[go: up one dir, main page]

TW200700992A - System for creating control structure for versatile content control - Google Patents

System for creating control structure for versatile content control

Info

Publication number
TW200700992A
TW200700992A TW094145707A TW94145707A TW200700992A TW 200700992 A TW200700992 A TW 200700992A TW 094145707 A TW094145707 A TW 094145707A TW 94145707 A TW94145707 A TW 94145707A TW 200700992 A TW200700992 A TW 200700992A
Authority
TW
Taiwan
Prior art keywords
trees
purchaser
permissions
creating
permission
Prior art date
Application number
TW094145707A
Other languages
Chinese (zh)
Other versions
TWI388985B (en
Inventor
Fabrice Jogand-Coulobm
Michael Holtzman
Bahman Qawami
Ron Barzilai
Original Assignee
Sandisk Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US11/313,538 external-priority patent/US8051052B2/en
Priority claimed from US11/314,055 external-priority patent/US20060242067A1/en
Application filed by Sandisk Corp filed Critical Sandisk Corp
Publication of TW200700992A publication Critical patent/TW200700992A/en
Application granted granted Critical
Publication of TWI388985B publication Critical patent/TWI388985B/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1458Protection against unauthorised use of memory or access to memory by checking the subject access rights
    • G06F12/1491Protection against unauthorised use of memory or access to memory by checking the subject access rights in a hierarchical protection system, e.g. privilege levels, memory rings
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/101Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
    • G06F21/1011Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to devices
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2103Challenge-response
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2113Multi-level security, e.g. mandatory access control
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2117User registration
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2145Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The mobile storage device may be provided with a system agent that is able to create at least one hierarchical tree comprising nodes at different levels for controlling access to data stored in the memory by corresponding entities. Each node of the tree specifies permission or permissions of a corresponding entity or entities for accessing memory data. The permission or permissions at the node of each of the trees has a predetermined relationship to permission or permissions at nodes at a higher or lower or the same level in the same tree. Thus, the mobile storage devices may be issued without any trees already created so that the purchaser of the devices has a free hand in creating hierarchical trees adapted to the applications the purchaser has in mind. Alternatively, the mobile storage devices may also be issued with the trees already created so that a purchaser does not have to go through the trouble of creating the trees. In both situations, preferably certain functionalities of the trees can become fixed after the devices are made so that they cannot be further changed or altered. This provides greater control over access to the content in the device by the content owner. Thus, in one embodiment, the system agent can preferably be disabled so that no additional trees can be created.
TW094145707A 2004-12-21 2005-12-21 Method and storage device for controlling data access in a storage device TWI388985B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US63880404P 2004-12-21 2004-12-21
US11/313,538 US8051052B2 (en) 2004-12-21 2005-12-20 Method for creating control structure for versatile content control
US11/314,055 US20060242067A1 (en) 2004-12-21 2005-12-20 System for creating control structure for versatile content control

Publications (2)

Publication Number Publication Date
TW200700992A true TW200700992A (en) 2007-01-01
TWI388985B TWI388985B (en) 2013-03-11

Family

ID=36146948

Family Applications (1)

Application Number Title Priority Date Filing Date
TW094145707A TWI388985B (en) 2004-12-21 2005-12-21 Method and storage device for controlling data access in a storage device

Country Status (6)

Country Link
EP (1) EP1836643A2 (en)
JP (1) JP4857284B2 (en)
KR (1) KR20070091349A (en)
CN (2) CN101120355B (en)
TW (1) TWI388985B (en)
WO (1) WO2006069312A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI775033B (en) * 2019-08-14 2022-08-21 旺宏電子股份有限公司 Security memory scheme

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7748031B2 (en) 2005-07-08 2010-06-29 Sandisk Corporation Mass storage device with automated credentials loading
EP1934878A2 (en) * 2005-09-08 2008-06-25 SanDisk Corporation Mobile memory system for secure storage and delivery of media content
JP5180203B2 (en) * 2006-07-07 2013-04-10 サンディスク テクノロジィース インコーポレイテッド System and method for controlling information supplied from a memory device
CN101484904A (en) * 2006-07-07 2009-07-15 桑迪士克股份有限公司 Content control system and method using versatile control structure
EP2038804A2 (en) * 2006-07-07 2009-03-25 Sandisk Corporation Content control system and method using versatile control structure
US9104618B2 (en) 2008-12-18 2015-08-11 Sandisk Technologies Inc. Managing access to an address range in a storage device
EP2256660B1 (en) * 2009-05-28 2015-08-12 Sap Se Computer-implemented method, computer system, and computer program product for optimization of evaluation of a policy specification
US10165007B2 (en) 2011-09-15 2018-12-25 Microsoft Technology Licensing, Llc Securing data usage in computing devices
CN102609368B (en) * 2012-01-11 2014-12-17 记忆科技(深圳)有限公司 Solid-state-drive data encryption and decryption method and solid state drive
CN103870724B (en) * 2012-12-12 2017-03-01 财团法人资讯工业策进会 Main managing device, proxy management device, electronic installation and authorization management method
GB2565411A (en) * 2017-06-12 2019-02-13 British Telecomm Improved hardware security module management
KR102227363B1 (en) * 2019-05-30 2021-03-15 트럼피아 주식회사 System and method for controlling data access of multy hierarchy structure
CN110321302B (en) * 2019-06-28 2021-10-01 兆讯恒达科技股份有限公司 Embedded system data storage area management method
JP2021077208A (en) 2019-11-12 2021-05-20 キオクシア株式会社 Storage device
AT524620B1 (en) * 2020-12-07 2025-07-15 Insitu Software Gmbh Procedure for migrating an IT application

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6026402A (en) * 1998-01-07 2000-02-15 Hewlett-Packard Company Process restriction within file system hierarchies
JP2002244552A (en) * 2001-02-13 2002-08-30 Sony Corp Information reproducing apparatus, information reproducing method, information recording medium, and program storage medium
JP2002278838A (en) * 2001-03-15 2002-09-27 Sony Corp Memory access control system, device management device, partition management device, memory mounted device, memory access control method, and program storage medium
US6895503B2 (en) * 2001-05-31 2005-05-17 Contentguard Holdings, Inc. Method and apparatus for hierarchical assignment of rights to documents and documents having such rights
WO2003017682A2 (en) * 2001-08-13 2003-02-27 Qualcomm, Incorporated Application level access privilege to a storage area on a computer device
US20040139021A1 (en) * 2002-10-07 2004-07-15 Visa International Service Association Method and system for facilitating data access and management on a secure token
JP4682498B2 (en) * 2003-04-09 2011-05-11 ソニー株式会社 Communication device and memory management method for communication device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI775033B (en) * 2019-08-14 2022-08-21 旺宏電子股份有限公司 Security memory scheme

Also Published As

Publication number Publication date
CN101120355B (en) 2012-09-26
KR20070091349A (en) 2007-09-10
JP4857284B2 (en) 2012-01-18
EP1836643A2 (en) 2007-09-26
CN101120355A (en) 2008-02-06
TWI388985B (en) 2013-03-11
JP2008524758A (en) 2008-07-10
WO2006069312A2 (en) 2006-06-29
WO2006069312A3 (en) 2006-11-09
CN102981980A (en) 2013-03-20

Similar Documents

Publication Publication Date Title
TW200700992A (en) System for creating control structure for versatile content control
WO2005121962A3 (en) Arrangement in a network for passing control of distributed data between network nodes for optimized client access based on locality
WO2008137527A3 (en) Mesh - managing data across a distributed set of devices
WO2005031547A3 (en) Separation of copy protection rules for digital rights management
WO2007106798A3 (en) Systems and methods for authoring and protecting digital property
WO2001013302A3 (en) Livestock inventory and materials system with interactive graphical user interface
EP1751745A4 (en) Managed peer-to-peer applications, systems and methods for distributed data access and storage
WO2008126324A1 (en) Access control program, access control apparatus and access control method
DK1084465T3 (en) Procedure for secure access to data in a network
WO2006069311A3 (en) Control structure for versatile content control and method using structure
TW200725298A (en) System and method for storage management
Klandermans Consensus and action mobilization
WO2003027815A3 (en) Programme-controlled unit
Bergquist Porifera (Sponges)
Couldry Bystander publics
Bergelson Victimless Crimes
Whitehead Environment and the state
TW200613979A (en) Methods and devices for memory paging management
Wilshusen Negotiating devolution: Community conflict, structural power, and local forest management in Quintana Roo, Mexico
Clegg Management, Global Models
Markham Greenpeace
Ledford Jr Continuous improvement
Sciortino et al. Inside Cover: Hysteretic Three‐Step Spin Crossover in a Thermo‐and Photochromic 3D Pillared Hofmann‐type Metal–Organic Framework (Angew. Chem. Int. Ed. 40/2012)
Eder Public sphere
Field Eta and eta squared

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees