[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

IN2014CH01331A - - Google Patents

Download PDF

Info

Publication number
IN2014CH01331A
IN2014CH01331A IN1331CH2014A IN2014CH01331A IN 2014CH01331 A IN2014CH01331 A IN 2014CH01331A IN 1331CH2014 A IN1331CH2014 A IN 1331CH2014A IN 2014CH01331 A IN2014CH01331 A IN 2014CH01331A
Authority
IN
India
Prior art keywords
data
data records
random values
owner
actual values
Prior art date
Application number
Inventor
R Sravan
Paul Mithun
Saxena Dr Ashutosh
Original Assignee
Infosys Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Infosys Ltd filed Critical Infosys Ltd
Priority to IN1331CH2014 priority Critical patent/IN2014CH01331A/en
Priority to US14/635,867 priority patent/US9740726B2/en
Publication of IN2014CH01331A publication Critical patent/IN2014CH01331A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6272Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database by registering files or documents with a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2123Dummy operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The technique relates to a method and apparatus for dynamic destruction of data in a remote data storage platform. This involves receiving a first set of data records with random values and then updating the random values associated with the subsets of the first set of data records into actual values through one or more update operations. After sequential steps of updation, a second set of data records with actual values are obtained. After working of this data for a period of time the owner of the data again begins updating the actual values associated with the subset of the second set of data records into random values. When all the data records are updated to random values the owner of the data successfully ends the Service Level Agreement period. REF FIG: 1
IN1331CH2014 2014-03-13 2014-03-13 IN2014CH01331A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
IN1331CH2014 IN2014CH01331A (en) 2014-03-13 2014-03-13
US14/635,867 US9740726B2 (en) 2014-03-13 2015-03-02 Methods for dynamic destruction of data in a remote data storage platform and devices thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
IN1331CH2014 IN2014CH01331A (en) 2014-03-13 2014-03-13

Publications (1)

Publication Number Publication Date
IN2014CH01331A true IN2014CH01331A (en) 2015-09-18

Family

ID=54069184

Family Applications (1)

Application Number Title Priority Date Filing Date
IN1331CH2014 IN2014CH01331A (en) 2014-03-13 2014-03-13

Country Status (2)

Country Link
US (1) US9740726B2 (en)
IN (1) IN2014CH01331A (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108734022B (en) * 2018-04-03 2021-07-02 安徽师范大学 Privacy protection track data publishing method based on three-dimensional grid division
CN109634971B (en) * 2018-11-07 2024-01-23 平安科技(深圳)有限公司 Data updating method, device, equipment and computer readable storage medium

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7308543B2 (en) 2005-03-22 2007-12-11 International Business Machines Corporation Method and system for shredding data within a data storage subsystem
WO2007045968A2 (en) * 2005-10-18 2007-04-26 Pankaj Anand Method and system for storing files
US20070300031A1 (en) * 2006-06-22 2007-12-27 Ironkey, Inc. Memory data shredder
US8793457B2 (en) * 2007-01-22 2014-07-29 International Business Machines Corporation Method and system for policy-based secure destruction of data
JP5107833B2 (en) 2008-08-29 2012-12-26 株式会社日立製作所 Storage system and storage system control method
US8463991B2 (en) * 2010-09-28 2013-06-11 Pure Storage Inc. Intra-device data protection in a raid array

Also Published As

Publication number Publication date
US20150261964A1 (en) 2015-09-17
US9740726B2 (en) 2017-08-22

Similar Documents

Publication Publication Date Title
WO2017192007A3 (en) Block chain for supporting plurality of one-way functions for verification of blocks
SG11201809978SA (en) Method, system, computer system and storage medium of uploading blockchain data
ZA201901031B (en) Data storage, data check, and data linkage method and apparatus
ZA201904223B (en) Blockchain-based data storage and query method and device
GB201720669D0 (en) The distributed data storage system and method based on block chain
PH12017500510B1 (en) System, method and apparatus for updating a stored value card
MX2019010795A (en) Method of video coding using binary tree block partitioning.
WO2015178977A3 (en) In situ neural network co-processing
WO2015191746A8 (en) Systems and methods for a database of software artifacts
WO2014193529A3 (en) System and method for characterizing uncertainty in subterranean reservoir fracture networks
MX2016011207A (en) In-vehicle tutorial.
SA518390949B1 (en) Method for determining porosity associated with organic matter in a well or formation
SG10201803837VA (en) Blockchain system and data managing method using blockchain
MX356939B (en) Method and system for generating an advanced storage key in a mobile device without secure elements.
MX368137B (en) A network node, a wireless device and methods therein for handling radio access network (ran) context information in a wireless commmunications network.
GB2538927A (en) Methods and apparatus to identify media using hash keys
CL2016001866A1 (en) A method to build an advanced storage key on a mobile communication device.
IN2014MU00042A (en)
SA516380495B1 (en) Apparatus and Method for Continuous Down Hole Sand Screen Fill Removal
EP3699756A4 (en) Application program starting method and starting apparatus, and computer readable storage medium
SG10201912945UA (en) Storage and retrieval management system, storage and retrieval management method, and program
MY186887A (en) Calculation method for compressed air-flow rate, calculation device thereof, and storage medium
IN2014CH01331A (en)
SG11202006611TA (en) Mining method and device based on blockchain, and computer readable storage medium
EP3648109A4 (en) Forecasting device, forecasting method, storage medium stored with forecasting program, and genetic inference device