ATE112078T1 - Verfahren und anordnung zur überwachung von rechnermanipulationen. - Google Patents

Verfahren und anordnung zur überwachung von rechnermanipulationen.

Info

Publication number
ATE112078T1
ATE112078T1 AT92902319T AT92902319T ATE112078T1 AT E112078 T1 ATE112078 T1 AT E112078T1 AT 92902319 T AT92902319 T AT 92902319T AT 92902319 T AT92902319 T AT 92902319T AT E112078 T1 ATE112078 T1 AT E112078T1
Authority
AT
Austria
Prior art keywords
computers
arrangements
monitoring computer
alarm
attributes
Prior art date
Application number
AT92902319T
Other languages
German (de)
English (en)
Inventor
Rainer Glaschick
Original Assignee
Siemens Nixdorf Inf Syst
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Siemens Nixdorf Inf Syst filed Critical Siemens Nixdorf Inf Syst
Application granted granted Critical
Publication of ATE112078T1 publication Critical patent/ATE112078T1/de

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/565Static detection by checking file integrity
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/32Monitoring with visual or acoustical indication of the functioning of the machine
    • G06F11/324Display of status information
    • G06F11/327Alarm or error message display
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • H04L43/0817Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer And Data Communications (AREA)
  • Burglar Alarm Systems (AREA)
  • Alarm Systems (AREA)
AT92902319T 1991-01-16 1992-01-14 Verfahren und anordnung zur überwachung von rechnermanipulationen. ATE112078T1 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
DE4101141A DE4101141C1 (enExample) 1991-01-16 1991-01-16

Publications (1)

Publication Number Publication Date
ATE112078T1 true ATE112078T1 (de) 1994-10-15

Family

ID=6423123

Family Applications (1)

Application Number Title Priority Date Filing Date
AT92902319T ATE112078T1 (de) 1991-01-16 1992-01-14 Verfahren und anordnung zur überwachung von rechnermanipulationen.

Country Status (6)

Country Link
EP (1) EP0567492B1 (enExample)
AT (1) ATE112078T1 (enExample)
DE (1) DE4101141C1 (enExample)
DK (1) DK0567492T3 (enExample)
ES (1) ES2059211T3 (enExample)
WO (1) WO1992013307A1 (enExample)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6973305B2 (en) 2003-09-10 2005-12-06 Qualcomm Inc Methods and apparatus for determining device integrity
EP2591437B1 (en) * 2010-07-09 2018-11-14 BlackBerry Limited Microcode-based challenge/response process

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4262329A (en) * 1978-03-27 1981-04-14 Computation Planning, Inc. Security system for data processing
ATE31827T1 (de) * 1983-10-13 1988-01-15 Josef Seifert Verfahren zum schutz von auf maschinenlesbaren datentraegern aufgezeichneten programmen vor unerlaubter einsichtnahme und unerlaubtem kopieren.
GB8704883D0 (en) * 1987-03-03 1987-04-08 Hewlett Packard Co Secure information storage
EP0304033A3 (de) * 1987-08-19 1990-07-04 Siemens Aktiengesellschaft Verfahren zum Diagnostizieren einer von Computerviren befallenen Datenverarbeitungsanlage
DE3736760A1 (de) * 1987-10-30 1989-05-11 Trans Tech Team Immobilien Gmb Verfahren zur verhinderung der verbreitung von computerviren
DE3817484A1 (de) * 1988-05-21 1989-11-30 Thomas Prof Beth Verfahren und schaltungsanordnung zur identifikation und echtheitspruefung aller arten von spezifischen merkmalen
US4975950A (en) * 1988-11-03 1990-12-04 Lentz Stephen A System and method of protecting integrity of computer data and software

Also Published As

Publication number Publication date
EP0567492A1 (de) 1993-11-03
DE4101141C1 (enExample) 1992-07-02
ES2059211T3 (es) 1994-11-01
WO1992013307A1 (de) 1992-08-06
EP0567492B1 (de) 1994-09-21
DK0567492T3 (da) 1995-01-09

Similar Documents

Publication Publication Date Title
ATE160034T1 (de) Verwaltungssystem für verbundene einheiten in einem verteilten rechnersystem
EP0594324A3 (en) Anti-theft arrangement with force-sensitive detector and alarm in the event of unauthorized manipulation.
FR2638869B1 (fr) Dispositif de securite contre la detection non autorisee de donnees protegees
ATE42849T1 (de) Vorrichtung zur sicherung geheimer informationen.
SE8500652D0 (sv) Security tag detection system
FR1466633A (fr) Dispositif d'emmagasinage et de restitution de données
ATE112078T1 (de) Verfahren und anordnung zur überwachung von rechnermanipulationen.
US3992672A (en) Multiple channel coincidence detector and controller for microseismic data analysis
FR2344893B1 (fr) Dispositif d'informatique destine a faciliter la reprise d'un programme apres une interruption
KR900018856A (ko) 관계형 데이터 검색장치
JPS55139673A (en) Mount state supervisory system of floppy disk unit
FR1432566A (fr) Dispositif d'interrogation et de détection d'une unité d'emmagasinage de données
Tosi et al. Call for Studies in Computer Use.
KR890005621A (ko) 인쇄회로 어셈블리를 트랙킹하고 식별하기 위한 장치 및 방법
PEW et al. Critical review and analysis of performance models applicable to manmachine systems evaluation[Interim Scientific Report, 1 Oct. 1975- 30 Sep. 1976]
Myers et al. Application of geographic information system to management of the Penn State University experimental forest
TEMPLETON Software data collection study. Volume 4: Data management system interface[Final Technical Report, Jun. 1975- Jun. 1976]
ROGERS et al. Residual acceleration data on IML-1: Development of a data reduction and dissemination plan(Semiannual Progress Report No. 5, 1 Mar.- 31)(Aug. 1991)
Griffin Intelligent information retrieval from on-line technical documentation
Schwarz Risk aversion, investment horizons, and heterogeneous information: an experimental investigation into the variability of asset prices
JPS649552A (en) Illegal use preventing system for external storage medium
Bequai What to do about crime in the electronic office.
SUBAS Data base organization: An access and storage method[Ph. D. Thesis]
Schweitzer Security risks in the automated office
HSIEH et al. Persistent data/knowledge base(Final Report, Oct. 1988- Dec. 1990)

Legal Events

Date Code Title Description
EEIH Change in the person of patent owner
REN Ceased due to non-payment of the annual fee