AU3525397A - A method for protecting data - Google Patents

A method for protecting data

Info

Publication number
AU3525397A
AU3525397A AU35253/97A AU3525397A AU3525397A AU 3525397 A AU3525397 A AU 3525397A AU 35253/97 A AU35253/97 A AU 35253/97A AU 3525397 A AU3525397 A AU 3525397A AU 3525397 A AU3525397 A AU 3525397A
Authority
AU
Australia
Prior art keywords
protecting data
protecting
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
AU35253/97A
Other versions
AU720583B2 (en
Inventor
Addison M. Fischer
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US08/154,520 external-priority patent/US5475826A/en
Application filed by Individual filed Critical Individual
Priority to AU35253/97A priority Critical patent/AU720583B2/en
Publication of AU3525397A publication Critical patent/AU3525397A/en
Application granted granted Critical
Publication of AU720583B2 publication Critical patent/AU720583B2/en
Anticipated expiration legal-status Critical
Expired legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/565Static detection by checking file integrity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
AU35253/97A 1993-11-19 1997-08-25 A method for protecting data Expired AU720583B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU35253/97A AU720583B2 (en) 1993-11-19 1997-08-25 A method for protecting data

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US08/154,520 US5475826A (en) 1993-11-19 1993-11-19 Method for protecting a volatile file using a single hash
US154520 1993-11-19
AU57783/94A AU5778394A (en) 1993-11-19 1994-03-15 A method for protecting a volatile file using a single hash
AU35253/97A AU720583B2 (en) 1993-11-19 1997-08-25 A method for protecting data

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
AU57783/94A Division AU5778394A (en) 1993-11-19 1994-03-15 A method for protecting a volatile file using a single hash

Publications (2)

Publication Number Publication Date
AU3525397A true AU3525397A (en) 1997-12-11
AU720583B2 AU720583B2 (en) 2000-06-08

Family

ID=25631766

Family Applications (1)

Application Number Title Priority Date Filing Date
AU35253/97A Expired AU720583B2 (en) 1993-11-19 1997-08-25 A method for protecting data

Country Status (1)

Country Link
AU (1) AU720583B2 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2512373A (en) * 2013-03-28 2014-10-01 Thunderhead Ltd Document tamper detection

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5121495A (en) * 1988-02-02 1992-06-09 Bell Communications Research, Inc. Methods and apparatus for information storage and retrieval utilizing hashing techniques

Also Published As

Publication number Publication date
AU720583B2 (en) 2000-06-08

Similar Documents

Publication Publication Date Title
AU7729694A (en) Method for inhibiting metalloproteinase expression
AU6398594A (en) De-skewer for serial data bus
AU3186595A (en) A configuration method for a data management system
AU7999794A (en) A protector for an elongate implement
AU7945294A (en) Stabiliser for a downhole apparatus
AU2398195A (en) A computer system
AU6889494A (en) A resequencying system
AU1390395A (en) A computer security system
AU3408589A (en) A data protection system
GB9320982D0 (en) A data processing system
AU7634494A (en) Diagnostic data acquisitioner for a valve
EP0709851A3 (en) Memory data protection for a ferroelectric memory
AU1378995A (en) Data link interface for packet-switched network
AU6684294A (en) A security system
AU6406794A (en) System for positioning a workpoint
AU4640297A (en) Method for feeding information into a computer
EP0897800B8 (en) A recording method
AU3910395A (en) Information system for a ship
AU6767094A (en) Method for assuring data integrity during a repeater transition
AU7205494A (en) System for locating a blind hole
AU1078095A (en) System for protecting a pitch or field
AU6858994A (en) A device for core drill
AU3525397A (en) A method for protecting data
GB9300337D0 (en) A data processing system
GB9317769D0 (en) A data processing system

Legal Events

Date Code Title Description
FGA Letters patent sealed or granted (standard patent)