CN107005568B - 数据安全操作与预期 - Google Patents

数据安全操作与预期 Download PDF

Info

Publication number
CN107005568B
CN107005568B CN201580067659.1A CN201580067659A CN107005568B CN 107005568 B CN107005568 B CN 107005568B CN 201580067659 A CN201580067659 A CN 201580067659A CN 107005568 B CN107005568 B CN 107005568B
Authority
CN
China
Prior art keywords
request
encryption
security
encryption key
conditions
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201580067659.1A
Other languages
English (en)
Chinese (zh)
Other versions
CN107005568A (zh
Inventor
格里戈里·阿兰·鲁宾
格里戈里·布兰奇克·罗特
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Amazon Technologies Inc
Original Assignee
Amazon Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Amazon Technologies Inc filed Critical Amazon Technologies Inc
Publication of CN107005568A publication Critical patent/CN107005568A/zh
Application granted granted Critical
Publication of CN107005568B publication Critical patent/CN107005568B/zh
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)
CN201580067659.1A 2014-12-17 2015-12-14 数据安全操作与预期 Active CN107005568B (zh)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US14/574,337 2014-12-17
US14/574,337 US10560441B2 (en) 2014-12-17 2014-12-17 Data security operations with expectations
PCT/US2015/065638 WO2016126332A2 (en) 2014-12-17 2015-12-14 Data security operations with expectations

Publications (2)

Publication Number Publication Date
CN107005568A CN107005568A (zh) 2017-08-01
CN107005568B true CN107005568B (zh) 2021-01-05

Family

ID=56130836

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201580067659.1A Active CN107005568B (zh) 2014-12-17 2015-12-14 数据安全操作与预期

Country Status (9)

Country Link
US (1) US10560441B2 (enExample)
EP (2) EP3700166A1 (enExample)
JP (2) JP6851970B2 (enExample)
KR (1) KR102037160B1 (enExample)
CN (1) CN107005568B (enExample)
AU (2) AU2015381756A1 (enExample)
CA (1) CA2969740C (enExample)
SG (1) SG11201704602QA (enExample)
WO (1) WO2016126332A2 (enExample)

Families Citing this family (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10630686B2 (en) 2015-03-12 2020-04-21 Fornetix Llc Systems and methods for organizing devices in a policy hierarchy
US10965459B2 (en) 2015-03-13 2021-03-30 Fornetix Llc Server-client key escrow for applied key management system and process
US10860086B2 (en) * 2016-02-26 2020-12-08 Fornetix Llc Policy-enabled encryption keys having complex logical operations
US11063980B2 (en) * 2016-02-26 2021-07-13 Fornetix Llc System and method for associating encryption key management policy with device activity
US10068397B2 (en) * 2016-04-06 2018-09-04 Guardtime IP Holdings, Ltd. System and method for access control using context-based proof
JP6780462B2 (ja) * 2016-11-14 2020-11-04 大日本印刷株式会社 電子情報記憶媒体、セキュア処理実行方法、及びセキュア処理実行プログラム
US10243731B2 (en) 2017-01-27 2019-03-26 Accenture Global Solutions Limited Hardware blockchain acceleration
US20180268172A1 (en) * 2017-03-14 2018-09-20 Massachusetts Institute Of Technology Electronic device authentication system
US10484352B2 (en) 2017-03-31 2019-11-19 Microsoft Technology Licensing, Llc Data operations using a proxy encryption key
US10565391B2 (en) 2017-06-02 2020-02-18 Microsoft Technology Licensing, Llc Expression evaluation of database statements for restricted data
WO2018236420A1 (en) 2017-06-20 2018-12-27 Google Llc Cloud hardware security modules for outsourcing cryptographic operations
WO2019005512A1 (en) * 2017-06-29 2019-01-03 Amazon Technologies, Inc. SECURITY POLICY MONITORING SERVICE
US10574702B1 (en) * 2018-01-03 2020-02-25 Amazon Technologies, Inc. Authorization for build configuration using telemetry data assessment
CN109687959B (zh) * 2018-12-29 2021-11-12 上海唯链信息科技有限公司 密钥安全管理系统和方法、介质和计算机程序
CN110442326B (zh) * 2019-08-11 2023-07-14 西藏宁算科技集团有限公司 一种基于Vue简化前后端分离权限控制的方法及其系统
US11190353B2 (en) * 2020-03-26 2021-11-30 Atlassian Pty Ltd. Computer implemented methods and systems for managing a cryptographic service
JP7511201B2 (ja) * 2020-06-23 2024-07-05 株式会社大一商会 遊技機
US12335318B1 (en) * 2020-12-04 2025-06-17 Amazon Technologies, Inc. Detecting conflicts between a generated access management policy and invoked access management policies
US11750397B2 (en) * 2021-01-04 2023-09-05 International Business Machines Corporation Attribute-based encryption keys as key material for key-hash message authentication code user authentication and authorization
US11575508B2 (en) * 2021-06-02 2023-02-07 International Business Machines Corporation Unified HSM and key management service
US12034844B1 (en) * 2021-12-06 2024-07-09 Amazon Technologies, Inc. Techniques for performing compound operations on security modules
US12242618B2 (en) * 2021-12-20 2025-03-04 Salesforce, Inc. Multi-tenant cryptography implementation compliance
CN117097564B (zh) * 2023-10-18 2024-02-02 沃通电子认证服务有限公司 密码服务调用方法、装置、终端设备以及存储介质

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2638525B2 (ja) 1994-08-03 1997-08-06 日本電気株式会社 電子署名検証装置
JP2003224563A (ja) 2002-01-29 2003-08-08 Nippon Telegr & Teleph Corp <Ntt> 署名検証システムおよび方法と署名検証プログラムおよび該プログラムを記録したコンピュータ読取り可能な記録媒体
JP4062206B2 (ja) 2003-08-01 2008-03-19 日本電気株式会社 署名復号サービスシステム及びプログラム
US8645697B1 (en) 2003-08-08 2014-02-04 Radix Holdings, Llc Message authorization
US7266847B2 (en) 2003-09-25 2007-09-04 Voltage Security, Inc. Secure message system with remote decryption service
GB201104094D0 (en) 2011-03-10 2011-04-27 Amethyst Cryptographic Services Ltd A cryptographic system and method
US8713314B2 (en) 2011-08-30 2014-04-29 Comcast Cable Communications, Llc Reoccuring keying system
US9436961B2 (en) * 2012-04-26 2016-09-06 Ribbon Payments, Inc. System and method for selling a product through an adaptable purchase interface
US9590959B2 (en) 2013-02-12 2017-03-07 Amazon Technologies, Inc. Data security service
US9268931B2 (en) * 2012-06-12 2016-02-23 Microsoft Technology Licensing, Llc Gate keeper cookie
DE102012012252C5 (de) 2012-06-22 2025-03-27 Krohne Ag System zur Durchflussmessung
US8713633B2 (en) * 2012-07-13 2014-04-29 Sophos Limited Security access protection for user data stored in a cloud computing facility
US9350536B2 (en) 2012-08-16 2016-05-24 Digicert, Inc. Cloud key management system
US9134156B2 (en) 2012-10-19 2015-09-15 Daniel Measurement And Control, Inc. Determination of reference values for ultrasonic flow metering systems
WO2014138120A1 (en) 2013-03-04 2014-09-12 Docusign, Inc. Systems and methods for cloud data security
US9071429B1 (en) * 2013-04-29 2015-06-30 Amazon Technologies, Inc. Revocable shredding of security credentials
CN104242933B (zh) 2013-08-22 2018-03-23 西安电子科技大学 高速模数转换器的数字后台校准方法
US9571279B2 (en) * 2014-06-05 2017-02-14 Cavium, Inc. Systems and methods for secured backup of hardware security modules for cloud-based web services
US10491398B2 (en) * 2014-09-12 2019-11-26 Salesforce.Com, Inc. Facilitating dynamic end-to-end integrity for data repositories in an on-demand services environment

Also Published As

Publication number Publication date
AU2019200419B2 (en) 2020-12-24
JP2018504806A (ja) 2018-02-15
JP2020108156A (ja) 2020-07-09
AU2015381756A1 (en) 2017-06-29
AU2019200419A1 (en) 2019-02-07
WO2016126332A3 (en) 2016-10-27
EP3235223A2 (en) 2017-10-25
EP3700166A1 (en) 2020-08-26
JP6851970B2 (ja) 2021-03-31
US20160182470A1 (en) 2016-06-23
KR102037160B1 (ko) 2019-10-29
CA2969740C (en) 2020-12-22
WO2016126332A2 (en) 2016-08-11
CA2969740A1 (en) 2016-08-11
SG11201704602QA (en) 2017-07-28
KR20170092642A (ko) 2017-08-11
CN107005568A (zh) 2017-08-01
US10560441B2 (en) 2020-02-11

Similar Documents

Publication Publication Date Title
CN107005568B (zh) 数据安全操作与预期
US11870816B1 (en) Trusted-code generated requests
AU2017204853B2 (en) Data security service
US10944561B1 (en) Policy implementation using security tokens
JP2018504806A5 (enExample)
US11431757B2 (en) Access control using impersonization
US11700121B2 (en) Secure authorization for sensitive information
US20140229732A1 (en) Data security service
US10958653B1 (en) Dynamically adaptive computer security permissions
US11146379B1 (en) Credential chaining for shared compute environments

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant