CA2363569A1 - Network vaults - Google Patents

Network vaults Download PDF

Info

Publication number
CA2363569A1
CA2363569A1 CA002363569A CA2363569A CA2363569A1 CA 2363569 A1 CA2363569 A1 CA 2363569A1 CA 002363569 A CA002363569 A CA 002363569A CA 2363569 A CA2363569 A CA 2363569A CA 2363569 A1 CA2363569 A1 CA 2363569A1
Authority
CA
Canada
Prior art keywords
information
network
access
security
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA002363569A
Other languages
French (fr)
Other versions
CA2363569C (en
Inventor
Alon Cohen
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cyberark Software Ltd
Original Assignee
Cyber-Ark Software Ltd.
Alon Cohen
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cyber-Ark Software Ltd., Alon Cohen filed Critical Cyber-Ark Software Ltd.
Publication of CA2363569A1 publication Critical patent/CA2363569A1/en
Application granted granted Critical
Publication of CA2363569C publication Critical patent/CA2363569C/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6272Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database by registering files or documents with a third party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Abstract

A system and method for secure data storage, exchange and/or sharing through a protected central storage facility (12), containing at least one "network vault" (28) to which access is controlled through a single data access channel, for example through a network (20) from a remote location (24). The network vault is similar to a physical safe, in that substantially any type of information can be stored in the network vault, regardless of the format or type of information, and in that the user need only place the information inside the network vault for the information to be secured.
The present invention is operable by the average computer user, such that each individual is able to control access to his or her own data, thus avoiding the requirement of a centralized system administrator.
The high degree of security and simplicity of operation by the user is provided through a number of features, including the single data access channel access to the data. This feature is not available among security systems known in the art, which rely upon filtering mechanisms and operate according to a multiplicity of declarations, such that the provided security is only as complete and robust as the declarations.
CA002363569A 1999-02-22 2000-02-18 Network vaults Expired - Lifetime CA2363569C (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US09/253,780 1999-02-22
US09/253,780 US6356941B1 (en) 1999-02-22 1999-02-22 Network vaults
PCT/US2000/004127 WO2000051010A1 (en) 1999-02-22 2000-02-18 Network vaults

Publications (2)

Publication Number Publication Date
CA2363569A1 true CA2363569A1 (en) 2000-08-31
CA2363569C CA2363569C (en) 2008-08-19

Family

ID=22961672

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002363569A Expired - Lifetime CA2363569C (en) 1999-02-22 2000-02-18 Network vaults

Country Status (5)

Country Link
US (1) US6356941B1 (en)
EP (1) EP1166211B1 (en)
AU (1) AU3235000A (en)
CA (1) CA2363569C (en)
WO (1) WO2000051010A1 (en)

Families Citing this family (168)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6853988B1 (en) 1999-09-20 2005-02-08 Security First Corporation Cryptographic server with provisions for interoperability between cryptographic systems
US7391865B2 (en) 1999-09-20 2008-06-24 Security First Corporation Secure data parser method and system
AU7596200A (en) 1999-09-20 2001-04-24 Ethentica, Inc. Electronic commerce with cryptographic authentication
US7260724B1 (en) 1999-09-20 2007-08-21 Security First Corporation Context sensitive dynamic authentication in a cryptographic system
US7080037B2 (en) 1999-09-28 2006-07-18 Chameleon Network Inc. Portable electronic authorization system and method
US7340439B2 (en) 1999-09-28 2008-03-04 Chameleon Network Inc. Portable electronic authorization system and method
AU7621300A (en) 1999-09-28 2001-04-30 Chameleon Network Inc. Portable electronic authorization system and associated method
US6954753B1 (en) * 1999-10-20 2005-10-11 Hewlett-Packard Development Company, L.P. Transparent electronic safety deposit box
US6714968B1 (en) * 2000-02-09 2004-03-30 Mitch Prust Method and system for seamless access to a remote storage server utilizing multiple access interfaces executing on the remote server
US6735623B1 (en) * 2000-02-09 2004-05-11 Mitch Prust Method and system for accessing a remote storage area
KR100847596B1 (en) * 2000-03-02 2008-07-21 소니 가부시끼 가이샤 Communication network system, gateway, data communication method and program providing medium
JP2001282730A (en) * 2000-03-30 2001-10-12 Sony Corp Information processor, server connecting method, program storage medium, and network connection system
US6934848B1 (en) * 2000-07-19 2005-08-23 International Business Machines Corporation Technique for handling subsequent user identification and password requests within a certificate-based host session
US6976164B1 (en) * 2000-07-19 2005-12-13 International Business Machines Corporation Technique for handling subsequent user identification and password requests with identity change within a certificate-based host session
US6748295B2 (en) * 2000-07-26 2004-06-08 Northrop Grumman Corporation Item delivery and retrieval system
US6804784B1 (en) * 2000-09-29 2004-10-12 Infraworks Corporation Back-channeling in a memory vault system
US7114080B2 (en) * 2000-12-14 2006-09-26 Matsushita Electric Industrial Co., Ltd. Architecture for secure remote access and transmission using a generalized password scheme with biometric features
DE60239803D1 (en) 2001-06-06 2011-06-01 Akamai Tech Inc TARGET DELIVERY OF CONTENTS WITH MEDIA ADVERTISING TO SELECTED NETWORK SERVICE PROVIDERS IN AN CONTENT NETWORK
US7904454B2 (en) 2001-07-16 2011-03-08 International Business Machines Corporation Database access security
US20030065792A1 (en) * 2001-09-28 2003-04-03 Clark Gregory Scott Securing information in a design collaboration and trading partner environment
US7631184B2 (en) * 2002-05-14 2009-12-08 Nicholas Ryan System and method for imposing security on copies of secured items
US7260555B2 (en) * 2001-12-12 2007-08-21 Guardian Data Storage, Llc Method and architecture for providing pervasive security to digital assets
US7783765B2 (en) 2001-12-12 2010-08-24 Hildebrand Hal S System and method for providing distributed access control to secured documents
US7681034B1 (en) 2001-12-12 2010-03-16 Chang-Ping Lee Method and apparatus for securing electronic data
US10033700B2 (en) 2001-12-12 2018-07-24 Intellectual Ventures I Llc Dynamic evaluation of access rights
US7565683B1 (en) 2001-12-12 2009-07-21 Weiqing Huang Method and system for implementing changes to security policies in a distributed security system
US7921450B1 (en) 2001-12-12 2011-04-05 Klimenty Vainstein Security system using indirect key generation from access rules and methods therefor
US8006280B1 (en) 2001-12-12 2011-08-23 Hildebrand Hal S Security system for generating keys from access rules in a decentralized manner and methods therefor
US7921284B1 (en) 2001-12-12 2011-04-05 Gary Mark Kinghorn Method and system for protecting electronic data in enterprise environment
US7478418B2 (en) * 2001-12-12 2009-01-13 Guardian Data Storage, Llc Guaranteed delivery of changes to security policies in a distributed system
US8065713B1 (en) 2001-12-12 2011-11-22 Klimenty Vainstein System and method for providing multi-location access management to secured items
USRE41546E1 (en) 2001-12-12 2010-08-17 Klimenty Vainstein Method and system for managing security tiers
US10360545B2 (en) 2001-12-12 2019-07-23 Guardian Data Storage, Llc Method and apparatus for accessing secured electronic data off-line
US7178033B1 (en) 2001-12-12 2007-02-13 Pss Systems, Inc. Method and apparatus for securing digital assets
US7921288B1 (en) 2001-12-12 2011-04-05 Hildebrand Hal S System and method for providing different levels of key security for controlling access to secured items
US7380120B1 (en) 2001-12-12 2008-05-27 Guardian Data Storage, Llc Secured data format for access control
US7930756B1 (en) 2001-12-12 2011-04-19 Crocker Steven Toye Multi-level cryptographic transformations for securing digital assets
US7950066B1 (en) 2001-12-21 2011-05-24 Guardian Data Storage, Llc Method and system for restricting use of a clipboard application
AU2003205083A1 (en) 2002-01-11 2003-07-30 Akamai Tech Inc Java application framework for use in a content delivery network (cdn)
US7257630B2 (en) * 2002-01-15 2007-08-14 Mcafee, Inc. System and method for network vulnerability detection and reporting
US7543056B2 (en) 2002-01-15 2009-06-02 Mcafee, Inc. System and method for network vulnerability detection and reporting
US8176334B2 (en) 2002-09-30 2012-05-08 Guardian Data Storage, Llc Document security system that permits external users to gain access to secured files
AU2003227314A1 (en) * 2002-04-03 2003-10-13 Invisicom, Inc. Protection of data by hiding the data
US8613102B2 (en) 2004-03-30 2013-12-17 Intellectual Ventures I Llc Method and system for providing document retention using cryptography
US7748045B2 (en) * 2004-03-30 2010-06-29 Michael Frederick Kenrich Method and system for providing cryptographic document retention with off-line access
US7774611B2 (en) * 2002-05-06 2010-08-10 Hewlett-Packard Development Company, L.P. Enforcing file authorization access
US8335915B2 (en) * 2002-05-14 2012-12-18 Netapp, Inc. Encryption based security system for network storage
US20040044724A1 (en) * 2002-08-27 2004-03-04 Bell Cynthia S. Apparatus and methods to exchange menu information among processor-based devices
US7426532B2 (en) 2002-08-27 2008-09-16 Intel Corporation Network of disparate processor-based devices to exchange and display media files
US7376696B2 (en) 2002-08-27 2008-05-20 Intel Corporation User interface to facilitate exchanging files among processor-based devices
US7512810B1 (en) * 2002-09-11 2009-03-31 Guardian Data Storage Llc Method and system for protecting encrypted files transmitted over a network
US7836310B1 (en) 2002-11-01 2010-11-16 Yevgeniy Gutnik Security system that uses indirect password-based encryption
US7123974B1 (en) * 2002-11-19 2006-10-17 Rockwell Software Inc. System and methodology providing audit recording and tracking in real time industrial controller environment
US7890990B1 (en) 2002-12-20 2011-02-15 Klimenty Vainstein Security system with staging capabilities
US20040143733A1 (en) * 2003-01-16 2004-07-22 Cloverleaf Communication Co. Secure network data storage mediator
US8091117B2 (en) 2003-02-14 2012-01-03 Preventsys, Inc. System and method for interfacing with heterogeneous network data gathering tools
US7281138B1 (en) * 2003-04-03 2007-10-09 Cisco Technology, Inc. Method and apparatus for controlling access to debugging software
US8707034B1 (en) 2003-05-30 2014-04-22 Intellectual Ventures I Llc Method and system for using remote headers to secure electronic files
US8606880B2 (en) * 2003-12-04 2013-12-10 Sheng (Ted) Tai Tsao Use of wireless devices' external storage
US7703140B2 (en) * 2003-09-30 2010-04-20 Guardian Data Storage, Llc Method and system for securing digital assets using process-driven security policies
US8127366B2 (en) 2003-09-30 2012-02-28 Guardian Data Storage, Llc Method and apparatus for transitioning between states of security policies used to secure electronic documents
WO2005050369A2 (en) 2003-11-12 2005-06-02 The Trustees Of Columbia University In The City Ofnew York Apparatus method and medium for detecting payload anomaly using n-gram distribution of normal data
US7373451B2 (en) * 2003-12-08 2008-05-13 The Board Of Trustees Of The Leland Stanford Junior University Cache-based system management architecture with virtual appliances, network repositories, and virtual appliance transceivers
US20050129246A1 (en) * 2003-12-16 2005-06-16 Glenn Gearhart Intelligent digital secure LockBox and access key distribution system (DLB)
US7702909B2 (en) * 2003-12-22 2010-04-20 Klimenty Vainstein Method and system for validating timestamps
CA2559894A1 (en) * 2004-03-29 2005-10-06 Cyber-Ark Software Ltd. Improved server, computerized network including same, and method for increasing a level of efficiency of a network
US7444197B2 (en) 2004-05-06 2008-10-28 Smp Logic Systems Llc Methods, systems, and software program for validation and monitoring of pharmaceutical manufacturing processes
US7799273B2 (en) * 2004-05-06 2010-09-21 Smp Logic Systems Llc Manufacturing execution system for validation, quality and risk assessment and monitoring of pharmaceutical manufacturing processes
US7707427B1 (en) 2004-07-19 2010-04-27 Michael Frederick Kenrich Multi-level file digests
US20060059551A1 (en) * 2004-09-13 2006-03-16 Utstarcom Inc. Dynamic firewall capabilities for wireless access gateways
BRPI0517026A (en) 2004-10-25 2008-09-30 Rick L Orsini secure data analyzer method and system
US8321686B2 (en) * 2005-02-07 2012-11-27 Sandisk Technologies Inc. Secure memory card with life cycle phases
US8423788B2 (en) * 2005-02-07 2013-04-16 Sandisk Technologies Inc. Secure memory card with life cycle phases
US8108691B2 (en) * 2005-02-07 2012-01-31 Sandisk Technologies Inc. Methods used in a secure memory card with life cycle phases
US7761702B2 (en) * 2005-04-15 2010-07-20 Cisco Technology, Inc. Method and apparatus for distributing group data in a tunneled encrypted virtual private network
US7849165B2 (en) 2005-04-21 2010-12-07 Fiducci Thomas E Data backup, storage, transfer, and retrieval system, method and computer program product
US8126990B2 (en) 2005-04-21 2012-02-28 Fiducci Thomas E Data backup and transfer system, method and computer program product
US7748031B2 (en) * 2005-07-08 2010-06-29 Sandisk Corporation Mass storage device with automated credentials loading
US20070067403A1 (en) * 2005-07-20 2007-03-22 Grant Holmes Data Delivery System
JP4471898B2 (en) * 2005-07-22 2010-06-02 シャープ株式会社 Portable information terminal device
US7970788B2 (en) * 2005-08-02 2011-06-28 International Business Machines Corporation Selective local database access restriction
US8898452B2 (en) * 2005-09-08 2014-11-25 Netapp, Inc. Protocol translation
US8966284B2 (en) * 2005-09-14 2015-02-24 Sandisk Technologies Inc. Hardware driver integrity check of memory card controller firmware
US20070061597A1 (en) * 2005-09-14 2007-03-15 Micky Holtzman Secure yet flexible system architecture for secure devices with flash mass storage memory
WO2007053708A2 (en) 2005-10-31 2007-05-10 The Trustees Of Columbia University In The City Of New York Methods, media, and systems for securing communications between a first node and a second node
US7933923B2 (en) 2005-11-04 2011-04-26 International Business Machines Corporation Tracking and reconciling database commands
EP1952575B1 (en) 2005-11-18 2017-12-27 Security First Corp. Secure data parser method and system
US7461222B2 (en) * 2006-02-14 2008-12-02 Hitachi, Ltd. Method for mirroring data between clustered NAS systems
US20070282670A1 (en) * 2006-05-19 2007-12-06 Rolf Repasi Providing a rating for a software product based on weighted user feedback
US8171307B1 (en) 2006-05-26 2012-05-01 Netapp, Inc. Background encryption of disks in a large cluster
US8181011B1 (en) 2006-08-23 2012-05-15 Netapp, Inc. iSCSI name forwarding technique
US8397083B1 (en) 2006-08-23 2013-03-12 Netapp, Inc. System and method for efficiently deleting a file from secure storage served by a storage system
US20080052524A1 (en) * 2006-08-24 2008-02-28 Yoram Cedar Reader for one time password generating device
US20080072058A1 (en) * 2006-08-24 2008-03-20 Yoram Cedar Methods in a reader for one time password generating device
US7971234B1 (en) 2006-09-15 2011-06-28 Netapp, Inc. Method and apparatus for offline cryptographic key establishment
US7995759B1 (en) 2006-09-28 2011-08-09 Netapp, Inc. System and method for parallel compression of a single data stream
US8042155B1 (en) 2006-09-29 2011-10-18 Netapp, Inc. System and method for generating a single use password based on a challenge/response protocol
US8245050B1 (en) 2006-09-29 2012-08-14 Netapp, Inc. System and method for initial key establishment using a split knowledge protocol
US8190905B1 (en) 2006-09-29 2012-05-29 Netapp, Inc. Authorizing administrative operations using a split knowledge protocol
JP4323504B2 (en) * 2006-10-03 2009-09-02 シャープ株式会社 Equipment with authentication function and security system
EP2100404B1 (en) 2006-11-07 2016-01-27 Security First Corp. Systems and methods for distributing and securing data
US7853019B1 (en) 2006-11-30 2010-12-14 Netapp, Inc. Tape failover across a cluster
CA2670597A1 (en) * 2006-12-05 2008-06-12 Don Martin Improved tape backup method using a secure data parser
WO2008074482A2 (en) * 2006-12-19 2008-06-26 Koninklijke Kpn N.V. Data network service based on profiling ip-addresses
US8141100B2 (en) 2006-12-20 2012-03-20 International Business Machines Corporation Identifying attribute propagation for multi-tier processing
US8423794B2 (en) * 2006-12-28 2013-04-16 Sandisk Technologies Inc. Method and apparatus for upgrading a memory card that has security mechanisms for preventing copying of secure content and applications
US8495367B2 (en) 2007-02-22 2013-07-23 International Business Machines Corporation Nondestructive interception of secure data in transit
CN101271426A (en) * 2007-03-20 2008-09-24 联想(北京)有限公司 Memory device and method for protecting its protection partition
US8607046B1 (en) 2007-04-23 2013-12-10 Netapp, Inc. System and method for signing a message to provide one-time approval to a plurality of parties
US8611542B1 (en) 2007-04-26 2013-12-17 Netapp, Inc. Peer to peer key synchronization
US8824686B1 (en) 2007-04-27 2014-09-02 Netapp, Inc. Cluster key synchronization
US8056120B2 (en) * 2007-06-11 2011-11-08 Ricoh Company, Limited Authentication apparatus, authentication method, and computer program product
US8037524B1 (en) 2007-06-19 2011-10-11 Netapp, Inc. System and method for differentiated cross-licensing for services across heterogeneous systems using transient keys
US7707248B2 (en) 2007-06-25 2010-04-27 Microsoft Corporation Credit-based peer-to-peer storage
US7945639B2 (en) * 2007-06-27 2011-05-17 Microsoft Corporation Processing write requests with server having global knowledge
US8196182B2 (en) 2007-08-24 2012-06-05 Netapp, Inc. Distributed management of crypto module white lists
US9774445B1 (en) 2007-09-04 2017-09-26 Netapp, Inc. Host based rekeying
BRPI0816772A2 (en) 2007-09-14 2015-03-24 Security First Corp Systems and methods for controlling cryptographic keys
US7983423B1 (en) 2007-10-29 2011-07-19 Netapp, Inc. Re-keying based on pre-generated keys
JP2009134601A (en) * 2007-11-30 2009-06-18 Fujitsu Ltd Disk access method switching device
CA2710868A1 (en) * 2008-01-07 2009-07-16 Security First Corp. Systems and methods for securing data using multi-factor or keyed dispersal
ES2449790T3 (en) 2008-02-22 2014-03-21 Security First Corp. Systems and methods for secure management and communication in a work group
US8959199B2 (en) * 2008-03-18 2015-02-17 Reduxio Systems Ltd. Network storage system for a download intensive environment
US8261326B2 (en) 2008-04-25 2012-09-04 International Business Machines Corporation Network intrusion blocking security overlay
US20100057621A1 (en) * 2008-06-30 2010-03-04 Faith Patrick L Payment processing system secure healthcare data trafficking
US8448230B2 (en) * 2008-08-22 2013-05-21 International Business Machines Corporation System and method for real world biometric analytics through the use of a multimodal biometric analytic wallet
US20100088520A1 (en) * 2008-10-02 2010-04-08 Microsoft Corporation Protocol for determining availability of peers in a peer-to-peer storage system
CA2760251A1 (en) 2009-05-19 2010-11-25 Security First Corp. Systems and methods for securing data in the cloud
US8407789B1 (en) * 2009-11-16 2013-03-26 Symantec Corporation Method and system for dynamically optimizing multiple filter/stage security systems
WO2011068738A2 (en) 2009-11-25 2011-06-09 Orsini Rick L Systems and methods for securing data in motion
US8925039B2 (en) * 2009-12-14 2014-12-30 At&T Intellectual Property I, L.P. System and method of selectively applying security measures to data services
US9443097B2 (en) 2010-03-31 2016-09-13 Security First Corp. Systems and methods for securing data in motion
CN103238305A (en) 2010-05-28 2013-08-07 安全第一公司 Accelerator system for use with secure data storage
GB2481807B (en) 2010-07-06 2015-03-25 Hewlett Packard Development Co Protecting file entities in a networked system
CA2882602A1 (en) 2010-09-20 2012-03-29 Rick L. Orsini Systems and methods for secure data sharing
US8447983B1 (en) 2011-02-01 2013-05-21 Target Brands, Inc. Token exchange
US9773099B2 (en) * 2012-04-06 2017-09-26 Wayne Odom System, method, and device for delivering communications and storing and delivering data
US20170017671A1 (en) * 2012-04-25 2017-01-19 International Business Machines Corporation Deleting data in a dispersed storage network
US9590959B2 (en) 2013-02-12 2017-03-07 Amazon Technologies, Inc. Data security service
US10075471B2 (en) 2012-06-07 2018-09-11 Amazon Technologies, Inc. Data loss prevention techniques
US9286491B2 (en) 2012-06-07 2016-03-15 Amazon Technologies, Inc. Virtual service provider zones
US10084818B1 (en) 2012-06-07 2018-09-25 Amazon Technologies, Inc. Flexibly configurable data modification services
US9756022B2 (en) * 2014-08-29 2017-09-05 Box, Inc. Enhanced remote key management for an enterprise in a cloud-based environment
CA2833108A1 (en) 2012-10-24 2014-04-24 Andrey Dulkin A system and method for secure proxy-based authentication
US10467422B1 (en) 2013-02-12 2019-11-05 Amazon Technologies, Inc. Automatic key rotation
US9547771B2 (en) 2013-02-12 2017-01-17 Amazon Technologies, Inc. Policy enforcement with associated data
US9705674B2 (en) 2013-02-12 2017-07-11 Amazon Technologies, Inc. Federated key management
US9367697B1 (en) 2013-02-12 2016-06-14 Amazon Technologies, Inc. Data security with a security module
US9608813B1 (en) 2013-06-13 2017-03-28 Amazon Technologies, Inc. Key rotation techniques
US9300464B1 (en) 2013-02-12 2016-03-29 Amazon Technologies, Inc. Probabilistic key rotation
US10210341B2 (en) 2013-02-12 2019-02-19 Amazon Technologies, Inc. Delayed data access
US10211977B1 (en) 2013-02-12 2019-02-19 Amazon Technologies, Inc. Secure management of information using a security module
CA2900504A1 (en) 2013-02-13 2014-08-21 Security First Corp. Systems and methods for a cryptographic file system layer
US10511553B2 (en) 2013-12-30 2019-12-17 International Business Machines Corporation Pass through sharing of resources
WO2015137975A1 (en) * 2014-03-14 2015-09-17 Hewlett Packard Development Company, L.P. Resource restriction
US10192066B2 (en) 2014-03-14 2019-01-29 Hewlett Packard Enterprise Development Lp Semantic restriction
US9397835B1 (en) 2014-05-21 2016-07-19 Amazon Technologies, Inc. Web of trust management in a distributed system
US9438421B1 (en) 2014-06-27 2016-09-06 Amazon Technologies, Inc. Supporting a fixed transaction rate with a variably-backed logical cryptographic key
US9866392B1 (en) 2014-09-15 2018-01-09 Amazon Technologies, Inc. Distributed system web of trust provisioning
US9733849B2 (en) 2014-11-21 2017-08-15 Security First Corp. Gateway for cloud-based secure storage
US10148755B2 (en) * 2015-08-27 2018-12-04 Dell Products L.P. System and method to redirect USB mass storage devices in high latency VDI environments
CN109947829A (en) * 2017-07-27 2019-06-28 飞狐信息技术(天津)有限公司 A kind of acquisition methods of data, device, system and data-acquisition system
US10326771B2 (en) * 2017-10-19 2019-06-18 Sherpas Cyber Security Group, Inc. Secure file transaction system
US11392711B2 (en) 2019-03-21 2022-07-19 Microsoft Technology Licensing, Llc Authentication state-based permission model for a file storage system
US11500571B2 (en) 2019-07-29 2022-11-15 Toyota Motor North America, Inc. Tracking of transport data
US11217041B2 (en) 2019-07-29 2022-01-04 Toyota Motor North America, Inc. Tracking of transport data
US11699308B2 (en) 2019-07-29 2023-07-11 Toyota Motor North America, Inc. Tracking of transport data
US11924354B2 (en) * 2021-03-19 2024-03-05 Jpmorgan Chase Bank, N.A. Data center recovery pod systems and methods

Family Cites Families (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4326098A (en) * 1980-07-02 1982-04-20 International Business Machines Corporation High security system for electronic signature verification
US5007083A (en) * 1981-03-17 1991-04-09 Constant James N Secure computer
US5191611A (en) * 1989-04-03 1993-03-02 Lang Gerald S Method and apparatus for protecting material on storage media and for transferring material on storage media to various recipients
US5550976A (en) * 1992-12-08 1996-08-27 Sun Hydraulics Corporation Decentralized distributed asynchronous object oriented system and method for electronic data management, storage, and communication
US5530758A (en) * 1994-06-03 1996-06-25 Motorola, Inc. Operational methods for a secure node in a computer network
US5719938A (en) * 1994-08-01 1998-02-17 Lucent Technologies Inc. Methods for providing secure access to shared information
US5864683A (en) * 1994-10-12 1999-01-26 Secure Computing Corporartion System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights
US5752031A (en) * 1995-04-24 1998-05-12 Microsoft Corporation Queue object for controlling concurrency in a computer system
US5892917A (en) * 1995-09-27 1999-04-06 Microsoft Corporation System for log record and log expansion with inserted log records representing object request for specified object corresponding to cached object copies
US5826014A (en) * 1996-02-06 1998-10-20 Network Engineering Software Firewall system for protecting network elements connected to a public network
US5862346A (en) * 1996-06-28 1999-01-19 Metadigm Distributed group activity data network system and corresponding method
US5969632A (en) * 1996-11-22 1999-10-19 Diamant; Erez Information security method and apparatus
US5913041A (en) * 1996-12-09 1999-06-15 Hewlett-Packard Company System for determining data transfer rates in accordance with log information relates to history of data transfer activities that independently stored in content servers
US5889958A (en) * 1996-12-20 1999-03-30 Livingston Enterprises, Inc. Network access control system and process
US6009475A (en) * 1996-12-23 1999-12-28 International Business Machines Corporation Filter rule validation and administration for firewalls
US5875296A (en) * 1997-01-28 1999-02-23 International Business Machines Corporation Distributed file system web server user authentication with cookies
US6182222B1 (en) * 1997-03-25 2001-01-30 Electronic Data Systems Corporation Secure data storage system and method
US5911045A (en) * 1997-04-24 1999-06-08 International Business Machines Corp. Method and system for sharing information in a virtual reality world
US6105131A (en) * 1997-06-13 2000-08-15 International Business Machines Corporation Secure server and method of operation for a distributed information system
US5894552A (en) * 1997-08-15 1999-04-13 The United States Of America As Represented By The Secretary Of The Navy Method and apparatus for manually switching to a secured network
US6026463A (en) * 1997-09-10 2000-02-15 Micron Electronics, Inc. Method for improving data transfer rates for user data stored on a disk storage device
US6052785A (en) * 1997-11-21 2000-04-18 International Business Machines Corporation Multiple remote data access security mechanism for multitiered internet computer networks
US6098056A (en) * 1997-11-24 2000-08-01 International Business Machines Corporation System and method for controlling access rights to and security of digital content in a distributed information system, e.g., Internet
US6018745A (en) * 1997-12-23 2000-01-25 Ericsson Inc. Coupled file access
US6105042A (en) * 1998-02-13 2000-08-15 Cylex Systems, Inc. Multi-user information management system adapted for efficient, remote, on-demand document management, storage and retrieval
US6163859A (en) * 1998-12-02 2000-12-19 Support.Com, Inc. Software vault

Also Published As

Publication number Publication date
EP1166211A4 (en) 2010-01-06
EP1166211B1 (en) 2016-11-23
AU3235000A (en) 2000-09-14
WO2000051010A1 (en) 2000-08-31
US6356941B1 (en) 2002-03-12
EP1166211A1 (en) 2002-01-02
CA2363569C (en) 2008-08-19

Similar Documents

Publication Publication Date Title
CA2363569A1 (en) Network vaults
AU678937B2 (en) Cryptographic data security in a secured computer system
CA2287871A1 (en) Secure document management system
WO1997035440A3 (en) Private notification system for communicating 9-1-1 information
CA2170582A1 (en) Control System for Automated Security and Control Systems
AU5280400A (en) Information security architecture for encrypting documents for remote access while maintaining access control
WO2003005245A3 (en) Systems and methods of information backup
AU2001286374A1 (en) Computer security event management system
AU1719501A (en) Secure delivery or collection system
EP0633676A3 (en) Code division multiple access communication system.
WO1998058473A3 (en) Network security and integration method and system
EP1521421A3 (en) Layered security methods and apparatus in a gaming system environment
WO2001076136A1 (en) Content data storage
CA2302273A1 (en) Technique for secure network transactions
EP0647924A3 (en) Encryption key control system for mail processing system having data center verification.
HK1063115A1 (en) Memory access control system and management method using access control ticket
RU94022746A (en) METHOD OF SECURING TWO-POINT COMMUNICATIONS IN SYSTEMS INTENDED FOR HIDDEN COMMUNICATIONS
AU2905201A (en) Encryption key management system using multiple smart cards
EP0643503A3 (en) Synchronous time division multiple access interrogate-respond data communication network.
WO1999043120A8 (en) Information access control system and method
WO2006127122A3 (en) Apparatus using a time division multiple access bus for providing multiple levels of security in a communications system
CA2267868A1 (en) Remote data network access in a communication network utilizing overhead channels
EP0626649A3 (en) Shared data storage dispersal system and method, based on related data storage space reservation.
WO2001077874A3 (en) System for receiving, storing and updating data over a network upon request
CA2360120A1 (en) Door access control and key management system and the method thereof

Legal Events

Date Code Title Description
EEER Examination request
MKEX Expiry

Effective date: 20200218