WO2008146639A1 - 情報共有システム、コンピュータ、プロジェクト管理サーバ及びそれらに用いる情報共有方法 - Google Patents
情報共有システム、コンピュータ、プロジェクト管理サーバ及びそれらに用いる情報共有方法 Download PDFInfo
- Publication number
- WO2008146639A1 WO2008146639A1 PCT/JP2008/059137 JP2008059137W WO2008146639A1 WO 2008146639 A1 WO2008146639 A1 WO 2008146639A1 JP 2008059137 W JP2008059137 W JP 2008059137W WO 2008146639 A1 WO2008146639 A1 WO 2008146639A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information sharing
- units
- input
- data
- computer
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Economics (AREA)
- Strategic Management (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Human Resources & Organizations (AREA)
- Entrepreneurship & Innovation (AREA)
- Software Systems (AREA)
- Educational Administration (AREA)
- Development Economics (AREA)
- Game Theory and Decision Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- General Business, Economics & Management (AREA)
- Storage Device Security (AREA)
Abstract
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2009516254A JP5397691B2 (ja) | 2007-05-23 | 2008-05-19 | 情報共有システム、コンピュータ、プロジェクト管理サーバ及びそれらに用いる情報共有方法 |
US12/601,430 US9461819B2 (en) | 2007-05-23 | 2008-05-19 | Information sharing system, computer, project managing server, and information sharing method used in them |
US13/486,871 US8700532B2 (en) | 2007-05-23 | 2012-06-01 | Information sharing system, computer, project managing server, and information sharing method used in them |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2007136069 | 2007-05-23 | ||
JP2007-136069 | 2007-05-23 |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/601,430 A-371-Of-International US9461819B2 (en) | 2007-05-23 | 2008-05-19 | Information sharing system, computer, project managing server, and information sharing method used in them |
US13/486,871 Division US8700532B2 (en) | 2007-05-23 | 2012-06-01 | Information sharing system, computer, project managing server, and information sharing method used in them |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2008146639A1 true WO2008146639A1 (ja) | 2008-12-04 |
Family
ID=40074904
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2008/059137 WO2008146639A1 (ja) | 2007-05-23 | 2008-05-19 | 情報共有システム、コンピュータ、プロジェクト管理サーバ及びそれらに用いる情報共有方法 |
Country Status (3)
Country | Link |
---|---|
US (2) | US9461819B2 (ja) |
JP (1) | JP5397691B2 (ja) |
WO (1) | WO2008146639A1 (ja) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2010206540A (ja) * | 2009-03-03 | 2010-09-16 | Nippon Hoso Kyokai <Nhk> | ファイル生成装置、ファイル再生装置およびコンピュータプログラム |
JP2012190441A (ja) * | 2011-01-11 | 2012-10-04 | Safenet Inc | リモートプリブート認証 |
JP2014235753A (ja) * | 2013-06-03 | 2014-12-15 | 華為技術有限公司Huawei Technologies Co.,Ltd. | データを入力する方法と装置 |
JP2015146587A (ja) * | 2009-05-19 | 2015-08-13 | セキュリティー ファースト コープ. | クラウド内にデータを確保するシステムおよび方法 |
JP2016511610A (ja) * | 2013-03-15 | 2016-04-14 | インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation | マルチテナント・コンピューティング・インフラストラクチャにおける鍵管理の方法、装置、コンピュータ・プログラム製品、およびクラウド・コンピュート・インフラストラクチャ(マルチテナント環境における鍵管理) |
US9678857B1 (en) | 2015-11-30 | 2017-06-13 | International Business Machines Corporation | Listing optimal machine instances |
US10621947B2 (en) | 2015-12-21 | 2020-04-14 | Nec Corporation | Display control apparatus, display control method, and recording medium on which display control program is recorded |
US10949318B2 (en) | 2015-12-21 | 2021-03-16 | Nec Corporation | Display control apparatus, display control method, and recording medium on which display control program is recorded |
Families Citing this family (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101506330B1 (ko) * | 2008-09-23 | 2015-03-27 | 삼성전자 주식회사 | 데이터 강건성 관리장치와, 데이터 저장 방법 및 데이터 복구 방법 |
JP4780487B2 (ja) * | 2009-03-04 | 2011-09-28 | 日本電気株式会社 | 業務環境生成システム、業務環境生成方法、及び業務環境生成用プログラム |
US8782755B2 (en) * | 2009-03-20 | 2014-07-15 | Citrix Systems, Inc. | Systems and methods for selecting an authentication virtual server from a plurality of virtual servers |
US8812400B2 (en) * | 2010-07-09 | 2014-08-19 | Hewlett-Packard Development Company, L.P. | Managing a memory segment using a memory virtual appliance |
US8874888B1 (en) | 2011-01-13 | 2014-10-28 | Google Inc. | Managed boot in a cloud system |
US20120317033A1 (en) * | 2011-06-10 | 2012-12-13 | Robert Heidasch | Generating business process objects |
US9049176B2 (en) * | 2011-06-22 | 2015-06-02 | Dropbox, Inc. | File sharing via link generation |
US9075979B1 (en) | 2011-08-11 | 2015-07-07 | Google Inc. | Authentication based on proximity to mobile device |
US8966198B1 (en) | 2011-09-01 | 2015-02-24 | Google Inc. | Providing snapshots of virtual storage devices |
US8958293B1 (en) | 2011-12-06 | 2015-02-17 | Google Inc. | Transparent load-balancing for cloud computing services |
US9178698B1 (en) * | 2011-12-21 | 2015-11-03 | Google Inc. | Dynamic key management |
US8800009B1 (en) | 2011-12-30 | 2014-08-05 | Google Inc. | Virtual machine service access |
US8694781B1 (en) * | 2012-03-30 | 2014-04-08 | Emc Corporation | Techniques for providing hardware security module operability |
US8909939B1 (en) * | 2012-04-04 | 2014-12-09 | Google Inc. | Distribution of cryptographic host keys in a cloud computing environment |
US8959623B2 (en) * | 2012-05-25 | 2015-02-17 | Ca, Inc. | Protecting virtual machine console from misuse, hijacking or eavesdropping in cloud environments |
US9170834B2 (en) * | 2012-10-31 | 2015-10-27 | Google Inc. | Metadata-based virtual machine configuration |
US9930066B2 (en) * | 2013-02-12 | 2018-03-27 | Nicira, Inc. | Infrastructure level LAN security |
EP3049989B1 (en) * | 2013-09-27 | 2021-03-03 | Intel Corporation | Protection scheme for remotely-stored data |
US9235714B1 (en) | 2013-11-12 | 2016-01-12 | Amazon Technologies, Inc. | Preventing persistent storage of cryptographic information using signaling |
US9231923B1 (en) * | 2013-11-12 | 2016-01-05 | Amazon Technologies, Inc. | Secure data destruction in a distributed environment using key protection mechanisms |
US10223538B1 (en) | 2013-11-12 | 2019-03-05 | Amazon Technologies, Inc. | Preventing persistent storage of cryptographic information |
US10798073B2 (en) | 2016-08-26 | 2020-10-06 | Nicira, Inc. | Secure key management protocol for distributed network encryption |
US10666443B2 (en) * | 2016-10-18 | 2020-05-26 | Red Hat, Inc. | Continued verification and monitoring of application code in containerized execution environment |
US10805349B2 (en) * | 2017-03-29 | 2020-10-13 | At&T Intellectual Property I, L.P. | Method and system to secure and dynamically share IOT information cross multiple platforms in 5G network |
CN112257041B (zh) * | 2020-10-19 | 2024-07-16 | 北京五一视界数字孪生科技股份有限公司 | 项目的控制方法、装置及电子设备 |
KR102413355B1 (ko) * | 2021-03-25 | 2022-06-27 | 주식회사 이알마인드 | 디바이스로의 보안 서비스 제공 방법 및 이를 수행하는 서버 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002318719A (ja) * | 2001-04-24 | 2002-10-31 | Hitachi Ltd | 高信頼計算機システム |
JP2004259262A (ja) * | 2003-02-07 | 2004-09-16 | Matsushita Electric Ind Co Ltd | 端末装置及びそれを備えたデータ保護システム |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8140859B1 (en) * | 2000-07-21 | 2012-03-20 | The Directv Group, Inc. | Secure storage and replay of media programs using a hard-paired receiver and storage device |
US20020092003A1 (en) * | 2000-11-29 | 2002-07-11 | Brad Calder | Method and process for the rewriting of binaries to intercept system calls in a secure execution environment |
US8335915B2 (en) * | 2002-05-14 | 2012-12-18 | Netapp, Inc. | Encryption based security system for network storage |
JP4309629B2 (ja) * | 2002-09-13 | 2009-08-05 | 株式会社日立製作所 | ネットワークシステム |
US7487288B2 (en) * | 2004-05-14 | 2009-02-03 | International Business Machines Corporation | Dynamic loading of virtual volume data in a virtual tape server |
US7620984B2 (en) * | 2004-10-06 | 2009-11-17 | Hewlett-Packard Development Company, L.P. | Method of managing computer system |
US7529745B2 (en) * | 2004-11-19 | 2009-05-05 | International Business Machines Corporation | Method of verifying metadata of a migrated file |
US9606821B2 (en) * | 2004-12-17 | 2017-03-28 | Intel Corporation | Virtual environment manager for creating and managing virtual machine environments |
JP2006201845A (ja) | 2005-01-18 | 2006-08-03 | Hitachi Software Eng Co Ltd | ウィルス感染及び機密情報漏洩防止対策コンピュータ |
US8190877B2 (en) * | 2005-07-05 | 2012-05-29 | Viasat, Inc. | Trusted cryptographic processor |
-
2008
- 2008-05-19 JP JP2009516254A patent/JP5397691B2/ja not_active Expired - Fee Related
- 2008-05-19 US US12/601,430 patent/US9461819B2/en active Active
- 2008-05-19 WO PCT/JP2008/059137 patent/WO2008146639A1/ja active Application Filing
-
2012
- 2012-06-01 US US13/486,871 patent/US8700532B2/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002318719A (ja) * | 2001-04-24 | 2002-10-31 | Hitachi Ltd | 高信頼計算機システム |
JP2004259262A (ja) * | 2003-02-07 | 2004-09-16 | Matsushita Electric Ind Co Ltd | 端末装置及びそれを備えたデータ保護システム |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2010206540A (ja) * | 2009-03-03 | 2010-09-16 | Nippon Hoso Kyokai <Nhk> | ファイル生成装置、ファイル再生装置およびコンピュータプログラム |
JP2015146587A (ja) * | 2009-05-19 | 2015-08-13 | セキュリティー ファースト コープ. | クラウド内にデータを確保するシステムおよび方法 |
JP2012190441A (ja) * | 2011-01-11 | 2012-10-04 | Safenet Inc | リモートプリブート認証 |
JP2016511610A (ja) * | 2013-03-15 | 2016-04-14 | インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation | マルチテナント・コンピューティング・インフラストラクチャにおける鍵管理の方法、装置、コンピュータ・プログラム製品、およびクラウド・コンピュート・インフラストラクチャ(マルチテナント環境における鍵管理) |
JP2014235753A (ja) * | 2013-06-03 | 2014-12-15 | 華為技術有限公司Huawei Technologies Co.,Ltd. | データを入力する方法と装置 |
US9672367B2 (en) | 2013-06-03 | 2017-06-06 | Huawei Technologies Co., Ltd. | Method and apparatus for inputting data |
US9678857B1 (en) | 2015-11-30 | 2017-06-13 | International Business Machines Corporation | Listing optimal machine instances |
US10621947B2 (en) | 2015-12-21 | 2020-04-14 | Nec Corporation | Display control apparatus, display control method, and recording medium on which display control program is recorded |
US10949318B2 (en) | 2015-12-21 | 2021-03-16 | Nec Corporation | Display control apparatus, display control method, and recording medium on which display control program is recorded |
Also Published As
Publication number | Publication date |
---|---|
US20110179412A1 (en) | 2011-07-21 |
US9461819B2 (en) | 2016-10-04 |
JP5397691B2 (ja) | 2014-01-22 |
US8700532B2 (en) | 2014-04-15 |
JPWO2008146639A1 (ja) | 2010-08-19 |
US20120246478A1 (en) | 2012-09-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2008146639A1 (ja) | 情報共有システム、コンピュータ、プロジェクト管理サーバ及びそれらに用いる情報共有方法 | |
CN112929172B (zh) | 基于密钥库动态加密数据的系统、方法及装置 | |
CN101535987B (zh) | 具有多条内容的媒体存储结构在内容分发系统中的使用 | |
EP2774313B1 (en) | Electronic content distribution based on secret sharing | |
CN101587524B (zh) | 一种基于虚拟系统的数据存储设备加密方法 | |
JP4342595B1 (ja) | 情報処理装置、情報処理システム、および暗号化情報管理方法 | |
JP2016513840A (ja) | データセキュリティを保護するための方法、サーバ、ホスト、およびシステム | |
CN101123495A (zh) | 一种数据加密、解密系统和方法 | |
CN112740615B (zh) | 多方计算的密钥管理 | |
CN102081713B (zh) | 一种用于防止数据泄密的办公系统 | |
CN103248476B (zh) | 数据加密密钥的管理方法、系统及终端 | |
WO2008048712A3 (en) | Device-independent management of cryptographic information | |
WO2008058095A3 (en) | Method and apparatus for enabling content to be shared among multiple devices in a secure environment | |
CN102611549A (zh) | 数据加密设备和存储卡 | |
CN102984273B (zh) | 虚拟磁盘加密方法、解密方法、装置及云服务器 | |
CN103618737A (zh) | 一种云计算环境下的虚拟机vnc控制台优化方案 | |
CN109104275A (zh) | 一种hsm设备 | |
CN102833077A (zh) | 金融ic及金融社保ic卡远程发卡数据传输加解密方法 | |
WO2015107641A1 (ja) | 暗号システム、鍵生成装置、再暗号化装置及びユーザ端末 | |
WO2020253380A1 (zh) | 数据加密方法、装置及终端设备 | |
CN105850072A (zh) | 数据处理系统、加密装置、解密装置以及程序 | |
CN110198320B (zh) | 一种加密信息传输方法和系统 | |
CN103020517B (zh) | Usb虚拟桌面设备的互访方法和系统 | |
SG158757A1 (en) | Method and apparatus for protecting data in computers | |
CN106612170A (zh) | Drm服务提供装置及方法、内容再现装置及方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08764345 Country of ref document: EP Kind code of ref document: A1 |
|
DPE2 | Request for preliminary examination filed before expiration of 19th month from priority date (pct application filed from 20040101) | ||
ENP | Entry into the national phase |
Ref document number: 2009516254 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 12601430 Country of ref document: US |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 08764345 Country of ref document: EP Kind code of ref document: A1 |