[go: up one dir, main page]

SG11201403482TA - Automated access, key, certificate, and credential management - Google Patents

Automated access, key, certificate, and credential management

Info

Publication number
SG11201403482TA
SG11201403482TA SG11201403482TA SG11201403482TA SG11201403482TA SG 11201403482T A SG11201403482T A SG 11201403482TA SG 11201403482T A SG11201403482T A SG 11201403482TA SG 11201403482T A SG11201403482T A SG 11201403482TA SG 11201403482T A SG11201403482T A SG 11201403482TA
Authority
SG
Singapore
Prior art keywords
certificate
key
credential management
automated access
automated
Prior art date
Application number
SG11201403482TA
Inventor
Tatu J Ylönen
Original Assignee
Ssh Comm Security Oyj
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ssh Comm Security Oyj filed Critical Ssh Comm Security Oyj
Publication of SG11201403482TA publication Critical patent/SG11201403482TA/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4505Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
    • H04L61/4523Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using lightweight directory access protocol [LDAP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/065Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/166Implementing security features at a particular protocol layer at the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)
SG11201403482TA 2011-12-21 2012-12-21 Automated access, key, certificate, and credential management SG11201403482TA (en)

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
US201161578389P 2011-12-21 2011-12-21
US201261646978P 2012-05-15 2012-05-15
US201261693278P 2012-08-25 2012-08-25
US201261697768P 2012-09-06 2012-09-06
US201261721278P 2012-11-01 2012-11-01
PCT/FI2012/051294 WO2013093209A1 (en) 2011-12-21 2012-12-21 Automated access, key, certificate, and credential management

Publications (1)

Publication Number Publication Date
SG11201403482TA true SG11201403482TA (en) 2014-07-30

Family

ID=48667820

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11201403482TA SG11201403482TA (en) 2011-12-21 2012-12-21 Automated access, key, certificate, and credential management

Country Status (4)

Country Link
US (11) US9515999B2 (en)
EP (1) EP2792104B1 (en)
SG (1) SG11201403482TA (en)
WO (1) WO2013093209A1 (en)

Families Citing this family (450)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9762685B2 (en) 2005-04-27 2017-09-12 Live Nation Entertainment, Inc. Location-based task execution for enhanced data access
US20140379390A1 (en) 2013-06-20 2014-12-25 Live Nation Entertainment, Inc. Location-based presentations of ticket opportunities
US11843594B2 (en) 2007-09-04 2023-12-12 Live Nation Entertainment, Inc. Controlled token distribution to protect against malicious data and resource access
US9231758B2 (en) * 2009-11-16 2016-01-05 Arm Technologies Israel Ltd. System, device, and method of provisioning cryptographic data to electronic devices
US10454674B1 (en) * 2009-11-16 2019-10-22 Arm Limited System, method, and device of authenticated encryption of messages
US9781170B2 (en) 2010-06-15 2017-10-03 Live Nation Entertainment, Inc. Establishing communication links using routing protocols
US8782434B1 (en) 2010-07-15 2014-07-15 The Research Foundation For The State University Of New York System and method for validating program execution at run-time
US10003458B2 (en) 2011-12-21 2018-06-19 Ssh Communications Security Corp. User key management for the secure shell (SSH)
SG11201403482TA (en) 2011-12-21 2014-07-30 Ssh Comm Security Oyj Automated access, key, certificate, and credential management
US9590959B2 (en) 2013-02-12 2017-03-07 Amazon Technologies, Inc. Data security service
US10084818B1 (en) 2012-06-07 2018-09-25 Amazon Technologies, Inc. Flexibly configurable data modification services
US9286491B2 (en) 2012-06-07 2016-03-15 Amazon Technologies, Inc. Virtual service provider zones
US10075471B2 (en) 2012-06-07 2018-09-11 Amazon Technologies, Inc. Data loss prevention techniques
US8751963B1 (en) 2013-01-23 2014-06-10 Splunk Inc. Real time indication of previously extracted data fields for regular expressions
US8682906B1 (en) 2013-01-23 2014-03-25 Splunk Inc. Real time display of data field values based on manual editing of regular expressions
US9594814B2 (en) 2012-09-07 2017-03-14 Splunk Inc. Advanced field extractor with modification of an extracted field
US9753909B2 (en) 2012-09-07 2017-09-05 Splunk, Inc. Advanced field extractor with multiple positive examples
US20140208217A1 (en) 2013-01-22 2014-07-24 Splunk Inc. Interface for managing splittable timestamps across event records
US10394946B2 (en) 2012-09-07 2019-08-27 Splunk Inc. Refining extraction rules based on selected text within events
US9122873B2 (en) 2012-09-14 2015-09-01 The Research Foundation For The State University Of New York Continuous run-time validation of program execution: a practical approach
US9069782B2 (en) 2012-10-01 2015-06-30 The Research Foundation For The State University Of New York System and method for security and privacy aware virtual machine checkpointing
US9680813B2 (en) * 2012-10-24 2017-06-13 Cyber-Ark Software Ltd. User provisioning
CN103259656B (en) * 2012-11-07 2016-08-31 鹤山世达光电科技有限公司 work transmission method and system
US9846773B2 (en) * 2012-12-20 2017-12-19 Telefonaktiebolaget Lm Ericsson (Publ) Technique for enabling a client to provide a server entity
US9667703B1 (en) * 2013-01-22 2017-05-30 Hypori, Inc. System, method and computer program product for generating remote views in a virtual mobile device platform
US9619673B1 (en) 2013-01-22 2017-04-11 Hypori, Inc. System, method and computer program product for capturing touch events for a virtual mobile device platform
US9380523B1 (en) 2013-01-22 2016-06-28 Hypori, Inc. System, method and computer program product for connecting roaming mobile devices to a virtual device platform
US9380562B1 (en) 2013-01-22 2016-06-28 Hypori, Inc. System, method and computer program product for providing notifications from a virtual device to a disconnected physical device
US9819593B1 (en) 2013-01-22 2017-11-14 Hypori, Inc. System, method and computer program product providing bypass mechanisms for a virtual mobile device platform
US9697629B1 (en) 2013-01-22 2017-07-04 Hypori, Inc. System, method and computer product for user performance and device resolution settings
US9380456B1 (en) 2013-01-22 2016-06-28 Hypori, Inc. System, method and computer program product for dynamically switching operating systems in a virtual mobile device platform
US9152929B2 (en) 2013-01-23 2015-10-06 Splunk Inc. Real time display of statistics and values for selected regular expressions
US10467422B1 (en) 2013-02-12 2019-11-05 Amazon Technologies, Inc. Automatic key rotation
US10211977B1 (en) * 2013-02-12 2019-02-19 Amazon Technologies, Inc. Secure management of information using a security module
US9705674B2 (en) 2013-02-12 2017-07-11 Amazon Technologies, Inc. Federated key management
US9367697B1 (en) 2013-02-12 2016-06-14 Amazon Technologies, Inc. Data security with a security module
US9300464B1 (en) 2013-02-12 2016-03-29 Amazon Technologies, Inc. Probabilistic key rotation
US9930066B2 (en) 2013-02-12 2018-03-27 Nicira, Inc. Infrastructure level LAN security
KR101520247B1 (en) * 2013-02-27 2015-05-15 주식회사 케이티 Method And System For Biometric Data Management
US9043593B2 (en) 2013-03-11 2015-05-26 International Business Machines Corporation Session attribute propagation through secure database server tiers
US9286305B2 (en) * 2013-03-14 2016-03-15 Fujitsu Limited Virtual storage gate system
US11222346B2 (en) 2013-03-15 2022-01-11 Commerce Signals, Inc. Method and systems for distributed signals for use with advertising
US10713669B2 (en) 2013-03-15 2020-07-14 Commerce Signals, Inc. Methods and systems for signals management
US10803512B2 (en) 2013-03-15 2020-10-13 Commerce Signals, Inc. Graphical user interface for object discovery and mapping in open systems
US10771247B2 (en) * 2013-03-15 2020-09-08 Commerce Signals, Inc. Key pair platform and system to manage federated trust networks in distributed advertising
US9374344B1 (en) * 2013-03-29 2016-06-21 Secturion Systems, Inc. Secure end-to-end communication system
US9798899B1 (en) 2013-03-29 2017-10-24 Secturion Systems, Inc. Replaceable or removable physical interface input/output module
US9317718B1 (en) 2013-03-29 2016-04-19 Secturion Systems, Inc. Security device with programmable systolic-matrix cryptographic module and programmable input/output interface
US9355279B1 (en) 2013-03-29 2016-05-31 Secturion Systems, Inc. Multi-tenancy architecture
US9524399B1 (en) 2013-04-01 2016-12-20 Secturion Systems, Inc. Multi-level independent security architecture
US9832171B1 (en) 2013-06-13 2017-11-28 Amazon Technologies, Inc. Negotiating a session with a cryptographic domain
US9178888B2 (en) * 2013-06-14 2015-11-03 Go Daddy Operating Company, LLC Method for domain control validation
US20160098325A1 (en) * 2013-06-19 2016-04-07 Hewlett-Packard Development Company, L.P. Unifying application log messages using runtime instrumentation
US9760697B1 (en) * 2013-06-27 2017-09-12 Interacvault Inc. Secure interactive electronic vault with dynamic access controls
US10681023B2 (en) 2013-06-28 2020-06-09 Ssh Communications Security Oyj Self-service portal for provisioning passwordless access
US9961052B2 (en) * 2013-06-28 2018-05-01 Extreme Networks, Inc. Virtualized host ID key sharing
EP2824888B1 (en) 2013-07-08 2020-04-01 SSH Communications Security Oyj Trust relationships in a computerized system
US10347286B2 (en) 2013-07-25 2019-07-09 Ssh Communications Security Oyj Displaying session audit logs
US8930576B1 (en) * 2013-07-25 2015-01-06 KE2 Therm Solutions, Inc. Secure communication network
US9350550B2 (en) 2013-09-10 2016-05-24 M2M And Iot Technologies, Llc Power management and security for wireless modules in “machine-to-machine” communications
US9100175B2 (en) 2013-11-19 2015-08-04 M2M And Iot Technologies, Llc Embedded universal integrated circuit card supporting two-factor authentication
US10498530B2 (en) 2013-09-27 2019-12-03 Network-1 Technologies, Inc. Secure PKI communications for “machine-to-machine” modules, including key derivation by modules and authenticating public keys
US9485099B2 (en) * 2013-10-25 2016-11-01 Cliqr Technologies, Inc. Apparatus, systems and methods for agile enablement of secure communications for cloud based applications
US10700856B2 (en) 2013-11-19 2020-06-30 Network-1 Technologies, Inc. Key derivation for a module using an embedded universal integrated circuit card
JP6478486B2 (en) 2013-11-20 2019-03-06 キヤノン株式会社 Information processing apparatus, control method thereof, and program
US9430212B2 (en) * 2014-02-10 2016-08-30 Netflix, Inc. Automatically generating volume images and launching virtual computing instances
US9218463B2 (en) 2014-02-21 2015-12-22 Venafi, Inc. Trust map management and user interface
US9485271B1 (en) * 2014-03-11 2016-11-01 Symantec Corporation Systems and methods for anomaly-based detection of compromised IT administration accounts
US10298555B2 (en) 2014-04-04 2019-05-21 Zettaset, Inc. Securing files under the semi-trusted user threat model using per-file key encryption
US9363247B2 (en) 2014-04-04 2016-06-07 Zettaset, Inc. Method of securing files under the semi-trusted user threat model using symmetric keys and per-block key encryption
US10043029B2 (en) 2014-04-04 2018-08-07 Zettaset, Inc. Cloud storage encryption
US10873454B2 (en) 2014-04-04 2020-12-22 Zettaset, Inc. Cloud storage encryption with variable block sizes
CA2945158A1 (en) * 2014-04-08 2015-10-15 Capital One Financial Corporation Systems and methods for transacting at an atm using a mobile device
US9397835B1 (en) 2014-05-21 2016-07-19 Amazon Technologies, Inc. Web of trust management in a distributed system
US20160149877A1 (en) * 2014-06-05 2016-05-26 Cavium, Inc. Systems and methods for cloud-based web service security management basedon hardware security module
US9674261B2 (en) * 2014-06-10 2017-06-06 Sap Portals Israel Ltd. ODBC access to external services
US9438421B1 (en) 2014-06-27 2016-09-06 Amazon Technologies, Inc. Supporting a fixed transaction rate with a variably-backed logical cryptographic key
US9489519B2 (en) 2014-06-30 2016-11-08 Nicira, Inc. Method and apparatus for encrypting data messages after detecting infected VM
US9712563B2 (en) 2014-07-07 2017-07-18 Cyber-Ark Software Ltd. Connection-specific communication management
US20160014077A1 (en) * 2014-07-10 2016-01-14 Aorato Ltd. System, Method and Process for Mitigating Advanced and Targeted Attacks with Authentication Error Injection
EP2985945A1 (en) * 2014-08-15 2016-02-17 CompuGroup Medical AG Method for secure e-mail exchange
US10452850B2 (en) * 2014-08-18 2019-10-22 International Business Machines Corporation Protected shell for risk validation
US9866392B1 (en) 2014-09-15 2018-01-09 Amazon Technologies, Inc. Distributed system web of trust provisioning
US9288050B1 (en) 2014-09-25 2016-03-15 International Business Machines Corporation Unified storage and management of cryptographic keys and certificates
EP3202081A4 (en) * 2014-09-30 2018-05-30 Hewlett-Packard Enterprise Development LP Metrics authorization based on a certificate
US10367646B1 (en) 2014-10-21 2019-07-30 Amazon Technologies, Inc. Cryptographic material distribution and management
US9552485B1 (en) * 2014-10-21 2017-01-24 Amazon Technologies, Inc. Cryptographic material renewal
CN105592011B (en) * 2014-10-23 2019-12-24 阿里巴巴集团控股有限公司 Account login method and device
US11533297B2 (en) * 2014-10-24 2022-12-20 Netflix, Inc. Secure communication channel with token renewal mechanism
US11399019B2 (en) 2014-10-24 2022-07-26 Netflix, Inc. Failure recovery mechanism to re-establish secured communications
US10303879B1 (en) * 2014-11-06 2019-05-28 Amazon Technologies, Inc. Multi-tenant trusted platform modules
GB2532415A (en) 2014-11-11 2016-05-25 Ibm Processing a guest event in a hypervisor-controlled system
US9785765B2 (en) * 2014-11-13 2017-10-10 Microsoft Technology Licensing, Llc Systems and methods for differential access control based on secrets
US20160140653A1 (en) * 2014-11-14 2016-05-19 Ryan McKenzie Virtual currency bank
DE102014225418A1 (en) * 2014-12-10 2016-06-16 Siemens Aktiengesellschaft Method and device for monitoring a certification authority
US10587595B1 (en) * 2014-12-30 2020-03-10 Acronis International Gmbh Controlling access to content
US10223549B2 (en) * 2015-01-21 2019-03-05 Onion ID Inc. Techniques for facilitating secure, credential-free user access to resources
DE102015201298A1 (en) * 2015-01-26 2016-07-28 Robert Bosch Gmbh Method for the cryptographic processing of data
US9853977B1 (en) 2015-01-26 2017-12-26 Winklevoss Ip, Llc System, method, and program product for processing secure transactions within a cloud computing system
US10454676B2 (en) * 2015-02-13 2019-10-22 International Business Machines Corporation Automatic key management using enterprise user identity management
US10348727B2 (en) * 2015-02-13 2019-07-09 International Business Machines Corporation Automatic key management using enterprise user identity management
WO2016138612A1 (en) * 2015-03-02 2016-09-09 Microsoft Technology Licensing, Llc Proxy service for uploading data from a source to a destination
US9531536B2 (en) * 2015-03-04 2016-12-27 Ssh Communications Oyj Shared keys in a computerized system
US10146931B1 (en) * 2015-03-13 2018-12-04 EMC IP Holding Company LLC Organization-level password management employing user-device password vault
US9722987B2 (en) * 2015-03-13 2017-08-01 Ssh Communications Security Oyj Access relationships in a computer system
US10454899B1 (en) * 2015-03-16 2019-10-22 Amazon Technologies, Inc. Controlling firewall ports in virtualized environments through public key cryptography
US10951473B1 (en) * 2015-03-25 2021-03-16 Amazon Technologies, Inc. Asynchronous fleet configuration service
US10043162B1 (en) 2015-03-31 2018-08-07 Square, Inc. Open ticket payment handling with bill splitting
US10528945B1 (en) 2015-03-31 2020-01-07 Square, Inc. Open ticket payment handling with incremental authorization
US9930050B2 (en) 2015-04-01 2018-03-27 Hand Held Products, Inc. Device management proxy for secure devices
US9503449B1 (en) * 2015-05-12 2016-11-22 Payoda Inc. Application centric centralized certificate management system for managing certificates across data centers
US10102232B2 (en) 2015-05-14 2018-10-16 Ssh Communications Security Oyj Storing structured information
US11503035B2 (en) * 2017-04-10 2022-11-15 The University Of Memphis Research Foundation Multi-user permission strategy to access sensitive information
CN104869175B (en) * 2015-06-16 2018-07-27 腾讯科技(北京)有限公司 Cross-platform account resource-sharing implementation method, apparatus and system
US9530260B1 (en) * 2015-06-17 2016-12-27 Toyota Motor Engineering & Manufacturing North America, Inc. Smart key registration notification system
US9819497B2 (en) * 2015-06-30 2017-11-14 Vmware, Inc. Automated provisioning of certificates
US10432610B2 (en) * 2015-06-30 2019-10-01 Vmware, Inc. Automated monitoring and managing of certificates
US20170048209A1 (en) * 2015-07-14 2017-02-16 Fmr Llc Crypto Key Recovery and Social Aggregating, Fractionally Efficient Transfer Guidance, Conditional Triggered Transaction, Datastructures, Apparatuses, Methods and Systems
JP5951094B1 (en) * 2015-09-07 2016-07-13 ヤフー株式会社 Generation device, terminal device, generation method, generation program, and authentication processing system
JP6122924B2 (en) 2015-09-11 2017-04-26 ヤフー株式会社 Providing device, terminal device, providing method, providing program, and authentication processing system
US9794064B2 (en) 2015-09-17 2017-10-17 Secturion Systems, Inc. Client(s) to cloud or remote server secure data or file object encryption gateway
CN105162668B (en) * 2015-09-17 2018-09-18 小米科技有限责任公司 Connect method and device for removing
US11283774B2 (en) 2015-09-17 2022-03-22 Secturion Systems, Inc. Cloud storage using encryption gateway with certificate authority identification
US10332107B2 (en) 2015-09-28 2019-06-25 Mastercard International Incorporated Secure shell file transfer protocol key administration
US10069817B2 (en) 2015-09-28 2018-09-04 Mastercard International Incorporated Secure file transfer with secure SSH key authentication
US9569757B1 (en) 2015-09-30 2017-02-14 Square, Inc. Anticipatory creation of point-of-sale data structures
WO2017054884A1 (en) * 2015-10-02 2017-04-06 Kone Corporation Accessing a passenger transportation device control means
US9729318B2 (en) * 2015-10-05 2017-08-08 International Business Machines Corporation Using everyday objects as cryptographic keys
US9604541B1 (en) * 2015-10-06 2017-03-28 Samsung Electronics Co., Ltd. System and method for customizing a vehicle operating environment
US10084807B2 (en) 2015-10-16 2018-09-25 Microsoft Technology Licensing, Llc. Detection of bypass vulnerabilities
US10708236B2 (en) 2015-10-26 2020-07-07 Secturion Systems, Inc. Multi-independent level secure (MILS) storage encryption
US12500767B2 (en) * 2023-07-19 2025-12-16 Qomplx Llc Kerberos interdiction and decryption for real-time analysis
US10749854B2 (en) * 2015-11-12 2020-08-18 Microsoft Technology Licensing, Llc Single sign-on identity management between local and remote systems
JP6579935B2 (en) * 2015-12-09 2019-09-25 キヤノン株式会社 Management apparatus, method and program
US10198595B2 (en) * 2015-12-22 2019-02-05 Walmart Apollo, Llc Data breach detection system
US10318747B1 (en) * 2015-12-30 2019-06-11 Amazon Technologies, Inc. Block chain based authentication
SG11201806343XA (en) * 2016-01-26 2018-08-30 Soracom Inc Server and program
CN105718794B (en) * 2016-01-27 2018-06-05 华为技术有限公司 The method and system of safeguard protection are carried out to virtual machine based on VTPM
US11424931B2 (en) * 2016-01-27 2022-08-23 Blackberry Limited Trusted execution environment
KR101905771B1 (en) * 2016-01-29 2018-10-11 주식회사 엔오디비즈웨어 Self defense security server with behavior and environment analysis and operating method thereof
US10599409B2 (en) 2016-02-02 2020-03-24 Blackberry Limited Application lifecycle operation queueing
US11611564B2 (en) * 2016-02-15 2023-03-21 Luigius Caramico Methods and systems of dual-layer computer-system security
US10091243B2 (en) * 2016-02-24 2018-10-02 Qualcomm Incorporated Apparatus and method for securely connecting to a remote server
US11282310B1 (en) * 2016-03-02 2022-03-22 Geokey, Inc. System and method for location-based access control
US20170262279A1 (en) * 2016-03-12 2017-09-14 Wipro Limited Methods and systems for developing user customizable web application frameworks
US10673697B2 (en) * 2016-03-13 2020-06-02 Cisco Technology, Inc. Bridging configuration changes for compliant devices
US10437853B2 (en) * 2016-03-16 2019-10-08 Microsoft Technology Licensing, Llc Tracking data replication and discrepancies in incremental data audits
US10594731B2 (en) * 2016-03-24 2020-03-17 Snowflake Inc. Systems, methods, and devices for securely managing network connections
EP3438834A4 (en) * 2016-03-31 2019-03-27 Sato Holdings Kabushiki Kaisha SERVER, INFORMATION PROCESSING SYSTEM, CLIENT TERMINAL
CN107371155B (en) * 2016-05-13 2021-08-31 华为技术有限公司 Communication security processing method, device and system
US10554683B1 (en) * 2016-05-19 2020-02-04 Board Of Trustees Of The University Of Alabama, For And On Behalf Of The University Of Alabama In Huntsville Systems and methods for preventing remote attacks against transportation systems
US10289991B1 (en) 2016-06-13 2019-05-14 Square, Inc. Utilizing APIs to facilitate open ticket synchronization
US10289992B1 (en) * 2016-06-17 2019-05-14 Square, Inc. Kitchen display interfaces with in flight capabilities
US10311420B1 (en) * 2016-06-17 2019-06-04 Square, Inc. Synchronizing open ticket functionality with kitchen display systems
US10360648B1 (en) 2016-06-22 2019-07-23 Square, Inc. Synchronizing KDS functionality with POS waitlist generation
US10321306B2 (en) * 2016-06-24 2019-06-11 Aerohive Networks, Inc. Network device selective synchronization
US11126565B2 (en) * 2016-06-27 2021-09-21 Hewlett Packard Enterprise Development Lp Encrypted memory access using page table attributes
US10580062B1 (en) 2016-06-28 2020-03-03 Square, Inc. Integrating predefined templates with open ticket functionality
US10444748B2 (en) 2016-06-30 2019-10-15 Ge Aviation Systems Llc In-situ measurement logging by wireless communication unit for communicating engine data
US10764747B2 (en) 2016-06-30 2020-09-01 Ge Aviation Systems Llc Key management for wireless communication system for communicating engine data
US10529150B2 (en) 2016-06-30 2020-01-07 Aviation Systems LLC Remote data loading for configuring wireless communication unit for communicating engine data
US10470114B2 (en) 2016-06-30 2019-11-05 General Electric Company Wireless network selection
US10467016B2 (en) 2016-06-30 2019-11-05 General Electric Company Managing an image boot
US10200110B2 (en) 2016-06-30 2019-02-05 Ge Aviation Systems Llc Aviation protocol conversion
US10318451B2 (en) 2016-06-30 2019-06-11 Ge Aviation Systems Llc Management of data transfers
US10712377B2 (en) 2016-06-30 2020-07-14 Ge Aviation Systems Llc Antenna diagnostics for wireless communication unit for communicating engine data
US10681132B2 (en) 2016-06-30 2020-06-09 Ge Aviation Systems Llc Protocol for communicating engine data to wireless communication unit
US10819601B2 (en) 2016-06-30 2020-10-27 Ge Aviation Systems Llc Wireless control unit server for conducting connectivity test
WO2018029508A1 (en) * 2016-08-09 2018-02-15 Appviewx Inc Application centric centralized certificate management system for managing certificates across data centers
US10530579B2 (en) * 2016-08-12 2020-01-07 Venafi, Inc. Cryptographic key control based on debasing condition likelihood estimation
US11057208B2 (en) * 2016-08-22 2021-07-06 Rakuten, Inc. Management system, management device, management method, program, and non-transitory computer-readable information recording medium
US10614229B2 (en) * 2016-08-24 2020-04-07 International Business Machines Corporation Security and privacy controls for remote-access support services
US10798073B2 (en) * 2016-08-26 2020-10-06 Nicira, Inc. Secure key management protocol for distributed network encryption
US11184318B2 (en) * 2016-09-19 2021-11-23 Wangsu Science & Technology Co., Ltd. 302 redirecting method, URL generating method and system, and domain-name resolving method and system
CN111756815B (en) * 2016-09-19 2023-04-07 网宿科技股份有限公司 302 skipping method, skipping domain name generation method, domain name resolution method and system
CN107948123B (en) 2016-10-12 2021-01-12 钉钉控股(开曼)有限公司 File transmission method and device
US10803176B2 (en) 2016-10-21 2020-10-13 Hewlett-Packard Development Company, L.P. Bios security
KR101886176B1 (en) * 2016-10-25 2018-08-08 시큐리티플랫폼 주식회사 Memory device having booting part which is recordable only by owner
US11018860B2 (en) 2016-10-28 2021-05-25 Microsoft Technology Licensing, Llc Highly available and reliable secret distribution infrastructure
US10855464B2 (en) * 2016-11-23 2020-12-01 Vmware, Inc. Methods and apparatus to manage credentials in hyper-converged infrastructures
US10891370B2 (en) 2016-11-23 2021-01-12 Blackberry Limited Path-based access control for message-based operating systems
US10462123B2 (en) 2016-12-06 2019-10-29 Vmware, Inc. Systems and methods for cloning an agent in a distributed environment
US11153297B2 (en) * 2016-12-06 2021-10-19 Vmware, Inc. Systems and methods to facilitate certificate and trust management across a distributed environment
US11182203B2 (en) 2016-12-06 2021-11-23 Vmware, Inc. Systems and methods to orchestrate infrastructure installation of a hybrid system
US10341327B2 (en) 2016-12-06 2019-07-02 Bank Of America Corporation Enabling secure connections by managing signer certificates
US10338981B2 (en) 2016-12-06 2019-07-02 Vmware, Inc Systems and methods to facilitate infrastructure installation checks and corrections in a distributed environment
US10666683B2 (en) * 2016-12-07 2020-05-26 Cisco Technology, Inc. User interface for low-touch security policy provisioning
US10326746B1 (en) * 2016-12-20 2019-06-18 Amazon Technologies, Inc. Access key retrieval service for clients
US11700258B2 (en) 2016-12-30 2023-07-11 Ssh Communications Security Oyj Access relationships in a computer system
US10389722B2 (en) * 2016-12-30 2019-08-20 Ssh Communications Security Oyj Access relationships in a computer system
US10374810B2 (en) * 2017-01-05 2019-08-06 Bank Of America Corporation Middleware system validation tool
JP2018113493A (en) * 2017-01-06 2018-07-19 キヤノン株式会社 Client device, system, information processing method, and program
US10580242B2 (en) * 2017-01-20 2020-03-03 Macron International, Inc. Asset management system utilizing a mobile application
US11150936B2 (en) * 2017-01-23 2021-10-19 Hysolate Ltd. Techniques for binding user identities to appropriate virtual machines with single sign-on
US11153322B2 (en) 2017-01-23 2021-10-19 Hysolate Ltd. Techniques for seamlessly launching applications in appropriate virtual machines
US11010352B2 (en) 2017-01-23 2021-05-18 Hysolate Ltd. Unified file system on air-gapped endpoints
US10699003B2 (en) 2017-01-23 2020-06-30 Hysolate Ltd. Virtual air-gapped endpoint, and methods thereof
US10360353B2 (en) 2017-02-08 2019-07-23 International Business Machines Corporation Execution control of computer software instructions
US10574634B2 (en) * 2017-02-10 2020-02-25 Ssh Communications Security Oyj Management of authenticator information in a computer system
EP3364329B1 (en) * 2017-02-21 2023-07-26 Mastercard International Incorporated Security architecture for device applications
US20180262349A1 (en) * 2017-03-13 2018-09-13 Honeywell International Inc. System and approach to deploy secure communication for a network
US12111944B2 (en) * 2017-03-16 2024-10-08 Jun Yu Method and system for policy based real time data file access control
CN106790308A (en) * 2017-03-28 2017-05-31 北京中电普华信息技术有限公司 A kind of user authen method, apparatus and system
US10013560B1 (en) 2017-04-05 2018-07-03 International Business Machines Corporation Securely exchanging information during application startup
CN107094138B (en) * 2017-04-11 2019-09-13 郑州信大捷安信息技术股份有限公司 A kind of smart home safe communication system and communication means
US10296425B2 (en) 2017-04-20 2019-05-21 Bank Of America Corporation Optimizing data processing across server clusters and data centers using checkpoint-based data replication
US11288167B2 (en) 2017-04-25 2022-03-29 Hnl Partners, Llc System and method for visualizing and measuring software assets
US11080162B2 (en) * 2017-04-25 2021-08-03 Hnl Partners, Llc System and method for visualizing and measuring software assets
WO2018201062A1 (en) * 2017-04-28 2018-11-01 IronCore Labs, Inc. Orthogonal access control for groups via multi-hop transform encryption
EP3402152B1 (en) 2017-05-08 2019-10-16 Siemens Aktiengesellschaft System-specific automated certificate management
US20180338007A1 (en) * 2017-05-17 2018-11-22 American Megatrends, Inc. System and method for providing extensible communication gateway with session pooling
US10412094B2 (en) * 2017-05-25 2019-09-10 GM Global Technology Operations LLC Privileged, diagnostic link connector based network monitoring capabilities within a vehicle employing a gateway module used to isolate and secure vehicle networks
US10824476B1 (en) * 2017-06-20 2020-11-03 Amazon Technologies, Inc. Multi-homed computing instance processes
US10644890B1 (en) 2017-06-29 2020-05-05 Salesforce.Com Language-agnostic secure application deployment
US11163910B2 (en) * 2017-06-29 2021-11-02 Salesforce.Com, Inc. Methods and systems for data migration
US10567360B2 (en) * 2017-06-29 2020-02-18 Vmware, Inc. SSH key validation in a hyper-converged computing environment
US10749689B1 (en) * 2017-06-29 2020-08-18 Salesforce.Com, Inc. Language-agnostic secure application development
US20190007212A1 (en) * 2017-06-30 2019-01-03 Intel Corporation Secure unlock systems for locked devices
CN107343173B (en) * 2017-07-19 2019-11-22 中标慧安信息技术股份有限公司 The method and device of intellectual access connection security protection video monitoring system headend equipment
US10416986B2 (en) * 2017-07-20 2019-09-17 Vmware, Inc. Automating application updates in a virtual computing environment
US11343095B2 (en) * 2017-09-19 2022-05-24 Microsoft Technology Licensing, Llc Cryplet binding key graph
US11677743B2 (en) * 2017-09-28 2023-06-13 Fortinet, Inc. Ethernet key
CN107517224A (en) * 2017-09-29 2017-12-26 郑州云海信息技术有限公司 A method to realize password-free login of cluster nodes
US10943311B1 (en) 2017-09-29 2021-03-09 Square, Inc. Order fulfillment and tracking systems and methods
US10467559B1 (en) 2017-09-29 2019-11-05 Square, Inc. Order fulfillment and tracking systems and methods
US11658982B2 (en) * 2017-10-06 2023-05-23 Red Hat, Inc. Efficient authentication in a file system with multiple security groups
US11503015B2 (en) 2017-10-12 2022-11-15 Mx Technologies, Inc. Aggregation platform portal for displaying and updating data for third-party service providers
US20190138635A1 (en) * 2017-11-06 2019-05-09 Getalert Ltd. Methods Data Structures Circuits Devices Systems and Functionally Associated Machine Executable Code for Artificial Intelligence Based Situational Assessment
EP3714389B1 (en) * 2017-11-20 2023-08-02 Telefonaktiebolaget LM Ericsson (PUBL) Deployment of components of a distributed application to runtime environments
US11785104B2 (en) 2017-11-27 2023-10-10 Lacework, Inc. Learning from similar cloud deployments
US12058160B1 (en) 2017-11-22 2024-08-06 Lacework, Inc. Generating computer code for remediating detected events
US11973784B1 (en) 2017-11-27 2024-04-30 Lacework, Inc. Natural language interface for an anomaly detection framework
US12335348B1 (en) 2017-11-27 2025-06-17 Fortinet, Inc. Optimizing data warehouse utilization by a data ingestion pipeline
US12463995B1 (en) 2017-11-27 2025-11-04 Fortinet, Inc. Tiered risk engine with user cohorts
US20220232024A1 (en) 2017-11-27 2022-07-21 Lacework, Inc. Detecting deviations from typical user behavior
US11894984B2 (en) 2017-11-27 2024-02-06 Lacework, Inc. Configuring cloud deployments based on learnings obtained by monitoring other cloud deployments
US12309185B1 (en) 2017-11-27 2025-05-20 Fortinet, Inc. Architecture for a generative artificial intelligence (AI)-enabled assistant
US12267345B1 (en) 2017-11-27 2025-04-01 Fortinet, Inc. Using user feedback for attack path analysis in an anomaly detection framework
US12526297B2 (en) 2017-11-27 2026-01-13 Fortinet, Inc. Annotating changes in software across computing environments
US11765249B2 (en) 2017-11-27 2023-09-19 Lacework, Inc. Facilitating developer efficiency and application quality
US12261866B1 (en) 2017-11-27 2025-03-25 Fortinet, Inc. Time series anomaly detection
US12452272B1 (en) 2017-11-27 2025-10-21 Fortinet, Inc. Reducing resource consumption spikes in an anomaly detection framework
US11741238B2 (en) 2017-11-27 2023-08-29 Lacework, Inc. Dynamically generating monitoring tools for software applications
US12095796B1 (en) 2017-11-27 2024-09-17 Lacework, Inc. Instruction-level threat assessment
US12130878B1 (en) 2017-11-27 2024-10-29 Fortinet, Inc. Deduplication of monitored communications data in a cloud environment
US12495052B1 (en) 2017-11-27 2025-12-09 Fortinet, Inc. Detecting package execution for threat assessments
US12401669B1 (en) 2017-11-27 2025-08-26 Fortinet, Inc. Container vulnerability management by a data platform
US11792284B1 (en) 2017-11-27 2023-10-17 Lacework, Inc. Using data transformations for monitoring a cloud compute environment
US12284197B1 (en) 2017-11-27 2025-04-22 Fortinet, Inc. Reducing amounts of data ingested into a data warehouse
US12549577B1 (en) 2017-11-27 2026-02-10 Fortinet, Inc. Tracking and relating discovered security issues over time
US12381901B1 (en) 2017-11-27 2025-08-05 Fortinet, Inc. Unified storage for event streams in an anomaly detection framework
US12355626B1 (en) 2017-11-27 2025-07-08 Fortinet, Inc. Tracking infrastructure as code (IaC) asset lifecycles
US12126643B1 (en) 2017-11-27 2024-10-22 Fortinet, Inc. Leveraging generative artificial intelligence (‘AI’) for securing a monitored deployment
US12368745B1 (en) 2017-11-27 2025-07-22 Fortinet, Inc. Using natural language queries to conduct an investigation of a monitored system
US12309236B1 (en) 2017-11-27 2025-05-20 Fortinet, Inc. Analyzing log data from multiple sources across computing environments
US12407702B1 (en) 2017-11-27 2025-09-02 Fortinet, Inc. Gathering and presenting information related to common vulnerabilities and exposures
US12457231B1 (en) 2017-11-27 2025-10-28 Fortinet, Inc. Initiating and utilizing pedigree for content
US12355793B1 (en) 2017-11-27 2025-07-08 Fortinet, Inc. Guided interactions with a natural language interface
US11849000B2 (en) 2017-11-27 2023-12-19 Lacework, Inc. Using real-time monitoring to inform static analysis
US12463994B1 (en) 2017-11-27 2025-11-04 Fortinet, Inc. Handling of certificates by intermediate actors
US12348545B1 (en) 2017-11-27 2025-07-01 Fortinet, Inc. Customizable generative artificial intelligence (‘AI’) assistant
US11979422B1 (en) 2017-11-27 2024-05-07 Lacework, Inc. Elastic privileges in a secure access service edge
US12489771B1 (en) 2017-11-27 2025-12-02 Fortinet, Inc. Detecting anomalous behavior of nodes in a hierarchical cloud deployment
US12418555B1 (en) 2017-11-27 2025-09-16 Fortinet Inc. Guiding query creation for a generative artificial intelligence (AI)-enabled assistant
US12309182B1 (en) 2017-11-27 2025-05-20 Fortinet, Inc. Customer onboarding and integration with anomaly detection systems
US12537836B1 (en) 2017-11-27 2026-01-27 Fortinet, Inc. Risk scoring based on entity correlation
US20220232025A1 (en) 2017-11-27 2022-07-21 Lacework, Inc. Detecting anomalous behavior of a device
US11818156B1 (en) 2017-11-27 2023-11-14 Lacework, Inc. Data lake-enabled security platform
US12463996B1 (en) 2017-11-27 2025-11-04 Fortinet, Inc. Risk engine that utilizes key performance indicators
US12549575B1 (en) 2017-11-27 2026-02-10 Fortinet, Inc. Determining user risk based on user posture and activity
US12407701B1 (en) 2017-11-27 2025-09-02 Fortinet, Inc. Community-based generation of policies for a data platform
US12034754B2 (en) 2017-11-27 2024-07-09 Lacework, Inc. Using static analysis for vulnerability detection
US10614071B1 (en) 2017-11-27 2020-04-07 Lacework Inc. Extensible query interface for dynamic data compositions and filter applications
US12323449B1 (en) 2017-11-27 2025-06-03 Fortinet, Inc. Code analysis feedback loop for code created using generative artificial intelligence (‘AI’)
US20220224707A1 (en) 2017-11-27 2022-07-14 Lacework, Inc. Establishing a location profile for a user device
US11770398B1 (en) 2017-11-27 2023-09-26 Lacework, Inc. Guided anomaly detection framework
US12511110B1 (en) 2017-11-27 2025-12-30 Fortinet, Inc. Development and distribution of components for an anomaly detection framework
US11036532B2 (en) * 2017-11-29 2021-06-15 Microsoft Technology Licensing, Llc Fast join and leave virtual network
US10652224B2 (en) 2017-12-05 2020-05-12 International Business Machines Corporation Stateless session synchronization between secure communication interceptors
US10713378B2 (en) * 2017-12-19 2020-07-14 Dropbox, Inc. Techniques for eventually consistent inheritance propagation for nested content item namespaces
CN109995553B (en) * 2017-12-29 2022-03-25 华为技术有限公司 A communication method, device and system thereof
CN108073814B (en) * 2017-12-29 2021-10-15 安天科技集团股份有限公司 Shelling method and system based on static structured shelling parameters and storage medium
CN107979615B (en) * 2018-01-05 2020-07-03 新华三信息安全技术有限公司 Message encryption sending and authentication method, device, client and firewall
US11190363B2 (en) * 2018-01-11 2021-11-30 Lg Electronics, Inc. Cryptographic methods and systems using activation codes for digital certificate revocation
CN110032131A (en) * 2018-01-12 2019-07-19 中科院微电子研究所昆山分所 Electric vehicle state monitoring processing system and monitoring system based on Storm
US11184180B2 (en) * 2018-02-05 2021-11-23 Lg Electronics, Inc. Cryptographic methods and systems using blinded activation codes for digital certificate revocation
US20190251555A1 (en) * 2018-02-12 2019-08-15 Bank Of America Corporation Distributed ledger system for standby guarantee resources
CN108287917B (en) * 2018-02-13 2020-03-10 Oppo广东移动通信有限公司 File opening method and device, storage medium and electronic equipment
US12154081B2 (en) * 2018-02-20 2024-11-26 Trivver, Inc. Systems and methods for facilitating a time varying cryptocurrency transfer over a decentralized network through smart contracts associated with cryptocurrency blockchain technology
US10592340B2 (en) * 2018-02-28 2020-03-17 International Business Machines Corporation Dynamic authorization batching in a dispersed storage network
US11762980B2 (en) * 2018-03-14 2023-09-19 Microsoft Technology Licensing, Llc Autonomous secrets renewal and distribution
US11790470B1 (en) 2018-03-16 2023-10-17 Block, Inc. Storage service for sensitive customer data
US11847479B2 (en) 2018-03-23 2023-12-19 Vmware, Inc. Allocating a host of a pre-configured hyper-converged computing device to a workload domain
US11888997B1 (en) * 2018-04-03 2024-01-30 Amazon Technologies, Inc. Certificate manager
CN110351726B (en) * 2018-04-03 2021-01-29 华为技术有限公司 Method and device for terminal authentication
US11323274B1 (en) * 2018-04-03 2022-05-03 Amazon Technologies, Inc. Certificate authority
US11563590B1 (en) 2018-04-03 2023-01-24 Amazon Technologies, Inc. Certificate generation method
US11347868B2 (en) 2018-04-17 2022-05-31 Domo, Inc Systems and methods for securely managing data in distributed systems
US10733329B1 (en) * 2018-04-20 2020-08-04 Automation Anywhere, Inc. Robotic process automation system and method with secure credential vault
US20190325372A1 (en) 2018-04-23 2019-10-24 Bank Of America Corporation Wearable device for regulatory compliance logging and co-localization
US11019059B2 (en) 2018-04-26 2021-05-25 Radware, Ltd Blockchain-based admission processes for protected entities
US10949564B2 (en) * 2018-05-07 2021-03-16 Apple Inc. Contact discovery service with privacy aspect
US10701070B2 (en) 2018-05-23 2020-06-30 Verum Securitas, Inc. Personalized security system
CN108809964B (en) * 2018-05-25 2021-11-09 浙江齐治科技股份有限公司 Resource access control method and device
US11303632B1 (en) 2018-06-08 2022-04-12 Wells Fargo Bank, N.A. Two-way authentication system and method
CN108881257B (en) * 2018-06-29 2021-09-28 北京奇虎科技有限公司 Encryption transmission method for distributed search cluster and encryption transmission distributed search cluster
US10776094B2 (en) * 2018-07-29 2020-09-15 ColorTokens, Inc. Computer implemented system and method for encoding configuration information in a filename
CN109040252B (en) * 2018-08-07 2022-04-12 平安科技(深圳)有限公司 File transmission method, system, computer device and storage medium
US11206142B2 (en) 2018-08-17 2021-12-21 Cable Television Laboratories, Inc. Systems and methods for automated certificate renewal management
CN108900299B (en) * 2018-08-17 2022-06-14 延边大学 Shared key method for protecting personal privacy in group communication
US11005739B2 (en) 2018-09-05 2021-05-11 Richard K. Steen System and method for managing and presenting network data
US11095458B2 (en) * 2018-09-06 2021-08-17 Securosys SA Hardware security module that enforces signature requirements
US10552125B1 (en) * 2018-09-18 2020-02-04 Inductive Automation, LLC Messaging between components in graphical user interfaces for industrial control systems
US10929048B2 (en) * 2018-10-01 2021-02-23 EMC IP Holding Company LLC Dynamic multiple proxy deployment
US10868671B2 (en) * 2018-10-11 2020-12-15 Ademco Inc. Secured communication between host devices
US11218298B2 (en) 2018-10-11 2022-01-04 Ademco Inc. Secured communication between a host device and a client device
US10942970B2 (en) * 2018-10-12 2021-03-09 Oracle International Corporation Reachability graph index for query processing
US10896032B2 (en) * 2018-11-02 2021-01-19 Accenture Global Solutions, Limited System and method for certifying and deploying instruction code
EP3651427B1 (en) * 2018-11-12 2021-02-17 Ovh Systems and methods for connection management
CN109274773B (en) * 2018-11-14 2021-01-26 四川长虹电器股份有限公司 Method, device and system for realizing remote service calling
US11138680B1 (en) 2018-11-21 2021-10-05 Square, Inc. Updating menus based on predicted efficiencies
US11044257B1 (en) * 2018-11-26 2021-06-22 Amazon Technologies, Inc. One-time access to protected resources
US10915905B1 (en) 2018-12-13 2021-02-09 Square, Inc. Batch-processing transactions in response to an event
US11165786B2 (en) * 2018-12-18 2021-11-02 International Business Machines Corporation Remote assistance controller that provides control over what a remote assistor can access
US11140149B2 (en) * 2018-12-20 2021-10-05 Cisco Technology, Inc. Zero-touch bootstrap of an endpoint without admin pre-provisioning
EP3906633A4 (en) * 2019-01-02 2022-08-17 Nokia Solutions and Networks Oy METHOD, SYSTEM AND APPARATUS FOR UNIFIED SECURITY CONFIGURATION MANAGEMENT
US11294696B2 (en) * 2019-01-23 2022-04-05 Vmware, Inc. Virtual desktop infrastucture management by a management service enrolling and de-enrolling a virtual machine with an endpoint manager
US11451405B2 (en) * 2019-02-14 2022-09-20 Microsoft Technology Licensing, Llc On-demand emergency management operations in a distributed computing system
US11218329B2 (en) * 2019-02-20 2022-01-04 Arris Enterprises Llc Certificate generation with fallback certificates
US11997205B2 (en) * 2019-02-25 2024-05-28 Tbcasoft, Inc. Credential verification and issuance through credential service providers
EP3703312A1 (en) * 2019-02-26 2020-09-02 Siemens Aktiengesellschaft Certificate management integrated into a system planning tool
US11329983B2 (en) * 2019-03-25 2022-05-10 Micron Technology, Inc. Validating an electronic control unit of a vehicle
US11048544B2 (en) * 2019-04-08 2021-06-29 Sap Se Cloud resource credential provisioning for services running in virtual machines and containers
CN110012111B (en) * 2019-04-16 2022-04-15 昆山丘钛微电子科技股份有限公司 Data service cluster system and data processing method
US12088589B2 (en) * 2019-04-18 2024-09-10 Visa International Service Association Method, system, and computer program product for controlling access in a network of servers
US11606301B2 (en) * 2019-04-23 2023-03-14 Hewlett Packard Enterprise Development Lp Verifying intents in stateful networks using atomic address objects
US11477182B2 (en) * 2019-05-07 2022-10-18 International Business Machines Corporation Creating a credential dynamically for a key management protocol
TWI760614B (en) * 2019-05-17 2022-04-11 佳世達科技股份有限公司 Host login method
US11444759B2 (en) * 2019-05-29 2022-09-13 Stmicroelectronics, Inc. Method and apparatus for cryptographically aligning and binding a secure element with a host device
US11057350B2 (en) * 2019-05-30 2021-07-06 Cisco Technology, Inc. Layer 2 mobility for hybrid multi-cloud deployments without host-overlay
US11792227B2 (en) * 2019-06-12 2023-10-17 Research & Business Foundation Sungkyunkwan University I2NSF network security function facing interface YANG data model
US11665161B2 (en) * 2019-06-18 2023-05-30 Cisco Technology, Inc. Identity services for passwordless authentication
US11461451B2 (en) 2019-06-25 2022-10-04 Vmware, Inc. Document signing system for mobile devices
US11275858B2 (en) * 2019-06-25 2022-03-15 Vmware, Inc. Document signing system for mobile devices
CN110417754B (en) * 2019-07-11 2021-12-07 新华三大数据技术有限公司 Host proxy service authority authentication based method and device
CN110334504A (en) * 2019-07-15 2019-10-15 晏保华 A kind of cloud desktop freely logs in management system, method and device
US10749885B1 (en) * 2019-07-18 2020-08-18 Cyberark Software Ltd. Agentless management and control of network sessions
US11539678B2 (en) 2019-08-16 2022-12-27 Red Hat, Inc. Asymmetric key management for cloud computing services
US11301558B2 (en) 2019-08-21 2022-04-12 Red Hat Inc. Automatic secure storage of credentials within a managed configuration model
CN110808829B (en) * 2019-09-27 2023-04-18 国电南瑞科技股份有限公司 SSH authentication method based on key distribution center
US11042562B2 (en) * 2019-10-11 2021-06-22 Sap Se Scalable data extractor
US11736516B2 (en) * 2019-10-30 2023-08-22 AVAST Software s.r.o. SSL/TLS spoofing using tags
CN111143850B (en) * 2019-11-22 2022-03-04 航天恒星科技有限公司 Safety protection system and method for satellite data distributed virtual storage
US10958539B1 (en) 2019-12-02 2021-03-23 Cisco Technology, Inc. Network function virtualization compute element image upgrade
US11256759B1 (en) 2019-12-23 2022-02-22 Lacework Inc. Hierarchical graph analysis
US11201955B1 (en) 2019-12-23 2021-12-14 Lacework Inc. Agent networking in a containerized environment
US11711351B2 (en) * 2020-01-14 2023-07-25 Vmware, Inc. Distributed management and installation of digital certificates on a cluster for authentication with an external key management service
US11722477B2 (en) 2020-01-21 2023-08-08 Forcepoint Llc Automated renewal of certificates across a distributed computing security system
KR102331899B1 (en) * 2020-01-22 2021-11-26 네이버클라우드 주식회사 Method and system for remote terminal access through application of communication module during boot
US11287155B2 (en) 2020-02-11 2022-03-29 Honeywell International Inc. HVAC system configuration with automatic parameter generation
US11237534B2 (en) * 2020-02-11 2022-02-01 Honeywell International Inc. Managing certificates in a building management system
US11526976B2 (en) 2020-02-11 2022-12-13 Honeywell International Inc. Using augmented reality to assist in device installation
US11632243B1 (en) * 2020-03-31 2023-04-18 Juniper Networks, Inc. Multi-key exchange
DE102020111020A1 (en) * 2020-04-22 2021-10-28 Endress+Hauser Conducta Gmbh+Co. Kg Method for checking the authentic origin of electronic modules of a modularly structured field device in automation technology
DE102020111019A1 (en) * 2020-04-22 2021-10-28 Endress+Hauser Conducta Gmbh+Co. Kg Method for checking the authenticity of electronic modules of a modular field device in automation technology
US11882110B2 (en) 2020-04-29 2024-01-23 Hewlett Packard Enterprise Development Lp Renewal of security certificates of supplicants
US11245752B2 (en) * 2020-04-30 2022-02-08 Juniper Networks, Inc. Load balancing in a high-availability cluster
US11438179B2 (en) * 2020-05-18 2022-09-06 Kyndryl, Inc. Certificate renewal process outside application server environment
US12361083B2 (en) * 2020-05-26 2025-07-15 Hand in Hand Tech, LLC Relationships management systems, methods, and apparatuses
US11546315B2 (en) * 2020-05-28 2023-01-03 Hewlett Packard Enterprise Development Lp Authentication key-based DLL service
CN112347490A (en) * 2020-06-11 2021-02-09 广州锦行网络科技有限公司 Application program shell adding method
US11281450B2 (en) 2020-06-23 2022-03-22 Toyota Motor North America, Inc. Secure transport software update
US11880670B2 (en) 2020-06-23 2024-01-23 Toyota Motor North America, Inc. Execution of transport software update
US11323477B1 (en) * 2020-06-30 2022-05-03 Amazon Technologies, Inc. Establishing secure connections to instances in private subnets of a cloud provider network
KR102845741B1 (en) 2020-07-07 2025-08-13 삼성전자주식회사 Cloud server and Method for controlling the cloud server thereof
KR20220027060A (en) * 2020-08-01 2022-03-07 사이트릭스 시스템스, 인크. DaaS system
EP3961397B1 (en) * 2020-08-24 2025-10-01 Hitachi Energy Ltd Remote procedure call between entities in a service bus communication system
FR3113634B1 (en) * 2020-08-27 2022-10-14 Psa Automobiles Sa Method and system for supervising digital vehicle keys
US11019106B1 (en) 2020-09-22 2021-05-25 Netskope, Inc. Remotely accessed controlled contained environment
US11368459B2 (en) * 2020-09-30 2022-06-21 International Business Machines Corporation Providing isolated containers for user request processing
US11847310B2 (en) 2020-10-09 2023-12-19 Honeywell International Inc. System and method for auto binding graphics to components in a building management system
CN113742711B (en) * 2020-10-20 2024-10-18 北京沃东天骏信息技术有限公司 Method and device for container access
US11968187B2 (en) * 2020-10-23 2024-04-23 Secturion Systems, Inc. Multi-independent level security for high performance computing and data storage systems
US11246032B1 (en) 2020-10-29 2022-02-08 Motional Ad Llc Device provisioning and authentication
US12081979B2 (en) * 2020-11-05 2024-09-03 Visa International Service Association One-time wireless authentication of an Internet-of-Things device
US11106825B1 (en) 2020-11-10 2021-08-31 Netskope, Inc. Predetermined credential system for remote administrative operating system (OS) authorization and policy control
US11368314B2 (en) 2020-11-13 2022-06-21 Microsoft Technology Licensing, Llc Secure digital signing
US11552943B2 (en) * 2020-11-13 2023-01-10 Cyberark Software Ltd. Native remote access to target resources using secretless connections
CN112751825B (en) * 2020-12-07 2022-09-16 湖南麒麟信安科技股份有限公司 Software source issuing authority control method and system based on SSL certificate
US11575569B2 (en) * 2020-12-10 2023-02-07 Vmware, Inc. Host computing systems placement in data centers
US11687666B2 (en) * 2021-01-12 2023-06-27 Visa International Service Association System, method, and computer program product for conducting private set intersection (PSI) techniques with multiple parties using a data repository
US11601399B2 (en) 2021-01-20 2023-03-07 Bank Of America Corporation System and method for detecting forbidden network accesses based on zone connectivity mapping
US20220237176A1 (en) * 2021-01-27 2022-07-28 EMC IP Holding Company LLC Method and system for managing changes of records on hosts
JP2022114574A (en) * 2021-01-27 2022-08-08 富士フイルムビジネスイノベーション株式会社 Image processing system and program
TWI759096B (en) * 2021-02-04 2022-03-21 中華電信股份有限公司 Building and deployment system and method of shared software solution and computer readable medium
US20220245155A1 (en) * 2021-02-04 2022-08-04 Yext, Inc. Distributed multi-source data processing and publishing platform
US12271471B2 (en) * 2021-02-12 2025-04-08 Zettaset, Inc. Detecting threats by monitoring encryption key activity
US12147561B2 (en) 2021-02-19 2024-11-19 Capital One Services, Llc Automated database provisioning and methods thereof
US12238101B2 (en) * 2021-03-09 2025-02-25 Oracle International Corporation Customizing authentication and handling pre and post authentication in identity cloud service
US11677560B2 (en) * 2021-03-09 2023-06-13 Micron Technology, Inc. Utilization of a memory device as security token
US11569995B2 (en) * 2021-03-15 2023-01-31 Seagate Technology Llc Provisional authentication of a new device added to an existing trust group
WO2022195301A1 (en) * 2021-03-19 2022-09-22 Citrix Systems, Inc. Passwordless login
CN112989293B (en) * 2021-03-19 2022-03-22 山东英信计算机技术有限公司 Permission configuration method and device for IPMI user
US11764958B2 (en) 2021-04-06 2023-09-19 Capital One Services, Llc Systems and methods for dynamically encrypting redirect requests
US11675917B2 (en) * 2021-04-22 2023-06-13 Bank Of America Corporation Electronic system for dynamically permitting and restricting access to and modification of computer resources
US11804963B2 (en) 2021-04-29 2023-10-31 International Business Machines Corporation System and method for permissioned blockchain access into a computing network
US11599523B2 (en) 2021-04-30 2023-03-07 Bank Of America Corporation System for computing system configuration file state identification using decentralized multidimensional snapshots
US11307952B1 (en) 2021-04-30 2022-04-19 Bank Of America Corporation System for computing system configuration file state mirroring on peer computing devices
US11831688B2 (en) * 2021-06-18 2023-11-28 Capital One Services, Llc Systems and methods for network security
US12107861B2 (en) * 2021-08-10 2024-10-01 Capital One Services, Llc Systems and methods for managing IDs in IAM/resource policies
WO2023022724A1 (en) * 2021-08-20 2023-02-23 Hewlett-Packard Development Company, L.P. Agent-based certificate management
KR102568418B1 (en) * 2021-08-26 2023-08-18 하이파이브랩 주식회사 Electronic authentication system and method supporting multi-signature
US11997206B2 (en) * 2021-09-22 2024-05-28 Radware, Ltd. Techniques for protecting web-access
US12184645B2 (en) * 2021-10-14 2024-12-31 Twilio Inc. Trust relationships to share client assets among client accounts in a software as a service platform
WO2023069464A1 (en) * 2021-10-20 2023-04-27 Cryptography Research, Inc. Secure asset management infrastructure for enforcing access control policies
US20250007903A1 (en) * 2021-10-27 2025-01-02 Verifone, Inc. Systems and methods for pairing site controller to point-of-sale devices
CN114091011A (en) * 2021-10-29 2022-02-25 青岛海尔科技有限公司 Authority verification method and device, electronic equipment, storage medium and product
CN114124496B (en) * 2021-11-12 2023-11-24 福建汇思博数字科技有限公司 SSH remote login method based on server issued key and server
CN114124559B (en) * 2021-11-23 2024-04-02 杭州默安科技有限公司 Host recognition method based on public key fingerprint
US12088738B2 (en) 2021-12-03 2024-09-10 Amazon Technologies, Inc. Custom rules for global certificate issuance
US12407524B2 (en) * 2021-12-13 2025-09-02 Gm Cruise Holdings Llc Certificate revocation and management for autonomous vehicles
US12206738B2 (en) * 2022-01-26 2025-01-21 Dell Products L.P. Centralized and agentless in-cloud management of on-premises resources
US12225111B2 (en) * 2022-03-08 2025-02-11 SanDisk Technologies, Inc. Authorization requests from a data storage device to multiple manager devices
US12177204B2 (en) * 2022-03-21 2024-12-24 Amazon Technologies, Inc. Certificate authority selection in a cloud provider network
US20230333897A1 (en) * 2022-04-15 2023-10-19 Dell Products L.P. Method and system for performing device level management in a distributed multi-tiered computing environment
US12235938B2 (en) * 2022-04-28 2025-02-25 Dell Products L.P. Device disabled until claimed
KR20240025970A (en) * 2022-08-19 2024-02-27 현대자동차주식회사 Apparatus for controlling a vehicle including rxswin information, and system for controlling a vehicle having the apparatus
US12248584B2 (en) 2022-09-23 2025-03-11 Wiz, Inc. System and method for agentless host configuration detection of an image in a virtualized environment
US12242601B2 (en) 2022-09-08 2025-03-04 Wiz, Inc. System and method for agentless host configuration detection in a computing environment
US20240086538A1 (en) * 2022-09-09 2024-03-14 Sandfly Security Limited Computer investigation method and system for investigating authentication in remote host computers
US20240098075A1 (en) * 2022-09-20 2024-03-21 Citrix Systems, Inc. Access to messages sent via collaboration applications
US20240113873A1 (en) * 2022-09-30 2024-04-04 Snowflake Inc. Data platform user key-rotator
US12513006B1 (en) 2022-09-30 2025-12-30 Amazon Technologies, Inc. Secure provisioning and rotation of certificates for edge devices
US20240129289A1 (en) * 2022-10-14 2024-04-18 Beyond Identity Inc. User certificate with user authorizations
WO2024102265A1 (en) * 2022-11-09 2024-05-16 Arris Enterprises Llc Anti-cloning of device cryptographic keys for counterfeit prevention
US12425409B2 (en) * 2022-11-22 2025-09-23 Amazon Technologies, Inc. Trust-based dynamic access control system
US11811599B1 (en) * 2023-01-23 2023-11-07 International Business Machines Corporation Multi-version compatibility for connectivity protocols
US20240289119A1 (en) * 2023-02-28 2024-08-29 PwC Product Sales LLC Advanced identity onboarding
EP4447391A4 (en) * 2023-03-02 2025-01-08 Hangzhou Pingpong Intelligence Technology Co., Ltd. Operation and maintenance method and system for automatically and uniformly managing nodes of bastion host
EP4436097A1 (en) * 2023-03-23 2024-09-25 Siemens Aktiengesellschaft Method and system for cryptographically secure data transmission
CN116701335B (en) * 2023-05-17 2024-06-18 中国第一汽车股份有限公司 Cross-system log data processing method for vehicle-mounted cabin domain controller
US12218928B2 (en) * 2023-06-02 2025-02-04 Dell Products L.P. Data center asset authentication via an onboarding operation
US20240411910A1 (en) * 2023-06-07 2024-12-12 Dell Products L.P. Data protection using policy-based digital vault rotation
US20250097018A1 (en) * 2023-09-19 2025-03-20 Apple Inc. Secure Key Exchange
US12531853B2 (en) 2023-10-16 2026-01-20 Akamai Technologies, Inc. Secret management infrastructure with audits and credential upgrades
US12524518B2 (en) * 2023-10-16 2026-01-13 Akamai Technologies, Inc. Federated secret management for workload instances in cloud compute platforms
CN117453816B (en) * 2023-10-24 2024-05-07 上海宁盾信息科技有限公司 User data unifying method, system, computer and storage medium
US20250220020A1 (en) * 2023-12-29 2025-07-03 Cisco Technology, Inc. Service Protection for Software Agents on Protected Workloads
US20250335602A1 (en) * 2024-04-30 2025-10-30 Axiom Technologies LLC Trust Mapping Solution For Modeling Systemic Risk
US20250343824A1 (en) * 2024-05-01 2025-11-06 Oracle International Corporation Ssh engine(s) for generating user specific ssh configuration files

Family Cites Families (124)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH09167098A (en) 1995-07-28 1997-06-24 Hewlett Packard Co <Hp> Communication system for portable device
US6301661B1 (en) * 1997-02-12 2001-10-09 Verizon Labortories Inc. Enhanced security for applications employing downloadable executable content
JP3595109B2 (en) * 1997-05-28 2004-12-02 日本ユニシス株式会社 Authentication device, terminal device, authentication method in those devices, and storage medium
US6681017B1 (en) * 1997-09-03 2004-01-20 Lucent Technologies Inc. Simplified secure shared key establishment and data delivery protocols for electronic commerce
US6430562B1 (en) 1999-03-01 2002-08-06 Electronic Data Systems Corporation Integrated resource management system and method
US6678734B1 (en) 1999-11-13 2004-01-13 Ssh Communications Security Ltd. Method for intercepting network packets in a computing device
JP3582435B2 (en) 1999-12-10 2004-10-27 日本電気株式会社 Perpendicular magnetic recording medium
US6581113B1 (en) 1999-12-29 2003-06-17 Advanced Micro Devices, Inc. Apparatus and method for transferring frame data between a host system memory and a network interface buffer memory employing transmit descriptors without transmit status information
US20080244695A1 (en) 2000-06-01 2008-10-02 Jong-Sung Lee Total system for preventing information outflow from inside
IL144100A (en) 2000-07-06 2006-08-01 Samsung Electronics Co Ltd Mac address-based communication restricting method
US7082536B2 (en) * 2000-11-13 2006-07-25 Globalcerts, Lc System and method for computerized global messaging encryption
WO2002057917A2 (en) 2001-01-22 2002-07-25 Sun Microsystems, Inc. Peer-to-peer network computing platform
WO2002087629A1 (en) * 2001-04-26 2002-11-07 Analogic Corporation Ct scanner for imaging a preselected portion of a patient
US7072946B2 (en) * 2001-05-31 2006-07-04 Juniper Networks, Inc. Network router management interface with API invoked via login stream
US6851113B2 (en) 2001-06-29 2005-02-01 International Business Machines Corporation Secure shell protocol access control
US7590684B2 (en) 2001-07-06 2009-09-15 Check Point Software Technologies, Inc. System providing methodology for access control with cooperative enforcement
US7171554B2 (en) 2001-08-13 2007-01-30 Hewlett-Packard Company Method, computer program product and system for providing a switch user functionality in an information technological network
US7257815B2 (en) 2001-09-05 2007-08-14 Microsoft Corporation Methods and system of managing concurrent access to multiple resources
US7231664B2 (en) * 2002-09-04 2007-06-12 Secure Computing Corporation System and method for transmitting and receiving secure data in a virtual private group
US7577729B1 (en) * 2002-11-26 2009-08-18 Symantec Operating Corporation Distributed storage management services
US7219184B2 (en) 2002-12-10 2007-05-15 Isic Corporation Method and apparatus for longest prefix matching in processing a forwarding information database
US20060155981A1 (en) * 2002-12-25 2006-07-13 Mizutanai Mika, Kamimaki Hideki, Ebina Akihiro Network device, network system and group management method
US8214884B2 (en) 2003-06-27 2012-07-03 Attachmate Corporation Computer-based dynamic secure non-cached delivery of security credentials such as digitally signed certificates or keys
US7260224B1 (en) * 2003-06-30 2007-08-21 Microsoft Corporation Automated secure key transfer
US7624421B2 (en) * 2003-07-31 2009-11-24 Microsoft Corporation Method and apparatus for managing and displaying contact authentication in a peer-to-peer collaboration system
US20050081026A1 (en) 2003-08-15 2005-04-14 Imcentric, Inc. Software product for installing SSL certificates to SSL-enablable devices
US20050120204A1 (en) 2003-12-01 2005-06-02 Gary Kiwimagi Secure network connection
US20060031510A1 (en) 2004-01-26 2006-02-09 Forte Internet Software, Inc. Methods and apparatus for enabling a dynamic network of interactors according to personal trust levels between interactors
US7707405B1 (en) 2004-09-21 2010-04-27 Avaya Inc. Secure installation activation
US7509493B2 (en) 2004-11-19 2009-03-24 Microsoft Corporation Method and system for distributing security policies
US7810138B2 (en) * 2005-01-26 2010-10-05 Mcafee, Inc. Enabling dynamic authentication with different protocols on the same port for a switch
US20060259950A1 (en) 2005-02-18 2006-11-16 Ulf Mattsson Multi-layer system for privacy enforcement and monitoring of suspicious data access behavior
US20060206922A1 (en) 2005-03-08 2006-09-14 Securedatainnovations Ag Secure Remote Access To Non-Public Private Web Servers
US8291224B2 (en) * 2005-03-30 2012-10-16 Wells Fargo Bank, N.A. Distributed cryptographic management for computer systems
US7552115B2 (en) 2005-04-15 2009-06-23 Microsoft Corporation Method and system for efficient generation of storage reports
US20060248082A1 (en) 2005-04-29 2006-11-02 Amit Raikar Method and an apparatus for securely communicating between a management server and a managed node associated with a dynamic provisioning system
US8214844B2 (en) 2005-04-29 2012-07-03 Hewlett-Packard Development Company, L.P. Systems and methods for adjusting service queue capacity
US7574322B2 (en) 2005-05-10 2009-08-11 Microsoft Corporation Automated client device management
US7881262B2 (en) * 2005-07-07 2011-02-01 Alvarion Ltd. Method and apparatus for enabling mobility in mobile IP based wireless communication systems
US8799431B2 (en) 2005-08-15 2014-08-05 Toutvirtual Inc. Virtual systems management
CN1949765B (en) 2005-10-10 2010-10-13 华为技术有限公司 Method and system for obtaining SSH host public key of managed device
US20070199072A1 (en) 2005-10-14 2007-08-23 Softwareonline, Llc Control of application access to system resources
WO2007058907A2 (en) * 2005-11-10 2007-05-24 Pkware, Inc. Systems and methods for trusted information exchange
US7904949B2 (en) 2005-12-19 2011-03-08 Quest Software, Inc. Apparatus, systems and methods to provide authentication services to a legacy application
US8316429B2 (en) * 2006-01-31 2012-11-20 Blue Coat Systems, Inc. Methods and systems for obtaining URL filtering information
US8015594B2 (en) 2006-03-17 2011-09-06 Cisco Technology, Inc. Techniques for validating public keys using AAA services
US7770213B2 (en) 2006-04-17 2010-08-03 Oracle America, Inc. Method and apparatus for securely forgetting secrets
US9166782B2 (en) * 2006-04-25 2015-10-20 Stephen Laurence Boren Dynamic distributed key system and method for identity management, authentication servers, data security and preventing man-in-the-middle attacks
US20130227286A1 (en) 2006-04-25 2013-08-29 Andre Jacques Brisson Dynamic Identity Verification and Authentication, Dynamic Distributed Key Infrastructures, Dynamic Distributed Key Systems and Method for Identity Management, Authentication Servers, Data Security and Preventing Man-in-the-Middle Attacks, Side Channel Attacks, Botnet Attacks, and Credit Card and Financial Transaction Fraud, Mitigating Biometric False Positives and False Negatives, and Controlling Life of Accessible Data in the Cloud
US9002018B2 (en) * 2006-05-09 2015-04-07 Sync Up Technologies Corporation Encryption key exchange system and method
KR20080004165A (en) * 2006-07-05 2008-01-09 삼성전자주식회사 Device Authentication Method Using Broadcast Encryption
US8082574B2 (en) * 2006-08-11 2011-12-20 Certes Networks, Inc. Enforcing security groups in network of data processors
US20080086771A1 (en) 2006-10-04 2008-04-10 Kang Li Apparatus, system, and method for authenticating users of digital communication devices
US8327421B2 (en) * 2007-01-30 2012-12-04 Imprivata, Inc. System and method for identity consolidation
CN101282330B (en) 2007-04-04 2013-08-28 华为技术有限公司 Method and apparatus for managing network memory access authority, network memory access control method
US20100100778A1 (en) * 2007-05-11 2010-04-22 Spiceworks, Inc. System and method for hardware and software monitoring with integrated troubleshooting
KR100922582B1 (en) 2007-07-20 2009-10-21 한국전자통신연구원 Log-based Backtracking System and Method Using Center Point Segmentation
US20090070853A1 (en) * 2007-09-12 2009-03-12 International Business Machines Corporation Security Policy Validation For Web Services
CN102932136B (en) * 2007-09-14 2017-05-17 安全第一公司 Systems and methods for managing cryptographic keys
US7986636B2 (en) * 2007-11-09 2011-07-26 Polytechnic Institute Of New York University Efficient detection of relay node
US7987357B2 (en) * 2007-11-28 2011-07-26 Red Hat, Inc. Disabling remote logins without passwords
US20090185685A1 (en) * 2008-01-18 2009-07-23 International Business Machines Corporation Trust session management in host-based authentication
US20090199290A1 (en) * 2008-02-01 2009-08-06 Secure Computing Corporation Virtual private network system and method
US8638941B2 (en) * 2008-05-15 2014-01-28 Red Hat, Inc. Distributing keypairs between network appliances, servers, and other network assets
US20100070881A1 (en) 2008-09-12 2010-03-18 At&T Intellectual Property I, L.P. Project facilitation and collaboration application
US8955107B2 (en) * 2008-09-12 2015-02-10 Juniper Networks, Inc. Hierarchical application of security services within a computer network
US20140075567A1 (en) 2009-01-28 2014-03-13 Headwater Partners I Llc Service Processor Configurations for Enhancing or Augmenting System Software of a Mobile Communications Device
JPWO2010100923A1 (en) * 2009-03-03 2012-09-06 Kddi株式会社 Key sharing system
US9106617B2 (en) 2009-03-10 2015-08-11 At&T Intellectual Property I, L.P. Methods, systems and computer program products for authenticating computer processing devices and transferring both encrypted and unencrypted data therebetween
US20100262625A1 (en) 2009-04-08 2010-10-14 Glenn Robert Pittenger Method and system for fine-granularity access control for database entities
US8856869B1 (en) 2009-06-22 2014-10-07 NexWavSec Software Inc. Enforcement of same origin policy for sensitive data
CN101600203B (en) * 2009-06-30 2011-05-25 中兴通讯股份有限公司 Control method for security service and terminal of wireless local area network
US8311225B2 (en) 2009-08-17 2012-11-13 Brocade Communications Systems, Inc. Scalable key archival
WO2011030324A1 (en) 2009-09-09 2011-03-17 Varonis Systems, Inc. Enterprise level data management
US8578507B2 (en) 2009-09-09 2013-11-05 Varonis Systems, Inc. Access permissions entitlement review
US8874685B1 (en) 2009-09-22 2014-10-28 Threatguard, Inc. Compliance protocol and architecture
JP5402498B2 (en) * 2009-10-14 2014-01-29 富士通株式会社 INFORMATION STORAGE DEVICE, INFORMATION STORAGE PROGRAM, RECORDING MEDIUM CONTAINING THE PROGRAM, AND INFORMATION STORAGE METHOD
WO2011057057A1 (en) 2009-11-06 2011-05-12 Certified Cyber Solutions, Inc. System and method for secure access of a remote system
US8776192B2 (en) * 2009-11-17 2014-07-08 At&T Intellectual Property I, L.P. Methods, systems, and computer program products for automatically verifying and populating digital certificates in an encryption keystore
US8424065B2 (en) 2009-11-25 2013-04-16 International Business Machines Corporation Apparatus and method of identity and virtual object management and sharing among virtual worlds
US8438270B2 (en) 2010-01-26 2013-05-07 Tenable Network Security, Inc. System and method for correlating network identities and addresses
US8874914B2 (en) 2010-02-05 2014-10-28 Accenture Global Services Limited Secure and automated credential information transfer mechanism
EP2369503A1 (en) * 2010-02-18 2011-09-28 Silverstring Limited Data storage management
US20110225623A1 (en) 2010-03-12 2011-09-15 Wright Michael W Web-Hosted Self-Managed Virtual Systems With Complex Rule-Based Content Access
US8122282B2 (en) 2010-03-12 2012-02-21 International Business Machines Corporation Starting virtual instances within a cloud computing environment
US8479197B2 (en) 2010-04-09 2013-07-02 Red Hat Israel, Ltd. Host controller using reduced network resources to monitor hosts
US20110252459A1 (en) * 2010-04-12 2011-10-13 Walsh Robert E Multiple Server Access Management
US8504818B2 (en) 2010-04-15 2013-08-06 Microsoft Corporation Method and system for reliable protocol tunneling over HTTP
US8533337B2 (en) * 2010-05-06 2013-09-10 Citrix Systems, Inc. Continuous upgrading of computers in a load balanced environment
US20110291803A1 (en) * 2010-05-27 2011-12-01 Zeljko Bajic Rfid security and mobility architecture
US8856504B2 (en) 2010-06-07 2014-10-07 Cisco Technology, Inc. Secure virtual machine bootstrap in untrusted cloud infrastructures
JP5518594B2 (en) 2010-06-30 2014-06-11 三菱電機株式会社 Internal network management system, internal network management method and program
US8959115B2 (en) 2010-07-09 2015-02-17 Symantec Corporation Permission tracking systems and methods
JP4802295B1 (en) 2010-08-31 2011-10-26 株式会社スプリングソフト Network system and virtual private connection forming method
US8996575B2 (en) 2010-09-29 2015-03-31 M-Files Oy Method, an apparatus, a computer system, a security component and a computer readable medium for defining access rights in metadata-based file arrangement
TWI443581B (en) 2010-11-02 2014-07-01 Inst Information Industry Resource sharing system and method for operating the same
US20120117608A1 (en) * 2010-11-09 2012-05-10 Motorola, Inc. Certificate policy management tool
US8539562B2 (en) 2010-12-09 2013-09-17 International Business Machines Corporation Automated management of system credentials
US8683560B1 (en) 2010-12-29 2014-03-25 Amazon Technologies, Inc. Techniques for credential generation
US9026805B2 (en) * 2010-12-30 2015-05-05 Microsoft Technology Licensing, Llc Key management using trusted platform modules
US9680839B2 (en) 2011-01-27 2017-06-13 Varonis Systems, Inc. Access permissions management system and method
US9531754B2 (en) 2011-02-22 2016-12-27 Dome 9 Security Ltd. Methods, circuits, apparatus, systems and associated software applications for providing security on one or more servers, including virtual servers
US9141410B2 (en) 2011-03-08 2015-09-22 Rackspace Us, Inc. Pluggable allocation in a cloud computing system
JP2012195774A (en) * 2011-03-16 2012-10-11 Toshiba Corp Node and program
JP5676331B2 (en) * 2011-03-24 2015-02-25 株式会社東芝 Root node and program
US9215235B1 (en) 2011-05-23 2015-12-15 Palo Alto Networks, Inc. Using events to identify a user and enforce policies
US9363080B2 (en) 2011-07-08 2016-06-07 Venafi, Inc. System for managing cryptographic keys and trust relationships in a secure shell (SSH) environment
WO2013034187A1 (en) * 2011-09-08 2013-03-14 Telefonaktiebolaget L M Ericsson (Publ) Secure communication
US8478771B2 (en) 2011-09-30 2013-07-02 Bmc Software, Inc. Systems and methods related to a temporal log structure database
US8533802B2 (en) 2011-10-23 2013-09-10 Gopal Nandakumar Authentication system and related method
US8595546B2 (en) 2011-10-28 2013-11-26 Zettaset, Inc. Split brain resistant failover in high availability clusters
US9336324B2 (en) * 2011-11-01 2016-05-10 Microsoft Technology Licensing, Llc Intelligent caching for security trimming
US8555409B2 (en) 2011-11-02 2013-10-08 Wyse Technolgoy Inc. System and method for providing private session-based access to a redirected USB device or local device
US10003458B2 (en) * 2011-12-21 2018-06-19 Ssh Communications Security Corp. User key management for the secure shell (SSH)
SG11201403482TA (en) 2011-12-21 2014-07-30 Ssh Comm Security Oyj Automated access, key, certificate, and credential management
US20130179951A1 (en) * 2012-01-06 2013-07-11 Ioannis Broustis Methods And Apparatuses For Maintaining Secure Communication Between A Group Of Users In A Social Network
US10425411B2 (en) 2012-04-05 2019-09-24 Arizona Board Of Regents On Behalf Of Arizona State University Systems and apparatuses for a secure mobile cloud framework for mobile computing and communication
US9065802B2 (en) 2012-05-01 2015-06-23 Fortinet, Inc. Policy-based configuration of internet protocol security for a virtual private network
EP2856386A1 (en) * 2012-05-24 2015-04-08 Telefonaktiebolaget L M Ericsson (PUBL) Enhanced secure virtual machine provisioning
US20120266209A1 (en) * 2012-06-11 2012-10-18 David Jeffrey Gooding Method of Secure Electric Power Grid Operations Using Common Cyber Security Services
US8997197B2 (en) 2012-12-12 2015-03-31 Citrix Systems, Inc. Encryption-based data access management
EP2824888B1 (en) 2013-07-08 2020-04-01 SSH Communications Security Oyj Trust relationships in a computerized system
WO2016023211A1 (en) 2014-08-14 2016-02-18 惠州市吉瑞科技有限公司 Atomizer and electronic cigarette
US9722987B2 (en) * 2015-03-13 2017-08-01 Ssh Communications Security Oyj Access relationships in a computer system

Also Published As

Publication number Publication date
US9998497B2 (en) 2018-06-12
US20170222995A1 (en) 2017-08-03
EP2792104A1 (en) 2014-10-22
US20170171175A1 (en) 2017-06-15
US10812530B2 (en) 2020-10-20
US10708307B2 (en) 2020-07-07
US20170163689A1 (en) 2017-06-08
US10116700B2 (en) 2018-10-30
US20170041349A1 (en) 2017-02-09
US9832177B2 (en) 2017-11-28
US10693916B2 (en) 2020-06-23
US10277632B2 (en) 2019-04-30
US20170019387A1 (en) 2017-01-19
US9515999B2 (en) 2016-12-06
US20170366580A1 (en) 2017-12-21
EP2792104A4 (en) 2015-09-23
US20150222604A1 (en) 2015-08-06
EP2792104B1 (en) 2021-06-30
US20170019386A1 (en) 2017-01-19
US20190075134A1 (en) 2019-03-07
US10530814B2 (en) 2020-01-07
WO2013093209A1 (en) 2013-06-27
US20170012953A1 (en) 2017-01-12
US20170366581A1 (en) 2017-12-21
US10187426B2 (en) 2019-01-22
US10171508B2 (en) 2019-01-01

Similar Documents

Publication Publication Date Title
SG11201403482TA (en) Automated access, key, certificate, and credential management
GB2505601B (en) Credential authentication methods and systems
IL244948A0 (en) System and method for encryption key management, federation and distribution
IL221286B (en) Cryptographic key distribution system
ZA201302975B (en) Methods and apparatuses for access credential provisioning
GB2516803B (en) Communications security management
EP2697931A4 (en) QKD KEY MANAGEMENT SYSTEM
EP2845116A4 (en) Automated event management
EP2893690A4 (en) Data security management system
GB201318373D0 (en) Key management in a cloud-based environment
AP2015008456A0 (en) EPDCCH recource and quasi-co-location management in lte
PL2792497T3 (en) Security elements, and methods for their manufacture
EP2807792A4 (en) Authentication for network access related applications
EP2761521A4 (en) Automated password management
EP2884811A4 (en) Establishment-processing method, management method, and device for x2 connection
EP2638658A4 (en) Certificate policy management tool
GB2512803B (en) Encrypted biometric data management and retrieval
EP2738326A4 (en) Key cipher lock
GB2501588B (en) Managing encryption keys in a computer system
GB201206203D0 (en) Authentication in computer networks
EP2700190B8 (en) Authenticator, authenticatee and authentication method
ITMI20121694A1 (en) LOCK AND KEY
EP2840501A4 (en) Database management method, database system and program
EP2752809A4 (en) Power information management system, power information management device, and program
EP2747496A4 (en) Access management method, device and system