CA2299056A1 - A system and method for manipulating a computer file and/or program - Google Patents

A system and method for manipulating a computer file and/or program Download PDF

Info

Publication number
CA2299056A1
CA2299056A1 CA002299056A CA2299056A CA2299056A1 CA 2299056 A1 CA2299056 A1 CA 2299056A1 CA 002299056 A CA002299056 A CA 002299056A CA 2299056 A CA2299056 A CA 2299056A CA 2299056 A1 CA2299056 A1 CA 2299056A1
Authority
CA
Canada
Prior art keywords
program
computer file
client device
encrypted
unencrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA002299056A
Other languages
French (fr)
Other versions
CA2299056C (en
Inventor
Arthur R. Hair
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sightsound com Inc
Original Assignee
Sightsound com Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sightsound com Inc filed Critical Sightsound com Inc
Publication of CA2299056A1 publication Critical patent/CA2299056A1/en
Application granted granted Critical
Publication of CA2299056C publication Critical patent/CA2299056C/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2147Locking files

Abstract

A system for manipulating a computer file and/or program.
The system includes a serving device having access to a computer file and/or program which is unencrypted and which can encrypt the unencrypted computer file and/or program to become an encrypted computer file and/or program and transfer it. The system includes a connector connected to the serving device on which the encrypted computer file and/or program travels and to which the serving device transfers the encrypted computer file and/or program. The system includes a client device which receives the encrypted computer file and/or program and decrypts the encrypted computer file and/or program back to the unencrypted computer file and/or program. The client device does not allow intervention to the encrypted computer file and/or program during a time when the encrypted computer and/or file program is received. The serving device is separate, apart and distinct from the client device. A
method for manipulating a computer file and/or program. The method includes the steps of suspending intervention by a user at a client device of the client device. Then there is the step of encrypting an unencrypted computer file and/or program at the server device to form an encrypted computer file and/or program.
Next there is the step of transferring the encrypted computer file and/or program to the client device along a connector connected to the client device and the server device. Then there is the step of reestablishing the intervention of the client device by the user.

Claims (23)

1. A system for manipulating a computer file and/or program comprising:
a serving device having access to a computer file and/or program which is unencrypted and which can encrypt the unencrypted computer file and/or program to become an encrypted computer file and/or program and transfer it;
a connector connected to the serving device on which the encrypted computer file and/or program travels and to which the serving device transfers the encrypted computer file and/or program; and a client device which receives the encrypted computer file and/or program and decrypts the encrypted computer file and/or program back to the unencrypted computer file and/or program, said client device not allowing intervention to the encrypted computer file and/or program during a time when the encrypted computer and/or file program is received, said serving device separate, apart and distinct from the client device.
2. A system as described in Claim 1 wherein said server device assigns permissions and/or rights to the unencrypted computer file and/or program which identifies what the client device can do with the unencrypted or encrypted computer file and/or program after the client device has received the encrypted computer file and/or program or after the client device has decrypted the encrypted computer file and/or program back to the unencrypted computer file and/or program.
3. A system as described in Claim 2 wherein said server device encrypts the permissions and/or rights and transfers them to the client device through the connector, said client device decrypts the unencrypted permissions and/or rights.
4. A system as described in Claim 3 wherein the serving device includes controlling server software and/or firmware which causes the encryption of the unencrypted computer file and/or program and the permissions and/or rights and instructs the client device to temporarily suspend user intervention when the client device receives the encrypted computer file and/or program and the encrypted permissions and/or rights.
5. A system as described in Claim 4 wherein the client device includes controlling client software and/or firmware which causes the decryption of the encrypted computer file and/or program.
6. A system as described in Claim 5 wherein the client device has a mechanism for requesting the unencrypted computer file and/or program from the server device.
7. A system as described in Claim 6 wherein the controlling client software and/or firmware causes the encryption of the unencrypted computer file and/or program and the permissions and/or rights for storage.
8. A system as described in Claim 7 wherein the client device has an operating system and the controller client software and/or firmware instructs the operating system to reestablish user intervention at a desired time.
9. A system as described in Claim 8 wherein the server device has a server public key infrastructure which encrypts using encrypted communication protocols the permissions and/or rights and the unencrypted computer file and/or program.
10. A system as described in Claim 9 wherein the client device has a client public key infrastructure which decrypts from transmission the permissions and/or rights and encrypted computer file and/or program using encrypted communication protocols.
11. A system as described in Claim 10 wherein the client device includes an encrypting file system which encrypts the unencrypted computer file and/or program and the permissions and/or rights and allows for the manual selection of the unencrypted computer file and/or program for encryption or decryption.
12. A system as described in Claim 11 wherein the client public key infrastructure has an encryption and/or decryption key and the encrypting file system uses the encryption and/or decryption key utilized by the client public key infrastructure.
13. A system as described in Claim 12 including a next client device connected to the client device through the connector.
14. A system as described in Claim 13 wherein the controlling client software and/or firmware moves or copies the encrypted computer file and/or program to the next client device through the second connector, said client device having a controlling next client software and/or firmware which decrypts the received encrypted computer file and/or program and the encrypted permissions and/or rights and temporarily suspends user intervention of the next client device while the encrypted computer file and/or program is received by the next client device.
15. A system as described in Claim 14 wherein the connector includes a communication link, the server device includes a transmitter connected to the communication link for transferring the encrypted computer file and/or program and unencrypted permissions and/or rights to the communication link, and the client device includes a receiver connected to the communication link which receives the encrypted computer file and/or program and the encrypted permissions and/or rights from the communication link.
16. A system as described in Claim 15 wherein the first and second connectors are part of the Internet or other communication network.
17. A method for manipulating a computer file and/or program comprising the steps of:
suspending intervention by a user at a client device of the client device;
encrypting an unencrypted computer file and/or program at the server device to form an encrypted computer file and/or program;
transferring the encrypted computer file and/or program to the client device along a connector connected to the client device and the server device; and reestablishing the intervention of the client device by the user.
18. A method as described in Claim 17 including before the transferring step, there is the step of encrypting permissions and/or rights of the unencrypted computer file and/or program and transferring the encrypted permission and/or rights to the client device along the connector from the server device.
19. A method as described in Claim 18 including before the encrypting the unencrypted computer file and/or program step, there is the step of requesting by the client device the unencrypted computer file and/or program of the server device.
20. A method as described in Claim 19 including after the requesting step, there is the step of copying a primary unencrypted computer file and/or program to form the unencrypted computer file and/or program.
21. A method as described in Claim 20 including before the reestablishing step, there is the step of decrypting the encrypted computer file and/or program back to the unencrypted computer file and/or program at the client device.
22. A method as described in Claim 21 including after the decrypting step, there are the steps of encrypting the unencrypted computer file and/or program and permissions and/or rights at the client device and storing the encrypted computer program and/or file and the encrypted permissions and/or rights in the client device.
23. A method as described in Claim 22 including after the storing step, there is the step of transferring the encrypted computer file and/or program to a next client device connected to the client device by a second connector.
CA2299056A 1999-02-23 2000-02-21 A system and method for manipulating a computer file and/or program Expired - Lifetime CA2299056C (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/256,432 1999-02-23
US09/256,432 US6615349B1 (en) 1999-02-23 1999-02-23 System and method for manipulating a computer file and/or program

Publications (2)

Publication Number Publication Date
CA2299056A1 true CA2299056A1 (en) 2000-08-23
CA2299056C CA2299056C (en) 2010-05-04

Family

ID=22972212

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2299056A Expired - Lifetime CA2299056C (en) 1999-02-23 2000-02-21 A system and method for manipulating a computer file and/or program

Country Status (15)

Country Link
US (3) US6615349B1 (en)
EP (1) EP1031909B1 (en)
JP (1) JP4616956B2 (en)
KR (1) KR100770421B1 (en)
CN (1) CN1209718C (en)
AT (1) ATE313110T1 (en)
AU (1) AU776005B2 (en)
BR (1) BR0000702B1 (en)
CA (1) CA2299056C (en)
DE (1) DE60024696T2 (en)
ES (1) ES2254107T3 (en)
HK (1) HK1028466A1 (en)
NZ (1) NZ502871A (en)
SG (1) SG93860A1 (en)
TW (1) TW574641B (en)

Families Citing this family (138)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6857076B1 (en) * 1999-03-26 2005-02-15 Micron Technology, Inc. Data security for digital data storage
US7096370B1 (en) * 1999-03-26 2006-08-22 Micron Technology, Inc. Data security for digital data storage
US7225333B2 (en) * 1999-03-27 2007-05-29 Microsoft Corporation Secure processor architecture for use with a digital rights management (DRM) system on a computing device
US7444407B2 (en) * 2000-06-29 2008-10-28 Transnexus, Inc. Intelligent end user devices for clearinghouse services in an internet telephony system
US6981007B1 (en) * 1999-07-09 2005-12-27 Whitmyer Jr Wesley W Onsite backup for internet-based data processing
US6970941B1 (en) 1999-12-10 2005-11-29 Sun Microsystems, Inc. System and method for separating addresses from the delivery scheme in a virtual private network
US6977929B1 (en) 1999-12-10 2005-12-20 Sun Microsystems, Inc. Method and system for facilitating relocation of devices on a network
US6938169B1 (en) 1999-12-10 2005-08-30 Sun Microsystems, Inc. Channel-specific file system views in a private network using a public-network infrastructure
US6798782B1 (en) 1999-12-10 2004-09-28 Sun Microsystems, Inc. Truly anonymous communications using supernets, with the provision of topology hiding
US6870842B1 (en) 1999-12-10 2005-03-22 Sun Microsystems, Inc. Using multicasting to provide ethernet-like communication behavior to selected peers on a network
US7765581B1 (en) 1999-12-10 2010-07-27 Oracle America, Inc. System and method for enabling scalable security in a virtual private network
US7336790B1 (en) 1999-12-10 2008-02-26 Sun Microsystems Inc. Decoupling access control from key management in a network
US20070288765A1 (en) * 1999-12-22 2007-12-13 Kean Thomas A Method and Apparatus for Secure Configuration of a Field Programmable Gate Array
GB9930145D0 (en) * 1999-12-22 2000-02-09 Kean Thomas A Method and apparatus for secure configuration of a field programmable gate array
WO2001047232A2 (en) 1999-12-22 2001-06-28 Transnexus, Inc. Secure enrollment of a device with a clearinghouse server for internet telephony system
US7240218B2 (en) * 2000-02-08 2007-07-03 Algotronix, Ltd. Method of using a mask programmed key to securely configure a field programmable gate array
CA2402307A1 (en) * 2000-03-10 2001-09-13 Herbert Street Technologies Ltd. A data transfer and management system
KR20010096814A (en) * 2000-04-14 2001-11-08 홍기융 Digital Signature Certificate Based Security Kernel Method for File System Protection
CN100490436C (en) * 2000-06-26 2009-05-20 英特尔公司 Establishing network security using internet protocol security policies
US7089302B1 (en) * 2000-08-30 2006-08-08 Mcafee, Inc. Method and system for maintaining a communications protocol session
EP1319281B1 (en) * 2000-09-11 2007-05-09 TransNexus, Inc. Clearinghouse server for internet telephony and multimedia communications
US7613917B1 (en) * 2000-09-18 2009-11-03 Navteq North America, Llc Method and system for mass distribution of geographic data for navigation systems
US6768942B1 (en) * 2000-09-18 2004-07-27 Navigation Technologies Corp. Navigation system with decryption functions and secure geographic database
TW546936B (en) * 2000-10-27 2003-08-11 Synq Technology Inc Data encrypting/decrypting system in client/server structure and the method thereof
US20030058274A1 (en) * 2000-11-17 2003-03-27 Jake Hill Interface device
US7660902B2 (en) * 2000-11-20 2010-02-09 Rsa Security, Inc. Dynamic file access control and management
EP1215589A3 (en) 2000-12-15 2006-05-31 Siemens Aktiengesellschaft Providing project data in a standardized meta-language format
DE10125383B4 (en) * 2000-12-15 2006-12-14 Siemens Ag Encryption of control programs
US7525956B2 (en) 2001-01-11 2009-04-28 Transnexus, Inc. Architectures for clearing and settlement services between internet telephony clearinghouses
US6978308B2 (en) * 2001-03-21 2005-12-20 International Business Machines Corporation System and method for nesting virtual private networking connections with coincident endpoints
US7526795B2 (en) * 2001-03-27 2009-04-28 Micron Technology, Inc. Data security for digital data storage
GB0114317D0 (en) * 2001-06-13 2001-08-01 Kean Thomas A Method of protecting intellectual property cores on field programmable gate array
US7849141B1 (en) * 2001-06-14 2010-12-07 Apple Inc. Training a computer storage system for automatic filing of data using graphical representations of storage locations
US7640305B1 (en) 2001-06-14 2009-12-29 Apple Inc. Filtering of data
FI115356B (en) * 2001-06-29 2005-04-15 Nokia Corp A method for processing audio-visual information in an electronic device, a system and an electronic device
US7844813B2 (en) * 2001-07-13 2010-11-30 Durward D. Dupre Method, system and process for data encryption and transmission
FR2828607B1 (en) * 2001-08-07 2004-01-30 Centre Nat Rech Scient METHOD FOR SECURING DATABASES
FI115257B (en) * 2001-08-07 2005-03-31 Nokia Corp Method for Processing Information in an Electronic Device, System, Electronic Device, and Processor Block
US7167982B2 (en) * 2001-09-14 2007-01-23 Lenovo (Singapore) Pte Ltd. Securing decrypted files in a shared environment
US6977745B2 (en) 2001-10-30 2005-12-20 Pitney Bowes Inc. Method and apparatus for the secure printing of a document
US8346733B2 (en) * 2006-12-22 2013-01-01 Commvault Systems, Inc. Systems and methods of media management, such as management of media to and from a media storage library
US20030105957A1 (en) * 2001-12-05 2003-06-05 International Business Machines Corporation Kernel-based security implementation
US7246233B2 (en) * 2001-12-05 2007-07-17 International Business Machines Corporation Policy-driven kernel-based security implementation
US7921450B1 (en) 2001-12-12 2011-04-05 Klimenty Vainstein Security system using indirect key generation from access rules and methods therefor
US7921288B1 (en) 2001-12-12 2011-04-05 Hildebrand Hal S System and method for providing different levels of key security for controlling access to secured items
US7930756B1 (en) 2001-12-12 2011-04-19 Crocker Steven Toye Multi-level cryptographic transformations for securing digital assets
US8065713B1 (en) 2001-12-12 2011-11-22 Klimenty Vainstein System and method for providing multi-location access management to secured items
US7260555B2 (en) 2001-12-12 2007-08-21 Guardian Data Storage, Llc Method and architecture for providing pervasive security to digital assets
USRE41546E1 (en) 2001-12-12 2010-08-17 Klimenty Vainstein Method and system for managing security tiers
US7783765B2 (en) 2001-12-12 2010-08-24 Hildebrand Hal S System and method for providing distributed access control to secured documents
US10033700B2 (en) 2001-12-12 2018-07-24 Intellectual Ventures I Llc Dynamic evaluation of access rights
US7380120B1 (en) 2001-12-12 2008-05-27 Guardian Data Storage, Llc Secured data format for access control
US7681034B1 (en) 2001-12-12 2010-03-16 Chang-Ping Lee Method and apparatus for securing electronic data
US7921284B1 (en) 2001-12-12 2011-04-05 Gary Mark Kinghorn Method and system for protecting electronic data in enterprise environment
US7565683B1 (en) 2001-12-12 2009-07-21 Weiqing Huang Method and system for implementing changes to security policies in a distributed security system
US10360545B2 (en) 2001-12-12 2019-07-23 Guardian Data Storage, Llc Method and apparatus for accessing secured electronic data off-line
US7178033B1 (en) 2001-12-12 2007-02-13 Pss Systems, Inc. Method and apparatus for securing digital assets
US7631184B2 (en) * 2002-05-14 2009-12-08 Nicholas Ryan System and method for imposing security on copies of secured items
US8006280B1 (en) 2001-12-12 2011-08-23 Hildebrand Hal S Security system for generating keys from access rules in a decentralized manner and methods therefor
US7478418B2 (en) * 2001-12-12 2009-01-13 Guardian Data Storage, Llc Guaranteed delivery of changes to security policies in a distributed system
US7950066B1 (en) 2001-12-21 2011-05-24 Guardian Data Storage, Llc Method and system for restricting use of a clipboard application
US8176334B2 (en) 2002-09-30 2012-05-08 Guardian Data Storage, Llc Document security system that permits external users to gain access to secured files
US8613102B2 (en) 2004-03-30 2013-12-17 Intellectual Ventures I Llc Method and system for providing document retention using cryptography
US7748045B2 (en) * 2004-03-30 2010-06-29 Michael Frederick Kenrich Method and system for providing cryptographic document retention with off-line access
KR20040099253A (en) * 2002-04-23 2004-11-26 마쯔시다덴기산교 가부시키가이샤 Server device and program management system
US7512810B1 (en) 2002-09-11 2009-03-31 Guardian Data Storage Llc Method and system for protecting encrypted files transmitted over a network
US7302566B2 (en) * 2002-09-13 2007-11-27 Wayne Yingling Internet security system
CN1322432C (en) * 2002-10-25 2007-06-20 国际商业机器公司 Safety system and method for medium content data file network distribution
US7836310B1 (en) 2002-11-01 2010-11-16 Yevgeniy Gutnik Security system that uses indirect password-based encryption
US7123974B1 (en) * 2002-11-19 2006-10-17 Rockwell Software Inc. System and methodology providing audit recording and tracking in real time industrial controller environment
US7890990B1 (en) 2002-12-20 2011-02-15 Klimenty Vainstein Security system with staging capabilities
US7480936B2 (en) * 2003-01-15 2009-01-20 Xerox Corporation Generic application architecture suitable for firewall traversal
US7370212B2 (en) 2003-02-25 2008-05-06 Microsoft Corporation Issuing a publisher use license off-line in a digital rights management (DRM) system
WO2004090740A1 (en) 2003-04-03 2004-10-21 Commvault Systems, Inc. System and method for dynamically sharing media in a computer network
WO2004090789A2 (en) 2003-04-03 2004-10-21 Commvault Systems, Inc. System and method for extended media retention
US8707034B1 (en) 2003-05-30 2014-04-22 Intellectual Ventures I Llc Method and system for using remote headers to secure electronic files
US7730543B1 (en) 2003-06-30 2010-06-01 Satyajit Nath Method and system for enabling users of a group shared across multiple file security systems to access secured files
US7774557B2 (en) * 2003-07-29 2010-08-10 Hewlett-Packard Development Company, L.P. Storage access system and method for image forming device
US7703140B2 (en) 2003-09-30 2010-04-20 Guardian Data Storage, Llc Method and system for securing digital assets using process-driven security policies
US8127366B2 (en) 2003-09-30 2012-02-28 Guardian Data Storage, Llc Method and apparatus for transitioning between states of security policies used to secure electronic documents
US7281274B2 (en) 2003-10-16 2007-10-09 Lmp Media Llc Electronic media distribution system
US20050086531A1 (en) * 2003-10-20 2005-04-21 Pss Systems, Inc. Method and system for proxy approval of security changes for a file security system
JP2005135032A (en) * 2003-10-28 2005-05-26 Toshiba Corp Network information setting method, network system and communication terminal device
US20050108333A1 (en) * 2003-10-31 2005-05-19 Martin Scholz Blocking input with delayed message
US20050138371A1 (en) * 2003-12-19 2005-06-23 Pss Systems, Inc. Method and system for distribution of notifications in file security systems
US7702909B2 (en) * 2003-12-22 2010-04-20 Klimenty Vainstein Method and system for validating timestamps
US6929507B2 (en) * 2003-12-30 2005-08-16 Huang Liang Precision Enterprise Co., Ltd. Coaxial connector structure
WO2005089147A2 (en) * 2004-03-11 2005-09-29 Transnexus, Inc. Method and system for routing calls over a packet switched computer network
JP2007536634A (en) * 2004-05-04 2007-12-13 フィッシャー−ローズマウント・システムズ・インコーポレーテッド Service-oriented architecture for process control systems
US7799273B2 (en) 2004-05-06 2010-09-21 Smp Logic Systems Llc Manufacturing execution system for validation, quality and risk assessment and monitoring of pharmaceutical manufacturing processes
US7444197B2 (en) 2004-05-06 2008-10-28 Smp Logic Systems Llc Methods, systems, and software program for validation and monitoring of pharmaceutical manufacturing processes
US7707427B1 (en) 2004-07-19 2010-04-27 Michael Frederick Kenrich Multi-level file digests
WO2006053084A2 (en) 2004-11-05 2006-05-18 Commvault Systems, Inc. Method and system of pooling storage devices
US20070130078A1 (en) * 2005-12-02 2007-06-07 Robert Grzesek Digital rights management compliance with portable digital media device
WO2006065789A2 (en) * 2004-12-13 2006-06-22 Transnexus, Inc. Method and system for securely authorizing anonymous peers of voip networks
US8238329B2 (en) 2005-12-13 2012-08-07 Transnexus, Inc. Method and system for securely authorizing VoIP interconnections between anonymous peers of VoIP networks
US8074069B2 (en) * 2005-02-24 2011-12-06 International Business Machines Corporation Reading a locked windows NFTS EFS encrypted computer file
US8725646B2 (en) 2005-04-15 2014-05-13 Microsoft Corporation Output protection levels
US20060265758A1 (en) 2005-05-20 2006-11-23 Microsoft Corporation Extensible media rights
US8621549B2 (en) * 2005-12-29 2013-12-31 Nextlabs, Inc. Enforcing control policies in an information management system
CN101001140B (en) * 2006-01-10 2010-08-18 中兴通讯股份有限公司 Flow control method
CN101000648B (en) * 2006-01-12 2010-05-26 鸿富锦精密工业(深圳)有限公司 Automatic encipher system and method for file
US7539783B2 (en) 2006-09-22 2009-05-26 Commvault Systems, Inc. Systems and methods of media management, such as management of media to and from a media storage library, including removable media
US8706976B2 (en) 2007-08-30 2014-04-22 Commvault Systems, Inc. Parallel access virtual tape library and drives
US8627052B2 (en) * 2008-04-14 2014-01-07 Dell Products, Lp System and method of enabling a function within a module configured to be used within an information handling system
US8392704B2 (en) * 2008-08-11 2013-03-05 International Business Machines Corporation Input/output control and efficiency in an encrypted file system
US20100070466A1 (en) 2008-09-15 2010-03-18 Anand Prahlad Data transfer techniques within data storage devices, such as network attached storage performing data migration
US20100180209A1 (en) * 2008-09-24 2010-07-15 Samsung Electronics Co., Ltd. Electronic device management method, and electronic device management system and host electronic device using the method
US9565207B1 (en) 2009-09-04 2017-02-07 Amazon Technologies, Inc. Firmware updates from an external channel
US8887144B1 (en) 2009-09-04 2014-11-11 Amazon Technologies, Inc. Firmware updates during limited time period
US10177934B1 (en) 2009-09-04 2019-01-08 Amazon Technologies, Inc. Firmware updates inaccessible to guests
US8214653B1 (en) 2009-09-04 2012-07-03 Amazon Technologies, Inc. Secured firmware updates
US8102881B1 (en) 2009-09-08 2012-01-24 Amazon Technologies, Inc. Streamlined guest networking in a virtualized environment
US8601170B1 (en) 2009-09-08 2013-12-03 Amazon Technologies, Inc. Managing firmware update attempts
US8971538B1 (en) 2009-09-08 2015-03-03 Amazon Technologies, Inc. Firmware validation from an external channel
US8300641B1 (en) 2009-09-09 2012-10-30 Amazon Technologies, Inc. Leveraging physical network interface functionality for packet processing
US8959611B1 (en) 2009-09-09 2015-02-17 Amazon Technologies, Inc. Secure packet management for bare metal access
US8640220B1 (en) 2009-09-09 2014-01-28 Amazon Technologies, Inc. Co-operative secure packet management
US8381264B1 (en) 2009-09-10 2013-02-19 Amazon Technologies, Inc. Managing hardware reboot and reset in shared environments
US8589680B2 (en) * 2010-04-07 2013-11-19 Apple Inc. System and method for synchronizing encrypted data on a device having file-level content protection
US8510552B2 (en) 2010-04-07 2013-08-13 Apple Inc. System and method for file-level data protection
US8788842B2 (en) 2010-04-07 2014-07-22 Apple Inc. System and method for content protection based on a combination of a user PIN and a device specific identifier
US8751799B2 (en) * 2010-05-20 2014-06-10 Absio Corporation Method and apparatus for providing content
US9244779B2 (en) 2010-09-30 2016-01-26 Commvault Systems, Inc. Data recovery operations, such as recovery from modified network data management protocol data
AU2013202553B2 (en) 2012-03-30 2015-10-01 Commvault Systems, Inc. Information management of mobile device data
US9069799B2 (en) 2012-12-27 2015-06-30 Commvault Systems, Inc. Restoration of centralized data storage manager, such as data storage manager in a hierarchical data storage system
KR101566142B1 (en) * 2014-10-21 2015-11-06 숭실대학교산학협력단 User Terminal and Method for Protecting Core Codes of Applications Using the same
US9928144B2 (en) 2015-03-30 2018-03-27 Commvault Systems, Inc. Storage management of data using an open-archive architecture, including streamlined access to primary data originally stored on network-attached storage and archived to secondary storage
US10101913B2 (en) 2015-09-02 2018-10-16 Commvault Systems, Inc. Migrating data to disk without interrupting running backup operations
US9769169B2 (en) * 2015-09-25 2017-09-19 Intel Corporation Secure sensor data transport and processing
CN106570431A (en) * 2016-10-24 2017-04-19 广东欧珀移动通信有限公司 File reading method and device
US10534725B2 (en) * 2017-07-25 2020-01-14 International Business Machines Corporation Computer system software/firmware and a processor unit with a security module
US10742735B2 (en) 2017-12-12 2020-08-11 Commvault Systems, Inc. Enhanced network attached storage (NAS) services interfacing to cloud storage
US11159552B2 (en) * 2018-05-04 2021-10-26 Citrix Systems, Inc. Systems and methods for an embedded browser
US11200548B2 (en) 2019-12-09 2021-12-14 Evan Chase Rose Graphical user interface and operator console management system for distributed terminal network
US11113665B1 (en) 2020-03-12 2021-09-07 Evan Chase Rose Distributed terminals network management, systems, interfaces and workflows
US10873578B1 (en) 2019-12-09 2020-12-22 Evan Chase Rose Biometric authentication, decentralized learning framework, and adaptive security protocols in distributed terminal network
US11593223B1 (en) 2021-09-02 2023-02-28 Commvault Systems, Inc. Using resource pool administrative entities in a data storage management system to provide shared infrastructure to tenants

Family Cites Families (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4315101A (en) 1979-02-05 1982-02-09 Atalla Technovations Method and apparatus for securing data transmissions
US5313521A (en) 1992-04-15 1994-05-17 Fujitsu Limited Key distribution protocol for file transfer in the local area network
JPH05298174A (en) * 1992-04-21 1993-11-12 Toshiba Corp Remote file access system
US5327563A (en) 1992-11-13 1994-07-05 Hewlett-Packard Method for locking software files to a specific storage device
US5584023A (en) 1993-12-27 1996-12-10 Hsu; Mike S. C. Computer system including a transparent and secure file transform mechanism
US5666411A (en) 1994-01-13 1997-09-09 Mccarty; Johnnie C. System for computer software protection
US5604803A (en) 1994-06-03 1997-02-18 Sun Microsystems, Inc. Method and apparatus for secure remote authentication in a public network
SE504085C2 (en) 1995-02-01 1996-11-04 Greg Benson Methods and systems for managing data objects in accordance with predetermined conditions for users
US5657390A (en) 1995-08-25 1997-08-12 Netscape Communications Corporation Secure socket layer application program apparatus and method
JPH09251426A (en) * 1996-01-10 1997-09-22 Hitachi Ltd File ciphering system and its control method, and cipher file reception system and its control method
JPH09282281A (en) * 1996-02-14 1997-10-31 Mitsubishi Electric Corp Method and system for data security
EP0794639A3 (en) * 1996-02-14 2001-01-31 Mitsubishi Denki Kabushiki Kaisha Data security method and system
EP0811561A1 (en) 1996-06-05 1997-12-10 The Procter & Gamble Company Multi-use controlled dosage sachet for liquid products
US6393569B1 (en) * 1996-12-18 2002-05-21 Alexander S. Orenshteyn Secured system for accessing application services from a remote station
KR19980050938A (en) * 1996-12-21 1998-09-15 양승택 How to Send Encrypted Documents on the Internet
JPH10326287A (en) 1997-05-23 1998-12-08 Mitsubishi Corp System and device for digital content management
US6381644B2 (en) * 1997-09-26 2002-04-30 Mci Worldcom, Inc. Integrated proxy interface for web based telecommunications network management
AU757557B2 (en) * 1997-11-13 2003-02-27 Intellectual Ventures I Llc File transfer system
US6385641B1 (en) * 1998-06-05 2002-05-07 The Regents Of The University Of California Adaptive prefetching for computer network and web browsing with a graphic user interface
US6493749B2 (en) * 1998-08-17 2002-12-10 International Business Machines Corporation System and method for an administration server

Also Published As

Publication number Publication date
AU776005B2 (en) 2004-08-19
ATE313110T1 (en) 2005-12-15
AU1481000A (en) 2000-08-24
DE60024696D1 (en) 2006-01-19
ES2254107T3 (en) 2006-06-16
EP1031909A3 (en) 2003-04-02
CN1269549A (en) 2000-10-11
HK1028466A1 (en) 2001-02-16
CN1209718C (en) 2005-07-06
US7617392B2 (en) 2009-11-10
US20100058055A1 (en) 2010-03-04
US6615349B1 (en) 2003-09-02
KR20000076701A (en) 2000-12-26
JP4616956B2 (en) 2011-01-19
EP1031909B1 (en) 2005-12-14
TW574641B (en) 2004-02-01
DE60024696T2 (en) 2006-08-24
KR100770421B1 (en) 2007-10-26
CA2299056C (en) 2010-05-04
US8943314B2 (en) 2015-01-27
JP2000259478A (en) 2000-09-22
NZ502871A (en) 2001-11-30
BR0000702B1 (en) 2014-09-02
BR0000702A (en) 2000-10-03
US20040025037A1 (en) 2004-02-05
EP1031909A2 (en) 2000-08-30
SG93860A1 (en) 2003-01-21

Similar Documents

Publication Publication Date Title
CA2299056A1 (en) A system and method for manipulating a computer file and/or program
CN101484902B (en) Device-independent management method and device of cryptographic information
EP1944905A1 (en) An encrypted transmission method and equipment system for preventing copying the data resource
GEP20094692B (en) Method of encrypting and transferring data between sender and receiver using network
WO2000060846A3 (en) Selective and renewable encryption for secure distribution of video on-demand
US7386717B2 (en) Method and system for accelerating the conversion process between encryption schemes
US20030061516A1 (en) Radio network system using multiple authentication servers with consistently maintained information
GB2404535B (en) Secure transmission of data within a distributed computer system
JPWO2006025241A1 (en) Data transmission device, data reception device, server, transmission / reception device, data sharing system, data transmission program, data reception program, data sharing program, data transmission / reception program, and computer-readable recording medium
JP2001237818A (en) Proxy encryption communication system and method, and recoding medium having program recorded thereon
JP2009060451A (en) Transmission apparatus, reception apparatus, content transmission/reception system, content transmission method, content reception method and program
TW201210295A (en) Communication system, communication device, communication method, and computer program
CN109474667B (en) Unmanned aerial vehicle communication method based on TCP and UDP
US20090300767A1 (en) Method for out of band license acquisition associated with content redistributed using link protection
JP2006186807A5 (en)
JP2003345664A (en) Transmission device, data processing system, and data processing program
KR100348611B1 (en) Encrypted apparatus and method for digital contents
JP2007194887A (en) Delivering method for equipment bound content, content storage device, and program
GB2486718A (en) Digital Rights Management with DRM-specific link layer encryption
IE20070421U1 (en) A method for restricting access to digital content
KR20130046467A (en) System for storing file
JP2005080245A (en) Information disclosure control method, information disclosure control system, communication apparatus, session control server and information disclosure control program
CA2674148A1 (en) Selective and renewable encryption for secure distribution of video on-demand

Legal Events

Date Code Title Description
EEER Examination request
MKEX Expiry

Effective date: 20200221