-11-272025-05-20Fortinet, Inc.Customer onboarding and integration with anomaly detection systems
US12323449B1 (en)2017-11-272025-06-03Fortinet, Inc.Code analysis feedback loop for code created using generative artificial intelligence (‘AI’)
US20220232025A1 (en)2017-11-272022-07-21Lacework, Inc.Detecting anomalous behavior of a device
US12355626B1 (en)2017-11-272025-07-08Fortinet, Inc.Tracking infrastructure as code (IaC) asset lifecycles
US12267345B1 (en)2017-11-272025-04-01Fortinet, Inc.Using user feedback for attack path analysis in an anomaly detection framework
US11792284B1 (en)2017-11-272023-10-17Lacework, Inc.Using data transformations for monitoring a cloud compute environment
US12284197B1 (en)2017-11-272025-04-22Fortinet, Inc.Reducing amounts of data ingested into a data warehouse
US11979422B1 (en)2017-11-272024-05-07Lacework, Inc.Elastic privileges in a secure access service edge
US12309236B1 (en)2017-11-272025-05-20Fortinet, Inc.Analyzing log data from multiple sources across computing environments
US12407702B1 (en)2017-11-272025-09-02Fortinet, Inc.Gathering and presenting information related to common vulnerabilities and exposures
US12407701B1 (en)2017-11-272025-09-02Fortinet, Inc.Community-based generation of policies for a data platform
US12381901B1 (en)2017-11-272025-08-05Fortinet, Inc.Unified storage for event streams in an anomaly detection framework
US12095796B1 (en)2017-11-272024-09-17Lacework, Inc.Instruction-level threat assessment
US12126643B1 (en)2017-11-272024-10-22Fortinet, Inc.Leveraging generative artificial intelligence (‘AI’) for securing a monitored deployment
US11765249B2 (en)2017-11-272023-09-19Lacework, Inc.Facilitating developer efficiency and application quality
US20220224707A1 (en)2017-11-272022-07-14Lacework, Inc.Establishing a location profile for a user device
US12401669B1 (en)2017-11-272025-08-26Fortinet, Inc.Container vulnerability management by a data platform
US11894984B2 (en)2017-11-272024-02-06Lacework, Inc.Configuring cloud deployments based on learnings obtained by monitoring other cloud deployments
US12335348B1 (en)2017-11-272025-06-17Fortinet, Inc.Optimizing data warehouse utilization by a data ingestion pipeline
US12261866B1 (en)2017-11-272025-03-25Fortinet, Inc.Time series anomaly detection
US11741238B2 (en)2017-11-272023-08-29Lacework, Inc.Dynamically generating monitoring tools for software applications
US12355793B1 (en)2017-11-272025-07-08Fortinet, Inc.Guided interactions with a natural language interface
US12034754B2 (en)2017-11-272024-07-09Lacework, Inc.Using static analysis for vulnerability detection
US12418555B1 (en)2017-11-272025-09-16Fortinet Inc.Guiding query creation for a generative artificial intelligence (AI)-enabled assistant
US11770398B1 (en)2017-11-272023-09-26Lacework, Inc.Guided anomaly detection framework
US11849000B2 (en)2017-11-272023-12-19Lacework, Inc.Using real-time monitoring to inform static analysis
US10614071B1 (en)2017-11-272020-04-07Lacework Inc.Extensible query interface for dynamic data compositions and filter applications
US11818156B1 (en)2017-11-272023-11-14Lacework, Inc.Data lake-enabled security platform
US12309185B1 (en)2017-11-272025-05-20Fortinet, Inc.Architecture for a generative artificial intelligence (AI)-enabled assistant
US11036532B2 (en)*2017-11-292021-06-15Microsoft Technology Licensing, LlcFast join and leave virtual network
US10652224B2 (en)2017-12-052020-05-12International Business Machines CorporationStateless session synchronization between secure communication interceptors
US10713378B2 (en)*2017-12-192020-07-14Dropbox, Inc.Techniques for eventually consistent inheritance propagation for nested content item namespaces
CN108073814B (en)*2017-12-292021-10-15安天科技集团股份有限公司Shelling method and system based on static structured shelling parameters and storage medium
CN109995553B (en)*2017-12-292022-03-25华为技术有限公司 A communication method, device and system thereof
CN107979615B (en)*2018-01-052020-07-03新华三信息安全技术有限公司Message encryption sending and authentication method, device, client and firewall
US11190363B2 (en)2018-01-112021-11-30Lg Electronics, Inc.Cryptographic methods and systems using activation codes for digital certificate revocation
CN110032131A (en)*2018-01-122019-07-19中科院微电子研究所昆山分所Electric vehicle state monitoring processing system and monitoring system based on Storm
US11184180B2 (en)*2018-02-052021-11-23Lg Electronics, Inc.Cryptographic methods and systems using blinded activation codes for digital certificate revocation
US20190251555A1 (en)*2018-02-122019-08-15Bank Of America CorporationDistributed ledger system for standby guarantee resources
CN108287917B (en)*2018-02-132020-03-10Oppo广东移动通信有限公司File opening method and device, storage medium and electronic equipment
US12154081B2 (en)*2018-02-202024-11-26Trivver, Inc.Systems and methods for facilitating a time varying cryptocurrency transfer over a decentralized network through smart contracts associated with cryptocurrency blockchain technology
US10592340B2 (en)*2018-02-282020-03-17International Business Machines CorporationDynamic authorization batching in a dispersed storage network
US11762980B2 (en)*2018-03-142023-09-19Microsoft Technology Licensing, LlcAutonomous secrets renewal and distribution
US11790470B1 (en)2018-03-162023-10-17Block, Inc.Storage service for sensitive customer data
US11847479B2 (en)2018-03-232023-12-19Vmware, Inc.Allocating a host of a pre-configured hyper-converged computing device to a workload domain
US11323274B1 (en)*2018-04-032022-05-03Amazon Technologies, Inc.Certificate authority
US11888997B1 (en)*2018-04-032024-01-30Amazon Technologies, Inc.Certificate manager
US11563590B1 (en)2018-04-032023-01-24Amazon Technologies, Inc.Certificate generation method
CN110351726B (en)*2018-04-032021-01-29华为技术有限公司 Method and device for terminal authentication
US11347868B2 (en)2018-04-172022-05-31Domo, IncSystems and methods for securely managing data in distributed systems
US10733329B1 (en)*2018-04-202020-08-04Automation Anywhere, Inc.Robotic process automation system and method with secure credential vault
US11436547B2 (en)2018-04-232022-09-06Bank Of America CorporationWearable device for operational compliance
US10924484B2 (en)2018-04-262021-02-16Radware, Ltd.Method for determining a cost to allow a blockchain-based admission to a protected entity
US10701070B2 (en)*2018-05-232020-06-30Verum Securitas, Inc.Personalized security system
CN108809964B (en)*2018-05-252021-11-09浙江齐治科技股份有限公司Resource access control method and device
US11303632B1 (en)*2018-06-082022-04-12Wells Fargo Bank, N.A.Two-way authentication system and method
CN108881257B (en)*2018-06-292021-09-28北京奇虎科技有限公司Encryption transmission method for distributed search cluster and encryption transmission distributed search cluster
US10776094B2 (en)*2018-07-292020-09-15ColorTokens, Inc.Computer implemented system and method for encoding configuration information in a filename
CN109040252B (en)*2018-08-072022-04-12平安科技(深圳)有限公司File transmission method, system, computer device and storage medium
US11206142B2 (en)2018-08-172021-12-21Cable Television Laboratories, Inc.Systems and methods for automated certificate renewal management
CN108900299B (en)*2018-08-172022-06-14延边大学Shared key method for protecting personal privacy in group communication
US11005739B2 (en)*2018-09-052021-05-11Richard K. SteenSystem and method for managing and presenting network data
US11095458B2 (en)*2018-09-062021-08-17Securosys SAHardware security module that enforces signature requirements
US10552125B1 (en)*2018-09-182020-02-04Inductive Automation, LLCMessaging between components in graphical user interfaces for industrial control systems
US10929048B2 (en)*2018-10-012021-02-23EMC IP Holding Company LLCDynamic multiple proxy deployment
US10868671B2 (en)*2018-10-112020-12-15Ademco Inc.Secured communication between host devices
US11218298B2 (en)2018-10-112022-01-04Ademco Inc.Secured communication between a host device and a client device
US10942970B2 (en)*2018-10-122021-03-09Oracle International CorporationReachability graph index for query processing
US10896032B2 (en)*2018-11-022021-01-19Accenture Global Solutions, LimitedSystem and method for certifying and deploying instruction code
DK3651427T3 (en)*2018-11-122021-03-15Ovh CONNECTION MANAGEMENT SYSTEMS AND METHODS
CN109274773B (en)*2018-11-142021-01-26四川长虹电器股份有限公司Method, device and system for realizing remote service calling
US11138680B1 (en)2018-11-212021-10-05Square, Inc.Updating menus based on predicted efficiencies
US11044257B1 (en)*2018-11-262021-06-22Amazon Technologies, Inc.One-time access to protected resources
US10915905B1 (en)2018-12-132021-02-09Square, Inc.Batch-processing transactions in response to an event
US11165786B2 (en)*2018-12-182021-11-02International Business Machines CorporationRemote assistance controller that provides control over what a remote assistor can access
US11140149B2 (en)*2018-12-202021-10-05Cisco Technology, Inc.Zero-touch bootstrap of an endpoint without admin pre-provisioning
US12010146B2 (en)*2019-01-022024-06-11Nokia Solutions And Networks OyMethod, system and apparatus for unified security configuration management
US11294696B2 (en)*2019-01-232022-04-05Vmware, Inc.Virtual desktop infrastucture management by a management service enrolling and de-enrolling a virtual machine with an endpoint manager
US11451405B2 (en)*2019-02-142022-09-20Microsoft Technology Licensing, LlcOn-demand emergency management operations in a distributed computing system
US11218329B2 (en)*2019-02-202022-01-04Arris Enterprises LlcCertificate generation with fallback certificates
US11997205B2 (en)*2019-02-252024-05-28Tbcasoft, Inc.Credential verification and issuance through credential service providers
EP3703312A1 (en)*2019-02-262020-09-02Siemens AktiengesellschaftCertificate management integrated into a system planning tool
US11329983B2 (en)*2019-03-252022-05-10Micron Technology, Inc.Validating an electronic control unit of a vehicle
US11048544B2 (en)*2019-04-082021-06-29Sap SeCloud resource credential provisioning for services running in virtual machines and containers
CN110012111B (en)*2019-04-162022-04-15昆山丘钛微电子科技股份有限公司Data service cluster system and data processing method
CN113661682B (en)*2019-04-182024-04-16维萨国际服务协会Method, system and computer readable medium for controlling access in a network
US11606301B2 (en)*2019-04-232023-03-14Hewlett Packard Enterprise Development LpVerifying intents in stateful networks using atomic address objects
US11477182B2 (en)*2019-05-072022-10-18International Business Machines CorporationCreating a credential dynamically for a key management protocol
TWI760614B (en)*2019-05-172022-04-11佳世達科技股份有限公司Host login method
US11444759B2 (en)*2019-05-292022-09-13Stmicroelectronics, Inc.Method and apparatus for cryptographically aligning and binding a secure element with a host device
US11057350B2 (en)*2019-05-302021-07-06Cisco Technology, Inc.Layer 2 mobility for hybrid multi-cloud deployments without host-overlay
US11792227B2 (en)*2019-06-122023-10-17Research & Business Foundation Sungkyunkwan UniversityI2NSF network security function facing interface YANG data model
US11665161B2 (en)*2019-06-182023-05-30Cisco Technology, Inc.Identity services for passwordless authentication
US11275858B2 (en)*2019-06-252022-03-15Vmware, Inc.Document signing system for mobile devices
US11461451B2 (en)2019-06-252022-10-04Vmware, Inc.Document signing system for mobile devices
CN110417754B (en)*2019-07-112021-12-07新华三大数据技术有限公司Host proxy service authority authentication based method and device
CN110334504A (en)*2019-07-152019-10-15晏保华A kind of cloud desktop freely logs in management system, method and device
US10749885B1 (en)*2019-07-182020-08-18Cyberark Software Ltd.Agentless management and control of network sessions
US11539678B2 (en)2019-08-162022-12-27Red Hat, Inc.Asymmetric key management for cloud computing services
US11301558B2 (en)2019-08-212022-04-12Red Hat Inc.Automatic secure storage of credentials within a managed configuration model
CN110808829B (en)*2019-09-272023-04-18国电南瑞科技股份有限公司SSH authentication method based on key distribution center
US11042562B2 (en)*2019-10-112021-06-22Sap SeScalable data extractor
US11736516B2 (en)*2019-10-302023-08-22AVAST Software s.r.o.SSL/TLS spoofing using tags
CN111143850B (en)*2019-11-222022-03-04航天恒星科技有限公司Safety protection system and method for satellite data distributed virtual storage
US10958539B1 (en)2019-12-022021-03-23Cisco Technology, Inc.Network function virtualization compute element image upgrade
US11201955B1 (en)2019-12-232021-12-14Lacework Inc.Agent networking in a containerized environment
US11256759B1 (en)2019-12-232022-02-22Lacework Inc.Hierarchical graph analysis
US11711351B2 (en)*2020-01-142023-07-25Vmware, Inc.Distributed management and installation of digital certificates on a cluster for authentication with an external key management service
US11722477B2 (en)2020-01-212023-08-08Forcepoint LlcAutomated renewal of certificates across a distributed computing security system
KR102331899B1 (en)*2020-01-222021-11-26네이버클라우드 주식회사Method and system for remote terminal access through application of communication module during boot
US11287155B2 (en)2020-02-112022-03-29Honeywell International Inc.HVAC system configuration with automatic parameter generation
US11237534B2 (en)*2020-02-112022-02-01Honeywell International Inc.Managing certificates in a building management system
US11526976B2 (en)2020-02-112022-12-13Honeywell International Inc.Using augmented reality to assist in device installation
US11632243B1 (en)*2020-03-312023-04-18Juniper Networks, Inc.Multi-key exchange
DE102020111019A1 (en)*2020-04-222021-10-28Endress+Hauser Conducta Gmbh+Co. Kg Method for checking the authenticity of electronic modules of a modular field device in automation technology
DE102020111020A1 (en)*2020-04-222021-10-28Endress+Hauser Conducta Gmbh+Co. Kg Method for checking the authentic origin of electronic modules of a modularly structured field device in automation technology
US11882110B2 (en)2020-04-292024-01-23Hewlett Packard Enterprise Development LpRenewal of security certificates of supplicants
US11245752B2 (en)*2020-04-302022-02-08Juniper Networks, Inc.Load balancing in a high-availability cluster
US11438179B2 (en)*2020-05-182022-09-06Kyndryl, Inc.Certificate renewal process outside application server environment
US12361083B2 (en)*2020-05-262025-07-15Hand in Hand Tech, LLCRelationships management systems, methods, and apparatuses
US11546315B2 (en)*2020-05-282023-01-03Hewlett Packard Enterprise Development LpAuthentication key-based DLL service
CN112347490A (en)*2020-06-112021-02-09广州锦行网络科技有限公司Application program shell adding method
US11880670B2 (en)2020-06-232024-01-23Toyota Motor North America, Inc.Execution of transport software update
US11281450B2 (en)2020-06-232022-03-22Toyota Motor North America, Inc.Secure transport software update
US11323477B1 (en)*2020-06-302022-05-03Amazon Technologies, Inc.Establishing secure connections to instances in private subnets of a cloud provider network
KR102845741B1 (en)2020-07-072025-08-13삼성전자주식회사Cloud server and Method for controlling the cloud server thereof
KR20220027060A (en)*2020-08-012022-03-07사이트릭스 시스템스, 인크. DaaS system
FR3113634B1 (en)*2020-08-272022-10-14Psa Automobiles Sa Method and system for supervising digital vehicle keys
US11019106B1 (en)2020-09-222021-05-25Netskope, Inc.Remotely accessed controlled contained environment
US11368459B2 (en)*2020-09-302022-06-21International Business Machines CorporationProviding isolated containers for user request processing
US11847310B2 (en)2020-10-092023-12-19Honeywell International Inc.System and method for auto binding graphics to components in a building management system
CN113742711B (en)*2020-10-202024-10-18北京沃东天骏信息技术有限公司Method and device for accessing container
WO2022087206A1 (en)*2020-10-232022-04-28Secturion Systems, Inc.Multi-independent level security for high performance computing and data storage systems
US11246032B1 (en)*2020-10-292022-02-08Motional Ad LlcDevice provisioning and authentication
US12081979B2 (en)*2020-11-052024-09-03Visa International Service AssociationOne-time wireless authentication of an Internet-of-Things device
US11106825B1 (en)2020-11-102021-08-31Netskope, Inc.Predetermined credential system for remote administrative operating system (OS) authorization and policy control
US11552943B2 (en)*2020-11-132023-01-10Cyberark Software Ltd.Native remote access to target resources using secretless connections
US11368314B2 (en)2020-11-132022-06-21Microsoft Technology Licensing, LlcSecure digital signing
CN112751825B (en)*2020-12-072022-09-16湖南麒麟信安科技股份有限公司Software source issuing authority control method and system based on SSL certificate
US11575569B2 (en)*2020-12-102023-02-07Vmware, Inc.Host computing systems placement in data centers
US11687666B2 (en)*2021-01-122023-06-27Visa International Service AssociationSystem, method, and computer program product for conducting private set intersection (PSI) techniques with multiple parties using a data repository
US11601399B2 (en)2021-01-202023-03-07Bank Of America CorporationSystem and method for detecting forbidden network accesses based on zone connectivity mapping
US20220237176A1 (en)*2021-01-272022-07-28EMC IP Holding Company LLCMethod and system for managing changes of records on hosts
JP2022114574A (en)*2021-01-272022-08-08富士フイルムビジネスイノベーション株式会社 Image processing system and program
TWI759096B (en)*2021-02-042022-03-21中華電信股份有限公司Building and deployment system and method of shared software solution and computer readable medium
US20220245155A1 (en)*2021-02-042022-08-04Yext, Inc.Distributed multi-source data processing and publishing platform
US12271471B2 (en)*2021-02-122025-04-08Zettaset, Inc.Detecting threats by monitoring encryption key activity
US12147561B2 (en)2021-02-192024-11-19Capital One Services, LlcAutomated database provisioning and methods thereof
US11677560B2 (en)*2021-03-092023-06-13Micron Technology, Inc.Utilization of a memory device as security token
US12238101B2 (en)*2021-03-092025-02-25Oracle International CorporationCustomizing authentication and handling pre and post authentication in identity cloud service
US11569995B2 (en)*2021-03-152023-01-31Seagate Technology LlcProvisional authentication of a new device added to an existing trust group
WO2022195301A1 (en)*2021-03-192022-09-22Citrix Systems, Inc.Passwordless login
CN112989293B (en)*2021-03-192022-03-22山东英信计算机技术有限公司Permission configuration method and device for IPMI user
US11764958B2 (en)2021-04-062023-09-19Capital One Services, LlcSystems and methods for dynamically encrypting redirect requests
US11675917B2 (en)*2021-04-222023-06-13Bank Of America CorporationElectronic system for dynamically permitting and restricting access to and modification of computer resources
US11804963B2 (en)2021-04-292023-10-31International Business Machines CorporationSystem and method for permissioned blockchain access into a computing network
US11307952B1 (en)2021-04-302022-04-19Bank Of America CorporationSystem for computing system configuration file state mirroring on peer computing devices
US11599523B2 (en)2021-04-302023-03-07Bank Of America CorporationSystem for computing system configuration file state identification using decentralized multidimensional snapshots
US11831688B2 (en)*2021-06-182023-11-28Capital One Services, LlcSystems and methods for network security
US12107861B2 (en)*2021-08-102024-10-01Capital One Services, LlcSystems and methods for managing IDs in IAM/resource policies
WO2023022724A1 (en)*2021-08-202023-02-23Hewlett-Packard Development Company, L.P.Agent-based certificate management
KR102568418B1 (en)*2021-08-262023-08-18하이파이브랩 주식회사Electronic authentication system and method supporting multi-signature
US11997206B2 (en)*2021-09-222024-05-28Radware, Ltd.Techniques for protecting web-access
US12184645B2 (en)*2021-10-142024-12-31Twilio Inc.Trust relationships to share client assets among client accounts in a software as a service platform
US20250023872A1 (en)*2021-10-202025-01-16Cryptography Research, Inc.Secure asset management infrastructure for enforcing access control policies
CN114091011A (en)*2021-10-292022-02-25青岛海尔科技有限公司 Authorization verification method, device, electronic device, storage medium and product
CN114124496B (en)*2021-11-122023-11-24福建汇思博数字科技有限公司SSH remote login method based on server issued key and server
CN114124559B (en)*2021-11-232024-04-02杭州默安科技有限公司Host recognition method based on public key fingerprint
US12088738B2 (en)2021-12-032024-09-10Amazon Technologies, Inc.Custom rules for global certificate issuance
US12407524B2 (en)*2021-12-132025-09-02Gm Cruise Holdings LlcCertificate revocation and management for autonomous vehicles
US12206738B2 (en)*2022-01-262025-01-21Dell Products L.P.Centralized and agentless in-cloud management of on-premises resources
US12225111B2 (en)*2022-03-082025-02-11SanDisk Technologies, Inc.Authorization requests from a data storage device to multiple manager devices
US12177204B2 (en)*2022-03-212024-12-24Amazon Technologies, Inc.Certificate authority selection in a cloud provider network
US20230333897A1 (en)*2022-04-152023-10-19Dell Products L.P.Method and system for performing device level management in a distributed multi-tiered computing environment
US12235938B2 (en)*2022-04-282025-02-25Dell Products L.P.Device disabled until claimed
KR20240025970A (en)*2022-08-192024-02-27현대자동차주식회사Apparatus for controlling a vehicle including rxswin information, and system for controlling a vehicle having the apparatus
US12248584B2 (en)2022-09-232025-03-11Wiz, Inc.System and method for agentless host configuration detection of an image in a virtualized environment
US12242601B2 (en)2022-09-082025-03-04Wiz, Inc.System and method for agentless host configuration detection in a computing environment
US20240086538A1 (en)*2022-09-092024-03-14Sandfly Security LimitedComputer investigation method and system for investigating authentication in remote host computers
US20240113873A1 (en)*2022-09-302024-04-04Snowflake Inc.Data platform user key-rotator
US20240129289A1 (en)*2022-10-142024-04-18Beyond Identity Inc.User certificate with user authorizations
WO2024102265A1 (en)*2022-11-092024-05-16Arris Enterprises LlcAnti-cloning of device cryptographic keys for counterfeit prevention
US12425409B2 (en)*2022-11-222025-09-23Amazon Technologies, Inc.Trust-based dynamic access control system
US11811599B1 (en)*2023-01-232023-11-07International Business Machines CorporationMulti-version compatibility for connectivity protocols
US12381772B2 (en)*2023-03-022025-08-05Hangzhou Pingpong Intelligence Technology Co., Ltd.Operation and maintenance management method and system for automatically and uniformly managing nodes of bastion host
EP4436097A1 (en)*2023-03-232024-09-25Siemens AktiengesellschaftMethod and system for cryptographically secure data transmission
CN116701335B (en)*2023-05-172024-06-18中国第一汽车股份有限公司Cross-system log data processing method for vehicle-mounted cabin domain controller
US12218928B2 (en)*2023-06-022025-02-04Dell Products L.P.Data center asset authentication via an onboarding operation
US20240411910A1 (en)*2023-06-072024-12-12Dell Products L.P.Data protection using policy-based digital vault rotation
US20250030548A1 (en)*2023-07-192025-01-23Qomplx Llc.Kerberos interdiction and decryption for real-time analysis
US20250124120A1 (en)*2023-10-162025-04-17Akamai Technologies, Inc.Federated Secret Management For Workload Instances In Cloud Compute Platforms
CN117453816B (en)*2023-10-242024-05-07上海宁盾信息科技有限公司User data unifying method, system, computer and storage medium

Family Cites Families (124)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JPH09167098A (en)1995-07-281997-06-24Hewlett Packard Co <Hp>Communication system for portable device
US6301661B1 (en)*1997-02-122001-10-09Verizon Labortories Inc.Enhanced security for applications employing downloadable executable content
JP3595109B2 (en)*1997-05-282004-12-02日本ユニシス株式会社 Authentication device, terminal device, authentication method in those devices, and storage medium
US6681017B1 (en)*1997-09-032004-01-20Lucent Technologies Inc.Simplified secure shared key establishment and data delivery protocols for electronic commerce
US6430562B1 (en)1999-03-012002-08-06Electronic Data Systems CorporationIntegrated resource management system and method
US6678734B1 (en)1999-11-132004-01-13Ssh Communications Security Ltd.Method for intercepting network packets in a computing device
JP3582435B2 (en)1999-12-102004-10-27日本電気株式会社 Perpendicular magnetic recording medium
US6581113B1 (en)1999-12-292003-06-17Advanced Micro Devices, Inc.Apparatus and method for transferring frame data between a host system memory and a network interface buffer memory employing transmit descriptors without transmit status information
US20080244695A1 (en)2000-06-012008-10-02Jong-Sung LeeTotal system for preventing information outflow from inside
IL144100A (en)2000-07-062006-08-01Samsung Electronics Co LtdMac address-based communication restricting method
US7082536B2 (en)*2000-11-132006-07-25Globalcerts, LcSystem and method for computerized global messaging encryption
WO2002057917A2 (en)2001-01-222002-07-25Sun Microsystems, Inc.Peer-to-peer network computing platform
US7664543B2 (en)*2001-04-262010-02-16Analogic CorporationCT scanner for and method of imaging a preselected portion of the lower abdomen region of a patient
US7072946B2 (en)*2001-05-312006-07-04Juniper Networks, Inc.Network router management interface with API invoked via login stream
US6851113B2 (en)2001-06-292005-02-01International Business Machines CorporationSecure shell protocol access control
US7590684B2 (en)2001-07-062009-09-15Check Point Software Technologies, Inc.System providing methodology for access control with cooperative enforcement
US7171554B2 (en)2001-08-132007-01-30Hewlett-Packard CompanyMethod, computer program product and system for providing a switch user functionality in an information technological network
US7257815B2 (en)2001-09-052007-08-14Microsoft CorporationMethods and system of managing concurrent access to multiple resources
US7231664B2 (en)*2002-09-042007-06-12Secure Computing CorporationSystem and method for transmitting and receiving secure data in a virtual private group
US7577729B1 (en)*2002-11-262009-08-18Symantec Operating CorporationDistributed storage management services
US7219184B2 (en)2002-12-102007-05-15Isic CorporationMethod and apparatus for longest prefix matching in processing a forwarding information database
JPWO2004059903A1 (en)*2002-12-252006-05-11株式会社日立製作所 Network device, network system, and group management method
US8214884B2 (en)2003-06-272012-07-03Attachmate CorporationComputer-based dynamic secure non-cached delivery of security credentials such as digitally signed certificates or keys
US7260224B1 (en)*2003-06-302007-08-21Microsoft CorporationAutomated secure key transfer
US7624421B2 (en)*2003-07-312009-11-24Microsoft CorporationMethod and apparatus for managing and displaying contact authentication in a peer-to-peer collaboration system
US7698549B2 (en)2003-08-152010-04-13Venafi, Inc.Program product for unified certificate requests from certificate authorities
US20050120204A1 (en)2003-12-012005-06-02Gary KiwimagiSecure network connection
US20060031510A1 (en)2004-01-262006-02-09Forte Internet Software, Inc.Methods and apparatus for enabling a dynamic network of interactors according to personal trust levels between interactors
US7707405B1 (en)2004-09-212010-04-27Avaya Inc.Secure installation activation
US7509493B2 (en)2004-11-192009-03-24Microsoft CorporationMethod and system for distributing security policies
US7810138B2 (en)*2005-01-262010-10-05Mcafee, Inc.Enabling dynamic authentication with different protocols on the same port for a switch
US20060259950A1 (en)2005-02-182006-11-16Ulf MattssonMulti-layer system for privacy enforcement and monitoring of suspicious data access behavior
US20060206922A1 (en)2005-03-082006-09-14Securedatainnovations AgSecure Remote Access To Non-Public Private Web Servers
US8291224B2 (en)*2005-03-302012-10-16Wells Fargo Bank, N.A.Distributed cryptographic management for computer systems
US7552115B2 (en)2005-04-152009-06-23Microsoft CorporationMethod and system for efficient generation of storage reports
US20060248082A1 (en)2005-04-292006-11-02Amit RaikarMethod and an apparatus for securely communicating between a management server and a managed node associated with a dynamic provisioning system
US8214844B2 (en)2005-04-292012-07-03Hewlett-Packard Development Company, L.P.Systems and methods for adjusting service queue capacity
US7574322B2 (en)2005-05-102009-08-11Microsoft CorporationAutomated client device management
US7881262B2 (en)*2005-07-072011-02-01Alvarion Ltd.Method and apparatus for enabling mobility in mobile IP based wireless communication systems
US8799431B2 (en)2005-08-152014-08-05Toutvirtual Inc.Virtual systems management
CN1949765B (en)2005-10-102010-10-13华为技术有限公司Method and system for obtaining SSH host computer public key of device being managed
US20070199072A1 (en)2005-10-142007-08-23Softwareonline, LlcControl of application access to system resources
US20070118735A1 (en)*2005-11-102007-05-24Jeff CherringtonSystems and methods for trusted information exchange
US7904949B2 (en)2005-12-192011-03-08Quest Software, Inc.Apparatus, systems and methods to provide authentication services to a legacy application
US8316429B2 (en)*2006-01-312012-11-20Blue Coat Systems, Inc.Methods and systems for obtaining URL filtering information
US8015594B2 (en)2006-03-172011-09-06Cisco Technology, Inc.Techniques for validating public keys using AAA services
US7770213B2 (en)2006-04-172010-08-03Oracle America, Inc.Method and apparatus for securely forgetting secrets
US20130227286A1 (en)2006-04-252013-08-29Andre Jacques BrissonDynamic Identity Verification and Authentication, Dynamic Distributed Key Infrastructures, Dynamic Distributed Key Systems and Method for Identity Management, Authentication Servers, Data Security and Preventing Man-in-the-Middle Attacks, Side Channel Attacks, Botnet Attacks, and Credit Card and Financial Transaction Fraud, Mitigating Biometric False Positives and False Negatives, and Controlling Life of Accessible Data in the Cloud
CN101479984B (en)*2006-04-252011-06-08斯蒂芬·L.·博伦Dynamic distributed key system and method for identity management, authentication server, data security and protection against man-in-the-middle attacks
US9002018B2 (en)*2006-05-092015-04-07Sync Up Technologies CorporationEncryption key exchange system and method
KR20080004165A (en)*2006-07-052008-01-09삼성전자주식회사 Device Authentication Method Using Broadcast Encryption
US8082574B2 (en)*2006-08-112011-12-20Certes Networks, Inc.Enforcing security groups in network of data processors
US20080086771A1 (en)2006-10-042008-04-10Kang LiApparatus, system, and method for authenticating users of digital communication devices
US8327421B2 (en)2007-01-302012-12-04Imprivata, Inc.System and method for identity consolidation
CN101282330B (en)2007-04-042013-08-28华为技术有限公司Method and apparatus for managing network memory access authority, network memory access control method
US20100100778A1 (en)*2007-05-112010-04-22Spiceworks, Inc.System and method for hardware and software monitoring with integrated troubleshooting
KR100922582B1 (en)2007-07-202009-10-21한국전자통신연구원 Log-based Backtracking System and Method Using Center Point Segmentation
US20090070853A1 (en)*2007-09-122009-03-12International Business Machines CorporationSecurity Policy Validation For Web Services
CN101855860B (en)*2007-09-142013-01-09安全第一公司 System and method for managing encryption keys
US7986636B2 (en)*2007-11-092011-07-26Polytechnic Institute Of New York UniversityEfficient detection of relay node
US7987357B2 (en)*2007-11-282011-07-26Red Hat, Inc.Disabling remote logins without passwords
US20090185685A1 (en)*2008-01-182009-07-23International Business Machines CorporationTrust session management in host-based authentication
US20090199290A1 (en)*2008-02-012009-08-06Secure Computing CorporationVirtual private network system and method
US8638941B2 (en)*2008-05-152014-01-28Red Hat, Inc.Distributing keypairs between network appliances, servers, and other network assets
US8955107B2 (en)*2008-09-122015-02-10Juniper Networks, Inc.Hierarchical application of security services within a computer network
US20100070881A1 (en)2008-09-122010-03-18At&T Intellectual Property I, L.P.Project facilitation and collaboration application
US20140075567A1 (en)2009-01-282014-03-13Headwater Partners I LlcService Processor Configurations for Enhancing or Augmenting System Software of a Mobile Communications Device
US8886931B2 (en)*2009-03-032014-11-11Kddi CorporationKey sharing system, communication terminal, management device, key sharing method, and computer program
US9106617B2 (en)2009-03-102015-08-11At&T Intellectual Property I, L.P.Methods, systems and computer program products for authenticating computer processing devices and transferring both encrypted and unencrypted data therebetween
US20100262625A1 (en)2009-04-082010-10-14Glenn Robert PittengerMethod and system for fine-granularity access control for database entities
US8856869B1 (en)2009-06-222014-10-07NexWavSec Software Inc.Enforcement of same origin policy for sensitive data
CN101600203B (en)*2009-06-302011-05-25中兴通讯股份有限公司Control method for security service and terminal of wireless local area network
US8311225B2 (en)2009-08-172012-11-13Brocade Communications Systems, Inc.Scalable key archival
IN2012DN03035A (en)2009-09-092015-07-31Varonis Systems Inc
US8578507B2 (en)2009-09-092013-11-05Varonis Systems, Inc.Access permissions entitlement review
US8874685B1 (en)2009-09-222014-10-28Threatguard, Inc.Compliance protocol and architecture
JP5402498B2 (en)2009-10-142014-01-29富士通株式会社 INFORMATION STORAGE DEVICE, INFORMATION STORAGE PROGRAM, RECORDING MEDIUM CONTAINING THE PROGRAM, AND INFORMATION STORAGE METHOD
US9313196B2 (en)2009-11-062016-04-12Certified Cyber Solutions, Inc.System and method for secure access of a remote system
US8776192B2 (en)*2009-11-172014-07-08At&T Intellectual Property I, L.P.Methods, systems, and computer program products for automatically verifying and populating digital certificates in an encryption keystore
US8424065B2 (en)2009-11-252013-04-16International Business Machines CorporationApparatus and method of identity and virtual object management and sharing among virtual worlds
US8438270B2 (en)2010-01-262013-05-07Tenable Network Security, Inc.System and method for correlating network identities and addresses
US8874914B2 (en)2010-02-052014-10-28Accenture Global Services LimitedSecure and automated credential information transfer mechanism
EP2369503A1 (en)*2010-02-182011-09-28Silverstring LimitedData storage management
US20110225623A1 (en)2010-03-122011-09-15Wright Michael WWeb-Hosted Self-Managed Virtual Systems With Complex Rule-Based Content Access
US8122282B2 (en)2010-03-122012-02-21International Business Machines CorporationStarting virtual instances within a cloud computing environment
US8479197B2 (en)2010-04-092013-07-02Red Hat Israel, Ltd.Host controller using reduced network resources to monitor hosts
US20110252459A1 (en)*2010-04-122011-10-13Walsh Robert EMultiple Server Access Management
US8504818B2 (en)2010-04-152013-08-06Microsoft CorporationMethod and system for reliable protocol tunneling over HTTP
US8533337B2 (en)*2010-05-062013-09-10Citrix Systems, Inc.Continuous upgrading of computers in a load balanced environment
US20110291803A1 (en)*2010-05-272011-12-01Zeljko BajicRfid security and mobility architecture
US8856504B2 (en)2010-06-072014-10-07Cisco Technology, Inc.Secure virtual machine bootstrap in untrusted cloud infrastructures
JP5518594B2 (en)2010-06-302014-06-11三菱電機株式会社 Internal network management system, internal network management method and program
US8959115B2 (en)2010-07-092015-02-17Symantec CorporationPermission tracking systems and methods
JP4802295B1 (en)2010-08-312011-10-26株式会社スプリングソフト Network system and virtual private connection forming method
US8996575B2 (en)2010-09-292015-03-31M-Files OyMethod, an apparatus, a computer system, a security component and a computer readable medium for defining access rights in metadata-based file arrangement
TWI443581B (en)2010-11-022014-07-01Inst Information IndustryResource sharing system and method for operating the same
US20120117608A1 (en)*2010-11-092012-05-10Motorola, Inc.Certificate policy management tool
US8539562B2 (en)2010-12-092013-09-17International Business Machines CorporationAutomated management of system credentials
US8683560B1 (en)2010-12-292014-03-25Amazon Technologies, Inc.Techniques for credential generation
US9026805B2 (en)*2010-12-302015-05-05Microsoft Technology Licensing, LlcKey management using trusted platform modules
US9680839B2 (en)2011-01-272017-06-13Varonis Systems, Inc.Access permissions management system and method
US9531754B2 (en)2011-02-222016-12-27Dome 9 Security Ltd.Methods, circuits, apparatus, systems and associated software applications for providing security on one or more servers, including virtual servers
US9141410B2 (en)2011-03-082015-09-22Rackspace Us, Inc.Pluggable allocation in a cloud computing system
JP2012195774A (en)*2011-03-162012-10-11Toshiba CorpNode and program
JP5676331B2 (en)*2011-03-242015-02-25株式会社東芝 Root node and program
US9215235B1 (en)2011-05-232015-12-15Palo Alto Networks, Inc.Using events to identify a user and enforce policies
US9363080B2 (en)2011-07-082016-06-07Venafi, Inc.System for managing cryptographic keys and trust relationships in a secure shell (SSH) environment
WO2013034187A1 (en)*2011-09-082013-03-14Telefonaktiebolaget L M Ericsson (Publ)Secure communication
US8478771B2 (en)2011-09-302013-07-02Bmc Software, Inc.Systems and methods related to a temporal log structure database
US8533802B2 (en)2011-10-232013-09-10Gopal NandakumarAuthentication system and related method
US8595546B2 (en)*2011-10-282013-11-26Zettaset, Inc.Split brain resistant failover in high availability clusters
US9336324B2 (en)*2011-11-012016-05-10Microsoft Technology Licensing, LlcIntelligent caching for security trimming
US8555409B2 (en)2011-11-022013-10-08Wyse Technolgoy Inc.System and method for providing private session-based access to a redirected USB device or local device
SG11201403482TA (en)2011-12-212014-07-30Ssh Comm Security OyjAutomated access, key, certificate, and credential management
US10003458B2 (en)*2011-12-212018-06-19Ssh Communications Security Corp.User key management for the secure shell (SSH)
US20130179951A1 (en)*2012-01-062013-07-11Ioannis BroustisMethods And Apparatuses For Maintaining Secure Communication Between A Group Of Users In A Social Network
US10425411B2 (en)2012-04-052019-09-24Arizona Board Of Regents On Behalf Of Arizona State UniversitySystems and apparatuses for a secure mobile cloud framework for mobile computing and communication
US9065802B2 (en)2012-05-012015-06-23Fortinet, Inc.Policy-based configuration of internet protocol security for a virtual private network
US20150134965A1 (en)*2012-05-242015-05-14Telefonaktiebolaget L M Ericsson (Publ)Enhanced Secure Virtual Machine Provisioning
US20120266209A1 (en)*2012-06-112012-10-18David Jeffrey GoodingMethod of Secure Electric Power Grid Operations Using Common Cyber Security Services
US8997197B2 (en)2012-12-122015-03-31Citrix Systems, Inc.Encryption-based data access management
EP2824888B1 (en)2013-07-082020-04-01SSH Communications Security OyjTrust relationships in a computerized system
CN204335831U (en)2014-08-142015-05-20惠州市吉瑞科技有限公司A kind of atomizer and electronic cigarette
US9722987B2 (en)*2015-03-132017-08-01Ssh Communications Security OyjAccess relationships in a computer system

Also Published As

Publication numberPublication date
EP2792104A4 (en)2015-09-23
US10171508B2 (en)2019-01-01
US20170019386A1 (en)2017-01-19
US20170163689A1 (en)2017-06-08
US10530814B2 (en)2020-01-07
EP2792104A1 (en)2014-10-22
US20170041349A1 (en)2017-02-09
WO2013093209A1 (en)2013-06-27
US10187426B2 (en)2019-01-22
US10277632B2 (en)2019-04-30
US10708307B2 (en)2020-07-07
US20170019387A1 (en)2017-01-19
US20170171175A1 (en)2017-06-15
US20170012953A1 (en)2017-01-12
US20150222604A1 (en)2015-08-06
US10693916B2 (en)2020-06-23
US20190075134A1 (en)2019-03-07
EP2792104B1 (en)2021-06-30
US20170222995A1 (en)2017-08-03
US9832177B2 (en)2017-11-28
US10812530B2 (en)2020-10-20
US9515999B2 (en)2016-12-06
US10116700B2 (en)2018-10-30
US9998497B2 (en)2018-06-12
US20170366581A1 (en)2017-12-21
US20170366580A1 (en)2017-12-21

Similar Documents

PublicationPublication DateTitle
SG11201403482TA (en)Automated access, key, certificate, and credential management
GB201321808D0 (en)Credential authentication methods and systems
IL244948A0 (en)System and method for encryption key management, federation and distribution
IL221286B (en)Cryptographic key distribution system
ZA201302975B (en)Methods and apparatuses for access credential provisioning
EP2545677A4 (en)Automated certificate management
EP2697931A4 (en) QKD KEY MANAGEMENT SYSTEM
GB2516803B (en)Communications security management
EP2756444A4 (en)Resource access authorization
EP2893690A4 (en)Data security management system
EP2845116A4 (en)Automated event management
EP2834943A4 (en)Cryptographic hash database
GB201318373D0 (en)Key management in a cloud-based environment
EP2807792A4 (en)Authentication for network access related applications
EP2884811A4 (en)Establishment-processing method, management method, and device for x2 connection
EP2761521A4 (en)Automated password management
GB2512803B (en)Encrypted biometric data management and retrieval
EP2638658A4 (en)Certificate policy management tool
EP2830184A4 (en)Energy management device, method for managing energy, and program
EP2738326A4 (en)Key cipher lock
GB2501588B (en)Managing encryption keys in a computer system
EP2803034A4 (en)Cross-property identity management
GB201206203D0 (en)Authentication in computer networks
EP2700190B8 (en)Authenticator, authenticatee and authentication method
ITMI20121694A1 (en) LOCK AND KEY

[8]ページ先頭

©2009-2025 Movatter.jp