WO2011152987A2 - Claim based content reputation service - Google Patents
Claim based content reputation service Download PDFInfo
- Publication number
- WO2011152987A2 WO2011152987A2 PCT/US2011/036733 US2011036733W WO2011152987A2 WO 2011152987 A2 WO2011152987 A2 WO 2011152987A2 US 2011036733 W US2011036733 W US 2011036733W WO 2011152987 A2 WO2011152987 A2 WO 2011152987A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- content
- computer
- network node
- digital fingerprint
- data item
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/14—Details of searching files based on file metadata
- G06F16/148—File search processing
- G06F16/152—File search processing using file content signatures, e.g. hash values
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
- G06F16/2228—Indexing structures
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/60—Information retrieval; Database structures therefor; File system structures therefor of audio data
- G06F16/68—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
- G06F16/683—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/70—Information retrieval; Database structures therefor; File system structures therefor of video data
- G06F16/78—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
- G06F16/783—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
- G06F2201/83—Indexing scheme relating to error detection, to error correction, and to monitoring the solution involving signatures
Definitions
- the illustrated clients include a laptop computer 1 10, a printer/fax/scanner 1 12, a server 1 14, a desktop computer 116, and a handheld computing device (e.g., a PDA, smartphone, etc.) 118.
- the content reputation service 102 may, for example, accept, aggregate, store, and furnish upon request claims about digital content (files or any other type of data). Additionally, in some embodiments, steps may be taken to ensure that only trusted parties are allowed to submit claims to the service 102. In such embodiments, claims submitted from unknown or un-trusted clients will not be accepted. In some embodiments, there are no restrictions as to which clients are allowed to lookup existing claims.
- any modification to the data will lead to a different calculated fingerprint.
- any modification to a file will automatically disassociate the file with all previously issued claims.
- Issuer Entity that issued this claim. This may, for example, identify a particular application, service, user, etc.
- all content claims may be stored in centralized relational database 108 with the fingerprint used as the primary key.
- a server 106 may formulate a database query using the fingerprint included in the client request as the primary key (step 604). If a matching fingerprint exists in the database 108 (step 606), the server 106 may retrieve the claim(s) associated with the fingerprint (step 608), filter those claims according to any criteria specified by the client (step 609), and return the filtered claim data (which may be either a subset of the retrieved claim data or the entire claim set if filtering is not employed or if no filtering criteria are specified by the client) to the requesting client (step 610).
- the server 106 may inform the client that no matching claims were found (step 612).
- the content reputation service 102 may thus identify any claims that are associated with a given piece of data by comparing a calculated fingerprint for the data (received from the client) with a fingerprint stored in the database that is associated with the claims for the data in question.
- content claims may be created when data is subjected to a certain type of analysis for the first time within the system 100. Thereafter, as data travels within the system and needs to be accessed, previously issued claims may be used in order to get necessary information about the data without analyzing it all over again. In some embodiments, additional claims about data may be added when new types of scans are performed on the data, thus extending the claim set with new information.
- the following practical example illustrates how the content reputation service 102 may be employed to minimize the resources that need to be devoted to examining the content of a particular piece of data.
- a document file e.g., a MICROSOFT WORD ® document
- the organization's edge server may scan the attachment, determine that it is free of virus, spyware, and malicious URLs, and create three claims with the content reputation service 102.
- the recipient may then, for example, receive the file and upload it to the
- SHAREPOINT ® site (Suppose that the security policy that is enforced on this SHAREPOINT ® site requires that all files be scanned for viruses, spyware, malicious URLs, and DLP.) During upload, the security scanner for the
- the overhead caused by interaction with the content reputation service 102 may be significantly lower than that of an actual scan or other data evaluation process. It should also be noted that, in some embodiments, inclusion of additional data inspection processes (which increases scan/evaluation time) will not have an adverse effect on claim submission and lookup time.
- the content reputation service 102 may export a content claim or claim set as digitally signed file, e.g., an XML file.
- This "content certificate” may, for example, be delivered with or without (if the recipient already possesses this data) corresponding data to parties who for one reason or another have no access to the content reputation service and cannot communicate with it directly. Despite this fact, the recipient may reliably verify the validity of the content certificate, and, if valid, may decide to trust some or all of the included content claims.
- Fig. 7 shows an example of how the claim set shown in Fig. 4 may appear when exported as a content certificate.
- Such an XML file may, for example, be signed using enveloped XML digital signature.
- the recipient of such a file may first verify the digital signature, to make sure that integrity of the XML is intact. If the signature is valid, the recipient may, for example, calculate the fingerprint of the data using an algorithm specified in the XML. If resulting value matches the fingerprint value in the XML, then the recipient may determine that all claims in this XML file are relevant to the data and can be trusted.
- the recipient of such a content certificate is able to identify one or more claims that are associated with a given piece of data by comparing the calculated fingerprint for the data with a fingerprint included in the content certificate that also contains the claim(s).
- a verification tool may be provided that automates verification of such content certificates.
- content certificates for data items may also offer some additional flexibility when the data item itself has been modified.
- at least some reclassification of content e.g. PII, HBI, etc.
- classification technology that generates a "soft hash" which can be used to determine how close the document is to the original.
- the entire reclassification process may be avoided.
- the above-described embodiments of the present invention can be implemented in any of numerous ways.
- the embodiments may be implemented using hardware, software or a combination thereof.
- the software code can be executed on any suitable processor or collection of processors, whether provided in a single computer or distributed among multiple computers.
- processors may be implemented as integrated circuits, with one or more processors in an integrated circuit component.
- a processor may be implemented using circuitry in any suitable format.
- a computer may be embodied in any of a number of forms, such as a rack-mounted computer, a desktop computer, a laptop computer, or a tablet computer. Additionally, a computer may be embedded in a device not generally regarded as a computer but with suitable processing capabilities, including a Personal Digital Assistant (PDA), a smart phone or any other suitable portable or fixed electronic device.
- PDA Personal Digital Assistant
- a computer may have one or more input and output devices. These devices can be used, among other things, to present a user interface. Examples of output devices that can be used to provide a user interface include printers or display screens for visual presentation of output and speakers or other sound generating devices for audible presentation of output. Examples of input devices that can be used for a user interface include keyboards, and pointing devices, such as mice, touch pads, and digitizing tablets. As another example, a computer may receive input information through speech recognition or in other audible format.
- Such computers may be interconnected by one or more networks in any suitable form, including as a local area network or a wide area network, such as an enterprise network or the Internet.
- networks may be based on any suitable technology and may operate according to any suitable protocol and may include wireless networks, wired networks or fiber optic networks.
- the various methods or processes outlined herein may be coded as software that is executable on one or more processors that employ any one of a variety of operating systems or platforms. Additionally, such software may be written using any of a number of suitable programming languages and/or programming or scripting tools, and also may be compiled as executable machine language code or intermediate code that is executed on a framework or virtual machine.
- non-transitory computer-readable storage medium encompasses only a computer-readable medium that can be considered to be a manufacture (i.e., article of manufacture) or a machine.
- Computer-executable instructions may be in many forms, such as program modules, executed by one or more computers or other devices.
- program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types.
- functionality of the program modules may be combined or distributed as desired in various embodiments.
- data structures may be stored in computer-readable media in any suitable form.
- data structures may be shown to have fields that are related through location in the data structure. Such relationships may likewise be achieved by assigning storage for the fields with locations in a computer-readable medium that conveys relationship between the fields.
- any suitable mechanism may be used to establish a relationship between information in fields of a data structure, including through the use of pointers, tags or other mechanisms that establish relationship between data elements.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Data Mining & Analysis (AREA)
- Library & Information Science (AREA)
- Bioethics (AREA)
- Virology (AREA)
- Multimedia (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Priority Applications (7)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201180027177.5A CN102918533B (zh) | 2010-06-01 | 2011-05-17 | 基于声明的内容名誉服务 |
| HK13107969.7A HK1180785B (en) | 2010-06-01 | 2011-05-17 | Claim based content reputation service |
| KR1020127031360A KR101751566B1 (ko) | 2010-06-01 | 2011-05-17 | 클레임 기반 컨텐츠 명성 서비스 |
| RU2012151502/08A RU2573760C2 (ru) | 2010-06-01 | 2011-05-17 | Служба репутации контента на основе декларации |
| JP2013513199A JP5711361B2 (ja) | 2010-06-01 | 2011-05-17 | クレームベースのコンテンツ評価サービス |
| EP11790177.7A EP2577523B1 (en) | 2010-06-01 | 2011-05-17 | Claim based content reputation service |
| BR112012030409A BR112012030409A2 (pt) | 2010-06-01 | 2011-05-17 | método para identificar um pedido de conteúdo, meio de armazenamento legível por computador e sistema |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US12/791,305 | 2010-06-01 | ||
| US12/791,305 US8732473B2 (en) | 2010-06-01 | 2010-06-01 | Claim based content reputation service |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2011152987A2 true WO2011152987A2 (en) | 2011-12-08 |
| WO2011152987A3 WO2011152987A3 (en) | 2012-03-29 |
Family
ID=45023123
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/US2011/036733 Ceased WO2011152987A2 (en) | 2010-06-01 | 2011-05-17 | Claim based content reputation service |
Country Status (8)
| Country | Link |
|---|---|
| US (1) | US8732473B2 (enExample) |
| EP (1) | EP2577523B1 (enExample) |
| JP (1) | JP5711361B2 (enExample) |
| KR (1) | KR101751566B1 (enExample) |
| CN (1) | CN102918533B (enExample) |
| BR (1) | BR112012030409A2 (enExample) |
| RU (1) | RU2573760C2 (enExample) |
| WO (1) | WO2011152987A2 (enExample) |
Families Citing this family (20)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8432570B1 (en) * | 2010-07-30 | 2013-04-30 | Symantec Corporation | Using bit arrays in incremental scanning of content for sensitive data |
| CN102831127B (zh) * | 2011-06-17 | 2015-04-22 | 阿里巴巴集团控股有限公司 | 重复数据处理方法、装置及系统 |
| CN102542658A (zh) * | 2012-01-18 | 2012-07-04 | 朱成书 | 一种金融票据防伪认证管理系统 |
| US9015745B2 (en) | 2012-02-07 | 2015-04-21 | Turner Broadcasting System, Inc. | Method and system for detection of user-initiated events utilizing automatic content recognition |
| US9703932B2 (en) * | 2012-04-30 | 2017-07-11 | Excalibur Ip, Llc | Continuous content identification of broadcast content |
| WO2014064323A1 (en) * | 2012-10-23 | 2014-05-01 | Nokia Corporation | Method and apparatus for managing access rights |
| US9288509B2 (en) | 2012-12-28 | 2016-03-15 | Turner Broadcasting System, Inc. | Method and system for providing synchronized advertisements and services |
| WO2015012867A1 (en) | 2013-07-26 | 2015-01-29 | Hewlett Packard Development Company, L.P. | Data view based on context |
| US10108686B2 (en) * | 2014-02-19 | 2018-10-23 | Snowflake Computing Inc. | Implementation of semi-structured data as a first-class database element |
| CN103973708B (zh) * | 2014-05-26 | 2018-09-07 | 中电长城网际系统应用有限公司 | 一种外泄事件的确定方法和系统 |
| CN104462451B (zh) * | 2014-12-15 | 2017-12-05 | 中电长城网际系统应用有限公司 | 数据库文件敏感内容的检测方法和装置 |
| US9667646B2 (en) * | 2015-02-12 | 2017-05-30 | Netapp, Inc. | Maintaining dynamic configuration information of a multi-host off-cluster service on a cluster |
| KR102448863B1 (ko) * | 2016-03-08 | 2022-09-30 | 엘지전자 주식회사 | 이동단말기 및 그 제어방법 |
| ITUA20162953A1 (it) * | 2016-04-28 | 2017-10-28 | Tolemaica S R L | Sistema informatico per la generazione di dati visivi e/o sonori certificati. |
| CN106407362A (zh) * | 2016-09-08 | 2017-02-15 | 福建中金在线信息科技有限公司 | 一种关键词信息检索的方法及装置 |
| US10701438B2 (en) | 2016-12-31 | 2020-06-30 | Turner Broadcasting System, Inc. | Automatic content recognition and verification in a broadcast chain |
| US10511631B2 (en) * | 2017-01-25 | 2019-12-17 | Microsoft Technology Licensing, Llc | Safe data access through any data channel |
| US11080564B2 (en) * | 2018-09-28 | 2021-08-03 | Microsoft Technology Licensing, Llc | Content classification tool with re-classification techniques |
| CN110995679B (zh) * | 2019-11-22 | 2022-03-01 | 杭州迪普科技股份有限公司 | 一种文件数据流控制方法、装置、设备及存储介质 |
| US12287774B1 (en) * | 2024-02-20 | 2025-04-29 | Oracle International Corporation | Techniques for automatically identifying undeclared composite key relationships in a database schema |
Family Cites Families (29)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6119231A (en) | 1997-10-31 | 2000-09-12 | Cisco Technologies, Inc. | Data scanning network security technique |
| US6094731A (en) * | 1997-11-24 | 2000-07-25 | Symantec Corporation | Antivirus accelerator for computer networks |
| JP3871163B2 (ja) * | 1998-02-13 | 2007-01-24 | 株式会社日立情報システムズ | ウィルスチェック結果のサーバ転送・編集方法およびそのプログラム記録媒体 |
| JP3533125B2 (ja) * | 1999-12-03 | 2004-05-31 | Necフィールディング株式会社 | ソフトウェア管理方法、コンピュータウイルス駆除システム、および記録媒体 |
| US6928550B1 (en) * | 2000-01-06 | 2005-08-09 | International Business Machines Corporation | Method and system for generating and using a virus free file certificate |
| US6834308B1 (en) * | 2000-02-17 | 2004-12-21 | Audible Magic Corporation | Method and apparatus for identifying media content presented on a media playing device |
| US7412462B2 (en) * | 2000-02-18 | 2008-08-12 | Burnside Acquisition, Llc | Data repository and method for promoting network storage of data |
| US6611925B1 (en) | 2000-06-13 | 2003-08-26 | Networks Associates Technology, Inc. | Single point of entry/origination item scanning within an enterprise or workgroup |
| US6928555B1 (en) * | 2000-09-18 | 2005-08-09 | Networks Associates Technology, Inc. | Method and apparatus for minimizing file scanning by anti-virus programs |
| US7827611B2 (en) * | 2001-08-01 | 2010-11-02 | Mcafee, Inc. | Malware scanning user interface for wireless devices |
| US6745192B1 (en) | 2001-08-03 | 2004-06-01 | Networks Associates Technology Inc. | System and method for providing a multi-tiered hierarchical transient message store accessed using multiply hashed unique filenames |
| US6993660B1 (en) | 2001-08-03 | 2006-01-31 | Mcafee, Inc. | System and method for performing efficient computer virus scanning of transient messages using checksums in a distributed computing environment |
| JP2003196111A (ja) * | 2001-12-26 | 2003-07-11 | Hitachi Ltd | 電子署名を用いたウィルスチェック方法 |
| JP2003216445A (ja) * | 2002-01-23 | 2003-07-31 | Hitachi Ltd | コンピュータウイルスのチェック方法 |
| US7742992B2 (en) * | 2002-02-05 | 2010-06-22 | Pace Anti-Piracy | Delivery of a secure software license for a software product and a toolset for creating the software product |
| JP4088082B2 (ja) | 2002-02-15 | 2008-05-21 | 株式会社東芝 | 未知コンピュータウイルスの感染を防止する装置およびプログラム |
| RU2005104956A (ru) * | 2002-07-24 | 2005-07-20 | Конинклейке Филипс Электроникс Н.В. (Nl) | Способ и устройство для регулирования совместного использования файлов |
| EP1420323A1 (en) * | 2002-11-18 | 2004-05-19 | Koninklijke KPN N.V. | Method and system for distribution of software components |
| US7398399B2 (en) | 2003-12-12 | 2008-07-08 | International Business Machines Corporation | Apparatus, methods and computer programs for controlling performance of operations within a data processing system or network |
| US7581252B2 (en) | 2004-07-20 | 2009-08-25 | Lenovo (Singapore) Pte. Ltd. | Storage conversion for anti-virus speed-up |
| GB0418066D0 (en) | 2004-08-13 | 2004-09-15 | Ibm | A prioritization system |
| US20060095964A1 (en) * | 2004-10-29 | 2006-05-04 | Microsoft Corporation | Document stamping antivirus manifest |
| US7818350B2 (en) * | 2005-02-28 | 2010-10-19 | Yahoo! Inc. | System and method for creating a collaborative playlist |
| US9002744B2 (en) | 2006-07-28 | 2015-04-07 | Sony Corporation | Methods, systems and computer program products for determining usage rights for digital content based on characterizing information thereof and related devices |
| US8312536B2 (en) * | 2006-12-29 | 2012-11-13 | Symantec Corporation | Hygiene-based computer security |
| JP4935468B2 (ja) * | 2007-04-03 | 2012-05-23 | ソニー株式会社 | 情報処理装置、および情報処理方法、並びにコンピュータ・プログラム |
| US8291496B2 (en) * | 2008-05-12 | 2012-10-16 | Enpulz, L.L.C. | Server based malware screening |
| JP4710966B2 (ja) * | 2008-12-12 | 2011-06-29 | コニカミノルタビジネステクノロジーズ株式会社 | 画像処理装置、画像処理装置の制御方法、及び画像処理装置の制御プログラム |
| US8683216B2 (en) * | 2010-07-13 | 2014-03-25 | F-Secure Corporation | Identifying polymorphic malware |
-
2010
- 2010-06-01 US US12/791,305 patent/US8732473B2/en active Active
-
2011
- 2011-05-17 CN CN201180027177.5A patent/CN102918533B/zh active Active
- 2011-05-17 JP JP2013513199A patent/JP5711361B2/ja not_active Expired - Fee Related
- 2011-05-17 KR KR1020127031360A patent/KR101751566B1/ko active Active
- 2011-05-17 RU RU2012151502/08A patent/RU2573760C2/ru not_active IP Right Cessation
- 2011-05-17 BR BR112012030409A patent/BR112012030409A2/pt not_active IP Right Cessation
- 2011-05-17 WO PCT/US2011/036733 patent/WO2011152987A2/en not_active Ceased
- 2011-05-17 EP EP11790177.7A patent/EP2577523B1/en active Active
Non-Patent Citations (1)
| Title |
|---|
| See references of EP2577523A4 * |
Also Published As
| Publication number | Publication date |
|---|---|
| US20110296187A1 (en) | 2011-12-01 |
| KR20130120367A (ko) | 2013-11-04 |
| WO2011152987A3 (en) | 2012-03-29 |
| RU2573760C2 (ru) | 2016-01-27 |
| CN102918533B (zh) | 2016-08-03 |
| RU2012151502A (ru) | 2014-06-10 |
| US8732473B2 (en) | 2014-05-20 |
| JP2013532328A (ja) | 2013-08-15 |
| KR101751566B1 (ko) | 2017-07-11 |
| CN102918533A (zh) | 2013-02-06 |
| EP2577523A2 (en) | 2013-04-10 |
| HK1180785A1 (zh) | 2013-10-25 |
| EP2577523A4 (en) | 2015-04-22 |
| BR112012030409A2 (pt) | 2016-08-09 |
| JP5711361B2 (ja) | 2015-04-30 |
| EP2577523B1 (en) | 2019-02-27 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US8732473B2 (en) | Claim based content reputation service | |
| US12212606B1 (en) | Trusted-code generated requests | |
| JP7402183B2 (ja) | 小さいフットプリントのエンドポイント・データ損失防止(dlp) | |
| US10075471B2 (en) | Data loss prevention techniques | |
| US11431757B2 (en) | Access control using impersonization | |
| US10666684B2 (en) | Security policies with probabilistic actions | |
| CN107005568B (zh) | 数据安全操作与预期 | |
| CN105308614B (zh) | 策略强制执行延迟 | |
| US20120030187A1 (en) | System, method and apparatus for tracking digital content objects | |
| CA3088147C (en) | Data isolation in distributed hash chains | |
| US20060190533A1 (en) | System and Method for Registered and Authenticated Electronic Messages | |
| HK1180785B (en) | Claim based content reputation service |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| WWE | Wipo information: entry into national phase |
Ref document number: 201180027177.5 Country of ref document: CN |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11790177 Country of ref document: EP Kind code of ref document: A2 |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 9789/CHENP/2012 Country of ref document: IN |
|
| ENP | Entry into the national phase |
Ref document number: 20127031360 Country of ref document: KR Kind code of ref document: A |
|
| ENP | Entry into the national phase |
Ref document number: 2012151502 Country of ref document: RU Kind code of ref document: A |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2011790177 Country of ref document: EP |
|
| ENP | Entry into the national phase |
Ref document number: 2013513199 Country of ref document: JP Kind code of ref document: A |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112012030409 Country of ref document: BR |
|
| ENP | Entry into the national phase |
Ref document number: 112012030409 Country of ref document: BR Kind code of ref document: A2 Effective date: 20121129 |