AU2001291316A1 - System for protecting objects distributed over a network - Google Patents
System for protecting objects distributed over a networkInfo
- Publication number
- AU2001291316A1 AU2001291316A1 AU2001291316A AU9131601A AU2001291316A1 AU 2001291316 A1 AU2001291316 A1 AU 2001291316A1 AU 2001291316 A AU2001291316 A AU 2001291316A AU 9131601 A AU9131601 A AU 9131601A AU 2001291316 A1 AU2001291316 A1 AU 2001291316A1
- Authority
- AU
- Australia
- Prior art keywords
- network
- distributed over
- protecting objects
- objects distributed
- protecting
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/22—Arrangements for preventing the taking of data from a data transmission channel without authorisation
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2115—Third party
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/101—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US23259900P | 2000-09-14 | 2000-09-14 | |
| US60232599 | 2000-09-14 | ||
| PCT/US2001/042147 WO2002023798A1 (fr) | 2000-09-14 | 2001-09-13 | Systeme servant a proteger des objets distribues sur un reseau |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| AU2001291316A1 true AU2001291316A1 (en) | 2002-03-26 |
Family
ID=22873787
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| AU2001291316A Abandoned AU2001291316A1 (en) | 2000-09-14 | 2001-09-13 | System for protecting objects distributed over a network |
Country Status (6)
| Country | Link |
|---|---|
| US (1) | US20020032873A1 (fr) |
| EP (1) | EP1323258A1 (fr) |
| JP (1) | JP2004509399A (fr) |
| KR (1) | KR20030036788A (fr) |
| AU (1) | AU2001291316A1 (fr) |
| WO (1) | WO2002023798A1 (fr) |
Families Citing this family (32)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8261059B2 (en) * | 2001-10-25 | 2012-09-04 | Verizon Business Global Llc | Secure file transfer and secure file transfer protocol |
| TW567703B (en) * | 2002-05-03 | 2003-12-21 | Era Digital Media Company Ltd | Authentication and control method of AV multimedia information |
| US7441264B2 (en) * | 2002-06-24 | 2008-10-21 | International Business Machines Corporation | Security objects controlling access to resources |
| WO2004008702A1 (fr) * | 2002-07-11 | 2004-01-22 | Ravi Shankar | Utilisation d'objets nomades intelligents pour mettre en oeuvre des services et des applications de messagerie multimedia repartis securises |
| US7076312B2 (en) * | 2002-08-02 | 2006-07-11 | Fisher-Rosemount Systems, Inc. | Integrated electronic signatures for approval of process control and safety system software objects |
| US7529372B2 (en) * | 2002-09-25 | 2009-05-05 | Intellon Corporation | Method for setting an encryption key for logical network separation |
| US7319757B2 (en) * | 2003-01-02 | 2008-01-15 | Intel Corporation | Wireless communication device and method for over-the-air application service |
| US7100047B2 (en) * | 2003-01-23 | 2006-08-29 | Verdasys, Inc. | Adaptive transparent encryption |
| US7003117B2 (en) * | 2003-02-05 | 2006-02-21 | Voltage Security, Inc. | Identity-based encryption system for secure data distribution |
| US7526347B2 (en) * | 2003-02-18 | 2009-04-28 | Fisher-Rosemount Systems, Inc. | Security for objects in a process plant configuration system |
| WO2004109443A2 (fr) * | 2003-06-02 | 2004-12-16 | Liquid Machines, Inc. | Gestion d'objets de donnees dans des contextes dynamiques, distribues et collaboratifs |
| US7376834B2 (en) * | 2003-07-18 | 2008-05-20 | Palo Alto Research Center Incorporated | System and method for securely controlling communications |
| US20050120352A1 (en) * | 2003-11-28 | 2005-06-02 | Sun Microsystems, Inc. | Meta directory server providing users the ability to customize work-flows |
| US7570761B2 (en) * | 2004-02-03 | 2009-08-04 | Trimble Navigation Limited | Method and system for preventing unauthorized recording of media content in the iTunes™ environment |
| US20050201555A1 (en) * | 2004-02-09 | 2005-09-15 | I-Ling Yen | System, method and apparatus for secure computation on encrypted data |
| US7711721B2 (en) * | 2004-09-01 | 2010-05-04 | International Business Machines Corporation | Apparatus, system, and method for suspending a request during file server serialization reinitialization |
| US7627578B2 (en) * | 2004-09-01 | 2009-12-01 | International Business Machines Corporation | Apparatus, system, and method for file system serialization reinitialization |
| US7490088B2 (en) * | 2004-09-01 | 2009-02-10 | International Business Machines Corporation | Apparatus, system, and method for preserving connection/position data integrity during file server serialization reinitialization |
| JP2006079415A (ja) * | 2004-09-10 | 2006-03-23 | Konica Minolta Business Technologies Inc | プログラム更新システムおよびプログラム更新方法 |
| WO2007052373A1 (fr) * | 2005-11-02 | 2007-05-10 | Matsushita Electric Industrial Co., Ltd. | Dispositif de communication d’informations, serveur, et méthode de présentation de contenu |
| EP2011301B1 (fr) * | 2006-04-10 | 2011-06-22 | Trust Integration Services B.V. | Système et procédé de transmission de données protégées |
| US8176319B2 (en) * | 2006-06-27 | 2012-05-08 | Emc Corporation | Identifying and enforcing strict file confidentiality in the presence of system and storage administrators in a NAS system |
| US20100098248A1 (en) * | 2006-10-31 | 2010-04-22 | Agency For Science Technology And Research | Device and method of generating and distributing access permission to digital object |
| KR100752729B1 (ko) * | 2007-05-14 | 2007-08-28 | 한한수 | 독립된 어플리케이션을 이용한 웹페이지 보안 서비스 방법및 시스템 |
| KR20100084037A (ko) * | 2009-01-15 | 2010-07-23 | 삼성전자주식회사 | Ui 제공 장치 및 방법 |
| US9792451B2 (en) * | 2011-12-09 | 2017-10-17 | Echarge2 Corporation | System and methods for using cipher objects to protect data |
| US9465800B2 (en) * | 2013-10-01 | 2016-10-11 | Trunomi Ltd. | Systems and methods for sharing verified identity documents |
| CN103559118B (zh) * | 2013-10-12 | 2016-02-03 | 福建亿榕信息技术有限公司 | 一种基于aop与注解信息系统的安全审计方法 |
| CN105893016A (zh) * | 2015-12-11 | 2016-08-24 | 乐视网信息技术(北京)股份有限公司 | 基于mvc架构的日志记录系统及方法 |
| CN108184149B (zh) * | 2017-12-29 | 2021-04-20 | 北京奇艺世纪科技有限公司 | 一种视频cdn调度优化方法及装置 |
| US20200242213A1 (en) * | 2019-01-28 | 2020-07-30 | Blackberry Limited | Method and system for digital rights management |
| CN110912882A (zh) * | 2019-11-19 | 2020-03-24 | 北京工业大学 | 一种基于智能算法的入侵检测方法及系统 |
Family Cites Families (13)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5276735A (en) * | 1992-04-17 | 1994-01-04 | Secure Computing Corporation | Data enclave and trusted path system |
| US6473860B1 (en) * | 1994-04-07 | 2002-10-29 | Hark C. Chan | Information distribution and processing system |
| US5563946A (en) * | 1994-04-25 | 1996-10-08 | International Business Machines Corporation | Method and apparatus for enabling trial period use of software products: method and apparatus for passing encrypted files between data processing systems |
| US5943422A (en) * | 1996-08-12 | 1999-08-24 | Intertrust Technologies Corp. | Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels |
| US5892900A (en) * | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
| CN100452072C (zh) * | 1995-02-13 | 2009-01-14 | 英特特拉斯特技术公司 | 用于管理在第一装置和第二装置之间的数字文档的分布的方法 |
| US6157721A (en) * | 1996-08-12 | 2000-12-05 | Intertrust Technologies Corp. | Systems and methods using cryptography to protect secure computing environments |
| NL1000530C2 (nl) * | 1995-06-08 | 1996-12-10 | Defil N V Holland Intertrust A | Filtreerwerkwijze. |
| US6192407B1 (en) * | 1996-10-24 | 2001-02-20 | Tumbleweed Communications Corp. | Private, trackable URLs for directed document delivery |
| US5920861A (en) * | 1997-02-25 | 1999-07-06 | Intertrust Technologies Corp. | Techniques for defining using and manipulating rights management data structures |
| US6041411A (en) * | 1997-03-28 | 2000-03-21 | Wyatt; Stuart Alan | Method for defining and verifying user access rights to a computer information |
| US6112181A (en) * | 1997-11-06 | 2000-08-29 | Intertrust Technologies Corporation | Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information |
| US6289450B1 (en) * | 1999-05-28 | 2001-09-11 | Authentica, Inc. | Information security architecture for encrypting documents for remote access while maintaining access control |
-
2001
- 2001-09-13 EP EP01971427A patent/EP1323258A1/fr not_active Withdrawn
- 2001-09-13 US US09/952,290 patent/US20020032873A1/en not_active Abandoned
- 2001-09-13 JP JP2002527118A patent/JP2004509399A/ja not_active Withdrawn
- 2001-09-13 AU AU2001291316A patent/AU2001291316A1/en not_active Abandoned
- 2001-09-13 WO PCT/US2001/042147 patent/WO2002023798A1/fr not_active Ceased
- 2001-09-13 KR KR10-2003-7003791A patent/KR20030036788A/ko not_active Withdrawn
Also Published As
| Publication number | Publication date |
|---|---|
| KR20030036788A (ko) | 2003-05-09 |
| WO2002023798A1 (fr) | 2002-03-21 |
| JP2004509399A (ja) | 2004-03-25 |
| WO2002023798A8 (fr) | 2002-07-11 |
| EP1323258A1 (fr) | 2003-07-02 |
| US20020032873A1 (en) | 2002-03-14 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| AU2001291316A1 (en) | System for protecting objects distributed over a network | |
| AU2001241921A1 (en) | A network storage system | |
| AU2001281401A1 (en) | Systems and methods for distributed network protection | |
| AU2362601A (en) | A telecommunications system | |
| AU2001245723A1 (en) | Emboli protection system | |
| AU2002234004A1 (en) | Caching system for a network storage system | |
| AU2002232594A1 (en) | Item specification object management system | |
| AU2001290848A1 (en) | System for establishing an audit trail to protect objects distributed over a network | |
| AU2003225847A1 (en) | A network system having a virtual-service-module | |
| AU4693300A (en) | Integrating into an application objects that are provided over a network | |
| AU2002226323A1 (en) | A communications system | |
| AU3267000A (en) | A secure network | |
| AUPQ968100A0 (en) | A management system | |
| AU6408601A (en) | A distributed processing system | |
| AU2001238388A1 (en) | Calibration system for a communications system | |
| AUPQ679000A0 (en) | Biocidal protection system | |
| AU2002239658A1 (en) | A communication system that provides extra protection when transmitting criticaldata | |
| AU6733300A (en) | A learning-assistance system | |
| AU2002218619A1 (en) | Protective equipment for a series-capacitor installation | |
| AU2001290861A1 (en) | Network management system | |
| AU2001239048A1 (en) | Hand protection system | |
| AU2001292226A1 (en) | Wide back protection for motorbikers | |
| AUPR157200A0 (en) | A copy protection system | |
| AUPQ275499A0 (en) | A network navigation system | |
| AUPQ055399A0 (en) | A network navigation system |