TR202022531A2 - A SYSTEM THAT PROVIDES ENCRYPTION AND TRACKING OF PERSONAL DATA - Google Patents

A SYSTEM THAT PROVIDES ENCRYPTION AND TRACKING OF PERSONAL DATA

Info

Publication number
TR202022531A2
TR202022531A2 TR2020/22531A TR202022531A TR202022531A2 TR 202022531 A2 TR202022531 A2 TR 202022531A2 TR 2020/22531 A TR2020/22531 A TR 2020/22531A TR 202022531 A TR202022531 A TR 202022531A TR 202022531 A2 TR202022531 A2 TR 202022531A2
Authority
TR
Turkey
Prior art keywords
personal data
tracking
provides encryption
encrypted
stored encrypted
Prior art date
Application number
TR2020/22531A
Other languages
Turkish (tr)
Inventor
Yusuf Çeti̇n Muhammed
Atiş Oğuzhan
Original Assignee
M B I S Bilgisayar Otomasyon Danismanlik Ve Egitim Hizmetleri Sanayi Ticaret A S
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by M B I S Bilgisayar Otomasyon Danismanlik Ve Egitim Hizmetleri Sanayi Ticaret A S filed Critical M B I S Bilgisayar Otomasyon Danismanlik Ve Egitim Hizmetleri Sanayi Ticaret A S
Priority to TR2020/22531A priority Critical patent/TR202022531A2/en
Publication of TR202022531A2 publication Critical patent/TR202022531A2/en
Priority to PCT/TR2021/051537 priority patent/WO2022146377A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Abstract

Bu buluş, kurumsal kaynak planlaması şeklindeki paket programlarda bulunan kişisel verilerin şifreli olarak saklanmasını, tanımlanmış olan kural kütüphanesi doğrultusunda şifrelenmesi gereken alanların belirlenmesini ve bu alan değerlerinin bir robot kontrolünde şifrelenerek saklanmasını sağlayan bir sistem (1) ile ilgilidir.This invention relates to a system (1) that ensures that personal data in package programs in the form of enterprise resource planning are stored encrypted, the fields that need to be encrypted in accordance with the defined rule library are determined, and these field values are stored encrypted under the control of a robot.

TR2020/22531A 2020-12-30 2020-12-30 A SYSTEM THAT PROVIDES ENCRYPTION AND TRACKING OF PERSONAL DATA TR202022531A2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
TR2020/22531A TR202022531A2 (en) 2020-12-30 2020-12-30 A SYSTEM THAT PROVIDES ENCRYPTION AND TRACKING OF PERSONAL DATA
PCT/TR2021/051537 WO2022146377A1 (en) 2020-12-30 2021-12-27 A system for encrypting and tracking personal data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TR2020/22531A TR202022531A2 (en) 2020-12-30 2020-12-30 A SYSTEM THAT PROVIDES ENCRYPTION AND TRACKING OF PERSONAL DATA

Publications (1)

Publication Number Publication Date
TR202022531A2 true TR202022531A2 (en) 2021-04-21

Family

ID=76503113

Family Applications (1)

Application Number Title Priority Date Filing Date
TR2020/22531A TR202022531A2 (en) 2020-12-30 2020-12-30 A SYSTEM THAT PROVIDES ENCRYPTION AND TRACKING OF PERSONAL DATA

Country Status (2)

Country Link
TR (1) TR202022531A2 (en)
WO (1) WO2022146377A1 (en)

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001054342A1 (en) * 2000-01-18 2001-07-26 Yodlee.Com. Inc. Method and apparatus for secure storage of personal data in web-based applications using symmetric encryption and distributed key components
EP2166484A1 (en) * 2008-09-19 2010-03-24 SCP Asclépios Method of accessing personal information, such as a personalised medical record, using a local generation agent
US9367702B2 (en) * 2013-03-12 2016-06-14 Commvault Systems, Inc. Automatic file encryption

Also Published As

Publication number Publication date
WO2022146377A1 (en) 2022-07-07

Similar Documents

Publication Publication Date Title
Adusei-Asante et al. Students’ attrition and retention in higher education: A conceptual discussion
TR202022531A2 (en) A SYSTEM THAT PROVIDES ENCRYPTION AND TRACKING OF PERSONAL DATA
Jäch et al. Annotated checklist of Byrrhoidea (Coleoptera: Byrrhidae, Elmidae, Limnichidae, Psephenidae) from Iran
Agostini et al. Introduction to the Special Issue on Intellectual Property Management: an internal and external perspective
Santén et al. Influencing load factor in transport operations: A literature review
Schöberl et al. Variational principles for different representations of Lagrangian and Hamiltonian systems
Khan et al. A Study on Global Software Development (GSD) and Software Development Process in Malaysian Software Companies
Huang et al. An implementation of high performance parallel knn algorithm based on gpu
Gifford et al. Brand Leadership: Behaviors that Drive Brand and Consumer Engagement—An Abstract
Normandeau Vulnerability as Strength
Ross et al. Brand to Brand: Consumer Evaluations of Spillover Effects in Interbrand Communications
TR201819388A2 (en) A SYSTEM AND METHOD THAT ENABLES CRYPTOGRAPHIC KEY DEFINITION
Millen A Long, Slow Conversation
Kvakić et al. How to target climate-smart agriculture? Concept and application of the consensus-driven decision support framework “targetCSA”
Ishai Secure computation and its diverse applications
Barbu et al. Tampering with Java Card Exceptions-The Exception Proves the Rule
Pereira Which quartic polynomials have a hyperbolic antiderivative?
Raj CLOUD COMPUTING RISING IN THE FIELD OF BIG DATA AND ARTIFICIAL INTELLIGENCE.
Liu et al. The application and management of big data in quality engineering
Pal et al. Cyber Security Using Modern Technologies: Artificial Intelligence, Blockchain and Quantum Cryptography
Nilsson (Action): Powered by Knowledge
Nossack et al. Mathematical formulations for the acyclic partitioning problem
Farrell Mobile Apps--Building Community and Driving Engagement to New Heights.
Lado et al. The Role of Gender in Co-branding Strategies of Hi-Tech Brands and Luxury
Mandal Vacuum Stability with Leptoquark