Movatterモバイル変換


[0]ホーム

URL:


US20040193905A1 - System and method for providing secure transmission, search, and storage of data - Google Patents

System and method for providing secure transmission, search, and storage of data
Download PDF

Info

Publication number
US20040193905A1
US20040193905A1US10/825,308US82530804AUS2004193905A1US 20040193905 A1US20040193905 A1US 20040193905A1US 82530804 AUS82530804 AUS 82530804AUS 2004193905 A1US2004193905 A1US 2004193905A1
Authority
US
United States
Prior art keywords
encrypted
record
trigrams
database
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/825,308
Inventor
Yuval Lirov
Erez Lirov
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IndividualfiledCriticalIndividual
Priority to US10/825,308priorityCriticalpatent/US20040193905A1/en
Publication of US20040193905A1publicationCriticalpatent/US20040193905A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A system and method for securely transmitting, searching, and storing data. To ensure security on the client side of a communication network, the system and method double encrypt sensitive data and single encrypt non-sensitive data. The system and method also fuzzy searches for user information. Thus, it is possible to find the information for the user in a database knowing only a minimal amount of detail about that user. Privacy and security is provided without impeding performance or compromising any of the standard database search functionality. Capitalizing on the difference in privacy requirements between users, the number of keys required to access sensitive data is minimized by using a single key for each user (e.g., a patient) and two keys for other users (e.g., health care providers).

Description

Claims (13)

What is claimed is:
1. A system for generating and storing encrypted data, comprising:
a record database which includes a set of records;
a fuzzy signature database; and
an application server performing the following:
generating a first set of trigrams for each record of the records,
sorting the first set of trigrams for each record of the records,
generating signature vectors using the first set of trigrams,
wherein one of the signature vectors is assigned to a respective record residing in the record database,
encrypting the signature vectors using a key to generate encrypted vectors, wherein one of the encrypted vectors is assigned to the respective record, and
storing the encrypted vectors in the fuzzy signature database.
2. The system according toclaim 1, wherein the application server:
generates a second set of trigrams for a fuzzy query,
sorts the second set of trigrams,
computes a query vector using the second set of trigrams,
encrypts the query vector using the key to generate an encrypted fuzzy query vector, and
locates a particular vector of the encrypted vectors in the fuzzy signature database which substantially corresponds to the encrypted fuzzy query vector.
3. The system ofclaim 1, wherein the first set of trigrams is sorted alphabetically.
4. The system ofclaim 2, wherein the second set of trigrams is sorted alphabetically.
5. The system ofclaim 1, wherein the record database includes non-privileged user records and privileged user records.
6. The system ofclaim 2, wherein the key is a public key of a user.
7. A method for generating and storing encrypted data, comprising the steps of:
generating a first set of trigrams for each record of a record database, the record database including a plurality of records;
for each record of the records, sorting the first set of trigrams;
generating signature vectors using the first set of trigrams, wherein one of the signature vectors is assigned to a respective record of the records;
encrypting the signature vectors using a key to generate the encrypted vectors, wherein one of the encrypted vectors is assigned to the respective record; and
storing the encrypted vectors in a fuzzy signature database.
8. The method ofclaim 7, further comprising the steps of:
generating a second set of trigrams for a fuzzy query;
sorting the second set of trigrams;
computing a query vector using the second set of trigrams;
encrypting the query vector using the key to generate an encrypted fuzzy query vector; and
locating a particular vector of the encrypted vectors in the fuzzy signature database which substantially corresponds to the encrypted fuzzy query vector.
9. The method ofclaim 7, wherein for each record of the records, the first set of trigrams is sorted alphabetically.
10. The method ofclaim 8, wherein the second set of trigrams is sorted alphabetically.
11. The method ofclaim 7, wherein the records include non-privileged user records and privileged user records.
12. The method ofclaim 8, wherein the key is a public key of a user.
13. A machine-readable medium having stored thereon data representing sequences of instructions, the sequences of instructions including particular instructions which, when executed by a processor connected to a communication network, cause the processor to perform the steps of:
generating a first set of trigrams for each record of a record database, the record database including a plurality of records;
for each record of the records, sorting the first set of trigrams;
generating signature vectors using the first set of trigrams, wherein one of the signature vectors is assigned to a respective record of the records;
encrypting the signature vectors using a key to generate encrypted vectors, wherein one of the encrypted vectors is assigned to the respective record; and
storing the encrypted vectors in a fuzzy signature database.
US10/825,3081999-08-312004-04-16System and method for providing secure transmission, search, and storage of dataAbandonedUS20040193905A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US10/825,308US20040193905A1 (en)1999-08-312004-04-16System and method for providing secure transmission, search, and storage of data

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US09/388,025US6785810B1 (en)1999-08-311999-08-31System and method for providing secure transmission, search, and storage of data
US10/825,308US20040193905A1 (en)1999-08-312004-04-16System and method for providing secure transmission, search, and storage of data

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US09/388,025DivisionUS6785810B1 (en)1999-08-311999-08-31System and method for providing secure transmission, search, and storage of data

Publications (1)

Publication NumberPublication Date
US20040193905A1true US20040193905A1 (en)2004-09-30

Family

ID=32908227

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US09/388,025Expired - LifetimeUS6785810B1 (en)1999-08-311999-08-31System and method for providing secure transmission, search, and storage of data
US10/825,308AbandonedUS20040193905A1 (en)1999-08-312004-04-16System and method for providing secure transmission, search, and storage of data

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US09/388,025Expired - LifetimeUS6785810B1 (en)1999-08-311999-08-31System and method for providing secure transmission, search, and storage of data

Country Status (1)

CountryLink
US (2)US6785810B1 (en)

Cited By (58)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20040243823A1 (en)*2003-05-292004-12-02Moyer William C.Method and apparatus for determining access permission
US20050071657A1 (en)*2003-09-302005-03-31Pss Systems, Inc.Method and system for securing digital assets using time-based security criteria
US20050125254A1 (en)*2003-12-032005-06-09Roy SchoenbergKey maintenance method and system
US20050256742A1 (en)*2004-05-052005-11-17Kohan Mark EData encryption applications for multi-source longitudinal patient-level data integration
US20050268094A1 (en)*2004-05-052005-12-01Kohan Mark EMulti-source longitudinal patient-level data encryption process
US20060271482A1 (en)*2005-05-272006-11-30Yoshitaka BitoMethod, server and program for secure data exchange
US20070156691A1 (en)*2006-01-052007-07-05Microsoft CorporationManagement of user access to objects
US20070294539A1 (en)*2006-01-272007-12-20Imperva, Inc.Method and system for transparently encrypting sensitive information
US7478418B2 (en)2001-12-122009-01-13Guardian Data Storage, LlcGuaranteed delivery of changes to security policies in a distributed system
US20090077060A1 (en)*2007-09-192009-03-19James Gerald SermersheimTechniques for secure network searching
US7512810B1 (en)2002-09-112009-03-31Guardian Data Storage LlcMethod and system for protecting encrypted files transmitted over a network
US7555558B1 (en)2003-08-152009-06-30Michael Frederick KenrichMethod and system for fault-tolerant transfer of files across a network
US7562232B2 (en)2001-12-122009-07-14Patrick ZuiliSystem and method for providing manageability to security information for secured items
US7565683B1 (en)2001-12-122009-07-21Weiqing HuangMethod and system for implementing changes to security policies in a distributed security system
US7577838B1 (en)2002-12-202009-08-18Alain RossmannHybrid systems for securing digital assets
US7631184B2 (en)2002-05-142009-12-08Nicholas RyanSystem and method for imposing security on copies of secured items
US20100005319A1 (en)*2008-02-262010-01-07Dphi Acquisitions, Inc.Hardware protection for encrypted strings and protection of security parameters
US7681034B1 (en)2001-12-122010-03-16Chang-Ping LeeMethod and apparatus for securing electronic data
US7703140B2 (en)2003-09-302010-04-20Guardian Data Storage, LlcMethod and system for securing digital assets using process-driven security policies
US7707427B1 (en)2004-07-192010-04-27Michael Frederick KenrichMulti-level file digests
US7730543B1 (en)2003-06-302010-06-01Satyajit NathMethod and system for enabling users of a group shared across multiple file security systems to access secured files
US7729995B1 (en)2001-12-122010-06-01Rossmann AlainManaging secured files in designated locations
US7748045B2 (en)2004-03-302010-06-29Michael Frederick KenrichMethod and system for providing cryptographic document retention with off-line access
USRE41546E1 (en)2001-12-122010-08-17Klimenty VainsteinMethod and system for managing security tiers
US7836310B1 (en)2002-11-012010-11-16Yevgeniy GutnikSecurity system that uses indirect password-based encryption
US7890990B1 (en)2002-12-202011-02-15Klimenty VainsteinSecurity system with staging capabilities
US7921284B1 (en)2001-12-122011-04-05Gary Mark KinghornMethod and system for protecting electronic data in enterprise environment
US7921450B1 (en)2001-12-122011-04-05Klimenty VainsteinSecurity system using indirect key generation from access rules and methods therefor
US7921288B1 (en)2001-12-122011-04-05Hildebrand Hal SSystem and method for providing different levels of key security for controlling access to secured items
US7930756B1 (en)2001-12-122011-04-19Crocker Steven ToyeMulti-level cryptographic transformations for securing digital assets
US7950066B1 (en)2001-12-212011-05-24Guardian Data Storage, LlcMethod and system for restricting use of a clipboard application
US20110129089A1 (en)*2009-11-302011-06-02Electronics And Telecommunications Research InstituteMethod and apparatus for partially encoding/decoding data for commitment service and method of using encoded data
US7965983B1 (en)*2006-12-042011-06-21Sprint Spectrum L.P.Method and system for conveying medical information to a medical service person
US20110202764A1 (en)*2008-11-052011-08-18Jun FurukawaData reference system, database presentation/distribution system, and data reference method
US8006280B1 (en)2001-12-122011-08-23Hildebrand Hal SSecurity system for generating keys from access rules in a decentralized manner and methods therefor
US8065713B1 (en)2001-12-122011-11-22Klimenty VainsteinSystem and method for providing multi-location access management to secured items
US8127366B2 (en)2003-09-302012-02-28Guardian Data Storage, LlcMethod and apparatus for transitioning between states of security policies used to secure electronic documents
US8176334B2 (en)2002-09-302012-05-08Guardian Data Storage, LlcDocument security system that permits external users to gain access to secured files
USRE43906E1 (en)2001-12-122013-01-01Guardian Data Storage LlcMethod and apparatus for securing digital assets
US8543827B2 (en)2001-12-122013-09-24Intellectual Ventures I LlcMethods and systems for providing access control to secured data
US8613102B2 (en)2004-03-302013-12-17Intellectual Ventures I LlcMethod and system for providing document retention using cryptography
US20140075208A1 (en)*2009-03-042014-03-13Apple Inc.Data whitening for writing and reading data to and from a non-volatile memory
US8707034B1 (en)2003-05-302014-04-22Intellectual Ventures I LlcMethod and system for using remote headers to secure electronic files
US20150170192A1 (en)*2013-12-182015-06-18Carlos I. SantaellaCollaborative incentive campaign management computer system having campaign-oriented communication security controls and methods
US9355273B2 (en)2006-12-182016-05-31Bank Of America, N.A., As Collateral AgentSystem and method for the protection and de-identification of health care data
US9864880B1 (en)*2006-06-292018-01-09Google Inc.Data encryption and isolation
US9886558B2 (en)1999-09-202018-02-06Quintiles Ims IncorporatedSystem and method for analyzing de-identified health care data
US10033700B2 (en)2001-12-122018-07-24Intellectual Ventures I LlcDynamic evaluation of access rights
US20190130068A1 (en)*2017-10-272019-05-02Welch Allyn, Inc.Secure Patient Data in Medical Environments
US10360545B2 (en)2001-12-122019-07-23Guardian Data Storage, LlcMethod and apparatus for accessing secured electronic data off-line
CN110473599A (en)*2018-05-092019-11-19上海商汤智能科技有限公司Information processing method and device, electronic equipment and storage medium
CN110473622A (en)*2018-05-092019-11-19上海商汤智能科技有限公司Information processing method and device, electronic equipment and storage medium
WO2019183483A3 (en)*2018-03-232020-10-08Equifax Inc.Facilitating queries of encrypted sensitive data via encrypted variant data objects
CN112905669A (en)*2021-03-162021-06-04吴伟峰Rapid fuzzy query method for encrypted data
CN114287001A (en)*2019-08-262022-04-05皇家飞利浦有限公司Restricted full privacy conjunctive database queries for protecting user privacy and identity
US11501013B1 (en)2021-07-092022-11-15Sotero, Inc.Autonomous machine learning methods for detecting and thwarting malicious database access
US12032694B2 (en)2022-09-142024-07-09Sotero, Inc.Autonomous machine learning methods for detecting and thwarting ransomware attacks
US12061714B2 (en)2020-03-042024-08-13Sotero, Inc.System and methods for data encryption and application-agnostic querying of encrypted data

Families Citing this family (141)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7058817B1 (en)1999-07-022006-06-06The Chase Manhattan BankSystem and method for single sign on process for websites with multiple applications and services
WO2001033477A2 (en)1999-11-042001-05-10Jpmorgan Chase BankSystem and method for automated financial project management
US8571975B1 (en)1999-11-242013-10-29Jpmorgan Chase Bank, N.A.System and method for sending money via E-mail over the internet
US7124190B1 (en)*1999-12-212006-10-17Xerox CorporationMethod for verifying chronological integrity of an electronic time stamp
EP1128278B1 (en)*2000-02-232003-09-17SER Solutions, IncMethod and apparatus for processing electronic documents
US20050015608A1 (en)2003-07-162005-01-20Pkware, Inc.Method for strongly encrypting .ZIP files
US8230482B2 (en)*2000-03-092012-07-24Pkware, Inc.System and method for manipulating and managing computer archive files
US8959582B2 (en)2000-03-092015-02-17Pkware, Inc.System and method for manipulating and managing computer archive files
US7844579B2 (en)2000-03-092010-11-30Pkware, Inc.System and method for manipulating and managing computer archive files
US6879988B2 (en)*2000-03-092005-04-12PkwareSystem and method for manipulating and managing computer archive files
US7426530B1 (en)2000-06-122008-09-16Jpmorgan Chase Bank, N.A.System and method for providing customers with seamless entry to a remote server
US10185936B2 (en)2000-06-222019-01-22Jpmorgan Chase Bank, N.A.Method and system for processing internet payments
US8751248B2 (en)*2000-07-282014-06-10Visual Telecommunications Network, Inc.Method, apparatus, and medium using a master control file for computer software interoperability between disparate operating systems
US7137143B2 (en)2000-08-072006-11-14Ingrian Systems Inc.Method and system for caching secure web content
US20020091935A1 (en)*2000-08-112002-07-11Sony Corporation, A Corporation Of JapanStorage and retrieval of encrypted content on storage media
US9177828B2 (en)*2011-02-102015-11-03Micron Technology, Inc.External gettering method and device
US8335855B2 (en)2001-09-192012-12-18Jpmorgan Chase Bank, N.A.System and method for portal infrastructure tracking
US20020078347A1 (en)*2000-12-202002-06-20International Business Machines CorporationMethod and system for using with confidence certificates issued from certificate authorities
US7757278B2 (en)*2001-01-042010-07-13Safenet, Inc.Method and apparatus for transparent encryption
US7739298B1 (en)*2001-01-262010-06-15Apple Inc.Using a calculation expression to define and control access rights for records in a database
US7353387B2 (en)*2001-03-082008-04-01International Business Machines CorporationMethod and system for integrating encryption functionality into a database system
US7484092B2 (en)*2001-03-122009-01-27Arcot Systems, Inc.Techniques for searching encrypted files
AU2002252664A1 (en)*2001-04-132002-10-28First Genetic TrustMethods and systems for managing informed consent processes
US8849716B1 (en)2001-04-202014-09-30Jpmorgan Chase Bank, N.A.System and method for preventing identity theft or misuse by restricting access
US7272857B1 (en)*2001-04-202007-09-18Jpmorgan Chase Bank, N.A.Method/system for preventing identity theft or misuse by restricting access
WO2002099598A2 (en)2001-06-072002-12-12First Usa Bank, N.A.System and method for rapid updating of credit information
US7266839B2 (en)2001-07-122007-09-04J P Morgan Chase BankSystem and method for providing discriminated content to network users
US20030039362A1 (en)*2001-08-242003-02-27Andrea CalifanoMethods for indexing and storing genetic data
PT1288792E (en)2001-08-272012-02-29Bdgb Entpr Software SarlA method for automatically indexing documents
US7103576B2 (en)2001-09-212006-09-05First Usa Bank, NaSystem for providing cardless payment
JP3764665B2 (en)*2001-10-032006-04-12株式会社グラフィン A system to prevent leakage of confidential information required for computer-aided education and training
AU2002363138A1 (en)2001-11-012003-05-12First Usa Bank, N.A.System and method for establishing or modifying an account with user selectable terms
US7987501B2 (en)2001-12-042011-07-26Jpmorgan Chase Bank, N.A.System and method for single session sign-on
US7353383B2 (en)2002-03-182008-04-01Jpmorgan Chase Bank, N.A.System and method for single session sign-on with cryptography
US20180165441A1 (en)2002-03-252018-06-14Glenn Cobourn EverhartSystems and methods for multifactor authentication
US7246324B2 (en)2002-05-232007-07-17Jpmorgan Chase BankMethod and system for data capture with hidden applets
US7472171B2 (en)2002-06-212008-12-30Jpmorgan Chase Bank, National AssociationMethod and system for determining receipt of a delayed cookie in a client-server architecture
US8544084B2 (en)2002-08-192013-09-24Blackberry LimitedSystem and method for secure control of resources of wireless mobile communication devices
WO2004019182A2 (en)*2002-08-242004-03-04Ingrian Networks, Inc.Selective feature activation
US7058660B2 (en)2002-10-022006-06-06Bank One CorporationSystem and method for network-based project management
US8301493B2 (en)2002-11-052012-10-30Jpmorgan Chase Bank, N.A.System and method for providing incentives to consumers to share information
EP1563663B1 (en)2002-11-082008-10-01Research In Motion LimitedSystem and method of connection control for wireless mobile communication devices
US7418600B2 (en)*2003-03-132008-08-26International Business Machines CorporationSecure database access through partial encryption
US7685437B2 (en)*2003-05-302010-03-23International Business Machines CorporationQuery optimization in encrypted database systems
US7500111B2 (en)*2003-05-302009-03-03International Business Machines CorporationQuerying encrypted data in a relational database system
US20060149962A1 (en)*2003-07-112006-07-06Ingrian Networks, Inc.Network attached encryption
US7376838B2 (en)2003-07-172008-05-20Jp Morgan Chase BankMethod for controlled and audited access to privileged accounts on computer systems
US8190893B2 (en)2003-10-272012-05-29Jp Morgan Chase BankPortable security transaction protocol
US7421696B2 (en)2003-12-222008-09-02Jp Morgan Chase BankMethods and systems for managing successful completion of a network of processes
CN102355466B (en)2004-04-302016-01-20黑莓有限公司The system and method for deal with data transmission
US7519835B2 (en)2004-05-202009-04-14Safenet, Inc.Encrypted table indexes and searching encrypted tables
US7681042B2 (en)*2004-06-172010-03-16Eruces, Inc.System and method for dis-identifying sensitive information and associated records
US8312267B2 (en)2004-07-202012-11-13Time Warner Cable Inc.Technique for securely communicating programming content
US8266429B2 (en)2004-07-202012-09-11Time Warner Cable, Inc.Technique for securely communicating and storing programming material in a trusted domain
GB2422455A (en)*2005-01-242006-07-26Hewlett Packard Development CoSecuring the privacy of sensitive information in a data-handling system
US8185877B1 (en)2005-06-222012-05-22Jpmorgan Chase Bank, N.A.System and method for testing applications
US7614082B2 (en)2005-06-292009-11-03Research In Motion LimitedSystem and method for privilege management and revocation
US8577684B2 (en)*2005-07-132013-11-05Intellisist, Inc.Selective security masking within recorded speech utilizing speech recognition techniques
US7912906B2 (en)*2005-07-192011-03-22The Go Daddy Group, Inc.Generating PKI email accounts on a web-based email system
US8145707B2 (en)*2005-07-192012-03-27Go Daddy Operating Company, LLCSending digitally signed emails via a web-based email system
US8352742B2 (en)*2005-07-192013-01-08Go Daddy Operating Company, LLCReceiving encrypted emails via a web-based email system
US8799680B2 (en)*2005-09-152014-08-05Microsoft CorporationTransactional sealed storage
US8583926B1 (en)2005-09-192013-11-12Jpmorgan Chase Bank, N.A.System and method for anti-phishing authentication
US20070079386A1 (en)*2005-09-262007-04-05Brian MetzgerTransparent encryption using secure encryption device
US20070079140A1 (en)*2005-09-262007-04-05Brian MetzgerData migration
US7788499B2 (en)*2005-12-192010-08-31Microsoft CorporationSecurity tokens including displayable claims
GB2434887A (en)*2006-01-132007-08-08Deepnet Technologies LtdAccess control by encrypting stored data with a key based on a "fingerprint" of the device storing the data
US7581244B2 (en)*2006-01-252009-08-25Seiko Epson CorporationIMX session control and authentication
US8386768B2 (en)*2006-02-082013-02-26Safenet, Inc.High performance data encryption server and method for transparently encrypting/decrypting data
US7958091B2 (en)*2006-02-162011-06-07Ingrian Networks, Inc.Method for fast bulk loading data into a database while bypassing exit routines
US20070203852A1 (en)*2006-02-242007-08-30Microsoft CorporationIdentity information including reputation information
US8117459B2 (en)*2006-02-242012-02-14Microsoft CorporationPersonal identification information schemas
US8104074B2 (en)*2006-02-242012-01-24Microsoft CorporationIdentity providers in digital identity system
US20070285501A1 (en)*2006-06-092007-12-13Wai YimVideoconference System Clustering
US20080016156A1 (en)*2006-07-132008-01-17Sean MiceliLarge Scale Real-Time Presentation of a Network Conference Having a Plurality of Conference Participants
US8793490B1 (en)2006-07-142014-07-29Jpmorgan Chase Bank, N.A.Systems and methods for multifactor authentication
US8078880B2 (en)*2006-07-282011-12-13Microsoft CorporationPortable personal identity information
US20080091838A1 (en)*2006-10-122008-04-17Sean MiceliMulti-level congestion control for large scale video conferences
US7634540B2 (en)*2006-10-122009-12-15Seiko Epson CorporationPresenter view control system and method
US8520850B2 (en)2006-10-202013-08-27Time Warner Cable Enterprises LlcDownloadable security and protection methods and apparatus
US8379865B2 (en)*2006-10-272013-02-19Safenet, Inc.Multikey support for multiple office system
US8732854B2 (en)2006-11-012014-05-20Time Warner Cable Enterprises LlcMethods and apparatus for premises content distribution
US8407767B2 (en)*2007-01-182013-03-26Microsoft CorporationProvisioning of digital identity representations
US8087072B2 (en)*2007-01-182011-12-27Microsoft CorporationProvisioning of digital identity representations
US8621540B2 (en)2007-01-242013-12-31Time Warner Cable Enterprises LlcApparatus and methods for provisioning in a download-enabled system
US8689296B2 (en)*2007-01-262014-04-01Microsoft CorporationRemote access of digital identities
US20080289020A1 (en)*2007-05-152008-11-20Microsoft CorporationIdentity Tokens Using Biometric Representations
US8473735B1 (en)2007-05-172013-06-25Jpmorgan ChaseSystems and methods for managing digital certificates
FR2920559B1 (en)*2007-08-302011-07-01Xooloo DISTRIBUTED DATABASE
US20090132804A1 (en)*2007-11-212009-05-21Prabir PaulSecured live software migration
US8321682B1 (en)2008-01-242012-11-27Jpmorgan Chase Bank, N.A.System and method for generating and managing administrator passwords
AT506735B1 (en)*2008-04-232012-04-15Human Bios Gmbh DISTRIBUTED DATA STORAGE DEVICE
US8209313B2 (en)*2009-01-282012-06-26Rovi Technologies CorporationStructuring and searching data in a hierarchical confidence-based configuration
US9602864B2 (en)2009-06-082017-03-21Time Warner Cable Enterprises LlcMedia bridge apparatus and methods
US9866609B2 (en)2009-06-082018-01-09Time Warner Cable Enterprises LlcMethods and apparatus for premises content distribution
US9608826B2 (en)2009-06-292017-03-28Jpmorgan Chase Bank, N.A.System and method for partner key management
US9158833B2 (en)*2009-11-022015-10-13Harry UrbschatSystem and method for obtaining document information
US9213756B2 (en)*2009-11-022015-12-15Harry UrbschatSystem and method of using dynamic variance networks
US9152883B2 (en)*2009-11-022015-10-06Harry UrbschatSystem and method for increasing the accuracy of optical character recognition (OCR)
US8549322B2 (en)*2010-03-252013-10-01International Business Machines CorporationSecure data scanning method and system
US9906838B2 (en)2010-07-122018-02-27Time Warner Cable Enterprises LlcApparatus and methods for content delivery and message exchange across multiple content delivery networks
CA2813758C (en)*2010-10-082023-01-03Brian Lee MoffatPrivate data sharing system
EP2453631B1 (en)2010-11-152016-06-22BlackBerry LimitedData source based application sandboxing
US9497220B2 (en)2011-10-172016-11-15Blackberry LimitedDynamically generating perimeters
US9161226B2 (en)2011-10-172015-10-13Blackberry LimitedAssociating services to perimeters
US9613219B2 (en)2011-11-102017-04-04Blackberry LimitedManaging cross perimeter access
US8799227B2 (en)2011-11-112014-08-05Blackberry LimitedPresenting metadata from multiple perimeters
US8904171B2 (en)*2011-12-302014-12-02Ricoh Co., Ltd.Secure search and retrieval
US9369466B2 (en)2012-06-212016-06-14Blackberry LimitedManaging use of network resources
US9075955B2 (en)2012-10-242015-07-07Blackberry LimitedManaging permission settings applied to applications
US8656016B1 (en)2012-10-242014-02-18Blackberry LimitedManaging application execution and data access on a device
EP2731040B1 (en)2012-11-082017-04-19CompuGroup Medical SEComputer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method
US9565472B2 (en)2012-12-102017-02-07Time Warner Cable Enterprises LlcApparatus and methods for content transfer protection
US20140282786A1 (en)2013-03-122014-09-18Time Warner Cable Enterprises LlcMethods and apparatus for providing and uploading content to personalized network storage
US10368255B2 (en)2017-07-252019-07-30Time Warner Cable Enterprises LlcMethods and apparatus for client-based dynamic control of connections to co-existing radio access networks
US9066153B2 (en)2013-03-152015-06-23Time Warner Cable Enterprises LlcApparatus and methods for multicast delivery of content in a content delivery network
US9419957B1 (en)2013-03-152016-08-16Jpmorgan Chase Bank, N.A.Confidence-based authentication
US9178888B2 (en)2013-06-142015-11-03Go Daddy Operating Company, LLCMethod for domain control validation
US9521138B2 (en)2013-06-142016-12-13Go Daddy Operating Company, LLCSystem for domain control validation
US9313568B2 (en)2013-07-232016-04-12Chicago Custom Acoustics, Inc.Custom earphone with dome in the canal
US9118631B1 (en)2013-08-162015-08-25Google Inc.Mixing secure and insecure data and operations at server database
US10148726B1 (en)2014-01-242018-12-04Jpmorgan Chase Bank, N.A.Initiating operating system commands based on browser cookies
US9621940B2 (en)2014-05-292017-04-11Time Warner Cable Enterprises LlcApparatus and methods for recording, accessing, and delivering packetized content
US11540148B2 (en)2014-06-112022-12-27Time Warner Cable Enterprises LlcMethods and apparatus for access point location
US9935833B2 (en)2014-11-052018-04-03Time Warner Cable Enterprises LlcMethods and apparatus for determining an optimized wireless interface installation configuration
US9910655B1 (en)*2014-11-062018-03-06Accellion, Inc.Secure content platform software developer kit
US9986578B2 (en)2015-12-042018-05-29Time Warner Cable Enterprises LlcApparatus and methods for selective data network access
US9918345B2 (en)2016-01-202018-03-13Time Warner Cable Enterprises LlcApparatus and method for wireless network services in moving vehicles
US10038717B2 (en)*2016-02-292018-07-31Red Hat, Inc.Secure performance monitoring of remote application servers
US10492034B2 (en)2016-03-072019-11-26Time Warner Cable Enterprises LlcApparatus and methods for dynamic open-access networks
US10164858B2 (en)2016-06-152018-12-25Time Warner Cable Enterprises LlcApparatus and methods for monitoring and diagnosing a wireless network
EP3336718B1 (en)2016-12-162020-02-12CompuGroup Medical SEMethod for querying a database
EP3340071B1 (en)2016-12-232021-06-09CompuGroup Medical SEOffline preparation for bulk inserts
CA3054319A1 (en)*2017-02-272018-08-30Ivanti, Inc.Systems and methods for context-based mitigation of computer security risks
US10645547B2 (en)2017-06-022020-05-05Charter Communications Operating, LlcApparatus and methods for providing wireless service in a venue
US10638361B2 (en)2017-06-062020-04-28Charter Communications Operating, LlcMethods and apparatus for dynamic control of connections to co-existing radio access networks
EP3652635A4 (en)*2017-07-122021-07-14Material Security Inc. SYSTEMS AND PROCEDURES FOR THE PROTECTION OF CONTENT AND ACCOUNTS
WO2020003821A1 (en)*2018-06-292020-01-02ソニー株式会社Information processing system, information processing method, and information processing device
CN109471964B (en)*2018-10-232021-10-01三亚哈尔滨工程大学南海创新发展基地Synonym set-based fuzzy multi-keyword searchable encryption method
CN109885769A (en)*2019-02-222019-06-14内蒙古大学 An active recommendation system and device based on differential privacy algorithm
CN119675967B (en)*2024-12-192025-07-04苏州奥米伽网络科技有限公司 A file transmission protection method, system and device based on multiple encryption algorithms

Citations (28)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4531527A (en)*1982-04-231985-07-30Survival Technology, Inc.Ambulatory monitoring system with real time analysis and telephone transmission
US4588991A (en)*1983-03-071986-05-13Atalla CorporationFile access security method and means
US4712562A (en)*1985-01-081987-12-15Jacques J. OhayonOutpatient monitoring systems
US4758955A (en)*1985-07-191988-07-19Carson ChenHand-held spelling checker and method for reducing redundant information in the storage of textural material
US4838275A (en)*1985-11-291989-06-13Lee Arnold St JHome medical surveillance system
US5012411A (en)*1985-07-231991-04-30Charles J. PolicastroApparatus for monitoring, storing and transmitting detected physiological information
US5062143A (en)*1990-02-231991-10-29Harris CorporationTrigram-based method of language identification
US5313521A (en)*1992-04-151994-05-17Fujitsu LimitedKey distribution protocol for file transfer in the local area network
US5418951A (en)*1992-08-201995-05-23The United States Of America As Represented By The Director Of National Security AgencyMethod of retrieving documents that concern the same topic
US5553146A (en)*1993-08-161996-09-03Siemens AktiengesellschaftMethod for exchanging information between ISDN terminal equipment, that is, data terminals, terminals, or telecommunication systems
US5606315A (en)*1994-12-121997-02-25Delco Electronics Corp.Security method for protecting electronically stored data
US5649185A (en)*1991-03-011997-07-15International Business Machines CorporationMethod and means for providing access to a library of digitized documents and images
US5706365A (en)*1995-04-101998-01-06Rebus Technology, Inc.System and method for portable document indexing using n-gram word decomposition
US5772585A (en)*1996-08-301998-06-30Emc, IncSystem and method for managing patient medical records
US5802516A (en)*1993-11-031998-09-01Apple Computer, Inc.Method of controlling an electronic book for a computer system
US5832450A (en)*1993-06-281998-11-03Scott & White Memorial HospitalElectronic medical record using text database
US5845255A (en)*1994-10-281998-12-01Advanced Health Med-E-Systems CorporationPrescription management system
US5862223A (en)*1996-07-241999-01-19Walker Asset Management Limited PartnershipMethod and apparatus for a cryptographically-assisted commercial network system designed to facilitate and support expert-based commerce
US5864683A (en)*1994-10-121999-01-26Secure Computing CorporartionSystem for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights
US5868669A (en)*1993-12-291999-02-09First Opinion CorporationComputerized medical diagnostic and treatment advice system
US5903889A (en)*1997-06-091999-05-11Telaric, Inc.System and method for translating, collecting and archiving patient records
US5903721A (en)*1997-03-131999-05-11cha|Technologies Services, Inc.Method and system for secure online transaction processing
US5940507A (en)*1997-02-111999-08-17Connected CorporationSecure file archive through encryption key management
US6092202A (en)*1998-05-222000-07-18N*Able Technologies, Inc.Method and system for secure transactions in a computer system
US6105023A (en)*1997-08-182000-08-15Dataware Technologies, Inc.System and method for filtering a document stream
US6148342A (en)*1998-01-272000-11-14Ho; Andrew P.Secure database management system for confidential records using separately encrypted identifier and access request
US6230272B1 (en)*1997-10-142001-05-08Entrust Technologies LimitedSystem and method for protecting a multipurpose data string used for both decrypting data and for authenticating a user
US6658151B2 (en)*1999-04-082003-12-02Ricoh Co., Ltd.Extracting information from symbolically compressed document images

Patent Citations (28)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4531527A (en)*1982-04-231985-07-30Survival Technology, Inc.Ambulatory monitoring system with real time analysis and telephone transmission
US4588991A (en)*1983-03-071986-05-13Atalla CorporationFile access security method and means
US4712562A (en)*1985-01-081987-12-15Jacques J. OhayonOutpatient monitoring systems
US4758955A (en)*1985-07-191988-07-19Carson ChenHand-held spelling checker and method for reducing redundant information in the storage of textural material
US5012411A (en)*1985-07-231991-04-30Charles J. PolicastroApparatus for monitoring, storing and transmitting detected physiological information
US4838275A (en)*1985-11-291989-06-13Lee Arnold St JHome medical surveillance system
US5062143A (en)*1990-02-231991-10-29Harris CorporationTrigram-based method of language identification
US5649185A (en)*1991-03-011997-07-15International Business Machines CorporationMethod and means for providing access to a library of digitized documents and images
US5313521A (en)*1992-04-151994-05-17Fujitsu LimitedKey distribution protocol for file transfer in the local area network
US5418951A (en)*1992-08-201995-05-23The United States Of America As Represented By The Director Of National Security AgencyMethod of retrieving documents that concern the same topic
US5832450A (en)*1993-06-281998-11-03Scott & White Memorial HospitalElectronic medical record using text database
US5553146A (en)*1993-08-161996-09-03Siemens AktiengesellschaftMethod for exchanging information between ISDN terminal equipment, that is, data terminals, terminals, or telecommunication systems
US5802516A (en)*1993-11-031998-09-01Apple Computer, Inc.Method of controlling an electronic book for a computer system
US5868669A (en)*1993-12-291999-02-09First Opinion CorporationComputerized medical diagnostic and treatment advice system
US5864683A (en)*1994-10-121999-01-26Secure Computing CorporartionSystem for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights
US5845255A (en)*1994-10-281998-12-01Advanced Health Med-E-Systems CorporationPrescription management system
US5606315A (en)*1994-12-121997-02-25Delco Electronics Corp.Security method for protecting electronically stored data
US5706365A (en)*1995-04-101998-01-06Rebus Technology, Inc.System and method for portable document indexing using n-gram word decomposition
US5862223A (en)*1996-07-241999-01-19Walker Asset Management Limited PartnershipMethod and apparatus for a cryptographically-assisted commercial network system designed to facilitate and support expert-based commerce
US5772585A (en)*1996-08-301998-06-30Emc, IncSystem and method for managing patient medical records
US5940507A (en)*1997-02-111999-08-17Connected CorporationSecure file archive through encryption key management
US5903721A (en)*1997-03-131999-05-11cha|Technologies Services, Inc.Method and system for secure online transaction processing
US5903889A (en)*1997-06-091999-05-11Telaric, Inc.System and method for translating, collecting and archiving patient records
US6105023A (en)*1997-08-182000-08-15Dataware Technologies, Inc.System and method for filtering a document stream
US6230272B1 (en)*1997-10-142001-05-08Entrust Technologies LimitedSystem and method for protecting a multipurpose data string used for both decrypting data and for authenticating a user
US6148342A (en)*1998-01-272000-11-14Ho; Andrew P.Secure database management system for confidential records using separately encrypted identifier and access request
US6092202A (en)*1998-05-222000-07-18N*Able Technologies, Inc.Method and system for secure transactions in a computer system
US6658151B2 (en)*1999-04-082003-12-02Ricoh Co., Ltd.Extracting information from symbolically compressed document images

Cited By (90)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9886558B2 (en)1999-09-202018-02-06Quintiles Ims IncorporatedSystem and method for analyzing de-identified health care data
US7921450B1 (en)2001-12-122011-04-05Klimenty VainsteinSecurity system using indirect key generation from access rules and methods therefor
US7921284B1 (en)2001-12-122011-04-05Gary Mark KinghornMethod and system for protecting electronic data in enterprise environment
US8065713B1 (en)2001-12-122011-11-22Klimenty VainsteinSystem and method for providing multi-location access management to secured items
US10229279B2 (en)2001-12-122019-03-12Intellectual Ventures I LlcMethods and systems for providing access control to secured data
US10033700B2 (en)2001-12-122018-07-24Intellectual Ventures I LlcDynamic evaluation of access rights
US10769288B2 (en)2001-12-122020-09-08Intellectual Property Ventures I LlcMethods and systems for providing access control to secured data
US9542560B2 (en)2001-12-122017-01-10Intellectual Ventures I LlcMethods and systems for providing access control to secured data
US8266674B2 (en)2001-12-122012-09-11Guardian Data Storage, LlcMethod and system for implementing changes to security policies in a distributed security system
US8006280B1 (en)2001-12-122011-08-23Hildebrand Hal SSecurity system for generating keys from access rules in a decentralized manner and methods therefor
US7478418B2 (en)2001-12-122009-01-13Guardian Data Storage, LlcGuaranteed delivery of changes to security policies in a distributed system
US9129120B2 (en)2001-12-122015-09-08Intellectual Ventures I LlcMethods and systems for providing access control to secured data
US8341407B2 (en)2001-12-122012-12-25Guardian Data Storage, LlcMethod and system for protecting electronic data in enterprise environment
US8341406B2 (en)2001-12-122012-12-25Guardian Data Storage, LlcSystem and method for providing different levels of key security for controlling access to secured items
US7562232B2 (en)2001-12-122009-07-14Patrick ZuiliSystem and method for providing manageability to security information for secured items
US7565683B1 (en)2001-12-122009-07-21Weiqing HuangMethod and system for implementing changes to security policies in a distributed security system
US7930756B1 (en)2001-12-122011-04-19Crocker Steven ToyeMulti-level cryptographic transformations for securing digital assets
US7921288B1 (en)2001-12-122011-04-05Hildebrand Hal SSystem and method for providing different levels of key security for controlling access to secured items
US8918839B2 (en)2001-12-122014-12-23Intellectual Ventures I LlcSystem and method for providing multi-location access management to secured items
US10360545B2 (en)2001-12-122019-07-23Guardian Data Storage, LlcMethod and apparatus for accessing secured electronic data off-line
US7681034B1 (en)2001-12-122010-03-16Chang-Ping LeeMethod and apparatus for securing electronic data
USRE43906E1 (en)2001-12-122013-01-01Guardian Data Storage LlcMethod and apparatus for securing digital assets
US7913311B2 (en)2001-12-122011-03-22Rossmann AlainMethods and systems for providing access control to electronic data
US7729995B1 (en)2001-12-122010-06-01Rossmann AlainManaging secured files in designated locations
US8543827B2 (en)2001-12-122013-09-24Intellectual Ventures I LlcMethods and systems for providing access control to secured data
USRE41546E1 (en)2001-12-122010-08-17Klimenty VainsteinMethod and system for managing security tiers
US7950066B1 (en)2001-12-212011-05-24Guardian Data Storage, LlcMethod and system for restricting use of a clipboard application
US8943316B2 (en)2002-02-122015-01-27Intellectual Ventures I LlcDocument security system that permits external users to gain access to secured files
US9286484B2 (en)2002-04-222016-03-15Intellectual Ventures I LlcMethod and system for providing document retention using cryptography
US7631184B2 (en)2002-05-142009-12-08Nicholas RyanSystem and method for imposing security on copies of secured items
US7512810B1 (en)2002-09-112009-03-31Guardian Data Storage LlcMethod and system for protecting encrypted files transmitted over a network
US8307067B2 (en)2002-09-112012-11-06Guardian Data Storage, LlcProtecting encrypted files transmitted over a network
US8176334B2 (en)2002-09-302012-05-08Guardian Data Storage, LlcDocument security system that permits external users to gain access to secured files
USRE47443E1 (en)2002-09-302019-06-18Intellectual Ventures I LlcDocument security system that permits external users to gain access to secured files
US7836310B1 (en)2002-11-012010-11-16Yevgeniy GutnikSecurity system that uses indirect password-based encryption
US7577838B1 (en)2002-12-202009-08-18Alain RossmannHybrid systems for securing digital assets
US7890990B1 (en)2002-12-202011-02-15Klimenty VainsteinSecurity system with staging capabilities
US20040243823A1 (en)*2003-05-292004-12-02Moyer William C.Method and apparatus for determining access permission
US7444668B2 (en)*2003-05-292008-10-28Freescale Semiconductor, Inc.Method and apparatus for determining access permission
US8707034B1 (en)2003-05-302014-04-22Intellectual Ventures I LlcMethod and system for using remote headers to secure electronic files
US7730543B1 (en)2003-06-302010-06-01Satyajit NathMethod and system for enabling users of a group shared across multiple file security systems to access secured files
US7555558B1 (en)2003-08-152009-06-30Michael Frederick KenrichMethod and system for fault-tolerant transfer of files across a network
US20050071657A1 (en)*2003-09-302005-03-31Pss Systems, Inc.Method and system for securing digital assets using time-based security criteria
US8127366B2 (en)2003-09-302012-02-28Guardian Data Storage, LlcMethod and apparatus for transitioning between states of security policies used to secure electronic documents
US8739302B2 (en)2003-09-302014-05-27Intellectual Ventures I LlcMethod and apparatus for transitioning between states of security policies used to secure electronic documents
US8327138B2 (en)2003-09-302012-12-04Guardian Data Storage LlcMethod and system for securing digital assets using process-driven security policies
US7703140B2 (en)2003-09-302010-04-20Guardian Data Storage, LlcMethod and system for securing digital assets using process-driven security policies
US20050125254A1 (en)*2003-12-032005-06-09Roy SchoenbergKey maintenance method and system
US8613102B2 (en)2004-03-302013-12-17Intellectual Ventures I LlcMethod and system for providing document retention using cryptography
US7748045B2 (en)2004-03-302010-06-29Michael Frederick KenrichMethod and system for providing cryptographic document retention with off-line access
US8275850B2 (en)2004-05-052012-09-25Ims Software Services Ltd.Multi-source longitudinal patient-level data encryption process
WO2005109292A3 (en)*2004-05-052007-02-15Ims Health IncData encryption applications for multi-source longitudinal patient-level data integration
US20050256742A1 (en)*2004-05-052005-11-17Kohan Mark EData encryption applications for multi-source longitudinal patient-level data integration
US20050268094A1 (en)*2004-05-052005-12-01Kohan Mark EMulti-source longitudinal patient-level data encryption process
US8301896B2 (en)2004-07-192012-10-30Guardian Data Storage, LlcMulti-level file digests
US7707427B1 (en)2004-07-192010-04-27Michael Frederick KenrichMulti-level file digests
US20060271482A1 (en)*2005-05-272006-11-30Yoshitaka BitoMethod, server and program for secure data exchange
US20070156691A1 (en)*2006-01-052007-07-05Microsoft CorporationManagement of user access to objects
US20070294539A1 (en)*2006-01-272007-12-20Imperva, Inc.Method and system for transparently encrypting sensitive information
US8135948B2 (en)*2006-01-272012-03-13Imperva, Inc.Method and system for transparently encrypting sensitive information
US9864880B1 (en)*2006-06-292018-01-09Google Inc.Data encryption and isolation
US7965983B1 (en)*2006-12-042011-06-21Sprint Spectrum L.P.Method and system for conveying medical information to a medical service person
US9355273B2 (en)2006-12-182016-05-31Bank Of America, N.A., As Collateral AgentSystem and method for the protection and de-identification of health care data
US8010779B2 (en)2007-09-192011-08-30Novell Inc.Techniques for secure network searching
US8291213B2 (en)2007-09-192012-10-16Novell, Inc.Techniques for secure network searching
US20090077060A1 (en)*2007-09-192009-03-19James Gerald SermersheimTechniques for secure network searching
US9805186B2 (en)2008-02-262017-10-31Adobe Systems IncorporatedHardware protection for encrypted strings and protection of security parameters
US9003201B2 (en)*2008-02-262015-04-07David PohmHardware protection for encrypted strings and protection of security parameters
US20100005319A1 (en)*2008-02-262010-01-07Dphi Acquisitions, Inc.Hardware protection for encrypted strings and protection of security parameters
US8468346B2 (en)*2008-11-052013-06-18Nec CorporationData reference system, database presentation/distribution system, and data reference method
US20110202764A1 (en)*2008-11-052011-08-18Jun FurukawaData reference system, database presentation/distribution system, and data reference method
US8918655B2 (en)*2009-03-042014-12-23Apple Inc.Data whitening for writing and reading data to and from a non-volatile memory
US20140075208A1 (en)*2009-03-042014-03-13Apple Inc.Data whitening for writing and reading data to and from a non-volatile memory
KR101302135B1 (en)*2009-11-302013-09-16한국전자통신연구원Method and apparetus for encoding/decoding partial of data
US20110129089A1 (en)*2009-11-302011-06-02Electronics And Telecommunications Research InstituteMethod and apparatus for partially encoding/decoding data for commitment service and method of using encoded data
US20150170192A1 (en)*2013-12-182015-06-18Carlos I. SantaellaCollaborative incentive campaign management computer system having campaign-oriented communication security controls and methods
US10614914B2 (en)*2017-10-272020-04-07Welch Allyn, Inc.Secure patient data in medical environments
US20190130068A1 (en)*2017-10-272019-05-02Welch Allyn, Inc.Secure Patient Data in Medical Environments
US11816116B2 (en)2018-03-232023-11-14Equifax, Inc.Facilitating queries of encrypted sensitive data via encrypted variant data objects
WO2019183483A3 (en)*2018-03-232020-10-08Equifax Inc.Facilitating queries of encrypted sensitive data via encrypted variant data objects
US12254016B2 (en)2018-03-232025-03-18Equifax Inc.Facilitating queries of encrypted sensitive data via encrypted variant data objects
CN110473599A (en)*2018-05-092019-11-19上海商汤智能科技有限公司Information processing method and device, electronic equipment and storage medium
CN110473622A (en)*2018-05-092019-11-19上海商汤智能科技有限公司Information processing method and device, electronic equipment and storage medium
CN114287001A (en)*2019-08-262022-04-05皇家飞利浦有限公司Restricted full privacy conjunctive database queries for protecting user privacy and identity
US12061714B2 (en)2020-03-042024-08-13Sotero, Inc.System and methods for data encryption and application-agnostic querying of encrypted data
CN112905669A (en)*2021-03-162021-06-04吴伟峰Rapid fuzzy query method for encrypted data
US11501013B1 (en)2021-07-092022-11-15Sotero, Inc.Autonomous machine learning methods for detecting and thwarting malicious database access
US12223075B2 (en)2021-07-092025-02-11Sotero, Inc.Autonomous machine learning methods for detecting and thwarting malicious database access
US12032694B2 (en)2022-09-142024-07-09Sotero, Inc.Autonomous machine learning methods for detecting and thwarting ransomware attacks
US12346440B2 (en)2022-09-142025-07-01Sotero, Inc.Autonomous machine learning methods for detecting and thwarting ransomware attacks

Also Published As

Publication numberPublication date
US6785810B1 (en)2004-08-31

Similar Documents

PublicationPublication DateTitle
US6785810B1 (en)System and method for providing secure transmission, search, and storage of data
US7362868B2 (en)Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data
AU761680B2 (en)A secure database management system for confidential records
US8639947B2 (en)Structure preserving database encryption method and system
US7681042B2 (en)System and method for dis-identifying sensitive information and associated records
CN110489996B (en)Database data security management method and system
US6272632B1 (en)System and method for controlling access to a user secret using a key recovery field
US6874085B1 (en)Medical records data security system
US5956400A (en)Partitioned information storage systems with controlled retrieval
US11870898B2 (en)Split keys for wallet recovery
US8352999B1 (en)Method for managing data in a shared computing environment
US20080033960A1 (en)Database System Providing Encrypted Column Support for Applications
US20060053112A1 (en)Database System Providing SQL Extensions for Automated Encryption and Decryption of Column Data
US20030074564A1 (en)Encryption system for allowing immediate universal access to medical records while maintaining complete patient control over privacy
US20090240956A1 (en)Transparent encryption using secure encryption device
HK1217369A1 (en)Secure data parser method and system
Hacigümüş et al.Ensuring the integrity of encrypted databases in the database-as-a-service model
Stingl et al.Health records and the cloud computing paradigm from a privacy perspective
EP4057587B1 (en)Data storage and retrieval
CN118036077A (en)Data element circulation management method, system and server based on electronic notarization
TW515957B (en)A secure database management system for confidential records
RamarajHybrid Encryption Technique Using RSA with SHA-1 Algorithm in Data-At-Rest and Data-In-Motion Level
Calandrino et al.Private resource pairing
Kadhem et al.Mixed Encryption over Semi-Trusted Database

Legal Events

DateCodeTitleDescription
STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp