JPH09510305A - データ記憶装置および方法 - Google Patents
データ記憶装置および方法Info
- Publication number
- JPH09510305A JPH09510305A JP7515545A JP51554595A JPH09510305A JP H09510305 A JPH09510305 A JP H09510305A JP 7515545 A JP7515545 A JP 7515545A JP 51554595 A JP51554595 A JP 51554595A JP H09510305 A JPH09510305 A JP H09510305A
- Authority
- JP
- Japan
- Prior art keywords
- identification
- sid
- storage
- record
- algorithm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 17
- 238000013500 data storage Methods 0.000 title description 2
- 230000002441 reversible effect Effects 0.000 claims abstract description 18
- 230000015654 memory Effects 0.000 claims description 36
- 238000013329 compounding Methods 0.000 claims 1
- 238000006467 substitution reaction Methods 0.000 claims 1
- 101000891547 Homo sapiens Alpha-1,3/1,6-mannosyltransferase ALG2 Proteins 0.000 abstract description 15
- 102100034785 Programmed cell death protein 6 Human genes 0.000 abstract description 15
- 102100040428 Chitobiosyldiphosphodolichol beta-mannosyltransferase Human genes 0.000 abstract description 8
- 101000891557 Homo sapiens Chitobiosyldiphosphodolichol beta-mannosyltransferase Proteins 0.000 abstract description 8
- 230000006870 function Effects 0.000 description 8
- 102100024395 DCC-interacting protein 13-alpha Human genes 0.000 description 5
- 102100039059 Dol-P-Man:Man(5)GlcNAc(2)-PP-Dol alpha-1,3-mannosyltransferase Human genes 0.000 description 5
- 101001053277 Homo sapiens DCC-interacting protein 13-alpha Proteins 0.000 description 5
- 101000958975 Homo sapiens Dol-P-Man:Man(5)GlcNAc(2)-PP-Dol alpha-1,3-mannosyltransferase Proteins 0.000 description 5
- 230000009471 action Effects 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 238000013475 authorization Methods 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000002427 irreversible effect Effects 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 101100490849 Neurospora crassa (strain ATCC 24698 / 74-OR23-1A / CBS 708.71 / DSM 1257 / FGSC 987) alg-2 gene Proteins 0.000 description 1
- 238000007792 addition Methods 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 238000005538 encapsulation Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000003936 working memory Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
- H04L9/0897—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1408—Protection against unauthorised use of memory or access to memory by using cryptography
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/72—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/86—Secure or tamper-resistant housings
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2153—Using hardware token as a secondary aspect
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99931—Database or file accessing
- Y10S707/99939—Privileged access
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Mathematical Physics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Medical Informatics (AREA)
- Data Mining & Analysis (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Communication Control (AREA)
Abstract
Description
Claims (1)
- 【特許請求の範囲】 1. 元の識別(OID)と関連する記述情報(DI)とを含むデータを記憶 する装置において、前記装置は、 第1アルゴリズム(ALG1)によって元の識別(OID)を更新識別(UI D)に暗合化するように成された第1暗合化手段(50)と、 可逆アルゴリズム(ALG2)によって、更新識別(UID)を記憶識別(S ID)に暗合化し、この記憶識別(SID)が関連する記述情報(DI)と共に レコード(P)として記憶媒体(30、40)上に記憶されるように成す第2暗 合化手段(50)と、 選定された記憶レコード(P)の記憶識別(SID)を新規記憶識別(SID ’)と置換するたびに、これらの記憶識別(SID)を非暗合化して対応する更 新識別(UID)を復元するように成す非暗合化手段(50)と、 前記の置換のたびに、変更された可逆アルゴリズム(ALG2’)によって、 前記の復元された更新識別(UID)を新規記憶識別(SID’)に暗合化し、 これらの新規記憶識別(SID’)が前の記憶識別(SID)に置き代わるよう に成す第2暗合化手段(50)と、 を含むことを特徴とする装置。 2. 前記の選定された記憶レコード(P)の記憶識別(SID)を新規記憶 識別(SID’)と置換する時期をランダム設定するように成された手段を含む ことを特徴とする請求項1に記載の装置。 3. 更新識別(UID)を生成するための第1アルゴリズム(ALG1)が 非可逆アルゴリズムであることを特徴とする請求項1または2のいずれかに記載 の装置。 4. 前記第1および第2暗合化手段と前記非暗合化手段がハードウェアコン ポーネント(50)として構成されることを特徴とする請求項1乃至3のいずれ かに記載の装置。 5. 前記ハードウェアコンポーネント(50)が独自のプロセッサを含み、 このプロセッサがコンピュータ中の分散プロセッサとして作動するように成され たことを特徴とする請求項4に記載の装置。 6. 前記ハードウェアコンポーネント(50)が種々のアルゴリズムを作成 するように成され、また最後に作成されたアルゴリズムを記憶するための手段を 含むことを特徴とする請求項4または5のいずれかに記載の装置。 7. 元の識別(OID)と関連する記述情報(DI)とを含むデータを記憶 する方法において、この方法は、 第1アルゴリズム(ALG1)によって元の識別(OID)を更新識別(UI D)に暗合化する段階と、 可逆アルゴリズム(ALG2)によって更新識別(UID)を記憶識別(SI D)に暗合化する段階と、 記憶識別(SID)と記述情報(DI)とをレコード(P)として記憶媒体( 30、40)上に記憶する段階とを含み、 選択された記憶レコード(P)の記憶識別(SID)が新規記憶識別(SID ’)と置換されるたびに、サブステップとして、 − 選択された記憶レコード(P)の記憶識別(SID)を非暗合化して対応の 更新識別(UID)を復元し、 − 可逆アルゴリズム(ALG2)を変更し、変更された可逆アルゴリズム(A LG2’)によって前記復元された更新識別(UID)を新規記憶識別(SID ’)に暗合化し、 − 選択された記憶レコード(P)の記憶識別(SID)を新規記憶識別(SI D’)と置換する段階と、を含むことを特徴とする方法。 8. 前記の選択されたレコード(P)として、記録媒体(30、40)上に 記憶されたすべてのレコード(P)を選択する段階を含むことを特徴とする請求 項7に記載の方法。 9. 選択されたレコード(P)の記憶識別(SID)を新規記憶識別(SI D’)と置換する段階はバッチの中で実施され、従って選択されたレコード(P )の記憶識別(SID)が記憶媒体(30、40)上で本質的に同時的に変更さ れることを特徴とする請求項7または8のいずれかに記載の方法。 10. 選択されたレコード(P)の記憶識別(SID)を新規記憶識別(S ID’)と置換する前記段階は選択されたレコード(P)を記憶媒体(30、4 0)上の新しい物理的位置に移動させる段階を含むことを特徴とする請求項7乃 至9のいずれかに記載の方法。 11. 記述情報(DI)が記憶媒体上のそれぞれのレコード(P)の中に記 憶される前に、この記述情報(DI)を暗合化する段階を含むことを特徴とする 請求項7乃至10のいずれかに記載の方法。
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SE9303984-0 | 1993-11-30 | ||
SE9303984A SE9303984L (sv) | 1993-11-30 | 1993-11-30 | Anordning och metod för lagring av datainformation |
PCT/SE1994/000882 WO1995015628A1 (en) | 1993-11-30 | 1994-09-23 | Apparatus and method for storing data |
Publications (2)
Publication Number | Publication Date |
---|---|
JPH09510305A true JPH09510305A (ja) | 1997-10-14 |
JP3678746B2 JP3678746B2 (ja) | 2005-08-03 |
Family
ID=20391947
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP51554595A Expired - Lifetime JP3678746B2 (ja) | 1993-11-30 | 1994-09-23 | データ記憶装置および方法 |
Country Status (13)
Country | Link |
---|---|
US (1) | US5606610A (ja) |
EP (1) | EP0732014B1 (ja) |
JP (1) | JP3678746B2 (ja) |
KR (1) | KR100366271B1 (ja) |
AT (1) | ATE241878T1 (ja) |
AU (1) | AU671049B2 (ja) |
BR (1) | BR9406073A (ja) |
CA (1) | CA2153497A1 (ja) |
DE (1) | DE69432754D1 (ja) |
FI (1) | FI953564A (ja) |
NO (1) | NO309960B1 (ja) |
SE (1) | SE9303984L (ja) |
WO (1) | WO1995015628A1 (ja) |
Families Citing this family (60)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5699428A (en) * | 1996-01-16 | 1997-12-16 | Symantec Corporation | System for automatic decryption of file data on a per-use basis and automatic re-encryption within context of multi-threaded operating system under which applications run in real-time |
SE9600955L (sv) * | 1996-03-13 | 1997-09-14 | Analysity Ab | Anordning och förfarande för automatiserade behovsanalyser och resultatuppföljning inom personhanterande verksamheter |
SE506853C2 (sv) * | 1996-06-20 | 1998-02-16 | Anonymity Prot In Sweden Ab | Metod för databearbetning |
SE9602834L (sv) | 1996-07-22 | 1998-01-23 | Analysity Ab | Anordning och förfarande för multidimensionell mönsteranalys |
GB9712459D0 (en) * | 1997-06-14 | 1997-08-20 | Int Computers Ltd | Secure database system |
JP3272283B2 (ja) * | 1997-11-14 | 2002-04-08 | 富士通株式会社 | 電子データ保管装置 |
US6148342A (en) * | 1998-01-27 | 2000-11-14 | Ho; Andrew P. | Secure database management system for confidential records using separately encrypted identifier and access request |
US20010044901A1 (en) * | 1998-03-24 | 2001-11-22 | Symantec Corporation | Bubble-protected system for automatic decryption of file data on a per-use basis and automatic re-encryption |
EP1026603A3 (en) * | 1999-02-02 | 2002-01-30 | SmithKline Beecham Corporation | Apparatus and method for depersonalizing information |
US7096370B1 (en) * | 1999-03-26 | 2006-08-22 | Micron Technology, Inc. | Data security for digital data storage |
US6857076B1 (en) * | 1999-03-26 | 2005-02-15 | Micron Technology, Inc. | Data security for digital data storage |
DE19925910B4 (de) | 1999-06-07 | 2005-04-28 | Siemens Ag | Verfahren zum Be- oder Verarbeiten von Daten |
US6938022B1 (en) * | 1999-06-12 | 2005-08-30 | Tara C. Singhal | Method and apparatus for facilitating an anonymous information system and anonymous service transactions |
GB9920644D0 (en) * | 1999-09-02 | 1999-11-03 | Medical Data Service Gmbh | Novel method |
US6732113B1 (en) | 1999-09-20 | 2004-05-04 | Verispan, L.L.C. | System and method for generating de-identified health care data |
EP1247221A4 (en) | 1999-09-20 | 2005-01-19 | Quintiles Transnat Corp | SYSTEM AND METHOD FOR ANALYZING DEFINED HEALTH DATA |
US7093137B1 (en) * | 1999-09-30 | 2006-08-15 | Casio Computer Co., Ltd. | Database management apparatus and encrypting/decrypting system |
US6449621B1 (en) * | 1999-11-03 | 2002-09-10 | Ford Global Technologies, Inc. | Privacy data escrow system and method |
US6397224B1 (en) * | 1999-12-10 | 2002-05-28 | Gordon W. Romney | Anonymously linking a plurality of data records |
GB2366051B (en) * | 2000-05-02 | 2005-01-05 | Ibm | Method, system and program product for private data access or use based on related public data |
US7958376B2 (en) * | 2000-11-02 | 2011-06-07 | Ati Technologies Ulc | Write once system and method for facilitating digital encrypted transmissions |
US7178035B1 (en) * | 2000-11-02 | 2007-02-13 | Ati International, Srl | Write once system and method for facilitating digital encrypted transmissions |
US20020066038A1 (en) * | 2000-11-29 | 2002-05-30 | Ulf Mattsson | Method and a system for preventing impersonation of a database user |
US7454796B2 (en) * | 2000-12-22 | 2008-11-18 | Canon Kabushiki Kaisha | Obtaining temporary exclusive control of a printing device |
US7526795B2 (en) | 2001-03-27 | 2009-04-28 | Micron Technology, Inc. | Data security for digital data storage |
US7266699B2 (en) * | 2001-08-30 | 2007-09-04 | Application Security, Inc. | Cryptographic infrastructure for encrypting a database |
JP2003083243A (ja) * | 2001-09-05 | 2003-03-19 | Toyota Industries Corp | 容量可変型圧縮機の容量制御装置 |
ATE375567T1 (de) * | 2001-11-23 | 2007-10-15 | Protegrity Res & Dev | Verfahren zur erkennung von eindringling in einem datenbanksystem |
JP3941513B2 (ja) * | 2002-01-11 | 2007-07-04 | ソニー株式会社 | 記録方法、記録装置、再生方法及び再生装置 |
FI20020808A (fi) * | 2002-04-29 | 2003-10-30 | Mediweb Oy | Arkaluontoisten tietojen tallentaminen |
US20040078238A1 (en) * | 2002-05-31 | 2004-04-22 | Carson Thomas | Anonymizing tool for medical data |
GB0222896D0 (en) * | 2002-10-03 | 2002-11-13 | Avoca Systems Ltd | Method of and apparatus for transferring data |
WO2004084050A1 (en) * | 2003-03-21 | 2004-09-30 | Koninklijke Philips Electronics N.V. | User identity privacy in authorization certificates |
FI116170B (fi) * | 2003-04-11 | 2005-09-30 | Jouko Kronholm | Menetelmä palautteen välittämisessä palautejärjestelmästä sekä tietojen välitysjärjestelmä |
US20050203921A1 (en) * | 2004-03-11 | 2005-09-15 | Newman Aaron C. | System for protecting database applications from unauthorized activity |
AU2004201058B1 (en) * | 2004-03-15 | 2004-09-09 | Lockstep Consulting Pty Ltd | Means and method of issuing Anonymous Public Key Certificates for indexing electronic record systems |
AU2005241560A1 (en) * | 2004-05-05 | 2005-11-17 | Ims Software Services, Ltd. | Data encryption applications for multi-source longitudinal patient-level data integration |
WO2005109294A2 (en) * | 2004-05-05 | 2005-11-17 | Ims Health Incorporated | Multi-source longitudinal patient-level data encryption process |
EP1763834A4 (en) * | 2004-05-05 | 2009-08-26 | Ims Software Services Ltd | ENCRYPTED DATA FOR LONGITUDINAL DATA BANKS AT PATIENT LEVEL |
US7797342B2 (en) * | 2004-09-03 | 2010-09-14 | Sybase, Inc. | Database system providing encrypted column support for applications |
US7743069B2 (en) * | 2004-09-03 | 2010-06-22 | Sybase, Inc. | Database system providing SQL extensions for automated encryption and decryption of column data |
FR2881248A1 (fr) * | 2005-01-26 | 2006-07-28 | France Telecom | Systeme et procede d'anonymisation de donnees personnelles sensibles et procede d'obtention de telles donnees |
US20080022136A1 (en) * | 2005-02-18 | 2008-01-24 | Protegrity Corporation | Encryption load balancing and distributed policy enforcement |
US20070174271A1 (en) * | 2005-02-18 | 2007-07-26 | Ulf Mattsson | Database system with second preprocessor and method for accessing a database |
SE0500541L (sv) * | 2005-03-08 | 2006-09-09 | Inator Kb | Auktorisationssystem och metod |
AU2005330619B2 (en) | 2005-04-22 | 2011-08-11 | Daon Technology | A system and method for protecting the privacy and security of stored biometric data |
US7522751B2 (en) * | 2005-04-22 | 2009-04-21 | Daon Holdings Limited | System and method for protecting the privacy and security of stored biometric data |
US8069482B2 (en) * | 2006-02-27 | 2011-11-29 | Sentrigo Inc. | Device, system and method of database security |
KR100697613B1 (ko) * | 2006-06-22 | 2007-03-22 | 주식회사 엘지에스 | 광학필름 및 이를 이용한 면광원 장치 |
US9355273B2 (en) | 2006-12-18 | 2016-05-31 | Bank Of America, N.A., As Collateral Agent | System and method for the protection and de-identification of health care data |
US20100031321A1 (en) | 2007-06-11 | 2010-02-04 | Protegrity Corporation | Method and system for preventing impersonation of computer system user |
US9158933B2 (en) * | 2007-08-17 | 2015-10-13 | Sybase, Inc. | Protection of encryption keys in a database |
JP4640410B2 (ja) * | 2007-12-25 | 2011-03-02 | カシオ計算機株式会社 | データベース管理装置及び記録媒体 |
US8225106B2 (en) * | 2008-04-02 | 2012-07-17 | Protegrity Corporation | Differential encryption utilizing trust modes |
US20100114607A1 (en) * | 2008-11-04 | 2010-05-06 | Sdi Health Llc | Method and system for providing reports and segmentation of physician activities |
US9141758B2 (en) * | 2009-02-20 | 2015-09-22 | Ims Health Incorporated | System and method for encrypting provider identifiers on medical service claim transactions |
US20110071994A1 (en) * | 2009-09-22 | 2011-03-24 | Appsimple, Ltd | Method and system to securely store data |
US20110162074A1 (en) * | 2009-12-31 | 2011-06-30 | Sap Portals Israel Ltd | Apparatus and method for remote processing while securing classified data |
US8862902B2 (en) * | 2011-04-29 | 2014-10-14 | Seagate Technology Llc | Cascaded data encryption dependent on attributes of physical memory |
EP3256981B1 (en) * | 2015-01-14 | 2021-03-03 | Hewlett-Packard Enterprise Development LP | System, apparatus and method for anonymizing data prior to threat detection analysis |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
IL100238A (en) * | 1991-12-04 | 1995-01-24 | Labaton Isaac J | Device and method for credit accounts charging |
US5392357A (en) * | 1991-12-09 | 1995-02-21 | At&T Corp. | Secure telecommunications |
US5343527A (en) * | 1993-10-27 | 1994-08-30 | International Business Machines Corporation | Hybrid encryption method and system for protecting reusable software components |
-
1993
- 1993-11-30 SE SE9303984A patent/SE9303984L/xx not_active IP Right Cessation
-
1994
- 1994-09-23 US US08/464,891 patent/US5606610A/en not_active Expired - Lifetime
- 1994-09-23 EP EP95900329A patent/EP0732014B1/en not_active Expired - Lifetime
- 1994-09-23 KR KR1019950703151A patent/KR100366271B1/ko not_active IP Right Cessation
- 1994-09-23 JP JP51554595A patent/JP3678746B2/ja not_active Expired - Lifetime
- 1994-09-23 BR BR9406073A patent/BR9406073A/pt not_active IP Right Cessation
- 1994-09-23 WO PCT/SE1994/000882 patent/WO1995015628A1/en active IP Right Grant
- 1994-09-23 AT AT95900329T patent/ATE241878T1/de not_active IP Right Cessation
- 1994-09-23 AU AU81183/94A patent/AU671049B2/en not_active Ceased
- 1994-09-23 CA CA002153497A patent/CA2153497A1/en not_active Abandoned
- 1994-09-23 DE DE69432754T patent/DE69432754D1/de not_active Expired - Lifetime
-
1995
- 1995-06-26 NO NO952546A patent/NO309960B1/no unknown
- 1995-07-26 FI FI953564A patent/FI953564A/fi unknown
Also Published As
Publication number | Publication date |
---|---|
SE501128C2 (sv) | 1994-11-21 |
EP0732014A1 (en) | 1996-09-18 |
WO1995015628A1 (en) | 1995-06-08 |
KR100366271B1 (ko) | 2003-04-11 |
NO309960B1 (no) | 2001-04-23 |
JP3678746B2 (ja) | 2005-08-03 |
AU671049B2 (en) | 1996-08-08 |
BR9406073A (pt) | 1995-12-12 |
FI953564A0 (fi) | 1995-07-26 |
NO952546L (no) | 1995-07-17 |
ATE241878T1 (de) | 2003-06-15 |
SE9303984L (sv) | 1994-11-21 |
KR960703295A (ko) | 1996-06-19 |
EP0732014B1 (en) | 2003-05-28 |
DE69432754D1 (de) | 2003-07-03 |
FI953564A (fi) | 1995-07-26 |
CA2153497A1 (en) | 1995-06-08 |
NO952546D0 (no) | 1995-06-26 |
SE9303984D0 (sv) | 1993-11-30 |
US5606610A (en) | 1997-02-25 |
AU8118394A (en) | 1995-06-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP3678746B2 (ja) | データ記憶装置および方法 | |
JP4167300B2 (ja) | データ処理方法および装置 | |
CA2496664C (en) | Encrypting operating system | |
EP0885417B1 (en) | Access control/crypto system | |
US6963980B1 (en) | Combined hardware and software based encryption of databases | |
US4944008A (en) | Electronic keying scheme for locking data | |
US7111005B1 (en) | Method and apparatus for automatic database encryption | |
US8429720B2 (en) | Method and apparatus for camouflaging of data, information and functional transformations | |
KR102224998B1 (ko) | 데이터 재-암호화를 통하여 민감한 데이터를 보호하기 위한 컴퓨터-구현 시스템 및 방법 | |
KR950029930A (ko) | 화일 액세스 보안유지 방법 및 장치 | |
EP3461055B1 (en) | System and method for secure outsourced annotation of datasets | |
WO2006006931A1 (en) | Storing of metadata | |
JP4338185B2 (ja) | ファイルの暗号化・復号方法 | |
US20050086528A1 (en) | Method for hiding information on a computer | |
CN1080964C (zh) | 存放数据的装置和方法 | |
JPS63311454A (ja) | 秘密保護方式 | |
ZOPE et al. | Encryption Techniques for High Security | |
Cebollero et al. | Encryption | |
Mattsson | Better Secure than Sorry | |
Machanic et al. | Encryption | |
WO2001001222A1 (en) | Securing databases using mutual consent access |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20050412 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20050511 |
|
R150 | Certificate of patent or registration of utility model |
Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20090520 Year of fee payment: 4 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20100520 Year of fee payment: 5 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20110520 Year of fee payment: 6 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20120520 Year of fee payment: 7 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20130520 Year of fee payment: 8 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
EXPY | Cancellation because of completion of term |