CA3094011A1 - Systemes et procedes d'utilisation d'objets de chiffrement pour proteger des donnees - Google Patents
Systemes et procedes d'utilisation d'objets de chiffrement pour proteger des donneesInfo
- Publication number
- CA3094011A1 CA3094011A1 CA3094011A CA3094011A CA3094011A1 CA 3094011 A1 CA3094011 A1 CA 3094011A1 CA 3094011 A CA3094011 A CA 3094011A CA 3094011 A CA3094011 A CA 3094011A CA 3094011 A1 CA3094011 A1 CA 3094011A1
- Authority
- CA
- Canada
- Prior art keywords
- icto
- data
- access
- participants
- intelligent cipher
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C1/00—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Automation & Control Theory (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Il est décrit des systèmes, des procédés et des dispositifs conçus pour construire et utiliser un objet de transfert à chiffrement intelligent. L'objet de transfert à chiffrement intelligent comprend un ensemble de participants protégés ou participantes protégées par des motifs de masquage. Un ensemble de règles dynamiques portable, qui comprend un code exécutable pour gérer l'accès à l'ensemble protégé de participants ou de participantes, est inclus dans l'objet de transfert à chiffrement intelligent. Pour un utilisateur donné ou une utilisatrice donnée, l'objet de transfert à chiffrement intelligent peut fournir un accès à certains des participants ou à certaines des participantes tout en empêchant l'accès à d'autres participants ou participantes, sur la base de l'ensemble de règles dynamiques portable.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201461980617P | 2014-04-17 | 2014-04-17 | |
US61/980,617 | 2014-04-17 | ||
CA2946141A CA2946141C (fr) | 2014-04-17 | 2015-04-17 | Systemes et procedes d'utilisation d'objets de chiffrement pour proteger des donnees |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2946141A Division CA2946141C (fr) | 2014-04-17 | 2015-04-17 | Systemes et procedes d'utilisation d'objets de chiffrement pour proteger des donnees |
Publications (2)
Publication Number | Publication Date |
---|---|
CA3094011A1 true CA3094011A1 (fr) | 2016-01-07 |
CA3094011C CA3094011C (fr) | 2023-01-24 |
Family
ID=55020076
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA3094011A Active CA3094011C (fr) | 2014-04-17 | 2015-04-17 | Systemes et procedes d'utilisation d'objets de chiffrement pour proteger des donnees |
CA2946141A Active CA2946141C (fr) | 2014-04-17 | 2015-04-17 | Systemes et procedes d'utilisation d'objets de chiffrement pour proteger des donnees |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2946141A Active CA2946141C (fr) | 2014-04-17 | 2015-04-17 | Systemes et procedes d'utilisation d'objets de chiffrement pour proteger des donnees |
Country Status (10)
Country | Link |
---|---|
EP (1) | EP3132565A4 (fr) |
JP (3) | JP6646281B2 (fr) |
KR (3) | KR102333272B1 (fr) |
AU (1) | AU2015284773A1 (fr) |
CA (2) | CA3094011C (fr) |
IL (1) | IL248427B (fr) |
MX (1) | MX2016013622A (fr) |
RU (1) | RU2016144756A (fr) |
SG (1) | SG11201608679RA (fr) |
WO (1) | WO2016003527A2 (fr) |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3788201B2 (ja) * | 2000-06-07 | 2006-06-21 | 日本電信電話株式会社 | 情報カプセル管理方法及び情報カプセル管理プログラムを格納した記憶媒体 |
JP2002353953A (ja) * | 2001-05-24 | 2002-12-06 | Nippon Telegr & Teleph Corp <Ntt> | 利用形態制御機能を持つコンテンツ提供システム,コンテンツ利用形態制御方法,提供者装置用プログラム,利用者装置用プログラム,提供者装置用プログラムの記録媒体,利用者装置用プログラムの記録媒体およびコンテンツの部分販売システム |
US7380120B1 (en) * | 2001-12-12 | 2008-05-27 | Guardian Data Storage, Llc | Secured data format for access control |
US7515717B2 (en) * | 2003-07-31 | 2009-04-07 | International Business Machines Corporation | Security containers for document components |
JP2006099698A (ja) * | 2004-09-30 | 2006-04-13 | Toshiba Corp | 配信情報再生装置、プログラム及び方法 |
JP2009252120A (ja) * | 2008-04-09 | 2009-10-29 | Nec System Technologies Ltd | プログラム課金管理装置及びカプセル実行処理装置 |
GB2467580B (en) * | 2009-02-06 | 2013-06-12 | Thales Holdings Uk Plc | System and method for multilevel secure object management |
AU2012347452A1 (en) | 2011-12-09 | 2014-06-26 | Echarge2 Corporation | Systems and methods for using cipher objects to protect data |
-
2015
- 2015-04-17 CA CA3094011A patent/CA3094011C/fr active Active
- 2015-04-17 SG SG11201608679RA patent/SG11201608679RA/en unknown
- 2015-04-17 CA CA2946141A patent/CA2946141C/fr active Active
- 2015-04-17 MX MX2016013622A patent/MX2016013622A/es unknown
- 2015-04-17 EP EP15814143.2A patent/EP3132565A4/fr not_active Ceased
- 2015-04-17 KR KR1020217000496A patent/KR102333272B1/ko active IP Right Grant
- 2015-04-17 KR KR1020167032120A patent/KR102161975B1/ko active IP Right Grant
- 2015-04-17 KR KR1020207027532A patent/KR102202775B1/ko active Application Filing
- 2015-04-17 AU AU2015284773A patent/AU2015284773A1/en not_active Abandoned
- 2015-04-17 JP JP2016563135A patent/JP6646281B2/ja active Active
- 2015-04-17 RU RU2016144756A patent/RU2016144756A/ru not_active Application Discontinuation
- 2015-04-17 WO PCT/US2015/026405 patent/WO2016003527A2/fr active Application Filing
-
2016
- 2016-10-20 IL IL248427A patent/IL248427B/en active IP Right Grant
-
2019
- 2019-12-25 JP JP2019234053A patent/JP6741852B2/ja active Active
-
2020
- 2020-07-27 JP JP2020126695A patent/JP6982142B2/ja active Active
Also Published As
Publication number | Publication date |
---|---|
KR102333272B1 (ko) | 2021-12-02 |
KR102161975B1 (ko) | 2020-10-07 |
RU2016144756A (ru) | 2018-05-21 |
WO2016003527A3 (fr) | 2016-04-07 |
CA2946141A1 (fr) | 2016-01-07 |
KR20170037881A (ko) | 2017-04-05 |
KR102202775B1 (ko) | 2021-01-14 |
JP2020184374A (ja) | 2020-11-12 |
MX2016013622A (es) | 2017-06-23 |
NZ763404A (en) | 2021-06-25 |
JP6646281B2 (ja) | 2020-02-14 |
SG11201608679RA (en) | 2016-11-29 |
KR20200113035A (ko) | 2020-10-05 |
EP3132565A4 (fr) | 2017-12-20 |
EP3132565A2 (fr) | 2017-02-22 |
RU2016144756A3 (fr) | 2018-11-07 |
CA3094011C (fr) | 2023-01-24 |
JP6982142B2 (ja) | 2021-12-17 |
IL248427B (en) | 2018-11-29 |
AU2015284773A1 (en) | 2016-11-24 |
JP2020064655A (ja) | 2020-04-23 |
CA2946141C (fr) | 2020-11-17 |
JP2017514229A (ja) | 2017-06-01 |
KR20210006021A (ko) | 2021-01-15 |
BR112016024193A2 (pt) | 2017-10-10 |
JP6741852B2 (ja) | 2020-08-19 |
WO2016003527A2 (fr) | 2016-01-07 |
NZ726067A (en) | 2021-04-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12008117B2 (en) | System and methods for using cipher objects to protect data | |
JP6542962B2 (ja) | 遅延データアクセス | |
US20130152160A1 (en) | Systems and methods for using cipher objects to protect data | |
US20220004649A1 (en) | System and methods for using cipher objects to protect data | |
US20240241972A1 (en) | System and methods for using cipher objects to protect data | |
JP6741852B2 (ja) | 暗号オブジェクトを使用してデータを保護するためのシステムおよび方法 | |
NZ763404B2 (en) | System and methods for using cipher objects to protect data | |
Kamble | Data Sharing and Privacy Preserving Access Policy of Cloud Computing Using Security Dhanashri Kamble, Rajni Patel, and Prajakta Deshmukh | |
NZ726067B2 (en) | System and methods for using cipher objects to protect data | |
Арустамов et al. | Профессиональный иностранный язык для специалистов в области компьютерной безопасности: учебное пособие | |
Kamble et al. | Data Sharing and Privacy Preserving Access Policy of Cloud Computing Using Security | |
BR112016024193B1 (pt) | Sistema e métodos para utilizar objetos de cifra para proteger dados | |
Sundareswaran et al. | Distributed Java-Based Content Protection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request |
Effective date: 20200923 |
|
EEER | Examination request |
Effective date: 20200923 |
|
EEER | Examination request |
Effective date: 20200923 |
|
EEER | Examination request |
Effective date: 20200923 |
|
EEER | Examination request |
Effective date: 20200923 |