TW200700992A - System for creating control structure for versatile content control - Google Patents
System for creating control structure for versatile content controlInfo
- Publication number
- TW200700992A TW200700992A TW094145707A TW94145707A TW200700992A TW 200700992 A TW200700992 A TW 200700992A TW 094145707 A TW094145707 A TW 094145707A TW 94145707 A TW94145707 A TW 94145707A TW 200700992 A TW200700992 A TW 200700992A
- Authority
- TW
- Taiwan
- Prior art keywords
- trees
- purchaser
- permissions
- creating
- permission
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1458—Protection against unauthorised use of memory or access to memory by checking the subject access rights
- G06F12/1491—Protection against unauthorised use of memory or access to memory by checking the subject access rights in a hierarchical protection system, e.g. privilege levels, memory rings
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/101—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
- G06F21/1011—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to devices
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2103—Challenge-response
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2113—Multi-level security, e.g. mandatory access control
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2117—User registration
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2145—Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
The mobile storage device may be provided with a system agent that is able to create at least one hierarchical tree comprising nodes at different levels for controlling access to data stored in the memory by corresponding entities. Each node of the tree specifies permission or permissions of a corresponding entity or entities for accessing memory data. The permission or permissions at the node of each of the trees has a predetermined relationship to permission or permissions at nodes at a higher or lower or the same level in the same tree. Thus, the mobile storage devices may be issued without any trees already created so that the purchaser of the devices has a free hand in creating hierarchical trees adapted to the applications the purchaser has in mind. Alternatively, the mobile storage devices may also be issued with the trees already created so that a purchaser does not have to go through the trouble of creating the trees. In both situations, preferably certain functionalities of the trees can become fixed after the devices are made so that they cannot be further changed or altered. This provides greater control over access to the content in the device by the content owner. Thus, in one embodiment, the system agent can preferably be disabled so that no additional trees can be created.
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US63880404P | 2004-12-21 | 2004-12-21 | |
| US11/313,538 US8051052B2 (en) | 2004-12-21 | 2005-12-20 | Method for creating control structure for versatile content control |
| US11/314,055 US20060242067A1 (en) | 2004-12-21 | 2005-12-20 | System for creating control structure for versatile content control |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| TW200700992A true TW200700992A (en) | 2007-01-01 |
| TWI388985B TWI388985B (en) | 2013-03-11 |
Family
ID=36146948
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW094145707A TWI388985B (en) | 2004-12-21 | 2005-12-21 | Method and storage device for controlling data access in a storage device |
Country Status (6)
| Country | Link |
|---|---|
| EP (1) | EP1836643A2 (en) |
| JP (1) | JP4857284B2 (en) |
| KR (1) | KR20070091349A (en) |
| CN (2) | CN101120355B (en) |
| TW (1) | TWI388985B (en) |
| WO (1) | WO2006069312A2 (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI775033B (en) * | 2019-08-14 | 2022-08-21 | 旺宏電子股份有限公司 | Security memory scheme |
Families Citing this family (15)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7748031B2 (en) | 2005-07-08 | 2010-06-29 | Sandisk Corporation | Mass storage device with automated credentials loading |
| EP1934878A2 (en) * | 2005-09-08 | 2008-06-25 | SanDisk Corporation | Mobile memory system for secure storage and delivery of media content |
| JP5180203B2 (en) * | 2006-07-07 | 2013-04-10 | サンディスク テクノロジィース インコーポレイテッド | System and method for controlling information supplied from a memory device |
| CN101484904A (en) * | 2006-07-07 | 2009-07-15 | 桑迪士克股份有限公司 | Content control system and method using versatile control structure |
| EP2038804A2 (en) * | 2006-07-07 | 2009-03-25 | Sandisk Corporation | Content control system and method using versatile control structure |
| US9104618B2 (en) | 2008-12-18 | 2015-08-11 | Sandisk Technologies Inc. | Managing access to an address range in a storage device |
| EP2256660B1 (en) * | 2009-05-28 | 2015-08-12 | Sap Se | Computer-implemented method, computer system, and computer program product for optimization of evaluation of a policy specification |
| US10165007B2 (en) | 2011-09-15 | 2018-12-25 | Microsoft Technology Licensing, Llc | Securing data usage in computing devices |
| CN102609368B (en) * | 2012-01-11 | 2014-12-17 | 记忆科技(深圳)有限公司 | Solid-state-drive data encryption and decryption method and solid state drive |
| CN103870724B (en) * | 2012-12-12 | 2017-03-01 | 财团法人资讯工业策进会 | Main managing device, proxy management device, electronic installation and authorization management method |
| GB2565411A (en) * | 2017-06-12 | 2019-02-13 | British Telecomm | Improved hardware security module management |
| KR102227363B1 (en) * | 2019-05-30 | 2021-03-15 | 트럼피아 주식회사 | System and method for controlling data access of multy hierarchy structure |
| CN110321302B (en) * | 2019-06-28 | 2021-10-01 | 兆讯恒达科技股份有限公司 | Embedded system data storage area management method |
| JP2021077208A (en) | 2019-11-12 | 2021-05-20 | キオクシア株式会社 | Storage device |
| AT524620B1 (en) * | 2020-12-07 | 2025-07-15 | Insitu Software Gmbh | Procedure for migrating an IT application |
Family Cites Families (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6026402A (en) * | 1998-01-07 | 2000-02-15 | Hewlett-Packard Company | Process restriction within file system hierarchies |
| JP2002244552A (en) * | 2001-02-13 | 2002-08-30 | Sony Corp | Information reproducing apparatus, information reproducing method, information recording medium, and program storage medium |
| JP2002278838A (en) * | 2001-03-15 | 2002-09-27 | Sony Corp | Memory access control system, device management device, partition management device, memory mounted device, memory access control method, and program storage medium |
| US6895503B2 (en) * | 2001-05-31 | 2005-05-17 | Contentguard Holdings, Inc. | Method and apparatus for hierarchical assignment of rights to documents and documents having such rights |
| WO2003017682A2 (en) * | 2001-08-13 | 2003-02-27 | Qualcomm, Incorporated | Application level access privilege to a storage area on a computer device |
| US20040139021A1 (en) * | 2002-10-07 | 2004-07-15 | Visa International Service Association | Method and system for facilitating data access and management on a secure token |
| JP4682498B2 (en) * | 2003-04-09 | 2011-05-11 | ソニー株式会社 | Communication device and memory management method for communication device |
-
2005
- 2005-12-21 CN CN200580048232.3A patent/CN101120355B/en not_active Expired - Fee Related
- 2005-12-21 EP EP05855366A patent/EP1836643A2/en not_active Ceased
- 2005-12-21 KR KR1020077016639A patent/KR20070091349A/en not_active Ceased
- 2005-12-21 CN CN201210277333XA patent/CN102981980A/en active Pending
- 2005-12-21 JP JP2007548523A patent/JP4857284B2/en not_active Expired - Fee Related
- 2005-12-21 WO PCT/US2005/046795 patent/WO2006069312A2/en not_active Ceased
- 2005-12-21 TW TW094145707A patent/TWI388985B/en not_active IP Right Cessation
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI775033B (en) * | 2019-08-14 | 2022-08-21 | 旺宏電子股份有限公司 | Security memory scheme |
Also Published As
| Publication number | Publication date |
|---|---|
| CN101120355B (en) | 2012-09-26 |
| KR20070091349A (en) | 2007-09-10 |
| JP4857284B2 (en) | 2012-01-18 |
| EP1836643A2 (en) | 2007-09-26 |
| CN101120355A (en) | 2008-02-06 |
| TWI388985B (en) | 2013-03-11 |
| JP2008524758A (en) | 2008-07-10 |
| WO2006069312A2 (en) | 2006-06-29 |
| WO2006069312A3 (en) | 2006-11-09 |
| CN102981980A (en) | 2013-03-20 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| TW200700992A (en) | System for creating control structure for versatile content control | |
| WO2005121962A3 (en) | Arrangement in a network for passing control of distributed data between network nodes for optimized client access based on locality | |
| WO2008137527A3 (en) | Mesh - managing data across a distributed set of devices | |
| WO2005031547A3 (en) | Separation of copy protection rules for digital rights management | |
| WO2007106798A3 (en) | Systems and methods for authoring and protecting digital property | |
| WO2001013302A3 (en) | Livestock inventory and materials system with interactive graphical user interface | |
| EP1751745A4 (en) | Managed peer-to-peer applications, systems and methods for distributed data access and storage | |
| WO2008126324A1 (en) | Access control program, access control apparatus and access control method | |
| DK1084465T3 (en) | Procedure for secure access to data in a network | |
| WO2006069311A3 (en) | Control structure for versatile content control and method using structure | |
| TW200725298A (en) | System and method for storage management | |
| Klandermans | Consensus and action mobilization | |
| WO2003027815A3 (en) | Programme-controlled unit | |
| Bergquist | Porifera (Sponges) | |
| Couldry | Bystander publics | |
| Bergelson | Victimless Crimes | |
| Whitehead | Environment and the state | |
| TW200613979A (en) | Methods and devices for memory paging management | |
| Wilshusen | Negotiating devolution: Community conflict, structural power, and local forest management in Quintana Roo, Mexico | |
| Clegg | Management, Global Models | |
| Markham | Greenpeace | |
| Ledford Jr | Continuous improvement | |
| Sciortino et al. | Inside Cover: Hysteretic Three‐Step Spin Crossover in a Thermo‐and Photochromic 3D Pillared Hofmann‐type Metal–Organic Framework (Angew. Chem. Int. Ed. 40/2012) | |
| Eder | Public sphere | |
| Field | Eta and eta squared |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| MM4A | Annulment or lapse of patent due to non-payment of fees |