WO2001073533A1 - Sauvegarde de fichiers electroniques et d'informations numeriques dans un environnement de reseau - Google Patents
Sauvegarde de fichiers electroniques et d'informations numeriques dans un environnement de reseau Download PDFInfo
- Publication number
- WO2001073533A1 WO2001073533A1 PCT/US2001/009889 US0109889W WO0173533A1 WO 2001073533 A1 WO2001073533 A1 WO 2001073533A1 US 0109889 W US0109889 W US 0109889W WO 0173533 A1 WO0173533 A1 WO 0173533A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- file
- remote workstation
- server
- network
- code
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/305—Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/26—Power supply means, e.g. regulation thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Definitions
- Figure 7 is a flow chart of the operation of a PC after boot up is complete
- Figure 9 is a flow chart of the file retrieval process according to the present invention.
- Kets 24 function is to make all data access dependent upon the network 10 and guidelines set forth by an organization. More specifically, Kets 24 are scalable self executing applets which attach to sensitive files 1 within the NetLatch Server 14. Kets 24 are stored and provided by a Kets Server 26 which is always communicably linked to the NetLatch Server 14. A Kets 24 program can be configured individually to perform a variety of tasks in defense of the network 10. A Kets 24 response to an intrusion can be anything from a simple warning up to erasing secure files moved to an intruding PC, or worse.
- the NetLatch Server 14 requests a new Kets 24, 44 from the Kets Server 26. Once the Kets 24 is retrieved, it is attached to the file 46. Thereafter, an encryption constant is requested 48 and the file is encrypted / converted to a KFF 50. If the file is to be stored locally 52, NetLatch 20 inquires as to whether the file is to be compressed 54. After receiving an appropriate response, the file is either compressed 56 and stored 58, or stored as is 58 according to Figure 11. If the file is to be stored on the server 14, it is automatically compressed and forwarded 60 from the PC 12 to the NetLatch Server 14. Figure 11 shows the method of storing a KFF file in the NetLatch Server 14.
- NetLatch 20 decompresses it 64. Once the file is decompressed, it must be converted / decrypted from the KFF 66. To do this the corresponding A-Kets 68 is retrieved and run 70. After the file is converted back to the normal file format, it is saved 72A and 72B respectively. Once converted, the original file is deleted. In order to access any secured file in the Kets format, the file has to be converted back into its original format from the KFF. To convert the file back from the KFF the Kets Server 26 is required to provide the correct A-Kets 68 to remove the Kets 24 integrated into the file.
- Powerlock 34 also maintains the capability of terminating the power to a PC 12 if a user attempts to operate the PC 12 without NetLatch Server 14 access authorization.
- the Powerkey 32 is kept in the authorized user ' s possession. It is appreciated that the Powerkey 32 can have many embodiments as previously described.
- the POST and BIOS setup begin 80. However, before the POST and BIOS setup can complete, the remote NetLatch 20 software seizes control of the PC 12.
- the NetLatch Server 14 retrieves the file 128, retrieves the corresponding A-Kets 130, decrypts the file 132 and sends it to the user 134 as a read only file. If, however, the file is stored on the PC 12, then the server 14 checks the security level 116, and if the appropriate level of authorization exists, the server 14 retrieves the A-Kets 130, decrypts the file 132 and sends it to the user 134. If the file is then saved on the PC 12 the NetLatch Server 14 provides a Kets 24 to protect that file if reopened by a user in the future.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
Cette invention concerne un système de protection de fichiers électroniques dans un réseau. La démarche consiste à limiter l'accès au seuls utilisateurs autorisés, à surveiller l'utilisation de postes de travail éloignés et d'inclure dans les fichiers électroniques des mini-applications mises à l'échelle, auto-exécutables, qui peuvent déclencher diverses actions correctrices en cas d'accès impropre. Pour avoir accès à un fichier déterminé, l'utilisateur doit, dans un premier temps (74), lancer (78) correctement le poste de travail à distance au moyen d'un code spécifique (82) qui doit être vérifié par un composant (80) au niveau de l'alimentation. Il doit ensuite franchir une série de points de validation avant d'accéder au réseau (84). Le réseau (84) exerce une surveillance et accorde une autorisation pour chaque activité sécurisée sollicitée par l'utilisateur en utilisant le poste de travail à distance sur le réseau. Si l'utilisateur ne se conforme pas aux pratiques prédéterminées, le réseau (84) peut exclure et isoler l'utilisateur fautif, ce qui interdit à cet utilisateur l'accès (90) aux fichiers protégés par ledit réseau.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2001249537A AU2001249537A1 (en) | 2000-03-28 | 2001-03-28 | System and method for safeguarding electronic files and digital information in anetwork environment |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US19242600P | 2000-03-28 | 2000-03-28 | |
US60/192,426 | 2000-03-28 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2001073533A1 true WO2001073533A1 (fr) | 2001-10-04 |
Family
ID=22709595
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2001/009889 WO2001073533A1 (fr) | 2000-03-28 | 2001-03-28 | Sauvegarde de fichiers electroniques et d'informations numeriques dans un environnement de reseau |
Country Status (2)
Country | Link |
---|---|
AU (1) | AU2001249537A1 (fr) |
WO (1) | WO2001073533A1 (fr) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7653602B2 (en) | 2003-11-06 | 2010-01-26 | Visa U.S.A. Inc. | Centralized electronic commerce card transactions |
US7725369B2 (en) | 2003-05-02 | 2010-05-25 | Visa U.S.A. Inc. | Method and server for management of electronic receipts |
US7857215B2 (en) | 2003-09-12 | 2010-12-28 | Visa U.S.A. Inc. | Method and system including phone with rewards image |
US8005763B2 (en) | 2003-09-30 | 2011-08-23 | Visa U.S.A. Inc. | Method and system for providing a distributed adaptive rules based dynamic pricing system |
US8010405B1 (en) | 2002-07-26 | 2011-08-30 | Visa Usa Inc. | Multi-application smart card device software solution for smart cardholder reward selection and redemption |
US8015060B2 (en) | 2002-09-13 | 2011-09-06 | Visa Usa, Inc. | Method and system for managing limited use coupon and coupon prioritization |
US8407083B2 (en) | 2003-09-30 | 2013-03-26 | Visa U.S.A., Inc. | Method and system for managing reward reversal after posting |
US8429048B2 (en) | 2009-12-28 | 2013-04-23 | Visa International Service Association | System and method for processing payment transaction receipts |
US8554610B1 (en) | 2003-08-29 | 2013-10-08 | Visa U.S.A. Inc. | Method and system for providing reward status |
US8626577B2 (en) | 2002-09-13 | 2014-01-07 | Visa U.S.A | Network centric loyalty system |
US8984636B2 (en) | 2005-07-29 | 2015-03-17 | Bit9, Inc. | Content extractor and analysis system |
TWI505125B (fr) * | 2014-10-13 | 2015-10-21 | ||
US9852437B2 (en) | 2002-09-13 | 2017-12-26 | Visa U.S.A. Inc. | Opt-in/opt-out in loyalty system |
US11132691B2 (en) | 2009-12-16 | 2021-09-28 | Visa International Service Association | Merchant alerts incorporating receipt data |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5552776A (en) * | 1991-09-23 | 1996-09-03 | Z-Microsystems | Enhanced security system for computing devices |
US5987252A (en) * | 1997-09-19 | 1999-11-16 | Digital Equipment Corporation | Method and apparatus for statically analyzing a computer program for data dependencies |
US6032150A (en) * | 1997-08-25 | 2000-02-29 | Planetweb, Inc. | Secure graphical objects in web documents with a program applet placed to present further information upon selected conditions |
-
2001
- 2001-03-28 WO PCT/US2001/009889 patent/WO2001073533A1/fr active Search and Examination
- 2001-03-28 AU AU2001249537A patent/AU2001249537A1/en not_active Abandoned
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5552776A (en) * | 1991-09-23 | 1996-09-03 | Z-Microsystems | Enhanced security system for computing devices |
US6032150A (en) * | 1997-08-25 | 2000-02-29 | Planetweb, Inc. | Secure graphical objects in web documents with a program applet placed to present further information upon selected conditions |
US5987252A (en) * | 1997-09-19 | 1999-11-16 | Digital Equipment Corporation | Method and apparatus for statically analyzing a computer program for data dependencies |
Cited By (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8010405B1 (en) | 2002-07-26 | 2011-08-30 | Visa Usa Inc. | Multi-application smart card device software solution for smart cardholder reward selection and redemption |
US8239261B2 (en) | 2002-09-13 | 2012-08-07 | Liane Redford | Method and system for managing limited use coupon and coupon prioritization |
US10460338B2 (en) | 2002-09-13 | 2019-10-29 | Visa U.S.A. Inc. | Network centric loyalty system |
US9852437B2 (en) | 2002-09-13 | 2017-12-26 | Visa U.S.A. Inc. | Opt-in/opt-out in loyalty system |
US8626577B2 (en) | 2002-09-13 | 2014-01-07 | Visa U.S.A | Network centric loyalty system |
US8015060B2 (en) | 2002-09-13 | 2011-09-06 | Visa Usa, Inc. | Method and system for managing limited use coupon and coupon prioritization |
US7987120B2 (en) | 2003-05-02 | 2011-07-26 | Visa U.S.A. Inc. | Method and portable device for management of electronic receipts |
US7725369B2 (en) | 2003-05-02 | 2010-05-25 | Visa U.S.A. Inc. | Method and server for management of electronic receipts |
US7827077B2 (en) | 2003-05-02 | 2010-11-02 | Visa U.S.A. Inc. | Method and apparatus for management of electronic receipts on portable devices |
US8386343B2 (en) | 2003-05-02 | 2013-02-26 | Visa U.S.A. Inc. | Method and user device for management of electronic receipts |
US9087426B2 (en) | 2003-05-02 | 2015-07-21 | Visa U.S.A. Inc. | Method and administration system for management of electronic receipts |
US8793156B2 (en) | 2003-08-29 | 2014-07-29 | Visa U.S.A. Inc. | Method and system for providing reward status |
US8554610B1 (en) | 2003-08-29 | 2013-10-08 | Visa U.S.A. Inc. | Method and system for providing reward status |
US7857216B2 (en) | 2003-09-12 | 2010-12-28 | Visa U.S.A. Inc. | Method and system for providing interactive cardholder rewards image replacement |
US7857215B2 (en) | 2003-09-12 | 2010-12-28 | Visa U.S.A. Inc. | Method and system including phone with rewards image |
US8407083B2 (en) | 2003-09-30 | 2013-03-26 | Visa U.S.A., Inc. | Method and system for managing reward reversal after posting |
US9141967B2 (en) | 2003-09-30 | 2015-09-22 | Visa U.S.A. Inc. | Method and system for managing reward reversal after posting |
US8244648B2 (en) | 2003-09-30 | 2012-08-14 | Visa U.S.A. Inc. | Method and system for providing a distributed adaptive rules based dynamic pricing system |
US8005763B2 (en) | 2003-09-30 | 2011-08-23 | Visa U.S.A. Inc. | Method and system for providing a distributed adaptive rules based dynamic pricing system |
US7653602B2 (en) | 2003-11-06 | 2010-01-26 | Visa U.S.A. Inc. | Centralized electronic commerce card transactions |
US9710811B2 (en) | 2003-11-06 | 2017-07-18 | Visa U.S.A. Inc. | Centralized electronic commerce card transactions |
US8984636B2 (en) | 2005-07-29 | 2015-03-17 | Bit9, Inc. | Content extractor and analysis system |
US11132691B2 (en) | 2009-12-16 | 2021-09-28 | Visa International Service Association | Merchant alerts incorporating receipt data |
US8650124B2 (en) | 2009-12-28 | 2014-02-11 | Visa International Service Association | System and method for processing payment transaction receipts |
US8429048B2 (en) | 2009-12-28 | 2013-04-23 | Visa International Service Association | System and method for processing payment transaction receipts |
TWI505125B (fr) * | 2014-10-13 | 2015-10-21 |
Also Published As
Publication number | Publication date |
---|---|
AU2001249537A1 (en) | 2001-10-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5270694B2 (ja) | 機密ファイルを保護するためのクライアント・コンピュータ、及びそのサーバ・コンピュータ、並びにその方法及びコンピュータ・プログラム | |
JP4278327B2 (ja) | コンピュータ・プラットフォームおよびその運用方法 | |
EP1349033B1 (fr) | Procédé de protection de l'intégrité de logiciels | |
Greenberg et al. | Mobile agents and security | |
US8588422B2 (en) | Key management to protect encrypted data of an endpoint computing device | |
US6173402B1 (en) | Technique for localizing keyphrase-based data encryption and decryption | |
CN100568212C (zh) | 隔离系统及隔离方法 | |
US8719901B2 (en) | Secure consultation system | |
US20050123137A1 (en) | Means for providing protecting for digital assets | |
KR101373542B1 (ko) | 가상화 기반 논리적 망 분리 기법을 이용한 개인정보 보호 시스템 | |
WO2001073533A1 (fr) | Sauvegarde de fichiers electroniques et d'informations numeriques dans un environnement de reseau | |
EP1203278A1 (fr) | Mise en oeuvre de restriction de l'utilisation de donnees memorisees | |
JP5380063B2 (ja) | Drmシステム | |
JP4185546B2 (ja) | 情報漏洩抑止装置、情報漏洩抑止プログラム、情報漏洩抑止記録媒体、及び情報漏洩抑止システム | |
CN109600397A (zh) | 一种网络安全监管方法 | |
US20240070303A1 (en) | File Encapsulation Validation | |
Arai et al. | A proposal for an effective information flow control model for sharing and protecting sensitive information | |
Bishop | UNIX security in a supercomputing environment | |
Muller | Securing Distributed Data Networks | |
Lisdorf et al. | Securing the Cloud | |
WO2022101934A1 (fr) | Système de protection de l'exfiltration de données par détection et validation et procédé associé | |
KR20010000961A (ko) | 트로이형 감시프로그램이 기록된 기록매체 및 트로이형감시프로그램을 이용한 인터넷 온라인 감시 및 인증 방법 | |
Wilson | A vulnerability assessment of roaming soft certificate PKI solutions | |
Prakash | OTK: Key Distribution Center at Cloud Providers towards Secure the Services | |
da Silveira Serafim et al. | Restraining and repairing file system damage through file integrity control |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase |
Ref country code: JP |
|
DPE2 | Request for preliminary examination filed before expiration of 19th month from priority date (pct application filed from 20040101) |