JP2012519906A - リンク内の識別子を使用したアクセス制御 - Google Patents
リンク内の識別子を使用したアクセス制御 Download PDFInfo
- Publication number
- JP2012519906A JP2012519906A JP2011552997A JP2011552997A JP2012519906A JP 2012519906 A JP2012519906 A JP 2012519906A JP 2011552997 A JP2011552997 A JP 2011552997A JP 2011552997 A JP2011552997 A JP 2011552997A JP 2012519906 A JP2012519906 A JP 2012519906A
- Authority
- JP
- Japan
- Prior art keywords
- resource
- access
- information element
- computer
- shared
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 claims abstract description 66
- 238000012550 audit Methods 0.000 claims description 34
- 238000007726 management method Methods 0.000 claims description 11
- 230000008859 change Effects 0.000 claims description 7
- 238000010586 diagram Methods 0.000 description 20
- 230000004044 response Effects 0.000 description 11
- 230000009471 action Effects 0.000 description 5
- 238000004891 communication Methods 0.000 description 5
- 239000000284 extract Substances 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000004590 computer program Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000002085 persistent effect Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2151—Time stamp
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/603—Digital right managament [DRM]
Abstract
Description
Claims (15)
- 共有コンピュータリソース(102)に関連付けられているリソースアクセス識別子(124)を受信するステップ(602)と、
前記リソースアクセス識別子(124)を前記共有コンピュータリソース(102)へのリンク(122)内に埋め込むステップ(604)と、
情報要素内に前記リンク(122)を挿入するステップ(606)と、
アクセス制御スキームを前記情報要素に関連付けて保護された情報要素(120)を生成するステップ(608)と、
前記保護された情報要素(120)を送り先のコンピュータ装置130に送信するステップ(610)と
を含むことを特徴とする方法。 - 前記情報要素は、電子メール、インスタントメッセージまたはファイルを含むことを特徴とする請求項1に記載の方法。
- 前記リソースアクセス識別子は、暗号トークンであることを特徴とする請求項1に記載の方法。
- 前記リンクは、URL(uniform resource locator)であり、前記リソースアクセス識別子は、前記URLのパラメータとして前記URL内に埋め込まれていることを特徴とする請求項1に記載の方法。
- 前記リソースアクセス識別子は、前記リソースアクセス識別子に関する要求の送信者に関連付けられている情報を含み、前記情報が、前記リソースアクセス識別子に関する要求を送信したコンピュータ装置に関連付けられている情報および前記リソースアクセス識別子に関する要求を送信したユーザに関連付けられている情報のうちの少なくとも1つを含むことを特徴とする請求項1に記載の方法。
- 前記リソースアクセス識別子は、共有コンピュータリソースに関連付けられている権利に関する情報を含み、前記権利が、前記共有コンピュータリソースを読み込むための権利、前記共有コンピュータリソースに書き込むための権利、前記共有コンピュータリソースを変更するための権利、またはこれらの任意の組み合わせを含むことを特徴とする請求項1に記載の方法。
- 前記リソースアクセス識別子は、前記リソースアクセス識別子の変更を防止するために署名を含むことを特徴とする請求項1に記載の方法。
- 前記情報要素に関連付けられている前記アクセス制御スキームは、デジタル著作権管理(DRM)プロファイルであって、前記デジタル著作権管理プロファイルは、前記共有コンピュータリソースの1または複数の所有者に関連する情報、前記共有コンピュータリソースの前記1または複数の所有者の1または複数の協力者に関連する情報、または、前記共有コンピュータリソースに関連付けられている1または複数のアクセス制限を含むことを特徴とする請求項1に記載の方法。
- 前記情報要素に関連付けられている前記DRMプロファイルは、前記リンク内に埋め込まれていることを特徴とする請求項8に記載の方法。
- 前記共有コンピュータリソースは、アクセスゲートウェイを介してアクセス可能なファイルサーバから取得可能であることを特徴とする請求項1に記載の方法。
- 第1のコンピュータ装置(110)であって、
共有リソース(102)へのアクセスを可能にするリソースアクセス識別子(124)に関する要求を送信し、
前記リソースアクセス識別子(124)を受信し、
前記リソースアクセス識別子(124)をリンク(122)内に埋め込み、
前記リンク(122)を情報要素内に挿入し、
アクセス制御スキームを前記情報要素に関連付けるように構成された前記第1のコンピュータ装置と、
前記情報要素と関連付けられている前記アクセス制御スキームが前記情報要素へのアクセスを可能にすることを確認可能な第2のコンピュータ装置(130)に前記情報要素を送信するネットワークインタフェース(118)と
を含むことを特徴とするシステム。 - 前記第1のコンピュータ装置から前記リソースアクセス識別子に関する要求を受信すること、前記リソースアクセス識別子を前記第1のコンピュータ装置に送信すること、前記第2のコンピュータ装置による前記共有リソースへのアクセスを容易にすることが可能なアクセスゲートウェイをさらに含むことを特徴とする請求項11に記載のシステム。
- リソースアクセス識別子の要求および共有リソースのアクセス情報を監査ログ内に記録することが可能な監査エンジンをさらに含むことを特徴とする請求項12に記載のシステム。
- 前記アクセスゲートウェイは、
前記共有リソースに関連付けられているアクセス取消一覧を保持することと、
前記第2のコンピュータ装置を特定する情報が前記アクセス取消一覧にリストアップされていることを判定することと、
前記第2のコンピュータ装置による前記共有リソースへのアクセスの試行を受信することと、
前記第2のコンピュータ装置による前記共有リソースへのアクセスの前記試行を拒否することとがさらに可能であることと、
前記監査エンジンは、失敗したリソースアクセス試行を前記監査ログ内に保存することがさらに可能であることと
を特徴とする請求項13に記載のシステム。 - 前記第2のコンピュータ装置は、前記情報要素を第3のコンピュータ装置に転送することがさらに可能であり、前記情報要素に関連付けられている前記アクセス制御スキームは、前記第3のコンピュータ装置における前記情報要素へのアクセスを可能にし、前記第3のコンピュータ装置は、前記リソースアクセス識別子を使用して前記共有リソースにアクセス可能であることを特徴とする請求項11に記載のシステム。
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/396,500 US8719582B2 (en) | 2009-03-03 | 2009-03-03 | Access control using identifiers in links |
US12/396,500 | 2009-03-03 | ||
PCT/US2010/025675 WO2010101788A2 (en) | 2009-03-03 | 2010-02-26 | Access control using identifiers in links |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2015062493A Division JP5980366B2 (ja) | 2009-03-03 | 2015-03-25 | リンク内の識別子を使用したアクセス制御 |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2012519906A true JP2012519906A (ja) | 2012-08-30 |
JP2012519906A5 JP2012519906A5 (ja) | 2013-04-11 |
Family
ID=42679285
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2011552997A Pending JP2012519906A (ja) | 2009-03-03 | 2010-02-26 | リンク内の識別子を使用したアクセス制御 |
JP2015062493A Active JP5980366B2 (ja) | 2009-03-03 | 2015-03-25 | リンク内の識別子を使用したアクセス制御 |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2015062493A Active JP5980366B2 (ja) | 2009-03-03 | 2015-03-25 | リンク内の識別子を使用したアクセス制御 |
Country Status (5)
Country | Link |
---|---|
US (1) | US8719582B2 (ja) |
EP (1) | EP2404258B1 (ja) |
JP (2) | JP2012519906A (ja) |
CN (1) | CN102341807B (ja) |
WO (1) | WO2010101788A2 (ja) |
Families Citing this family (63)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9270681B2 (en) * | 2007-10-02 | 2016-02-23 | Microsoft Technology Licensing, Llc | Network access and profile control |
WO2010118179A1 (en) * | 2009-04-07 | 2010-10-14 | Clearslide, Inc. | Mixed content type presentation system |
US8526798B2 (en) * | 2009-12-23 | 2013-09-03 | Western Digital Technologies, Inc. | Portable content container displaying A/V files in response to a command received from a consumer device |
US8510552B2 (en) * | 2010-04-07 | 2013-08-13 | Apple Inc. | System and method for file-level data protection |
US8788842B2 (en) | 2010-04-07 | 2014-07-22 | Apple Inc. | System and method for content protection based on a combination of a user PIN and a device specific identifier |
US9418356B2 (en) * | 2010-05-07 | 2016-08-16 | Microsoft Technology Licensing, Llc | Streamlined collaboration on document |
US9129138B1 (en) * | 2010-10-29 | 2015-09-08 | Western Digital Technologies, Inc. | Methods and systems for a portable data locker |
US9147196B2 (en) * | 2010-12-02 | 2015-09-29 | Oncard Marketing, Inc. | System and method for delivering a restricted use in-store promotion to a consumer |
US9117226B2 (en) | 2010-12-02 | 2015-08-25 | Oncard Marketing, Inc. | System and method for delivering an authorized in-store promotion to a consumer |
US9165285B2 (en) | 2010-12-08 | 2015-10-20 | Microsoft Technology Licensing, Llc | Shared attachments |
US20120203859A1 (en) * | 2011-02-04 | 2012-08-09 | Openpeak Inc. | System and method for interaction between e-mail/web browser and communication devices |
US10552799B2 (en) | 2011-04-28 | 2020-02-04 | Microsoft Technology Licensing, Llc | Upload of attachment and insertion of link into electronic messages |
US8682989B2 (en) | 2011-04-28 | 2014-03-25 | Microsoft Corporation | Making document changes by replying to electronic messages |
US9137185B2 (en) | 2011-04-28 | 2015-09-15 | Microsoft Technology Licensing, Llc | Uploading attachment to shared location and replacing with a link |
US11308449B2 (en) * | 2011-04-28 | 2022-04-19 | Microsoft Technology Licensing, Llc | Storing metadata inside file to reference shared version of file |
US8965983B2 (en) | 2011-05-06 | 2015-02-24 | Microsoft Technology Licensing, Llc | Changes to documents are automatically summarized in electronic messages |
US10185932B2 (en) | 2011-05-06 | 2019-01-22 | Microsoft Technology Licensing, Llc | Setting permissions for links forwarded in electronic messages |
AU2012275653A1 (en) * | 2011-06-27 | 2013-05-02 | Google Inc. | Persistent key access to a resources in a collection |
US10733151B2 (en) | 2011-10-27 | 2020-08-04 | Microsoft Technology Licensing, Llc | Techniques to share media files |
FR2984063A1 (fr) * | 2011-12-12 | 2013-06-14 | France Telecom | Enrichissement, gestion de contenus multimedia et etablissement d'une communication en fonction de contenus multimedia enrichis |
US20130208893A1 (en) * | 2012-02-13 | 2013-08-15 | Eugene Shablygin | Sharing secure data |
WO2013123982A1 (en) * | 2012-02-22 | 2013-08-29 | Nokia Siemens Networks Oy | Controlling access |
US9092617B2 (en) * | 2012-11-08 | 2015-07-28 | Intel Corporation | Protecting systems from unauthorized access to system resources using browser independent web page technology |
US9489390B2 (en) | 2012-12-20 | 2016-11-08 | Bank Of America Corporation | Reconciling access rights at IAM system implementing IAM data model |
US9639594B2 (en) | 2012-12-20 | 2017-05-02 | Bank Of America Corporation | Common data model for identity access management data |
US9542433B2 (en) | 2012-12-20 | 2017-01-10 | Bank Of America Corporation | Quality assurance checks of access rights in a computing system |
US9529629B2 (en) | 2012-12-20 | 2016-12-27 | Bank Of America Corporation | Computing resource inventory system |
US9477838B2 (en) | 2012-12-20 | 2016-10-25 | Bank Of America Corporation | Reconciliation of access rights in a computing system |
US9483488B2 (en) | 2012-12-20 | 2016-11-01 | Bank Of America Corporation | Verifying separation-of-duties at IAM system implementing IAM data model |
US9537892B2 (en) | 2012-12-20 | 2017-01-03 | Bank Of America Corporation | Facilitating separation-of-duties when provisioning access rights in a computing system |
US9189644B2 (en) | 2012-12-20 | 2015-11-17 | Bank Of America Corporation | Access requests at IAM system implementing IAM data model |
US9495380B2 (en) | 2012-12-20 | 2016-11-15 | Bank Of America Corporation | Access reviews at IAM system implementing IAM data model |
CN103248678A (zh) * | 2013-04-24 | 2013-08-14 | 天脉聚源(北京)传媒科技有限公司 | 一种数据资源共享方法、服务端和客户端 |
US9047901B1 (en) | 2013-05-28 | 2015-06-02 | Western Digital Technologies, Inc. | Disk drive measuring spiral track error by measuring a slope of a spiral track across a disk radius |
US9268948B2 (en) | 2013-06-24 | 2016-02-23 | Intel Corporation | Secure access enforcement proxy |
US9047482B2 (en) * | 2013-07-17 | 2015-06-02 | Wowza Media Systems, LLC | Token-based security for links to media streams |
US8640229B1 (en) * | 2013-07-17 | 2014-01-28 | Wowza Media Systems, LLC | Token-based security for links to media streams |
US10250579B2 (en) * | 2013-08-13 | 2019-04-02 | Alcatel Lucent | Secure file transfers within network-based storage |
US9473478B2 (en) * | 2013-09-24 | 2016-10-18 | Alcatel Lucent | Residential gateway based policy |
US9712603B2 (en) * | 2013-11-26 | 2017-07-18 | Microsoft Technology Licensing, Llc | Remote control of a shared application |
US9800516B2 (en) * | 2014-03-28 | 2017-10-24 | Change Healthcare Llc | Method and apparatus for managing allocation of communication resources |
US9053727B1 (en) | 2014-06-02 | 2015-06-09 | Western Digital Technologies, Inc. | Disk drive opening spiral crossing window based on DC and AC spiral track error |
US10057240B2 (en) * | 2014-08-25 | 2018-08-21 | Sap Se | Single sign-on to web applications from mobile devices |
US9948610B2 (en) * | 2014-08-29 | 2018-04-17 | Citrix Systems, Inc. | Method and apparatus for accessing third-party resources |
US9967332B1 (en) * | 2015-02-24 | 2018-05-08 | Amazon Technologies, Inc. | Peer-to-peer file sharing and collaboration |
US9135412B1 (en) | 2015-02-24 | 2015-09-15 | Wowza Media Systems, LLC | Token-based security for remote resources |
US9819665B1 (en) * | 2015-06-26 | 2017-11-14 | EMC IP Holding Company LLC | Synchronization of access tokens for session continuity across multiple devices |
WO2017131892A1 (en) * | 2016-01-29 | 2017-08-03 | Google Inc. | Device access revocation |
US10257342B2 (en) * | 2016-03-31 | 2019-04-09 | Microsoft Technology Licensing, Llc | Validating stateful dynamic links in mobile applications |
US10635828B2 (en) | 2016-09-23 | 2020-04-28 | Microsoft Technology Licensing, Llc | Tokenized links with granular permissions |
CN107948126B (zh) * | 2016-10-13 | 2021-09-03 | 阿里巴巴集团控股有限公司 | 一种报表查看方法及设备 |
US10528227B2 (en) * | 2017-04-18 | 2020-01-07 | Fuji Xerox Co., Ltd. | Systems and methods for linking attachments to chat messages |
CN110603538B (zh) * | 2017-05-18 | 2023-04-21 | 谷歌有限责任公司 | 使用密码共享的加密搜索云服务 |
US10491584B2 (en) * | 2017-05-22 | 2019-11-26 | General Electric Company | Role-based resource access control |
US10491596B2 (en) * | 2017-07-31 | 2019-11-26 | Vmware, Inc. | Systems and methods for controlling email access |
US10491595B2 (en) | 2017-07-31 | 2019-11-26 | Airwatch, Llc | Systems and methods for controlling email access |
JP6805366B2 (ja) * | 2017-10-27 | 2020-12-23 | 日本電信電話株式会社 | 通信装置、通信システム及び通信プログラム |
DE102018208830A1 (de) * | 2018-06-05 | 2019-12-05 | Bayerische Motoren Werke Aktiengesellschaft | Zugriffssteuerung auf eine Ressource |
CN110266683A (zh) * | 2019-06-18 | 2019-09-20 | 北京阿尔山区块链联盟科技有限公司 | 数字资产分享方法、装置以及电子设备 |
US11169973B2 (en) * | 2019-08-23 | 2021-11-09 | International Business Machines Corporation | Atomically tracking transactions for auditability and security |
US11899757B2 (en) * | 2019-12-02 | 2024-02-13 | Cox Automotive, Inc. | Systems and methods for temporary digital content sharing |
JP2022012403A (ja) * | 2020-07-01 | 2022-01-17 | キヤノン株式会社 | プログラム、情報処理装置及び制御方法 |
CN112650954B (zh) * | 2020-12-30 | 2023-09-22 | 杭州趣链科技有限公司 | 区块链数据分享方法、装置、设备及存储介质 |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000057036A (ja) * | 1998-08-11 | 2000-02-25 | Fuji Xerox Co Ltd | ハイパーテキスト・システム及びハイパーテキストを扱う方法 |
JP2003122615A (ja) * | 2001-10-11 | 2003-04-25 | Just Syst Corp | ファイル処理方法とこの方法にて利用可能なファイル処理装置 |
JP2004151783A (ja) * | 2002-10-28 | 2004-05-27 | Actis:Kk | 電子メール制御プログラム |
JP2004234640A (ja) * | 2003-01-08 | 2004-08-19 | Ricoh Co Ltd | 情報提供装置,情報提供処理システム,画像形成装置、情報提供方法および不正利用防止方法 |
JP2005071339A (ja) * | 2003-08-21 | 2005-03-17 | Samsung Electronics Co Ltd | ユーザ間のコンテンツに対する権限情報の共有方法 |
JP2005509980A (ja) * | 2001-11-20 | 2005-04-14 | コンテントガード ホールディングズ インコーポレイテッド | 拡張可能な権利表記処理システム |
JP2005157881A (ja) * | 2003-11-27 | 2005-06-16 | Canon Inc | サーバ端末装置、クライアント端末装置、オブジェクト管理システム、オブジェクト管理方法、コンピュータプログラム及び記録媒体 |
JP2007149010A (ja) * | 2005-11-30 | 2007-06-14 | Nec Corp | 権限管理サーバ、権限管理システム、トークン検証方法、トークン検証プログラム |
Family Cites Families (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6088451A (en) * | 1996-06-28 | 2000-07-11 | Mci Communications Corporation | Security system and method for network element access |
US6385728B1 (en) * | 1997-11-26 | 2002-05-07 | International Business Machines Corporation | System, method, and program for providing will-call certificates for guaranteeing authorization for a printer to retrieve a file directly from a file server upon request from a client in a network computer system environment |
US7954144B1 (en) * | 2000-01-18 | 2011-05-31 | Novell, Inc. | Brokering state information and identity among user agents, origin servers, and proxies |
KR20010091080A (ko) * | 2000-03-13 | 2001-10-23 | 김대기 | 통신 채널을 통한 유알엘 전송 및 이를 이용한 인터넷접속 방법 |
US20040148503A1 (en) * | 2002-01-25 | 2004-07-29 | David Sidman | Apparatus, method, and system for accessing digital rights management information |
US7149311B2 (en) * | 2001-02-08 | 2006-12-12 | Lucent Technologies Inc. | Methods and apparatus for providing networked cryptographic devices resilient to capture |
US20020147929A1 (en) * | 2001-04-10 | 2002-10-10 | Rose Mark E. | Access control for distributed content servers |
US7954121B2 (en) * | 2001-06-19 | 2011-05-31 | Jlb Ventures Llc | Methods and system for controlling access to individual titles |
US7421411B2 (en) * | 2001-07-06 | 2008-09-02 | Nokia Corporation | Digital rights management in a mobile communications environment |
US7974923B2 (en) * | 2001-11-20 | 2011-07-05 | Contentguard Holdings, Inc. | Extensible rights expression processing system |
DE10216384A1 (de) * | 2002-04-12 | 2003-10-30 | Scm Microsystems Gmbh | Zugangskontrollnetzwerk |
US7703128B2 (en) * | 2003-02-13 | 2010-04-20 | Microsoft Corporation | Digital identity management |
US7680277B2 (en) * | 2003-11-12 | 2010-03-16 | Microsoft Corporation | Optical media protection methods and apparatuses |
US20060041484A1 (en) * | 2004-04-01 | 2006-02-23 | King Martin T | Methods and systems for initiating application processes by data capture from rendered documents |
KR100452088B1 (ko) | 2004-06-11 | 2004-10-13 | 엔에이치엔(주) | 쿠키 정보를 이용한 안전 결제 서비스 제공 방법 및 그시스템 |
US7668830B2 (en) * | 2004-11-29 | 2010-02-23 | Nokia Corporation | Access rights |
KR20060090044A (ko) * | 2005-02-04 | 2006-08-10 | (주)엠비즈네트웍스글로벌 | 유료 멀티미디어 컨텐츠의 전송요청 보안처리장치 및 방법 |
WO2006112617A1 (en) | 2005-03-23 | 2006-10-26 | Sil-Ho Kim | Hyper mailing server, transmitting server, hyper mailing system comprising the same, control method thereof, hyper message server and hyper message system |
WO2007076484A2 (en) * | 2005-12-22 | 2007-07-05 | Flory Clive F | Method, system, and apparatus for the management of the electronic files |
US8984652B2 (en) * | 2006-07-28 | 2015-03-17 | Sony Corporation | Transfer of digital rights management information |
US20080313150A1 (en) * | 2006-12-13 | 2008-12-18 | Christopher Penner | Centralized Network Data Search, Sharing and Management System |
KR101086420B1 (ko) * | 2006-12-22 | 2011-11-23 | 삼성전자주식회사 | 권리객체 복호방법과 장치 및 이를 이용한 콘텐츠공유방법과 장치 |
US7975312B2 (en) * | 2007-01-08 | 2011-07-05 | Apple Inc. | Token passing technique for media playback devices |
-
2009
- 2009-03-03 US US12/396,500 patent/US8719582B2/en active Active
-
2010
- 2010-02-26 WO PCT/US2010/025675 patent/WO2010101788A2/en active Application Filing
- 2010-02-26 CN CN201080010827.0A patent/CN102341807B/zh active Active
- 2010-02-26 EP EP10749132.6A patent/EP2404258B1/en active Active
- 2010-02-26 JP JP2011552997A patent/JP2012519906A/ja active Pending
-
2015
- 2015-03-25 JP JP2015062493A patent/JP5980366B2/ja active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000057036A (ja) * | 1998-08-11 | 2000-02-25 | Fuji Xerox Co Ltd | ハイパーテキスト・システム及びハイパーテキストを扱う方法 |
JP2003122615A (ja) * | 2001-10-11 | 2003-04-25 | Just Syst Corp | ファイル処理方法とこの方法にて利用可能なファイル処理装置 |
JP2005509980A (ja) * | 2001-11-20 | 2005-04-14 | コンテントガード ホールディングズ インコーポレイテッド | 拡張可能な権利表記処理システム |
JP2004151783A (ja) * | 2002-10-28 | 2004-05-27 | Actis:Kk | 電子メール制御プログラム |
JP2004234640A (ja) * | 2003-01-08 | 2004-08-19 | Ricoh Co Ltd | 情報提供装置,情報提供処理システム,画像形成装置、情報提供方法および不正利用防止方法 |
JP2005071339A (ja) * | 2003-08-21 | 2005-03-17 | Samsung Electronics Co Ltd | ユーザ間のコンテンツに対する権限情報の共有方法 |
JP2005157881A (ja) * | 2003-11-27 | 2005-06-16 | Canon Inc | サーバ端末装置、クライアント端末装置、オブジェクト管理システム、オブジェクト管理方法、コンピュータプログラム及び記録媒体 |
JP2007149010A (ja) * | 2005-11-30 | 2007-06-14 | Nec Corp | 権限管理サーバ、権限管理システム、トークン検証方法、トークン検証プログラム |
Also Published As
Publication number | Publication date |
---|---|
EP2404258A4 (en) | 2013-05-15 |
CN102341807A (zh) | 2012-02-01 |
JP5980366B2 (ja) | 2016-08-31 |
US8719582B2 (en) | 2014-05-06 |
CN102341807B (zh) | 2015-05-20 |
US20100228989A1 (en) | 2010-09-09 |
WO2010101788A2 (en) | 2010-09-10 |
EP2404258B1 (en) | 2016-11-23 |
WO2010101788A3 (en) | 2011-01-06 |
JP2015146208A (ja) | 2015-08-13 |
EP2404258A2 (en) | 2012-01-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5980366B2 (ja) | リンク内の識別子を使用したアクセス制御 | |
US11349819B2 (en) | Method and system for digital rights management of documents | |
US9639711B2 (en) | Systems and methods for data verification and replay prevention | |
JP3640338B2 (ja) | 安全な電子データ格納、取出しシステムおよび方法 | |
US8327450B2 (en) | Digital safety deposit box | |
JP3640339B2 (ja) | 電子データ・ファイルを検索するシステムおよびその維持方法 | |
KR101076861B1 (ko) | 권한 관리 보호된 컨텐츠의 선행 라이센싱 방법 | |
RU2500075C2 (ru) | Создание и проверка достоверности документов, защищенных криптографически | |
US20070150299A1 (en) | Method, system, and apparatus for the management of the electronic files | |
US20140019753A1 (en) | Cloud key management | |
US9338166B2 (en) | System and method for a single request and single response authentication protocol | |
US9292661B2 (en) | System and method for distributing rights-protected content | |
US20180204017A1 (en) | Systems and methods to convert a data source into a secure container with dynamic rights based on data location | |
Reniers et al. | Authenticated and auditable data sharing via smart contract | |
CN110741371B (zh) | 信息处理设备、保护处理设备和使用终端 | |
WO2022066775A1 (en) | Encrypted file control | |
JP2009070159A (ja) | ファイル持ち出し制御方法、及び情報処理装置、並びに、プログラム | |
Kowalski | CRYPTOBOX V2. | |
WO2008045038A1 (en) | Method and system for digital rights management of documents |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20130220 |
|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20130220 |
|
RD03 | Notification of appointment of power of attorney |
Free format text: JAPANESE INTERMEDIATE CODE: A7423 Effective date: 20130701 |
|
RD04 | Notification of resignation of power of attorney |
Free format text: JAPANESE INTERMEDIATE CODE: A7424 Effective date: 20130718 |
|
A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20140131 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20140227 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20140515 |
|
A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20140522 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20140610 |
|
A02 | Decision of refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A02 Effective date: 20141125 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20150325 |
|
A911 | Transfer to examiner for re-examination before appeal (zenchi) |
Free format text: JAPANESE INTERMEDIATE CODE: A911 Effective date: 20150401 |
|
A711 | Notification of change in applicant |
Free format text: JAPANESE INTERMEDIATE CODE: A711 Effective date: 20150514 |
|
A912 | Re-examination (zenchi) completed and case transferred to appeal board |
Free format text: JAPANESE INTERMEDIATE CODE: A912 Effective date: 20150612 |