MX2010002551A - Servicio de seguridad para apoderados. - Google Patents
Servicio de seguridad para apoderados.Info
- Publication number
- MX2010002551A MX2010002551A MX2010002551A MX2010002551A MX2010002551A MX 2010002551 A MX2010002551 A MX 2010002551A MX 2010002551 A MX2010002551 A MX 2010002551A MX 2010002551 A MX2010002551 A MX 2010002551A MX 2010002551 A MX2010002551 A MX 2010002551A
- Authority
- MX
- Mexico
- Prior art keywords
- lost
- proxy service
- facilities
- access
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
- G06Q50/265—Personal security, identity or safety
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/18—Legal services
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Tourism & Hospitality (AREA)
- Human Resources & Organizations (AREA)
- Strategic Management (AREA)
- Economics (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- Marketing (AREA)
- Entrepreneurship & Innovation (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Primary Health Care (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- Educational Administration (AREA)
- Development Economics (AREA)
- General Engineering & Computer Science (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Data Mining & Analysis (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Se ha desarrollado un servicio de apoderado seguro para autorizar a individuos predefinidos (definido como un "Agente de Seguridad") para acceder a información/instalaciones de otra manera privilegiadas cuando un individuo se ha "extraviado". El individuo que se suscribe al servicio define y mantiene el control de factores variados tales como: el periodo de tiempo para activar el servicio de apoderado (es decir, extraviados por varios días, extraviados por varias semanas, etc.), los tipos de información a accederse (es decir, sólo correo electrónico, tanto instalaciones como correo electrónico, cuentas bancarias, etc.), y similares. Una vez que se activa, el apoderado permite a los individuos autorizados acceder a la residencia de la persona, cuentas de computadora, cuentas bancarias, etc. (por medio de documentos de "poder de representación" previamente ejecutados, cuando sea necesario) en un intento por encontrar pistas con respecto a la ubicación de la persona extraviada.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US99314307P | 2007-09-10 | 2007-09-10 | |
US12/072,237 US20090070865A1 (en) | 2007-09-10 | 2008-02-25 | Security proxy service |
PCT/US2008/010360 WO2009035521A2 (en) | 2007-09-10 | 2008-09-04 | Security proxy service |
Publications (1)
Publication Number | Publication Date |
---|---|
MX2010002551A true MX2010002551A (es) | 2010-07-30 |
Family
ID=40433295
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
MX2010002551A MX2010002551A (es) | 2007-09-10 | 2008-09-04 | Servicio de seguridad para apoderados. |
Country Status (11)
Country | Link |
---|---|
US (1) | US20090070865A1 (es) |
JP (1) | JP2010539563A (es) |
KR (1) | KR20100070345A (es) |
CN (1) | CN101796503A (es) |
AU (1) | AU2008297482A1 (es) |
CA (1) | CA2698364A1 (es) |
GB (1) | GB2465309A (es) |
MX (1) | MX2010002551A (es) |
NZ (1) | NZ583926A (es) |
RU (1) | RU2010109350A (es) |
WO (1) | WO2009035521A2 (es) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9338197B2 (en) | 2010-11-01 | 2016-05-10 | Google Inc. | Social circles in social networks |
CN109859077A (zh) * | 2017-11-30 | 2019-06-07 | 夏彦晖 | 一种基于网络实现的信息委托传递方法 |
Family Cites Families (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5241466A (en) * | 1991-06-26 | 1993-08-31 | Perry Victor A | System for administering a central depository for living wills and other associated information |
JPH06125400A (ja) * | 1992-10-13 | 1994-05-06 | Fujitsu Ltd | 異常事態検出機能付き電話機 |
EP0955596A3 (en) * | 1998-04-16 | 2002-12-04 | Citibank, N.A. | Customer access solutions architecture |
US6078282A (en) * | 1998-06-26 | 2000-06-20 | Casey; Paul J. | Data base for a locator system |
US6073106A (en) * | 1998-10-30 | 2000-06-06 | Nehdc, Inc. | Method of managing and controlling access to personal information |
US6300902B1 (en) * | 1999-02-10 | 2001-10-09 | At&T Corp | Personalized locator method and apparatus |
US7181438B1 (en) * | 1999-07-21 | 2007-02-20 | Alberti Anemometer, Llc | Database access system |
US6449611B1 (en) * | 1999-09-30 | 2002-09-10 | Fred Frankel | Business model for recovery of missing goods, persons, or fugitive or disbursements of unclaimed goods using the internet |
US6978367B1 (en) * | 1999-10-21 | 2005-12-20 | International Business Machines Corporation | Selective data encryption using style sheet processing for decryption by a client proxy |
US6845448B1 (en) * | 2000-01-07 | 2005-01-18 | Pennar Software Corporation | Online repository for personal information |
CA2347581C (en) * | 2000-09-20 | 2008-07-29 | United Parcel Service Of America, Inc. | Method and apparatus for authorizing the transfer of information |
US7117173B1 (en) * | 2001-02-02 | 2006-10-03 | Sonal Sheth Ambani | System and method for providing financial services to children and teenagers |
JP2002245138A (ja) * | 2001-02-14 | 2002-08-30 | Canon Sales Co Inc | 引越手続代行システム、引越手続代行サーバ、引越情報提供システム、引越情報提供サーバ及びそれらの制御方法、コンピュータ可読メモリ、プログラム |
JP2002251681A (ja) * | 2001-02-21 | 2002-09-06 | Saibuaasu:Kk | 動作検知装置、動作検知システム、異常動作通知システム、ゲームシステム、所定動作の通知方法およびセンタ装置 |
US7237117B2 (en) * | 2001-03-16 | 2007-06-26 | Kenneth P. Weiss | Universal secure registry |
JP2003178006A (ja) * | 2001-12-07 | 2003-06-27 | Nec Corp | 通信システム、通信方法、アクション実行装置及びアクション実行装置のプログラム |
US7103776B1 (en) * | 2002-01-31 | 2006-09-05 | Acuson | Emergency logon method |
US7444413B2 (en) * | 2002-06-26 | 2008-10-28 | Microsoft Corporation | Authorization access controlled content exchange |
US7917468B2 (en) * | 2005-08-01 | 2011-03-29 | Seven Networks, Inc. | Linking of personal information management data |
US6973449B2 (en) * | 2003-05-27 | 2005-12-06 | National Association For Child Abduction Prevention | System, method of portable USB key interfaced to computer system for facilitating the recovery and/or identification of a missing person having person's unique identification, biological information |
JP2005208858A (ja) * | 2004-01-21 | 2005-08-04 | Nec Corp | 携帯端末を利用した防犯・緊急通報システム,方法,警備会社サーバおよびプログラム |
JP2005322009A (ja) * | 2004-05-10 | 2005-11-17 | Jupiter Net:Kk | 防犯機能を備えた携帯端末装置、犯罪通知システム及び犯罪通知方法 |
CA2574885A1 (en) * | 2004-07-23 | 2006-02-02 | Privit, Inc. | Privacy compliant consent and data access management system and method |
US20060047605A1 (en) * | 2004-08-27 | 2006-03-02 | Omar Ahmad | Privacy management method and apparatus |
JP2007151104A (ja) * | 2005-11-04 | 2007-06-14 | G Force:Kk | 緊急時等における無線携帯端末及び位置情報通知・検索システム |
US20070214365A1 (en) * | 2006-03-13 | 2007-09-13 | Cornett John D | Document repository |
US7629891B1 (en) * | 2007-07-30 | 2009-12-08 | Scott Douglas Bell | Personal safety check-in and follow-up system and method |
-
2008
- 2008-02-25 US US12/072,237 patent/US20090070865A1/en not_active Abandoned
- 2008-09-04 AU AU2008297482A patent/AU2008297482A1/en not_active Abandoned
- 2008-09-04 CA CA2698364A patent/CA2698364A1/en not_active Abandoned
- 2008-09-04 NZ NZ583926A patent/NZ583926A/xx not_active IP Right Cessation
- 2008-09-04 WO PCT/US2008/010360 patent/WO2009035521A2/en active Application Filing
- 2008-09-04 RU RU2010109350/08A patent/RU2010109350A/ru not_active Application Discontinuation
- 2008-09-04 GB GB1002950A patent/GB2465309A/en not_active Withdrawn
- 2008-09-04 JP JP2010524024A patent/JP2010539563A/ja active Pending
- 2008-09-04 CN CN200880105712A patent/CN101796503A/zh active Pending
- 2008-09-04 KR KR1020107007423A patent/KR20100070345A/ko not_active Withdrawn
- 2008-09-04 MX MX2010002551A patent/MX2010002551A/es not_active Application Discontinuation
Also Published As
Publication number | Publication date |
---|---|
GB201002950D0 (en) | 2010-04-07 |
WO2009035521A2 (en) | 2009-03-19 |
WO2009035521A3 (en) | 2009-05-07 |
CN101796503A (zh) | 2010-08-04 |
CA2698364A1 (en) | 2009-03-19 |
US20090070865A1 (en) | 2009-03-12 |
NZ583926A (en) | 2013-04-26 |
JP2010539563A (ja) | 2010-12-16 |
AU2008297482A1 (en) | 2009-03-19 |
KR20100070345A (ko) | 2010-06-25 |
RU2010109350A (ru) | 2011-10-20 |
GB2465309A (en) | 2010-05-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
BR112014026065A2 (pt) | palavras-chave de utilização única randomizadas e deduzidas para autenticação de transações | |
WO2008092167A3 (en) | Protecting secrets in an untrusted recipient | |
WO2012054637A3 (en) | Single-point-of-access cyber system | |
MX2010002551A (es) | Servicio de seguridad para apoderados. | |
CO6430045A1 (es) | Mecanismo para aseguramiento de transacciones electronicas | |
Sit et al. | Ergothioneine shows protective effect on endothelial cells in oxidative stress | |
Scale Uwadia Osagie et al. | Digitalized Responsive Logical Interface Application | |
Tosti | Fermi LAT detections of gamma ray activity in three blazars: 3C 66A, PKS 0208-512, PKS 0537-441 | |
Abdoulaye Kindy et al. | A Detailed Survey on Various Aspects of SQL Injection in Web Applications: Vulnerabilities, Innovative Attacks, and Remedies | |
WO2009087405A3 (en) | Security system for websites | |
Liskov | CSR-DMSS, SM: Aeolus: Secure Support for Preserving Confidentiality and Integrity in a Distributed Environment | |
Gallo | The drop structure in the 1H 0707-495: Revealing the physics behind the phenomen | |
Zheng et al. | A molecular dynamics study of the effect of pre-deformation on compression of glassy polymers | |
Buote | Finding Missing Baryons in a Massive Isolated Elliptical Galaxy% | |
Kim et al. | Melatonin as key factor on bone remodeling in animal models with perforating fracture | |
Vasconcelos | Perfil de temperatura dos funis magnetosféricos de estrelas T Tauri com aquecimento alfvênico | |
Tanvir | The afterglow and host galaxy of GRB 080319: the first naked eye burst | |
Mehta | The Invisible Scientist in India--a case study for emergent countries | |
Smeda et al. | Stroke related alterations in protease activated receptor‐2 and bradykinin mediated vasodilation in the middle cerebral arteries of stroke prone hypertensive rats | |
Ayaz et al. | Groundwater Pollution Source Identification Using Trained ANN Model | |
HE | Health care reform in Hong Kong: Critical moment and the way forward | |
Brumley | CAREER: Towards Identifying and Eliminating Exploitable Software Bugs | |
Hua et al. | Numerical explorations of above threshold Coulomb explosion for H2+ in an intense laser pulse | |
Lu et al. | Nanomechanical Response of Pseudomonas aeruginosa PAO1 Bacterial Cells to Cationic Antimicrobial Peptides | |
Reddy Gangasani | Testing D-Sequences for their Randomness |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FA | Abandonment or withdrawal |