RU2017115745A - Действия по полному стиранию перемещаемого контента между устройствами - Google Patents
Действия по полному стиранию перемещаемого контента между устройствами Download PDFInfo
- Publication number
- RU2017115745A RU2017115745A RU2017115745A RU2017115745A RU2017115745A RU 2017115745 A RU2017115745 A RU 2017115745A RU 2017115745 A RU2017115745 A RU 2017115745A RU 2017115745 A RU2017115745 A RU 2017115745A RU 2017115745 A RU2017115745 A RU 2017115745A
- Authority
- RU
- Russia
- Prior art keywords
- computing device
- key
- content
- controlled
- devices
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Storage Device Security (AREA)
Claims (30)
1. Способ, реализованный в первом вычислительном устройстве для того, чтобы обеспечивать перемещение контента в различные устройства, но при этом полностью стирать из этих устройств при необходимости, при этом способ содержит этапы, на которых
принимают, из второго вычислительного устройства, контент, защищенный на основе ключа, причем контент зашифрован, и ключ ассоциирован с третьим вычислительным устройством, которое управляется посредством политики управления; и
определяют, управляется или нет первое вычислительное устройство посредством политики управления, при этом:
в ответ на определение того, что первое вычислительное устройство управляется посредством политики управления, способ дополнительно включает в себя этап, на котором ассоциируют ключ с первым вычислительным устройством; и
в ответ на определение того, что первое вычислительное устройство не управляется посредством политики управления, способ дополнительно включает в себя этап, на котором поддерживают ассоциирование ключа с третьим вычислительным устройством.
2. Способ по п. 1, в котором прием содержит этап, на котором принимают защищенный контент из второго вычислительного устройства через облачное хранилище.
3. Способ по п. 1 или 2, в котором первое вычислительное устройство, второе вычислительное устройство и третье вычислительное устройство представляют собой три отдельных вычислительных устройства.
4. Способ по любому из пп. 1-3, в котором ключ содержит ключ шифрования файла, и контент зашифрован с использованием ключа шифрования файла.
5. Способ по любому из пп. 1-3, в котором ключ содержит закрытый ключ защиты данных из пары открытого/закрытого ключа защиты данных, контент зашифрован с использованием ключа шифрования файла, и ключ шифрования файла зашифрован с использованием открытого ключа защиты данных из пары открытого/закрытого ключа защиты данных.
6. Способ по любому из пп. 1-5, дополнительно содержащий этапы, на которых
принимают команду полного стирания, указывающую команду на то, чтобы удалять ключ, ассоциированный с третьим вычислительным устройством; и
удаляют, в первом вычислительном устройстве и в ответ на то, что первое вычислительное устройство не управляется посредством политики управления, ключ, ассоциированный с третьим вычислительным устройством.
7. Способ по любому из пп. 1-5, дополнительно содержащий этапы, на которых
принимают команду полного стирания, указывающую команду на то, чтобы удалять ключ, ассоциированный с третьим вычислительным устройством; и
удаляют, в первом вычислительном устройстве и в ответ на то, что первое вычислительное устройство не управляется посредством политики управления, и ключ ассоциирован в первом вычислительном устройстве с множеством вычислительных устройств, индикатор относительно ассоциирования третьего вычислительного устройства с ключом, но не удаляют ключ из первого вычислительного устройства.
8. Первое вычислительное устройство, позволяющее перемещать контент в различные устройства, но при этом полностью стирать из этих устройств при необходимости, причем первое вычислительное устройство содержит
программу синхронизации контента, выполненную с возможностью принимать, из второго вычислительного устройства, контент, защищенный на основе ключа, причем контент зашифрован, и ключ ассоциирован с третьим вычислительным устройством, которое управляется посредством политики управления; и
модуль управления ключами, выполненный с возможностью определять то, управляется или нет первое вычислительное устройство посредством политики управления, при этом:
в ответ на определение того, что первое вычислительное устройство управляется посредством политики управления, модуль управления ключами дополнительно выполнен с возможностью ассоциировать ключ с первым вычислительным устройством; и
в ответ на определение того, что первое вычислительное устройство не управляется посредством политики управления, модуль управления ключами дополнительно выполнен с возможностью поддерживать ассоциирование ключа с третьим вычислительным устройством при отсутствии ассоциирования ключа с первым вычислительным устройством.
9. Первое вычислительное устройство по п. 8, в котором программа синхронизации контента дополнительно выполнена с возможностью принимать защищенный контент из второго вычислительного устройства через облачную услугу.
10. Первое вычислительное устройство по п. 8 или 9, при этом первое вычислительное устройство, второе вычислительное устройство и третье вычислительное устройство представляют собой три отдельных вычислительных устройства.
11. Первое вычислительное устройство по любому из пп. 8-10, в котором ключ содержит ключ шифрования файла, и контент зашифрован с использованием ключа шифрования файла.
12. Первое вычислительное устройство по любому из пп. 8-10, в котором ключ содержит закрытый ключ защиты данных из пары открытого/закрытого ключа защиты данных, контент зашифрован с использованием ключа шифрования файла, и ключ шифрования файла зашифрован с использованием открытого ключа защиты данных из пары открытого/закрытого ключа защиты данных.
13. Первое вычислительное устройство по любому из пп. 8-12, в котором модуль управления ключами дополнительно выполнен с возможностью:
принимать команду полного стирания, указывающую команду на то, чтобы удалять ключ, ассоциированный с третьим вычислительным устройством;
определять, в ответ на то, что первое вычислительное устройство не управляется посредством политики управления, то, ассоциирован или нет ключ в первом вычислительном устройстве с множеством вычислительных устройств;
удалять, в первом вычислительном устройстве и в ответ на то, что первое вычислительное устройство не управляется посредством политики управления, и ключ ассоциирован только с третьим вычислительным устройством, ключ, ассоциированный с третьим вычислительным устройством; и
удалять, в первом вычислительном устройстве и в ответ на то, что первое вычислительное устройство не управляется посредством политики управления, и ключ ассоциирован с множеством вычислительных устройств, идентификатор третьего вычислительного устройства, но хранить ключ, ассоциированный, по меньшей мере, с еще одним из множества вычислительных устройств.
14. Первое вычислительное устройство по любому из пп. 8-13, в котором модуль управления ключами дополнительно выполнен с возможностью принимать команду полного стирания из второго вычислительного устройства.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/533,921 US9900295B2 (en) | 2014-11-05 | 2014-11-05 | Roaming content wipe actions across devices |
US14/533,921 | 2014-11-05 | ||
PCT/US2015/058707 WO2016073397A1 (en) | 2014-11-05 | 2015-11-03 | Roaming content wipe actions across devices |
Publications (1)
Publication Number | Publication Date |
---|---|
RU2017115745A true RU2017115745A (ru) | 2018-11-07 |
Family
ID=54541236
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
RU2017115745A RU2017115745A (ru) | 2014-11-05 | 2015-11-03 | Действия по полному стиранию перемещаемого контента между устройствами |
Country Status (11)
Country | Link |
---|---|
US (1) | US9900295B2 (ru) |
EP (1) | EP3216188B1 (ru) |
JP (1) | JP2017535896A (ru) |
KR (1) | KR102330538B1 (ru) |
CN (1) | CN107113286B (ru) |
AU (1) | AU2015343356A1 (ru) |
BR (1) | BR112017007146A2 (ru) |
CA (1) | CA2965695A1 (ru) |
MX (1) | MX2017005801A (ru) |
RU (1) | RU2017115745A (ru) |
WO (1) | WO2016073397A1 (ru) |
Families Citing this family (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8874935B2 (en) | 2011-08-30 | 2014-10-28 | Microsoft Corporation | Sector map-based rapid data encryption policy compliance |
US20140344570A1 (en) | 2013-05-20 | 2014-11-20 | Microsoft Corporation | Data Protection For Organizations On Computing Devices |
US10615967B2 (en) | 2014-03-20 | 2020-04-07 | Microsoft Technology Licensing, Llc | Rapid data protection for storage devices |
US9455976B2 (en) * | 2014-06-03 | 2016-09-27 | Globalfoundries Inc. | Multi-factor secure appliance decommissioning |
US9825945B2 (en) | 2014-09-09 | 2017-11-21 | Microsoft Technology Licensing, Llc | Preserving data protection with policy |
US9853812B2 (en) | 2014-09-17 | 2017-12-26 | Microsoft Technology Licensing, Llc | Secure key management for roaming protected content |
US9853820B2 (en) | 2015-06-30 | 2017-12-26 | Microsoft Technology Licensing, Llc | Intelligent deletion of revoked data |
US9900325B2 (en) | 2015-10-09 | 2018-02-20 | Microsoft Technology Licensing, Llc | Passive encryption of organization data |
DE102015225778A1 (de) * | 2015-12-17 | 2017-06-22 | Deutsche Post Ag | Vorrichtung und Verfahren für die personalisierte Bereitstellung eines Schlüssels |
US10148436B2 (en) * | 2016-06-17 | 2018-12-04 | Dell Products, L.P. | Fingerprint revocation |
CN107820234B (zh) | 2016-09-14 | 2021-02-23 | 华为技术有限公司 | 一种网络漫游保护方法、相关设备及系统 |
US10223292B2 (en) * | 2016-11-28 | 2019-03-05 | Microsoft Technology Licensing, Llc | Securing stream buffers |
US10511632B2 (en) | 2017-03-03 | 2019-12-17 | Microsoft Technology Licensing, Llc | Incremental security policy development for an enterprise network |
US10419488B2 (en) | 2017-03-03 | 2019-09-17 | Microsoft Technology Licensing, Llc | Delegating security policy management authority to managed accounts |
US10819696B2 (en) * | 2017-07-13 | 2020-10-27 | Microsoft Technology Licensing, Llc | Key attestation statement generation providing device anonymity |
LU100728B1 (en) * | 2018-03-12 | 2019-10-01 | Szoelloesi Lorand | Human memory-based key generation and retrieval protocol arrangement for secure electronic signature generation |
CA3097749A1 (en) * | 2018-04-19 | 2019-10-24 | PIV Security LLC | Peer identity verification |
US11689357B2 (en) | 2018-06-01 | 2023-06-27 | Hewlett-Packard Development Company, L.P. | Key encryption key wrapping |
US10831388B2 (en) * | 2019-02-15 | 2020-11-10 | International Business Machines Corporation | Selective data destruction via a sanitizing wipe command |
WO2020197547A1 (en) * | 2019-03-27 | 2020-10-01 | Xinova, LLC | Detection of deep fake videos based on digital signature |
US11151280B2 (en) * | 2019-06-04 | 2021-10-19 | EMC IP Holding Company, LLC | Simplified deletion of personal private data in cloud backup storage for GDPR compliance |
CN113609498B (zh) * | 2021-07-15 | 2022-09-30 | 荣耀终端有限公司 | 数据保护方法及电子设备 |
Family Cites Families (212)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5495533A (en) | 1994-04-29 | 1996-02-27 | International Business Machines Corporation | Personal key archive |
US5787131A (en) | 1995-12-22 | 1998-07-28 | Ericsson Inc. | Method and apparatus for mitigation of self interference using array processing |
US6016402A (en) | 1996-05-21 | 2000-01-18 | Iomega Corporation | Method for integrating removable media disk drive into operating system recognized as fixed disk type and modifying operating system to recognize as floppy disk type |
US5897661A (en) | 1997-02-25 | 1999-04-27 | International Business Machines Corporation | Logical volume manager and method having enhanced update capability with dynamic allocation of storage and minimal storage of metadata information |
US6067199A (en) | 1997-06-30 | 2000-05-23 | Emc Corporation | Method and apparatus for increasing disc drive performance |
US5974503A (en) | 1997-04-25 | 1999-10-26 | Emc Corporation | Storage and access of continuous media files indexed as lists of raid stripe sets associated with file names |
US6028725A (en) | 1997-06-30 | 2000-02-22 | Emc Corporation | Method and apparatus for increasing disc drive performance |
US6076143A (en) | 1997-09-02 | 2000-06-13 | Emc Corporation | Method and apparatus for managing the physical storage locations for blocks of information in a storage system to increase system performance |
US5944783A (en) | 1997-07-29 | 1999-08-31 | Lincom Corporation | Apparatus and method for data transfers through software agents using client-to-server and peer-to-peer transfers |
US5966263A (en) | 1997-08-01 | 1999-10-12 | International Business Machines Corporation | Method and apparatus to increase head/AE select robustness for a system using multiple head servo write |
DE69842184D1 (de) | 1997-08-20 | 2011-04-28 | Powerquest Corp | Manipulation der speicherpartitionen wahrend der migration |
US6249866B1 (en) | 1997-09-16 | 2001-06-19 | Microsoft Corporation | Encrypting file system and method |
US6292790B1 (en) | 1997-10-20 | 2001-09-18 | James E. Krahn | Apparatus for importing and exporting partially encrypted configuration data |
US6170055B1 (en) | 1997-11-03 | 2001-01-02 | Iomega Corporation | System for computer recovery using removable high capacity media |
US6041386A (en) | 1998-02-10 | 2000-03-21 | International Business Machines Corporation | Data sharing between system using different data storage formats |
US6298446B1 (en) | 1998-06-14 | 2001-10-02 | Alchemedia Ltd. | Method and system for copyright protection of digital images transmitted over networks |
US9361243B2 (en) | 1998-07-31 | 2016-06-07 | Kom Networks Inc. | Method and system for providing restricted access to a storage medium |
US8234477B2 (en) | 1998-07-31 | 2012-07-31 | Kom Networks, Inc. | Method and system for providing restricted access to a storage medium |
US6438235B2 (en) | 1998-08-05 | 2002-08-20 | Hewlett-Packard Company | Media content protection utilizing public key cryptography |
US7380140B1 (en) | 1998-12-30 | 2008-05-27 | Spyrus, Inc. | Providing a protected volume on a data storage device |
GB9903490D0 (en) | 1999-02-17 | 1999-04-07 | Memory Corp Plc | Memory system |
JP2000341263A (ja) | 1999-05-27 | 2000-12-08 | Sony Corp | 情報処理装置及び方法 |
US7451484B1 (en) | 1999-05-27 | 2008-11-11 | International Business Machines Corporation | Method for enabling a program written in untrusted code to interact with a security subsystem of a hosting operating system |
US6292317B1 (en) | 1999-09-02 | 2001-09-18 | Maxtor Corporation | Method and apparatus for performing a flaw scan of a disk drive |
US6665784B2 (en) | 1999-09-03 | 2003-12-16 | Roxio, Inc. | Method for writing and reading data to and from a compact disc media |
US7216251B2 (en) | 2000-02-19 | 2007-05-08 | Powerquest Corporation | Computer imaging recovery without a working partition or a secondary medium |
US6944742B1 (en) | 2000-04-28 | 2005-09-13 | Microsoft Corporation | Compressed file system for non-volatile RAM |
US7197638B1 (en) | 2000-08-21 | 2007-03-27 | Symantec Corporation | Unified permissions control for remotely and locally stored files whose informational content may be protected by smart-locking and/or bubble-protection |
US6789162B1 (en) | 2000-10-17 | 2004-09-07 | Sun Microsystems, Inc. | Storage controller configured to select unused regions of a storage device for data storage according to head position |
US6727896B2 (en) | 2001-08-01 | 2004-04-27 | Microsoft Corporation | Correction of alignment and linearity errors in a stylus input system |
US20030084298A1 (en) | 2001-10-25 | 2003-05-01 | Messerges Thomas S. | Method for efficient hashing of digital content |
US7171557B2 (en) | 2001-10-31 | 2007-01-30 | Hewlett-Packard Development Company, L.P. | System for optimized key management with file groups |
US7903549B2 (en) | 2002-03-08 | 2011-03-08 | Secure Computing Corporation | Content-based policy compliance systems and methods |
US7614077B2 (en) | 2002-04-10 | 2009-11-03 | International Business Machines Corporation | Persistent access control of protected content |
US7269612B2 (en) | 2002-05-31 | 2007-09-11 | International Business Machines Corporation | Method, system, and program for a policy based storage manager |
CA2496664C (en) | 2002-08-23 | 2015-02-17 | Exit-Cube, Inc. | Encrypting operating system |
CA2496779C (en) | 2002-08-26 | 2011-02-15 | Guardednet, Inc. | Determining threat level associated with network activity |
US20060190984A1 (en) | 2002-09-23 | 2006-08-24 | Credant Technologies, Inc. | Gatekeeper architecture/features to support security policy maintenance and distribution |
KR100492800B1 (ko) | 2002-11-12 | 2005-06-07 | 주식회사 하이닉스반도체 | 불휘발성 강유전체 메모리 제어 장치 |
US7181016B2 (en) | 2003-01-27 | 2007-02-20 | Microsoft Corporation | Deriving a symmetric key from an asymmetric key for file encryption or decryption |
US20090177664A9 (en) | 2003-05-07 | 2009-07-09 | Hotchkiss Lynette I | System and Method for Regulatory Rules Repository Generation and Maintenance |
WO2004107646A1 (en) | 2003-05-14 | 2004-12-09 | Threatguard, Inc. | System and method for application-level virtual private network |
US7360073B1 (en) | 2003-05-15 | 2008-04-15 | Pointsec Mobile Technologies, Llc | Method and apparatus for providing a secure boot for a computer system |
US6968973B2 (en) | 2003-05-31 | 2005-11-29 | Microsoft Corporation | System and process for viewing and navigating through an interactive video tour |
US7389273B2 (en) * | 2003-09-25 | 2008-06-17 | Scott Andrew Irwin | System and method for federated rights management |
GB2406403B (en) | 2003-09-26 | 2006-06-07 | Advanced Risc Mach Ltd | Data processing apparatus and method for merging secure and non-secure data into an output data stream |
US7730318B2 (en) | 2003-10-24 | 2010-06-01 | Microsoft Corporation | Integration of high-assurance features into an application through application factoring |
US20050120265A1 (en) | 2003-12-02 | 2005-06-02 | Pline Steven L. | Data storage system with error correction code and replaceable defective memory |
US7536536B1 (en) | 2003-12-15 | 2009-05-19 | American Megatrends, Inc. | Method, system, and computer readable medium for updating and utilizing the contents of a non-essential region of a memory device |
US7930540B2 (en) | 2004-01-22 | 2011-04-19 | Mcafee, Inc. | Cryptographic policy enforcement |
US7254669B2 (en) | 2004-01-29 | 2007-08-07 | International Business Machines Corporation | Create virtual track buffers in NVS using customer segments to maintain newly written data across a power loss |
US7559088B2 (en) | 2004-02-04 | 2009-07-07 | Netapp, Inc. | Method and apparatus for deleting data upon expiration |
US7627617B2 (en) | 2004-02-11 | 2009-12-01 | Storage Technology Corporation | Clustered hierarchical file services |
US20050262361A1 (en) | 2004-05-24 | 2005-11-24 | Seagate Technology Llc | System and method for magnetic storage disposal |
CN100353787C (zh) | 2004-06-23 | 2007-12-05 | 华为技术有限公司 | 一种移动终端内存储的资料信息的安全保障方法 |
US7409623B2 (en) | 2004-11-04 | 2008-08-05 | Sigmatel, Inc. | System and method of reading non-volatile computer memory |
US7725703B2 (en) | 2005-01-07 | 2010-05-25 | Microsoft Corporation | Systems and methods for securely booting a computer with a trusted processing module |
US7308525B2 (en) | 2005-01-10 | 2007-12-11 | Sandisk Il Ltd. | Method of managing a multi-bit cell flash memory with improved reliablility and performance |
WO2006089092A2 (en) | 2005-02-16 | 2006-08-24 | Ziyad Dahbour | Hierarchal data management |
US8302178B2 (en) | 2005-03-07 | 2012-10-30 | Noam Camiel | System and method for a dynamic policies enforced file system for a data storage device |
US7277986B2 (en) | 2005-03-30 | 2007-10-02 | Emc Corporation | Sector-edge cache |
US7516478B2 (en) | 2005-06-03 | 2009-04-07 | Microsoft Corporation | Remote management of mobile devices |
US20070028231A1 (en) | 2005-08-01 | 2007-02-01 | International Business Machines Corporation | System and method for start menu and application uninstall synchronization |
US7602906B2 (en) | 2005-08-25 | 2009-10-13 | Microsoft Corporation | Cipher for disk encryption |
US7730327B2 (en) | 2005-09-09 | 2010-06-01 | Netapp, Inc. | Managing the encryption of data |
US7694134B2 (en) | 2005-11-11 | 2010-04-06 | Computer Associates Think, Inc. | System and method for encrypting data without regard to application |
TW200723093A (en) | 2005-12-14 | 2007-06-16 | Inventec Corp | Method for establishing mirror storage equipment and synchronously storing equipment update data |
US8321859B2 (en) | 2005-12-22 | 2012-11-27 | Alan Joshua Shapiro | Method and apparatus for dispensing on a data-storage medium customized content comprising selected assets |
US7594087B2 (en) | 2006-01-19 | 2009-09-22 | Sigmatel, Inc. | System and method for writing data to and erasing data from non-volatile memory |
JP4838610B2 (ja) | 2006-03-24 | 2011-12-14 | キヤノン株式会社 | 文書管理装置、文書管理方法、プログラム |
CA2649441A1 (en) | 2006-04-14 | 2007-10-25 | Advanced Solutions, Inc. | Method, system, and computer-readable medium to provide version management of documents in a file management system |
JP4749930B2 (ja) | 2006-04-24 | 2011-08-17 | 株式会社日立製作所 | 計算機システム及び管理計算機とストレージ装置並びにボリューム割当確認方法 |
US20080010468A1 (en) | 2006-06-06 | 2008-01-10 | Ruiz R P | Method and technique for enforcing transience and propagation constraints on data transmitted by one entity to another entity by means of data division and retention |
US7711923B2 (en) | 2006-06-23 | 2010-05-04 | Microsoft Corporation | Persistent flash memory mapping table |
US8307148B2 (en) | 2006-06-23 | 2012-11-06 | Microsoft Corporation | Flash management techniques |
US8416954B1 (en) | 2008-09-30 | 2013-04-09 | Emc Corporation | Systems and methods for accessing storage or network based replicas of encrypted volumes with no additional key management |
GB0614515D0 (en) | 2006-07-21 | 2006-08-30 | Ibm | An apparatus for managing power-consumption |
US8015433B2 (en) | 2006-09-13 | 2011-09-06 | Hitachi Global Storage Technologies Netherlands B.V. | Disk drive with nonvolatile memory for storage of failure-related data |
US20080091613A1 (en) | 2006-09-28 | 2008-04-17 | Microsoft Corporation | Rights management in a cloud |
US8601598B2 (en) | 2006-09-29 | 2013-12-03 | Microsoft Corporation | Off-premise encryption of data storage |
US7890796B2 (en) | 2006-10-04 | 2011-02-15 | Emc Corporation | Automatic media error correction in a file server |
US8396214B2 (en) | 2006-11-02 | 2013-03-12 | SAP Portals Israel Limited | Method and apparatus for centrally managed encrypted partition |
US8135135B2 (en) | 2006-12-08 | 2012-03-13 | Microsoft Corporation | Secure data protection during disasters |
US7702973B2 (en) | 2007-01-05 | 2010-04-20 | Broadcom Corporation | Modified defect scan over sync mark/preamble field |
CA2676289C (en) | 2007-01-19 | 2018-01-02 | Research In Motion Limited | Selectively wiping a remote device |
WO2008116346A1 (en) | 2007-03-26 | 2008-10-02 | Intel Corporation | Enhanced digital right management framework |
US8369411B2 (en) | 2007-03-29 | 2013-02-05 | James Au | Intra-macroblock video processing |
JP2008250779A (ja) | 2007-03-30 | 2008-10-16 | Hitachi Ltd | 暗号機能を備えた記憶制御装置、データ暗号化方法及び記憶システム |
US7864960B2 (en) | 2007-05-31 | 2011-01-04 | Novell, Inc. | Techniques for securing content in an untrusted environment |
JP4405533B2 (ja) | 2007-07-20 | 2010-01-27 | 株式会社東芝 | キャッシュ方法及びキャッシュ装置 |
US8452967B2 (en) | 2007-08-31 | 2013-05-28 | Microsoft Corporation | Using flash storage device to prevent unauthorized use of software |
US8554176B2 (en) | 2007-09-18 | 2013-10-08 | Qualcomm Incorporated | Method and apparatus for creating a remotely activated secure backup service for mobile handsets |
US8249257B2 (en) | 2007-09-28 | 2012-08-21 | Intel Corporation | Virtual TPM keys rooted in a hardware TPM |
CN101436192B (zh) | 2007-11-16 | 2011-03-16 | 国际商业机器公司 | 用于优化针对垂直存储式数据库的查询的方法和设备 |
WO2009069043A2 (en) | 2007-11-26 | 2009-06-04 | Koninklijke Philips Electronics N.V. | Method of managing data in communication network comprising at least a first and a second node |
US8707385B2 (en) | 2008-02-11 | 2014-04-22 | Oracle International Corporation | Automated compliance policy enforcement in software systems |
US20090210267A1 (en) | 2008-02-18 | 2009-08-20 | Bryan David Fish | System and method for automatically mapping security controls to subjects |
US7962739B2 (en) | 2008-02-25 | 2011-06-14 | Lenovo (Singapore) Pte. Ltd. | Recovering from hard disk errors that corrupt one or more critical system boot files |
US7890664B1 (en) | 2008-03-31 | 2011-02-15 | Emc Corporation | Methods and apparatus for non-disruptive upgrade by redirecting I/O operations |
WO2009138928A1 (en) | 2008-05-13 | 2009-11-19 | Nxp B.V. | Secure direct memory access |
US7979626B2 (en) | 2008-05-13 | 2011-07-12 | Microsoft Corporation | Flash recovery employing transaction log |
US20090307563A1 (en) | 2008-06-05 | 2009-12-10 | Ibm Corporation (Almaden Research Center) | Replacing bad hard drive sectors using mram |
US8423792B2 (en) | 2008-06-05 | 2013-04-16 | International Business Machines Corporation | Apparatus, system, and method for communication between a driver and an encryption source |
US20090307759A1 (en) | 2008-06-06 | 2009-12-10 | Microsoft Corporation | Temporary Domain Membership for Content Sharing |
US8943551B2 (en) | 2008-08-14 | 2015-01-27 | Microsoft Corporation | Cloud-based device information storage |
US9432184B2 (en) | 2008-09-05 | 2016-08-30 | Vixs Systems Inc. | Provisioning of secure storage for both static and dynamic rules for cryptographic key information |
US8332604B2 (en) | 2008-09-30 | 2012-12-11 | Intel Corporation | Methods to securely bind an encryption key to a storage device |
US8341430B2 (en) | 2008-10-03 | 2012-12-25 | Microsoft Corporation | External encryption and recovery management with hardware encrypted storage devices |
US8411863B2 (en) | 2008-10-03 | 2013-04-02 | Microsoft Corporation | Full volume encryption in a clustered environment |
TW201015322A (en) | 2008-10-08 | 2010-04-16 | Ee Solutions Inc | Method and system for data secured data recovery |
US8387109B2 (en) | 2008-10-23 | 2013-02-26 | Microsoft Corporation | Access control state determination based on security policy and secondary access control state |
US8336079B2 (en) | 2008-12-31 | 2012-12-18 | Hytrust, Inc. | Intelligent security control system for virtualized ecosystems |
US20100306176A1 (en) | 2009-01-28 | 2010-12-02 | Digitiliti, Inc. | Deduplication of files |
KR100928467B1 (ko) | 2009-02-02 | 2009-11-25 | 주식회사 파수닷컴 | 클립보드 보안 시스템 및 방법 |
US8341427B2 (en) | 2009-02-16 | 2012-12-25 | Microsoft Corporation | Trusted cloud computing and services framework |
TWI493950B (zh) | 2009-02-24 | 2015-07-21 | Fineart Technology Co Ltd | 條件式電子文件權限控管系統及方法 |
US8046533B2 (en) | 2009-03-10 | 2011-10-25 | Emulex Design & Manufacturing Corporation | System and method for sector remapping |
TW201035754A (en) | 2009-03-25 | 2010-10-01 | Inventec Corp | RAID processing method |
US20100266132A1 (en) | 2009-04-15 | 2010-10-21 | Microsoft Corporation | Service-based key escrow and security for device data |
US8286004B2 (en) | 2009-10-09 | 2012-10-09 | Lsi Corporation | Saving encryption keys in one-time programmable memory |
US8538919B1 (en) | 2009-05-16 | 2013-09-17 | Eric H. Nielsen | System, method, and computer program for real time remote recovery of virtual computing machines |
US20100299152A1 (en) | 2009-05-20 | 2010-11-25 | Mobile Iron, Inc. | Selective Management of Mobile Devices in an Enterprise Environment |
US8588422B2 (en) | 2009-05-28 | 2013-11-19 | Novell, Inc. | Key management to protect encrypted data of an endpoint computing device |
US8578157B2 (en) * | 2009-05-29 | 2013-11-05 | Adobe Systems Incorporated | System and method for digital rights management with authorized device groups |
US8321688B2 (en) | 2009-06-12 | 2012-11-27 | Microsoft Corporation | Secure and private backup storage and processing for trusted computing and data services |
US8719486B2 (en) | 2009-06-24 | 2014-05-06 | Micron Technology, Inc. | Pinning content in nonvolatile memory |
US9141489B2 (en) | 2009-07-09 | 2015-09-22 | Uniloc Luxembourg S.A. | Failover procedure for server system |
US20110055559A1 (en) | 2009-08-27 | 2011-03-03 | Jun Li | Data retention management |
US8498418B2 (en) | 2009-08-31 | 2013-07-30 | International Business Machines Corporation | Conversion of cryptographic key protection |
US20110060915A1 (en) | 2009-09-10 | 2011-03-10 | International Business Machines Corporation | Managing Encryption of Data |
US8726407B2 (en) | 2009-10-16 | 2014-05-13 | Deviceauthority, Inc. | Authentication of computing and communications hardware |
EP2348449A3 (en) | 2009-12-18 | 2013-07-10 | CompuGroup Medical AG | A computer implemented method for performing cloud computing on data being stored pseudonymously in a database |
US20110154023A1 (en) | 2009-12-21 | 2011-06-23 | Smith Ned M | Protected device management |
KR101654774B1 (ko) | 2010-02-08 | 2016-09-06 | 시게이트 테크놀로지 엘엘씨 | 데이터 저장 장치와 저장 매체 액세스 방법 및 그에 대한 저장 매체 |
US9703586B2 (en) | 2010-02-17 | 2017-07-11 | Microsoft Technology Licensing, Llc | Distribution control and tracking mechanism of virtual machine appliances |
US20130061035A1 (en) | 2010-03-09 | 2013-03-07 | Lock Box Pty Ltd | Method and system for sharing encrypted content |
US8930713B2 (en) | 2010-03-10 | 2015-01-06 | Dell Products L.P. | System and method for general purpose encryption of data |
US8375437B2 (en) | 2010-03-30 | 2013-02-12 | Microsoft Corporation | Hardware supported virtualized cryptographic service |
FR2958478B1 (fr) | 2010-04-02 | 2012-05-04 | Sergio Loureiro | Procede de securisation de donnees et/ou des applications dans une architecture informatique en nuage |
US8433901B2 (en) | 2010-04-07 | 2013-04-30 | Apple Inc. | System and method for wiping encrypted data on a device having file-level content protection |
US20110264925A1 (en) | 2010-04-23 | 2011-10-27 | Russo Leonard E | Securing data on a self-encrypting storage device |
US8935384B2 (en) | 2010-05-06 | 2015-01-13 | Mcafee Inc. | Distributed data revocation using data commands |
US8707457B2 (en) | 2010-05-09 | 2014-04-22 | Citrix Systems, Inc. | Methods and systems for forcing an application to store data in a secure storage location |
US8458490B2 (en) | 2010-05-28 | 2013-06-04 | Dell Products, Lp | System and method for supporting full volume encryption devices in a client hosted virtualization system |
US8625802B2 (en) | 2010-06-16 | 2014-01-07 | Porticor Ltd. | Methods, devices, and media for secure key management in a non-secured, distributed, virtualized environment with applications to cloud-computing security and management |
US20120017095A1 (en) | 2010-07-19 | 2012-01-19 | Coreguard | Software Service for Encrypting and Decrypting Data |
US9064131B2 (en) | 2010-07-28 | 2015-06-23 | Nextlabs, Inc. | Protecting documents using policies and encryption |
US8539245B2 (en) | 2010-08-06 | 2013-09-17 | Intel Corporation | Apparatus and method for accessing a secure partition in non-volatile storage by a host system enabled after the system exits a first instance of a secure mode |
US8385014B2 (en) | 2010-10-11 | 2013-02-26 | Lsi Corporation | Systems and methods for identifying potential media failure |
US8452982B2 (en) * | 2010-10-29 | 2013-05-28 | Adobe Systems Incorporated | Methods and systems for migrating content licenses |
US8661193B1 (en) | 2010-10-29 | 2014-02-25 | Western Digital Technologies, Inc. | Disk drive with partial sector management |
US9071580B2 (en) | 2010-11-01 | 2015-06-30 | Blackberry Limited | Method and system for securing data of a mobile communications device |
US8352749B2 (en) | 2010-12-17 | 2013-01-08 | Google Inc. | Local trusted services manager for a contactless smart card |
US8924739B2 (en) | 2011-01-05 | 2014-12-30 | Apple Inc. | System and method for in-place encryption |
US20120239618A1 (en) | 2011-03-16 | 2012-09-20 | I O Interconnect, Ltd. | File sharing mechanism |
WO2012129191A2 (en) | 2011-03-18 | 2012-09-27 | Fusion-Io, Inc. | Logical interfaces for contextual storage |
US8769305B2 (en) | 2011-03-21 | 2014-07-01 | Moncana Corporation | Secure execution of unsecured apps on a device |
EP2509275A1 (en) | 2011-04-04 | 2012-10-10 | Buntinx | Method and system for authenticating entities by means of mobile terminals |
US8527561B1 (en) | 2011-05-17 | 2013-09-03 | Crossroads Systems, Inc. | System and method for implementing a networked file system utilizing a media library |
US9141779B2 (en) | 2011-05-19 | 2015-09-22 | Microsoft Technology Licensing, Llc | Usable security of online password management with sensor-based authentication |
WO2012167392A2 (en) | 2011-06-06 | 2012-12-13 | ETH Zürich | Method and devices for secure deletion of data in a log structured file system |
US10496824B2 (en) | 2011-06-24 | 2019-12-03 | Microsoft Licensing Technology, LLC | Trusted language runtime on a mobile platform |
EP2562675A1 (fr) | 2011-08-19 | 2013-02-27 | Gemalto SA | Procédé de cloisonnement matériel des ressources d'un système informatique sécurisé |
US8874935B2 (en) | 2011-08-30 | 2014-10-28 | Microsoft Corporation | Sector map-based rapid data encryption policy compliance |
US8689279B2 (en) | 2011-08-30 | 2014-04-01 | Microsoft Corporation | Encrypted chunk-based rapid data encryption policy compliance |
US8856553B2 (en) | 2011-09-12 | 2014-10-07 | Microsoft Corporation | Managing self-encrypting drives in decentralized environments |
FR2980285B1 (fr) | 2011-09-15 | 2013-11-15 | Maxim Integrated Products | Systemes et procedes de gestion de cles cryptographiques dans un microcontroleur securise |
US10165007B2 (en) | 2011-09-15 | 2018-12-25 | Microsoft Technology Licensing, Llc | Securing data usage in computing devices |
US8479021B2 (en) | 2011-09-29 | 2013-07-02 | Pacid Technologies, Llc | Secure island computing system and method |
US8695060B2 (en) | 2011-10-10 | 2014-04-08 | Openpeak Inc. | System and method for creating secure applications |
US8799994B2 (en) | 2011-10-11 | 2014-08-05 | Citrix Systems, Inc. | Policy-based application management |
US20140032733A1 (en) | 2011-10-11 | 2014-01-30 | Citrix Systems, Inc. | Policy-Based Application Management |
US9378359B2 (en) | 2011-10-11 | 2016-06-28 | Citrix Systems, Inc. | Gateway for controlling mobile device access to enterprise resources |
US9100235B2 (en) | 2011-11-07 | 2015-08-04 | At&T Intellectual Property I, L.P. | Secure desktop applications for an open computing platform |
US10291658B2 (en) | 2011-11-09 | 2019-05-14 | Microsoft Technology Licensing, Llc | Techniques to apply and share remote policies on mobile devices |
CN103975332B (zh) * | 2011-12-08 | 2018-08-14 | 英特尔公司 | 用于使用基于硬件的信任根以对等方式进行基于策略的内容共享的方法和装置 |
US9245143B2 (en) * | 2012-02-09 | 2016-01-26 | Microsoft Technology Licensing, Llc | Security policy for device data |
WO2013122869A1 (en) | 2012-02-13 | 2013-08-22 | Eugene Shablygin | Sharing secure data |
US8875298B2 (en) | 2012-02-16 | 2014-10-28 | Nec Laboratories America, Inc. | Method for scalable analysis of android applications for security vulnerability |
CN102646077B (zh) | 2012-03-28 | 2016-06-15 | 山东超越数控电子有限公司 | 一种基于可信密码模块的全盘加密的方法 |
US8914634B2 (en) * | 2012-04-10 | 2014-12-16 | Western Digital Technologies, Inc. | Digital rights management system transfer of content and distribution |
US9253209B2 (en) | 2012-04-26 | 2016-02-02 | International Business Machines Corporation | Policy-based dynamic information flow control on mobile devices |
US20130318361A1 (en) | 2012-05-22 | 2013-11-28 | Partnet, Inc. | Encrypting and storing biometric information on a storage device |
EP2680487B1 (en) | 2012-06-29 | 2019-04-10 | Orange | Secured cloud data storage, distribution and restoration among multiple devices of a user |
US20140019753A1 (en) | 2012-07-10 | 2014-01-16 | John Houston Lowry | Cloud key management |
US10079678B2 (en) | 2012-07-24 | 2018-09-18 | Intel Corporation | Providing access to encrypted data |
US20140075493A1 (en) | 2012-09-12 | 2014-03-13 | Avaya, Inc. | System and method for location-based protection of mobile data |
US10268775B2 (en) | 2012-09-17 | 2019-04-23 | Nokia Technologies Oy | Method and apparatus for accessing and displaying private user information |
US8745755B2 (en) * | 2012-10-12 | 2014-06-03 | Citrix Systems, Inc. | Controlling device access to enterprise resources in an orchestration framework for connected devices |
US20140109176A1 (en) | 2012-10-15 | 2014-04-17 | Citrix Systems, Inc. | Configuring and providing profiles that manage execution of mobile applications |
US8875304B2 (en) | 2012-11-08 | 2014-10-28 | International Business Machines Corporation | Application and data removal system |
US9454670B2 (en) | 2012-12-03 | 2016-09-27 | International Business Machines Corporation | Hybrid file systems |
US8997197B2 (en) | 2012-12-12 | 2015-03-31 | Citrix Systems, Inc. | Encryption-based data access management |
CN103092938A (zh) | 2013-01-07 | 2013-05-08 | 浙江鸿程计算机系统有限公司 | 一种智能清理Android手机SD卡垃圾文件的方法 |
CN103092664B (zh) | 2013-02-07 | 2016-08-03 | 珠海市君天电子科技有限公司 | 一种安卓系统的数据文件的处理方法和装置 |
US9547771B2 (en) | 2013-02-12 | 2017-01-17 | Amazon Technologies, Inc. | Policy enforcement with associated data |
US9892284B2 (en) | 2013-03-11 | 2018-02-13 | Lantiq Beteiligungs-GmbH & Co. KG | Trusted execution thread in an embedded multithreaded system |
US20140344570A1 (en) * | 2013-05-20 | 2014-11-20 | Microsoft Corporation | Data Protection For Organizations On Computing Devices |
WO2015050587A2 (en) | 2013-05-31 | 2015-04-09 | Openpeak Inc. | Method and system for isolating secure communication events from a non-secure application |
US9369289B1 (en) | 2013-07-17 | 2016-06-14 | Google Inc. | Methods and systems for performing secure authenticated updates of authentication credentials |
US9465947B2 (en) | 2013-08-05 | 2016-10-11 | Samsung Sds America, Inc. | System and method for encryption and key management in cloud storage |
US9167002B2 (en) | 2013-08-15 | 2015-10-20 | Microsoft Technology Licensing, Llc | Global platform health management |
CN103577567A (zh) | 2013-10-29 | 2014-02-12 | 广东欧珀移动通信有限公司 | 一种Android系统卸载应用删除垃圾文件的方法 |
CN103500116A (zh) | 2013-10-29 | 2014-01-08 | 中科创达软件股份有限公司 | 一种清除应用程序生成的数据的方法及系统 |
US10615967B2 (en) | 2014-03-20 | 2020-04-07 | Microsoft Technology Licensing, Llc | Rapid data protection for storage devices |
US9411975B2 (en) | 2014-03-31 | 2016-08-09 | Intel Corporation | Methods and apparatus to securely share data |
US9825945B2 (en) | 2014-09-09 | 2017-11-21 | Microsoft Technology Licensing, Llc | Preserving data protection with policy |
US9853812B2 (en) | 2014-09-17 | 2017-12-26 | Microsoft Technology Licensing, Llc | Secure key management for roaming protected content |
CA2970310C (en) | 2014-12-15 | 2023-09-26 | Good Technology Holdings Limited | Secure storage |
US10073791B2 (en) | 2015-03-25 | 2018-09-11 | Vera | Securing files |
US9853820B2 (en) | 2015-06-30 | 2017-12-26 | Microsoft Technology Licensing, Llc | Intelligent deletion of revoked data |
US9900325B2 (en) | 2015-10-09 | 2018-02-20 | Microsoft Technology Licensing, Llc | Passive encryption of organization data |
-
2014
- 2014-11-05 US US14/533,921 patent/US9900295B2/en active Active
-
2015
- 2015-11-03 BR BR112017007146A patent/BR112017007146A2/pt not_active Application Discontinuation
- 2015-11-03 AU AU2015343356A patent/AU2015343356A1/en not_active Abandoned
- 2015-11-03 EP EP15794429.9A patent/EP3216188B1/en active Active
- 2015-11-03 JP JP2017542824A patent/JP2017535896A/ja active Pending
- 2015-11-03 WO PCT/US2015/058707 patent/WO2016073397A1/en active Application Filing
- 2015-11-03 CN CN201580060452.1A patent/CN107113286B/zh active Active
- 2015-11-03 MX MX2017005801A patent/MX2017005801A/es unknown
- 2015-11-03 CA CA2965695A patent/CA2965695A1/en not_active Abandoned
- 2015-11-03 RU RU2017115745A patent/RU2017115745A/ru not_active Application Discontinuation
- 2015-11-03 KR KR1020177012237A patent/KR102330538B1/ko active IP Right Grant
Also Published As
Publication number | Publication date |
---|---|
KR20170083039A (ko) | 2017-07-17 |
BR112017007146A2 (pt) | 2017-12-19 |
AU2015343356A1 (en) | 2017-05-11 |
US20160127327A1 (en) | 2016-05-05 |
US9900295B2 (en) | 2018-02-20 |
JP2017535896A (ja) | 2017-11-30 |
MX2017005801A (es) | 2017-08-02 |
KR102330538B1 (ko) | 2021-11-23 |
EP3216188B1 (en) | 2019-08-07 |
CN107113286A (zh) | 2017-08-29 |
CN107113286B (zh) | 2020-02-28 |
WO2016073397A1 (en) | 2016-05-12 |
EP3216188A1 (en) | 2017-09-13 |
CA2965695A1 (en) | 2016-05-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
RU2017115745A (ru) | Действия по полному стиранию перемещаемого контента между устройствами | |
DK3381172T3 (da) | Fremgangsmåde og system til at fordele kryptografisk nøglefrembringelse og -lagring ved hjælp af elliptisk kurvekryptografi | |
EA201690730A1 (ru) | Система и способ управления, объединения и распространения ключей шифрования | |
WO2016040204A3 (en) | Preserving data protection with policy | |
MX356939B (es) | Metodo y sistema para generar una llave de almacenamiento avanzada en un dispositivo movil sin elementos de seguridad. | |
WO2016126332A3 (en) | Data security operations with expectations | |
EP3363154A4 (en) | STORAGE AND REVIEW OF CRYPTOGRAPHIC KEYS FROM BIOMETRIC DATA | |
JP2017500670A5 (ru) | ||
WO2014179145A3 (en) | Drive level encryption key management in a distributed storage system | |
WO2017030625A3 (en) | Loading and virtualizing cryptographic keys | |
MX2015009172A (es) | Sistemas y metodos para identificar y reportar vulnerabilidades de aplicaciones y archivos. | |
NZ720190A (en) | System and methods for encrypting data | |
MX2017005095A (es) | Funciones de particion compuesta. | |
MX2017001678A (es) | Sistema de contacto movil seguro (smcs). | |
GB2541572A (en) | Applications of secured memory areas and secure environments in policy-based access control systems for mobile devices | |
MX349569B (es) | Sistemas y metodos de reglas a base de riesgo para control de aplicaciones. | |
GB201211472D0 (en) | Ordered deletion of content in storage systems | |
WO2015123611A3 (en) | Systems and methods for providing network security using a secure digital device | |
MX2016016009A (es) | Sistema y metodos para una credencial inlcuyendo multiples privilegios de acceso. | |
BR112018000325A2 (pt) | separação de módulos de software por gerenciamento de chave de criptografia controlado | |
EP3441903A4 (en) | ACCESS MANAGEMENT SYSTEM, FILE ACCESS SYSTEM, ENCRYPTION DEVICE AND PROGRAM | |
WO2016109152A8 (en) | Secure event log management | |
CA2839078C (en) | Virtual storage system and methods of copying electronic documents into the virtual storage system | |
JP2017046358A5 (ru) | ||
GB2550081A (en) | Secure file transfer |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FA93 | Acknowledgement of application withdrawn (no request for examination) |
Effective date: 20181105 |