CA2969740C - Data security operations with expectations - Google Patents

Data security operations with expectations Download PDF

Info

Publication number
CA2969740C
CA2969740C CA2969740A CA2969740A CA2969740C CA 2969740 C CA2969740 C CA 2969740C CA 2969740 A CA2969740 A CA 2969740A CA 2969740 A CA2969740 A CA 2969740A CA 2969740 C CA2969740 C CA 2969740C
Authority
CA
Canada
Prior art keywords
request
cryptographic
conditions
cryptographic key
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CA2969740A
Other languages
English (en)
French (fr)
Other versions
CA2969740A1 (en
Inventor
Gregory Alan Rubin
Gregory Branchek ROTH
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Amazon Technologies Inc
Original Assignee
Amazon Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Amazon Technologies Inc filed Critical Amazon Technologies Inc
Publication of CA2969740A1 publication Critical patent/CA2969740A1/en
Application granted granted Critical
Publication of CA2969740C publication Critical patent/CA2969740C/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)
CA2969740A 2014-12-17 2015-12-14 Data security operations with expectations Active CA2969740C (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US14/574,337 US10560441B2 (en) 2014-12-17 2014-12-17 Data security operations with expectations
US14/574,337 2014-12-17
PCT/US2015/065638 WO2016126332A2 (en) 2014-12-17 2015-12-14 Data security operations with expectations

Publications (2)

Publication Number Publication Date
CA2969740A1 CA2969740A1 (en) 2016-08-11
CA2969740C true CA2969740C (en) 2020-12-22

Family

ID=56130836

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2969740A Active CA2969740C (en) 2014-12-17 2015-12-14 Data security operations with expectations

Country Status (9)

Country Link
US (1) US10560441B2 (enExample)
EP (2) EP3700166A1 (enExample)
JP (2) JP6851970B2 (enExample)
KR (1) KR102037160B1 (enExample)
CN (1) CN107005568B (enExample)
AU (2) AU2015381756A1 (enExample)
CA (1) CA2969740C (enExample)
SG (1) SG11201704602QA (enExample)
WO (1) WO2016126332A2 (enExample)

Families Citing this family (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10630686B2 (en) 2015-03-12 2020-04-21 Fornetix Llc Systems and methods for organizing devices in a policy hierarchy
US10965459B2 (en) 2015-03-13 2021-03-30 Fornetix Llc Server-client key escrow for applied key management system and process
US11063980B2 (en) * 2016-02-26 2021-07-13 Fornetix Llc System and method for associating encryption key management policy with device activity
US10860086B2 (en) * 2016-02-26 2020-12-08 Fornetix Llc Policy-enabled encryption keys having complex logical operations
US10068397B2 (en) * 2016-04-06 2018-09-04 Guardtime IP Holdings, Ltd. System and method for access control using context-based proof
JP6780462B2 (ja) * 2016-11-14 2020-11-04 大日本印刷株式会社 電子情報記憶媒体、セキュア処理実行方法、及びセキュア処理実行プログラム
US10243731B2 (en) * 2017-01-27 2019-03-26 Accenture Global Solutions Limited Hardware blockchain acceleration
US20180268172A1 (en) * 2017-03-14 2018-09-20 Massachusetts Institute Of Technology Electronic device authentication system
US10484352B2 (en) 2017-03-31 2019-11-19 Microsoft Technology Licensing, Llc Data operations using a proxy encryption key
US10565391B2 (en) * 2017-06-02 2020-02-18 Microsoft Technology Licensing, Llc Expression evaluation of database statements for restricted data
WO2018236420A1 (en) 2017-06-20 2018-12-27 Google Llc Cloud hardware security modules for outsourcing cryptographic operations
CN110870278B (zh) * 2017-06-29 2021-07-16 亚马逊技术有限公司 用于安全策略监视服务的方法和系统以及存储介质
US10574702B1 (en) * 2018-01-03 2020-02-25 Amazon Technologies, Inc. Authorization for build configuration using telemetry data assessment
CN109687959B (zh) * 2018-12-29 2021-11-12 上海唯链信息科技有限公司 密钥安全管理系统和方法、介质和计算机程序
CN110442326B (zh) * 2019-08-11 2023-07-14 西藏宁算科技集团有限公司 一种基于Vue简化前后端分离权限控制的方法及其系统
US11190353B2 (en) * 2020-03-26 2021-11-30 Atlassian Pty Ltd. Computer implemented methods and systems for managing a cryptographic service
JP7511201B2 (ja) * 2020-06-23 2024-07-05 株式会社大一商会 遊技機
US12335318B1 (en) * 2020-12-04 2025-06-17 Amazon Technologies, Inc. Detecting conflicts between a generated access management policy and invoked access management policies
US11750397B2 (en) * 2021-01-04 2023-09-05 International Business Machines Corporation Attribute-based encryption keys as key material for key-hash message authentication code user authentication and authorization
US11575508B2 (en) * 2021-06-02 2023-02-07 International Business Machines Corporation Unified HSM and key management service
US12034844B1 (en) * 2021-12-06 2024-07-09 Amazon Technologies, Inc. Techniques for performing compound operations on security modules
US12242618B2 (en) * 2021-12-20 2025-03-04 Salesforce, Inc. Multi-tenant cryptography implementation compliance
CN117097564B (zh) * 2023-10-18 2024-02-02 沃通电子认证服务有限公司 密码服务调用方法、装置、终端设备以及存储介质

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2638525B2 (ja) 1994-08-03 1997-08-06 日本電気株式会社 電子署名検証装置
JP2003224563A (ja) 2002-01-29 2003-08-08 Nippon Telegr & Teleph Corp <Ntt> 署名検証システムおよび方法と署名検証プログラムおよび該プログラムを記録したコンピュータ読取り可能な記録媒体
JP4062206B2 (ja) 2003-08-01 2008-03-19 日本電気株式会社 署名復号サービスシステム及びプログラム
US8645697B1 (en) 2003-08-08 2014-02-04 Radix Holdings, Llc Message authorization
US7266847B2 (en) 2003-09-25 2007-09-04 Voltage Security, Inc. Secure message system with remote decryption service
GB201104094D0 (en) 2011-03-10 2011-04-27 Amethyst Cryptographic Services Ltd A cryptographic system and method
US8713314B2 (en) 2011-08-30 2014-04-29 Comcast Cable Communications, Llc Reoccuring keying system
US9436961B2 (en) * 2012-04-26 2016-09-06 Ribbon Payments, Inc. System and method for selling a product through an adaptable purchase interface
US9590959B2 (en) 2013-02-12 2017-03-07 Amazon Technologies, Inc. Data security service
US9268931B2 (en) * 2012-06-12 2016-02-23 Microsoft Technology Licensing, Llc Gate keeper cookie
DE102012012252C5 (de) 2012-06-22 2025-03-27 Krohne Ag System zur Durchflussmessung
US8713633B2 (en) * 2012-07-13 2014-04-29 Sophos Limited Security access protection for user data stored in a cloud computing facility
US9350536B2 (en) 2012-08-16 2016-05-24 Digicert, Inc. Cloud key management system
US9134156B2 (en) 2012-10-19 2015-09-15 Daniel Measurement And Control, Inc. Determination of reference values for ultrasonic flow metering systems
CA2903807C (en) 2013-03-04 2019-09-03 Docusign, Inc. Systems and methods for cloud data security
US9071429B1 (en) * 2013-04-29 2015-06-30 Amazon Technologies, Inc. Revocable shredding of security credentials
CN104242933B (zh) 2013-08-22 2018-03-23 西安电子科技大学 高速模数转换器的数字后台校准方法
US9571279B2 (en) * 2014-06-05 2017-02-14 Cavium, Inc. Systems and methods for secured backup of hardware security modules for cloud-based web services
US10491398B2 (en) * 2014-09-12 2019-11-26 Salesforce.Com, Inc. Facilitating dynamic end-to-end integrity for data repositories in an on-demand services environment

Also Published As

Publication number Publication date
JP2018504806A (ja) 2018-02-15
EP3700166A1 (en) 2020-08-26
CN107005568A (zh) 2017-08-01
JP2020108156A (ja) 2020-07-09
AU2019200419A1 (en) 2019-02-07
US20160182470A1 (en) 2016-06-23
EP3235223A2 (en) 2017-10-25
AU2015381756A1 (en) 2017-06-29
US10560441B2 (en) 2020-02-11
WO2016126332A3 (en) 2016-10-27
JP6851970B2 (ja) 2021-03-31
WO2016126332A2 (en) 2016-08-11
CA2969740A1 (en) 2016-08-11
CN107005568B (zh) 2021-01-05
SG11201704602QA (en) 2017-07-28
KR20170092642A (ko) 2017-08-11
KR102037160B1 (ko) 2019-10-29
AU2019200419B2 (en) 2020-12-24

Similar Documents

Publication Publication Date Title
AU2019200419B2 (en) Data security operations with expectations
US11870816B1 (en) Trusted-code generated requests
US12003637B1 (en) Secure initialization vector generation
US10567394B2 (en) Data integrity verification
US9584517B1 (en) Transforms within secure execution environments
US11184155B2 (en) Cryptographic key management for imported cryptographic keys
US10721075B2 (en) Web of trust management in a distributed system
JP2018504806A5 (enExample)
US9596263B1 (en) Obfuscation and de-obfuscation of identifiers
US9699219B2 (en) Access control using impersonization
CA3147153A1 (en) Key export techniques
US11146379B1 (en) Credential chaining for shared compute environments
US11115223B2 (en) Cryptographic material distribution and management
US10924286B2 (en) Signing key log management

Legal Events

Date Code Title Description
EEER Examination request

Effective date: 20170602