FI20000456A0 - A device and method for improving information security - Google Patents
A device and method for improving information securityInfo
- Publication number
- FI20000456A0 FI20000456A0 FI20000456A FI20000456A FI20000456A0 FI 20000456 A0 FI20000456 A0 FI 20000456A0 FI 20000456 A FI20000456 A FI 20000456A FI 20000456 A FI20000456 A FI 20000456A FI 20000456 A0 FI20000456 A0 FI 20000456A0
- Authority
- FI
- Finland
- Prior art keywords
- processor units
- processor
- workstation
- data networks
- public data
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/22—Arrangements for preventing the taking of data from a data transmission channel without authorisation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/03—Protocol definition or specification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Abstract
The invention relates to an arrangement and method for preventing unauthorised access to an information system via a network. A workstation according to the invention comprises at least two separate processor units (PA, PB) in one and the same housing and a switch unit (16). Part of the processor units (PA) are connected to public data networks. The other processor units (PB), which are not connected to public data networks, are used as work machines proper. The processor units in the workstation have got separate power supplies (21, 22), separate fixed disk drives (9, 10) and hardware interfaces for electrically isolating data transfer between the processor units. The processor units share a display (20), keyboard (18) and a mouse (19) with their associated interfaces. By means of a control switch (17) the user can select the processor unit to work with. In conjunction with the switch unit there is an indicator (23, 24) which indicates to the user the processor unit to which said devices are connected at any given time. An advantage of the invention is that the workstation, which can be connected to public data networks when needed, is secure against unauthorised access so one can safety work and save information on it. Information received from the network is transferred to the protected processor unit in an encrypted form on a diskette or printing paper, for example.
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FI20000456A FI109154B (en) | 1999-04-16 | 2000-02-28 | Device and method for improving data security |
AU39685/00A AU3968500A (en) | 1999-04-16 | 2000-04-12 | Arrangement and method to improve information security |
CA002370603A CA2370603A1 (en) | 1999-04-16 | 2000-04-12 | Arrangement and method to improve information security |
EP00918906A EP1196851A1 (en) | 1999-04-16 | 2000-04-12 | Arrangement and method to improve information security |
JP2000612827A JP2002542537A (en) | 1999-04-16 | 2000-04-12 | Hardware structure for improving information security, mobile terminal device, and method for improving information security of computer |
PCT/FI2000/000310 WO2000063778A1 (en) | 1999-04-16 | 2000-04-12 | Arrangement and method to improve information security |
HK02107464.0A HK1047325A1 (en) | 1999-04-16 | 2002-10-15 | Arrangement and method to improve information security |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FI990851 | 1999-04-16 | ||
FI990851A FI990851A0 (en) | 1999-04-16 | 1999-04-16 | Device and method for improving computer security in computers |
FI20000456A FI109154B (en) | 1999-04-16 | 2000-02-28 | Device and method for improving data security |
FI20000456 | 2000-02-28 |
Publications (3)
Publication Number | Publication Date |
---|---|
FI20000456A0 true FI20000456A0 (en) | 2000-02-28 |
FI20000456A FI20000456A (en) | 2000-10-16 |
FI109154B FI109154B (en) | 2002-05-31 |
Family
ID=26160733
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
FI20000456A FI109154B (en) | 1999-04-16 | 2000-02-28 | Device and method for improving data security |
Country Status (7)
Country | Link |
---|---|
EP (1) | EP1196851A1 (en) |
JP (1) | JP2002542537A (en) |
AU (1) | AU3968500A (en) |
CA (1) | CA2370603A1 (en) |
FI (1) | FI109154B (en) |
HK (1) | HK1047325A1 (en) |
WO (1) | WO2000063778A1 (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6578140B1 (en) * | 2000-04-13 | 2003-06-10 | Claude M Policard | Personal computer having a master computer system and an internet computer system and monitoring a condition of said master and internet computer systems |
DE10153402A1 (en) * | 2001-11-01 | 2003-05-15 | Kai Dorau | Method for secure exchange of electronic data in an online process, whereby access to the hard drive or storage unit is switched off when a processor has an online connection via a data line |
EP1811387A4 (en) | 2004-08-25 | 2016-04-13 | Nec Corp | Information communication device, and program execution environment control method |
WO2006134691A1 (en) | 2005-06-17 | 2006-12-21 | Nec Corporation | Information processing device, restoration device, program and restoration method |
AT502414B1 (en) * | 2005-09-20 | 2007-03-15 | Diaplan Elektronic Gmbh | SECURITY SYSTEM |
JP2010532588A (en) * | 2007-01-22 | 2010-10-07 | シモン ヨフェ | Security switch |
US10930452B2 (en) | 2018-06-29 | 2021-02-23 | Purism | Electronic kill and physical cover switch |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5144692A (en) * | 1989-05-17 | 1992-09-01 | International Business Machines Corporation | System for controlling access by first system to portion of main memory dedicated exclusively to second system to facilitate input/output processing via first system |
EP0794639A3 (en) * | 1996-02-14 | 2001-01-31 | Mitsubishi Denki Kabushiki Kaisha | Data security method and system |
-
2000
- 2000-02-28 FI FI20000456A patent/FI109154B/en not_active IP Right Cessation
- 2000-04-12 EP EP00918906A patent/EP1196851A1/en not_active Withdrawn
- 2000-04-12 AU AU39685/00A patent/AU3968500A/en not_active Abandoned
- 2000-04-12 CA CA002370603A patent/CA2370603A1/en not_active Abandoned
- 2000-04-12 JP JP2000612827A patent/JP2002542537A/en active Pending
- 2000-04-12 WO PCT/FI2000/000310 patent/WO2000063778A1/en not_active Application Discontinuation
-
2002
- 2002-10-15 HK HK02107464.0A patent/HK1047325A1/en unknown
Also Published As
Publication number | Publication date |
---|---|
FI109154B (en) | 2002-05-31 |
WO2000063778A1 (en) | 2000-10-26 |
EP1196851A1 (en) | 2002-04-17 |
FI20000456A (en) | 2000-10-16 |
JP2002542537A (en) | 2002-12-10 |
CA2370603A1 (en) | 2000-10-26 |
AU3968500A (en) | 2000-11-02 |
HK1047325A1 (en) | 2003-02-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB2336080A (en) | Optimized security functionality in an electronic system | |
AU2002302776A1 (en) | Recovery computer for a plurality of networked computers | |
WO2009001539A1 (en) | Information security device and information security system | |
ATE237841T1 (en) | FAULT TOLERANT DISTRIBUTED COMPUTER SYSTEM | |
AU3771489A (en) | Card-computer moderated systems | |
AU678937B2 (en) | Cryptographic data security in a secured computer system | |
AU2001274856A1 (en) | Evidence-based security policy manager | |
MY125905A (en) | Electronic access control system and method | |
SE524778C2 (en) | Procedure and arrangements for protecting software for unauthorized use or copying | |
EP0757826A1 (en) | Methods for monitoring a plurality of remote local units connected in a network and generating messages therefrom, and a device employed in said local units | |
GB0503823D0 (en) | System for realtime game network tracking | |
EE200400053A (en) | Method and system for processing data in an electronic device, electronic device and processing unit | |
EP0836131A3 (en) | Security of remote computing devices | |
GB9422389D0 (en) | Authenticating access control for sensitive functions | |
US20040148547A1 (en) | UPS-based file data storage apparatus and computer program products | |
JP2008269120A (en) | External storage device and method of preventing information leakage | |
WO2018164503A1 (en) | Context awareness-based ransomware detection | |
FI20000456A0 (en) | A device and method for improving information security | |
US8379858B2 (en) | Generating key information for mutual access among multiple computers | |
EP1064621A4 (en) | System and method for management of postage meter licenses | |
IL150035A0 (en) | Computer-readable medium with microprocessor to control reading and computer arranged to communicate with such a medium | |
CN108023732A (en) | A kind of data guard method, device, equipment and storage medium | |
CN204613932U (en) | A kind of computer data protection system | |
WO2000059286A3 (en) | Method and system for administrating context | |
SE0002302D0 (en) | Method and system for communication checking |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MA | Patent expired |