[go: up one dir, main page]

MX2010002551A - Servicio de seguridad para apoderados. - Google Patents

Servicio de seguridad para apoderados.

Info

Publication number
MX2010002551A
MX2010002551A MX2010002551A MX2010002551A MX2010002551A MX 2010002551 A MX2010002551 A MX 2010002551A MX 2010002551 A MX2010002551 A MX 2010002551A MX 2010002551 A MX2010002551 A MX 2010002551A MX 2010002551 A MX2010002551 A MX 2010002551A
Authority
MX
Mexico
Prior art keywords
lost
proxy service
email
facilities
access
Prior art date
Application number
MX2010002551A
Other languages
English (en)
Inventor
Robert Cahn
Carol A Micken
Original Assignee
Robert Cahn
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Robert Cahn filed Critical Robert Cahn
Publication of MX2010002551A publication Critical patent/MX2010002551A/es

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Tourism & Hospitality (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Marketing (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Primary Health Care (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Educational Administration (AREA)
  • Development Economics (AREA)
  • General Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

Se ha desarrollado un servicio de apoderado seguro para autorizar a individuos predefinidos (definido como un "Agente de Seguridad") para acceder a información/instalaciones de otra manera privilegiadas cuando un individuo se ha "extraviado". El individuo que se suscribe al servicio define y mantiene el control de factores variados tales como: el periodo de tiempo para activar el servicio de apoderado (es decir, extraviados por varios días, extraviados por varias semanas, etc.), los tipos de información a accederse (es decir, sólo correo electrónico, tanto instalaciones como correo electrónico, cuentas bancarias, etc.), y similares. Una vez que se activa, el apoderado permite a los individuos autorizados acceder a la residencia de la persona, cuentas de computadora, cuentas bancarias, etc. (por medio de documentos de "poder de representación" previamente ejecutados, cuando sea necesario) en un intento por encontrar pistas con respecto a la ubicación de la persona extraviada.
MX2010002551A 2007-09-10 2008-09-04 Servicio de seguridad para apoderados. MX2010002551A (es)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US99314307P 2007-09-10 2007-09-10
US12/072,237 US20090070865A1 (en) 2007-09-10 2008-02-25 Security proxy service
PCT/US2008/010360 WO2009035521A2 (en) 2007-09-10 2008-09-04 Security proxy service

Publications (1)

Publication Number Publication Date
MX2010002551A true MX2010002551A (es) 2010-07-30

Family

ID=40433295

Family Applications (1)

Application Number Title Priority Date Filing Date
MX2010002551A MX2010002551A (es) 2007-09-10 2008-09-04 Servicio de seguridad para apoderados.

Country Status (11)

Country Link
US (1) US20090070865A1 (es)
JP (1) JP2010539563A (es)
KR (1) KR20100070345A (es)
CN (1) CN101796503A (es)
AU (1) AU2008297482A1 (es)
CA (1) CA2698364A1 (es)
GB (1) GB2465309A (es)
MX (1) MX2010002551A (es)
NZ (1) NZ583926A (es)
RU (1) RU2010109350A (es)
WO (1) WO2009035521A2 (es)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9338197B2 (en) 2010-11-01 2016-05-10 Google Inc. Social circles in social networks
CN109859077A (zh) * 2017-11-30 2019-06-07 夏彦晖 一种基于网络实现的信息委托传递方法

Family Cites Families (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5241466A (en) * 1991-06-26 1993-08-31 Perry Victor A System for administering a central depository for living wills and other associated information
JPH06125400A (ja) * 1992-10-13 1994-05-06 Fujitsu Ltd 異常事態検出機能付き電話機
EP0955596A3 (en) * 1998-04-16 2002-12-04 Citibank, N.A. Customer access solutions architecture
US6078282A (en) * 1998-06-26 2000-06-20 Casey; Paul J. Data base for a locator system
US6073106A (en) * 1998-10-30 2000-06-06 Nehdc, Inc. Method of managing and controlling access to personal information
US6300902B1 (en) * 1999-02-10 2001-10-09 At&T Corp Personalized locator method and apparatus
US7181438B1 (en) * 1999-07-21 2007-02-20 Alberti Anemometer, Llc Database access system
US6449611B1 (en) * 1999-09-30 2002-09-10 Fred Frankel Business model for recovery of missing goods, persons, or fugitive or disbursements of unclaimed goods using the internet
US6978367B1 (en) * 1999-10-21 2005-12-20 International Business Machines Corporation Selective data encryption using style sheet processing for decryption by a client proxy
US6845448B1 (en) * 2000-01-07 2005-01-18 Pennar Software Corporation Online repository for personal information
CA2347581C (en) * 2000-09-20 2008-07-29 United Parcel Service Of America, Inc. Method and apparatus for authorizing the transfer of information
US7117173B1 (en) * 2001-02-02 2006-10-03 Sonal Sheth Ambani System and method for providing financial services to children and teenagers
JP2002245138A (ja) * 2001-02-14 2002-08-30 Canon Sales Co Inc 引越手続代行システム、引越手続代行サーバ、引越情報提供システム、引越情報提供サーバ及びそれらの制御方法、コンピュータ可読メモリ、プログラム
JP2002251681A (ja) * 2001-02-21 2002-09-06 Saibuaasu:Kk 動作検知装置、動作検知システム、異常動作通知システム、ゲームシステム、所定動作の通知方法およびセンタ装置
US7237117B2 (en) * 2001-03-16 2007-06-26 Kenneth P. Weiss Universal secure registry
JP2003178006A (ja) * 2001-12-07 2003-06-27 Nec Corp 通信システム、通信方法、アクション実行装置及びアクション実行装置のプログラム
US7103776B1 (en) * 2002-01-31 2006-09-05 Acuson Emergency logon method
US7444413B2 (en) * 2002-06-26 2008-10-28 Microsoft Corporation Authorization access controlled content exchange
US7917468B2 (en) * 2005-08-01 2011-03-29 Seven Networks, Inc. Linking of personal information management data
US6973449B2 (en) * 2003-05-27 2005-12-06 National Association For Child Abduction Prevention System, method of portable USB key interfaced to computer system for facilitating the recovery and/or identification of a missing person having person's unique identification, biological information
JP2005208858A (ja) * 2004-01-21 2005-08-04 Nec Corp 携帯端末を利用した防犯・緊急通報システム,方法,警備会社サーバおよびプログラム
JP2005322009A (ja) * 2004-05-10 2005-11-17 Jupiter Net:Kk 防犯機能を備えた携帯端末装置、犯罪通知システム及び犯罪通知方法
CA2574885A1 (en) * 2004-07-23 2006-02-02 Privit, Inc. Privacy compliant consent and data access management system and method
US20060047605A1 (en) * 2004-08-27 2006-03-02 Omar Ahmad Privacy management method and apparatus
JP2007151104A (ja) * 2005-11-04 2007-06-14 G Force:Kk 緊急時等における無線携帯端末及び位置情報通知・検索システム
US20070214365A1 (en) * 2006-03-13 2007-09-13 Cornett John D Document repository
US7629891B1 (en) * 2007-07-30 2009-12-08 Scott Douglas Bell Personal safety check-in and follow-up system and method

Also Published As

Publication number Publication date
GB201002950D0 (en) 2010-04-07
WO2009035521A2 (en) 2009-03-19
WO2009035521A3 (en) 2009-05-07
CN101796503A (zh) 2010-08-04
CA2698364A1 (en) 2009-03-19
US20090070865A1 (en) 2009-03-12
NZ583926A (en) 2013-04-26
JP2010539563A (ja) 2010-12-16
AU2008297482A1 (en) 2009-03-19
KR20100070345A (ko) 2010-06-25
RU2010109350A (ru) 2011-10-20
GB2465309A (en) 2010-05-19

Similar Documents

Publication Publication Date Title
BR112014026065A2 (pt) palavras-chave de utilização única randomizadas e deduzidas para autenticação de transações
WO2008092167A3 (en) Protecting secrets in an untrusted recipient
WO2012054637A3 (en) Single-point-of-access cyber system
MX2010002551A (es) Servicio de seguridad para apoderados.
CO6430045A1 (es) Mecanismo para aseguramiento de transacciones electronicas
Sit et al. Ergothioneine shows protective effect on endothelial cells in oxidative stress
Scale Uwadia Osagie et al. Digitalized Responsive Logical Interface Application
Tosti Fermi LAT detections of gamma ray activity in three blazars: 3C 66A, PKS 0208-512, PKS 0537-441
Abdoulaye Kindy et al. A Detailed Survey on Various Aspects of SQL Injection in Web Applications: Vulnerabilities, Innovative Attacks, and Remedies
WO2009087405A3 (en) Security system for websites
Liskov CSR-DMSS, SM: Aeolus: Secure Support for Preserving Confidentiality and Integrity in a Distributed Environment
Gallo The drop structure in the 1H 0707-495: Revealing the physics behind the phenomen
Zheng et al. A molecular dynamics study of the effect of pre-deformation on compression of glassy polymers
Buote Finding Missing Baryons in a Massive Isolated Elliptical Galaxy%
Kim et al. Melatonin as key factor on bone remodeling in animal models with perforating fracture
Vasconcelos Perfil de temperatura dos funis magnetosféricos de estrelas T Tauri com aquecimento alfvênico
Tanvir The afterglow and host galaxy of GRB 080319: the first naked eye burst
Mehta The Invisible Scientist in India--a case study for emergent countries
Smeda et al. Stroke related alterations in protease activated receptor‐2 and bradykinin mediated vasodilation in the middle cerebral arteries of stroke prone hypertensive rats
Ayaz et al. Groundwater Pollution Source Identification Using Trained ANN Model
HE Health care reform in Hong Kong: Critical moment and the way forward
Brumley CAREER: Towards Identifying and Eliminating Exploitable Software Bugs
Hua et al. Numerical explorations of above threshold Coulomb explosion for H2+ in an intense laser pulse
Lu et al. Nanomechanical Response of Pseudomonas aeruginosa PAO1 Bacterial Cells to Cationic Antimicrobial Peptides
Reddy Gangasani Testing D-Sequences for their Randomness

Legal Events

Date Code Title Description
FA Abandonment or withdrawal