AU2022341301A1 - Data management and governance systems and methods - Google Patents

Data management and governance systems and methods Download PDF

Info

Publication number
AU2022341301A1
AU2022341301A1 AU2022341301A AU2022341301A AU2022341301A1 AU 2022341301 A1 AU2022341301 A1 AU 2022341301A1 AU 2022341301 A AU2022341301 A AU 2022341301A AU 2022341301 A AU2022341301 A AU 2022341301A AU 2022341301 A1 AU2022341301 A1 AU 2022341301A1
Authority
AU
Australia
Prior art keywords
data
service
access
management service
data set
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
AU2022341301A
Other languages
English (en)
Inventor
Kristo IILA
Oleg MÜRK
Eric Swenson
Rando Valt
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intertrust Technologies Corp
Original Assignee
Intertrust Technologies Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intertrust Technologies Corp filed Critical Intertrust Technologies Corp
Publication of AU2022341301A1 publication Critical patent/AU2022341301A1/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • G06F21/335User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Power Engineering (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
AU2022341301A 2021-09-10 2022-09-09 Data management and governance systems and methods Pending AU2022341301A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US202163243067P 2021-09-10 2021-09-10
US63/243,067 2021-09-10
PCT/US2022/043158 WO2023039225A1 (en) 2021-09-10 2022-09-09 Data management and governance systems and methods

Publications (1)

Publication Number Publication Date
AU2022341301A1 true AU2022341301A1 (en) 2024-03-07

Family

ID=83690510

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2022341301A Pending AU2022341301A1 (en) 2021-09-10 2022-09-09 Data management and governance systems and methods

Country Status (5)

Country Link
US (2) US12277214B2 (https=)
EP (1) EP4399634A1 (https=)
JP (1) JP2024536689A (https=)
AU (1) AU2022341301A1 (https=)
WO (1) WO2023039225A1 (https=)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12093286B2 (en) * 2021-11-19 2024-09-17 Intertrust Technologies Corporation Time series data management systems and methods
US12111940B1 (en) * 2021-12-03 2024-10-08 Amazon Technologies, Inc. Authorizing access to operating system resources using security policies managed by service external to the operating system
US12045365B2 (en) * 2022-01-07 2024-07-23 International Business Machines Corporation Governed database connectivity (GDBC) through and around data catalog to registered data sources
US11762755B2 (en) * 2022-01-28 2023-09-19 Jpmorgan Chase Bank, N.A. Systems and methods for non-human account tracking
US20240007300A1 (en) * 2022-06-29 2024-01-04 University Of South Florida System and method for cryptographic forensic audits on lightweight iot and digital archives
US20250267192A1 (en) * 2022-11-10 2025-08-21 Robin Systems, Inc Mounting Persistent Data Volumes in Multiple Bundle Applications
US11886872B1 (en) * 2023-02-15 2024-01-30 Snowflake Inc. In-database application package and application
CN116226894B (zh) * 2023-05-10 2023-08-04 杭州比智科技有限公司 一种基于元仓的数据安全治理系统及方法
CN116662603B (zh) * 2023-07-28 2023-10-20 江西云眼视界科技股份有限公司 基于kafka的时间轴管控方法、系统、电子设备及存储介质
US20250240293A1 (en) * 2024-01-19 2025-07-24 Dell Products L.P. Multi-tenant secrets manager
CN117648297B (zh) * 2024-01-30 2024-06-11 中国人民解放军国防科技大学 基于对象存储小文件离线合并方法、系统、设备及介质
US20260093713A1 (en) * 2024-09-30 2026-04-02 Amazon Technologies, Inc. Multi-level database catalog
US12609967B1 (en) * 2025-11-06 2026-04-21 Morgan Stanley Services Group Inc. System and method for unified access management for federated technology infrastructure

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9262622B2 (en) * 2013-12-06 2016-02-16 Bank Of America Corporation Secure connection between a data repository and an intelligence application
US10789207B2 (en) * 2015-07-27 2020-09-29 Sas Institute Inc. Distributed data storage grouping
US10878079B2 (en) * 2016-05-11 2020-12-29 Oracle International Corporation Identity cloud service authorization model with dynamic roles and scopes
US11636220B2 (en) * 2019-02-01 2023-04-25 Intertrust Technologies Corporation Data management systems and methods

Also Published As

Publication number Publication date
US20250181706A1 (en) 2025-06-05
US12277214B2 (en) 2025-04-15
WO2023039225A1 (en) 2023-03-16
US20230090190A1 (en) 2023-03-23
JP2024536689A (ja) 2024-10-08
EP4399634A1 (en) 2024-07-17

Similar Documents

Publication Publication Date Title
US12277214B2 (en) Data management and governance systems and methods
Ferrari Access Control in Data Management Systems: A Visual Querying Perspective
US20230244804A1 (en) Data management systems and methods
US20220021711A1 (en) Security Platform and Method for Efficient Access and Discovery
US9524308B2 (en) System and method for providing pluggable security in an enterprise crawl and search framework environment
CN109643242B (zh) 用于多租户hadoop集群的安全设计和架构
US8365254B2 (en) Unified authorization for heterogeneous applications
US9058471B2 (en) Authorization system for heterogeneous enterprise environments
JP4892179B2 (ja) データ項目のためのゾーンベースのセキュリティ管理
US20060294051A1 (en) Uniform access to entities in registered data store services
US20120185911A1 (en) Mlweb: a multilevel web application framework
US20230315893A1 (en) Row, Column Level Security for Data Lakes and its Uniform Enforcement Across Analytic Query Engines
Shermin An access control model for nosql databases
Al-Zobbi et al. Implementing a framework for big data anonymity and analytics access control
US20230128367A1 (en) Environment and location-based data access management systems and methods
US20240265125A1 (en) Embedded next generation access control system and imposing fine-grained access control of data in a database
Bücker et al. Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security
Ma et al. Study on access control for cloud storage security
Pasam et al. Security and Compliance
Gharajeh Security issues and privacy challenges of NoSQL databases
Nait Bahloul et al. H-RCBAC: Hadoop Access Control Based on Roles and Content
Hong et al. HBAC: Hierarchical‐Based Access Control Model for Storage Management in Data Lake Environments
Aneja et al. Security and Privacy: Challenges and Defending Solutions for NoSQL Data Stores
Kimm et al. Multilevel Secure Database on Security Enhanced Linux for System High Distributed Systems
CN120937007A (zh) 用于控制对工业自动化装置的结构化的数据或功能的访问的方法、控制实体和计算机程序产品