BR112015005740A2 - método para controlar o acesso a dados sendo processados por um recurso de computação remoto, meio legível por computador, e sistema para controlar o acesso a dados sendo processados por um recurso de computação remoto - Google Patents

método para controlar o acesso a dados sendo processados por um recurso de computação remoto, meio legível por computador, e sistema para controlar o acesso a dados sendo processados por um recurso de computação remoto

Info

Publication number
BR112015005740A2
BR112015005740A2 BR112015005740A BR112015005740A BR112015005740A2 BR 112015005740 A2 BR112015005740 A2 BR 112015005740A2 BR 112015005740 A BR112015005740 A BR 112015005740A BR 112015005740 A BR112015005740 A BR 112015005740A BR 112015005740 A2 BR112015005740 A2 BR 112015005740A2
Authority
BR
Brazil
Prior art keywords
data
remote computing
encryption key
computing resource
processed
Prior art date
Application number
BR112015005740A
Other languages
English (en)
Inventor
David Gross Brian
Original Assignee
Koninklijke Philips Nv
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninklijke Philips Nv filed Critical Koninklijke Philips Nv
Publication of BR112015005740A2 publication Critical patent/BR112015005740A2/pt

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H10/00ICT specially adapted for the handling or processing of patient-related medical or healthcare data
    • G16H10/20ICT specially adapted for the handling or processing of patient-related medical or healthcare data for electronic clinical trials or questionnaires
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H10/00ICT specially adapted for the handling or processing of patient-related medical or healthcare data
    • G16H10/60ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H40/00ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices
    • G16H40/60ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices for the operation of medical equipment or devices
    • G16H40/67ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices for the operation of medical equipment or devices for remote operation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2147Locking files
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/24Key scheduling, i.e. generating round keys or sub-keys for block encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/64Self-signed certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/88Medical equipments

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Medical Informatics (AREA)
  • Theoretical Computer Science (AREA)
  • Primary Health Care (AREA)
  • Public Health (AREA)
  • Epidemiology (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Biomedical Technology (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Databases & Information Systems (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)
  • Tourism & Hospitality (AREA)
  • Child & Adolescent Psychology (AREA)
  • Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Measuring And Recording Apparatus For Diagnosis (AREA)

Abstract

resumo método para controlar o acesso a dados sendo processados por um recurso de computação remoto, meio legível por computador, e sistema para controlar o acesso a dados sendo processados por um recurso de computação remoto a presente invenção refere-se a um método para controlar o acesso a dados que estão sendo processados por um recurso de computação remoto que inclui conceder uma chave de criptografia pública para um criador de dados a partir de uma autoridade de certificação pública, detectar um encontro com um proprietário de dados, criar chaves de criptografia privada para o criador de dados e o proprietário de dados em resposta à detecção do encontro, criptografar dados que são enviados para o recurso de computação remoto com a chave de criptografia pública, a chave de criptografia privada do criador de dados e a chave de criptografia privada do proprietário de dados, descriptografar os dados com base em verificação pública da chave de criptografia pública e verificação local da chave de criptografia privada do criador de dados e a chave de criptografia privada do proprietário de dados no recurso de computação remoto, e controlar o acesso do criador de dados aos dados por meio da alteração da permissão de ao menos uma dentre a chave de criptografia pública e a chave de criptografia privada do criador de dados. 1/1
BR112015005740A 2012-09-18 2013-09-13 método para controlar o acesso a dados sendo processados por um recurso de computação remoto, meio legível por computador, e sistema para controlar o acesso a dados sendo processados por um recurso de computação remoto BR112015005740A2 (pt)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201261702437P 2012-09-18 2012-09-18
PCT/IB2013/058520 WO2014045173A1 (en) 2012-09-18 2013-09-13 Controlling access to clinical data analyzed by remote computing resources

Publications (1)

Publication Number Publication Date
BR112015005740A2 true BR112015005740A2 (pt) 2017-07-04

Family

ID=49765576

Family Applications (1)

Application Number Title Priority Date Filing Date
BR112015005740A BR112015005740A2 (pt) 2012-09-18 2013-09-13 método para controlar o acesso a dados sendo processados por um recurso de computação remoto, meio legível por computador, e sistema para controlar o acesso a dados sendo processados por um recurso de computação remoto

Country Status (8)

Country Link
US (2) US9544151B2 (pt)
EP (1) EP2898443B1 (pt)
JP (1) JP2015534343A (pt)
CN (1) CN104798081B (pt)
BR (1) BR112015005740A2 (pt)
CA (1) CA2884970C (pt)
RU (1) RU2648952C2 (pt)
WO (1) WO2014045173A1 (pt)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10162858B2 (en) * 2013-07-31 2018-12-25 Sap Se Local versus remote optimization in encrypted query processing
WO2018009612A1 (en) * 2016-07-06 2018-01-11 Patient Doctor Technologies, Inc. Secure and zero knowledge data sharing for cloud applications
US11837342B2 (en) 2017-01-26 2023-12-05 Joshua J. Dronzek Method and system for backing up and maintaining electronic medical records for periods of temporary loss of connectivity to an electronic storage facility
US11830614B2 (en) 2017-03-20 2023-11-28 Opticsurg, Inc. Method and system for optimizing healthcare delivery
EP3503606A1 (en) * 2017-12-20 2019-06-26 Gemalto Sa A method for controlling by a server the use of at least one data element of a data owner
CN110135671A (zh) * 2018-02-08 2019-08-16 国网青海省电力公司经济技术研究院 输变电工程技经指标分析模型构建样本库的建立方法
CN110135670A (zh) * 2018-02-08 2019-08-16 国网青海省电力公司经济技术研究院 输变电工程技经智能化评审的建立方法
DE102018204447B4 (de) * 2018-03-22 2019-12-19 Madana Ug (Haftungsbeschränkt) Automatisiertes Verfahren zum Schutz von elektronischen Daten zum Zwecke der Datenverarbeitung durch Dritte unter Einbezug transparenter und unterbrechungssicherer Vergütung
CN108769024B (zh) * 2018-05-30 2020-11-13 中国电子信息产业集团有限公司第六研究所 一种数据获取方法及多数据运营商协商服务系统
US11437150B2 (en) * 2018-05-31 2022-09-06 Inspire Medical Systems, Inc. System and method for secured sharing of medical data generated by a patient medical device
WO2020220119A1 (en) * 2019-05-02 2020-11-05 Iisaac Inc. System and method for user-controllable cloud-based data sharing

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7178030B2 (en) * 2000-10-25 2007-02-13 Tecsec, Inc. Electronically signing a document
US20030115452A1 (en) * 2000-12-19 2003-06-19 Ravi Sandhu One time password entry to access multiple network sites
GB2400699B (en) 2003-04-17 2006-07-05 Hewlett Packard Development Co Security data provision method and apparatus and data recovery method and system
JP4504130B2 (ja) * 2003-07-25 2010-07-14 株式会社リコー 通信装置、通信システム、証明書送信方法及びプログラム
CN1702676A (zh) * 2004-05-28 2005-11-30 西门子医疗健康服务公司 处理针对临床试验和分析的病人医疗数据的系统
US20070180259A1 (en) 2006-01-20 2007-08-02 Bulot Earl J Secure Personal Medical Process
WO2008090470A2 (en) * 2007-01-16 2008-07-31 Absolute Software Corporation A security module having a secondary agent in coordination with a host agent
WO2009002804A2 (en) * 2007-06-22 2008-12-31 Chumby Industries, Inc. Systems and methods for device registration
US20090193267A1 (en) * 2008-01-28 2009-07-30 Chiasen Chung Secure electronic medical record storage on untrusted portal
JP2009301131A (ja) * 2008-06-10 2009-12-24 Sony Corp 医療データ管理システム、及び医療データ管理方法
JP5267027B2 (ja) * 2008-10-03 2013-08-21 富士通株式会社 個人情報システム
US20100241852A1 (en) * 2009-03-20 2010-09-23 Rotem Sela Methods for Producing Products with Certificates and Keys
CN101521880B (zh) * 2009-03-26 2011-04-27 中国计量学院 带安全机制的无线实时社区医疗保健监测系统及方法
EP2606604A1 (en) * 2010-08-17 2013-06-26 Hewlett-Packard Development Company, L.P. Encryption key management
US10003458B2 (en) * 2011-12-21 2018-06-19 Ssh Communications Security Corp. User key management for the secure shell (SSH)
CN102546655A (zh) * 2012-02-07 2012-07-04 中山爱科数字科技股份有限公司 健康信息的安全传输方法

Also Published As

Publication number Publication date
CN104798081A (zh) 2015-07-22
CN104798081B (zh) 2018-10-26
RU2648952C2 (ru) 2018-03-28
EP2898443A1 (en) 2015-07-29
US20170085535A1 (en) 2017-03-23
JP2015534343A (ja) 2015-11-26
WO2014045173A1 (en) 2014-03-27
CA2884970C (en) 2021-12-14
US10164950B2 (en) 2018-12-25
CA2884970A1 (en) 2014-03-27
EP2898443B1 (en) 2018-12-12
US9544151B2 (en) 2017-01-10
RU2015114491A (ru) 2016-11-10
US20150236859A1 (en) 2015-08-20

Similar Documents

Publication Publication Date Title
BR112015005740A2 (pt) método para controlar o acesso a dados sendo processados por um recurso de computação remoto, meio legível por computador, e sistema para controlar o acesso a dados sendo processados por um recurso de computação remoto
BR112018016810A2 (pt) método e sistema implementado por computador para criptografia de dados em um dispositivo eletrônico, dispositivo eletrônico e programa de computador
BRPI0711042A8 (pt) Sistema, método para possibilitar um emissor de direitos criar dados de autenticação relacionados à um objeto e/ou criptografar o objeto usando uma chave diversificada e dispositivo
BR112016021120A2 (pt) Método e dispositivo de gerenciamento de dados confidenciais; método e sistema de autenticação segura
BR112017003412A2 (pt) preservação de proteção de dados com política
BR112013028844A2 (pt) método para manejar dados de privacidade
BR112018006327A2 (pt) sistema e método para usar um símbolo como instrução para iniciar a transferência de informação de identidade autenticada a um sistema alvo
BR112015031853A8 (pt) sistema, método e dispositivo de armazenamento legível em computador para concessão de acesso de processo para um recurso de sistema
BR112017005824A2 (pt) método, e, dispositivo móvel.
BR112015007854A2 (pt) sistema e método de execução de uma instância de máquina virtual, sistema servidor de chaves para emitir chaves para uma instância de máquina virtual, imagem de máquina virtual capaz de ter instância formada como uma instância de máquina virtual, e, método de emissão de chaves para uma instância de máquina virtual
BR112014028752A2 (pt) método de configuração de um dispositivo de rede para o compartilhamento de chave, método para um primeiro dispositivo de rede para a determinação de uma chave compartilhada, sistema de configuração de um dispositivo de rede para o compartilhamento de chave, primeiro dispositivo de rede configurado para a determinação de uma chave compartilhada, sendo a chave uma chave criptográfica e programa de computador
BR112017018890A2 (pt) controle de acesso para dados encriptados em identificadores legíveis por máquina
MX361314B (es) Método y dispositivo para lectura de un servicio de mensajes cortos.
BR112015019378A2 (pt) serviço de segurança de dados
GB2545838A (en) Hypervisor and virtual machine protection
BR112017014632A2 (pt) ?método implementado por computador, e, sistema de computador?
NZ701459A (en) Systems and methods for secure processing with embedded cryptographic unit
BR112019000805A2 (pt) sistema e método para gerenciamento de chave de ponta a ponta
BR112015027633A2 (pt) Autenticação de usuário
BR112012022366A2 (pt) método de proteção de informação, mídia legível por computador e computador
BR112018071634A2 (pt) utilização de região isolada de segurança baseada em hardware para impedir pirataria e fraude em dispositivos eletrônicos
BR112015032258A8 (pt) Método implementado por computador para segurança de operações em sistemas de autenticação e autorização utilizando informações biométricas, sistema de comunicação para segurança de operações em sistemas de autenticação e autorização utilizando informações biométricas, e, produto de programa de computador
MX356293B (es) Sistemas y métodos con seguridad de programa de criptografía y resistencia a uso indebido.
CO6491107A2 (es) Metodo para controlar de manera remota y monitorear los datos producidos en un software de escritorio
BR112014010472A2 (pt) método para proporcionar um mecanismo de segurança para um código externo; aparelho; programa de computador incorporado em um meio legível por computador; e servidor de aplicação

Legal Events

Date Code Title Description
B06F Objections, documents and/or translations needed after an examination request according [chapter 6.6 patent gazette]
B06U Preliminary requirement: requests with searches performed by other patent offices: procedure suspended [chapter 6.21 patent gazette]
B08F Application dismissed because of non-payment of annual fees [chapter 8.6 patent gazette]

Free format text: REFERENTE A 8A ANUIDADE.

B08K Patent lapsed as no evidence of payment of the annual fee has been furnished to inpi [chapter 8.11 patent gazette]

Free format text: EM VIRTUDE DO ARQUIVAMENTO PUBLICADO NA RPI 2640 DE 10-08-2021 E CONSIDERANDO AUSENCIA DE MANIFESTACAO DENTRO DOS PRAZOS LEGAIS, INFORMO QUE CABE SER MANTIDO O ARQUIVAMENTO DO PEDIDO DE PATENTE, CONFORME O DISPOSTO NO ARTIGO 12, DA RESOLUCAO 113/2013.