[go: up one dir, main page]

MX2013004764A - Metodos para procesar metadatos privados. - Google Patents

Metodos para procesar metadatos privados.

Info

Publication number
MX2013004764A
MX2013004764A MX2013004764A MX2013004764A MX2013004764A MX 2013004764 A MX2013004764 A MX 2013004764A MX 2013004764 A MX2013004764 A MX 2013004764A MX 2013004764 A MX2013004764 A MX 2013004764A MX 2013004764 A MX2013004764 A MX 2013004764A
Authority
MX
Mexico
Prior art keywords
metadata
user
private metadata
file
private
Prior art date
Application number
MX2013004764A
Other languages
English (en)
Inventor
Kaelin L Colclasure
John M Hoernkvist
Braden J Thomas
Original Assignee
Apple Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Apple Inc filed Critical Apple Inc
Publication of MX2013004764A publication Critical patent/MX2013004764A/es

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/14Details of searching files based on file metadata
    • G06F16/148File search processing
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/41User authentication where a single sign-on provides access to a plurality of computers
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/13File access structures, e.g. distributed indices
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/38Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/907Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Library & Information Science (AREA)
  • Medical Informatics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

De acuerdo con un aspecto de la invención, un archivo recibido de un primer usuario se almacena en un dispositivo de almacenamiento, donde el archivo incluye metadatos privados codificados criptográficamente por una clave secreta asociada con un segundo usuario. Un identificador de metadatos privados se almacena en una ubicación de almacenamiento predeterminada, lo que indica que los metadatos privados del archivo no se han descodificado criptográficamente e indizado. En respuesta a una consulta recibida subsecuentemente del segundo usuario, la ubicación de almacenamiento predeterminada se explora para identificar el identificador de metadatos privados con base en la consulta. Los metadatos codificados criptográficamente, identificados por el identificador de metadatos privados, se transmiten al segundo usuario para su descodificación criptográfica. En respuesta a los metadatos que se han descodificado criptográficamente por el segundo usuario, los metadatos descodificados criptográficamente se indizan para el propósito de búsquedas subsecuentes de por lo menos uno de los metadatos y el archivo.
MX2013004764A 2010-10-27 2011-10-19 Metodos para procesar metadatos privados. MX2013004764A (es)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US12/913,500 US8880905B2 (en) 2010-10-27 2010-10-27 Methods for processing private metadata
PCT/US2011/056960 WO2012058075A1 (en) 2010-10-27 2011-10-19 Methods for processing private metadata

Publications (1)

Publication Number Publication Date
MX2013004764A true MX2013004764A (es) 2013-06-05

Family

ID=44872633

Family Applications (1)

Application Number Title Priority Date Filing Date
MX2013004764A MX2013004764A (es) 2010-10-27 2011-10-19 Metodos para procesar metadatos privados.

Country Status (9)

Country Link
US (1) US8880905B2 (es)
EP (1) EP2633469A1 (es)
JP (1) JP5576569B2 (es)
KR (1) KR101466527B1 (es)
CN (1) CN103250161B (es)
AU (1) AU2011320742B2 (es)
BR (1) BR112013009999A2 (es)
MX (1) MX2013004764A (es)
WO (1) WO2012058075A1 (es)

Families Citing this family (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8788816B1 (en) * 2011-02-02 2014-07-22 EJS Technologies, LLC Systems and methods for controlling distribution, copying, and viewing of remote data
US9100245B1 (en) * 2012-02-08 2015-08-04 Amazon Technologies, Inc. Identifying protected media files
US20130254550A1 (en) * 2012-03-24 2013-09-26 Paul L. Greene Digital data authentication and security system
US20130254551A1 (en) * 2012-03-24 2013-09-26 Paul L. Greene Digital data authentication and security system
US9836759B2 (en) 2012-08-06 2017-12-05 Randolph Ken Georgi Universal transaction associating identifier
US20140059513A1 (en) * 2012-08-27 2014-02-27 Bank Of America Creation and Uploading of Archives for Software Projects to Submission Portal
TW201427366A (zh) * 2012-12-28 2014-07-01 Ibm 企業網路中為了資料外洩保護而解密檔案的方法與資訊裝置
CN104065680B (zh) * 2013-03-21 2017-03-08 华为终端有限公司 信息处理方法、检索方法、装置、用户终端及服务器
US20140344952A1 (en) * 2013-05-14 2014-11-20 Google Inc. Indexing and searching documents with restricted portions
CN104252460B (zh) * 2013-06-25 2017-11-24 华为技术有限公司 数据存储方法、查询方法、装置及系统
US10873454B2 (en) 2014-04-04 2020-12-22 Zettaset, Inc. Cloud storage encryption with variable block sizes
US10043029B2 (en) 2014-04-04 2018-08-07 Zettaset, Inc. Cloud storage encryption
US10298555B2 (en) * 2014-04-04 2019-05-21 Zettaset, Inc. Securing files under the semi-trusted user threat model using per-file key encryption
US10333899B2 (en) * 2014-11-26 2019-06-25 Lexisnexis, A Division Of Reed Elsevier Inc. Systems and methods for implementing a privacy firewall
US10614478B1 (en) 2015-02-26 2020-04-07 Randolph Georgi Directed digital currency system, method, and apparatus
US10157400B1 (en) 2015-02-26 2018-12-18 Randolph Georgi Interoperable reward currency system, method, and apparatus
US9858438B2 (en) 2015-03-26 2018-01-02 International Business Machines Corporation Managing digital photograph metadata anonymization
US10248725B2 (en) * 2015-06-02 2019-04-02 Gartner, Inc. Methods and apparatus for integrating search results of a local search engine with search results of a global generic search engine
KR102244764B1 (ko) * 2015-08-20 2021-04-26 에스케이텔레콤 주식회사 데이터 저장장치 및 데이터 저장장치의 동작 방법
US9916459B2 (en) 2015-08-21 2018-03-13 International Business Machines Corporation Photograph metadata encryption
CN107239712A (zh) 2016-03-29 2017-10-10 阿里巴巴集团控股有限公司 基于应用程序的用户信息的隐藏方法及装置
GB2555569B (en) * 2016-10-03 2019-06-12 Haddad Elias Enhanced computer objects security
US12019684B2 (en) 2017-01-18 2024-06-25 Microsoft Technology Licensing, Llc Application programming interface arranged to interface with a plurality of data sources
US10838819B2 (en) * 2017-01-18 2020-11-17 Microsoft Technology Licensing, Llc Including personal relationship metadata within duplicated resources shared across partitioned storage
US10909250B2 (en) * 2018-05-02 2021-02-02 Amazon Technologies, Inc. Key management and hardware security integration
CN112400171B (zh) * 2018-05-07 2024-04-09 谷歌有限责任公司 采用亚线性公钥操作的私有信息检索的方法和系统
US11210312B2 (en) * 2018-06-08 2021-12-28 Microsoft Technology Licensing, Llc Storing data items and identifying stored data items
EP3664396A1 (en) * 2018-12-03 2020-06-10 Nagravision SA Securely transmitting data in a data stream
CN109726122A (zh) * 2018-12-13 2019-05-07 平安普惠企业管理有限公司 私有api检测方法、装置、计算机设备及存储介质
WO2021021102A1 (en) * 2019-07-29 2021-02-04 Hewlett-Packard Development Company, L.P. Determine specific devices from follow-up questions
US11556665B2 (en) * 2019-12-08 2023-01-17 Western Digital Technologies, Inc. Unlocking a data storage device
US12056251B2 (en) * 2020-03-18 2024-08-06 Veritas Technologies Llc Systems and methods for protecting a folder from unauthorized file modification
US11874852B2 (en) * 2020-08-28 2024-01-16 Micron Technology, Inc. Instructive actions based on categorization of input data
CN112699405B (zh) * 2020-12-29 2025-02-11 深圳市天朗时代科技有限公司 Isli元数据文件解析方法、装置、设备及可读存储介质
US12050705B2 (en) 2021-12-29 2024-07-30 Microsoft Technology Licensing, Llc Enhanced security features for controlling access to shared content and private content of a shared document

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100924773B1 (ko) * 2002-09-16 2009-11-03 삼성전자주식회사 메타데이터 암호화 및 복호화 방법과 암호화된 메타데이터관리 방법 및 그 시스템
JP4151486B2 (ja) * 2003-06-13 2008-09-17 ソニー株式会社 情報アクセス方法,情報提供装置,メタ情報提供装置,情報受信装置,および情報アクセス方法
JP4487607B2 (ja) 2004-03-23 2010-06-23 ソニー株式会社 情報処理システム、情報処理装置および方法、記録媒体、並びにプログラム
US20080201299A1 (en) 2004-06-30 2008-08-21 Nokia Corporation Method and System for Managing Metadata
US20060004699A1 (en) * 2004-06-30 2006-01-05 Nokia Corporation Method and system for managing metadata
US20070011469A1 (en) * 2005-07-11 2007-01-11 Simdesk Technologies Secure local storage of files
JP4883342B2 (ja) 2005-09-06 2012-02-22 ソニー株式会社 情報処理装置および方法、並びにプログラム
US20070136340A1 (en) * 2005-12-12 2007-06-14 Mark Radulovich Document and file indexing system
US8924412B2 (en) 2005-12-21 2014-12-30 Digimarc Corporation Rules driven pan ID metadata routing system and network
US20070174362A1 (en) * 2006-01-18 2007-07-26 Duc Pham System and methods for secure digital data archiving and access auditing
US7610310B2 (en) 2006-06-30 2009-10-27 Intel Corporation Method and system for the protected storage of downloaded media content via a virtualized platform
JP2008299367A (ja) * 2007-05-29 2008-12-11 Seiko Epson Corp 検索システム
JP2010067175A (ja) * 2008-09-12 2010-03-25 Toshiba Corp ハイブリッド型コンテンツ推薦サーバ、推薦システムおよび推薦方法
US8468345B2 (en) * 2009-11-16 2013-06-18 Microsoft Corporation Containerless data for trustworthy computing and data services

Also Published As

Publication number Publication date
US8880905B2 (en) 2014-11-04
AU2011320742A1 (en) 2013-05-09
WO2012058075A1 (en) 2012-05-03
AU2011320742B2 (en) 2015-07-23
US20120110323A1 (en) 2012-05-03
CN103250161A (zh) 2013-08-14
CN103250161B (zh) 2015-11-11
JP5576569B2 (ja) 2014-08-20
EP2633469A1 (en) 2013-09-04
BR112013009999A2 (pt) 2017-11-07
JP2014503865A (ja) 2014-02-13
KR20130067304A (ko) 2013-06-21
KR101466527B1 (ko) 2014-11-27

Similar Documents

Publication Publication Date Title
MX2013004764A (es) Metodos para procesar metadatos privados.
GB2573666A (en) Verifying authenticity of computer readable information using the blockchain
MX2015014636A (es) Metodo de seguridad para archivos y aparatos para el mismo.
WO2015030903A3 (en) Image based key derivation function
NZ714230A (en) System and methods for encrypting data
WO2015121806A3 (en) System and method for securing content keys delivered in manifest files
NZ701459A (en) Systems and methods for secure processing with embedded cryptographic unit
UA115501C2 (uk) Спосіб і система для захищеної передачі повідомлень послуги віддалених сповіщень в мобільні пристрої без захищених елементів
WO2016126332A3 (en) Data security operations with expectations
PH12018502160A1 (en) Systems and methods for secure storage of user information in a user profile
WO2014116528A3 (en) Providing an encrypted account credential from a first device to a second device
EP2544400A3 (en) PUF based Cryptographic communication system and cryptographic communication method
WO2016057086A3 (en) Common modulus rsa key pairs for signature generation and encryption/decryption
JP2016513848A5 (es)
WO2013002833A3 (en) Binding of cryptographic content using unique device characteristics with server heuristics
MY190913A (en) Device and method for secure connection
GB2530225A (en) Processing guest event in a hypervisor-controlled system
SG10201803844TA (en) Virtual service provider zones
PH12018550176A1 (en) Using hardware based secure isolated region to prevent piracy and cheating on electronic devices
PH12019550119A1 (en) Addressing a trusted execution environment using signing key
EP2506488A3 (en) Secure dynamic on-chip key programming
US20130156276A1 (en) Electronic device with a function of searching images based on facial feature and method
EP2195963A4 (en) SAFETY MEASURES TO PREVENT UNAUTHORIZED DECISION
EP2511848A3 (en) Multiple independent encryption domains
JP2016072769A5 (es)

Legal Events

Date Code Title Description
FG Grant or registration