IL248427B - Systems and methods for using cryptographic items to protect data - Google Patents

Systems and methods for using cryptographic items to protect data

Info

Publication number
IL248427B
IL248427B IL248427A IL24842716A IL248427B IL 248427 B IL248427 B IL 248427B IL 248427 A IL248427 A IL 248427A IL 24842716 A IL24842716 A IL 24842716A IL 248427 B IL248427 B IL 248427B
Authority
IL
Israel
Prior art keywords
methods
protect data
cipher objects
cipher
objects
Prior art date
Application number
IL248427A
Other languages
English (en)
Hebrew (he)
Original Assignee
Sertintyone Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sertintyone Corp filed Critical Sertintyone Corp
Publication of IL248427B publication Critical patent/IL248427B/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C1/00Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Automation & Control Theory (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
IL248427A 2014-04-17 2016-10-20 Systems and methods for using cryptographic items to protect data IL248427B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201461980617P 2014-04-17 2014-04-17
PCT/US2015/026405 WO2016003527A2 (en) 2014-04-17 2015-04-17 System and methods for using cipher objects to protect data

Publications (1)

Publication Number Publication Date
IL248427B true IL248427B (en) 2018-11-29

Family

ID=55020076

Family Applications (1)

Application Number Title Priority Date Filing Date
IL248427A IL248427B (en) 2014-04-17 2016-10-20 Systems and methods for using cryptographic items to protect data

Country Status (10)

Country Link
EP (1) EP3132565A4 (ko)
JP (3) JP6646281B2 (ko)
KR (3) KR102333272B1 (ko)
AU (1) AU2015284773A1 (ko)
CA (2) CA2946141C (ko)
IL (1) IL248427B (ko)
MX (1) MX2016013622A (ko)
RU (1) RU2016144756A (ko)
SG (1) SG11201608679RA (ko)
WO (1) WO2016003527A2 (ko)

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3788201B2 (ja) * 2000-06-07 2006-06-21 日本電信電話株式会社 情報カプセル管理方法及び情報カプセル管理プログラムを格納した記憶媒体
JP2002353953A (ja) * 2001-05-24 2002-12-06 Nippon Telegr & Teleph Corp <Ntt> 利用形態制御機能を持つコンテンツ提供システム,コンテンツ利用形態制御方法,提供者装置用プログラム,利用者装置用プログラム,提供者装置用プログラムの記録媒体,利用者装置用プログラムの記録媒体およびコンテンツの部分販売システム
US7380120B1 (en) * 2001-12-12 2008-05-27 Guardian Data Storage, Llc Secured data format for access control
US7515717B2 (en) * 2003-07-31 2009-04-07 International Business Machines Corporation Security containers for document components
JP2006099698A (ja) * 2004-09-30 2006-04-13 Toshiba Corp 配信情報再生装置、プログラム及び方法
JP2009252120A (ja) * 2008-04-09 2009-10-29 Nec System Technologies Ltd プログラム課金管理装置及びカプセル実行処理装置
GB2467580B (en) * 2009-02-06 2013-06-12 Thales Holdings Uk Plc System and method for multilevel secure object management
AU2012347452A1 (en) * 2011-12-09 2014-06-26 Echarge2 Corporation Systems and methods for using cipher objects to protect data

Also Published As

Publication number Publication date
KR20200113035A (ko) 2020-10-05
RU2016144756A (ru) 2018-05-21
CA3094011A1 (en) 2016-01-07
MX2016013622A (es) 2017-06-23
JP6646281B2 (ja) 2020-02-14
RU2016144756A3 (ko) 2018-11-07
KR102202775B1 (ko) 2021-01-14
NZ726067A (en) 2021-04-30
BR112016024193A2 (pt) 2017-10-10
JP2020184374A (ja) 2020-11-12
CA3094011C (en) 2023-01-24
WO2016003527A3 (en) 2016-04-07
KR102161975B1 (ko) 2020-10-07
JP6741852B2 (ja) 2020-08-19
EP3132565A2 (en) 2017-02-22
JP2017514229A (ja) 2017-06-01
KR20210006021A (ko) 2021-01-15
SG11201608679RA (en) 2016-11-29
KR20170037881A (ko) 2017-04-05
EP3132565A4 (en) 2017-12-20
CA2946141A1 (en) 2016-01-07
JP6982142B2 (ja) 2021-12-17
NZ763404A (en) 2021-06-25
KR102333272B1 (ko) 2021-12-02
WO2016003527A2 (en) 2016-01-07
AU2015284773A1 (en) 2016-11-24
JP2020064655A (ja) 2020-04-23
CA2946141C (en) 2020-11-17

Similar Documents

Publication Publication Date Title
SG11201608945WA (en) Secure data interaction method and system
SG11201707149UA (en) Method and system for encryption
GB2513260B (en) System and method for quorum-based data recovery
EP3127274A4 (en) Methods and apparatus to securely share data
EP3160661C0 (en) SYSTEM AND PROCESS FOR BIOROT INHIBITION
GB201522686D0 (en) Systems and methods of secure data exchange
SG11201509412WA (en) System and methods for encrypting data
EP3097503A4 (en) Technologies for protecting systems and data to prevent cyber-attacks
SG10201407868TA (en) Systems and methods for software based encryption
GB201414474D0 (en) Helmet and helmet system
HK1207722A1 (en) Method for sharing data and device thereof
SG11201508780UA (en) Method and system for encrypting data
GB201414302D0 (en) Data security system and method
SG11201509780XA (en) System and method for encryption
GB2545600B (en) System and methods for multi-dimensional geophysical data visualization
PL3217622T3 (pl) Sposób i urządzenie do uzupełniania danych
IL249235A0 (en) Information retrieval system and method
SG2013093059A (en) Method and system for encryption and/or decryption
GB201419282D0 (en) Confidential Extracting System Internal Data
SG11201605738YA (en) Method for information security equipment to realize multiple applications, information security equipment and system
HK1222022A1 (zh) 信息交互方法和信息交互系統
GB2522096B (en) Data encryption and decryption
LT2910866T (lt) Apsaugos nuo užšalimo sistema ir būdas
ZA201701178B (en) Security system and method
GB201610965D0 (en) Data protection device and data protection method thereof

Legal Events

Date Code Title Description
FF Patent granted
KB Patent renewed
KB Patent renewed