ES2716902T3 - Métodos y sistemas para borrar información solicitada - Google Patents

Métodos y sistemas para borrar información solicitada Download PDF

Info

Publication number
ES2716902T3
ES2716902T3 ES15705151T ES15705151T ES2716902T3 ES 2716902 T3 ES2716902 T3 ES 2716902T3 ES 15705151 T ES15705151 T ES 15705151T ES 15705151 T ES15705151 T ES 15705151T ES 2716902 T3 ES2716902 T3 ES 2716902T3
Authority
ES
Spain
Prior art keywords
entry
key
annotation
record
key table
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
ES15705151T
Other languages
English (en)
Spanish (es)
Inventor
Joanne Syben
Matthew Thomas Harren
Algis Pranas Rudys
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Google LLC
Original Assignee
Google LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Google LLC filed Critical Google LLC
Application granted granted Critical
Publication of ES2716902T3 publication Critical patent/ES2716902T3/es
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1471Saving, restoring, recovering or retrying involving logging of persistent data for recovery
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/11File system administration, e.g. details of archiving or snapshots
    • G06F16/122File system administration, e.g. details of archiving or snapshots using management policies
    • G06F16/125File system administration, e.g. details of archiving or snapshots using management policies characterised by the use of retention policies
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2228Indexing structures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2457Query processing with adaptation to user needs
    • G06F16/24575Query processing with adaptation to user needs using context
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • G06F2201/84Using snapshots, i.e. a logical point-in-time copy of the data
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Quality & Reliability (AREA)
  • Computational Linguistics (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Debugging And Monitoring (AREA)
ES15705151T 2014-02-06 2015-01-29 Métodos y sistemas para borrar información solicitada Active ES2716902T3 (es)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US14/173,931 US9189641B2 (en) 2014-02-06 2014-02-06 Methods and systems for deleting requested information
PCT/US2015/013413 WO2015119824A1 (en) 2014-02-06 2015-01-29 Methods and systems for deleting requested information

Publications (1)

Publication Number Publication Date
ES2716902T3 true ES2716902T3 (es) 2019-06-17

Family

ID=52478086

Family Applications (1)

Application Number Title Priority Date Filing Date
ES15705151T Active ES2716902T3 (es) 2014-02-06 2015-01-29 Métodos y sistemas para borrar información solicitada

Country Status (8)

Country Link
US (2) US9189641B2 (enExample)
EP (1) EP3103052B1 (enExample)
JP (1) JP6101874B2 (enExample)
KR (1) KR101757844B1 (enExample)
CN (1) CN105940412B (enExample)
BR (1) BR112016018070B1 (enExample)
ES (1) ES2716902T3 (enExample)
WO (1) WO2015119824A1 (enExample)

Families Citing this family (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10516567B2 (en) 2015-07-10 2019-12-24 Zerofox, Inc. Identification of vulnerability to social phishing
US10061717B1 (en) * 2016-03-25 2018-08-28 EMC IP Holding Company LLC Storing multiple encryption keys to protect data at rest
CN107943807B (zh) * 2016-10-13 2020-06-16 华为技术有限公司 一种数据处理方法及存储设备
JP6869004B2 (ja) * 2016-10-26 2021-05-12 株式会社野村総合研究所 文書管理装置および文書管理方法
CN108228322B (zh) * 2016-12-12 2022-03-25 阿里巴巴集团控股有限公司 一种分布式链路跟踪、分析方法及服务器、全局调度器
US11256812B2 (en) 2017-01-31 2022-02-22 Zerofox, Inc. End user social network protection portal
US10789097B2 (en) 2017-02-16 2020-09-29 Nasdaq Technology Ab Methods and systems of scheduling computer processes or tasks in a distributed system
US10776428B2 (en) 2017-02-16 2020-09-15 Nasdaq Technology Ab Systems and methods of retrospectively determining how submitted data transaction requests operate against a dynamic data structure
US11394722B2 (en) 2017-04-04 2022-07-19 Zerofox, Inc. Social media rule engine
WO2018233820A1 (en) 2017-06-21 2018-12-27 Huawei Technologies Co., Ltd. Systems and methods for management of a log-structure
US10868824B2 (en) 2017-07-31 2020-12-15 Zerofox, Inc. Organizational social threat reporting
US11165801B2 (en) 2017-08-15 2021-11-02 Zerofox, Inc. Social threat correlation
US11418527B2 (en) * 2017-08-22 2022-08-16 ZeroFOX, Inc Malicious social media account identification
US11403400B2 (en) * 2017-08-31 2022-08-02 Zerofox, Inc. Troll account detection
US11134097B2 (en) 2017-10-23 2021-09-28 Zerofox, Inc. Automated social account removal
CN110083596A (zh) * 2018-05-16 2019-08-02 陈刚 一种数据历史跟踪和数据变化历史跟踪的方法
US11157652B2 (en) * 2018-05-16 2021-10-26 Microsoft Technology Licensing, Llc. Obfuscation and deletion of personal data in a loosely-coupled distributed system
US11210312B2 (en) 2018-06-08 2021-12-28 Microsoft Technology Licensing, Llc Storing data items and identifying stored data items
US11030019B2 (en) * 2019-04-09 2021-06-08 International Business Machines Corporation Deletion of events based on a plurality of factors in a connected car computing environment
US12143481B2 (en) * 2019-09-30 2024-11-12 The Governing Council Of The University Of Toronto Method and system for key generation
US11762913B2 (en) * 2019-12-31 2023-09-19 Micron Technology, Inc. Cursor seek operations using deleted record spans
US11468034B2 (en) * 2020-01-10 2022-10-11 Microsoft Technology Licensing, Llc Processing delete requests based on change feed of updates
KR20250012739A (ko) * 2020-11-18 2025-01-24 쿠팡 주식회사 가상 서버들로부터 대용량 로그 파일들을 프로세싱하는 컴퓨터 시스템 및 방법
US12229303B2 (en) * 2020-11-20 2025-02-18 Shopify Inc. System and method for processing erasure requests
US11914732B2 (en) 2020-12-16 2024-02-27 Stripe, Inc. Systems and methods for hard deletion of data across systems
US11960625B2 (en) * 2021-05-06 2024-04-16 Jpmorgan Chase Bank, N.A. Systems and methods for protecting sensitive data in user online activities
CN113297008B (zh) * 2021-05-19 2023-12-12 阿里巴巴新加坡控股有限公司 数据处理方法以及系统
CN113377636B (zh) * 2021-06-07 2022-08-26 上海微盟企业发展有限公司 一种页面浏览量计算的方法、系统、设备及可读存储介质
CN113326266B (zh) * 2021-06-23 2025-09-23 深圳前海微众银行股份有限公司 一种基于表结构关系的数据同步方法及装置
CN114489505B (zh) * 2022-01-21 2024-02-27 北京安天网络安全技术有限公司 数据报文的存储方法、装置、计算机设备
EP4595348A1 (en) 2022-11-15 2025-08-06 Quantum Bridge Technologies Inc. System and method for distribution of key generation data in a secure network
CN119232752B (zh) * 2024-11-29 2025-04-15 福建省电子政务建设运营有限公司 一种嵌入式定时任务日志管理方法及系统

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003157259A (ja) * 2001-09-05 2003-05-30 Fuji Xerox Co Ltd 情報検索システム
JP2003150594A (ja) * 2001-11-12 2003-05-23 Hitachi Ltd データウェアハウスシステム
US7440960B2 (en) * 2003-09-03 2008-10-21 International Business Machines Corporation Result set management
US20060224583A1 (en) * 2005-03-31 2006-10-05 Google, Inc. Systems and methods for analyzing a user's web history
US9002018B2 (en) * 2006-05-09 2015-04-07 Sync Up Technologies Corporation Encryption key exchange system and method
US8041985B2 (en) * 2006-08-11 2011-10-18 Chicago Mercantile Exchange, Inc. Match server for a financial exchange having fault tolerant operation
US7685181B2 (en) * 2007-02-26 2010-03-23 International Business Machines Corporation Method and system for utilizing a hierarchical bitmap structure to provide a fast and reliable mechanism to represent large deleted data sets in relational databases
JP2008219454A (ja) * 2007-03-05 2008-09-18 Hitachi Ltd 通信内容監査支援システム
US8660988B2 (en) * 2008-01-07 2014-02-25 28Msec Inc. Fine-grained and concurrent access to a virtualized disk in a distributed system
US20110055559A1 (en) * 2009-08-27 2011-03-03 Jun Li Data retention management
US8464350B2 (en) * 2011-03-14 2013-06-11 International Business Machines Corporation System and method for in-private browsing
US8316460B1 (en) 2011-11-22 2012-11-20 Google Inc. Private web browsing using encryption

Also Published As

Publication number Publication date
CN105940412B (zh) 2019-02-22
KR101757844B1 (ko) 2017-07-14
US9373004B2 (en) 2016-06-21
US20160048699A1 (en) 2016-02-18
EP3103052A1 (en) 2016-12-14
US9189641B2 (en) 2015-11-17
CN105940412A (zh) 2016-09-14
BR112016018070A2 (enExample) 2017-08-08
BR112016018070B1 (pt) 2023-02-28
US20150220751A1 (en) 2015-08-06
KR20160110530A (ko) 2016-09-21
JP6101874B2 (ja) 2017-03-22
EP3103052B1 (en) 2018-12-26
JP2017506388A (ja) 2017-03-02
WO2015119824A1 (en) 2015-08-13

Similar Documents

Publication Publication Date Title
ES2716902T3 (es) Métodos y sistemas para borrar información solicitada
US9202078B2 (en) Data perturbation and anonymization using one way hash
US9866592B2 (en) Policy enforcement system
Kuzu et al. A practical approach to achieve private medical record linkage in light of public resources
ES3011857T3 (en) Video-based asynchronous appointments for securing medication adherence
CN111919216A (zh) 计算机存储系统中的数据的按需去标识
US20160306999A1 (en) Systems, methods, and computer-readable media for de-identifying information
US10657273B2 (en) Systems and methods for automatic and customizable data minimization of electronic data stores
US20250328673A1 (en) Preventing Illicit Data Transfer and Storage
JP2022529524A (ja) 共通個人情報に関する同意
US11797706B2 (en) Mobile device network traffic modification and user based restrictions on data access
US11080422B2 (en) Systems and methods for generating and processing secure search queries
US20220157473A1 (en) Predictive contact tracing
CN110366728A (zh) 数据归档方法以及系统
US20230144362A1 (en) Detecting configuration gaps in systems handling data according to system requirements frameworks
US12045662B2 (en) Data re-encryption for software applications
US11321277B2 (en) Apparatus and method for improved network data security enforcement and verification
US20220366073A1 (en) Enabling Approximate Linkage of Datasets Over Quasi-Identifiers
Polakis et al. Security and privacy measurements in social networks: experiences and lessons learned
CN109509544A (zh) 一种签约信息处理方法、装置、服务器、及介质
WO2020071938A1 (ru) Способ и система маркировки действий пользователя для последующего анализа и накопления