KR101751566B1 - 클레임 기반 컨텐츠 명성 서비스 - Google Patents

클레임 기반 컨텐츠 명성 서비스 Download PDF

Info

Publication number
KR101751566B1
KR101751566B1 KR1020127031360A KR20127031360A KR101751566B1 KR 101751566 B1 KR101751566 B1 KR 101751566B1 KR 1020127031360 A KR1020127031360 A KR 1020127031360A KR 20127031360 A KR20127031360 A KR 20127031360A KR 101751566 B1 KR101751566 B1 KR 101751566B1
Authority
KR
South Korea
Prior art keywords
content
data item
data
submitted
digital fingerprint
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
KR1020127031360A
Other languages
English (en)
Korean (ko)
Other versions
KR20130120367A (ko
Inventor
로버트 비소
바딤 이스마일로브
링링 리우
로버트 새콘
무케쉬쿠마르 베헤르
Original Assignee
마이크로소프트 테크놀로지 라이센싱, 엘엘씨
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 마이크로소프트 테크놀로지 라이센싱, 엘엘씨 filed Critical 마이크로소프트 테크놀로지 라이센싱, 엘엘씨
Publication of KR20130120367A publication Critical patent/KR20130120367A/ko
Application granted granted Critical
Publication of KR101751566B1 publication Critical patent/KR101751566B1/ko
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/14Details of searching files based on file metadata
    • G06F16/148File search processing
    • G06F16/152File search processing using file content signatures, e.g. hash values
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2228Indexing structures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/60Information retrieval; Database structures therefor; File system structures therefor of audio data
    • G06F16/68Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/683Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/70Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F16/78Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/783Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • G06F2201/83Indexing scheme relating to error detection, to error correction, and to monitoring the solution involving signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Databases & Information Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Library & Information Science (AREA)
  • Bioethics (AREA)
  • Virology (AREA)
  • Multimedia (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
KR1020127031360A 2010-06-01 2011-05-17 클레임 기반 컨텐츠 명성 서비스 Active KR101751566B1 (ko)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US12/791,305 2010-06-01
US12/791,305 US8732473B2 (en) 2010-06-01 2010-06-01 Claim based content reputation service
PCT/US2011/036733 WO2011152987A2 (en) 2010-06-01 2011-05-17 Claim based content reputation service

Publications (2)

Publication Number Publication Date
KR20130120367A KR20130120367A (ko) 2013-11-04
KR101751566B1 true KR101751566B1 (ko) 2017-07-11

Family

ID=45023123

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020127031360A Active KR101751566B1 (ko) 2010-06-01 2011-05-17 클레임 기반 컨텐츠 명성 서비스

Country Status (8)

Country Link
US (1) US8732473B2 (enExample)
EP (1) EP2577523B1 (enExample)
JP (1) JP5711361B2 (enExample)
KR (1) KR101751566B1 (enExample)
CN (1) CN102918533B (enExample)
BR (1) BR112012030409A2 (enExample)
RU (1) RU2573760C2 (enExample)
WO (1) WO2011152987A2 (enExample)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11032608B2 (en) 2016-03-08 2021-06-08 Lg Electronics Inc. Mobile terminal and control method therefor

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8432570B1 (en) * 2010-07-30 2013-04-30 Symantec Corporation Using bit arrays in incremental scanning of content for sensitive data
CN102831127B (zh) * 2011-06-17 2015-04-22 阿里巴巴集团控股有限公司 重复数据处理方法、装置及系统
US8918832B2 (en) * 2012-02-07 2014-12-23 Turner Broadcasting Systems, Inc. Method and system for outcome prediction utilizing automatic content recognition
CN102542658A (zh) * 2012-01-18 2012-07-04 朱成书 一种金融票据防伪认证管理系统
US9703932B2 (en) * 2012-04-30 2017-07-11 Excalibur Ip, Llc Continuous content identification of broadcast content
US20150304329A1 (en) * 2012-10-23 2015-10-22 Nokia Technologies Oy Method and apparatus for managing access rights
US9167278B2 (en) 2012-12-28 2015-10-20 Turner Broadcasting System, Inc. Method and system for automatic content recognition (ACR) based broadcast synchronization
CN105408884B (zh) * 2013-07-26 2019-03-29 慧与发展有限责任合伙企业 基于上下文的数据查看
US9665633B2 (en) * 2014-02-19 2017-05-30 Snowflake Computing, Inc. Data management systems and methods
CN103973708B (zh) * 2014-05-26 2018-09-07 中电长城网际系统应用有限公司 一种外泄事件的确定方法和系统
CN104462451B (zh) * 2014-12-15 2017-12-05 中电长城网际系统应用有限公司 数据库文件敏感内容的检测方法和装置
US9667646B2 (en) * 2015-02-12 2017-05-30 Netapp, Inc. Maintaining dynamic configuration information of a multi-host off-cluster service on a cluster
ITUA20162953A1 (it) * 2016-04-28 2017-10-28 Tolemaica S R L Sistema informatico per la generazione di dati visivi e/o sonori certificati.
CN106407362A (zh) * 2016-09-08 2017-02-15 福建中金在线信息科技有限公司 一种关键词信息检索的方法及装置
US10701438B2 (en) 2016-12-31 2020-06-30 Turner Broadcasting System, Inc. Automatic content recognition and verification in a broadcast chain
US10511631B2 (en) 2017-01-25 2019-12-17 Microsoft Technology Licensing, Llc Safe data access through any data channel
US11080564B2 (en) * 2018-09-28 2021-08-03 Microsoft Technology Licensing, Llc Content classification tool with re-classification techniques
CN110995679B (zh) * 2019-11-22 2022-03-01 杭州迪普科技股份有限公司 一种文件数据流控制方法、装置、设备及存储介质
US12287774B1 (en) * 2024-02-20 2025-04-29 Oracle International Corporation Techniques for automatically identifying undeclared composite key relationships in a database schema

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040010703A1 (en) 2001-08-01 2004-01-15 Networks Associates Technology, Inc. Persistent storage access system and method for a wireless malware scan engine
US20050131904A1 (en) 2000-02-18 2005-06-16 Margolus Norman H. Data repository and method for promoting network storage of data
US20060037079A1 (en) 2004-08-13 2006-02-16 International Business Machines Corporation System, method and program for scanning for viruses
US20090043870A1 (en) 2000-02-17 2009-02-12 Ikezoye Vance E Method and apparatus for identifying media content presented on a media playing device

Family Cites Families (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6119231A (en) 1997-10-31 2000-09-12 Cisco Technologies, Inc. Data scanning network security technique
US6094731A (en) * 1997-11-24 2000-07-25 Symantec Corporation Antivirus accelerator for computer networks
JP3871163B2 (ja) * 1998-02-13 2007-01-24 株式会社日立情報システムズ ウィルスチェック結果のサーバ転送・編集方法およびそのプログラム記録媒体
JP3533125B2 (ja) * 1999-12-03 2004-05-31 Necフィールディング株式会社 ソフトウェア管理方法、コンピュータウイルス駆除システム、および記録媒体
US6928550B1 (en) * 2000-01-06 2005-08-09 International Business Machines Corporation Method and system for generating and using a virus free file certificate
US6611925B1 (en) 2000-06-13 2003-08-26 Networks Associates Technology, Inc. Single point of entry/origination item scanning within an enterprise or workgroup
US6928555B1 (en) * 2000-09-18 2005-08-09 Networks Associates Technology, Inc. Method and apparatus for minimizing file scanning by anti-virus programs
US6993660B1 (en) 2001-08-03 2006-01-31 Mcafee, Inc. System and method for performing efficient computer virus scanning of transient messages using checksums in a distributed computing environment
US6745192B1 (en) 2001-08-03 2004-06-01 Networks Associates Technology Inc. System and method for providing a multi-tiered hierarchical transient message store accessed using multiply hashed unique filenames
JP2003196111A (ja) * 2001-12-26 2003-07-11 Hitachi Ltd 電子署名を用いたウィルスチェック方法
JP2003216445A (ja) * 2002-01-23 2003-07-31 Hitachi Ltd コンピュータウイルスのチェック方法
US7742992B2 (en) * 2002-02-05 2010-06-22 Pace Anti-Piracy Delivery of a secure software license for a software product and a toolset for creating the software product
JP4088082B2 (ja) 2002-02-15 2008-05-21 株式会社東芝 未知コンピュータウイルスの感染を防止する装置およびプログラム
AU2003281646A1 (en) * 2002-07-24 2004-02-09 Koninklijke Philips Electronics N.V. Method and device for regulating file sharing
EP1420323A1 (en) * 2002-11-18 2004-05-19 Koninklijke KPN N.V. Method and system for distribution of software components
US7398399B2 (en) 2003-12-12 2008-07-08 International Business Machines Corporation Apparatus, methods and computer programs for controlling performance of operations within a data processing system or network
US7581252B2 (en) 2004-07-20 2009-08-25 Lenovo (Singapore) Pte. Ltd. Storage conversion for anti-virus speed-up
US20060095964A1 (en) * 2004-10-29 2006-05-04 Microsoft Corporation Document stamping antivirus manifest
US7818350B2 (en) * 2005-02-28 2010-10-19 Yahoo! Inc. System and method for creating a collaborative playlist
US9002744B2 (en) 2006-07-28 2015-04-07 Sony Corporation Methods, systems and computer program products for determining usage rights for digital content based on characterizing information thereof and related devices
US8312536B2 (en) * 2006-12-29 2012-11-13 Symantec Corporation Hygiene-based computer security
JP4935468B2 (ja) * 2007-04-03 2012-05-23 ソニー株式会社 情報処理装置、および情報処理方法、並びにコンピュータ・プログラム
US8291496B2 (en) * 2008-05-12 2012-10-16 Enpulz, L.L.C. Server based malware screening
JP4710966B2 (ja) * 2008-12-12 2011-06-29 コニカミノルタビジネステクノロジーズ株式会社 画像処理装置、画像処理装置の制御方法、及び画像処理装置の制御プログラム
US8683216B2 (en) * 2010-07-13 2014-03-25 F-Secure Corporation Identifying polymorphic malware

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090043870A1 (en) 2000-02-17 2009-02-12 Ikezoye Vance E Method and apparatus for identifying media content presented on a media playing device
US20050131904A1 (en) 2000-02-18 2005-06-16 Margolus Norman H. Data repository and method for promoting network storage of data
US20040010703A1 (en) 2001-08-01 2004-01-15 Networks Associates Technology, Inc. Persistent storage access system and method for a wireless malware scan engine
US20060037079A1 (en) 2004-08-13 2006-02-16 International Business Machines Corporation System, method and program for scanning for viruses

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11032608B2 (en) 2016-03-08 2021-06-08 Lg Electronics Inc. Mobile terminal and control method therefor

Also Published As

Publication number Publication date
US20110296187A1 (en) 2011-12-01
RU2012151502A (ru) 2014-06-10
HK1180785A1 (zh) 2013-10-25
CN102918533B (zh) 2016-08-03
EP2577523B1 (en) 2019-02-27
WO2011152987A2 (en) 2011-12-08
EP2577523A4 (en) 2015-04-22
KR20130120367A (ko) 2013-11-04
CN102918533A (zh) 2013-02-06
WO2011152987A3 (en) 2012-03-29
EP2577523A2 (en) 2013-04-10
JP5711361B2 (ja) 2015-04-30
RU2573760C2 (ru) 2016-01-27
US8732473B2 (en) 2014-05-20
BR112012030409A2 (pt) 2016-08-09
JP2013532328A (ja) 2013-08-15

Similar Documents

Publication Publication Date Title
KR101751566B1 (ko) 클레임 기반 컨텐츠 명성 서비스
US20240259434A1 (en) Small-footprint endpoint data loss prevention
US20220374599A1 (en) DLP Exact Data Matching
CN111723355B (zh) 数据库中的信息管理
US10574770B2 (en) Managing notifications across multiple devices
JP6518844B1 (ja) クラウド・コンピューティング・サービス用のミドルウェアセキュリティ層
US12132757B2 (en) Preventing cloud-based phishing attacks using shared documents with malicious links
US9378373B2 (en) Software publisher trust extension application
US20110167275A1 (en) Malware detection method and apparatus
JP2018504806A (ja) 期待値を有するデータセキュリティ処理
US11151248B1 (en) Increasing zero-day malware detection throughput on files attached to emails
CN119744391A (zh) 利用从漏洞利用工具进行目标特征提取进行网络攻击检测
US20250260716A1 (en) Cloud sandbox for detecting malware in files
US20130246338A1 (en) System and method for indexing a capture system
Myers et al. A secure, publisher-centric web caching infrastructure
US20220086014A1 (en) Client certificate authentication in multi-node scenarios
CN114428661A (zh) 一种镜像管理方法及装置
CN114422586A (zh) 事件通知方法、装置、计算机设备及存储介质
US12437066B2 (en) System and method for classifying suspicious text messages received by a user device
HK1180785B (en) Claim based content reputation service
US12468829B2 (en) Enterprise data container
US20240403451A1 (en) Software Engine for Abstracting Security Controls In One-Way Transfer Systems
US20250007949A1 (en) System and Method for Intercepting and Classifying Suspicious Text Messages Between User Devices
CN121153229A (zh) 用于在单向传送系统中抽象安全性控件的软件引擎
Schear The Design and Implementation of Glavlit: A Transparent Data Confinement System

Legal Events

Date Code Title Description
PA0105 International application

Patent event date: 20121129

Patent event code: PA01051R01D

Comment text: International Patent Application

PG1501 Laying open of application
N231 Notification of change of applicant
PN2301 Change of applicant

Patent event date: 20150715

Comment text: Notification of Change of Applicant

Patent event code: PN23011R01D

PA0201 Request for examination

Patent event code: PA02012R01D

Patent event date: 20160414

Comment text: Request for Examination of Application

E701 Decision to grant or registration of patent right
PE0701 Decision of registration

Patent event code: PE07011S01D

Comment text: Decision to Grant Registration

Patent event date: 20170321

GRNT Written decision to grant
PR0701 Registration of establishment

Comment text: Registration of Establishment

Patent event date: 20170621

Patent event code: PR07011E01D

PR1002 Payment of registration fee

Payment date: 20170621

End annual number: 3

Start annual number: 1

PG1601 Publication of registration
PR1001 Payment of annual fee

Payment date: 20200515

Start annual number: 4

End annual number: 4

PR1001 Payment of annual fee

Payment date: 20210517

Start annual number: 5

End annual number: 5

PR1001 Payment of annual fee

Payment date: 20220517

Start annual number: 6

End annual number: 6

PR1001 Payment of annual fee

Payment date: 20240527

Start annual number: 8

End annual number: 8