ES3049176T3 - Improved storage system - Google Patents

Improved storage system

Info

Publication number
ES3049176T3
ES3049176T3 ES17732010T ES17732010T ES3049176T3 ES 3049176 T3 ES3049176 T3 ES 3049176T3 ES 17732010 T ES17732010 T ES 17732010T ES 17732010 T ES17732010 T ES 17732010T ES 3049176 T3 ES3049176 T3 ES 3049176T3
Authority
ES
Spain
Prior art keywords
data
server
location
user
client device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
ES17732010T
Other languages
English (en)
Spanish (es)
Inventor
Ric B Richardson
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Haventec Pty Ltd
Original Assignee
Haventec Pty Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from AU2015905400A external-priority patent/AU2015905400A0/en
Application filed by Haventec Pty Ltd filed Critical Haventec Pty Ltd
Application granted granted Critical
Publication of ES3049176T3 publication Critical patent/ES3049176T3/es
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/76Proxy, i.e. using intermediary entity to perform cryptographic operations

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
ES17732010T 2015-12-24 2017-01-03 Improved storage system Active ES3049176T3 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
AU2015905400A AU2015905400A0 (en) 2015-12-24 Improved Payment System
PCT/AU2017/000002 WO2017106938A1 (en) 2015-12-24 2017-01-03 Improved storage system

Publications (1)

Publication Number Publication Date
ES3049176T3 true ES3049176T3 (en) 2025-12-15

Family

ID=59088769

Family Applications (1)

Application Number Title Priority Date Filing Date
ES17732010T Active ES3049176T3 (en) 2015-12-24 2017-01-03 Improved storage system

Country Status (9)

Country Link
US (1) US11314873B2 (OSRAM)
EP (1) EP3394787B1 (OSRAM)
JP (1) JP6854529B2 (OSRAM)
CN (2) CN117494151A (OSRAM)
AU (4) AU2017204537A1 (OSRAM)
CA (1) CA3009229C (OSRAM)
ES (1) ES3049176T3 (OSRAM)
SG (1) SG11201806423QA (OSRAM)
WO (1) WO2017106938A1 (OSRAM)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10546145B2 (en) 2017-02-17 2020-01-28 International Business Machines Corporation Storing data from a sensor device into a neighboring device
US10831935B2 (en) 2017-08-31 2020-11-10 Pure Storage, Inc. Encryption management with host-side data reduction
US11563562B2 (en) * 2018-03-08 2023-01-24 Secure Exchanges Inc. System and method for securely exchanging messages
CN109815711B (zh) * 2018-12-21 2020-12-25 航天信息股份有限公司 一种存储设备、数据存储方法和数据读取方法
US12301550B2 (en) * 2021-06-01 2025-05-13 Apple Inc. End-to-end encryption for location sharing

Family Cites Families (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040181668A1 (en) * 1999-06-30 2004-09-16 Blew Edwin O. Methods for conducting server-side encryption/decryption-on-demand
US7391865B2 (en) * 1999-09-20 2008-06-24 Security First Corporation Secure data parser method and system
US6601170B1 (en) 1999-12-30 2003-07-29 Clyde Riley Wallace, Jr. Secure internet user state creation method and system with user supplied key and seeding
CA2405294A1 (en) 2000-04-06 2001-10-18 Freerun Technologies, Inc. Systems and methods for securing a web transaction between a client and a merchant using encrypted keys and cookies
US20020178366A1 (en) * 2001-05-24 2002-11-28 Amiran Ofir Method for performing on behalf of a registered user an operation on data stored on a publicly accessible data access server
CN1310464C (zh) 2002-09-24 2007-04-11 黎明网络有限公司 一种基于公开密钥体系的数据安全传输的方法及其装置
US20050071630A1 (en) * 2003-08-15 2005-03-31 Imcentric, Inc. Processing apparatus for monitoring and renewing digital certificates
US7346773B2 (en) 2004-01-12 2008-03-18 Cisco Technology, Inc. Enabling stateless server-based pre-shared secrets
JP4832744B2 (ja) * 2004-09-29 2011-12-07 コニカミノルタビジネステクノロジーズ株式会社 文書管理システム
WO2008036919A2 (en) * 2006-09-22 2008-03-27 Paymetric, Inc. System and method for rotating data in a crypto system
JP2009164996A (ja) * 2008-01-09 2009-07-23 Kyocera Mita Corp 情報処理装置
JP4897782B2 (ja) * 2008-12-27 2012-03-14 キヤノンマーケティングジャパン株式会社 文書管理システム、文書管理方法、及びそのプログラム
US8335933B2 (en) 2009-02-13 2012-12-18 Microsoft Corporation Two-party storage of encrypted sensitive information
JP2011027917A (ja) * 2009-07-23 2011-02-10 Lemuria Holdings Ltd デジタル貸金庫システム及びサーバ
JP6084564B2 (ja) * 2010-06-11 2017-02-22 カーディナルコマース コーポレーション 安全なオーダー・マネジメント・システムのデータ暗号化、復号化、およびセグメント化の方法およびシステム
US20120017095A1 (en) 2010-07-19 2012-01-19 Coreguard Software Service for Encrypting and Decrypting Data
US9355389B2 (en) 2010-12-06 2016-05-31 Voltage Security, Inc. Purchase transaction system with encrypted payment card data
WO2013020178A1 (en) * 2011-08-11 2013-02-14 Cocoon Data Holdings Limited A system and method for distributing secured data
WO2013020177A1 (en) * 2011-08-11 2013-02-14 Cocoon Data Holdings Limited System and method for accessing securely stored data
EP2602955B1 (en) * 2011-12-05 2016-03-09 Certicom Corp. System and Method for Mounting Encrypted Data Based on Availability of a Key on a Network
CN102629940A (zh) * 2012-03-19 2012-08-08 天津书生投资有限公司 一种存储方法、系统和装置
US8458494B1 (en) * 2012-03-26 2013-06-04 Symantec Corporation Systems and methods for secure third-party data storage
US9590959B2 (en) * 2013-02-12 2017-03-07 Amazon Technologies, Inc. Data security service
US9286491B2 (en) 2012-06-07 2016-03-15 Amazon Technologies, Inc. Virtual service provider zones
US10277867B2 (en) * 2012-07-12 2019-04-30 Elwha Llc Pre-event repository associated with individual privacy and public safety protection via double encrypted lock box
KR102013841B1 (ko) * 2012-08-06 2019-08-23 삼성전자주식회사 데이터의 안전한 저장을 위한 키 관리 방법 및 그 장치
US9137222B2 (en) 2012-10-31 2015-09-15 Vmware, Inc. Crypto proxy for cloud storage services
US8997197B2 (en) * 2012-12-12 2015-03-31 Citrix Systems, Inc. Encryption-based data access management
CN104239820B (zh) * 2013-06-13 2017-11-03 普天信息技术研究院有限公司 一种安全存储设备
US9355271B2 (en) 2013-10-18 2016-05-31 Robert Bosch Gmbh System and method for dynamic, non-interactive, and parallelizable searchable symmetric encryption
CN103763315B (zh) * 2014-01-14 2016-12-07 北京航空航天大学 一种应用于移动设备云存储的可信数据存取控制方法
US9560023B2 (en) * 2014-08-13 2017-01-31 AOL, Inc. Systems and methods for protecting internet advertising data
CN104182691B (zh) * 2014-08-22 2017-07-21 国家电网公司 数据保密方法及装置
AU2015201536A1 (en) * 2015-03-25 2016-10-13 Cocoon Data Holdings Limited Browser system and method

Also Published As

Publication number Publication date
EP3394787C0 (en) 2025-08-27
EP3394787A1 (en) 2018-10-31
AU2017204537A1 (en) 2018-07-26
CA3009229A1 (en) 2017-06-29
AU2024200080A1 (en) 2024-01-25
JP2019501592A (ja) 2019-01-17
AU2021266356A1 (en) 2021-12-09
CN108701200B (zh) 2023-08-22
CN117494151A (zh) 2024-02-02
US20190012467A1 (en) 2019-01-10
US11314873B2 (en) 2022-04-26
AU2020239610A1 (en) 2020-10-15
JP6854529B2 (ja) 2021-04-07
WO2017106938A1 (en) 2017-06-29
CA3009229C (en) 2024-09-17
EP3394787B1 (en) 2025-08-27
SG11201806423QA (en) 2018-08-30
CN108701200A (zh) 2018-10-23
EP3394787A4 (en) 2019-06-05

Similar Documents

Publication Publication Date Title
Fabian et al. Collaborative and secure sharing of healthcare data in multi-clouds
ES3049176T3 (en) Improved storage system
JP2020184800A (ja) 鍵を有するリソースロケーター
Varadharajan et al. Data security and privacy in the internet of things (iot) environment
US20190327269A1 (en) Context-based adaptive encryption
ES2947562T3 (es) Método y sistema para controlar el intercambio de información sensible a la privacidad
US20180288030A1 (en) Secure identity sharing using a wearable device
JP2013175179A (ja) 少なくとも1つの暗号化された命令を備えるソフトウェアアプリケーションの協調実行のためのシステム、デバイスおよび方法
BE1024812A9 (nl) Een beveilingingsbenadering voor de opslag van credentials voor offline gebruik en tegen kopiëren beveiligde kluisinhoud in apparaten
CN110383788A (zh) 用于执行一个或多个应用程序以便与提供Web服务的一个或多个服务器进行安全的数据交换的方法和安全单元、特别是用于IoT设备的安全单元
CN106411893B (zh) 一种https服务的部署方法
Abubakar-Sadiq Establishing secure and privacy preserving digital identity with self-sovereign identity
Li Context-aware attribute-based techniques for data security and access control in mobile cloud environment
Ahmad et al. A TOTP-based secure data storage system in the cloud environment using the JWT token approach
Chahal et al. Challenges and security issues of NoSQL databases
HK1262670B (zh) 改善的存储系统
HK1262670A1 (en) Improved storage system
Trif et al. A windows phone 7 oriented secure architecture for business intelligence mobile applications
Díaz García et al. Multiprotocol Authentication Device for HPC and Cloud Environments Based on Elliptic Curve Cryptography
Gagged et al. Secure dynamic bits standard scheme in private cloud environment
Zmezm et al. Design and implementation of challenge response protocol for enhanced e-commerce security
Pietilä Implementing passwordless identity and access management system for a web application
Regateiro et al. SPDC: Secure Proxied Database Connectivity.
Sharma et al. Enhancing security in service oriented architecture driven EAI using aspect oriented programming in healthcare IT
Iracleous et al. Performance of Web Services Security Mechanisms: Analysis and Evaluation