KR20090034332A - 아이덴터티 오브젝트를 사용하는 제어 시스템과 방법 - Google Patents

아이덴터티 오브젝트를 사용하는 제어 시스템과 방법 Download PDF

Info

Publication number
KR20090034332A
KR20090034332A KR1020097000391A KR20097000391A KR20090034332A KR 20090034332 A KR20090034332 A KR 20090034332A KR 1020097000391 A KR1020097000391 A KR 1020097000391A KR 20097000391 A KR20097000391 A KR 20097000391A KR 20090034332 A KR20090034332 A KR 20090034332A
Authority
KR
South Korea
Prior art keywords
host
acr
key
certificate
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
KR1020097000391A
Other languages
English (en)
Korean (ko)
Inventor
마이클 홀트즈만
론 바질라이
조간-콜롬
Original Assignee
쌘디스크 코포레이션
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US11/557,039 external-priority patent/US20080010458A1/en
Priority claimed from US11/557,041 external-priority patent/US8639939B2/en
Application filed by 쌘디스크 코포레이션 filed Critical 쌘디스크 코포레이션
Publication of KR20090034332A publication Critical patent/KR20090034332A/ko
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/72Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/86Secure or tamper-resistant housings
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Mathematical Physics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
KR1020097000391A 2006-07-07 2007-06-28 아이덴터티 오브젝트를 사용하는 제어 시스템과 방법 Abandoned KR20090034332A (ko)

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
US81950706P 2006-07-07 2006-07-07
US60/819,507 2006-07-07
US11/557,039 2006-11-06
US11/557,041 2006-11-06
US11/557,039 US20080010458A1 (en) 2006-07-07 2006-11-06 Control System Using Identity Objects
US11/557,041 US8639939B2 (en) 2006-07-07 2006-11-06 Control method using identity objects

Publications (1)

Publication Number Publication Date
KR20090034332A true KR20090034332A (ko) 2009-04-07

Family

ID=38728800

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020097000391A Abandoned KR20090034332A (ko) 2006-07-07 2007-06-28 아이덴터티 오브젝트를 사용하는 제어 시스템과 방법

Country Status (5)

Country Link
EP (1) EP2038799A2 (https=)
JP (1) JP4972165B2 (https=)
KR (1) KR20090034332A (https=)
TW (1) TW200822669A (https=)
WO (1) WO2008008243A2 (https=)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7743409B2 (en) 2005-07-08 2010-06-22 Sandisk Corporation Methods used in a mass storage device with automated credentials loading
FR2954656B1 (fr) 2009-12-23 2016-01-08 Oberthur Technologies Dispositif electronique portable et procede associe de mise a disposition d'informations
JP2016019120A (ja) * 2014-07-08 2016-02-01 日本電気通信システム株式会社 復号装置、通信システム、復号方法、および、プログラム
CN112738643B (zh) * 2020-12-24 2022-09-23 北京睿芯高通量科技有限公司 一种使用动态密钥实现监控视频安全传输的系统及方法

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3012407B2 (ja) * 1992-08-31 2000-02-21 日本電気アイシーマイコンシステム株式会社 レベル変換回路
US5473692A (en) * 1994-09-07 1995-12-05 Intel Corporation Roving software license for a hardware agent
US5778071A (en) * 1994-07-12 1998-07-07 Information Resource Engineering, Inc. Pocket encrypting and authenticating communications device
US6584495B1 (en) * 1998-01-30 2003-06-24 Microsoft Corporation Unshared scratch space
US6779113B1 (en) * 1999-11-05 2004-08-17 Microsoft Corporation Integrated circuit card with situation dependent identity authentication
WO2006069274A2 (en) * 2004-12-21 2006-06-29 Sandisk Corporation Versatile content control with partitioning

Also Published As

Publication number Publication date
TW200822669A (en) 2008-05-16
EP2038799A2 (en) 2009-03-25
JP4972165B2 (ja) 2012-07-11
WO2008008243A3 (en) 2008-02-28
WO2008008243A2 (en) 2008-01-17
JP2009543210A (ja) 2009-12-03

Similar Documents

Publication Publication Date Title
US8639939B2 (en) Control method using identity objects
US8613103B2 (en) Content control method using versatile control structure
CN101490687B (zh) 使用身份对象的控制系统及方法
US8140843B2 (en) Content control method using certificate chains
US8245031B2 (en) Content control method using certificate revocation lists
US8266711B2 (en) Method for controlling information supplied from memory device
KR101238848B1 (ko) 파티셔닝을 포함한 다기능 컨텐트 제어
US20080034440A1 (en) Content Control System Using Versatile Control Structure
JP5180203B2 (ja) メモリ装置から供給される情報を制御するシステムおよび方法
US20080010452A1 (en) Content Control System Using Certificate Revocation Lists
US20100138652A1 (en) Content control method using certificate revocation lists
US20080022395A1 (en) System for Controlling Information Supplied From Memory Device
US20080010449A1 (en) Content Control System Using Certificate Chains
US20080010458A1 (en) Control System Using Identity Objects
JP5178716B2 (ja) 証明書取消リストを使用するコンテンツ管理システムおよび方法
WO2008008244A2 (en) Content control system and method using versatile control structure
EP2038803A2 (en) Content control system and method using certificate chains
JP4972165B2 (ja) アイデンティティオブジェクトを使用する制御システムおよび方法

Legal Events

Date Code Title Description
PA0105 International application

Patent event date: 20090108

Patent event code: PA01051R01D

Comment text: International Patent Application

PG1501 Laying open of application
A201 Request for examination
PA0201 Request for examination

Patent event code: PA02012R01D

Patent event date: 20120621

Comment text: Request for Examination of Application

N231 Notification of change of applicant
PN2301 Change of applicant

Patent event date: 20130917

Comment text: Notification of Change of Applicant

Patent event code: PN23011R01D

E701 Decision to grant or registration of patent right
PE0701 Decision of registration

Patent event code: PE07011S01D

Comment text: Decision to Grant Registration

Patent event date: 20140327

NORF Unpaid initial registration fee
PC1904 Unpaid initial registration fee