JP5711361B2 - クレームベースのコンテンツ評価サービス - Google Patents
クレームベースのコンテンツ評価サービス Download PDFInfo
- Publication number
- JP5711361B2 JP5711361B2 JP2013513199A JP2013513199A JP5711361B2 JP 5711361 B2 JP5711361 B2 JP 5711361B2 JP 2013513199 A JP2013513199 A JP 2013513199A JP 2013513199 A JP2013513199 A JP 2013513199A JP 5711361 B2 JP5711361 B2 JP 5711361B2
- Authority
- JP
- Japan
- Prior art keywords
- content
- data item
- data
- sent
- digital fingerprint
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/14—Details of searching files based on file metadata
- G06F16/148—File search processing
- G06F16/152—File search processing using file content signatures, e.g. hash values
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
- G06F16/2228—Indexing structures
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/60—Information retrieval; Database structures therefor; File system structures therefor of audio data
- G06F16/68—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
- G06F16/683—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/70—Information retrieval; Database structures therefor; File system structures therefor of video data
- G06F16/78—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
- G06F16/783—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
- G06F2201/83—Indexing scheme relating to error detection, to error correction, and to monitoring the solution involving signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Data Mining & Analysis (AREA)
- Library & Information Science (AREA)
- Bioethics (AREA)
- Virology (AREA)
- Multimedia (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US12/791,305 | 2010-06-01 | ||
| US12/791,305 US8732473B2 (en) | 2010-06-01 | 2010-06-01 | Claim based content reputation service |
| PCT/US2011/036733 WO2011152987A2 (en) | 2010-06-01 | 2011-05-17 | Claim based content reputation service |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| JP2013532328A JP2013532328A (ja) | 2013-08-15 |
| JP2013532328A5 JP2013532328A5 (enExample) | 2014-05-29 |
| JP5711361B2 true JP5711361B2 (ja) | 2015-04-30 |
Family
ID=45023123
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2013513199A Expired - Fee Related JP5711361B2 (ja) | 2010-06-01 | 2011-05-17 | クレームベースのコンテンツ評価サービス |
Country Status (8)
| Country | Link |
|---|---|
| US (1) | US8732473B2 (enExample) |
| EP (1) | EP2577523B1 (enExample) |
| JP (1) | JP5711361B2 (enExample) |
| KR (1) | KR101751566B1 (enExample) |
| CN (1) | CN102918533B (enExample) |
| BR (1) | BR112012030409A2 (enExample) |
| RU (1) | RU2573760C2 (enExample) |
| WO (1) | WO2011152987A2 (enExample) |
Families Citing this family (20)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8432570B1 (en) * | 2010-07-30 | 2013-04-30 | Symantec Corporation | Using bit arrays in incremental scanning of content for sensitive data |
| CN102831127B (zh) * | 2011-06-17 | 2015-04-22 | 阿里巴巴集团控股有限公司 | 重复数据处理方法、装置及系统 |
| CN102542658A (zh) * | 2012-01-18 | 2012-07-04 | 朱成书 | 一种金融票据防伪认证管理系统 |
| US9015745B2 (en) | 2012-02-07 | 2015-04-21 | Turner Broadcasting System, Inc. | Method and system for detection of user-initiated events utilizing automatic content recognition |
| US9703932B2 (en) * | 2012-04-30 | 2017-07-11 | Excalibur Ip, Llc | Continuous content identification of broadcast content |
| WO2014064323A1 (en) * | 2012-10-23 | 2014-05-01 | Nokia Corporation | Method and apparatus for managing access rights |
| US9288509B2 (en) | 2012-12-28 | 2016-03-15 | Turner Broadcasting System, Inc. | Method and system for providing synchronized advertisements and services |
| WO2015012867A1 (en) | 2013-07-26 | 2015-01-29 | Hewlett Packard Development Company, L.P. | Data view based on context |
| US10108686B2 (en) * | 2014-02-19 | 2018-10-23 | Snowflake Computing Inc. | Implementation of semi-structured data as a first-class database element |
| CN103973708B (zh) * | 2014-05-26 | 2018-09-07 | 中电长城网际系统应用有限公司 | 一种外泄事件的确定方法和系统 |
| CN104462451B (zh) * | 2014-12-15 | 2017-12-05 | 中电长城网际系统应用有限公司 | 数据库文件敏感内容的检测方法和装置 |
| US9667646B2 (en) * | 2015-02-12 | 2017-05-30 | Netapp, Inc. | Maintaining dynamic configuration information of a multi-host off-cluster service on a cluster |
| KR102448863B1 (ko) * | 2016-03-08 | 2022-09-30 | 엘지전자 주식회사 | 이동단말기 및 그 제어방법 |
| ITUA20162953A1 (it) * | 2016-04-28 | 2017-10-28 | Tolemaica S R L | Sistema informatico per la generazione di dati visivi e/o sonori certificati. |
| CN106407362A (zh) * | 2016-09-08 | 2017-02-15 | 福建中金在线信息科技有限公司 | 一种关键词信息检索的方法及装置 |
| US10701438B2 (en) | 2016-12-31 | 2020-06-30 | Turner Broadcasting System, Inc. | Automatic content recognition and verification in a broadcast chain |
| US10511631B2 (en) * | 2017-01-25 | 2019-12-17 | Microsoft Technology Licensing, Llc | Safe data access through any data channel |
| US11080564B2 (en) * | 2018-09-28 | 2021-08-03 | Microsoft Technology Licensing, Llc | Content classification tool with re-classification techniques |
| CN110995679B (zh) * | 2019-11-22 | 2022-03-01 | 杭州迪普科技股份有限公司 | 一种文件数据流控制方法、装置、设备及存储介质 |
| US12287774B1 (en) * | 2024-02-20 | 2025-04-29 | Oracle International Corporation | Techniques for automatically identifying undeclared composite key relationships in a database schema |
Family Cites Families (29)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6119231A (en) | 1997-10-31 | 2000-09-12 | Cisco Technologies, Inc. | Data scanning network security technique |
| US6094731A (en) * | 1997-11-24 | 2000-07-25 | Symantec Corporation | Antivirus accelerator for computer networks |
| JP3871163B2 (ja) * | 1998-02-13 | 2007-01-24 | 株式会社日立情報システムズ | ウィルスチェック結果のサーバ転送・編集方法およびそのプログラム記録媒体 |
| JP3533125B2 (ja) * | 1999-12-03 | 2004-05-31 | Necフィールディング株式会社 | ソフトウェア管理方法、コンピュータウイルス駆除システム、および記録媒体 |
| US6928550B1 (en) * | 2000-01-06 | 2005-08-09 | International Business Machines Corporation | Method and system for generating and using a virus free file certificate |
| US6834308B1 (en) * | 2000-02-17 | 2004-12-21 | Audible Magic Corporation | Method and apparatus for identifying media content presented on a media playing device |
| US7412462B2 (en) * | 2000-02-18 | 2008-08-12 | Burnside Acquisition, Llc | Data repository and method for promoting network storage of data |
| US6611925B1 (en) | 2000-06-13 | 2003-08-26 | Networks Associates Technology, Inc. | Single point of entry/origination item scanning within an enterprise or workgroup |
| US6928555B1 (en) * | 2000-09-18 | 2005-08-09 | Networks Associates Technology, Inc. | Method and apparatus for minimizing file scanning by anti-virus programs |
| US7827611B2 (en) * | 2001-08-01 | 2010-11-02 | Mcafee, Inc. | Malware scanning user interface for wireless devices |
| US6745192B1 (en) | 2001-08-03 | 2004-06-01 | Networks Associates Technology Inc. | System and method for providing a multi-tiered hierarchical transient message store accessed using multiply hashed unique filenames |
| US6993660B1 (en) | 2001-08-03 | 2006-01-31 | Mcafee, Inc. | System and method for performing efficient computer virus scanning of transient messages using checksums in a distributed computing environment |
| JP2003196111A (ja) * | 2001-12-26 | 2003-07-11 | Hitachi Ltd | 電子署名を用いたウィルスチェック方法 |
| JP2003216445A (ja) * | 2002-01-23 | 2003-07-31 | Hitachi Ltd | コンピュータウイルスのチェック方法 |
| US7742992B2 (en) * | 2002-02-05 | 2010-06-22 | Pace Anti-Piracy | Delivery of a secure software license for a software product and a toolset for creating the software product |
| JP4088082B2 (ja) | 2002-02-15 | 2008-05-21 | 株式会社東芝 | 未知コンピュータウイルスの感染を防止する装置およびプログラム |
| RU2005104956A (ru) * | 2002-07-24 | 2005-07-20 | Конинклейке Филипс Электроникс Н.В. (Nl) | Способ и устройство для регулирования совместного использования файлов |
| EP1420323A1 (en) * | 2002-11-18 | 2004-05-19 | Koninklijke KPN N.V. | Method and system for distribution of software components |
| US7398399B2 (en) | 2003-12-12 | 2008-07-08 | International Business Machines Corporation | Apparatus, methods and computer programs for controlling performance of operations within a data processing system or network |
| US7581252B2 (en) | 2004-07-20 | 2009-08-25 | Lenovo (Singapore) Pte. Ltd. | Storage conversion for anti-virus speed-up |
| GB0418066D0 (en) | 2004-08-13 | 2004-09-15 | Ibm | A prioritization system |
| US20060095964A1 (en) * | 2004-10-29 | 2006-05-04 | Microsoft Corporation | Document stamping antivirus manifest |
| US7818350B2 (en) * | 2005-02-28 | 2010-10-19 | Yahoo! Inc. | System and method for creating a collaborative playlist |
| US9002744B2 (en) | 2006-07-28 | 2015-04-07 | Sony Corporation | Methods, systems and computer program products for determining usage rights for digital content based on characterizing information thereof and related devices |
| US8312536B2 (en) * | 2006-12-29 | 2012-11-13 | Symantec Corporation | Hygiene-based computer security |
| JP4935468B2 (ja) * | 2007-04-03 | 2012-05-23 | ソニー株式会社 | 情報処理装置、および情報処理方法、並びにコンピュータ・プログラム |
| US8291496B2 (en) * | 2008-05-12 | 2012-10-16 | Enpulz, L.L.C. | Server based malware screening |
| JP4710966B2 (ja) * | 2008-12-12 | 2011-06-29 | コニカミノルタビジネステクノロジーズ株式会社 | 画像処理装置、画像処理装置の制御方法、及び画像処理装置の制御プログラム |
| US8683216B2 (en) * | 2010-07-13 | 2014-03-25 | F-Secure Corporation | Identifying polymorphic malware |
-
2010
- 2010-06-01 US US12/791,305 patent/US8732473B2/en active Active
-
2011
- 2011-05-17 CN CN201180027177.5A patent/CN102918533B/zh active Active
- 2011-05-17 JP JP2013513199A patent/JP5711361B2/ja not_active Expired - Fee Related
- 2011-05-17 KR KR1020127031360A patent/KR101751566B1/ko active Active
- 2011-05-17 RU RU2012151502/08A patent/RU2573760C2/ru not_active IP Right Cessation
- 2011-05-17 BR BR112012030409A patent/BR112012030409A2/pt not_active IP Right Cessation
- 2011-05-17 WO PCT/US2011/036733 patent/WO2011152987A2/en not_active Ceased
- 2011-05-17 EP EP11790177.7A patent/EP2577523B1/en active Active
Also Published As
| Publication number | Publication date |
|---|---|
| WO2011152987A2 (en) | 2011-12-08 |
| US20110296187A1 (en) | 2011-12-01 |
| KR20130120367A (ko) | 2013-11-04 |
| WO2011152987A3 (en) | 2012-03-29 |
| RU2573760C2 (ru) | 2016-01-27 |
| CN102918533B (zh) | 2016-08-03 |
| RU2012151502A (ru) | 2014-06-10 |
| US8732473B2 (en) | 2014-05-20 |
| JP2013532328A (ja) | 2013-08-15 |
| KR101751566B1 (ko) | 2017-07-11 |
| CN102918533A (zh) | 2013-02-06 |
| EP2577523A2 (en) | 2013-04-10 |
| HK1180785A1 (zh) | 2013-10-25 |
| EP2577523A4 (en) | 2015-04-22 |
| BR112012030409A2 (pt) | 2016-08-09 |
| EP2577523B1 (en) | 2019-02-27 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP5711361B2 (ja) | クレームベースのコンテンツ評価サービス | |
| US11985170B2 (en) | Endpoint data loss prevention (DLP) | |
| US10574770B2 (en) | Managing notifications across multiple devices | |
| JP7402183B2 (ja) | 小さいフットプリントのエンドポイント・データ損失防止(dlp) | |
| US10511633B2 (en) | Trusted-code generated requests | |
| JP2021524963A (ja) | 許可型ブロックチェーンにおける優先順位付け | |
| US9338166B2 (en) | System and method for a single request and single response authentication protocol | |
| US20150271267A1 (en) | Content-oriented federated object store | |
| CN111356995A (zh) | 跨全异的不可变分布式账本网络进行身份解析的系统和方法 | |
| CN105308614B (zh) | 策略强制执行延迟 | |
| US20180234234A1 (en) | System for describing and tracking the creation and evolution of digital files | |
| CN103795702A (zh) | 用于数据的发送控制 | |
| CA3088147C (en) | Data isolation in distributed hash chains | |
| CN119278443A (zh) | 查询处理系统中的投影约束 | |
| US12314425B2 (en) | Privacy data management in distributed computing systems | |
| CN116601925A (zh) | 用于数据通信的系统和方法 | |
| US20180198612A1 (en) | Strong resource identity in a cloud hosted system | |
| JP2024535211A (ja) | 信頼できる台帳を使用して個人情報を安全に管理するためのシステム及び方法 | |
| US11449372B1 (en) | System for enforcing use of schemas and interfaces | |
| CN114422586A (zh) | 事件通知方法、装置、计算机设备及存储介质 | |
| US12468829B2 (en) | Enterprise data container | |
| HK1180785B (en) | Claim based content reputation service | |
| CN121153229A (zh) | 用于在单向传送系统中抽象安全性控件的软件引擎 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| RD03 | Notification of appointment of power of attorney |
Free format text: JAPANESE INTERMEDIATE CODE: A7423 Effective date: 20130703 |
|
| RD04 | Notification of resignation of power of attorney |
Free format text: JAPANESE INTERMEDIATE CODE: A7424 Effective date: 20130717 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20140414 |
|
| A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20140414 |
|
| A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20150116 |
|
| TRDD | Decision of grant or rejection written | ||
| A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20150204 |
|
| A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20150305 |
|
| R150 | Certificate of patent or registration of utility model |
Ref document number: 5711361 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
| S111 | Request for change of ownership or part of ownership |
Free format text: JAPANESE INTERMEDIATE CODE: R313113 |
|
| R350 | Written notification of registration of transfer |
Free format text: JAPANESE INTERMEDIATE CODE: R350 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| LAPS | Cancellation because of no payment of annual fees |