[go: up one dir, main page]

AU2001291316A1 - System for protecting objects distributed over a network - Google Patents

System for protecting objects distributed over a network

Info

Publication number
AU2001291316A1
AU2001291316A1 AU2001291316A AU9131601A AU2001291316A1 AU 2001291316 A1 AU2001291316 A1 AU 2001291316A1 AU 2001291316 A AU2001291316 A AU 2001291316A AU 9131601 A AU9131601 A AU 9131601A AU 2001291316 A1 AU2001291316 A1 AU 2001291316A1
Authority
AU
Australia
Prior art keywords
network
distributed over
protecting objects
objects distributed
protecting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU2001291316A
Other languages
English (en)
Inventor
David A. Lordemann
Daniel J. Robinson
Paul O. Scheibe
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
PROBIX Inc
Original Assignee
PROBIX Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by PROBIX Inc filed Critical PROBIX Inc
Publication of AU2001291316A1 publication Critical patent/AU2001291316A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/22Arrangements for preventing the taking of data from a data transmission channel without authorisation
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2115Third party
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/101Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)
AU2001291316A 2000-09-14 2001-09-13 System for protecting objects distributed over a network Abandoned AU2001291316A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US23259900P 2000-09-14 2000-09-14
US60232599 2000-09-14
PCT/US2001/042147 WO2002023798A1 (fr) 2000-09-14 2001-09-13 Systeme servant a proteger des objets distribues sur un reseau

Publications (1)

Publication Number Publication Date
AU2001291316A1 true AU2001291316A1 (en) 2002-03-26

Family

ID=22873787

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2001291316A Abandoned AU2001291316A1 (en) 2000-09-14 2001-09-13 System for protecting objects distributed over a network

Country Status (6)

Country Link
US (1) US20020032873A1 (fr)
EP (1) EP1323258A1 (fr)
JP (1) JP2004509399A (fr)
KR (1) KR20030036788A (fr)
AU (1) AU2001291316A1 (fr)
WO (1) WO2002023798A1 (fr)

Families Citing this family (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8261059B2 (en) * 2001-10-25 2012-09-04 Verizon Business Global Llc Secure file transfer and secure file transfer protocol
TW567703B (en) * 2002-05-03 2003-12-21 Era Digital Media Company Ltd Authentication and control method of AV multimedia information
US7441264B2 (en) * 2002-06-24 2008-10-21 International Business Machines Corporation Security objects controlling access to resources
WO2004008702A1 (fr) * 2002-07-11 2004-01-22 Ravi Shankar Utilisation d'objets nomades intelligents pour mettre en oeuvre des services et des applications de messagerie multimedia repartis securises
US7076312B2 (en) * 2002-08-02 2006-07-11 Fisher-Rosemount Systems, Inc. Integrated electronic signatures for approval of process control and safety system software objects
US7529372B2 (en) * 2002-09-25 2009-05-05 Intellon Corporation Method for setting an encryption key for logical network separation
US7319757B2 (en) * 2003-01-02 2008-01-15 Intel Corporation Wireless communication device and method for over-the-air application service
US7100047B2 (en) * 2003-01-23 2006-08-29 Verdasys, Inc. Adaptive transparent encryption
US7003117B2 (en) * 2003-02-05 2006-02-21 Voltage Security, Inc. Identity-based encryption system for secure data distribution
US7526347B2 (en) * 2003-02-18 2009-04-28 Fisher-Rosemount Systems, Inc. Security for objects in a process plant configuration system
WO2004109443A2 (fr) * 2003-06-02 2004-12-16 Liquid Machines, Inc. Gestion d'objets de donnees dans des contextes dynamiques, distribues et collaboratifs
US7376834B2 (en) * 2003-07-18 2008-05-20 Palo Alto Research Center Incorporated System and method for securely controlling communications
US20050120352A1 (en) * 2003-11-28 2005-06-02 Sun Microsystems, Inc. Meta directory server providing users the ability to customize work-flows
US7570761B2 (en) * 2004-02-03 2009-08-04 Trimble Navigation Limited Method and system for preventing unauthorized recording of media content in the iTunes™ environment
US20050201555A1 (en) * 2004-02-09 2005-09-15 I-Ling Yen System, method and apparatus for secure computation on encrypted data
US7711721B2 (en) * 2004-09-01 2010-05-04 International Business Machines Corporation Apparatus, system, and method for suspending a request during file server serialization reinitialization
US7627578B2 (en) * 2004-09-01 2009-12-01 International Business Machines Corporation Apparatus, system, and method for file system serialization reinitialization
US7490088B2 (en) * 2004-09-01 2009-02-10 International Business Machines Corporation Apparatus, system, and method for preserving connection/position data integrity during file server serialization reinitialization
JP2006079415A (ja) * 2004-09-10 2006-03-23 Konica Minolta Business Technologies Inc プログラム更新システムおよびプログラム更新方法
WO2007052373A1 (fr) * 2005-11-02 2007-05-10 Matsushita Electric Industrial Co., Ltd. Dispositif de communication d’informations, serveur, et méthode de présentation de contenu
EP2011301B1 (fr) * 2006-04-10 2011-06-22 Trust Integration Services B.V. Système et procédé de transmission de données protégées
US8176319B2 (en) * 2006-06-27 2012-05-08 Emc Corporation Identifying and enforcing strict file confidentiality in the presence of system and storage administrators in a NAS system
US20100098248A1 (en) * 2006-10-31 2010-04-22 Agency For Science Technology And Research Device and method of generating and distributing access permission to digital object
KR100752729B1 (ko) * 2007-05-14 2007-08-28 한한수 독립된 어플리케이션을 이용한 웹페이지 보안 서비스 방법및 시스템
KR20100084037A (ko) * 2009-01-15 2010-07-23 삼성전자주식회사 Ui 제공 장치 및 방법
US9792451B2 (en) * 2011-12-09 2017-10-17 Echarge2 Corporation System and methods for using cipher objects to protect data
US9465800B2 (en) * 2013-10-01 2016-10-11 Trunomi Ltd. Systems and methods for sharing verified identity documents
CN103559118B (zh) * 2013-10-12 2016-02-03 福建亿榕信息技术有限公司 一种基于aop与注解信息系统的安全审计方法
CN105893016A (zh) * 2015-12-11 2016-08-24 乐视网信息技术(北京)股份有限公司 基于mvc架构的日志记录系统及方法
CN108184149B (zh) * 2017-12-29 2021-04-20 北京奇艺世纪科技有限公司 一种视频cdn调度优化方法及装置
US20200242213A1 (en) * 2019-01-28 2020-07-30 Blackberry Limited Method and system for digital rights management
CN110912882A (zh) * 2019-11-19 2020-03-24 北京工业大学 一种基于智能算法的入侵检测方法及系统

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5276735A (en) * 1992-04-17 1994-01-04 Secure Computing Corporation Data enclave and trusted path system
US6473860B1 (en) * 1994-04-07 2002-10-29 Hark C. Chan Information distribution and processing system
US5563946A (en) * 1994-04-25 1996-10-08 International Business Machines Corporation Method and apparatus for enabling trial period use of software products: method and apparatus for passing encrypted files between data processing systems
US5943422A (en) * 1996-08-12 1999-08-24 Intertrust Technologies Corp. Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US5892900A (en) * 1996-08-30 1999-04-06 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
CN100452072C (zh) * 1995-02-13 2009-01-14 英特特拉斯特技术公司 用于管理在第一装置和第二装置之间的数字文档的分布的方法
US6157721A (en) * 1996-08-12 2000-12-05 Intertrust Technologies Corp. Systems and methods using cryptography to protect secure computing environments
NL1000530C2 (nl) * 1995-06-08 1996-12-10 Defil N V Holland Intertrust A Filtreerwerkwijze.
US6192407B1 (en) * 1996-10-24 2001-02-20 Tumbleweed Communications Corp. Private, trackable URLs for directed document delivery
US5920861A (en) * 1997-02-25 1999-07-06 Intertrust Technologies Corp. Techniques for defining using and manipulating rights management data structures
US6041411A (en) * 1997-03-28 2000-03-21 Wyatt; Stuart Alan Method for defining and verifying user access rights to a computer information
US6112181A (en) * 1997-11-06 2000-08-29 Intertrust Technologies Corporation Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information
US6289450B1 (en) * 1999-05-28 2001-09-11 Authentica, Inc. Information security architecture for encrypting documents for remote access while maintaining access control

Also Published As

Publication number Publication date
KR20030036788A (ko) 2003-05-09
WO2002023798A1 (fr) 2002-03-21
JP2004509399A (ja) 2004-03-25
WO2002023798A8 (fr) 2002-07-11
EP1323258A1 (fr) 2003-07-02
US20020032873A1 (en) 2002-03-14

Similar Documents

Publication Publication Date Title
AU2001291316A1 (en) System for protecting objects distributed over a network
AU2001241921A1 (en) A network storage system
AU2001281401A1 (en) Systems and methods for distributed network protection
AU2362601A (en) A telecommunications system
AU2001245723A1 (en) Emboli protection system
AU2002234004A1 (en) Caching system for a network storage system
AU2002232594A1 (en) Item specification object management system
AU2001290848A1 (en) System for establishing an audit trail to protect objects distributed over a network
AU2003225847A1 (en) A network system having a virtual-service-module
AU4693300A (en) Integrating into an application objects that are provided over a network
AU2002226323A1 (en) A communications system
AU3267000A (en) A secure network
AUPQ968100A0 (en) A management system
AU6408601A (en) A distributed processing system
AU2001238388A1 (en) Calibration system for a communications system
AUPQ679000A0 (en) Biocidal protection system
AU2002239658A1 (en) A communication system that provides extra protection when transmitting criticaldata
AU6733300A (en) A learning-assistance system
AU2002218619A1 (en) Protective equipment for a series-capacitor installation
AU2001290861A1 (en) Network management system
AU2001239048A1 (en) Hand protection system
AU2001292226A1 (en) Wide back protection for motorbikers
AUPR157200A0 (en) A copy protection system
AUPQ275499A0 (en) A network navigation system
AUPQ055399A0 (en) A network navigation system