JP4972165B2 - アイデンティティオブジェクトを使用する制御システムおよび方法 - Google Patents

アイデンティティオブジェクトを使用する制御システムおよび方法 Download PDF

Info

Publication number
JP4972165B2
JP4972165B2 JP2009518355A JP2009518355A JP4972165B2 JP 4972165 B2 JP4972165 B2 JP 4972165B2 JP 2009518355 A JP2009518355 A JP 2009518355A JP 2009518355 A JP2009518355 A JP 2009518355A JP 4972165 B2 JP4972165 B2 JP 4972165B2
Authority
JP
Japan
Prior art keywords
certificate
acr
host
key
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
JP2009518355A
Other languages
English (en)
Japanese (ja)
Other versions
JP2009543210A5 (https=
JP2009543210A (ja
Inventor
ホルツマン,マイケル
バージライ,ロン
ジョガンド−クーロン,ファブリス
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SanDisk Corp
Original Assignee
SanDisk Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US11/557,039 external-priority patent/US20080010458A1/en
Priority claimed from US11/557,041 external-priority patent/US8639939B2/en
Application filed by SanDisk Corp filed Critical SanDisk Corp
Publication of JP2009543210A publication Critical patent/JP2009543210A/ja
Publication of JP2009543210A5 publication Critical patent/JP2009543210A5/ja
Application granted granted Critical
Publication of JP4972165B2 publication Critical patent/JP4972165B2/ja
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/72Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/86Secure or tamper-resistant housings
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Mathematical Physics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
JP2009518355A 2006-07-07 2007-06-28 アイデンティティオブジェクトを使用する制御システムおよび方法 Expired - Fee Related JP4972165B2 (ja)

Applications Claiming Priority (7)

Application Number Priority Date Filing Date Title
US81950706P 2006-07-07 2006-07-07
US60/819,507 2006-07-07
US11/557,039 2006-11-06
US11/557,041 2006-11-06
US11/557,039 US20080010458A1 (en) 2006-07-07 2006-11-06 Control System Using Identity Objects
US11/557,041 US8639939B2 (en) 2006-07-07 2006-11-06 Control method using identity objects
PCT/US2007/015430 WO2008008243A2 (en) 2006-07-07 2007-06-28 Control system and method using identity objects

Publications (3)

Publication Number Publication Date
JP2009543210A JP2009543210A (ja) 2009-12-03
JP2009543210A5 JP2009543210A5 (https=) 2012-04-12
JP4972165B2 true JP4972165B2 (ja) 2012-07-11

Family

ID=38728800

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2009518355A Expired - Fee Related JP4972165B2 (ja) 2006-07-07 2007-06-28 アイデンティティオブジェクトを使用する制御システムおよび方法

Country Status (5)

Country Link
EP (1) EP2038799A2 (https=)
JP (1) JP4972165B2 (https=)
KR (1) KR20090034332A (https=)
TW (1) TW200822669A (https=)
WO (1) WO2008008243A2 (https=)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7743409B2 (en) 2005-07-08 2010-06-22 Sandisk Corporation Methods used in a mass storage device with automated credentials loading
FR2954656B1 (fr) 2009-12-23 2016-01-08 Oberthur Technologies Dispositif electronique portable et procede associe de mise a disposition d'informations
JP2016019120A (ja) * 2014-07-08 2016-02-01 日本電気通信システム株式会社 復号装置、通信システム、復号方法、および、プログラム
CN112738643B (zh) * 2020-12-24 2022-09-23 北京睿芯高通量科技有限公司 一种使用动态密钥实现监控视频安全传输的系统及方法

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3012407B2 (ja) * 1992-08-31 2000-02-21 日本電気アイシーマイコンシステム株式会社 レベル変換回路
US5473692A (en) * 1994-09-07 1995-12-05 Intel Corporation Roving software license for a hardware agent
US5778071A (en) * 1994-07-12 1998-07-07 Information Resource Engineering, Inc. Pocket encrypting and authenticating communications device
US6584495B1 (en) * 1998-01-30 2003-06-24 Microsoft Corporation Unshared scratch space
US6779113B1 (en) * 1999-11-05 2004-08-17 Microsoft Corporation Integrated circuit card with situation dependent identity authentication
WO2006069274A2 (en) * 2004-12-21 2006-06-29 Sandisk Corporation Versatile content control with partitioning

Also Published As

Publication number Publication date
TW200822669A (en) 2008-05-16
EP2038799A2 (en) 2009-03-25
KR20090034332A (ko) 2009-04-07
WO2008008243A3 (en) 2008-02-28
WO2008008243A2 (en) 2008-01-17
JP2009543210A (ja) 2009-12-03

Similar Documents

Publication Publication Date Title
JP5180203B2 (ja) メモリ装置から供給される情報を制御するシステムおよび方法
CN101490687B (zh) 使用身份对象的控制系统及方法
US8613103B2 (en) Content control method using versatile control structure
US8140843B2 (en) Content control method using certificate chains
US8639939B2 (en) Control method using identity objects
US8245031B2 (en) Content control method using certificate revocation lists
US8266711B2 (en) Method for controlling information supplied from memory device
JP2013514587A (ja) 証明書失効リストを用いたコンテンツ管理方法
US20080034440A1 (en) Content Control System Using Versatile Control Structure
US20080010452A1 (en) Content Control System Using Certificate Revocation Lists
US20080010449A1 (en) Content Control System Using Certificate Chains
US20080022395A1 (en) System for Controlling Information Supplied From Memory Device
US20080010458A1 (en) Control System Using Identity Objects
JP5178716B2 (ja) 証明書取消リストを使用するコンテンツ管理システムおよび方法
JP2009543211A (ja) 汎用管理構造を使用するコンテンツ管理システムおよび方法
JP2009543208A (ja) 証明書連鎖を使用するコンテンツ管理システムおよび方法
JP2009543208A5 (https=)
JP4972165B2 (ja) アイデンティティオブジェクトを使用する制御システムおよび方法
JP2009543210A5 (https=)

Legal Events

Date Code Title Description
A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20091008

A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20100623

A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20100623

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20111025

A601 Written request for extension of time

Free format text: JAPANESE INTERMEDIATE CODE: A601

Effective date: 20120125

A602 Written permission of extension of time

Free format text: JAPANESE INTERMEDIATE CODE: A602

Effective date: 20120201

A524 Written submission of copy of amendment under article 19 pct

Free format text: JAPANESE INTERMEDIATE CODE: A524

Effective date: 20120224

TRDD Decision of grant or rejection written
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 20120327

A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

A61 First payment of annual fees (during grant procedure)

Free format text: JAPANESE INTERMEDIATE CODE: A61

Effective date: 20120406

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20150413

Year of fee payment: 3

R150 Certificate of patent or registration of utility model

Free format text: JAPANESE INTERMEDIATE CODE: R150

S111 Request for change of ownership or part of ownership

Free format text: JAPANESE INTERMEDIATE CODE: R313113

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20150413

Year of fee payment: 3

R350 Written notification of registration of transfer

Free format text: JAPANESE INTERMEDIATE CODE: R350

LAPS Cancellation because of no payment of annual fees