TWI549019B - 用於防篡改的位置服務的電腦實施的方法、電腦系統及電腦可讀取儲存設備 - Google Patents
用於防篡改的位置服務的電腦實施的方法、電腦系統及電腦可讀取儲存設備 Download PDFInfo
- Publication number
- TWI549019B TWI549019B TW100141622A TW100141622A TWI549019B TW I549019 B TWI549019 B TW I549019B TW 100141622 A TW100141622 A TW 100141622A TW 100141622 A TW100141622 A TW 100141622A TW I549019 B TWI549019 B TW I549019B
- Authority
- TW
- Taiwan
- Prior art keywords
- location
- information
- resource
- hardware
- component
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/101—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
- G06F21/1013—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to locations
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Computing Systems (AREA)
- Automation & Control Theory (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Storage Device Security (AREA)
- Position Fixing By Use Of Radio Waves (AREA)
- Mobile Radio Communication Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Telephonic Communication Services (AREA)
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US12/972,534 US8560839B2 (en) | 2010-12-20 | 2010-12-20 | Tamper proof location services |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| TW201232324A TW201232324A (en) | 2012-08-01 |
| TWI549019B true TWI549019B (zh) | 2016-09-11 |
Family
ID=46236020
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW100141622A TWI549019B (zh) | 2010-12-20 | 2011-11-15 | 用於防篡改的位置服務的電腦實施的方法、電腦系統及電腦可讀取儲存設備 |
Country Status (8)
| Country | Link |
|---|---|
| US (1) | US8560839B2 (enExample) |
| EP (1) | EP2656270B1 (enExample) |
| JP (1) | JP2014503909A (enExample) |
| KR (1) | KR101889577B1 (enExample) |
| CN (1) | CN102609662B (enExample) |
| AR (1) | AR084211A1 (enExample) |
| TW (1) | TWI549019B (enExample) |
| WO (1) | WO2012087853A2 (enExample) |
Families Citing this family (50)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2012122994A1 (en) * | 2011-03-11 | 2012-09-20 | Kreft Heinz | Off-line transfer of electronic tokens between peer-devices |
| US8738943B2 (en) * | 2011-03-21 | 2014-05-27 | International Business Machines Corporation | Controlling and minimizing electrical power consumed by electrical components connected to a networked computing environment |
| US9365188B1 (en) * | 2011-04-22 | 2016-06-14 | Angel A. Penilla | Methods and systems for using cloud services to assign e-keys to access vehicles |
| US9038158B1 (en) * | 2011-07-07 | 2015-05-19 | Symantec Corporation | Systems and methods for enforcing geolocation-based policies |
| DE202011105214U1 (de) | 2011-09-01 | 2012-07-12 | Sichtwerk Gmbh | Digitales Gipfelbuch |
| FR2987152B1 (fr) * | 2012-02-22 | 2017-11-17 | Oberthur Technologies | Procede et dispositif de securite pour effectuer une transaction |
| US20140013451A1 (en) * | 2012-07-06 | 2014-01-09 | Sap Ag | Data obfuscation for open data (odata) communications |
| US11188652B2 (en) | 2012-10-02 | 2021-11-30 | Mordecai Barkan | Access management and credential protection |
| EP2904743B1 (en) | 2012-10-02 | 2017-09-06 | Mordecai Barkan | Secure computer architectures, systems, and applications |
| US9672360B2 (en) | 2012-10-02 | 2017-06-06 | Mordecai Barkan | Secure computer architectures, systems, and applications |
| US9342695B2 (en) | 2012-10-02 | 2016-05-17 | Mordecai Barkan | Secured automated or semi-automated systems |
| US9246892B2 (en) | 2013-04-03 | 2016-01-26 | Salesforce.Com, Inc. | System, method and computer program product for managing access to systems, products, and data based on information associated with a physical location of a user |
| GB2534693B (en) * | 2013-11-08 | 2017-02-08 | Exacttrak Ltd | Data accessibility control |
| CN104780530A (zh) * | 2014-01-15 | 2015-07-15 | 中兴通讯股份有限公司 | 一种保护用户数据的方法和终端 |
| JP6289606B2 (ja) * | 2014-02-26 | 2018-03-07 | 三菱電機株式会社 | 証明書管理装置、及び証明書管理方法 |
| US9577823B2 (en) | 2014-03-21 | 2017-02-21 | Venafi, Inc. | Rule-based validity of cryptographic key material |
| US9686244B2 (en) | 2014-03-21 | 2017-06-20 | Venafi, Inc. | Rule-based validity of cryptographic key material |
| US9647998B2 (en) | 2014-03-21 | 2017-05-09 | Venafi, Inc. | Geo-fencing cryptographic key material |
| US9680827B2 (en) | 2014-03-21 | 2017-06-13 | Venafi, Inc. | Geo-fencing cryptographic key material |
| US9531533B2 (en) | 2014-03-21 | 2016-12-27 | Venafi, Inc. | Rule-based validity of cryptographic key material |
| US9654922B2 (en) | 2014-03-21 | 2017-05-16 | Venafi, Inc. | Geo-fencing cryptographic key material |
| US9633184B2 (en) * | 2014-05-30 | 2017-04-25 | Google Inc. | Dynamic authorization |
| US9767304B2 (en) * | 2014-09-25 | 2017-09-19 | Microsoft Technology Licensing, Llc | Representation of operating system context in a trusted platform module |
| US9735968B2 (en) | 2014-10-20 | 2017-08-15 | Microsoft Technology Licensing, Llc | Trust service for a client device |
| CN107111714A (zh) * | 2014-10-30 | 2017-08-29 | 新科恩斯卡莱有限责任公司 | 用于资源的地理位置验证的方法和系统 |
| US9779271B2 (en) * | 2015-06-08 | 2017-10-03 | Juniper Networks, Inc. | Apparatus, system, and method for detecting theft of network devices |
| WO2016209134A1 (en) * | 2015-06-26 | 2016-12-29 | Telefonaktiebolaget Lm Ericsson (Publ) | Data processing based on location preference |
| JP6419660B2 (ja) | 2015-07-29 | 2018-11-07 | 株式会社日立製作所 | 秘密情報設定方法、秘密情報設定システム、および秘密情報設定装置 |
| JP6601085B2 (ja) * | 2015-09-15 | 2019-11-06 | 株式会社リコー | データ管理システム、データ管理方法 |
| US10616238B2 (en) * | 2015-12-28 | 2020-04-07 | Dropbox, Inc. | Sharing files based on recipient-location criteria |
| US10601787B2 (en) * | 2016-06-06 | 2020-03-24 | Cisco Technology, Inc. | Root of trust of geolocation |
| US10057276B2 (en) | 2016-09-19 | 2018-08-21 | International Business Machines Corporation | Global attestation procedure |
| US10389731B2 (en) * | 2016-11-22 | 2019-08-20 | Microsoft Technology Licensing, Llc | Multi-factor authentication using positioning data |
| US10297147B2 (en) | 2016-12-06 | 2019-05-21 | Flir Commercial Systems, Inc. | Methods and apparatus for monitoring traffic data |
| CN106791178A (zh) * | 2017-01-17 | 2017-05-31 | 宇龙计算机通信科技(深圳)有限公司 | 一种位置信息传输方法及移动终端 |
| CN108668216B (zh) * | 2017-03-27 | 2020-07-31 | 中国移动通信有限公司研究院 | 一种终端位置定位的防伪方法、防伪终端及系统 |
| US10733298B2 (en) * | 2017-07-31 | 2020-08-04 | Dell Products, L.P. | System management audit log snapshot |
| CN108052803B (zh) * | 2018-01-02 | 2021-11-16 | 联想(北京)有限公司 | 一种访问控制方法、装置及电子设备 |
| CN112369058B (zh) * | 2018-11-09 | 2024-03-15 | 开利公司 | 对货箱控制器的地理安全访问 |
| US11144654B2 (en) * | 2019-03-08 | 2021-10-12 | Seagate Technology Llc | Environment-aware storage drive with expandable security policies |
| US11336684B2 (en) * | 2019-06-07 | 2022-05-17 | Lookout, Inc. | Mobile device security using a secure execution context |
| US10878650B1 (en) | 2019-06-12 | 2020-12-29 | Honeywell International Inc. | Access control system using mobile device |
| US20210344664A1 (en) * | 2020-04-29 | 2021-11-04 | Motorola Mobility Llc | Methods, Systems, and Electronic Devices for Selective Locational Preclusion of Access to Content |
| US11316684B2 (en) * | 2020-05-19 | 2022-04-26 | International Business Machines Corporation | Restricting security key transfer from a key management server in an enterprise |
| US11588632B2 (en) * | 2020-09-22 | 2023-02-21 | International Business Machines Corporation | Private key creation using location data |
| JP7699921B2 (ja) * | 2020-12-03 | 2025-06-30 | キヤノン株式会社 | デバイス管理装置、デバイス管理装置の制御方法、及びプログラム |
| CN112738100B (zh) * | 2020-12-29 | 2023-09-01 | 北京天融信网络安全技术有限公司 | 数据访问的鉴权方法、装置、鉴权设备和鉴权系统 |
| US11749045B2 (en) | 2021-03-01 | 2023-09-05 | Honeywell International Inc. | Building access using a mobile device |
| US11899796B2 (en) | 2021-10-19 | 2024-02-13 | Dell Products L.P. | Initialization geo-locking system |
| WO2025034610A2 (en) * | 2023-08-04 | 2025-02-13 | Istari Digital, Inc. | Securing an interconnected digital engineering and certification ecosystem |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20030217137A1 (en) * | 2002-03-01 | 2003-11-20 | Roese John J. | Verified device locations in a data network |
| WO2006071338A1 (en) * | 2004-12-29 | 2006-07-06 | Motorola Inc. | Apparatus and method for managing security policy information using a device management tree |
| US20080046965A1 (en) * | 2003-02-28 | 2008-02-21 | Michael Wright | Administration of protection of data accessible by a mobile device |
| US20100188990A1 (en) * | 2009-01-28 | 2010-07-29 | Gregory G. Raleigh | Network based service profile management with user preference, adaptive policy, network neutrality, and user privacy |
Family Cites Families (15)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6985588B1 (en) * | 2000-10-30 | 2006-01-10 | Geocodex Llc | System and method for using location identity to control access to digital information |
| US7120254B2 (en) | 2000-10-30 | 2006-10-10 | Geocodex Llc | Cryptographic system and method for geolocking and securing digital information |
| EP1340167A2 (en) * | 2000-11-28 | 2003-09-03 | 4thPass Inc. | Method and system for maintaining and distributing wireless applications |
| JP2003099400A (ja) * | 2001-09-26 | 2003-04-04 | Fujitsu Ltd | セキュリティ管理装置及びセキュリティ管理方法並びにセキュリティ管理用プログラム |
| US7308703B2 (en) | 2002-12-18 | 2007-12-11 | Novell, Inc. | Protection of data accessible by a mobile device |
| JP2005174124A (ja) * | 2003-12-12 | 2005-06-30 | Canon Inc | ネットワークシステム |
| US7853786B1 (en) | 2003-12-17 | 2010-12-14 | Sprint Communications Company L.P. | Rules engine architecture and implementation |
| JP4706262B2 (ja) | 2004-05-21 | 2011-06-22 | 日本電気株式会社 | アクセス制御システム、アクセス制御方法およびアクセス制御用プログラム |
| US20060236369A1 (en) | 2005-03-24 | 2006-10-19 | Covington Michael J | Method, apparatus and system for enforcing access control policies using contextual attributes |
| WO2007110094A1 (en) * | 2006-03-27 | 2007-10-04 | Telecom Italia S.P.A. | System for enforcing security policies on mobile communications devices |
| JP4810294B2 (ja) * | 2006-05-01 | 2011-11-09 | Necカシオモバイルコミュニケーションズ株式会社 | 携帯端末装置及びプログラム |
| JP5340173B2 (ja) | 2007-01-26 | 2013-11-13 | インターデイジタル テクノロジー コーポレーション | ロケーション情報およびロケーション情報を用いるアクセス制御を保証する方法および機器 |
| US20080289007A1 (en) * | 2007-05-17 | 2008-11-20 | Ajay Malik | System and Method for Granting Privileges Based on Location |
| US8961619B2 (en) * | 2009-01-06 | 2015-02-24 | Qualcomm Incorporated | Location-based system permissions and adjustments at an electronic device |
| US8095656B2 (en) * | 2009-11-16 | 2012-01-10 | International Business Machines Corportion | Geo-positionally based data access security |
-
2010
- 2010-12-20 US US12/972,534 patent/US8560839B2/en active Active
-
2011
- 2011-11-15 TW TW100141622A patent/TWI549019B/zh active
- 2011-12-07 AR ARP110104590A patent/AR084211A1/es not_active Application Discontinuation
- 2011-12-19 WO PCT/US2011/065707 patent/WO2012087853A2/en not_active Ceased
- 2011-12-19 KR KR1020137015803A patent/KR101889577B1/ko active Active
- 2011-12-19 EP EP11851461.1A patent/EP2656270B1/en active Active
- 2011-12-19 JP JP2013546268A patent/JP2014503909A/ja active Pending
- 2011-12-20 CN CN201110431392.3A patent/CN102609662B/zh active Active
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20030217137A1 (en) * | 2002-03-01 | 2003-11-20 | Roese John J. | Verified device locations in a data network |
| US20080046965A1 (en) * | 2003-02-28 | 2008-02-21 | Michael Wright | Administration of protection of data accessible by a mobile device |
| WO2006071338A1 (en) * | 2004-12-29 | 2006-07-06 | Motorola Inc. | Apparatus and method for managing security policy information using a device management tree |
| US20100188990A1 (en) * | 2009-01-28 | 2010-07-29 | Gregory G. Raleigh | Network based service profile management with user preference, adaptive policy, network neutrality, and user privacy |
Also Published As
| Publication number | Publication date |
|---|---|
| CN102609662B (zh) | 2015-08-05 |
| JP2014503909A (ja) | 2014-02-13 |
| US20120159156A1 (en) | 2012-06-21 |
| EP2656270A4 (en) | 2014-08-06 |
| AR084211A1 (es) | 2013-05-02 |
| CN102609662A (zh) | 2012-07-25 |
| KR101889577B1 (ko) | 2018-08-17 |
| TW201232324A (en) | 2012-08-01 |
| KR20130129224A (ko) | 2013-11-27 |
| EP2656270B1 (en) | 2020-04-22 |
| EP2656270A2 (en) | 2013-10-30 |
| WO2012087853A3 (en) | 2012-11-01 |
| WO2012087853A2 (en) | 2012-06-28 |
| US8560839B2 (en) | 2013-10-15 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| TWI549019B (zh) | 用於防篡改的位置服務的電腦實施的方法、電腦系統及電腦可讀取儲存設備 | |
| US10826881B2 (en) | Location-enforced data management in complex multi-region computing | |
| RU2675902C2 (ru) | Способ авторизации операции, предназначенной для выполнения на заданном вычислительном устройстве | |
| US9560026B1 (en) | Secure computer operations | |
| CN106534148B (zh) | 应用的访问管控方法及装置 | |
| KR102504519B1 (ko) | 네트워킹된 장치들을 갖는 컴퓨터 구동 시스템의 반가상 보안 위협 보호 | |
| TWI648649B (zh) | 行動通信裝置及其操作方法 | |
| US9712565B2 (en) | System and method to provide server control for access to mobile client data | |
| US9053329B2 (en) | Systems and methods for validated secure data access | |
| US10157286B2 (en) | Platform for adopting settings to secure a protected file | |
| CN103282912B (zh) | 用于限制对位置信息的访问的方法和装置以及计算平台 | |
| US9521032B1 (en) | Server for authentication, authorization, and accounting | |
| KR20160054556A (ko) | 모바일 통신 디바이스 및 그 작동 방법 | |
| US11934544B2 (en) | Securing data via encrypted geo-located provenance metadata | |
| US9769181B2 (en) | Mobile device storage volume encryption with geography correlated key management and mount operations | |
| CN120937006A (zh) | 用于云资源的基于区域的安全策略 | |
| CN115098227A (zh) | 一种安防设备动态信息更新的方法及装置 |