JP2024536689A - データ管理及び統治システム及び方法 - Google Patents
データ管理及び統治システム及び方法 Download PDFInfo
- Publication number
- JP2024536689A JP2024536689A JP2024510622A JP2024510622A JP2024536689A JP 2024536689 A JP2024536689 A JP 2024536689A JP 2024510622 A JP2024510622 A JP 2024510622A JP 2024510622 A JP2024510622 A JP 2024510622A JP 2024536689 A JP2024536689 A JP 2024536689A
- Authority
- JP
- Japan
- Prior art keywords
- data
- service
- access
- user
- data management
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
- G06F21/335—User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Power Engineering (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US202163243067P | 2021-09-10 | 2021-09-10 | |
| US63/243,067 | 2021-09-10 | ||
| PCT/US2022/043158 WO2023039225A1 (en) | 2021-09-10 | 2022-09-09 | Data management and governance systems and methods |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| JP2024536689A true JP2024536689A (ja) | 2024-10-08 |
| JPWO2023039225A5 JPWO2023039225A5 (https=) | 2025-10-03 |
| JP2024536689A5 JP2024536689A5 (https=) | 2025-10-03 |
Family
ID=83690510
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2024510622A Pending JP2024536689A (ja) | 2021-09-10 | 2022-09-09 | データ管理及び統治システム及び方法 |
Country Status (5)
| Country | Link |
|---|---|
| US (2) | US12277214B2 (https=) |
| EP (1) | EP4399634A1 (https=) |
| JP (1) | JP2024536689A (https=) |
| AU (1) | AU2022341301A1 (https=) |
| WO (1) | WO2023039225A1 (https=) |
Families Citing this family (13)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US12093286B2 (en) * | 2021-11-19 | 2024-09-17 | Intertrust Technologies Corporation | Time series data management systems and methods |
| US12111940B1 (en) * | 2021-12-03 | 2024-10-08 | Amazon Technologies, Inc. | Authorizing access to operating system resources using security policies managed by service external to the operating system |
| US12045365B2 (en) * | 2022-01-07 | 2024-07-23 | International Business Machines Corporation | Governed database connectivity (GDBC) through and around data catalog to registered data sources |
| US11762755B2 (en) * | 2022-01-28 | 2023-09-19 | Jpmorgan Chase Bank, N.A. | Systems and methods for non-human account tracking |
| US20240007300A1 (en) * | 2022-06-29 | 2024-01-04 | University Of South Florida | System and method for cryptographic forensic audits on lightweight iot and digital archives |
| US20250267192A1 (en) * | 2022-11-10 | 2025-08-21 | Robin Systems, Inc | Mounting Persistent Data Volumes in Multiple Bundle Applications |
| US11886872B1 (en) * | 2023-02-15 | 2024-01-30 | Snowflake Inc. | In-database application package and application |
| CN116226894B (zh) * | 2023-05-10 | 2023-08-04 | 杭州比智科技有限公司 | 一种基于元仓的数据安全治理系统及方法 |
| CN116662603B (zh) * | 2023-07-28 | 2023-10-20 | 江西云眼视界科技股份有限公司 | 基于kafka的时间轴管控方法、系统、电子设备及存储介质 |
| US20250240293A1 (en) * | 2024-01-19 | 2025-07-24 | Dell Products L.P. | Multi-tenant secrets manager |
| CN117648297B (zh) * | 2024-01-30 | 2024-06-11 | 中国人民解放军国防科技大学 | 基于对象存储小文件离线合并方法、系统、设备及介质 |
| US20260093713A1 (en) * | 2024-09-30 | 2026-04-02 | Amazon Technologies, Inc. | Multi-level database catalog |
| US12609967B1 (en) * | 2025-11-06 | 2026-04-21 | Morgan Stanley Services Group Inc. | System and method for unified access management for federated technology infrastructure |
Family Cites Families (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9262622B2 (en) * | 2013-12-06 | 2016-02-16 | Bank Of America Corporation | Secure connection between a data repository and an intelligence application |
| US10789207B2 (en) * | 2015-07-27 | 2020-09-29 | Sas Institute Inc. | Distributed data storage grouping |
| US10878079B2 (en) * | 2016-05-11 | 2020-12-29 | Oracle International Corporation | Identity cloud service authorization model with dynamic roles and scopes |
| US11636220B2 (en) * | 2019-02-01 | 2023-04-25 | Intertrust Technologies Corporation | Data management systems and methods |
-
2022
- 2022-09-09 JP JP2024510622A patent/JP2024536689A/ja active Pending
- 2022-09-09 EP EP22789365.8A patent/EP4399634A1/en active Pending
- 2022-09-09 WO PCT/US2022/043158 patent/WO2023039225A1/en not_active Ceased
- 2022-09-09 US US17/942,097 patent/US12277214B2/en active Active
- 2022-09-09 AU AU2022341301A patent/AU2022341301A1/en active Pending
-
2025
- 2025-02-07 US US19/048,743 patent/US20250181706A1/en active Pending
Also Published As
| Publication number | Publication date |
|---|---|
| US20250181706A1 (en) | 2025-06-05 |
| US12277214B2 (en) | 2025-04-15 |
| WO2023039225A1 (en) | 2023-03-16 |
| US20230090190A1 (en) | 2023-03-23 |
| AU2022341301A1 (en) | 2024-03-07 |
| EP4399634A1 (en) | 2024-07-17 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12277214B2 (en) | Data management and governance systems and methods | |
| Ferrari | Access Control in Data Management Systems: A Visual Querying Perspective | |
| US20220021711A1 (en) | Security Platform and Method for Efficient Access and Discovery | |
| Colombo et al. | Access control technologies for Big Data management systems: literature review and future trends | |
| US10936739B1 (en) | Dynamically granting and enforcing rights on a protected document | |
| US9524308B2 (en) | System and method for providing pluggable security in an enterprise crawl and search framework environment | |
| US20230244804A1 (en) | Data management systems and methods | |
| US9053302B2 (en) | Obligation system for enterprise environments | |
| US8365254B2 (en) | Unified authorization for heterogeneous applications | |
| EP3353701B1 (en) | Policy management for data migration | |
| JP4892179B2 (ja) | データ項目のためのゾーンベースのセキュリティ管理 | |
| US20060294051A1 (en) | Uniform access to entities in registered data store services | |
| US20120185911A1 (en) | Mlweb: a multilevel web application framework | |
| US20230315893A1 (en) | Row, Column Level Security for Data Lakes and its Uniform Enforcement Across Analytic Query Engines | |
| Shermin | An access control model for nosql databases | |
| Bücker et al. | Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security | |
| Ma et al. | Study on access control for cloud storage security | |
| Shaw et al. | Hive security | |
| Siriah et al. | MongoDB with privacy access control | |
| Sánchez et al. | An Intercepting API-Based Access Control Approach for Mobile Applications. | |
| Gharajeh | Security issues and privacy challenges of NoSQL databases | |
| Carter | SQL Server Security Model | |
| Pasam et al. | Security and Compliance | |
| Aneja et al. | Security and Privacy: Challenges and Defending Solutions for NoSQL Data Stores | |
| Munier | A secure autonomous document architecture for enterprise digital right management |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20250908 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20250925 |