CN110771190A - 对数据的控制访问 - Google Patents

对数据的控制访问 Download PDF

Info

Publication number
CN110771190A
CN110771190A CN201880041039.4A CN201880041039A CN110771190A CN 110771190 A CN110771190 A CN 110771190A CN 201880041039 A CN201880041039 A CN 201880041039A CN 110771190 A CN110771190 A CN 110771190A
Authority
CN
China
Prior art keywords
data
key
electronic
encryption
cryptographic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201880041039.4A
Other languages
English (en)
Chinese (zh)
Inventor
约翰·斯图尔特·肖伊-泰勒
古鲁·巴拉恩·钱德拉塞卡兰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SCENTRICS INFORMATION SECURITY TECHNOLOGIES Ltd
Original Assignee
SCENTRICS INFORMATION SECURITY TECHNOLOGIES Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SCENTRICS INFORMATION SECURITY TECHNOLOGIES Ltd filed Critical SCENTRICS INFORMATION SECURITY TECHNOLOGIES Ltd
Publication of CN110771190A publication Critical patent/CN110771190A/zh
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/214Monitoring or handling of messages using selective forwarding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0251Targeted advertisements
    • G06Q30/0269Targeted advertisements based on user profile or attribute
    • G06Q30/0271Personalized advertisement
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0277Online advertisement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/52User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/53Network services using third party service providers

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
CN201880041039.4A 2017-06-22 2018-06-21 对数据的控制访问 Pending CN110771190A (zh)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
GB1710013.2 2017-06-22
GBGB1710013.2A GB201710013D0 (en) 2017-06-22 2017-06-22 Control Access to data
PCT/GB2018/051735 WO2018234813A1 (en) 2017-06-22 2018-06-21 Controlling access to data

Publications (1)

Publication Number Publication Date
CN110771190A true CN110771190A (zh) 2020-02-07

Family

ID=59523624

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201880041039.4A Pending CN110771190A (zh) 2017-06-22 2018-06-21 对数据的控制访问

Country Status (7)

Country Link
US (1) US20200145389A1 (enExample)
EP (1) EP3643097A1 (enExample)
JP (1) JP2020524864A (enExample)
CN (1) CN110771190A (enExample)
CA (1) CA3066701A1 (enExample)
GB (1) GB201710013D0 (enExample)
WO (1) WO2018234813A1 (enExample)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112434315A (zh) * 2020-11-20 2021-03-02 湖南快乐阳光互动娱乐传媒有限公司 一种附件访问方法、服务器和访问端
CN113010914A (zh) * 2021-03-05 2021-06-22 华洋通信科技股份有限公司 一种面向浏览器Cookie的分布式隐私保护方法

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11070357B2 (en) * 2019-10-17 2021-07-20 Raytheon Company Techniques for privacy-preserving data processing across multiple computing nodes
CN112350922A (zh) * 2020-10-16 2021-02-09 卓尔智联(武汉)研究院有限公司 一种邮件处理的方法、装置、服务器及存储介质
US12001348B2 (en) * 2021-03-22 2024-06-04 Advaneo Gmbh System, a server and a method for securely storing and processing raw data from a plurality of different data sources
KR20230144611A (ko) * 2021-04-06 2023-10-16 구글 엘엘씨 보안 암호화 코프로세서
CN116186722A (zh) * 2021-11-29 2023-05-30 青岛海尔科技有限公司 家电数据加密方法及装置
US12149633B2 (en) * 2022-04-01 2024-11-19 Google Llc Enhancing domain keys identified mail (DKIM) signatures
US12170641B2 (en) * 2022-05-10 2024-12-17 At&T Intellectual Property I, L.P. Detection and notification of electronic influence
US11977657B1 (en) * 2023-02-22 2024-05-07 Lorica Cybersecurity Inc. Method and system for confidential repository searching and retrieval
CN116389115A (zh) * 2023-04-04 2023-07-04 中国民航信息网络股份有限公司 一种数据加密解密方法、系统及电子设备

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040151323A1 (en) * 2000-04-25 2004-08-05 Secure Data In Motion, Inc. Implementing nonrepudiation and audit using authentication assertions and key servers
CN101039177A (zh) * 2007-04-27 2007-09-19 珠海金山软件股份有限公司 一种在线查毒的装置和方法
JP2007323336A (ja) * 2006-05-31 2007-12-13 Navitime Japan Co Ltd 広告配信システムおよび広告配信サーバならびに端末装置および広告配信方法
EP2015553A1 (en) * 2007-07-10 2009-01-14 Hewlett-Packard Development Company, L.P. Reverse billing of messages delivered to a mobile device
US20130073854A1 (en) * 2011-09-21 2013-03-21 Onyx Privacy, Inc. Data storage incorporating crytpographically enhanced data protection
US8601263B1 (en) * 2010-05-18 2013-12-03 Google Inc. Storing encrypted objects
CN103457733A (zh) * 2013-08-15 2013-12-18 中电长城网际系统应用有限公司 一种云计算环境数据共享方法和系统
CN105678189A (zh) * 2016-01-15 2016-06-15 上海海事大学 加密数据文件存储和检索系统及方法

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7277549B2 (en) * 2000-04-25 2007-10-02 Secure Data In Motion, Inc. System for implementing business processes using key server events
JP4682615B2 (ja) * 2004-12-22 2011-05-11 富士ゼロックス株式会社 ネットワークシステム及び情報処理装置
EP2808803B1 (en) * 2012-01-25 2017-03-01 Mitsubishi Electric Corporation Data search device, data search method, data search program, data registration device, data registration method, data registration program and information processing device
JP2014002599A (ja) * 2012-06-19 2014-01-09 Atom System:Kk 情報配信システム、端末装置、情報配信方法及びプログラム
US20140188626A1 (en) * 2012-12-29 2014-07-03 Nokia Corporation Method and apparatus for secure advertising
US20140372216A1 (en) * 2013-06-13 2014-12-18 Microsoft Corporation Contextual mobile application advertisements
US9338147B1 (en) * 2015-04-24 2016-05-10 Extrahop Networks, Inc. Secure communication secret sharing
US9830480B2 (en) * 2015-05-27 2017-11-28 Google Llc Policies for secrets in trusted execution environments
US9954684B2 (en) * 2016-02-29 2018-04-24 PreVeil LLC Secure sharing

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040151323A1 (en) * 2000-04-25 2004-08-05 Secure Data In Motion, Inc. Implementing nonrepudiation and audit using authentication assertions and key servers
US7376835B2 (en) * 2000-04-25 2008-05-20 Secure Data In Motion, Inc. Implementing nonrepudiation and audit using authentication assertions and key servers
JP2007323336A (ja) * 2006-05-31 2007-12-13 Navitime Japan Co Ltd 広告配信システムおよび広告配信サーバならびに端末装置および広告配信方法
CN101039177A (zh) * 2007-04-27 2007-09-19 珠海金山软件股份有限公司 一种在线查毒的装置和方法
EP2015553A1 (en) * 2007-07-10 2009-01-14 Hewlett-Packard Development Company, L.P. Reverse billing of messages delivered to a mobile device
US8601263B1 (en) * 2010-05-18 2013-12-03 Google Inc. Storing encrypted objects
US20130073854A1 (en) * 2011-09-21 2013-03-21 Onyx Privacy, Inc. Data storage incorporating crytpographically enhanced data protection
CN103457733A (zh) * 2013-08-15 2013-12-18 中电长城网际系统应用有限公司 一种云计算环境数据共享方法和系统
CN105678189A (zh) * 2016-01-15 2016-06-15 上海海事大学 加密数据文件存储和检索系统及方法

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112434315A (zh) * 2020-11-20 2021-03-02 湖南快乐阳光互动娱乐传媒有限公司 一种附件访问方法、服务器和访问端
CN113010914A (zh) * 2021-03-05 2021-06-22 华洋通信科技股份有限公司 一种面向浏览器Cookie的分布式隐私保护方法

Also Published As

Publication number Publication date
EP3643097A1 (en) 2020-04-29
GB201710013D0 (en) 2017-08-09
JP2020524864A (ja) 2020-08-20
US20200145389A1 (en) 2020-05-07
CA3066701A1 (en) 2018-12-27
WO2018234813A1 (en) 2018-12-27

Similar Documents

Publication Publication Date Title
US12212606B1 (en) Trusted-code generated requests
JP6941146B2 (ja) データセキュリティサービス
AU2019203153B9 (en) Key export techniques
US10382200B2 (en) Probabilistic key rotation
CN110771190A (zh) 对数据的控制访问
US12041166B2 (en) Protecting data using controlled corruption in computer networks
US10666684B2 (en) Security policies with probabilistic actions
US20140281520A1 (en) Secure cloud data sharing
CN118400098B (zh) 一种基于随机数加密密钥的私钥安全管理方法及系统
Vrana Cyber security and data ownership
Ko et al. Trends in Mobile Ransomware and Incident Response from a Digital Forensics Perspective.
US11972000B2 (en) Information dispersal for secure data storage
Mbae et al. Secure Cloud Based Approach for Mobile Devices User Data
US12500872B1 (en) Secure controlled communications
Arvin S. Lat et al. SOUL System: secure online USB login system
US12477332B2 (en) Systems and methods for verifying candidate communications
Gagged et al. Improved secure dynamic bit standard technique for a private cloud platform to address security challenges
TWI683231B (zh) 機敏資料分散式儲存系統及其方法
Le et al. BL0K-ME Protocol: A Zero-Knowledge Proof Approach For Message Authentication In E2EE Conversations
WO2024157087A1 (en) Systems and methods for managing and protecting data in computing networks
CN112801672A (zh) 基于群签名的农产品溯源二维码签名方法
Mauth et al. Data Privacy Issues in Distributed Security Monitoring Systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20200207