JP2015534138A - セキュアな認証及び情報の共有と分析のための方法及びシステム - Google Patents
セキュアな認証及び情報の共有と分析のための方法及びシステム Download PDFInfo
- Publication number
- JP2015534138A JP2015534138A JP2015524446A JP2015524446A JP2015534138A JP 2015534138 A JP2015534138 A JP 2015534138A JP 2015524446 A JP2015524446 A JP 2015524446A JP 2015524446 A JP2015524446 A JP 2015524446A JP 2015534138 A JP2015534138 A JP 2015534138A
- Authority
- JP
- Japan
- Prior art keywords
- information
- user
- access
- password
- authentication process
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 238000004458 analytical method Methods 0.000 title description 11
- 230000008569 process Effects 0.000 claims abstract description 18
- 238000012545 processing Methods 0.000 abstract description 6
- 230000003044 adaptive effect Effects 0.000 description 15
- 230000009471 action Effects 0.000 description 7
- 230000008859 change Effects 0.000 description 7
- 230000000694 effects Effects 0.000 description 6
- 238000007726 management method Methods 0.000 description 6
- 230000007246 mechanism Effects 0.000 description 6
- 238000012544 monitoring process Methods 0.000 description 6
- 230000010354 integration Effects 0.000 description 5
- 238000013508 migration Methods 0.000 description 4
- 230000005012 migration Effects 0.000 description 4
- 238000013459 approach Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 3
- 238000013507 mapping Methods 0.000 description 3
- 238000012502 risk assessment Methods 0.000 description 3
- 238000013349 risk mitigation Methods 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 230000002411 adverse Effects 0.000 description 2
- 238000006243 chemical reaction Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000001105 regulatory effect Effects 0.000 description 2
- 238000012552 review Methods 0.000 description 2
- 239000000344 soap Substances 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 238000013145 classification model Methods 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 235000014510 cooky Nutrition 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 238000009472 formulation Methods 0.000 description 1
- 238000009415 formwork Methods 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 230000001681 protective effect Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
- 238000000638 solvent extraction Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/405—Establishing or using transaction specific rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2113—Multi-level security, e.g. mandatory access control
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Information Transfer Between Computers (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (12)
- 異なる複数の機密レベルが割り当てられている情報の2つ又はそれよりも多くのセットへの、コンピュータネットワークを介したアクセスを選択的に許可する方法であって、
コンピュータを用いて、許可されるアクセスの第1のレベルを有する情報の第1のセット又はデータの集合を指定するステップと、
コンピュータを用いて、許可されるアクセスの第2のレベルを有するデータの集合の情報の第2のセットを指定するステップであって、前記情報の第1のセット及び前記情報の第2のセットは、非一時的コンピュータ読み出し可能な媒体上に格納される、ステップと、
ユーザID及びパスワードのみを要求する認証処理を介して、前記情報の第1のセットへの、コンピュータネットワークを介したアクセスを許可するステップと、
ユーザID、パスワード、及びハードウェアトークンのみを要求する認証処理を介して、前記情報の第2のセットへの、コンピュータネットワークを介したアクセスを許可するステップと、
を含む方法。 - 同一セッションにおいて、ユーザID及びパスワードを用いて、前記情報の第1のセットへのアクセスの権限が既に与えられている場合、ハードウェアトークンのみを要求する認証処理を介して、前記情報の第2のセットへのアクセスを許可するステップを含む、
請求項1記載の方法。 - ユーザID及びパスワードのみを要求する認証処理を介して、前記情報の第1のセットへのアクセスを許可し、次いで、同一セッションにおいて、ハードウェアトークンのみを要求する更なる認証処理を介して、前記情報の第2のセットへのアクセスを許可するステップを含む、
請求項1記載の方法。 - 前記パスワードは、前記ハードウェアトークンのためのPINとしての役割を果たす、
請求項1記載の方法。 - コンピュータを用いて、許可されるアクセスの第3のレベルを有する情報の第3のセット又はデータの集合を指定するステップであって、前記情報の第3のセットは、非一時的コンピュータ読み出し可能な媒体上に格納される、ステップと、
認証処理を必要とすることなく、前記情報の第3のセットへの、コンピュータネットワークを介したアクセスを許可するステップと、を更に含む、
請求項1記載の方法。 - 単一のセッションにおいて、認証処理を必要とすることなく前記情報の第3のセットへのアクセスを許可し、次いで、前記情報の第3のセットへのアクセスを許可した後、ユーザID及びパスワードのみを要求する認証処理を介して、前記情報の第1のセットへのアクセスを許可し、次いで、前記情報の第1のセットへのアクセスを許可した後、ハードウェアトークンのみを要求する認証処理を介して、前記情報の第2のセットへのアクセスを許可するステップを含む、
請求項5記載の方法。 - 電子メッセージ配信リストを、オンラインディスカッションフォーラムと統合する方法であって、
配信リストに送信される全てのメッセージを、前記オンラインディスカッションフォーラムに投稿するステップを含む方法。 - 前記配信リストに送信されるメッセージの、前記オンラインディスカッションフォーラム上への投稿は、前記メッセージと関連付けられるディスカッションスレッドを含む、
請求項7記載の方法。 - 前記オンラインディスカッションフォーラムへのアクセスは、ユーザID及びパスワードのみを要求する認証処理を介して許可される、請求項7記載の方法。
- 前記オンラインディスカッションフォーラムへのアクセスは、ユーザID、パスワード、及びハードウェアトークンのみを要求する認証処理を介して、許可される、
請求項7記載の方法。 - 前記情報の第1のセットは、オンラインディスカッションフォーラムを含む、
請求項1記載の方法。 - 前記情報の第2のセットは、オンラインディスカッションフォーラムを含む、
請求項1記載の方法。
Applications Claiming Priority (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201261675610P | 2012-07-25 | 2012-07-25 | |
US61/675,610 | 2012-07-25 | ||
US201261675939P | 2012-07-26 | 2012-07-26 | |
US61/675,939 | 2012-07-26 | ||
US13/950,817 | 2013-07-25 | ||
US13/950,817 US20140164249A1 (en) | 2012-07-25 | 2013-07-25 | Method and system for secure authentication and information sharing and analysis |
PCT/US2013/052035 WO2014018743A2 (en) | 2012-07-25 | 2013-07-25 | Method and system for secure authentication and information sharing and analysis |
Publications (1)
Publication Number | Publication Date |
---|---|
JP2015534138A true JP2015534138A (ja) | 2015-11-26 |
Family
ID=49997974
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2015524446A Pending JP2015534138A (ja) | 2012-07-25 | 2013-07-25 | セキュアな認証及び情報の共有と分析のための方法及びシステム |
Country Status (5)
Country | Link |
---|---|
US (1) | US20140164249A1 (ja) |
JP (1) | JP2015534138A (ja) |
AU (1) | AU2013295701A1 (ja) |
CA (1) | CA2879735A1 (ja) |
WO (1) | WO2014018743A2 (ja) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10922034B2 (en) | 2019-03-25 | 2021-02-16 | Fuji Xerox Co., Ltd. | Information processing apparatus, information processing system, and non-transitory computer readable medium storing information processing program |
US11283811B2 (en) | 2019-03-20 | 2022-03-22 | Fujifilm Business Innovation Corp. | Information processing apparatus, information processing method, and non-transitory computer readable medium |
US11677731B2 (en) | 2020-04-29 | 2023-06-13 | Wells Fargo Bank, N.A. | Adaptive authentication |
US11973747B2 (en) | 2023-05-12 | 2024-04-30 | Wells Fargo Bank, N.A. | Adaptive authentication |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10430779B2 (en) * | 2014-04-08 | 2019-10-01 | Capital One Services Llc | Systems and methods for transacting at an ATM using a mobile device |
US10708778B2 (en) * | 2014-04-29 | 2020-07-07 | Taliware, Inc. | Method and system for authenticating an individual's geo-location via a communication network and applications using the same |
US11039314B2 (en) * | 2014-04-29 | 2021-06-15 | Taliware, Inc. | Method for passive authentication of an individual using an individual's geo-location via a communication network and blockchain associated recording of individual's authentication data |
RU2623903C2 (ru) * | 2014-09-19 | 2017-06-29 | Открытое акционерное общество "Концерн "Системпром" | Средство вычислительной техники для одновременной обработки информации разной конфиденциальности |
US20160315927A1 (en) * | 2015-04-21 | 2016-10-27 | Zte (Usa) Inc. | Method and system for establishing and managing personal black box (pbb) in virtually-networked big-data (vnbd) environment |
US10146915B2 (en) * | 2015-09-14 | 2018-12-04 | Salesforce.Com, Inc. | Publication of collaborative file to library |
US10140267B1 (en) | 2015-12-28 | 2018-11-27 | EMC IP Holding Company LLC | Efficient operation of GRC processing platforms |
US10205738B2 (en) | 2016-07-12 | 2019-02-12 | Cisco Technology, Inc. | Advanced persistent threat mitigation |
CN108171390A (zh) * | 2016-12-07 | 2018-06-15 | 中国科学院大连化学物理研究所 | 一种保密部门设备台账信息化动态管理系统 |
US11831688B2 (en) * | 2021-06-18 | 2023-11-28 | Capital One Services, Llc | Systems and methods for network security |
WO2023208742A1 (de) | 2022-04-29 | 2023-11-02 | Hte Gmbh The High Throughput Experimentation Company | Vorrichtung und verfahren zur herstellung von feststoffpartikeln |
DE202022102465U1 (de) | 2022-04-29 | 2022-05-12 | Hte Gmbh The High Throughput Experimentation Company | Vorrichtung zur Herstellung von Feststoffpartikeln |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008242926A (ja) * | 2007-03-28 | 2008-10-09 | Nomura Research Institute Ltd | 認証システム、認証方法および認証プログラム |
JP2008257492A (ja) * | 2007-04-05 | 2008-10-23 | Fuji Xerox Co Ltd | 認証処理プログラム、情報処理プログラム、認証処理装置、認証処理システムおよび情報処理システム |
JP2009288846A (ja) * | 2008-05-27 | 2009-12-10 | Nomura Research Institute Ltd | 情報提供装置および情報提供方法 |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7606865B2 (en) * | 2002-11-29 | 2009-10-20 | Grouptivity | Collaboration system and method |
CA2464797A1 (en) * | 2003-04-16 | 2004-10-16 | Wms Gaming Inc. | Remote authentication of gaming software in a gaming system environment |
WO2006004815A1 (en) * | 2004-06-25 | 2006-01-12 | Accenture Global Services Gmbh | Single sign-on with common access card |
US20060031174A1 (en) * | 2004-07-20 | 2006-02-09 | Scribocel, Inc. | Method of authentication and indentification for computerized and networked systems |
US7596697B2 (en) * | 2005-02-14 | 2009-09-29 | Tricipher, Inc. | Technique for providing multiple levels of security |
US20070266428A1 (en) * | 2006-03-06 | 2007-11-15 | James Downes | Method, System, And Apparatus For Nested Security Access/Authentication |
US8713705B2 (en) * | 2009-08-03 | 2014-04-29 | Eisst Ltd. | Application authentication system and method |
US8301653B2 (en) * | 2010-01-25 | 2012-10-30 | Glenn Adamousky | System and method for capturing and reporting online sessions |
-
2013
- 2013-07-25 WO PCT/US2013/052035 patent/WO2014018743A2/en active Application Filing
- 2013-07-25 US US13/950,817 patent/US20140164249A1/en not_active Abandoned
- 2013-07-25 JP JP2015524446A patent/JP2015534138A/ja active Pending
- 2013-07-25 CA CA2879735A patent/CA2879735A1/en not_active Abandoned
- 2013-07-25 AU AU2013295701A patent/AU2013295701A1/en not_active Abandoned
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008242926A (ja) * | 2007-03-28 | 2008-10-09 | Nomura Research Institute Ltd | 認証システム、認証方法および認証プログラム |
JP2008257492A (ja) * | 2007-04-05 | 2008-10-23 | Fuji Xerox Co Ltd | 認証処理プログラム、情報処理プログラム、認証処理装置、認証処理システムおよび情報処理システム |
JP2009288846A (ja) * | 2008-05-27 | 2009-12-10 | Nomura Research Institute Ltd | 情報提供装置および情報提供方法 |
Non-Patent Citations (1)
Title |
---|
実森 仁志: "インターネット・システム構築 成功への道", 日経インターネットテクノロジー 第62号 NIKKEI INTERNET TECHNOLOGY, JPN6017004532, 22 August 2002 (2002-08-22), JP, pages 98 - 101, ISSN: 0003499691 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11283811B2 (en) | 2019-03-20 | 2022-03-22 | Fujifilm Business Innovation Corp. | Information processing apparatus, information processing method, and non-transitory computer readable medium |
US10922034B2 (en) | 2019-03-25 | 2021-02-16 | Fuji Xerox Co., Ltd. | Information processing apparatus, information processing system, and non-transitory computer readable medium storing information processing program |
US11677731B2 (en) | 2020-04-29 | 2023-06-13 | Wells Fargo Bank, N.A. | Adaptive authentication |
US11973747B2 (en) | 2023-05-12 | 2024-04-30 | Wells Fargo Bank, N.A. | Adaptive authentication |
Also Published As
Publication number | Publication date |
---|---|
AU2013295701A1 (en) | 2015-02-19 |
US20140164249A1 (en) | 2014-06-12 |
WO2014018743A3 (en) | 2015-04-23 |
WO2014018743A2 (en) | 2014-01-30 |
CA2879735A1 (en) | 2014-01-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11847197B2 (en) | System and method for identity management | |
US11563728B2 (en) | System and method for identity management | |
JP2015534138A (ja) | セキュアな認証及び情報の共有と分析のための方法及びシステム | |
Uddin et al. | A dynamic access control model using authorising workflow and task-role-based access control | |
AU2014308610B2 (en) | System and method for identity management | |
CA2899996C (en) | Customizable secure data exchange environment | |
US8793804B2 (en) | Computer implemented method, computer system and nontransitory computer readable storage medium having HTTP module | |
Wheeler et al. | Cloud storage security: A practical guide | |
US20210141932A1 (en) | Data processing systems and methods for managing user system access | |
CN114117264A (zh) | 基于区块链的非法网站识别方法、装置、设备及存储介质 | |
Singh et al. | Compliance and regulatory standards for cloud computing | |
Rogers | An Overview of the Candware Program | |
Carvalho et al. | Portuguese Concerns and Impact on Behaviour About Cybersecurity: A Comparison with the European Average | |
Ahmad et al. | The information privacy domain | |
Johnson | Robust identity and access management for cloud systems | |
EP2878095A2 (en) | Method and system for secure authentication and information sharing and analysis | |
Aljohani et al. | A Brief Overview of E-Government Security | |
Alhamdani | Resilent Access Control Model | |
Neuman | Civil Law and Privacy | |
Xiang et al. | A Study on the Policies and Regulations of Cyber Electronic Identity Management | |
Guoquan | Secure cloud computing implementation study for Singapore military operations |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20160205 |
|
A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20170131 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20170221 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20170519 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20170721 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20170821 |
|
A02 | Decision of refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A02 Effective date: 20180130 |