ATE513406T1 - Transparente bewusste datenumwandlung auf dateisystemebene - Google Patents

Transparente bewusste datenumwandlung auf dateisystemebene

Info

Publication number
ATE513406T1
ATE513406T1 AT08775282T AT08775282T ATE513406T1 AT E513406 T1 ATE513406 T1 AT E513406T1 AT 08775282 T AT08775282 T AT 08775282T AT 08775282 T AT08775282 T AT 08775282T AT E513406 T1 ATE513406 T1 AT E513406T1
Authority
AT
Austria
Prior art keywords
file system
file
local network
network file
integrity
Prior art date
Application number
AT08775282T
Other languages
English (en)
Inventor
Steven French
Michael Halcrow
Prasad Potluri
Original Assignee
Ibm
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ibm filed Critical Ibm
Application granted granted Critical
Publication of ATE513406T1 publication Critical patent/ATE513406T1/de

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/168Implementing security features at a particular protocol layer above the transport layer

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)
AT08775282T 2007-07-27 2008-07-22 Transparente bewusste datenumwandlung auf dateisystemebene ATE513406T1 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11/829,132 US7877602B2 (en) 2007-07-27 2007-07-27 Transparent aware data transformation at file system level for efficient encryption and integrity validation of network files
PCT/EP2008/059610 WO2009016070A1 (en) 2007-07-27 2008-07-22 Transparent aware data transformation at file system level

Publications (1)

Publication Number Publication Date
ATE513406T1 true ATE513406T1 (de) 2011-07-15

Family

ID=40091306

Family Applications (1)

Application Number Title Priority Date Filing Date
AT08775282T ATE513406T1 (de) 2007-07-27 2008-07-22 Transparente bewusste datenumwandlung auf dateisystemebene

Country Status (7)

Country Link
US (1) US7877602B2 (de)
EP (1) EP2174465B1 (de)
JP (1) JP4929398B2 (de)
KR (1) KR101221310B1 (de)
CN (1) CN101803327B (de)
AT (1) ATE513406T1 (de)
WO (1) WO2009016070A1 (de)

Families Citing this family (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8775823B2 (en) 2006-12-29 2014-07-08 Commvault Systems, Inc. System and method for encrypting secondary copies of data
KR20100063052A (ko) * 2007-08-02 2010-06-10 아이에스에스 이뮨 시스템 스티뮬레이션 에이비 염증성 장 질환의 진단, 단계 구분 및 모니터링 방법
US8019795B2 (en) * 2007-12-05 2011-09-13 Microsoft Corporation Data warehouse test automation framework
JP2010186352A (ja) * 2009-02-12 2010-08-26 Brother Ind Ltd 情報処理装置及び情報処理用プログラム
US8626876B1 (en) 2012-11-28 2014-01-07 Limelight Networks, Inc. Intermediate content processing for content delivery networks
US20150052347A9 (en) * 2009-12-14 2015-02-19 Michael T. Kain File-based application programming interface providing selectable security features
US8478996B2 (en) * 2009-12-21 2013-07-02 International Business Machines Corporation Secure Kerberized access of encrypted file system
US8751789B2 (en) * 2010-09-17 2014-06-10 International Business Machines Corporation General purpose distributed encrypted file system
US8788816B1 (en) * 2011-02-02 2014-07-22 EJS Technologies, LLC Systems and methods for controlling distribution, copying, and viewing of remote data
US8346742B1 (en) * 2011-03-30 2013-01-01 Ari Juels Remote verification of file protections for cloud data storage
CN103650410A (zh) * 2011-05-31 2014-03-19 三星Sds株式会社 基于id的加密及签名方法以及终端
US8819361B2 (en) * 2011-09-12 2014-08-26 Microsoft Corporation Retaining verifiability of extracted data from signed archives
WO2014046974A2 (en) 2012-09-20 2014-03-27 Case Paul Sr Case secure computer architecture
CN103076988A (zh) * 2012-12-28 2013-05-01 银联商务有限公司 一种密码输入方法及装置
US9483655B2 (en) 2013-03-12 2016-11-01 Commvault Systems, Inc. File backup with selective encryption
EP3007061B1 (de) 2013-05-27 2019-08-28 Fujitsu Limited Anwendungsausführungsprogramm, anwendungsausführungsverfahren und informationsverarbeitungsendgerätevorrichtung zur ausführung der anwendung
CA2921090C (en) * 2013-08-12 2021-04-27 Graphite Software Corporation Operating system integrated domain management
US10230717B2 (en) 2013-11-21 2019-03-12 Cis Maxwell, Llc Managed domains for remote content and configuration control on mobile information devices
US9405928B2 (en) 2014-09-17 2016-08-02 Commvault Systems, Inc. Deriving encryption rules based on file content
US10049228B2 (en) * 2015-01-20 2018-08-14 Microsoft Technology Licensing, Llc File encryption support for FAT file systems
US9575687B2 (en) * 2015-01-29 2017-02-21 Vmware, Inc. Host-based replication with end-to-end compression
US10200499B1 (en) 2015-01-30 2019-02-05 Symantec Corporation Systems and methods for reducing network traffic by using delta transfers
US9735965B1 (en) * 2015-04-16 2017-08-15 Symantec Corporation Systems and methods for protecting notification messages
CN106528571A (zh) * 2015-09-14 2017-03-22 北京中质信维科技有限公司 一种用于移动终端的文件管理方法及系统
US10187485B1 (en) 2015-09-28 2019-01-22 Symantec Corporation Systems and methods for sending push notifications that include preferred data center routing information
US10454679B2 (en) * 2016-06-10 2019-10-22 Apple Inc. File system support for rolling keys on file extents
US10367639B2 (en) * 2016-12-29 2019-07-30 Intel Corporation Graphics processor with encrypted kernels
CN108173868A (zh) * 2018-01-05 2018-06-15 中国地质大学(武汉) 一种一对多文件分发的方法、设备及存储设备
CN108509613A (zh) * 2018-04-03 2018-09-07 重庆大学 一种利用nvm提升加密文件系统性能的方法
US11290258B2 (en) 2019-02-22 2022-03-29 Panasonic Avionics Corporation Hybrid cryptographic system and method for encrypting data for common fleet of vehicles
US12120101B2 (en) * 2022-06-29 2024-10-15 Truist Bank Inflight network data encryption

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6868495B1 (en) * 1996-09-12 2005-03-15 Open Security Solutions, Llc One-time pad Encryption key Distribution
KR19980072826A (ko) * 1997-03-08 1998-11-05 김광호 휴대용 컴퓨터
US7580919B1 (en) * 1997-03-10 2009-08-25 Sonicwall, Inc. Query interface to policy server
US6523022B1 (en) * 1997-06-09 2003-02-18 Allen Hobbs Method and apparatus for selectively augmenting retrieved information from a network resource
US6249866B1 (en) * 1997-09-16 2001-06-19 Microsoft Corporation Encrypting file system and method
US6182216B1 (en) * 1997-09-17 2001-01-30 Frank C. Luyster Block cipher method
US6226742B1 (en) * 1998-04-20 2001-05-01 Microsoft Corporation Cryptographic technique that provides fast encryption and decryption and assures integrity of a ciphertext message through use of a message authentication code formed through cipher block chaining of the plaintext message
US6128737A (en) * 1998-04-20 2000-10-03 Microsoft Corporation Method and apparatus for producing a message authentication code in a cipher block chaining operation by using linear combinations of an encryption key
JP2004509392A (ja) * 2000-09-08 2004-03-25 インターナショナル・ビジネス・マシーンズ・コーポレーション ソフトウェアのセキュア認証済チャネル
JP2002290900A (ja) * 2001-03-23 2002-10-04 Hitachi Ltd 情報安全化装置及び情報保証システム
JP3978046B2 (ja) * 2002-02-25 2007-09-19 日本電信電話株式会社 ファイルアクセス制御方法、プログラム及び記憶媒体
US7899189B2 (en) * 2004-12-09 2011-03-01 International Business Machines Corporation Apparatus, system, and method for transparent end-to-end security of storage data in a client-server environment
US7434253B2 (en) * 2005-07-14 2008-10-07 Microsoft Corporation User mapping information extension for protocols
JP2007188445A (ja) * 2006-01-16 2007-07-26 Nec Corp 情報漏えい防止システム及び情報漏えい防止方法

Also Published As

Publication number Publication date
WO2009016070A1 (en) 2009-02-05
KR20100039359A (ko) 2010-04-15
JP2010534875A (ja) 2010-11-11
CN101803327B (zh) 2013-04-24
KR101221310B1 (ko) 2013-01-11
EP2174465A1 (de) 2010-04-14
JP4929398B2 (ja) 2012-05-09
EP2174465B1 (de) 2011-06-15
CN101803327A (zh) 2010-08-11
US7877602B2 (en) 2011-01-25
US20090031128A1 (en) 2009-01-29

Similar Documents

Publication Publication Date Title
ATE513406T1 (de) Transparente bewusste datenumwandlung auf dateisystemebene
BR112014004858A2 (pt) método para um backup seguro e recuperação de dados de configuração de um dispositivo de usuário em uma extremidade, e dispositivo utilizando o método
SE0702106L (sv) Förfarande och system för säkerhetskopiering och återställning av dator- och användarinformation
MX2011012671A (es) Administrador de integridad confiable.
WO2012040231A3 (en) Systems and methods for secure data sharing
BR112016021120A2 (pt) Método e dispositivo de gerenciamento de dados confidenciais; método e sistema de autenticação segura
BR112013001728A2 (pt) métodos para criptografar um valor introduzido em um dispositivo de usuário, para verificar um valor comunicado a um sistema de autenticação via uma rede de comunicações, e para comunicar um valor introduzido em um dispositivo de usuário a um sistema de autenticação via uma rede de comunicações, dispositivo de usuário, sistema, software, e, meio legível por computador.
WO2013002833A3 (en) Binding of cryptographic content using unique device characteristics with server heuristics
WO2011127440A3 (en) Systems and methods for file access auditing
DE602006004457D1 (de) Signatur für zugangs-token
BRPI0711042A8 (pt) Sistema, método para possibilitar um emissor de direitos criar dados de autenticação relacionados à um objeto e/ou criptografar o objeto usando uma chave diversificada e dispositivo
BR112013005842A2 (pt) método de gerenciar dados, aparelho para gerenciar dados, e meio de gravação legível por computador não transitório
EP1955474A4 (de) Verfahren und system zur digitalen rechteverwaltung unter vorrichtungen
GB2488441A (en) System and device for data management and method thereof
GB201307396D0 (en) Systems and methods for storing and verifying security information
SG152272A1 (en) Secure license key method and system
Sanders-Demott et al. Carbon dioxide and methane fluxes with supporting environmental data from coastal wetlands across Cape Cod, Massachusetts (ver 2.0, June 2022)
MX2007010123A (es) Metodo para importar datos de administracion de derechos digitales para dominio de usuario.
GB201117275D0 (en) System and apparatus for securely storing data
Flickinger Modified multi-node well (MNW2) files used to simulate potential future (2016-2050) water-table elevation change near Kirtland Air Force Base in Albuquerque, New Mexico
WO2014076715A3 (en) A system and a method for processing a user request using at least one of a plurality of user instruments to conduct a pecuniary communication
TW200733684A (en) Electronic ownership certificate authorization browsing system and method
Song et al. Modulation of the Arctic Oscillation on the Impacts of the MJO upon the East Asian Winter Temperature Variations
Proctor et al. The Australian Ocean Data Network as a tool for supporting management of marine biodiversity
Gehani SDCI Data: New-Scalable Authentication of Grid Data Provenance

Legal Events

Date Code Title Description
RER Ceased as to paragraph 5 lit. 3 law introducing patent treaties