AU2022341301A1 - Data management and governance systems and methods - Google Patents
Data management and governance systems and methods Download PDFInfo
- Publication number
- AU2022341301A1 AU2022341301A1 AU2022341301A AU2022341301A AU2022341301A1 AU 2022341301 A1 AU2022341301 A1 AU 2022341301A1 AU 2022341301 A AU2022341301 A AU 2022341301A AU 2022341301 A AU2022341301 A AU 2022341301A AU 2022341301 A1 AU2022341301 A1 AU 2022341301A1
- Authority
- AU
- Australia
- Prior art keywords
- data
- service
- access
- management service
- data set
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
- G06F21/335—User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Power Engineering (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US202163243067P | 2021-09-10 | 2021-09-10 | |
| US63/243,067 | 2021-09-10 | ||
| PCT/US2022/043158 WO2023039225A1 (en) | 2021-09-10 | 2022-09-09 | Data management and governance systems and methods |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| AU2022341301A1 true AU2022341301A1 (en) | 2024-03-07 |
Family
ID=83690510
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| AU2022341301A Pending AU2022341301A1 (en) | 2021-09-10 | 2022-09-09 | Data management and governance systems and methods |
Country Status (5)
| Country | Link |
|---|---|
| US (2) | US12277214B2 (https=) |
| EP (1) | EP4399634A1 (https=) |
| JP (1) | JP2024536689A (https=) |
| AU (1) | AU2022341301A1 (https=) |
| WO (1) | WO2023039225A1 (https=) |
Families Citing this family (13)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US12093286B2 (en) * | 2021-11-19 | 2024-09-17 | Intertrust Technologies Corporation | Time series data management systems and methods |
| US12111940B1 (en) * | 2021-12-03 | 2024-10-08 | Amazon Technologies, Inc. | Authorizing access to operating system resources using security policies managed by service external to the operating system |
| US12045365B2 (en) * | 2022-01-07 | 2024-07-23 | International Business Machines Corporation | Governed database connectivity (GDBC) through and around data catalog to registered data sources |
| US11762755B2 (en) * | 2022-01-28 | 2023-09-19 | Jpmorgan Chase Bank, N.A. | Systems and methods for non-human account tracking |
| US20240007300A1 (en) * | 2022-06-29 | 2024-01-04 | University Of South Florida | System and method for cryptographic forensic audits on lightweight iot and digital archives |
| US20250267192A1 (en) * | 2022-11-10 | 2025-08-21 | Robin Systems, Inc | Mounting Persistent Data Volumes in Multiple Bundle Applications |
| US11886872B1 (en) * | 2023-02-15 | 2024-01-30 | Snowflake Inc. | In-database application package and application |
| CN116226894B (zh) * | 2023-05-10 | 2023-08-04 | 杭州比智科技有限公司 | 一种基于元仓的数据安全治理系统及方法 |
| CN116662603B (zh) * | 2023-07-28 | 2023-10-20 | 江西云眼视界科技股份有限公司 | 基于kafka的时间轴管控方法、系统、电子设备及存储介质 |
| US20250240293A1 (en) * | 2024-01-19 | 2025-07-24 | Dell Products L.P. | Multi-tenant secrets manager |
| CN117648297B (zh) * | 2024-01-30 | 2024-06-11 | 中国人民解放军国防科技大学 | 基于对象存储小文件离线合并方法、系统、设备及介质 |
| US20260093713A1 (en) * | 2024-09-30 | 2026-04-02 | Amazon Technologies, Inc. | Multi-level database catalog |
| US12609967B1 (en) * | 2025-11-06 | 2026-04-21 | Morgan Stanley Services Group Inc. | System and method for unified access management for federated technology infrastructure |
Family Cites Families (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9262622B2 (en) * | 2013-12-06 | 2016-02-16 | Bank Of America Corporation | Secure connection between a data repository and an intelligence application |
| US10789207B2 (en) * | 2015-07-27 | 2020-09-29 | Sas Institute Inc. | Distributed data storage grouping |
| US10878079B2 (en) * | 2016-05-11 | 2020-12-29 | Oracle International Corporation | Identity cloud service authorization model with dynamic roles and scopes |
| US11636220B2 (en) * | 2019-02-01 | 2023-04-25 | Intertrust Technologies Corporation | Data management systems and methods |
-
2022
- 2022-09-09 JP JP2024510622A patent/JP2024536689A/ja active Pending
- 2022-09-09 EP EP22789365.8A patent/EP4399634A1/en active Pending
- 2022-09-09 WO PCT/US2022/043158 patent/WO2023039225A1/en not_active Ceased
- 2022-09-09 US US17/942,097 patent/US12277214B2/en active Active
- 2022-09-09 AU AU2022341301A patent/AU2022341301A1/en active Pending
-
2025
- 2025-02-07 US US19/048,743 patent/US20250181706A1/en active Pending
Also Published As
| Publication number | Publication date |
|---|---|
| US20250181706A1 (en) | 2025-06-05 |
| US12277214B2 (en) | 2025-04-15 |
| WO2023039225A1 (en) | 2023-03-16 |
| US20230090190A1 (en) | 2023-03-23 |
| JP2024536689A (ja) | 2024-10-08 |
| EP4399634A1 (en) | 2024-07-17 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12277214B2 (en) | Data management and governance systems and methods | |
| Ferrari | Access Control in Data Management Systems: A Visual Querying Perspective | |
| US20230244804A1 (en) | Data management systems and methods | |
| US20220021711A1 (en) | Security Platform and Method for Efficient Access and Discovery | |
| US9524308B2 (en) | System and method for providing pluggable security in an enterprise crawl and search framework environment | |
| CN109643242B (zh) | 用于多租户hadoop集群的安全设计和架构 | |
| US8365254B2 (en) | Unified authorization for heterogeneous applications | |
| US9058471B2 (en) | Authorization system for heterogeneous enterprise environments | |
| JP4892179B2 (ja) | データ項目のためのゾーンベースのセキュリティ管理 | |
| US20060294051A1 (en) | Uniform access to entities in registered data store services | |
| US20120185911A1 (en) | Mlweb: a multilevel web application framework | |
| US20230315893A1 (en) | Row, Column Level Security for Data Lakes and its Uniform Enforcement Across Analytic Query Engines | |
| Shermin | An access control model for nosql databases | |
| Al-Zobbi et al. | Implementing a framework for big data anonymity and analytics access control | |
| US20230128367A1 (en) | Environment and location-based data access management systems and methods | |
| US20240265125A1 (en) | Embedded next generation access control system and imposing fine-grained access control of data in a database | |
| Bücker et al. | Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security | |
| Ma et al. | Study on access control for cloud storage security | |
| Pasam et al. | Security and Compliance | |
| Gharajeh | Security issues and privacy challenges of NoSQL databases | |
| Nait Bahloul et al. | H-RCBAC: Hadoop Access Control Based on Roles and Content | |
| Hong et al. | HBAC: Hierarchical‐Based Access Control Model for Storage Management in Data Lake Environments | |
| Aneja et al. | Security and Privacy: Challenges and Defending Solutions for NoSQL Data Stores | |
| Kimm et al. | Multilevel Secure Database on Security Enhanced Linux for System High Distributed Systems | |
| CN120937007A (zh) | 用于控制对工业自动化装置的结构化的数据或功能的访问的方法、控制实体和计算机程序产品 |