Unlock instant, AI-driven research and patent intelligence for your innovation.

Multiple Layers of Data Security

A technology of data and data objects, applied in digital data protection, electronic digital data processing, computer security devices, etc., can solve problems such as evasion

Active Publication Date: 2019-06-28
SAP AG
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

While traditional data security techniques such as passwords and digital rights management provide some data protection, these techniques can be circumvented

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multiple Layers of Data Security
  • Multiple Layers of Data Security
  • Multiple Layers of Data Security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] Embodiments may be discussed in a system to create and use secure data objects. In one embodiment, data may be encrypted using a key. From several functions that can be run on the data, one or more functions can be selected. The selected one or more functions may be associated with encrypted data. The selected function or functions may provide exclusive access to the data. A data structure may be created specifying conditions for access to one or more functions. Exclusive interfaces can be created that provide access to one or more functions. The interface may grant access to one or more functions upon determining that one or more of the conditions are met. In another embodiment, the interface may grant access to the one or more functions when it is determined that all conditions are met. Encrypted data, associated one or more functions, data structures and interfaces may be included within the object.

[0013] In an embodiment, software required to perform one or...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Data can be encrypted using the public key. You can select one or more functions from multiple functions that can be run on your data. The selected function or functions can be associated with encrypted data. The selected feature or features provide exclusive access to the data. Data structures can be created that specify conditions for access to one or more functions. Exclusive interfaces can be created that provide access to one or more functions. The interface may grant access to one or more functions upon determining that one or more of the conditions are met. Encrypted data, associated function(s), data structures, and the interface may be included within the object.

Description

technical field [0001] The present invention involves multiple layers of data security. Background technique [0002] Organizations often collaborate and share information to develop products and / or services. However, in some cases, the information that needs to be shared may be confidential (eg, intellectual property). As a result, organizations may be reluctant to share confidential information without being sure that it will not be misused. While traditional data security techniques such as passwords and digital rights management provide some data protection, these techniques can be circumvented. For example, password-protected data can be copied and distributed after initial extraction of the original data. Contents of the invention [0003] According to one aspect of the present invention, there is provided a computer-implemented method comprising: encrypting data by a computer processor using a key; selecting at least one function from a plurality of functions ope...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/62
CPCG06F21/602G06F21/60G06F21/62G06F21/6209G06F2221/2107G06F2221/2111G06F2221/2113G06F2221/2137
Inventor M.P.奇林斯基J.H.P.埃洛夫
Owner SAP AG