Movatterモバイル変換


[0]ホーム

URL:


US20150312233A1 - System and Method to Enable PKI- and PMI- Based Distributed Locking of Content and Distributed Unlocking of Protected Content and/or Scoring of Users and/or Scoring of End-Entity Access Means - Added - Google Patents

System and Method to Enable PKI- and PMI- Based Distributed Locking of Content and Distributed Unlocking of Protected Content and/or Scoring of Users and/or Scoring of End-Entity Access Means - Added
Download PDF

Info

Publication number
US20150312233A1
US20150312233A1US14/218,897US201414218897AUS2015312233A1US 20150312233 A1US20150312233 A1US 20150312233A1US 201414218897 AUS201414218897 AUS 201414218897AUS 2015312233 A1US2015312233 A1US 2015312233A1
Authority
US
United States
Prior art keywords
user
key
security
server
enterprise
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US14/218,897
Other versions
US9270663B2 (en
US20160057120A9 (en
Inventor
Donald Houston Graham, III
Josselyn BOUDETT
David W. Kravitz
Russell S. Dietz
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
T-CENTRAL Inc
Original Assignee
T-CENTRAL Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US13/096,764external-prioritypatent/US20110270763A1/en
Priority claimed from US13/481,553external-prioritypatent/US20120284506A1/en
Priority to US14/218,897priorityCriticalpatent/US9270663B2/en
Application filed by T-CENTRAL IncfiledCriticalT-CENTRAL Inc
Priority to US14/715,588prioritypatent/US9356916B2/en
Publication of US20150312233A1publicationCriticalpatent/US20150312233A1/en
Priority to US15/002,225prioritypatent/US9455978B2/en
Publication of US9270663B2publicationCriticalpatent/US9270663B2/en
Application grantedgrantedCritical
Publication of US20160057120A9publicationCriticalpatent/US20160057120A9/en
Priority to US15/154,861prioritypatent/US9578035B2/en
Priority to US15/269,832prioritypatent/US20170134350A1/en
Priority to US15/409,427prioritypatent/US20170187538A1/en
Priority to US15/469,244prioritypatent/US9716595B1/en
Priority to US15/621,982prioritypatent/US9832026B2/en
Priority to US15/642,304prioritypatent/US10038678B2/en
Priority to US15/668,598prioritypatent/US9843450B2/en
Priority to US15/686,076prioritypatent/US10153908B2/en
Priority to US15/890,140prioritypatent/US10333720B2/en
Priority to US16/045,646prioritypatent/US10567361B2/en
Priority to US16/236,124prioritypatent/US10652031B2/en
Priority to US16/412,247prioritypatent/US10644891B2/en
Priority to US16/786,884prioritypatent/US11463423B2/en
Priority to US16/872,112prioritypatent/US11456882B2/en
Priority to US17/886,291prioritypatent/US12149514B2/en
Priority to US17/896,992prioritypatent/US11743057B2/en
Priority to US18/224,022prioritypatent/US12028466B2/en
Priority to US18/938,982prioritypatent/US20250063028A1/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

A central server configured with an Attribute Authority (“AA”) acting as a Trusted Third Party mediating service provider and using X.509-compatible PKI and PMI, VPN technology, device-side thin client applications, security hardware (HSM, Network), cloud hosting, authentication, Active Directory and other solutions. This ecosystem results in real time management of credentials, identity profiles, communication lines, and keys. It is not centrally managed, rather distributes rights to users. Using its Inviter-Invitee protocol suite, Inviters vouch for the identity of Invitees who successfully complete the protocol establishing communication lines. Users establish and respond to authorization requests and other real-time verifications pertaining to accessing each communication line (not end point) and sharing encrypted digital files. These are auditable, brokered, trusted-relationships where such relationships/digital agreements can each stand-alone (for privacy) or can leverage build-up of identity confidence levels across relationships. The service is agnostic to how encrypted user content is transported or stored.

Description

Claims (3)

What is claimed is:
1. A system of communication comprising: a client app, a user facing domain, a key escrow domain, and an inviter-invitee protocol wherein the user facing domain securely relates to multiple parties via the client app and the key escrow domain authenticates secure lines of communication amongst the parties;
the said client app inclaim 1 consisting of but not limited to a local key store module and a digital identity token;
the said user facing domain inclaim 1 consisting of but not limited to a login interface on a server, hardware security module (hsm) and lightweight directory access protocol application (ldap) on a server;
the said key escrow domain consisting of consisting a registration authority, certificate authority, attribute authority (each installed on a server) and hardware security module (hsm);
the said initiation protocol inclaim 1 consisting of multiple steps but not limited to sending an invitation, receiving the invitation, downloading the client app, installation and registration, authentication, and single or multiple key requests, creation, and exchanges;
the said invitation consisting of, but not limited to, a client app with digital identity token, e-mail address, designated attributes, authentication question, answer to authentication question, and a cryptographic digital signature.
2. A method of secure communication based on the system of communication inclaim 1 wherein a persistent, yet revocable, a secure line of communication is established and authenticated;
the said method inclaim 2 wherein the secure line of communication is established by the said invitation protocol inclaim 1.
3. The said method inclaim 2 whereby a user on an electronic device has the ability to install an application that:
creates a set of public and private encryption keys for: encrypting and decrypting documents, digital signing and other purposes;
allows a first user to invite a second user using a second electronic device to share a communication line with the first user on the first user's electronic device;
provides a method whereby the second user may respond to the invitation of the first user and install a comparable application on the second user's electronic device and thereafter have a comparable set of public and private encryption keys on that electronic device;
the invitation a method that will include authentication steps that the second user must comply with in a specified method on his electronic device so that the identify of the second user, together with the associated installation of the application on his specific electronic device together with that specific electronic device are all linked together in such a manner that the first user can be assured by the server of the trusted third party that provided and monitored the installation and authentication of the app on the physical electronic device controlled by the second user confirms this described association through this method;
such that the public encryption key of each user is made available to the other user's application in a manner in which the authenticity of the keys is assured by the server of the trusted third party that provided the app to each party;
such that by relying on the representation and authentication provided through the server of the trusted third party that the parties can thereafter use encryption capabilities of the app to first encrypt a digital asset on one electronic device with a symmetric encryption key followed by the encryption of that symmetric encryption key using the public encryption key known to be that of the other user, followed by having the ability to transfer (in any manner selected by the originating user) both the encrypted digital asset together with the symmetric encryption key which has been encrypted using the public encryption of the second user
such that the second user, upon receipt of these two will be able to use his private key to decrypt the symmetric key and thereafter decrypt the encrypted digital asset.
US14/218,8972010-04-302014-03-18System and method to enable PKI- and PMI-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—addedActiveUS9270663B2 (en)

Priority Applications (21)

Application NumberPriority DateFiling DateTitle
US14/218,897US9270663B2 (en)2010-04-302014-03-18System and method to enable PKI- and PMI-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—added
US14/715,588US9356916B2 (en)2010-04-302015-05-18System and method to use a cloud-based platform supported by an API to authenticate remote users and to provide PKI- and PMI-based distributed locking of content and distributed unlocking of protected content
US15/002,225US9455978B2 (en)2010-04-302016-01-20System and method to enable PKI- and PMI- based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—added
US15/154,861US9578035B2 (en)2010-04-302016-05-13System and method to use a cloud-based platform supported by an API to authenticate remote users and to provide PKI- and PMI-based distributed locking of content and distributed unlocking of protected content
US15/269,832US20170134350A1 (en)2010-04-302016-09-19System and Method to Enable PKI- and PMI- Based Distributed Locking of Content and Distributed Unlocking of Protected Content and/or Scoring of Users and/or Scoring of End-Entity Access Means - Added
US15/409,427US20170187538A1 (en)2010-04-302017-01-18System and method to use a cloud-based platform supported by an api to authenticate remote users and to provide pki- and pmi- based distributed locking of content and distributed unlocking of protected content
US15/469,244US9716595B1 (en)2010-04-302017-03-24System and method for internet of things (IOT) security and management
US15/621,982US9832026B2 (en)2010-04-302017-06-13System and method from Internet of Things (IoT) security and management
US15/642,304US10038678B2 (en)2010-04-302017-07-05System and method to enable PKI- and PMI- based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means-added
US15/668,598US9843450B2 (en)2010-04-302017-08-03System and method to use a cloud-based platform supported by an API to authenticate remote users and to provide PKI- and PMI- based distributed locking of content and distributed unlocking of protected content
US15/686,076US10153908B2 (en)2010-04-302017-08-24Secure communication of IOT devices for vehicles
US15/890,140US10333720B2 (en)2010-04-302018-02-06Secure communication of IOT devices for vehicles
US16/045,646US10567361B2 (en)2010-04-302018-07-25System and method to enable PKI- and PMI-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means-added
US16/236,124US10652031B2 (en)2010-04-302018-12-28Using PKI for security and authentication of control devices and their data
US16/412,247US10644891B2 (en)2010-04-302019-05-14Secure communication of IoT devices for vehicles
US16/786,884US11463423B2 (en)2010-04-302020-02-10System and method to enable PKI- and PMI-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—added
US16/872,112US11456882B2 (en)2010-04-302020-05-11Using PKI for security and authentication of control devices and their data
US17/886,291US12149514B2 (en)2010-04-302022-08-11System and method to enable PKI- and PMI-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—added
US17/896,992US11743057B2 (en)2010-04-302022-08-26Using PKI for security and authentication of control devices and their data
US18/224,022US12028466B2 (en)2010-04-302023-07-19Using PKI for security and authentication of control devices and their data
US18/938,982US20250063028A1 (en)2010-04-302024-11-06System and method to enable pki- and pmi-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means - added

Applications Claiming Priority (9)

Application NumberPriority DateFiling DateTitle
US33022610P2010-04-302010-04-30
US36757610P2010-07-262010-07-26
US36757410P2010-07-262010-07-26
US41662910P2010-11-232010-11-23
US13/096,764US20110270763A1 (en)2010-04-302011-04-28Methods and apparatus for a financial document clearinghouse and secure delivery network
US201261650866P2012-05-232012-05-23
US13/481,553US20120284506A1 (en)2010-04-302012-05-25Methods and apparatus for preventing crimeware attacks
US201361792927P2013-03-152013-03-15
US14/218,897US9270663B2 (en)2010-04-302014-03-18System and method to enable PKI- and PMI-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—added

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US13/481,553Continuation-In-PartUS20120284506A1 (en)2010-04-302012-05-25Methods and apparatus for preventing crimeware attacks

Related Child Applications (2)

Application NumberTitlePriority DateFiling Date
US14/715,588Continuation-In-PartUS9356916B2 (en)2010-04-302015-05-18System and method to use a cloud-based platform supported by an API to authenticate remote users and to provide PKI- and PMI-based distributed locking of content and distributed unlocking of protected content
US15/002,225ContinuationUS9455978B2 (en)2010-04-302016-01-20System and method to enable PKI- and PMI- based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—added

Publications (3)

Publication NumberPublication Date
US20150312233A1true US20150312233A1 (en)2015-10-29
US9270663B2 US9270663B2 (en)2016-02-23
US20160057120A9 US20160057120A9 (en)2016-02-25

Family

ID=54335868

Family Applications (6)

Application NumberTitlePriority DateFiling Date
US14/218,897ActiveUS9270663B2 (en)2010-04-302014-03-18System and method to enable PKI- and PMI-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—added
US15/002,225ActiveUS9455978B2 (en)2010-04-302016-01-20System and method to enable PKI- and PMI- based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—added
US15/269,832AbandonedUS20170134350A1 (en)2010-04-302016-09-19System and Method to Enable PKI- and PMI- Based Distributed Locking of Content and Distributed Unlocking of Protected Content and/or Scoring of Users and/or Scoring of End-Entity Access Means - Added
US15/642,304ActiveUS10038678B2 (en)2010-04-302017-07-05System and method to enable PKI- and PMI- based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means-added
US16/045,646ActiveUS10567361B2 (en)2010-04-302018-07-25System and method to enable PKI- and PMI-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means-added
US16/786,884ActiveUS11463423B2 (en)2010-04-302020-02-10System and method to enable PKI- and PMI-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—added

Family Applications After (5)

Application NumberTitlePriority DateFiling Date
US15/002,225ActiveUS9455978B2 (en)2010-04-302016-01-20System and method to enable PKI- and PMI- based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—added
US15/269,832AbandonedUS20170134350A1 (en)2010-04-302016-09-19System and Method to Enable PKI- and PMI- Based Distributed Locking of Content and Distributed Unlocking of Protected Content and/or Scoring of Users and/or Scoring of End-Entity Access Means - Added
US15/642,304ActiveUS10038678B2 (en)2010-04-302017-07-05System and method to enable PKI- and PMI- based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means-added
US16/045,646ActiveUS10567361B2 (en)2010-04-302018-07-25System and method to enable PKI- and PMI-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means-added
US16/786,884ActiveUS11463423B2 (en)2010-04-302020-02-10System and method to enable PKI- and PMI-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—added

Country Status (1)

CountryLink
US (6)US9270663B2 (en)

Cited By (82)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20140298030A1 (en)*2013-03-272014-10-02International Business Machines CorporationComputer assisted name-based aggregation system for identifying names of anonymized data, as well as a method and computer program thereof
US20150304110A1 (en)*2014-04-172015-10-22Duo Security, Inc.System and method for an integrity focused authentication service
US20160007201A1 (en)*2014-05-272016-01-07Telmate, LlcVpn-based mobile device security
US20160077979A1 (en)*2013-04-292016-03-17Hewlett-Packard Development Company, L. P.Non-volatile memory to store resettable data
US9455978B2 (en)2010-04-302016-09-27T-Central, Inc.System and method to enable PKI- and PMI- based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—added
US20160359913A1 (en)*2015-06-052016-12-08Cisco Technology, Inc.Conditional policies
CN106815495A (en)*2017-02-212017-06-09郑州云海信息技术有限公司A kind of data processing method and device in cloud environment
US20170262778A1 (en)*2016-03-082017-09-14PeerNova, Inc.Management of Workflows
US20180019874A1 (en)*2016-07-132018-01-18Safran Identity & SecurityMethod for putting a first device in secure communication with a second device
CN107769915A (en)*2016-08-172018-03-06实创时新(北京)科技有限公司Possess the data encrypting and deciphering system and method for fine-grained user control
US20180082067A1 (en)*2016-09-202018-03-22Konica Minolta, Inc.Information Sharing Server, Information Sharing System And Non-Transitory Recording Medium
US9971884B1 (en)*2017-07-132018-05-15Cyberark Software Ltd.Providing credentials in an automated machine-to-machine communication system environment
CN108432207A (en)*2015-12-282018-08-21莱里达网络远程信息技术服务有限公司 Email Authentication Method Including an Approved Electronic Signature on the Telecom Operator Section
US10091007B2 (en)*2016-04-042018-10-02Mastercard International IncorporatedSystems and methods for device to device authentication
US10110600B1 (en)2017-07-132018-10-23Cyberark Software Ltd.Dynamically learning and securing an asset-to-asset cloud communication environment
CN108769020A (en)*2018-05-292018-11-06东北大学A kind of the identity attribute proof system and method for secret protection
US20180330120A1 (en)*2017-05-152018-11-15Polyport, Inc.Stacked Encryption
CN108964986A (en)*2018-06-152018-12-07国网上海市电力公司Cooperative office system application layer dual-active disaster recovery and backup systems
CN109087078A (en)*2018-08-272018-12-25腾讯科技(深圳)有限公司 Data processing method, device, storage medium and equipment for electronic bills
US20190052631A1 (en)*2015-05-122019-02-14Citrix Systems, Inc.Multifactor Contextual Authentication and Entropy from Device or Device Input or Gesture Authentication
US10218700B2 (en)*2015-02-232019-02-26Ca, Inc.Authorizations for computing devices to access a protected resource
US20190068746A1 (en)*2017-08-292019-02-28Wickr Inc.Directory Lookup for Federated Messaging
CN109728903A (en)*2018-12-222019-05-07复旦大学 A Blockchain Weak Center Password Authorization Method Using Attribute Password
US10289438B2 (en)2016-06-162019-05-14Cisco Technology, Inc.Techniques for coordination of application components deployed on distributed virtual machines
US10348756B2 (en)2011-09-022019-07-09Duo Security, Inc.System and method for assessing vulnerability of a mobile device
US10355858B2 (en)*2016-03-302019-07-16Intel CorporationAuthenticating a system to enable access to a diagnostic interface in a storage device
CN110061978A (en)*2019-03-202019-07-26深圳金澜汉源科技有限公司Binary Cooperative Security client framework
US10374904B2 (en)2015-05-152019-08-06Cisco Technology, Inc.Diagnostic network visualization
US10412113B2 (en)2017-12-082019-09-10Duo Security, Inc.Systems and methods for intelligently configuring computer security
US10445732B2 (en)2010-03-032019-10-15Duo Security, Inc.System and method of notifying mobile devices to complete transactions after additional agent verification
US10523512B2 (en)2017-03-242019-12-31Cisco Technology, Inc.Network agent for generating platform specific network policies
US10523541B2 (en)2017-10-252019-12-31Cisco Technology, Inc.Federated network and application data analytics platform
US10542030B2 (en)2015-06-012020-01-21Duo Security, Inc.Method for enforcing endpoint health standards
US10554501B2 (en)2017-10-232020-02-04Cisco Technology, Inc.Network migration assistant
US10574575B2 (en)2018-01-252020-02-25Cisco Technology, Inc.Network flow stitching using middle box flow stitching
US10594542B2 (en)2017-10-272020-03-17Cisco Technology, Inc.System and method for network root cause analysis
US10594560B2 (en)2017-03-272020-03-17Cisco Technology, Inc.Intent driven network policy platform
US10601793B2 (en)*2016-03-112020-03-24Pss, LlcSystems and methods for securing electronic data with embedded security engines
CN111143816A (en)*2018-11-052020-05-12纬创资通股份有限公司Verification and authorization method and verification server
USD886129S1 (en)2016-05-102020-06-02Citrix Systems, Inc.Display screen or portion thereof with graphical user interface
US10680887B2 (en)2017-07-212020-06-09Cisco Technology, Inc.Remote device status audit and recovery
US10701065B2 (en)2015-04-152020-06-30Citrix Systems, Inc.Authentication of a client device based on entropy from a server or other device
US10708183B2 (en)2016-07-212020-07-07Cisco Technology, Inc.System and method of providing segment routing as a service
US10708152B2 (en)2017-03-232020-07-07Cisco Technology, Inc.Predicting application and network performance
US10764141B2 (en)2017-03-272020-09-01Cisco Technology, Inc.Network agent for reporting to a network policy system
US10797970B2 (en)2015-06-052020-10-06Cisco Technology, Inc.Interactive hierarchical network chord diagram for application dependency mapping
US10798015B2 (en)2018-01-252020-10-06Cisco Technology, Inc.Discovery of middleboxes using traffic flow stitching
US10803161B2 (en)*2017-03-152020-10-13Ricoh Company, Ltd.Information processing system, information processing method, and information processing apparatus
US10826803B2 (en)2018-01-252020-11-03Cisco Technology, Inc.Mechanism for facilitating efficient policy updates
CN112054892A (en)*2016-01-042020-12-08克莱夫公司Data storage device, method and system
US10873794B2 (en)2017-03-282020-12-22Cisco Technology, Inc.Flowlet resolution for application performance monitoring and management
US10897351B1 (en)*2020-07-022021-01-19Slack Technologies, Inc.Encryption key management for an automated workflow
US10938574B2 (en)*2018-11-262021-03-02T-Mobile Usa, Inc.Cryptographic font script with integrated signature for verification
US10972388B2 (en)2016-11-222021-04-06Cisco Technology, Inc.Federated microburst detection
US10999149B2 (en)2018-01-252021-05-04Cisco Technology, Inc.Automatic configuration discovery based on traffic flow data
US11023968B2 (en)*2015-03-052021-06-01Goldman Sachs & Co. LLCSystems and methods for updating a distributed ledger based on partial validations of transactions
US11042664B2 (en)*2016-06-122021-06-22Apple Inc.Efficient implementation for differential privacy using cryptographic functions
US11075771B2 (en)*2017-06-222021-07-27Telefonaktiebolaget Lm Ericsson (Publ)Method for generating operating entropy
US11095662B2 (en)2017-08-292021-08-17Amazon Technologies, Inc.Federated messaging
US11128700B2 (en)2018-01-262021-09-21Cisco Technology, Inc.Load balancing configuration based on traffic flow telemetry
US11172361B2 (en)2010-03-032021-11-09Cisco Technology, Inc.System and method of notifying mobile devices to complete transactions
US20210352059A1 (en)*2014-11-042021-11-11Huawei Technologies Co., Ltd.Message Display Method, Apparatus, and Device
US11233821B2 (en)2018-01-042022-01-25Cisco Technology, Inc.Network intrusion counter-intelligence
US11349659B2 (en)2017-08-292022-05-31Amazon Technologies, Inc.Transmitting an encrypted communication to a user in a second secure communication network
US11368442B2 (en)2017-08-292022-06-21Amazon Technologies, Inc.Receiving an encrypted communication from a user in a second secure communication network
US11461498B2 (en)*2019-02-062022-10-04mSignia, Inc.Systems and methods for secured, managed, multi-party interchanges with a software application operating on a client device
US11496424B2 (en)*2019-04-032022-11-08Snap Inc.Cross-application media exchange
US11528283B2 (en)2015-06-052022-12-13Cisco Technology, Inc.System for monitoring and managing datacenters
US20220405412A1 (en)*2021-06-212022-12-22Microsoft Technology Licensing, LlcConfiguration of default sensitivity labels for network file storage locations
US20230030169A1 (en)*2020-03-312023-02-02Hewlett-Packard Development Company, L.P.Administrator's password resetting
US11658962B2 (en)2018-12-072023-05-23Cisco Technology, Inc.Systems and methods of push-based verification of a transaction
US20230251936A1 (en)*2022-02-102023-08-10Vinpower Inc.Mobile device for protecting data stored in data backup device and data protection method thereof
US11750385B2 (en)*2017-11-162023-09-05Prisec Innovation LimitedSystem and method for authenticating a user
US11755707B1 (en)*2015-12-292023-09-12Wells Fargo Bank, N.A.User information gathering and distribution system
US20230291548A1 (en)*2022-03-082023-09-14Western Digital Technologies, Inc.Authorization requests from a data storage device to multiple manager devices
US20230318851A1 (en)*2021-01-142023-10-05Fujitsu LimitedControl method, storage medium, and information processing device
US11843619B1 (en)*2022-10-072023-12-12Uab 360 ItStateless system to enable data breach notification
US20240048550A1 (en)*2022-08-032024-02-081080 Network, Inc.Systems, methods, and computing platforms for executing credential-less network-based communication exchanges
US11928449B2 (en)*2020-11-042024-03-12China Mobile (Suzhou) Software Technology Co., Ltd.Information processing method, device, apparatus and system, medium, andprogram
US11971967B2 (en)2007-09-272024-04-30Clevx, LlcSecure access device with multiple authentication mechanisms
US12149514B2 (en)2010-04-302024-11-19T-Central, Inc.System and method to enable PKI- and PMI-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—added
US12236423B1 (en)*2018-02-222025-02-25Wells Fargo Bank, N.A.Systems and methods for federated identity management

Families Citing this family (40)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US11456882B2 (en)2010-04-302022-09-27T-Central, Inc.Using PKI for security and authentication of control devices and their data
US11743057B2 (en)*2010-04-302023-08-29T-Central, Inc.Using PKI for security and authentication of control devices and their data
US9973484B2 (en)2011-10-312018-05-15Reid Consulting Group, Inc.System and method for securely storing and sharing information
US11290261B2 (en)2011-10-312022-03-29Reid Consulting Group, Inc.System and method for securely storing and sharing information
US10789373B2 (en)2011-10-312020-09-29Reid Consulting Group, Inc.System and method for securely storing and sharing information
US8838681B2 (en)*2012-12-212014-09-16Dropbox, Inc.Systems and methods for adding digital content to content management service accounts
US9344425B2 (en)*2013-09-252016-05-17Wells Fargo Bank, N.A.Dynamic object creation and certificate management
US10331777B2 (en)2013-12-312019-06-25Barnes & Noble College Booksellers, LlcMerging annotations of paginated digital content
US10915698B2 (en)*2013-12-312021-02-09Barnes & Noble College Booksellers, LlcMulti-purpose tool for interacting with paginated digital content
US9407654B2 (en)*2014-03-202016-08-02Microsoft Technology Licensing, LlcProviding multi-level password and phishing protection
US10049202B1 (en)2014-03-252018-08-14Amazon Technologies, Inc.Strong authentication using authentication objects
US10050787B1 (en)*2014-03-252018-08-14Amazon Technologies, Inc.Authentication objects with attestation
US9264419B1 (en)2014-06-262016-02-16Amazon Technologies, Inc.Two factor authentication with authentication objects
US9942200B1 (en)*2014-12-022018-04-10Trend Micro Inc.End user authentication using a virtual private network
NL2014743B1 (en)*2015-04-302017-01-18Ubiqu B VA first entity, a second entity, an intermediate node, methods for setting up a secure session between a first and second entity, and computer program products.
EP3182666B1 (en)*2015-12-162023-01-25Materna Virtual Solution GmbHSecure transmission of local private encoding data
US10211992B1 (en)*2016-03-182019-02-19EMC IP Holding Company LLCSecure certificate pinning in user provisioned networks
WO2017210563A1 (en)*2016-06-022017-12-07Reid Consulting Group, Inc.System and method for securely storing and sharing information
US10560274B2 (en)*2016-06-092020-02-11International Business Machines CorporationCredential-based authorization
CN106612174A (en)*2016-08-262017-05-03四川用联信息技术有限公司Data security verification and updating method supporting third-party administrator (TPA) in mobile cloud computing
US10666443B2 (en)*2016-10-182020-05-26Red Hat, Inc.Continued verification and monitoring of application code in containerized execution environment
US10721222B2 (en)*2017-08-172020-07-21Citrix Systems, Inc.Extending single-sign-on to relying parties of federated logon providers
US10601813B2 (en)2017-10-262020-03-24Bank Of America CorporationCloud-based multi-factor authentication for network resource access control
CN108170825B (en)*2018-01-052022-08-12上海电气分布式能源科技有限公司Distributed energy data monitoring and cleaning method based on cloud platform
US10250383B1 (en)*2018-03-202019-04-02Mocana CorporationDynamic domain key exchange for authenticated device to device communications
JP7063666B2 (en)*2018-03-222022-05-09株式会社東海理化電機製作所 Authentication system
US11044077B2 (en)*2018-09-252021-06-22Mcafee, LlcModifiable client-side encrypted data in the cloud
US12130904B2 (en)*2018-11-162024-10-29Snyk LimitedFlexible credential supported software service provisioning
US10771435B2 (en)*2018-11-202020-09-08Netskope, Inc.Zero trust and zero knowledge application access system
US11595217B2 (en)2018-12-062023-02-28Digicert, Inc.System and method for zero touch provisioning of IoT devices
US11677554B2 (en)*2019-06-012023-06-13Apple Inc.Key registration transparency for secure messaging
CN118265029A (en)*2019-12-062024-06-28三星电子株式会社 Method and electronic device for managing digital keys
US11662888B2 (en)2020-03-052023-05-30Brain Technologies, Inc.Collaboration user interface for computing device
CN111586175A (en)*2020-05-072020-08-25周肖林House resource information acquisition and release system and house resource information acquisition and sharing method
US11425131B2 (en)2020-06-232022-08-23Slack Technologies, LlcVerified entities associated with a communication platform
CN113708939B (en)*2021-10-292022-02-08深圳百纳维科技有限公司Container lock control method and device, container lock and storage medium
US11985124B2 (en)2022-06-022024-05-14Bank Of America CorporationSystem for implementing multifactor authentication based on secure tokenization
US12418415B2 (en)2022-09-262025-09-16Bank Of America CorporationMultifactor authentication via bifurcated passcode and non-fungible token
US12294653B2 (en)2023-01-202025-05-06Bank Of America CorporationNon-fungible token with adaptable digital files
US20250259184A1 (en)*2024-02-122025-08-14Bank Of America CorporationUsing artificial intelligence ("ai ") to customize call center questions for use with customer authentication techniques

Family Cites Families (53)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JPH10511471A (en)1994-08-121998-11-04リートン,フランク、タムスン Fail-safe key marking system
US5812671A (en)1996-07-171998-09-22Xante CorporationCryptographic communication system
US5963925A (en)1996-10-091999-10-05Visa International Service AssociationElectronic statement presentment system
US5920630A (en)1997-02-251999-07-06United States Of AmericaMethod of public key cryptography that includes key escrow
US6105131A (en)1997-06-132000-08-15International Business Machines CorporationSecure server and method of operation for a distributed information system
US6229894B1 (en)1997-07-142001-05-08Entrust Technologies, Ltd.Method and apparatus for access to user-specific encryption information
US7051003B1 (en)1998-02-262006-05-23Atabok Japan, Inc.Method and apparatus for delivering electronic data through a proxy server
US6941454B1 (en)1998-10-142005-09-06Lynn SpraggsSystem and method of sending and receiving secure data with a shared key
US7236950B2 (en)1998-10-292007-06-26Universal Card Services Corp.Method and system of combined billing of multiple accounts on a single statement
US6988199B2 (en)2000-07-072006-01-17Message SecureSecure and reliable document delivery
US6760752B1 (en)1999-06-282004-07-06Zix CorporationSecure transmission system
US6584567B1 (en)1999-06-302003-06-24International Business Machines CorporationDynamic connection to multiple origin servers in a transcoding proxy
US6795920B1 (en)1999-06-302004-09-21International Business Machines CorporationVault controller secure depositor for managing secure communication
US7340439B2 (en)1999-09-282008-03-04Chameleon Network Inc.Portable electronic authorization system and method
US7509281B1 (en)1999-11-122009-03-24Convergys Cmg Utah, Inc.System and method for statement presentation
US6721783B1 (en)1999-11-242004-04-13Parish National BankE-mailer controller for privately and securely delivering bank notices, advices and monthly statements
US7020688B2 (en)2000-09-052006-03-28Financial Network, Inc.Methods and systems for archiving and verification of electronic communications
US6996841B2 (en)2001-04-192006-02-07Microsoft CorporationNegotiating secure connections through a proxy server
US20030028494A1 (en)2001-08-062003-02-06King Shawn L.Electronic document management system and method
US7100054B2 (en)2001-08-092006-08-29American Power ConversionComputer network security system
US7093121B2 (en)*2002-01-102006-08-15Mcafee, Inc.Transferring data via a secure network connection
US20060106836A1 (en)*2002-06-072006-05-18Madoka MasugiData processing system, data processing device, data processing method, and computer program
US7831693B2 (en)*2003-08-182010-11-09Oracle America, Inc.Structured methodology and design patterns for web services
US20050240758A1 (en)2004-03-312005-10-27Lord Christopher JControlling devices on an internal network from an external network
US7653587B2 (en)2004-04-072010-01-26Ameriprise Financial, Inc.Automated account statement generation process
US7552322B2 (en)*2004-06-242009-06-23Palo Alto Research Center IncorporatedUsing a portable security token to facilitate public key certification for devices in a network
US8224725B2 (en)2004-10-142012-07-17Google Inc.Escrowing digital property in a secure information vault
US7600011B1 (en)2004-11-042009-10-06Sprint Spectrum L.P.Use of a domain name server to direct web communications to an intermediation platform
US7571325B1 (en)*2005-03-142009-08-04Symantec CorporationRemote identification of blocked websites while maintaining user privacy
US7975140B2 (en)2005-04-082011-07-05Nortel Networks LimitedKey negotiation and management for third party access to a secure communication session
US7288478B2 (en)2005-07-052007-10-30International Business Machines CorporationMethod for performing chemical shrink process over BARC (bottom anti-reflective coating)
US8478986B2 (en)2005-08-102013-07-02Riverbed Technology, Inc.Reducing latency of split-terminated secure communication protocol sessions
DE602006021217D1 (en)2005-10-122011-05-19Datacastle Corp METHOD AND SYSTEM FOR DATA BACKUP
US20070174429A1 (en)2006-01-242007-07-26Citrix Systems, Inc.Methods and servers for establishing a connection between a client system and a virtual machine hosting a requested computing environment
US7966646B2 (en)*2006-07-312011-06-21Aruba Networks, Inc.Stateless cryptographic protocol-based hardware acceleration
US7797211B1 (en)2006-07-312010-09-14Intuit Inc.Method and system for an enhanced payroll report
US20160344745A1 (en)*2006-09-252016-11-24Weaved, Inc.Method and protocol for secure device deployment using a partially-encrypted provisioning file
FR2907942A1 (en)2006-10-252008-05-02Ingenico Sa METHOD FOR PROVIDING TRANSACTION DATA, TERMINAL, TRANSACTION METHOD, METHOD FOR ENRICHING BANKING STORIES, SERVER, SIGNALS, AND CORRESPONDING COMPUTER PROGRAM PRODUCTS.
SG10201502568RA (en)2006-11-232015-05-28Jagwood Pty LtdProcess of and apparatus for notification of financial documents and the like
US7600077B2 (en)2007-01-102009-10-06Arm LimitedCache circuitry, data processing apparatus and method for handling write access requests
US20080222736A1 (en)2007-03-072008-09-11Trusteer Ltd.Scrambling HTML to prevent CSRF attacks and transactional crimeware attacks
US8275984B2 (en)2008-12-152012-09-25Microsoft CorporationTLS key and CGI session ID pairing
US8341710B2 (en)*2009-12-142012-12-25Verizon Patent And Licensing, Inc.Ubiquitous webtoken
US9356916B2 (en)2010-04-302016-05-31T-Central, Inc.System and method to use a cloud-based platform supported by an API to authenticate remote users and to provide PKI- and PMI-based distributed locking of content and distributed unlocking of protected content
WO2011137254A2 (en)2010-04-302011-11-03Tobsc Inc.Methods and apparatus for a document clearinghouse and secure delivery network
US20120284506A1 (en)2010-04-302012-11-08T-Central, Inc.Methods and apparatus for preventing crimeware attacks
US9270663B2 (en)2010-04-302016-02-23T-Central, Inc.System and method to enable PKI- and PMI-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—added
US20120023593A1 (en)2010-07-262012-01-26Puder GeorgeSystem and method for filtering internet content & blocking undesired websites by secure network appliance
US9544766B2 (en)*2011-05-312017-01-10Blackberry LimitedSystem and method for authentication and key exchange for a mobile device via spectrally confined wireless communications
US8863298B2 (en)*2012-01-062014-10-14Mobile Iron, Inc.Secure virtual file management system
US20130226813A1 (en)*2012-02-232013-08-29Robert Matthew VoltzCyberspace Identification Trust Authority (CITA) System and Method
US9641520B2 (en)*2012-04-012017-05-02Early Warning Services, LlcSecure authentication in a multi-party system
CN105791272A (en)*2016-02-232016-07-20青岛海尔智能家电科技有限公司 A method and device for secure communication in the Internet of Things

Cited By (175)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US11971967B2 (en)2007-09-272024-04-30Clevx, LlcSecure access device with multiple authentication mechanisms
US12437040B2 (en)2007-09-272025-10-07Clevx, LlcSecure access device with multiple authentication mechanisms
US11172361B2 (en)2010-03-032021-11-09Cisco Technology, Inc.System and method of notifying mobile devices to complete transactions
US10445732B2 (en)2010-03-032019-10-15Duo Security, Inc.System and method of notifying mobile devices to complete transactions after additional agent verification
US11341475B2 (en)2010-03-032022-05-24Cisco Technology, IncSystem and method of notifying mobile devices to complete transactions after additional agent verification
US10706421B2 (en)2010-03-032020-07-07Duo Security, Inc.System and method of notifying mobile devices to complete transactions after additional agent verification
US11832099B2 (en)2010-03-032023-11-28Cisco Technology, Inc.System and method of notifying mobile devices to complete transactions
US9455978B2 (en)2010-04-302016-09-27T-Central, Inc.System and method to enable PKI- and PMI- based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—added
US12149514B2 (en)2010-04-302024-11-19T-Central, Inc.System and method to enable PKI- and PMI-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—added
US10567361B2 (en)2010-04-302020-02-18T-Central, Inc.System and method to enable PKI- and PMI-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means-added
US10038678B2 (en)2010-04-302018-07-31T-Central, Inc.System and method to enable PKI- and PMI- based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means-added
US11463423B2 (en)2010-04-302022-10-04T-Central, Inc.System and method to enable PKI- and PMI-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—added
US10348756B2 (en)2011-09-022019-07-09Duo Security, Inc.System and method for assessing vulnerability of a mobile device
US9497170B2 (en)*2013-03-272016-11-15International Business Machines CorporationComputer assisted name-based aggregation system for identifying names of anonymized data
US20140298030A1 (en)*2013-03-272014-10-02International Business Machines CorporationComputer assisted name-based aggregation system for identifying names of anonymized data, as well as a method and computer program thereof
US10452567B2 (en)*2013-04-292019-10-22Hewlett Packard Enterprise Development LpNon-volatile memory to store resettable data
US20160077979A1 (en)*2013-04-292016-03-17Hewlett-Packard Development Company, L. P.Non-volatile memory to store resettable data
US10021113B2 (en)*2014-04-172018-07-10Duo Security, Inc.System and method for an integrity focused authentication service
US20170339164A1 (en)*2014-04-172017-11-23Duo Security, Inc.System and method for an integrity focused authentication service
US20150304110A1 (en)*2014-04-172015-10-22Duo Security, Inc.System and method for an integrity focused authentication service
US9762590B2 (en)*2014-04-172017-09-12Duo Security, Inc.System and method for an integrity focused authentication service
US20160007201A1 (en)*2014-05-272016-01-07Telmate, LlcVpn-based mobile device security
US20210352059A1 (en)*2014-11-042021-11-11Huawei Technologies Co., Ltd.Message Display Method, Apparatus, and Device
US10218700B2 (en)*2015-02-232019-02-26Ca, Inc.Authorizations for computing devices to access a protected resource
US20210201410A1 (en)*2015-03-052021-07-01Goldman Sachs & Co. LLCSystems and methods for updating a distributed ledger based on partial validations of transactions
US11023968B2 (en)*2015-03-052021-06-01Goldman Sachs & Co. LLCSystems and methods for updating a distributed ledger based on partial validations of transactions
US11558372B2 (en)2015-04-152023-01-17Citrix Systems, Inc.Authentication of a client device based on entropy from a server or other device
US10701065B2 (en)2015-04-152020-06-30Citrix Systems, Inc.Authentication of a client device based on entropy from a server or other device
US20190052631A1 (en)*2015-05-122019-02-14Citrix Systems, Inc.Multifactor Contextual Authentication and Entropy from Device or Device Input or Gesture Authentication
US10673845B2 (en)*2015-05-122020-06-02Citrix Systems, Inc.Multifactor contextual authentication and entropy from device or device input or gesture authentication
US11297055B2 (en)2015-05-122022-04-05Citrix Systems, Inc.Multifactor contextual authentication and entropy from device or device input or gesture authentication
USD888732S1 (en)2015-05-122020-06-30Citrix Systems, Inc.Display screen or portion thereof with transitional graphical user interface
US10374904B2 (en)2015-05-152019-08-06Cisco Technology, Inc.Diagnostic network visualization
US10542030B2 (en)2015-06-012020-01-21Duo Security, Inc.Method for enforcing endpoint health standards
US11637762B2 (en)2015-06-052023-04-25Cisco Technology, Inc.MDL-based clustering for dependency mapping
US11936663B2 (en)2015-06-052024-03-19Cisco Technology, Inc.System for monitoring and managing datacenters
US11252060B2 (en)2015-06-052022-02-15Cisco Technology, Inc.Data center traffic analytics synchronization
US20160359913A1 (en)*2015-06-052016-12-08Cisco Technology, Inc.Conditional policies
US10439904B2 (en)2015-06-052019-10-08Cisco Technology, Inc.System and method of determining malicious processes
US10326673B2 (en)2015-06-052019-06-18Cisco Technology, Inc.Techniques for determining network topologies
US10320630B2 (en)2015-06-052019-06-11Cisco Technology, Inc.Hierarchichal sharding of flows from sensors to collectors
US10505828B2 (en)2015-06-052019-12-10Cisco Technology, Inc.Technologies for managing compromised sensors in virtualized environments
US10516586B2 (en)2015-06-052019-12-24Cisco Technology, Inc.Identifying bogon address spaces
US10516585B2 (en)2015-06-052019-12-24Cisco Technology, Inc.System and method for network information mapping and displaying
US12335275B2 (en)2015-06-052025-06-17Cisco Technology, Inc.System for monitoring and managing datacenters
US12278746B2 (en)2015-06-052025-04-15Cisco Technology, Inc.Auto update of sensor configuration
US11368378B2 (en)2015-06-052022-06-21Cisco Technology, Inc.Identifying bogon address spaces
US10536357B2 (en)2015-06-052020-01-14Cisco Technology, Inc.Late data detection in data center
US11405291B2 (en)2015-06-052022-08-02Cisco Technology, Inc.Generate a communication graph using an application dependency mapping (ADM) pipeline
US12231308B2 (en)2015-06-052025-02-18Cisco Technology, Inc.Unique ID generation for sensors
US12231307B2 (en)2015-06-052025-02-18Cisco Technology, Inc.System and method for user optimized application dependency mapping
US10567247B2 (en)*2015-06-052020-02-18Cisco Technology, Inc.Intra-datacenter attack detection
US12224921B2 (en)2015-06-052025-02-11Cisco Technology, Inc.Technologies for managing compromised sensors in virtualized environments
US12212476B2 (en)2015-06-052025-01-28Cisco Technology, Inc.System and method for network policy simulation
US12192078B2 (en)2015-06-052025-01-07Cisco Technology, Inc.System and method of assigning reputation scores to hosts
US11477097B2 (en)2015-06-052022-10-18Cisco Technology, Inc.Hierarchichal sharding of flows from sensors to collectors
US10623283B2 (en)2015-06-052020-04-14Cisco Technology, Inc.Anomaly detection through header field entropy
US12177097B2 (en)2015-06-052024-12-24Cisco Technology, Inc.Policy utilization analysis
US10659324B2 (en)2015-06-052020-05-19Cisco Technology, Inc.Application monitoring prioritization
US11496377B2 (en)2015-06-052022-11-08Cisco Technology, Inc.Anomaly detection through header field entropy
US20160359877A1 (en)*2015-06-052016-12-08Cisco Technology, Inc.Intra-datacenter attack detection
US12113684B2 (en)2015-06-052024-10-08Cisco Technology, Inc.Identifying bogon address spaces
US10693749B2 (en)2015-06-052020-06-23Cisco Technology, Inc.Synthetic data for determining health of a network security system
US11502922B2 (en)2015-06-052022-11-15Cisco Technology, Inc.Technologies for managing compromised sensors in virtualized environments
US11522775B2 (en)2015-06-052022-12-06Cisco Technology, Inc.Application monitoring prioritization
US11968103B2 (en)2015-06-052024-04-23Cisco Technology, Inc.Policy utilization analysis
US10129117B2 (en)*2015-06-052018-11-13Cisco Technology, Inc.Conditional policies
US11528283B2 (en)2015-06-052022-12-13Cisco Technology, Inc.System for monitoring and managing datacenters
US11968102B2 (en)2015-06-052024-04-23Cisco Technology, Inc.System and method of detecting packet loss in a distributed sensor-collector architecture
US11252058B2 (en)2015-06-052022-02-15Cisco Technology, Inc.System and method for user optimized application dependency mapping
US11924073B2 (en)2015-06-052024-03-05Cisco Technology, Inc.System and method of assigning reputation scores to hosts
US10728119B2 (en)2015-06-052020-07-28Cisco Technology, Inc.Cluster discovery via multi-domain fusion for application dependency mapping
US10735283B2 (en)2015-06-052020-08-04Cisco Technology, Inc.Unique ID generation for sensors
US10742529B2 (en)2015-06-052020-08-11Cisco Technology, Inc.Hierarchichal sharding of flows from sensors to collectors
US11902122B2 (en)2015-06-052024-02-13Cisco Technology, Inc.Application monitoring prioritization
US11902120B2 (en)2015-06-052024-02-13Cisco Technology, Inc.Synthetic data for determining health of a network security system
US10797970B2 (en)2015-06-052020-10-06Cisco Technology, Inc.Interactive hierarchical network chord diagram for application dependency mapping
US11601349B2 (en)2015-06-052023-03-07Cisco Technology, Inc.System and method of detecting hidden processes by analyzing packet flows
US10904116B2 (en)2015-06-052021-01-26Cisco Technology, Inc.Policy utilization analysis
US11695659B2 (en)2015-06-052023-07-04Cisco Technology, Inc.Unique ID generation for sensors
US10862776B2 (en)2015-06-052020-12-08Cisco Technology, Inc.System and method of spoof detection
CN108432207A (en)*2015-12-282018-08-21莱里达网络远程信息技术服务有限公司 Email Authentication Method Including an Approved Electronic Signature on the Telecom Operator Section
US11755707B1 (en)*2015-12-292023-09-12Wells Fargo Bank, N.A.User information gathering and distribution system
CN112054892A (en)*2016-01-042020-12-08克莱夫公司Data storage device, method and system
US11379771B2 (en)*2016-03-082022-07-05PeerNova, Inc.Management of workflows
US20170262778A1 (en)*2016-03-082017-09-14PeerNova, Inc.Management of Workflows
US10601793B2 (en)*2016-03-112020-03-24Pss, LlcSystems and methods for securing electronic data with embedded security engines
US10355858B2 (en)*2016-03-302019-07-16Intel CorporationAuthenticating a system to enable access to a diagnostic interface in a storage device
US10091007B2 (en)*2016-04-042018-10-02Mastercard International IncorporatedSystems and methods for device to device authentication
USD915419S1 (en)2016-05-102021-04-06Citrix Systems, Inc.Display screen or portion thereof with transitional graphical user interface
USD886129S1 (en)2016-05-102020-06-02Citrix Systems, Inc.Display screen or portion thereof with graphical user interface
USD888731S1 (en)2016-05-102020-06-30Citrix Systems, Inc.Display screen or portion thereof with transitional graphical user interface
USD888730S1 (en)2016-05-102020-06-30Citrix Systems, Inc.Display screen or portion thereof with graphical user interface
USD907652S1 (en)2016-05-102021-01-12Citrix Systems, Inc.Display screen or portion thereof with graphical user interface
US11042664B2 (en)*2016-06-122021-06-22Apple Inc.Efficient implementation for differential privacy using cryptographic functions
US10289438B2 (en)2016-06-162019-05-14Cisco Technology, Inc.Techniques for coordination of application components deployed on distributed virtual machines
US10530583B2 (en)*2016-07-132020-01-07Idemia Identity & Security FranceMethod for putting a first device in secure communication with a second device
US20180019874A1 (en)*2016-07-132018-01-18Safran Identity & SecurityMethod for putting a first device in secure communication with a second device
US10708183B2 (en)2016-07-212020-07-07Cisco Technology, Inc.System and method of providing segment routing as a service
US11283712B2 (en)2016-07-212022-03-22Cisco Technology, Inc.System and method of providing segment routing as a service
CN107769915A (en)*2016-08-172018-03-06实创时新(北京)科技有限公司Possess the data encrypting and deciphering system and method for fine-grained user control
US20180082067A1 (en)*2016-09-202018-03-22Konica Minolta, Inc.Information Sharing Server, Information Sharing System And Non-Transitory Recording Medium
US10972388B2 (en)2016-11-222021-04-06Cisco Technology, Inc.Federated microburst detection
CN106815495A (en)*2017-02-212017-06-09郑州云海信息技术有限公司A kind of data processing method and device in cloud environment
US10803161B2 (en)*2017-03-152020-10-13Ricoh Company, Ltd.Information processing system, information processing method, and information processing apparatus
US10708152B2 (en)2017-03-232020-07-07Cisco Technology, Inc.Predicting application and network performance
US11088929B2 (en)2017-03-232021-08-10Cisco Technology, Inc.Predicting application and network performance
US10523512B2 (en)2017-03-242019-12-31Cisco Technology, Inc.Network agent for generating platform specific network policies
US11252038B2 (en)2017-03-242022-02-15Cisco Technology, Inc.Network agent for generating platform specific network policies
US10764141B2 (en)2017-03-272020-09-01Cisco Technology, Inc.Network agent for reporting to a network policy system
US12368629B2 (en)2017-03-272025-07-22Cisco Technology, Inc.Network agent for reporting to a network policy system
US11146454B2 (en)2017-03-272021-10-12Cisco Technology, Inc.Intent driven network policy platform
US10594560B2 (en)2017-03-272020-03-17Cisco Technology, Inc.Intent driven network policy platform
US11509535B2 (en)2017-03-272022-11-22Cisco Technology, Inc.Network agent for reporting to a network policy system
US11683618B2 (en)2017-03-282023-06-20Cisco Technology, Inc.Application performance monitoring and management platform with anomalous flowlet resolution
US11202132B2 (en)2017-03-282021-12-14Cisco Technology, Inc.Application performance monitoring and management platform with anomalous flowlet resolution
US10873794B2 (en)2017-03-282020-12-22Cisco Technology, Inc.Flowlet resolution for application performance monitoring and management
US11863921B2 (en)2017-03-282024-01-02Cisco Technology, Inc.Application performance monitoring and management platform with anomalous flowlet resolution
US10713388B2 (en)*2017-05-152020-07-14Polyport, Inc.Stacked encryption
US20180330120A1 (en)*2017-05-152018-11-15Polyport, Inc.Stacked Encryption
US11075771B2 (en)*2017-06-222021-07-27Telefonaktiebolaget Lm Ericsson (Publ)Method for generating operating entropy
US10110600B1 (en)2017-07-132018-10-23Cyberark Software Ltd.Dynamically learning and securing an asset-to-asset cloud communication environment
US9971884B1 (en)*2017-07-132018-05-15Cyberark Software Ltd.Providing credentials in an automated machine-to-machine communication system environment
US10680887B2 (en)2017-07-212020-06-09Cisco Technology, Inc.Remote device status audit and recovery
US11095662B2 (en)2017-08-292021-08-17Amazon Technologies, Inc.Federated messaging
US20190068746A1 (en)*2017-08-292019-02-28Wickr Inc.Directory Lookup for Federated Messaging
US11457018B1 (en)2017-08-292022-09-27Amazon Technologies, Inc.Federated messaging
US11368442B2 (en)2017-08-292022-06-21Amazon Technologies, Inc.Receiving an encrypted communication from a user in a second secure communication network
US11349659B2 (en)2017-08-292022-05-31Amazon Technologies, Inc.Transmitting an encrypted communication to a user in a second secure communication network
US10791196B2 (en)*2017-08-292020-09-29Wickr Inc.Directory lookup for federated messaging with a user from a different secure communication network
US10554501B2 (en)2017-10-232020-02-04Cisco Technology, Inc.Network migration assistant
US11044170B2 (en)2017-10-232021-06-22Cisco Technology, Inc.Network migration assistant
US10523541B2 (en)2017-10-252019-12-31Cisco Technology, Inc.Federated network and application data analytics platform
US10904071B2 (en)2017-10-272021-01-26Cisco Technology, Inc.System and method for network root cause analysis
US10594542B2 (en)2017-10-272020-03-17Cisco Technology, Inc.System and method for network root cause analysis
US11750385B2 (en)*2017-11-162023-09-05Prisec Innovation LimitedSystem and method for authenticating a user
US10412113B2 (en)2017-12-082019-09-10Duo Security, Inc.Systems and methods for intelligently configuring computer security
US11233821B2 (en)2018-01-042022-01-25Cisco Technology, Inc.Network intrusion counter-intelligence
US11750653B2 (en)2018-01-042023-09-05Cisco Technology, Inc.Network intrusion counter-intelligence
US10574575B2 (en)2018-01-252020-02-25Cisco Technology, Inc.Network flow stitching using middle box flow stitching
US10999149B2 (en)2018-01-252021-05-04Cisco Technology, Inc.Automatic configuration discovery based on traffic flow data
US10826803B2 (en)2018-01-252020-11-03Cisco Technology, Inc.Mechanism for facilitating efficient policy updates
US10798015B2 (en)2018-01-252020-10-06Cisco Technology, Inc.Discovery of middleboxes using traffic flow stitching
US11128700B2 (en)2018-01-262021-09-21Cisco Technology, Inc.Load balancing configuration based on traffic flow telemetry
US12236423B1 (en)*2018-02-222025-02-25Wells Fargo Bank, N.A.Systems and methods for federated identity management
CN108769020A (en)*2018-05-292018-11-06东北大学A kind of the identity attribute proof system and method for secret protection
CN108964986A (en)*2018-06-152018-12-07国网上海市电力公司Cooperative office system application layer dual-active disaster recovery and backup systems
CN109087078A (en)*2018-08-272018-12-25腾讯科技(深圳)有限公司 Data processing method, device, storage medium and equipment for electronic bills
CN111143816A (en)*2018-11-052020-05-12纬创资通股份有限公司Verification and authorization method and verification server
US10938574B2 (en)*2018-11-262021-03-02T-Mobile Usa, Inc.Cryptographic font script with integrated signature for verification
US11658962B2 (en)2018-12-072023-05-23Cisco Technology, Inc.Systems and methods of push-based verification of a transaction
CN109728903A (en)*2018-12-222019-05-07复旦大学 A Blockchain Weak Center Password Authorization Method Using Attribute Password
US11461498B2 (en)*2019-02-062022-10-04mSignia, Inc.Systems and methods for secured, managed, multi-party interchanges with a software application operating on a client device
CN110061978A (en)*2019-03-202019-07-26深圳金澜汉源科技有限公司Binary Cooperative Security client framework
US12088542B2 (en)2019-04-032024-09-10Snap Inc.Multiple application authentication
US11770351B2 (en)2019-04-032023-09-26Snap Inc.Multiple application list prioritization
US11496424B2 (en)*2019-04-032022-11-08Snap Inc.Cross-application media exchange
US20230030169A1 (en)*2020-03-312023-02-02Hewlett-Packard Development Company, L.P.Administrator's password resetting
US11804954B2 (en)2020-07-022023-10-31Salesforce, Inc.Encryption key management for an automated workflow
US10897351B1 (en)*2020-07-022021-01-19Slack Technologies, Inc.Encryption key management for an automated workflow
US11928449B2 (en)*2020-11-042024-03-12China Mobile (Suzhou) Software Technology Co., Ltd.Information processing method, device, apparatus and system, medium, andprogram
US20230318851A1 (en)*2021-01-142023-10-05Fujitsu LimitedControl method, storage medium, and information processing device
US20220405412A1 (en)*2021-06-212022-12-22Microsoft Technology Licensing, LlcConfiguration of default sensitivity labels for network file storage locations
US11783073B2 (en)*2021-06-212023-10-10Microsoft Technology Licensing, LlcConfiguration of default sensitivity labels for network file storage locations
US11755423B2 (en)*2022-02-102023-09-12Vinpower Inc.Mobile device for protecting data stored in data backup device and data protection method thereof
US20230251936A1 (en)*2022-02-102023-08-10Vinpower Inc.Mobile device for protecting data stored in data backup device and data protection method thereof
US20230291548A1 (en)*2022-03-082023-09-14Western Digital Technologies, Inc.Authorization requests from a data storage device to multiple manager devices
US12225111B2 (en)*2022-03-082025-02-11SanDisk Technologies, Inc.Authorization requests from a data storage device to multiple manager devices
US20240048550A1 (en)*2022-08-032024-02-081080 Network, Inc.Systems, methods, and computing platforms for executing credential-less network-based communication exchanges
US12212561B2 (en)*2022-08-032025-01-281080 Network, Inc.Systems, methods, and computing platforms for executing credential-less network-based communication exchanges
US12184638B2 (en)2022-08-032024-12-311080 Network, Inc.Systems, methods, and computing platforms for executing credential-less network-based communication exchanges
US20240089252A1 (en)*2022-08-032024-03-141080 Network, Inc.Systems, methods, and computing platforms for executing credential-less network-based communication exchanges
US12063211B2 (en)*2022-08-032024-08-131080 Network, Inc.Systems, methods, and computing platforms for executing credential-less network-based communication exchanges
US11843619B1 (en)*2022-10-072023-12-12Uab 360 ItStateless system to enable data breach notification
US12267340B2 (en)2022-10-072025-04-01Uab 360 ItStateless system to enable data breach notification

Also Published As

Publication numberPublication date
US11463423B2 (en)2022-10-04
US9455978B2 (en)2016-09-27
US20180332014A1 (en)2018-11-15
US20170134350A1 (en)2017-05-11
US20200236095A1 (en)2020-07-23
US20160248760A1 (en)2016-08-25
US10567361B2 (en)2020-02-18
US9270663B2 (en)2016-02-23
US10038678B2 (en)2018-07-31
US20170324717A1 (en)2017-11-09
US20160057120A9 (en)2016-02-25

Similar Documents

PublicationPublication DateTitle
US11463423B2 (en)System and method to enable PKI- and PMI-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—added
US12086799B2 (en)Method and system for zero-knowledge and identity based key management for decentralized applications
US12081531B2 (en)Secure communications using loop-based authentication flow
US11412385B2 (en)Methods for a secure mobile text message and object sharing application and system
US12149514B2 (en)System and method to enable PKI- and PMI-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—added
US20150381580A1 (en)System and method to use a cloud-based platform supported by an api to authenticate remote users and to provide pki- and pmi- based distributed locking of content and distributed unlocking of protected content
US9100171B1 (en)Computer-implemented forum for enabling secure exchange of information
US20170279807A1 (en)Safe method to share data and control the access to these in the cloud
US7627532B2 (en)Method for creating and managing secure service communities
US20090133107A1 (en)Method and device of enabling a user of an internet application access to protected information
CN101938471A (en) Secure Electronic Information Request Delivery System
JP2005517348A (en) A secure electronic messaging system that requires a key search to derive a decryption key
JP5602165B2 (en) Method and apparatus for protecting network communications
US8117438B1 (en)Method and apparatus for providing secure messaging service certificate registration
Primbs et al.OIDC²: Open Identity Certification With OpenID Connect
CN113691495A (en)Network account sharing and distributing system and method based on asymmetric encryption
US12348635B2 (en)System and methods for interactive document sharing and authentication with privacy guarantee
HudaAcademic document verification using SSI and blockchain technology
CN1866820B (en) Secure Electronic Information Request Delivery System
US7747850B1 (en)Automated, internet-based secure digital certificate distribution and maintenance
Kattwinkel et al.Exchange of Preparatory Information for Secure and Usable Cryptocurrency Transactions
EP3346659B1 (en)Communication method for electronic communication system in open environment
Sharifnia et al.Development of trust model for e-supply chain management applications
NL2010808C2 (en)System and method for remote access.
Young et al.Technologies to Support Authentication in Higher Education: A Study for the UK Joint Information Systems Committee, August 21th, 1996

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:T-CENTRAL, INC., CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:GRAHAM, DONALD;REEL/FRAME:034381/0309

Effective date:20140715

Owner name:T-CENTRAL, INC., CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BOUDETT, JOSSELYN;REEL/FRAME:034381/0349

Effective date:20140715

Owner name:T-CENTRAL, INC., CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:KRAVITZ, DAVID W;REEL/FRAME:034381/0357

Effective date:20111028

Owner name:T-CENTRAL, INC., CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:DIETZ, RUSSELL;REEL/FRAME:034381/0567

Effective date:20130210

FEPPFee payment procedure

Free format text:PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

STCFInformation on status: patent grant

Free format text:PATENTED CASE

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

Year of fee payment:4

FEPPFee payment procedure

Free format text:MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

FEPPFee payment procedure

Free format text:7.5 YR SURCHARGE - LATE PMT W/IN 6 MO, SMALL ENTITY (ORIGINAL EVENT CODE: M2555); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 8TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2552); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

Year of fee payment:8


[8]ページ先頭

©2009-2025 Movatter.jp