EP1245094A2 - Dispositif de maniement, protege par un mot de passe, d'un document electronique - Google Patents

Dispositif de maniement, protege par un mot de passe, d'un document electronique

Info

Publication number
EP1245094A2
EP1245094A2 EP00991268A EP00991268A EP1245094A2 EP 1245094 A2 EP1245094 A2 EP 1245094A2 EP 00991268 A EP00991268 A EP 00991268A EP 00991268 A EP00991268 A EP 00991268A EP 1245094 A2 EP1245094 A2 EP 1245094A2
Authority
EP
European Patent Office
Prior art keywords
unit
password
key
data
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP00991268A
Other languages
German (de)
English (en)
Inventor
Erland Wittkötter
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WITTKOETTER, ERLAND
Original Assignee
BRAINSHIELD TM TECHNOLOGIES Inc
Wittkotter Erland
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BRAINSHIELD TM TECHNOLOGIES Inc, Wittkotter Erland filed Critical BRAINSHIELD TM TECHNOLOGIES Inc
Publication of EP1245094A2 publication Critical patent/EP1245094A2/fr
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2127Bluffing

Definitions

  • the present invention relates to a device according to the preamble of claims 1 and 6 and a corresponding method.
  • This technology is known in the form of an encryption system and usually consists of an encryption unit for producing an encrypted document and thus secured against unauthorized access, as well as a decryption unit or password checking unit that prompts for input or electrical merging with the correct key restores the original, open document.
  • the object of the present invention is to overcome this lack of security and to improve the security of existing encryption devices and encryption methods.
  • the aim of the present invention is to prevent a hacker from attempting any number of access attempts until the true, open content of the document to be protected is ultimately available to him.
  • the object is achieved by the device having the features of claim 1, claim 6 and corresponding methods; advantageous developments of the invention are described in the subclaims. Independent protection within the scope of the invention is also for use regarding access or Log-in procedure used, such as could be useful when starting the operating system or when calling up user (text or similar) files.
  • the invention achieves an uncertainty effect on the part of an illegally accessing (unauthorized) user, namely in that an improper entry of a password leads to a reaction of the functional unit and, typically, this reaction by the unauthorized user as an intended reaction (function) is recognized. Accordingly, he will then stop further unauthorized access attempts.
  • the present invention relates to password-protected access to an electronic document encrypted in the manner described, the general password concept being based on the majority of passwords Keys (first key or the at least second key) is applied.
  • the probability is that the hacker will gain access during his unauthorized attempts comes a decision result that is not equal to the original amount of data, so that the security effect of the present invention is supported accordingly.
  • the diffusivity or non-recognizability achieved with the present invention as to whether the result of the decision actually corresponds to the correct, original amount of data thus opens up a completely new dimension in data backup.
  • the present invention is particularly advantageously further developed in that an authorized or unauthorized user does not directly enter the key (or linked via electronic operations), but rather a password, which typically consists of only a few elements and thus, for example, can also be easily recognized, or access control and control instrument, together with a suitable unit, which is then linked to the first or second key via the key file provided for further training, and which is then used in the decryption unit for decryption.
  • Such a key file which thus determines an assignment between the passwords to be entered by the user and the keys actually to be used, makes it possible to provide a large number of passwords, to assign them to one or more of the second key and in particular also to allow passwords to be predetermined in advance, which lead to the correct (ie first key) or to the only formally correct, but incorrect in terms of content (ie second key) result; this seems particularly appropriate for those application cases in which it is already conceivable which passwords a hacker would typically use to make an unauthorized access attempt, and such passwords, as expected, could automatically be used in advance for the second key and thus the only formally correct decision result were assigned (with the effect that the hacker would then probably interpret this as an already correct decryption attempt and thus stop further decryption attempts).
  • the password and the key file is formed in such a way that a password entry triggers an indirect assignment operation, for example a jump in the key file formed as a table, so that the options for flexible password and key assignment can also be expanded.
  • the information components of an electronic document according to the invention have meaning meaningful to the user and are realized as written words, numerical values, single images, film and / or sound sequences or frames or combinations thereof, the grammar em Written words, numerical values, single images, film or sound sequences or frames form the underlying system of the formal structure.
  • a further preferred development of the invention also provides means for the inventive aspect of storing a or password-protected access to an electronic document, which are used to assign a plurality of passwords in an n: 1 relationship for the second key and / or Means for specifying at least one password by the user are provided by input into the key file unit.
  • manipulation unit is assigned a random control unit according to the specific implementation of the encryption unit provided for the further development, which is used to interchange, remove, add and / or exchange the individual unit of information and / or sequence (s) by the manipulation unit ) of Controls information components randomly, in particular not reproducibly.
  • the manipulation unit is assigned an encryption parameter unit which is designed to store and / or set predetermined parameters for the exchange, removal, addition and / or exchange by the manipulation unit, in particular with regard to The depth of encryption achieved by the number of exchanges, removals, additions and / or exchanges.
  • the manipulation unit is also followed by a conversion unit which is designed to generate an electronically transferable volume file from the encrypted data set as an encrypted form of the electronic document and a preferably actively executable program and / or script file from the key data set as a reconstruction file.
  • FIG. 1 a schematic block diagram of the device according to the invention in accordance with a first embodiment
  • Fig. 4 a schematic block diagram of the functional components of the cryptographic unit 10 m Fig. 1 and
  • a encryption unit 10 is designed in the manner shown in FIG. 1 with an input unit 12 for original data, in the present case data of an internal reporting system with financial data.
  • Data to be encrypted is sent to the encryption unit 10 via the unit 12 (additionally or alternatively implemented as a data storage unit), which then generates an encrypted amount of data (encrypted file) and stores this data storage unit 14.
  • the key file required for correct decryption is simultaneously n a final stored file unit 16, and a password with which a user can access the correct key file (hereinafter also referred to as the first key) is given to the user by means of a password interface or output unit (18) in a suitable manner, eg. B. by display, printout, Em or predefined by the user or the like. , communicates.
  • a subsequent decryption unit 22 accesses the key file unit 16 with this password, and receives the correct decryption file (the first key), then carries out the decryption process on the encrypted document (ie the corresponding data record) stored in the data storage unit 14 and outputs the correct, decrypted result via a suitable output unit 24, e.g. B. a screen, printer or the like, the user.
  • a suitable output unit 24 e.g. B. a screen, printer or the like
  • the encryption unit 10 performs an encryption operation on the original data to be encrypted (the original data set), which involves exchanging and / or removing an information component from the original data set, adding an information component to a predetermined position m of the original data set or else There is an exchange of an information component for an information component that is not usually contained in the original data set.
  • This process which is also to be cezeicnnet in the following as semantic encryption, is m the international patent application PCT / EP 00/06824 described as a method for encrypting an electronically stored, original amount of data and with regard to the generation of the key or decryption described there should be considered as fully included in the present application description as belonging to the invention.
  • FIGS. 2 and 3 show an original file or the result of a correct decryption of a semantically encrypted original file
  • FIG. 3 shows a corresponding data record of how it can be the result of a semantic encryption: as the comparison of FIGS. 2 and 3, the respective data records that describe a transaction process in the internal, company-specific information system of the exemplary embodiment are each a booking process that can still be recognized as a booking process even after encryption (FIG. 3)
  • the various data contents have been modified: Both the date and date can be recognized, but the content differs from the original date of Fig. 2.
  • the device according to FIG. 1, and there in particular the encryption unit 10, has the property of generating at least one encrypted data record according to FIG. 3, which, as explained above, does by its own Form corresponds to a correctly decrypted or original result, but is different in content from it and is therefore unusable for the user (or an unauthorized accesser); Without further checking measures, however, the accessing party is not able to determine whether the data record in FIG. 3 is actually a decryption that is correct in terms of content.
  • At least one encryption result is generated, which is still encrypted in terms of content, but is formally and structurally an unauthorized accessing party It is not allowed to determine whether the correct result is actually available without checking the content.
  • This technical measure is used in the context of the present invention in order to increase the security of the encryption system shown in FIG. 1: by performing the encryption process, the encryption unit 10 generates the first key (which enables the original data record according to FIG. 2 to be restored). and additionally generates at least one second key, which leads to a decryption result according to FIG. 3, the decryption result shown in FIG. 3 can induce an unauthorized accessor to refrain from further decryption or access attempts, on the assumption that it is actually a question of a decision the result he wanted.
  • first and second keys can already be considered as passwords in the context of the present invention
  • a key file A for Fig. 2) or B (for Fig. 3) would contain all the information and operations that are necessary for the restoration or production of the respective formally equivalent data records, such as the exchanged terms, index information for an order shift etc., so that immediate handling of the keys (or key files), e.g. B. in the form of character strings is not very practical.
  • Table 1 shows that one assigns the respective key files A (for the correct decryption according to FIG. 2) or B (for the only formally correct decryption according to FIG. 3, which does not lead to content) in the form of a password four-digit number, handling is significantly easier for the user, since he only needs to remember the respective password:
  • the encryption unit 10 generates a correct key file A, to which the password "7123", to be entered in the transmission unit 20, is assigned.
  • the encryption unit 10 generates four further passwords (or these are entered by the user in a suitable manner), each of which is assigned the key file B, with the effect that when the number sequence “1302” is entered, the decryption unit 22 the result shown in FIG. 3.
  • a variant of this edition of the decryption result could be that the recognizability of the wrong or unusable decryption result lies in a special form, design or labeling of the decryption result that is known to the user as such; Examples include a special coloring of an output document, an arrangement of an image or a graphic element of a certain position, an acoustic signal or the like.
  • a further training option or preferred variant of this exemplary embodiment is not to explicitly specify predetermined (preselected) passwords, but rather to use them appropriately from an electronically available (typically extensive) selection list, for example a dictionary, and to take them into account as set passwords. This then had the consequence that, for example, in the case of a large number of improper access attempts also based on an electronic directory (dictionary), the reaction provided for in accordance with the invention, namely the drawing of the second function mode, can be reacted to at short notice, whereupon to be expected is that the abuser stops hacking.
  • Another possibility of further developing this inventive idea, but also the previous general inventive idea, is to parameterize, preferably randomly, parameterize a large number of set passwords (second passwords within the scope of the invention), so that this additional measure also enables Possibility is created that passwords provided as second passwords within the scope of the invention nevertheless do not lead to a function triggering or to an error message or the like.
  • the system eme fuzzy in accordance with the invention is generated automatically by the fact that adjacent characters of this character string, eg , B. "8123”, “7234", “7122” etc., automatically "B” is assigned as a key file. This measure can also effectively increase the security of traditional password-protected data access.
  • FIG. 4 shows a schematic block diagram representation of the structure of the encryption unit 10 as a key generation and administration unit with the associated functional components within the scope of the present invention, which can be used to protect electronic electronics using the semantic encryption technology according to the invention Convert documents into the protected data set (volume file) and associated keys (key files or key data sets).
  • the embodiment described in connection with FIG. 4 makes it possible within the scope of the invention not only to generate only a set of key data (which leads to the original, correct amount of data when restoring), but also a plurality of key data sets, so that this aspect of the The presence of a plurality of possible keys (one of which in turn also leads to the correct result in terms of content, and not only correctable in terms of schema) the security of the present invention can be realized.
  • FIGS. 2 and 3 is to be used to describe an electronic text document which is in a conventional format (for example Microsoft WORD) and was created using suitable text editors.
  • the text document consists of the sentence
  • MSWORD format structure
  • MSWORD format data unit
  • the analysis unit 58 downstream of the reading / pulling unit 54 is now able to analyze and evaluate it on the basis of the document information read by the reading unit 54, the analysis unit 58 firstly breaking down the electronic document m and its individual information components and stores this in an information component storage unit 60 (in the present example these were the individual words), and additionally recognizes the document structure as a structure of two sentences delimited by points and stores this document structure in the document structure storage unit 62 decomposed.
  • the content of the unit 62 is given the character of a document-specific metafile, which can also be accessed later (also possibly only selectively).
  • the content of the document structure storage unit after the analysis of the original document by the analysis unit could look as follows:
  • the information component storage unit 60 contains information components corresponding to this structural analysis, that is to say words:
  • Thomas comes from the cemetery at 1:00 a.m. The train is on time.
  • an equivalence unit 70 (which in its simplest version can be understood as a table or database of equivalent, ie corresponding and interchangeable, terms) was carried out as follows: The content component "Peter” of the original document was changed grammatically equivalent content component "Thomas” has been replaced, while sentence structure and grammar have been retained, but the meaning of the original document has already been destroyed.
  • the functionality of the equivalence unit 70 or the semantic rule unit 72 corresponds to an electronically accessible form of a thesaurus or the like, with which, in the case of words, for example, equivalent 15 or opposite (but conceptually related) terms can be found easily and further can be used.
  • the encryption depth of the encryption achieved by the encryption unit 10 according to FIG. 4 can be preselected.
  • the manipulation unit 64 is assigned an encryption parameter unit 66 which makes the sequence of the individual operations achieved by the manipulation process in the unit 64 controllable and / or influenceable and thus enables an encoding depth or a number of emulation operations to be influenced can be.
  • This can in particular also be achieved in a random manner, by means of the random control unit 68, which is also assigned to the manipulation unit.
  • the associated first key file for the storage unit 74 could look as follows (in the following example, the reconstruction unit interprets the EXCHANGE command in order to carry out the swap specified in the argument):
  • the vocabulary of the command language itself is dynamic and can be changed by functions of a script language; the EXCHANGE command itself could be replaced by any other expression.
  • Key file 2 could accordingly begin as follows:
  • an additional output unit 78 is connected downstream of these two storage units, which in a particularly simple manner prepares the plurality of keys 16 in the form of scripts and can output them as executable script files 84; this is done with the aid of a conversion unit 80 which, in an otherwise known manner, generates volume document 82 corresponding to the encrypted version from the volume data of the storage unit 14 and from the index or reconstruction data of the storage unit 16 several structure descriptions which can run independently within a suitable execution environment , Scripts, for example as Javascript, XML, VB-Sc ⁇ pt or the like. And which, in the case of the script file associated with the first key, can then independently process the volume document 82 when it runs and return it to the original, unencrypted form.
  • the embodiment shown schematically in FIG. 4 is suitable not only for generating a key file for the storage unit 16 (or as an executable script file 84), but also for a plurality of these, of which, however, ideally only one content actually exists leads to a correct result, while key files other than scripts trigger a decryption process, which also leads to a meaningful (and thus apparently correct) result, but the content does not match the original version. This then increases the security of the locking device.
  • the present invention is not limited to the exemplary example of number or text files. It is therefore particularly appropriate to encrypt any further electronic documents in the manner described in principle, as long as these electronic documents have a structure of content components that is suitable for the basic operations of exchanging, removing, adding or exchanging.
  • Typical application cases are in particular music files, which are usually available in MP3 format and, where it is possible within the scope of the present invention, the data structures (so-called frames) specified by the MP3 format individually or in blocks (ideally also in cycles or sections) , related to the respective piece of music) to be exchanged, removed or exchanged.
  • image and / or video files because the known document formats common there are also based on a sequence of frames as content components (in the case of images or electronic videos, these are the respective individual images), which can be manipulated in the manner according to the invention.
  • a reconstruction file in particular in the form of a script or the like, is in an ASCII and / or HTML file format.
  • a firewall protecting a client and / or server unit there are thus simplified possibilities for penetrating such a firewall unhindered.
  • Another advantageous development of the invention provides for a reconstruction file suitable for electronic document data (of the same or a different file type). embedded in such a way that the format and (reproduced) content of such a guest file remains unchanged;
  • a concealed transfer of reconstruction files with the purpose of further increasing security is therefore an area of the guest file which is not directly effective in terms of content, for example comment or information areas, etc.
  • the possibility of realizing the keys or reconstruction files according to the invention as scripts offers numerous possibilities for further development: for example, the script-controlled merging within the scope of the present invention enables further flexibility or further increase in security by not restoring all of the script files as reconstruction files enables the unencrypted form of the electronic document by merging, but a plurality of scripts as reconstruction files is necessary, which, for example Cover predetermined time periods of the electronic document and then call them up successively.
  • the invention could be implemented in such a way that each script file as a reconstruction file for a period of about 30 seconds enables an MP3 music piece to be reconstructed, and then another reconstruction calls (again script-controlled) a subsequent, further script file Reconstruction is necessary.
  • there are possibilities of context-dependent generation or reconstruction of the original original document including even the possibility of contextually and specifically restoring different variants of the original document.
  • a further embodiment of the present invention which corresponds to the most general form of the present invention and the functional unit according to the invention as an additional next abstract functional unit that can be implemented with any functionalities, either as a device for document encryption and document decryption according to 1, or additionally or alternatively as a device for controlling or triggering a payment transaction, for executing an (electronic) communication operation, for identifying and / or authenticating a user or (generally) for exporting a suitably preset program operation on a data processing device.
  • the invention also encompasses that the functional unit according to the invention (in particular according to claim 6) can be operated in the first and second functional mode by means of at least one control parameter, with additional means being provided for deriving the control parameter from the first and / or second password.
  • this control parameter (which is usually also present in a plurality) would influence a decryption or decryption operation of the functional unit. Specifically, this would then correspond to the first exemplary embodiment described above with reference to Table 1 or FIG. 1, where keys are assigned to the first or second passwords by means of a unit and these keys correspond in this respect to the control parameters provided in the further training.
  • control parameter provided in accordance with the further training also goes beyond eme (traditionally already known) activation or deactivation of a functional unit, depending on whether a correct password has been entered:
  • the control parameters in the sense of this aspect of the invention are, in particular, those directly related to the process
  • the invention also encompasses control parameters provided according to further training not exclusively as parameters derived from keys or to be assigned to a key. to be understood, but in particular also as an internal variable or other, directly function-relevant parameters which, ideally without immediate perception or accessibility by a user, are critical elements in the proper functioning of the functional unit.
  • control parameters in connection with or implemented by keys in a combination provided for further training, which semantically encrypts electronic documents or the like in the manner described above, ie. r. as control parameters in the semantic encryption process.
  • an input unit 100 for a password is provided for interaction with a user, which may typically be implemented from a keyboard or the like.
  • This input unit 100 is followed by a password checking unit 102 which, in the exemplary embodiment described using a password file device 106, compares the validity or correspondence of the password entered with stored passwords and, in response to this comparison, transmits a corresponding control signal to a downstream functional unit 104.
  • the unit m 100 entered password corresponds to one of the second passwords (which eo
  • Plural, m are stored in the data storage unit 106), a second functional operation predetermined according to the invention, which, however, does not correspond to the one actually intended by the user, was triggered.
  • FIG. 1 Table 1
  • FIG. 5 also describes a device which makes it possible to generate the first and, preferably, a plurality of second passwords in the manner according to the invention.
  • a password generation unit 110 which is assigned to the data storage unit and which communicates with the user by means of a password communication unit 108, the unit 108 either for user input of the second key ice (and / or the first key, which is preferably to be provided in plural) ) is formed, or else the first and / or the second key is / are generated automatically by the unit 110 and is then output to the user by means of the communication unit 108.
  • a particularly favorable form of implementation in the exemplary embodiment in FIG. 5 shows the directory or dictionary unit 112 assigned to the password generation unit 110, which, in accordance with further training, provides that not a (small) number of passwords is specifically generated and subsequently stored in the unit 106, instead, a password supply to unit 106 (with the purpose of password checking by unit 102) is dynamized and can be done automatically from the large number of terms or password specifications stored in unit 112.
  • a particularly suitable example for the unit 112 would be an electronic lexicon or an electronic thesaurus.
  • the user enters the password 100 into the system using the unit 100; the password checking unit then determines one of three possible operating cases: either it is an correct password (first password), which then triggers the first, predetermined (and intended) functional operation of the functional unit 104.
  • the entered password is a second password in the sense of the invention, that is, the checking unit 102 recognizes this password as being present in the memory unit 106 (or introduced by the dictionary unit 112) without this password being the first Password corresponds.
  • the decision of the password access unit therefore triggers the triggering of the second functional operation of the functional unit 104, which in turn is a planned, predetermined functional operation, which, however, does not correspond to the intended (intended). This could be practically realized, for example, in that a wrong or unselected document is reproduced in a document reproduction unit as a function unit 104, or a program that is not intended or planned runs in a program execution unit as a function unit 104 e.
  • the third possibility in response to user input in unit 110 is that password checking unit 102 determines that neither the first nor one of the second passwords has been entered. As a result, a customary reject or error routine is output, as is expected or typically generated in conventional, password-protected systems in response to an incorrect password input.
  • the present invention is not limited to the exemplary embodiments described. Rather, it should emerge from the description of FIG. 5 and the indicated context, in particular, that the invention can be used for a large number of possible uses and password environments is;
  • the exemplary embodiments and functionalities described, in particular the unit 104 are only to be understood as exemplary, and the exemplary embodiment described with reference to FIG. 1 merely represents a concrete (but particularly favorable) form of implementation of the present invention. that inexpensive further training of the concrete form of implementation according to Fig. 1 can be analogous developments of the more general implementation form of FIG. 5.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Storage Device Security (AREA)
  • Document Processing Apparatus (AREA)

Abstract

Dispositif d'accès protégé par mot de passe à une unité fonctionnelle dotée d'une unité d'entrée de mot de passe conçue pour qu'un utilisateur entre un mot de passe, d'une unité de vérification de mot de passe, placée en aval de l'unité d'entrée de mot de passe, qui est conçue pour vérifier l'exactitude du mot de passe entré, de préférence à l'aide d'une unité associée de stockage de mots de passe, et pour activer l'unité fonctionnelle dans un premier mode fonctionnel prédéterminé lorsque le mot de passe entré a été vérifié comme étant correct, le premier mode fonctionnel correspondant à un mode conforme à la détermination et voulu par l'utilisateur. L'unité de vérification de mot de passe est associée à une unité de génération de mots de passe qui est conçue pour générer un premier mot de passe en tant que mot de passe correct, ainsi qu'au moins un deuxième mot de passe qui, lors de l'entrée dudit mot de passe par l'utilisateur dans l'unité d'entrée de mot de passe, est reconnu par l'unité de vérification de mot de passe en tant que deuxième mot de passe. L'unité de vérification de mot de passe est conçue, en réaction au fait que le deuxième mot de passe a été reconnu, pour déclencher un deuxième mode fonctionnel prédéterminé de l'unité fonctionnelle. Le deuxième mode fonctionnel est un mode différent d'un message d'erreur explicite ou d'un sous-programme de traitement d'erreurs, qui se distingue du premier mode fonctionnel et qui ne correspond pas au mode voulu par l'utilisateur.
EP00991268A 1999-12-23 2000-12-27 Dispositif de maniement, protege par un mot de passe, d'un document electronique Withdrawn EP1245094A2 (fr)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
DE19962902A DE19962902A1 (de) 1999-12-23 1999-12-23 Vorrichtung zum Passwort-geschützten Handhaben eines elektronischen Dokuments
DE19962902 1999-12-23
PCT/EP2000/013270 WO2001047175A2 (fr) 1999-12-23 2000-12-27 Dispositif de maniement, protege par un mot de passe, d'un document electronique

Publications (1)

Publication Number Publication Date
EP1245094A2 true EP1245094A2 (fr) 2002-10-02

Family

ID=7934420

Family Applications (1)

Application Number Title Priority Date Filing Date
EP00991268A Withdrawn EP1245094A2 (fr) 1999-12-23 2000-12-27 Dispositif de maniement, protege par un mot de passe, d'un document electronique

Country Status (4)

Country Link
US (1) US20050076247A1 (fr)
EP (1) EP1245094A2 (fr)
DE (1) DE19962902A1 (fr)
WO (1) WO2001047175A2 (fr)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7664960B1 (en) * 2005-09-23 2010-02-16 Kenneth Wayne Clubb Password enhancing device
US8782402B2 (en) * 2010-02-25 2014-07-15 Bank Of America Corporation System and method for secure communications
US9713774B2 (en) 2010-08-30 2017-07-25 Disney Enterprises, Inc. Contextual chat message generation in online environments
US9552353B2 (en) 2011-01-21 2017-01-24 Disney Enterprises, Inc. System and method for generating phrases
US9245253B2 (en) * 2011-08-19 2016-01-26 Disney Enterprises, Inc. Soft-sending chat messages
US9176947B2 (en) 2011-08-19 2015-11-03 Disney Enterprises, Inc. Dynamically generated phrase-based assisted input
US8978158B2 (en) 2012-04-27 2015-03-10 Google Inc. Privacy management across multiple devices
US9165329B2 (en) 2012-10-19 2015-10-20 Disney Enterprises, Inc. Multi layer chat detection and classification
US10742577B2 (en) 2013-03-15 2020-08-11 Disney Enterprises, Inc. Real-time search and validation of phrases using linguistic phrase components
US10303762B2 (en) 2013-03-15 2019-05-28 Disney Enterprises, Inc. Comprehensive safety schema for ensuring appropriateness of language in online chat

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5319705A (en) * 1992-10-21 1994-06-07 International Business Machines Corporation Method and system for multimedia access control enablement
US5341429A (en) * 1992-12-04 1994-08-23 Testdrive Corporation Transformation of ephemeral material
AU3259097A (en) * 1996-06-14 1998-01-07 Erland WITTKOTTER Apparatus and method for the protected transmission and representation of electronically published documents
US6357010B1 (en) * 1998-02-17 2002-03-12 Secure Computing Corporation System and method for controlling access to documents stored on an internal network
JP3872626B2 (ja) * 2000-02-14 2007-01-24 シャープ株式会社 メモリ装置

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO0147175A2 *

Also Published As

Publication number Publication date
DE19962902A1 (de) 2001-07-05
US20050076247A1 (en) 2005-04-07
WO2001047175A3 (fr) 2002-05-23
WO2001047175A2 (fr) 2001-06-28

Similar Documents

Publication Publication Date Title
EP1410128A1 (fr) Dispositif de traitement de donnees
DE69736310T2 (de) Erzeugung und Verteilung digitaler Dokumente
DE69531082T2 (de) Verfahren und Vorrichtung mit einem Verschlüsselungskopfteil, die es ermöglicht, Software zu erproben
DE69531079T2 (de) Verfahren und Vorrichtung mit rechnerabhängiger Identifizierung, die es ermöglicht, Software zu erproben
DE60200616T2 (de) Gesicherte Inhaltsobjekte
DE69531077T2 (de) Verfahren und Vorrichtung mit Benutzereinwirkung der Art Erproben-und-Kaufen, die es ermöglicht, Software zu erproben
DE3044463C2 (fr)
EP1818844B1 (fr) Procédé destiné à l'utilisation de mécanismes de sécurité
DE60006065T2 (de) Verfahren und system zur entwicklung, anwendung, fernladung, und ausfuhrung, von datenbank gesteuerten webseiten
DE3407642C2 (fr)
DE19620346A1 (de) Grafische Paßworteingabe
EP1199623A2 (fr) Procédé et système pour l'identification d'un utilisateur
WO2001047175A2 (fr) Dispositif de maniement, protege par un mot de passe, d'un document electronique
WO2001033318A1 (fr) Dispositif et procede de sortie protegee d'un document electronique via un reseau de transmission de donnees
EP1733293A1 (fr) Procede d'une demande de connexion sure a un systeme technique
DE19851074C2 (de) System und Verfahren zur sicheren Identifikation und Registrierung von Personen sowie eine hierfür geeignete Registriereinrichtung
WO2001059548A2 (fr) Dispositif pour le traitement avec controle d'acces de donnees electroniques
DE102007021275A1 (de) Verfahren zur Übertragung und/oder zur Bereitstellung persönlicher elektronischer Daten eines Inhabers, insbesondere gesundheitsbezogener elektronischer Daten eines Patienten
DE10359680A1 (de) Verfahren zur Freischaltung eines Zugangs zu einem Computersystem oder zu einem Programm
DE19961838A1 (de) Verfahren und Vorrichtung zur Überprüfung einer Datei
DE3621543A1 (de) Druckvorrichtung mit passwort-kontrolle
EP1002262B1 (fr) Dispositif et procede permettant la sortie protegee de documents memorises transmis par voie electronique
EP2492838A1 (fr) Procédé de protection contre les accès générés par machine aux ressources à protéger d'un ordinateur
DE4103173C2 (de) Vorrichtung zum Schutz gegen unautorisierte Benutzung von Software
DE102007047613A1 (de) Zeichenverwaltungssystem

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20020723

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: BRAINSHIELD TM TECHNOLOGIES, INC.

RIN1 Information on inventor provided before grant (corrected)

Inventor name: WITTKOETTER, ERLAND DR.

RBV Designated contracting states (corrected)

Designated state(s): DE FR GB

17Q First examination report despatched

Effective date: 20040416

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: WITTKOETTER, ERLAND

RIN1 Information on inventor provided before grant (corrected)

Inventor name: WITTKOETTER, ERLAND

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20060701