JP5711361B2 - クレームベースのコンテンツ評価サービス - Google Patents

クレームベースのコンテンツ評価サービス Download PDF

Info

Publication number
JP5711361B2
JP5711361B2 JP2013513199A JP2013513199A JP5711361B2 JP 5711361 B2 JP5711361 B2 JP 5711361B2 JP 2013513199 A JP2013513199 A JP 2013513199A JP 2013513199 A JP2013513199 A JP 2013513199A JP 5711361 B2 JP5711361 B2 JP 5711361B2
Authority
JP
Japan
Prior art keywords
content
data item
data
sent
digital fingerprint
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
JP2013513199A
Other languages
English (en)
Japanese (ja)
Other versions
JP2013532328A5 (enExample
JP2013532328A (ja
Inventor
ビッソ ロバート
ビッソ ロバート
イスマイロフ バディム
イスマイロフ バディム
リウ リンリン
リウ リンリン
サコーン ロバート
サコーン ロバート
ベハール ムケシュクマール
ベハール ムケシュクマール
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Corp
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp filed Critical Microsoft Corp
Publication of JP2013532328A publication Critical patent/JP2013532328A/ja
Publication of JP2013532328A5 publication Critical patent/JP2013532328A5/ja
Application granted granted Critical
Publication of JP5711361B2 publication Critical patent/JP5711361B2/ja
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/14Details of searching files based on file metadata
    • G06F16/148File search processing
    • G06F16/152File search processing using file content signatures, e.g. hash values
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2228Indexing structures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/60Information retrieval; Database structures therefor; File system structures therefor of audio data
    • G06F16/68Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/683Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/70Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F16/78Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/783Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • G06F2201/83Indexing scheme relating to error detection, to error correction, and to monitoring the solution involving signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Library & Information Science (AREA)
  • Bioethics (AREA)
  • Virology (AREA)
  • Multimedia (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
JP2013513199A 2010-06-01 2011-05-17 クレームベースのコンテンツ評価サービス Expired - Fee Related JP5711361B2 (ja)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US12/791,305 2010-06-01
US12/791,305 US8732473B2 (en) 2010-06-01 2010-06-01 Claim based content reputation service
PCT/US2011/036733 WO2011152987A2 (en) 2010-06-01 2011-05-17 Claim based content reputation service

Publications (3)

Publication Number Publication Date
JP2013532328A JP2013532328A (ja) 2013-08-15
JP2013532328A5 JP2013532328A5 (enExample) 2014-05-29
JP5711361B2 true JP5711361B2 (ja) 2015-04-30

Family

ID=45023123

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2013513199A Expired - Fee Related JP5711361B2 (ja) 2010-06-01 2011-05-17 クレームベースのコンテンツ評価サービス

Country Status (8)

Country Link
US (1) US8732473B2 (enExample)
EP (1) EP2577523B1 (enExample)
JP (1) JP5711361B2 (enExample)
KR (1) KR101751566B1 (enExample)
CN (1) CN102918533B (enExample)
BR (1) BR112012030409A2 (enExample)
RU (1) RU2573760C2 (enExample)
WO (1) WO2011152987A2 (enExample)

Families Citing this family (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8432570B1 (en) * 2010-07-30 2013-04-30 Symantec Corporation Using bit arrays in incremental scanning of content for sensitive data
CN102831127B (zh) * 2011-06-17 2015-04-22 阿里巴巴集团控股有限公司 重复数据处理方法、装置及系统
CN102542658A (zh) * 2012-01-18 2012-07-04 朱成书 一种金融票据防伪认证管理系统
US9015745B2 (en) 2012-02-07 2015-04-21 Turner Broadcasting System, Inc. Method and system for detection of user-initiated events utilizing automatic content recognition
US9703932B2 (en) * 2012-04-30 2017-07-11 Excalibur Ip, Llc Continuous content identification of broadcast content
WO2014064323A1 (en) * 2012-10-23 2014-05-01 Nokia Corporation Method and apparatus for managing access rights
US9288509B2 (en) 2012-12-28 2016-03-15 Turner Broadcasting System, Inc. Method and system for providing synchronized advertisements and services
WO2015012867A1 (en) 2013-07-26 2015-01-29 Hewlett Packard Development Company, L.P. Data view based on context
US10108686B2 (en) * 2014-02-19 2018-10-23 Snowflake Computing Inc. Implementation of semi-structured data as a first-class database element
CN103973708B (zh) * 2014-05-26 2018-09-07 中电长城网际系统应用有限公司 一种外泄事件的确定方法和系统
CN104462451B (zh) * 2014-12-15 2017-12-05 中电长城网际系统应用有限公司 数据库文件敏感内容的检测方法和装置
US9667646B2 (en) * 2015-02-12 2017-05-30 Netapp, Inc. Maintaining dynamic configuration information of a multi-host off-cluster service on a cluster
KR102448863B1 (ko) * 2016-03-08 2022-09-30 엘지전자 주식회사 이동단말기 및 그 제어방법
ITUA20162953A1 (it) * 2016-04-28 2017-10-28 Tolemaica S R L Sistema informatico per la generazione di dati visivi e/o sonori certificati.
CN106407362A (zh) * 2016-09-08 2017-02-15 福建中金在线信息科技有限公司 一种关键词信息检索的方法及装置
US10701438B2 (en) 2016-12-31 2020-06-30 Turner Broadcasting System, Inc. Automatic content recognition and verification in a broadcast chain
US10511631B2 (en) * 2017-01-25 2019-12-17 Microsoft Technology Licensing, Llc Safe data access through any data channel
US11080564B2 (en) * 2018-09-28 2021-08-03 Microsoft Technology Licensing, Llc Content classification tool with re-classification techniques
CN110995679B (zh) * 2019-11-22 2022-03-01 杭州迪普科技股份有限公司 一种文件数据流控制方法、装置、设备及存储介质
US12287774B1 (en) * 2024-02-20 2025-04-29 Oracle International Corporation Techniques for automatically identifying undeclared composite key relationships in a database schema

Family Cites Families (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6119231A (en) 1997-10-31 2000-09-12 Cisco Technologies, Inc. Data scanning network security technique
US6094731A (en) * 1997-11-24 2000-07-25 Symantec Corporation Antivirus accelerator for computer networks
JP3871163B2 (ja) * 1998-02-13 2007-01-24 株式会社日立情報システムズ ウィルスチェック結果のサーバ転送・編集方法およびそのプログラム記録媒体
JP3533125B2 (ja) * 1999-12-03 2004-05-31 Necフィールディング株式会社 ソフトウェア管理方法、コンピュータウイルス駆除システム、および記録媒体
US6928550B1 (en) * 2000-01-06 2005-08-09 International Business Machines Corporation Method and system for generating and using a virus free file certificate
US6834308B1 (en) * 2000-02-17 2004-12-21 Audible Magic Corporation Method and apparatus for identifying media content presented on a media playing device
US7412462B2 (en) * 2000-02-18 2008-08-12 Burnside Acquisition, Llc Data repository and method for promoting network storage of data
US6611925B1 (en) 2000-06-13 2003-08-26 Networks Associates Technology, Inc. Single point of entry/origination item scanning within an enterprise or workgroup
US6928555B1 (en) * 2000-09-18 2005-08-09 Networks Associates Technology, Inc. Method and apparatus for minimizing file scanning by anti-virus programs
US7827611B2 (en) * 2001-08-01 2010-11-02 Mcafee, Inc. Malware scanning user interface for wireless devices
US6745192B1 (en) 2001-08-03 2004-06-01 Networks Associates Technology Inc. System and method for providing a multi-tiered hierarchical transient message store accessed using multiply hashed unique filenames
US6993660B1 (en) 2001-08-03 2006-01-31 Mcafee, Inc. System and method for performing efficient computer virus scanning of transient messages using checksums in a distributed computing environment
JP2003196111A (ja) * 2001-12-26 2003-07-11 Hitachi Ltd 電子署名を用いたウィルスチェック方法
JP2003216445A (ja) * 2002-01-23 2003-07-31 Hitachi Ltd コンピュータウイルスのチェック方法
US7742992B2 (en) * 2002-02-05 2010-06-22 Pace Anti-Piracy Delivery of a secure software license for a software product and a toolset for creating the software product
JP4088082B2 (ja) 2002-02-15 2008-05-21 株式会社東芝 未知コンピュータウイルスの感染を防止する装置およびプログラム
RU2005104956A (ru) * 2002-07-24 2005-07-20 Конинклейке Филипс Электроникс Н.В. (Nl) Способ и устройство для регулирования совместного использования файлов
EP1420323A1 (en) * 2002-11-18 2004-05-19 Koninklijke KPN N.V. Method and system for distribution of software components
US7398399B2 (en) 2003-12-12 2008-07-08 International Business Machines Corporation Apparatus, methods and computer programs for controlling performance of operations within a data processing system or network
US7581252B2 (en) 2004-07-20 2009-08-25 Lenovo (Singapore) Pte. Ltd. Storage conversion for anti-virus speed-up
GB0418066D0 (en) 2004-08-13 2004-09-15 Ibm A prioritization system
US20060095964A1 (en) * 2004-10-29 2006-05-04 Microsoft Corporation Document stamping antivirus manifest
US7818350B2 (en) * 2005-02-28 2010-10-19 Yahoo! Inc. System and method for creating a collaborative playlist
US9002744B2 (en) 2006-07-28 2015-04-07 Sony Corporation Methods, systems and computer program products for determining usage rights for digital content based on characterizing information thereof and related devices
US8312536B2 (en) * 2006-12-29 2012-11-13 Symantec Corporation Hygiene-based computer security
JP4935468B2 (ja) * 2007-04-03 2012-05-23 ソニー株式会社 情報処理装置、および情報処理方法、並びにコンピュータ・プログラム
US8291496B2 (en) * 2008-05-12 2012-10-16 Enpulz, L.L.C. Server based malware screening
JP4710966B2 (ja) * 2008-12-12 2011-06-29 コニカミノルタビジネステクノロジーズ株式会社 画像処理装置、画像処理装置の制御方法、及び画像処理装置の制御プログラム
US8683216B2 (en) * 2010-07-13 2014-03-25 F-Secure Corporation Identifying polymorphic malware

Also Published As

Publication number Publication date
WO2011152987A2 (en) 2011-12-08
US20110296187A1 (en) 2011-12-01
KR20130120367A (ko) 2013-11-04
WO2011152987A3 (en) 2012-03-29
RU2573760C2 (ru) 2016-01-27
CN102918533B (zh) 2016-08-03
RU2012151502A (ru) 2014-06-10
US8732473B2 (en) 2014-05-20
JP2013532328A (ja) 2013-08-15
KR101751566B1 (ko) 2017-07-11
CN102918533A (zh) 2013-02-06
EP2577523A2 (en) 2013-04-10
HK1180785A1 (zh) 2013-10-25
EP2577523A4 (en) 2015-04-22
BR112012030409A2 (pt) 2016-08-09
EP2577523B1 (en) 2019-02-27

Similar Documents

Publication Publication Date Title
JP5711361B2 (ja) クレームベースのコンテンツ評価サービス
US11985170B2 (en) Endpoint data loss prevention (DLP)
US10574770B2 (en) Managing notifications across multiple devices
JP7402183B2 (ja) 小さいフットプリントのエンドポイント・データ損失防止(dlp)
US10511633B2 (en) Trusted-code generated requests
JP2021524963A (ja) 許可型ブロックチェーンにおける優先順位付け
US9338166B2 (en) System and method for a single request and single response authentication protocol
US20150271267A1 (en) Content-oriented federated object store
CN111356995A (zh) 跨全异的不可变分布式账本网络进行身份解析的系统和方法
CN105308614B (zh) 策略强制执行延迟
US20180234234A1 (en) System for describing and tracking the creation and evolution of digital files
CN103795702A (zh) 用于数据的发送控制
CA3088147C (en) Data isolation in distributed hash chains
CN119278443A (zh) 查询处理系统中的投影约束
US12314425B2 (en) Privacy data management in distributed computing systems
CN116601925A (zh) 用于数据通信的系统和方法
US20180198612A1 (en) Strong resource identity in a cloud hosted system
JP2024535211A (ja) 信頼できる台帳を使用して個人情報を安全に管理するためのシステム及び方法
US11449372B1 (en) System for enforcing use of schemas and interfaces
CN114422586A (zh) 事件通知方法、装置、计算机设备及存储介质
US12468829B2 (en) Enterprise data container
HK1180785B (en) Claim based content reputation service
CN121153229A (zh) 用于在单向传送系统中抽象安全性控件的软件引擎

Legal Events

Date Code Title Description
RD03 Notification of appointment of power of attorney

Free format text: JAPANESE INTERMEDIATE CODE: A7423

Effective date: 20130703

RD04 Notification of resignation of power of attorney

Free format text: JAPANESE INTERMEDIATE CODE: A7424

Effective date: 20130717

A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20140414

A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20140414

A977 Report on retrieval

Free format text: JAPANESE INTERMEDIATE CODE: A971007

Effective date: 20150116

TRDD Decision of grant or rejection written
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 20150204

A61 First payment of annual fees (during grant procedure)

Free format text: JAPANESE INTERMEDIATE CODE: A61

Effective date: 20150305

R150 Certificate of patent or registration of utility model

Ref document number: 5711361

Country of ref document: JP

Free format text: JAPANESE INTERMEDIATE CODE: R150

S111 Request for change of ownership or part of ownership

Free format text: JAPANESE INTERMEDIATE CODE: R313113

R350 Written notification of registration of transfer

Free format text: JAPANESE INTERMEDIATE CODE: R350

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

LAPS Cancellation because of no payment of annual fees