JP6198231B2 - デバイスデータのためのセキュリティポリシー - Google Patents

デバイスデータのためのセキュリティポリシー Download PDF

Info

Publication number
JP6198231B2
JP6198231B2 JP2014556566A JP2014556566A JP6198231B2 JP 6198231 B2 JP6198231 B2 JP 6198231B2 JP 2014556566 A JP2014556566 A JP 2014556566A JP 2014556566 A JP2014556566 A JP 2014556566A JP 6198231 B2 JP6198231 B2 JP 6198231B2
Authority
JP
Japan
Prior art keywords
security
key
recovery
security key
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
JP2014556566A
Other languages
English (en)
Japanese (ja)
Other versions
JP2015508257A5 (enExample
JP2015508257A (ja
Inventor
インガルズ,ダスティン,マイケル
アイド,ネイサン,ジェイ.
マコーレイ,クリストファー,アール.
ウレケ,オクタヴィアン,ティー.
ジェイ. グラス,マイケル
ジェイ. グラス,マイケル
ヴィナヤク,サイ
アダム,プレストン,デレク
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Corp
Microsoft Technology Licensing LLC
Original Assignee
Microsoft Corp
Microsoft Technology Licensing LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp, Microsoft Technology Licensing LLC filed Critical Microsoft Corp
Publication of JP2015508257A publication Critical patent/JP2015508257A/ja
Publication of JP2015508257A5 publication Critical patent/JP2015508257A5/ja
Application granted granted Critical
Publication of JP6198231B2 publication Critical patent/JP6198231B2/ja
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Storage Device Security (AREA)
JP2014556566A 2012-02-09 2013-01-28 デバイスデータのためのセキュリティポリシー Expired - Fee Related JP6198231B2 (ja)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US13/370,232 2012-02-09
US13/370,232 US9245143B2 (en) 2012-02-09 2012-02-09 Security policy for device data
PCT/US2013/023353 WO2013119401A1 (en) 2012-02-09 2013-01-28 Security policy for device data

Publications (3)

Publication Number Publication Date
JP2015508257A JP2015508257A (ja) 2015-03-16
JP2015508257A5 JP2015508257A5 (enExample) 2016-02-25
JP6198231B2 true JP6198231B2 (ja) 2017-09-20

Family

ID=48946638

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2014556566A Expired - Fee Related JP6198231B2 (ja) 2012-02-09 2013-01-28 デバイスデータのためのセキュリティポリシー

Country Status (6)

Country Link
US (2) US9245143B2 (enExample)
EP (1) EP2812842B1 (enExample)
JP (1) JP6198231B2 (enExample)
KR (1) KR102071087B1 (enExample)
CN (1) CN104094275B (enExample)
WO (1) WO2013119401A1 (enExample)

Families Citing this family (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9245143B2 (en) 2012-02-09 2016-01-26 Microsoft Technology Licensing, Llc Security policy for device data
US9460303B2 (en) * 2012-03-06 2016-10-04 Microsoft Technology Licensing, Llc Operating large scale systems and cloud services with zero-standing elevated permissions
US20150256343A1 (en) * 2012-08-13 2015-09-10 Richard F. Graveman Securely Generating and Storing Passwords in a Computer System
US9536057B2 (en) * 2012-10-19 2017-01-03 Mcafee, Inc. Premises aware security
US9231930B1 (en) 2012-11-20 2016-01-05 Amazon Technologies, Inc. Virtual endpoints for request authentication
US9444800B1 (en) 2012-11-20 2016-09-13 Amazon Technologies, Inc. Virtual communication endpoint services
US9386050B2 (en) 2013-03-14 2016-07-05 Motorola Solutions, Inc. Method and apparatus for filtering devices within a security social network
US9167048B2 (en) * 2013-03-14 2015-10-20 Motorola Solutions, Inc. Method and apparatus for filtering devices within a security social network
US9071429B1 (en) * 2013-04-29 2015-06-30 Amazon Technologies, Inc. Revocable shredding of security credentials
IL228523A0 (en) * 2013-09-17 2014-03-31 Nds Ltd Processing private data in a cloud-based environment
US20150094023A1 (en) * 2013-10-01 2015-04-02 Google Inc. Retroactively Securing a Mobile Device From a Remote Source
US9171174B2 (en) 2013-11-27 2015-10-27 At&T Intellectual Property I, L.P. Methods, systems, and computer program products for verifying user data access policies when server and/or user are not trusted
US10140477B2 (en) * 2013-12-09 2018-11-27 Thales E-Security, Inc. Obfuscating in memory encryption keys
US9160544B2 (en) * 2014-01-30 2015-10-13 Verizon Patent And Licensing Inc. Providing secure access to computing resources in a cloud computing environment
CN105683989B (zh) 2014-06-27 2019-04-30 微软技术许可有限责任公司 用于基于上下文的数据保护的系统
WO2015196447A1 (en) 2014-06-27 2015-12-30 Microsoft Technology Licensing, Llc Data protection based on user input during device boot-up, user login, and device shut-down states
CN105493094A (zh) 2014-06-27 2016-04-13 微软技术许可有限责任公司 基于设备上的用户输入模式的数据保护系统
US10474849B2 (en) 2014-06-27 2019-11-12 Microsoft Technology Licensing, Llc System for data protection in power off mode
US9900295B2 (en) * 2014-11-05 2018-02-20 Microsoft Technology Licensing, Llc Roaming content wipe actions across devices
US9762548B2 (en) 2015-03-13 2017-09-12 Western Digital Technologies, Inc. Controlling encrypted data stored on a remote storage device
US10313217B2 (en) 2015-03-13 2019-06-04 Samsung Electronics Co., Ltd. System on chip (SoC) capable of sharing resources with network device and devices having the SoC
US9762585B2 (en) 2015-03-19 2017-09-12 Microsoft Technology Licensing, Llc Tenant lockbox
US9565169B2 (en) * 2015-03-30 2017-02-07 Microsoft Technology Licensing, Llc Device theft protection associating a device identifier and a user identifier
US10931682B2 (en) 2015-06-30 2021-02-23 Microsoft Technology Licensing, Llc Privileged identity management
US10078748B2 (en) * 2015-11-13 2018-09-18 Microsoft Technology Licensing, Llc Unlock and recovery for encrypted devices
US9565020B1 (en) * 2016-02-02 2017-02-07 International Business Machines Corporation System and method for generating a server-assisted strong password from a weak secret
US10079679B2 (en) 2016-04-28 2018-09-18 Bank Of America Corporation Cryptographic encryption key escrow and recovery
CN106776908B (zh) * 2016-11-30 2020-02-14 Oppo广东移动通信有限公司 数据清理方法、装置及终端
US10693639B2 (en) * 2017-02-28 2020-06-23 Blackberry Limited Recovering a key in a secure manner
US10263775B2 (en) 2017-06-23 2019-04-16 Microsoft Technology Licensing, Llc Policy-based key recovery
EP3704615A4 (en) * 2017-11-01 2021-06-09 Hewlett-Packard Development Company, L.P. REPORTING OF NON-CONFORMITY EVENTS TO SUPPORTING DEVICES
US10614254B2 (en) * 2017-12-12 2020-04-07 John Almeida Virus immune computer system and method
US10951406B2 (en) * 2018-01-24 2021-03-16 Salesforce.Com, Inc. Preventing encryption key recovery by a cloud provider
US11606206B2 (en) * 2020-01-09 2023-03-14 Western Digital Technologies, Inc. Recovery key for unlocking a data storage device
JP2021118370A (ja) * 2020-01-22 2021-08-10 キオクシア株式会社 メモリシステム、情報処理装置、および情報処理システム
US11809611B2 (en) * 2020-02-24 2023-11-07 Microsoft Technology Licensing, Llc Protecting device detachment with bus encryption
US12475264B2 (en) * 2021-05-10 2025-11-18 Omnissa, Llc Secure recovery key management for removable drive encryption enforcement
CN113609497B (zh) * 2021-06-30 2022-09-23 荣耀终端有限公司 一种数据保护方法及装置

Family Cites Families (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5675645A (en) 1995-04-18 1997-10-07 Ricoh Company, Ltd. Method and apparatus for securing executable programs against copying
US6516064B1 (en) * 1995-07-25 2003-02-04 Sony Corporation Signal recording apparatus, signal record medium and signal reproducing apparatus
US6292899B1 (en) 1998-09-23 2001-09-18 Mcbride Randall C. Volatile key apparatus for safeguarding confidential data stored in a computer system memory
US7278023B1 (en) * 2000-06-09 2007-10-02 Northrop Grumman Corporation System and method for distributed network acess and control enabling high availability, security and survivability
US20040107345A1 (en) 2002-10-21 2004-06-03 Brandt David D. System and methodology providing automation security protocols and intrusion detection in an industrial controller environment
JP4732508B2 (ja) * 2005-03-22 2011-07-27 ヒューレット−パッカード デベロップメント カンパニー エル.ピー. トラステッドデータのための方法、デバイス、およびデータ構造体
US8082443B2 (en) 2006-01-09 2011-12-20 Bbnt Solutions Llc. Pedigrees for quantum cryptography
US20070261099A1 (en) 2006-05-02 2007-11-08 Broussard Scott J Confidential content reporting system and method with electronic mail verification functionality
KR100766313B1 (ko) * 2006-05-30 2007-10-11 삼성전자주식회사 이동통신단말기에서 보안 키의 암호화 장치 및 방법
US7603435B2 (en) 2006-11-15 2009-10-13 Palm, Inc. Over-the-air device kill pill and lock
US20090328238A1 (en) 2007-06-29 2009-12-31 David Duncan Ridewood Glendinning Disabling encrypted data
US20090006867A1 (en) 2007-06-29 2009-01-01 Alcatel Lucent System, device and method for providing data availability for lost/stolen portable communication devices
US20090150970A1 (en) 2007-12-05 2009-06-11 Sybase, Inc. Data Fading to Secure Data on Mobile Client Devices
US20090210456A1 (en) 2008-02-18 2009-08-20 Dell Products L.P. Methods, Systems and Media for TPM Recovery Key Backup and Restoration
EP2327036A1 (en) 2008-08-08 2011-06-01 Absolute Software Corporation Secure computing environment to address theft and unauthorized access
US8103883B2 (en) * 2008-12-31 2012-01-24 Intel Corporation Method and apparatus for enforcing use of danbury key management services for software applied full volume encryption
JP2010220019A (ja) 2009-03-18 2010-09-30 Panasonic Corp 鍵管理方法および鍵管理装置
US20100266132A1 (en) 2009-04-15 2010-10-21 Microsoft Corporation Service-based key escrow and security for device data
US8588746B2 (en) 2009-10-31 2013-11-19 SAIFE Technologies Incorporated Technique for bypassing an IP PBX
US8433901B2 (en) 2010-04-07 2013-04-30 Apple Inc. System and method for wiping encrypted data on a device having file-level content protection
US9106624B2 (en) * 2010-05-16 2015-08-11 James Thomas Hudson, JR. System security for network resource access using cross firewall coded requests
US9245143B2 (en) 2012-02-09 2016-01-26 Microsoft Technology Licensing, Llc Security policy for device data

Also Published As

Publication number Publication date
US20130212367A1 (en) 2013-08-15
US20160154973A1 (en) 2016-06-02
CN104094275A (zh) 2014-10-08
WO2013119401A1 (en) 2013-08-15
EP2812842A4 (en) 2015-10-28
KR20140123522A (ko) 2014-10-22
US9811682B2 (en) 2017-11-07
JP2015508257A (ja) 2015-03-16
US9245143B2 (en) 2016-01-26
EP2812842A1 (en) 2014-12-17
EP2812842B1 (en) 2020-04-29
CN104094275B (zh) 2019-06-28
KR102071087B1 (ko) 2020-01-29

Similar Documents

Publication Publication Date Title
JP6198231B2 (ja) デバイスデータのためのセキュリティポリシー
US10985909B2 (en) Door lock control with wireless user authentication
US10783232B2 (en) Management system for self-encrypting managed devices with embedded wireless user authentication
US10846425B2 (en) Data protection based on user input during device boot-up, user login, and device shut-down states
US10505983B2 (en) Enforcing enterprise requirements for devices registered with a registration service
US10375116B2 (en) System and method to provide server control for access to mobile client data
CN105493054B (zh) 使用双文件系统的快速数据保护
US9560026B1 (en) Secure computer operations
US10949540B2 (en) Security policy enforcement based on dynamic security context updates
CN113141610B (zh) 将设备标识符和用户标识符相关联的设备盗窃防护
CN107004080A (zh) 环境感知安全令牌
CN107077574A (zh) 用于客户端设备的信任服务
US9807615B2 (en) Disabling a mobile device that has stolen hardware components
US20250217476A1 (en) Mobile device with secure private memory
US10192056B1 (en) Systems and methods for authenticating whole disk encryption systems
US10673888B1 (en) Systems and methods for managing illegitimate authentication attempts
US20180157457A1 (en) Enforcing display sharing profiles on a client device sharing display activity with a display sharing application
WO2023278266A1 (en) Optimizing application security based on malicious user intent
Assessment Mobile Devices
HK1242437A1 (en) Environment-aware security tokens

Legal Events

Date Code Title Description
A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20160105

A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20160105

A977 Report on retrieval

Free format text: JAPANESE INTERMEDIATE CODE: A971007

Effective date: 20161012

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20161122

A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20170221

A02 Decision of refusal

Free format text: JAPANESE INTERMEDIATE CODE: A02

Effective date: 20170307

A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20170620

A911 Transfer to examiner for re-examination before appeal (zenchi)

Free format text: JAPANESE INTERMEDIATE CODE: A911

Effective date: 20170703

TRDD Decision of grant or rejection written
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 20170718

A711 Notification of change in applicant

Free format text: JAPANESE INTERMEDIATE CODE: A711

Effective date: 20170815

A61 First payment of annual fees (during grant procedure)

Free format text: JAPANESE INTERMEDIATE CODE: A61

Effective date: 20170816

R150 Certificate of patent or registration of utility model

Ref document number: 6198231

Country of ref document: JP

Free format text: JAPANESE INTERMEDIATE CODE: R150

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

LAPS Cancellation because of no payment of annual fees