TR202022531A2 - A SYSTEM THAT PROVIDES ENCRYPTION AND TRACKING OF PERSONAL DATA - Google Patents
A SYSTEM THAT PROVIDES ENCRYPTION AND TRACKING OF PERSONAL DATAInfo
- Publication number
- TR202022531A2 TR202022531A2 TR2020/22531A TR202022531A TR202022531A2 TR 202022531 A2 TR202022531 A2 TR 202022531A2 TR 2020/22531 A TR2020/22531 A TR 2020/22531A TR 202022531 A TR202022531 A TR 202022531A TR 202022531 A2 TR202022531 A2 TR 202022531A2
- Authority
- TR
- Turkey
- Prior art keywords
- personal data
- tracking
- provides encryption
- encrypted
- stored encrypted
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Abstract
Bu buluş, kurumsal kaynak planlaması şeklindeki paket programlarda bulunan kişisel verilerin şifreli olarak saklanmasını, tanımlanmış olan kural kütüphanesi doğrultusunda şifrelenmesi gereken alanların belirlenmesini ve bu alan değerlerinin bir robot kontrolünde şifrelenerek saklanmasını sağlayan bir sistem (1) ile ilgilidir.This invention relates to a system (1) that ensures that personal data in package programs in the form of enterprise resource planning are stored encrypted, the fields that need to be encrypted in accordance with the defined rule library are determined, and these field values are stored encrypted under the control of a robot.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TR2020/22531A TR202022531A2 (en) | 2020-12-30 | 2020-12-30 | A SYSTEM THAT PROVIDES ENCRYPTION AND TRACKING OF PERSONAL DATA |
PCT/TR2021/051537 WO2022146377A1 (en) | 2020-12-30 | 2021-12-27 | A system for encrypting and tracking personal data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TR2020/22531A TR202022531A2 (en) | 2020-12-30 | 2020-12-30 | A SYSTEM THAT PROVIDES ENCRYPTION AND TRACKING OF PERSONAL DATA |
Publications (1)
Publication Number | Publication Date |
---|---|
TR202022531A2 true TR202022531A2 (en) | 2021-04-21 |
Family
ID=76503113
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TR2020/22531A TR202022531A2 (en) | 2020-12-30 | 2020-12-30 | A SYSTEM THAT PROVIDES ENCRYPTION AND TRACKING OF PERSONAL DATA |
Country Status (2)
Country | Link |
---|---|
TR (1) | TR202022531A2 (en) |
WO (1) | WO2022146377A1 (en) |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001054342A1 (en) * | 2000-01-18 | 2001-07-26 | Yodlee.Com. Inc. | Method and apparatus for secure storage of personal data in web-based applications using symmetric encryption and distributed key components |
EP2166484A1 (en) * | 2008-09-19 | 2010-03-24 | SCP Asclépios | Method of accessing personal information, such as a personalised medical record, using a local generation agent |
US9367702B2 (en) * | 2013-03-12 | 2016-06-14 | Commvault Systems, Inc. | Automatic file encryption |
-
2020
- 2020-12-30 TR TR2020/22531A patent/TR202022531A2/en unknown
-
2021
- 2021-12-27 WO PCT/TR2021/051537 patent/WO2022146377A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2022146377A1 (en) | 2022-07-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Adusei-Asante et al. | Students’ attrition and retention in higher education: A conceptual discussion | |
TR202022531A2 (en) | A SYSTEM THAT PROVIDES ENCRYPTION AND TRACKING OF PERSONAL DATA | |
Jäch et al. | Annotated checklist of Byrrhoidea (Coleoptera: Byrrhidae, Elmidae, Limnichidae, Psephenidae) from Iran | |
Agostini et al. | Introduction to the Special Issue on Intellectual Property Management: an internal and external perspective | |
Santén et al. | Influencing load factor in transport operations: A literature review | |
Schöberl et al. | Variational principles for different representations of Lagrangian and Hamiltonian systems | |
Khan et al. | A Study on Global Software Development (GSD) and Software Development Process in Malaysian Software Companies | |
Huang et al. | An implementation of high performance parallel knn algorithm based on gpu | |
Gifford et al. | Brand Leadership: Behaviors that Drive Brand and Consumer Engagement—An Abstract | |
Normandeau | Vulnerability as Strength | |
Ross et al. | Brand to Brand: Consumer Evaluations of Spillover Effects in Interbrand Communications | |
TR201819388A2 (en) | A SYSTEM AND METHOD THAT ENABLES CRYPTOGRAPHIC KEY DEFINITION | |
Millen | A Long, Slow Conversation | |
Kvakić et al. | How to target climate-smart agriculture? Concept and application of the consensus-driven decision support framework “targetCSA” | |
Ishai | Secure computation and its diverse applications | |
Barbu et al. | Tampering with Java Card Exceptions-The Exception Proves the Rule | |
Pereira | Which quartic polynomials have a hyperbolic antiderivative? | |
Raj | CLOUD COMPUTING RISING IN THE FIELD OF BIG DATA AND ARTIFICIAL INTELLIGENCE. | |
Liu et al. | The application and management of big data in quality engineering | |
Pal et al. | Cyber Security Using Modern Technologies: Artificial Intelligence, Blockchain and Quantum Cryptography | |
Nilsson | (Action): Powered by Knowledge | |
Nossack et al. | Mathematical formulations for the acyclic partitioning problem | |
Farrell | Mobile Apps--Building Community and Driving Engagement to New Heights. | |
Lado et al. | The Role of Gender in Co-branding Strategies of Hi-Tech Brands and Luxury | |
Mandal | Vacuum Stability with Leptoquark |