RU2017130840A - SYSTEMS AND METHODS FOR MANAGING ACCESS TO PROTECTED DATA - Google Patents
SYSTEMS AND METHODS FOR MANAGING ACCESS TO PROTECTED DATA Download PDFInfo
- Publication number
- RU2017130840A RU2017130840A RU2017130840A RU2017130840A RU2017130840A RU 2017130840 A RU2017130840 A RU 2017130840A RU 2017130840 A RU2017130840 A RU 2017130840A RU 2017130840 A RU2017130840 A RU 2017130840A RU 2017130840 A RU2017130840 A RU 2017130840A
- Authority
- RU
- Russia
- Prior art keywords
- file
- encrypted file
- client
- permissions
- chain
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/17—Details of further file system functions
- G06F16/176—Support for shared access to files; File sharing support
- G06F16/1767—Concurrency control, e.g. optimistic or pessimistic approaches
- G06F16/1774—Locking methods, e.g. locking methods for file systems allowing shared and concurrent access to files
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Claims (12)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
RU2017130840A RU2744970C2 (en) | 2017-08-31 | 2017-08-31 | Systems and methods to control access to secure data |
US16/119,542 US11132451B2 (en) | 2017-08-31 | 2018-08-31 | Secret data access control systems and methods |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
RU2017130840A RU2744970C2 (en) | 2017-08-31 | 2017-08-31 | Systems and methods to control access to secure data |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
RU2021106262A Division RU2021106262A (en) | 2021-03-11 | METHODS TO EXTRACT AN ENCRYPTED FILE USING THE BLOCK CHAIN |
Publications (3)
Publication Number | Publication Date |
---|---|
RU2017130840A true RU2017130840A (en) | 2019-02-28 |
RU2017130840A3 RU2017130840A3 (en) | 2020-08-19 |
RU2744970C2 RU2744970C2 (en) | 2021-03-17 |
Family
ID=65632540
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
RU2017130840A RU2744970C2 (en) | 2017-08-31 | 2017-08-31 | Systems and methods to control access to secure data |
Country Status (1)
Country | Link |
---|---|
RU (1) | RU2744970C2 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111050317A (en) * | 2019-12-07 | 2020-04-21 | 江西理工大学 | Intelligent traffic data safety sharing method based on alliance block chain |
CN114448712A (en) * | 2022-02-24 | 2022-05-06 | 浪潮云信息技术股份公司 | Method and device for realizing security gateway of interplanetary file system |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160321751A1 (en) * | 2015-04-28 | 2016-11-03 | Domus Tower, Inc. | Real-time settlement of securities trades over append-only ledgers |
US10097356B2 (en) * | 2015-07-02 | 2018-10-09 | Nasdaq, Inc. | Systems and methods of secure provenance for distributed transaction databases |
US11494761B2 (en) * | 2015-11-06 | 2022-11-08 | Cable Television Laboratories, Inc. | Systems and methods for digital asset security ecosystems |
RU2015156433A (en) * | 2015-12-28 | 2017-07-04 | Дмитрий Сергеевич Ермолаев | METHOD FOR MAKING A DISTRIBUTED DATABASE IN A UNIFIED ACCOUNTING ENVIRONMENT SIMILAR TO BITCOIN |
US20170200137A1 (en) * | 2016-01-08 | 2017-07-13 | The Western Union Company | Combined security for electronic transfers |
-
2017
- 2017-08-31 RU RU2017130840A patent/RU2744970C2/en active
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111050317A (en) * | 2019-12-07 | 2020-04-21 | 江西理工大学 | Intelligent traffic data safety sharing method based on alliance block chain |
CN111050317B (en) * | 2019-12-07 | 2022-08-02 | 江西理工大学 | Intelligent traffic data safety sharing method based on alliance block chain |
CN114448712A (en) * | 2022-02-24 | 2022-05-06 | 浪潮云信息技术股份公司 | Method and device for realizing security gateway of interplanetary file system |
Also Published As
Publication number | Publication date |
---|---|
RU2744970C2 (en) | 2021-03-17 |
RU2017130840A3 (en) | 2020-08-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20210203497A1 (en) | Method for re-keying an encrypted data file | |
GB2573666A (en) | Verifying authenticity of computer readable information using the blockchain | |
US9930014B2 (en) | Methods and apparatus for key delivery in HTTP live streaming | |
SG11201903671WA (en) | Data transmission method, apparatus and system | |
NZ770092A (en) | Methods and systems for virtual file storage and encryption | |
WO2017024934A1 (en) | Electronic signing method, device and signing server | |
WO2015121806A3 (en) | System and method for securing content keys delivered in manifest files | |
BR112017003018A2 (en) | secure provision of an authentication credential | |
EA201891822A1 (en) | SECURITY OF PERSONAL DEVICES USING CRYPTOGRAPHY BASED ON ELLIPTIC CURVES TO SEPARATE A SECRET | |
EP4236203A3 (en) | Data security using request-supplied keys | |
PH12018550176A1 (en) | Using hardware based secure isolated region to prevent piracy and cheating on electronic devices | |
TW201612787A (en) | Network authentication method for secure electronic transactions | |
MX2013004764A (en) | Methods for processing private metadata. | |
ATE532144T1 (en) | DOCUMENT SECURITY MANAGEMENT SYSTEM | |
CN105323209A (en) | Cloud data security protection method adopting fully homomorphic encryption technology and multiple digital watermarking technology | |
PH12018502160A1 (en) | Systems and methods for secure storage of user information in a user profile | |
JP2016512675A5 (en) | ||
GB201303677D0 (en) | A method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors | |
NZ720190A (en) | System and methods for encrypting data | |
JP2013509089A5 (en) | ||
MX2019008693A (en) | Addressing a trusted execution environment using signing key. | |
JP2016072769A5 (en) | ||
US11494508B2 (en) | Secrets as a service | |
GB201016672D0 (en) | Secure exchange/authentication of electronic documents | |
WO2016130406A3 (en) | Protecting sensitive data security |