RU2679983C2 - Обусловленное окружающей средой управление доступом - Google Patents

Обусловленное окружающей средой управление доступом Download PDF

Info

Publication number
RU2679983C2
RU2679983C2 RU2016107745A RU2016107745A RU2679983C2 RU 2679983 C2 RU2679983 C2 RU 2679983C2 RU 2016107745 A RU2016107745 A RU 2016107745A RU 2016107745 A RU2016107745 A RU 2016107745A RU 2679983 C2 RU2679983 C2 RU 2679983C2
Authority
RU
Russia
Prior art keywords
information
policy
environment
final
policies
Prior art date
Application number
RU2016107745A
Other languages
English (en)
Russian (ru)
Other versions
RU2016107745A (ru
RU2016107745A3 (enExample
Inventor
Тадаеси КОХНО
Дэвид А. МОЛНАР
Александер Н. МОЩУК
Франциска РЕСНЕР
Цзяхэ Хелен ВАН
Original Assignee
МАЙКРОСОФТ ТЕКНОЛОДЖИ ЛАЙСЕНСИНГ, ЭлЭлСи
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by МАЙКРОСОФТ ТЕКНОЛОДЖИ ЛАЙСЕНСИНГ, ЭлЭлСи filed Critical МАЙКРОСОФТ ТЕКНОЛОДЖИ ЛАЙСЕНСИНГ, ЭлЭлСи
Publication of RU2016107745A publication Critical patent/RU2016107745A/ru
Publication of RU2016107745A3 publication Critical patent/RU2016107745A3/ru
Application granted granted Critical
Publication of RU2679983C2 publication Critical patent/RU2679983C2/ru

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/65Environment-dependent, e.g. using captured environmental data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • User Interface Of Digital Computer (AREA)
  • Storage Device Security (AREA)
RU2016107745A 2013-09-06 2014-09-04 Обусловленное окружающей средой управление доступом RU2679983C2 (ru)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US14/020,735 2013-09-06
US14/020,735 US9413784B2 (en) 2013-09-06 2013-09-06 World-driven access control
PCT/US2014/053963 WO2015034970A1 (en) 2013-09-06 2014-09-04 World-driven access control

Publications (3)

Publication Number Publication Date
RU2016107745A RU2016107745A (ru) 2017-09-07
RU2016107745A3 RU2016107745A3 (enExample) 2018-07-13
RU2679983C2 true RU2679983C2 (ru) 2019-02-14

Family

ID=51585207

Family Applications (1)

Application Number Title Priority Date Filing Date
RU2016107745A RU2679983C2 (ru) 2013-09-06 2014-09-04 Обусловленное окружающей средой управление доступом

Country Status (11)

Country Link
US (1) US9413784B2 (enExample)
EP (1) EP3042338B1 (enExample)
JP (1) JP6509871B2 (enExample)
KR (1) KR102284497B1 (enExample)
CN (1) CN105659250B (enExample)
AU (1) AU2014315235B2 (enExample)
BR (1) BR112016004397A8 (enExample)
CA (1) CA2922139C (enExample)
MX (1) MX357056B (enExample)
RU (1) RU2679983C2 (enExample)
WO (1) WO2015034970A1 (enExample)

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9697365B2 (en) 2013-09-06 2017-07-04 Microsoft Technology Licensing, Llc World-driven access control using trusted certificates
US9886591B2 (en) 2015-02-10 2018-02-06 International Business Machines Corporation Intelligent governance controls based on real-time contexts
RU2614930C2 (ru) * 2015-06-05 2017-03-30 Закрытое акционерное общество "Лаборатория Касперского" Система и способ контроля исполнения приложений дополненной реальности, установленных на устройстве пользователя, в зависимости от состояния окружающей среды
US9839830B1 (en) * 2016-06-10 2017-12-12 PNI Sensor Corporation Aiding a swimmer in maintaining a desired bearing
CN117171788A (zh) 2017-02-07 2023-12-05 交互数字Vc控股公司 在虚拟现实中防止监视和保护隐私的系统和方法
US10223341B1 (en) * 2017-09-01 2019-03-05 Adobe Inc. Document beautification using smart feature suggestions based on textual analysis
CN109087376B (zh) * 2018-07-31 2021-06-15 Oppo广东移动通信有限公司 图像处理方法、装置、存储介质及电子设备
US11191005B2 (en) 2019-05-29 2021-11-30 At&T Intellectual Property I, L.P. Cyber control plane for universal physical space
WO2021034309A1 (en) * 2019-08-19 2021-02-25 Zume, Inc. Regulated consumable distribution
US11348264B1 (en) * 2020-04-23 2022-05-31 Meta Platforms, Inc. Capturing content on writing surfaces using depth and image sensing
US12149516B2 (en) * 2020-06-02 2024-11-19 Flex Integration, LLC System and methods for tokenized hierarchical secured asset distribution
US11176755B1 (en) 2020-08-31 2021-11-16 Facebook Technologies, Llc Artificial reality augments and surfaces
US11928226B2 (en) * 2021-02-04 2024-03-12 International Business Machines Corporation Content protecting collaboration board
US11676348B2 (en) 2021-06-02 2023-06-13 Meta Platforms Technologies, Llc Dynamic mixed reality content in virtual reality
US12417294B2 (en) 2022-12-05 2025-09-16 Sap Se Asynchronous ping messages for determining capability of systems for executing asynchronous protocols
US12306996B2 (en) * 2022-12-08 2025-05-20 Sap Se Integrating data privacy integration protocols across system landscapes
US20250209180A1 (en) * 2023-12-22 2025-06-26 CIMCON Software, LLC Intelligent ai risk management framework

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080180243A1 (en) * 2007-01-30 2008-07-31 Jeffrey Aaron Devices and methods for detecting environmental circumstances and responding with designated communication actions
US20100077484A1 (en) * 2008-09-23 2010-03-25 Yahoo! Inc. Location tracking permissions and privacy
US20120192247A1 (en) * 2010-12-27 2012-07-26 Nokia Corporation Method and apparatus for providing data based on granularity information
RU2490695C2 (ru) * 2008-07-28 2013-08-20 Майкрософт Корпорейшн Разделение режимов работы для изменений приложения

Family Cites Families (56)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6085976A (en) 1998-05-22 2000-07-11 Sehr; Richard P. Travel system and methods utilizing multi-application passenger cards
JP4031112B2 (ja) 1998-07-23 2008-01-09 富士通株式会社 パスポート取引装置,パスポート取引方法およびパスポート取引システム
US7317699B2 (en) 2001-10-26 2008-01-08 Research In Motion Limited System and method for controlling configuration settings for mobile communication devices and services
US7401233B2 (en) 2003-06-24 2008-07-15 International Business Machines Corporation Method, system, and apparatus for dynamic data-driven privacy policy protection and data sharing
US7693545B2 (en) 2004-02-05 2010-04-06 Samsung Electronics Co., Ltd System and method for controlling functions of mobile communication terminal in a restricted zone
JP4665406B2 (ja) * 2004-02-23 2011-04-06 日本電気株式会社 アクセス制御管理方法、アクセス制御管理システムおよびアクセス制御管理機能付き端末装置
US7444287B2 (en) 2004-07-01 2008-10-28 Emc Corporation Efficient monitoring system and method
US20060048142A1 (en) 2004-09-02 2006-03-02 Roese John J System and method for rapid response network policy implementation
US7940302B2 (en) 2004-09-15 2011-05-10 The Regents Of The University Of California Apparatus and method for privacy protection of data collection in pervasive environments
US8006290B2 (en) 2006-01-12 2011-08-23 International Business Machines Corporation System and method for ratification of policies
US10198709B2 (en) 2006-03-27 2019-02-05 Hewlett Packard Enterprise Development Lp Managing assets using at least one policy and asset locations
JP2008022526A (ja) 2006-06-13 2008-01-31 Hitachi Ltd 属性証明書検証方法、属性認証局装置、サービス提供装置、および属性証明書検証システム
US8326272B1 (en) 2006-07-26 2012-12-04 Amdocs Software Systems Limited System, method and computer program product for subscriber-specific policies
US7933611B2 (en) 2006-09-01 2011-04-26 Research In Motion Limited Disabling operation of features on a handheld mobile communication device based upon location
US7706837B2 (en) 2006-09-01 2010-04-27 Research In Motion Limited Disabling operation of a camera on a handheld mobile communication device based upon enabling or disabling devices
US7974950B2 (en) 2007-06-05 2011-07-05 International Business Machines Corporation Applying a policy criteria to files in a backup image
US7996879B1 (en) 2007-07-03 2011-08-09 Trend Micro Incorporated Network deployment techniques employing radio frequency identification (RFID)
JP2009081635A (ja) * 2007-09-26 2009-04-16 Fujifilm Corp デジタルカメラ、及びデジタルカメラの個人情報保護方法
WO2009051531A1 (en) 2007-10-16 2009-04-23 Telefonaktiebolaget Lm Ericsson (Publ) Method and apparatus for improving the efficiency of resource utilisation in a communications system
US8170280B2 (en) 2007-12-03 2012-05-01 Digital Smiths, Inc. Integrated systems and methods for video-based object modeling, recognition, and tracking
US8219144B2 (en) 2008-01-11 2012-07-10 Alcatel Lucent Disabling of mobile phone camera operation by video-restricted location device
CN101499919B (zh) 2008-01-28 2012-12-12 华为技术有限公司 策略决策实体的管理方法、管理网元及网络系统
US20090259591A1 (en) 2008-04-11 2009-10-15 Microsoft Corporation Information Rights Management
WO2009145730A1 (en) 2008-05-29 2009-12-03 Nanyang Polytechnic Method and system for disabling camera feature of a mobile device
US9703806B2 (en) 2008-06-17 2017-07-11 Microsoft Technology Licensing, Llc User photo handling and control
US8254902B2 (en) 2008-06-26 2012-08-28 Apple Inc. Apparatus and methods for enforcement of policies upon a wireless device
US8238604B2 (en) 2008-08-18 2012-08-07 Kabushiki Kaisha Toshiba System and method for validation of face detection in electronic images
WO2010029553A1 (en) 2008-09-11 2010-03-18 Netanel Hagbi Method and system for compositing an augmented reality scene
US8719901B2 (en) 2008-10-24 2014-05-06 Synopsys, Inc. Secure consultation system
US8331739B1 (en) 2009-01-21 2012-12-11 Google Inc. Efficient identification and correction of optical character recognition errors through learning in a multi-engine environment
US8494215B2 (en) 2009-03-05 2013-07-23 Microsoft Corporation Augmenting a field of view in connection with vision-tracking
KR101451485B1 (ko) * 2009-08-11 2014-10-15 닛본 덴끼 가부시끼가이샤 단말 장치, 통신 시스템, 데이터 관리 방법, 서버 장치, 및 기록 매체
US8768313B2 (en) 2009-08-17 2014-07-01 Digimarc Corporation Methods and systems for image or audio recognition processing
JP2011101161A (ja) * 2009-11-05 2011-05-19 Canon Inc 撮像装置、その制御方法、再生装置およびプログラム
US8732619B2 (en) 2010-03-31 2014-05-20 Phunware, Inc. Methods and systems for interactive user interface objects
KR101016556B1 (ko) 2010-05-06 2011-02-24 전성일 증강 현실을 이용하여 인물의 정보에 접근하기 위한 방법, 서버 및 컴퓨터 판독 가능한 기록 매체
CN101888341B (zh) * 2010-07-20 2013-02-27 上海交通大学 在分布式多信任域环境下基于可计算信誉度的访问控制方法
US8971628B2 (en) 2010-07-26 2015-03-03 Fotonation Limited Face detection using division-generated haar-like features for illumination invariance
US20120042076A1 (en) 2010-08-16 2012-02-16 Nokia Corporation Method and apparatus for managing application resources via policy rules
JP2012182779A (ja) 2011-01-31 2012-09-20 Nippon Hoso Kyokai <Nhk> 受信装置、放送システム及びプログラム
US9471934B2 (en) 2011-02-25 2016-10-18 Nokia Technologies Oy Method and apparatus for feature-based presentation of content
US20120222083A1 (en) 2011-02-28 2012-08-30 Nokia Corporation Method and apparatus for enforcing data privacy
US20120249416A1 (en) 2011-03-29 2012-10-04 Giuliano Maciocci Modular mobile connected pico projectors for a local multi-user collaboration
US8744143B2 (en) 2011-04-01 2014-06-03 Yahoo! Inc. Adding privacy protection to photo uploading/ tagging in social networks
US8996688B2 (en) 2011-05-31 2015-03-31 Nokia Corporation Method and apparatus for monitoring and controlling data sharing
US9323928B2 (en) 2011-06-01 2016-04-26 Mcafee, Inc. System and method for non-signature based detection of malicious processes
US9465427B2 (en) 2011-06-30 2016-10-11 International Business Machines Corporation Software-centric power management by indirectly determining that user is not actively using computer program running on computing device
US10019962B2 (en) 2011-08-17 2018-07-10 Microsoft Technology Licensing, Llc Context adaptive user interface for augmented reality display
US9106650B2 (en) 2011-11-09 2015-08-11 Microsoft Technology Licensing, Llc User-driven access control
US8972263B2 (en) 2011-11-18 2015-03-03 Soundhound, Inc. System and method for performing dual mode speech recognition
WO2013134616A1 (en) 2012-03-09 2013-09-12 RAPsphere, Inc. Method and apparatus for securing mobile applications
US20130263016A1 (en) 2012-03-27 2013-10-03 Nokia Corporation Method and apparatus for location tagged user interface for media sharing
US20140009609A1 (en) 2012-07-06 2014-01-09 Conexant Systems, Inc. Video door monitor using smarttv with voice wakeup
WO2014028009A1 (en) 2012-08-15 2014-02-20 Empire Technology Development Llc Digital media privacy protection
US20140282840A1 (en) 2013-03-15 2014-09-18 True Ultimate Standards Everywhere, Inc. Managing data handling policies
US9697365B2 (en) 2013-09-06 2017-07-04 Microsoft Technology Licensing, Llc World-driven access control using trusted certificates

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080180243A1 (en) * 2007-01-30 2008-07-31 Jeffrey Aaron Devices and methods for detecting environmental circumstances and responding with designated communication actions
RU2490695C2 (ru) * 2008-07-28 2013-08-20 Майкрософт Корпорейшн Разделение режимов работы для изменений приложения
US20100077484A1 (en) * 2008-09-23 2010-03-25 Yahoo! Inc. Location tracking permissions and privacy
US20120192247A1 (en) * 2010-12-27 2012-07-26 Nokia Corporation Method and apparatus for providing data based on granularity information

Also Published As

Publication number Publication date
CA2922139A1 (en) 2015-03-12
WO2015034970A1 (en) 2015-03-12
KR102284497B1 (ko) 2021-07-30
AU2014315235A1 (en) 2016-03-03
RU2016107745A (ru) 2017-09-07
MX2016002841A (es) 2016-06-17
EP3042338B1 (en) 2019-04-03
CN105659250B (zh) 2022-03-01
KR20160052561A (ko) 2016-05-12
BR112016004397A8 (pt) 2020-02-11
CA2922139C (en) 2021-11-09
JP6509871B2 (ja) 2019-05-08
EP3042338A1 (en) 2016-07-13
US9413784B2 (en) 2016-08-09
JP2016535364A (ja) 2016-11-10
MX357056B (es) 2018-06-25
RU2016107745A3 (enExample) 2018-07-13
AU2014315235B2 (en) 2019-07-11
US20150074742A1 (en) 2015-03-12
CN105659250A (zh) 2016-06-08

Similar Documents

Publication Publication Date Title
RU2679983C2 (ru) Обусловленное окружающей средой управление доступом
JP7540054B2 (ja) セキュアで信頼性があるアイデンティティベースコンピューティングの方法及びシステム
US10831924B2 (en) Unified control of privacy-impacting devices
Ardabili et al. Understanding policy and technical aspects of ai-enabled smart video surveillance to address public safety
Roesner et al. World-driven access control for continuous sensing
US20220286438A1 (en) Machine learning techniques for mitigating aggregate exposure of identifying information
CN117152590A (zh) 数据安全传感器系统
US20170243020A1 (en) Proximity based content security
CN110020545A (zh) 用于保护隐私和安全的认知部件及用户界面组件
Jovanovikj et al. A conceptual model of security context
CN119577814B (zh) 一种基于多模态隐私保护的智能眼镜控制方法及系统
JP2019053381A (ja) 画像処理装置、情報処理装置、方法およびプログラム
Carniani et al. Enhancing Video Surveillance with Usage Control and Privacy-Preserving Solutions.
Casado et al. Multi‐agent system for knowledge‐based event recognition and composition
Morris et al. Deriving privacy and security considerations for core: An indoor iot adaptive context environment
US11734397B2 (en) Hallmark-based image capture prevention
Iachello Privacy and proportionality
US20250174023A1 (en) Smart privacy zones
Lemboye Facial Recognition and Mass Media Use: Effects of Technology on Perceptions of Privacy
Murray A Review of Social, Behavioral, and Ethical Considerations for SmartLife Engineering
Niu et al. ``I am not the primary focus"-Understanding the Perspectives of Bystanders in Photos Shared Online
Bärlund A Comparative Study of AI and Pose Estimation in Commercial and Open-Source Camera Surveillance
Weiß Confidential desktop: towards an access control framework for preserving data confidentiality based on environmental conditions
KR20250104956A (ko) 사생활 보호 기능의 ai 응용 시스템 및 ai 응용 비식별화 방법