[go: up one dir, main page]

TWI800315B - 資料檔案傳輸以及取用權限管理系統與方法 - Google Patents

資料檔案傳輸以及取用權限管理系統與方法 Download PDF

Info

Publication number
TWI800315B
TWI800315B TW111110275A TW111110275A TWI800315B TW I800315 B TWI800315 B TW I800315B TW 111110275 A TW111110275 A TW 111110275A TW 111110275 A TW111110275 A TW 111110275A TW I800315 B TWI800315 B TW I800315B
Authority
TW
Taiwan
Prior art keywords
management system
data file
access rights
rights management
file transmission
Prior art date
Application number
TW111110275A
Other languages
English (en)
Other versions
TW202338644A (zh
Inventor
林志宏
鄭嘉信
梁家榮
Original Assignee
銓安智慧科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 銓安智慧科技股份有限公司 filed Critical 銓安智慧科技股份有限公司
Priority to TW111110275A priority Critical patent/TWI800315B/zh
Priority to US18/121,852 priority patent/US12400016B2/en
Priority to EP23162243.2A priority patent/EP4250158A1/en
Priority to CN202310260937.1A priority patent/CN116248669A/zh
Priority to JP2023043917A priority patent/JP2023138927A/ja
Application granted granted Critical
Publication of TWI800315B publication Critical patent/TWI800315B/zh
Publication of TW202338644A publication Critical patent/TW202338644A/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/107License processing; Key processing
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0847Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving identity based encryption [IBE] schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)
TW111110275A 2022-03-21 2022-03-21 資料檔案傳輸以及取用權限管理系統與方法 TWI800315B (zh)

Priority Applications (5)

Application Number Priority Date Filing Date Title
TW111110275A TWI800315B (zh) 2022-03-21 2022-03-21 資料檔案傳輸以及取用權限管理系統與方法
US18/121,852 US12400016B2 (en) 2022-03-21 2023-03-15 System and method for managing data-file transmission and access right to data files
EP23162243.2A EP4250158A1 (en) 2022-03-21 2023-03-16 System and method for managing data-file transmission and access right to data files
CN202310260937.1A CN116248669A (zh) 2022-03-21 2023-03-17 数据文件传输以及取用权限管理系统与方法
JP2023043917A JP2023138927A (ja) 2022-03-21 2023-03-20 データファイル送信及びデータファイルへのアクセス権を管理するためのシステム及び方法

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW111110275A TWI800315B (zh) 2022-03-21 2022-03-21 資料檔案傳輸以及取用權限管理系統與方法

Publications (2)

Publication Number Publication Date
TWI800315B true TWI800315B (zh) 2023-04-21
TW202338644A TW202338644A (zh) 2023-10-01

Family

ID=85703666

Family Applications (1)

Application Number Title Priority Date Filing Date
TW111110275A TWI800315B (zh) 2022-03-21 2022-03-21 資料檔案傳輸以及取用權限管理系統與方法

Country Status (5)

Country Link
US (1) US12400016B2 (zh)
EP (1) EP4250158A1 (zh)
JP (1) JP2023138927A (zh)
CN (1) CN116248669A (zh)
TW (1) TWI800315B (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20250247246A1 (en) * 2024-01-31 2025-07-31 Mastercard International Incorporated Multi-device fido validation with dpk

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107483446A (zh) * 2017-08-23 2017-12-15 上海点融信息科技有限责任公司 用于区块链的加密方法、设备以及系统
US10977631B2 (en) * 2006-05-15 2021-04-13 The Directv Group, Inc. Secure content transfer systems and methods to operate the same
TWI736271B (zh) * 2019-09-24 2021-08-11 大陸商支付寶(杭州)信息技術有限公司 非對稱密鑰中的私鑰生成和使用方法、裝置和設備
TW202207665A (zh) * 2020-08-07 2022-02-16 玉山商業銀行股份有限公司 資料處理系統、方法及適用於該方法的晶片卡

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH10214233A (ja) * 1996-04-15 1998-08-11 Toshiba Corp 情報処理装置、情報処理システム、情報処理方法、プログラム記憶装置、及び鍵の判定方法及び判定装置
US7146009B2 (en) * 2002-02-05 2006-12-05 Surety, Llc Secure electronic messaging system requiring key retrieval for deriving decryption keys
JP2006080893A (ja) * 2004-09-09 2006-03-23 Mitsubishi Electric Information Systems Corp 電子署名システムおよび電子署名プログラム
JP4794939B2 (ja) * 2005-07-28 2011-10-19 日本電信電話株式会社 チケット型メンバ認証装置及び方法
JP2010045744A (ja) * 2008-08-18 2010-02-25 Fujitsu Ltd 文書データ暗号化方法及び文書データ暗号化システム
US9466073B2 (en) * 2010-12-28 2016-10-11 Google Inc. Targeting an aggregate group
JP6489464B2 (ja) * 2014-04-14 2019-03-27 株式会社テララコード研究所 光学コード、情報伝達方法、及び認証方法
CN105072180B (zh) * 2015-08-06 2018-02-09 武汉科技大学 一种有权限时间控制的云存储数据安全共享方法
JP2017219950A (ja) * 2016-06-06 2017-12-14 神戸電気工業株式会社 映像データ配信システム
WO2018009615A1 (en) * 2016-07-06 2018-01-11 Acquist Llc Compounds and their use for reducing uric acid levels
CN110999203B (zh) * 2017-05-08 2021-09-07 亚马逊技术有限公司 用于生成共享密钥的方法和系统
CN109150568B (zh) * 2017-06-27 2021-12-14 阿里巴巴集团控股有限公司 一种网络管理方法、装置、系统、设备和存储介质
JP6511111B2 (ja) * 2017-10-12 2019-05-15 任天堂株式会社 通信プログラム、情報処理装置、通信システム、および通信方法
SG11202101221WA (en) 2018-10-02 2021-03-30 Capital One Services Llc Systems and methods for cryptographic authentication of contactless cards
CN109951274B (zh) * 2019-01-15 2023-09-01 如般量子科技有限公司 基于私钥池的抗量子计算点对点消息传输方法和系统
CN109995530B (zh) * 2019-05-09 2022-02-15 东南大学 一种适用于移动定位系统的安全分布式数据库交互系统
US11223479B1 (en) * 2021-04-02 2022-01-11 CyLogic, Inc. Resilience against denial of availability attacks in a secure decentralized P2P filesystem
US11575507B1 (en) * 2021-09-21 2023-02-07 Uab 360 It Sharing access to data
US20250158809A1 (en) * 2022-02-16 2025-05-15 Visa International Service Association Privacy-preserving biometrics for multi-factor authentication

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10977631B2 (en) * 2006-05-15 2021-04-13 The Directv Group, Inc. Secure content transfer systems and methods to operate the same
CN107483446A (zh) * 2017-08-23 2017-12-15 上海点融信息科技有限责任公司 用于区块链的加密方法、设备以及系统
TWI736271B (zh) * 2019-09-24 2021-08-11 大陸商支付寶(杭州)信息技術有限公司 非對稱密鑰中的私鑰生成和使用方法、裝置和設備
TW202207665A (zh) * 2020-08-07 2022-02-16 玉山商業銀行股份有限公司 資料處理系統、方法及適用於該方法的晶片卡

Also Published As

Publication number Publication date
JP2023138927A (ja) 2023-10-03
US20230297708A1 (en) 2023-09-21
TW202338644A (zh) 2023-10-01
EP4250158A1 (en) 2023-09-27
CN116248669A (zh) 2023-06-09
US12400016B2 (en) 2025-08-26

Similar Documents

Publication Publication Date Title
EP4113912A4 (en) COMPUTER SYSTEM AND NETWORK SLICE MANAGEMENT PROCEDURES
CA3261251A1 (en) INFORMATION MANAGEMENT SYSTEM AND PROCESS
EP4160347A4 (en) INVENTORY MANAGEMENT METHOD AND SYSTEM
CA3261487A1 (en) DIABETES MANAGEMENT SYSTEMS AND METHODS
EP4449253A4 (en) RESOURCE MANAGEMENT SYSTEMS AND RELATED PROCESSES
TWI800315B (zh) 資料檔案傳輸以及取用權限管理系統與方法
EP4111667A4 (en) METHODS AND SYSTEMS FOR MANAGING DATA IN A COMMUNICATION NETWORK
EP4075370A4 (en) LIVESTOCK INFORMATION MANAGEMENT SYSTEM, LIVESTOCK INFORMATION MANAGEMENT SERVER, LIVESTOCK INFORMATION MANAGEMENT METHOD, LIVESTOCK INFORMATION MANAGEMENT PROGRAM, AND DATA STRUCTURE FOR LIVESTOCK INFORMATION MANAGEMENT
EP4105794A4 (en) DIGITAL RIGHTS MANAGEMENT (DRM) METHOD, APPARATUS AND SYSTEM
EP4379636A4 (en) Asset management device and asset management method
EP4150863A4 (en) METHOD AND SYSTEM FOR EAS LIFECYCLE MANAGEMENT WITH EDGE DATA NETWORK SELECTION
EP4102445A4 (en) DATA MANAGEMENT SYSTEM, MANAGEMENT METHOD AND MANAGEMENT PROGRAM
CA3253728A1 (en) Methods and systems for content management
EP4327222A4 (en) DATA SECURITY FOR A DOCUMENT MANAGEMENT SYSTEM
TWI800327B (zh) 資料儲存系統與參數裕度估計方法
EP4170611A4 (en) METHOD AND SYSTEM FOR COLLECTING AND MANAGING VEHICLE-GENERATED DATA
EP4515418A4 (en) DATA MANAGEMENT SYSTEM AND METHOD
EP4398139A4 (en) NETWORK DEVICE AND DATA DECRYPTION METHOD
EP4214665A4 (en) METHOD AND APPARATUS FOR AN INSURANCE ADMINISTRATION SYSTEM
EP4216588A4 (en) DISTRIBUTED MANAGEMENT SYSTEM AND MANAGEMENT METHOD FOR SMART CARD MANAGEMENT DEVICES
EP4099203A4 (en) DATA DISTRIBUTION MANAGEMENT DEVICE, DATA DISTRIBUTION MANAGEMENT METHOD, AND PROGRAM
AU2025901909A0 (en) Crowd management system and methods therefor
EP4122159A4 (en) METHODS AND SYSTEMS FOR LOADING USING MANAGEMENT INFORMATION
CA3284876A1 (en) Music and digital rights management systems and methods
CA3256075A1 (en) Methods and systems for content management