FI109154B - Laite ja menetelmä tietoturvallisuuden parantamiseksi - Google Patents
Laite ja menetelmä tietoturvallisuuden parantamiseksi Download PDFInfo
- Publication number
- FI109154B FI109154B FI20000456A FI20000456A FI109154B FI 109154 B FI109154 B FI 109154B FI 20000456 A FI20000456 A FI 20000456A FI 20000456 A FI20000456 A FI 20000456A FI 109154 B FI109154 B FI 109154B
- Authority
- FI
- Finland
- Prior art keywords
- processor
- unit
- processor unit
- message
- processor units
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/22—Arrangements for preventing the taking of data from a data transmission channel without authorisation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/03—Protocol definition or specification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
- Storage Device Security (AREA)
- Small-Scale Networks (AREA)
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FI20000456A FI109154B (fi) | 1999-04-16 | 2000-02-28 | Laite ja menetelmä tietoturvallisuuden parantamiseksi |
CA002370603A CA2370603A1 (fr) | 1999-04-16 | 2000-04-12 | Dispositif et procede d'amelioration de la securite des informations |
EP00918906A EP1196851A1 (fr) | 1999-04-16 | 2000-04-12 | Dispositif et procede d'amelioration de la securite des informations |
AU39685/00A AU3968500A (en) | 1999-04-16 | 2000-04-12 | Arrangement and method to improve information security |
JP2000612827A JP2002542537A (ja) | 1999-04-16 | 2000-04-12 | 情報セキュリティ改善用ハードウェア構造、移動体端末装置、コンピュータの情報セキュリティ改善方法 |
PCT/FI2000/000310 WO2000063778A1 (fr) | 1999-04-16 | 2000-04-12 | Dispositif et procede d'amelioration de la securite des informations |
HK02107464.0A HK1047325A1 (zh) | 1999-04-16 | 2002-10-15 | 改善信息安全性的裝置和方法 |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FI990851A FI990851A0 (fi) | 1999-04-16 | 1999-04-16 | Laite ja menetelmä tietokoneiden tietoturvallisuuden parantamiseksi |
FI20000456A FI109154B (fi) | 1999-04-16 | 2000-02-28 | Laite ja menetelmä tietoturvallisuuden parantamiseksi |
FI20000456 | 2000-02-28 | ||
FI990851 | 2000-02-28 |
Publications (3)
Publication Number | Publication Date |
---|---|
FI20000456A0 FI20000456A0 (fi) | 2000-02-28 |
FI20000456A FI20000456A (fi) | 2000-10-16 |
FI109154B true FI109154B (fi) | 2002-05-31 |
Family
ID=26160733
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
FI20000456A FI109154B (fi) | 1999-04-16 | 2000-02-28 | Laite ja menetelmä tietoturvallisuuden parantamiseksi |
Country Status (7)
Country | Link |
---|---|
EP (1) | EP1196851A1 (fr) |
JP (1) | JP2002542537A (fr) |
AU (1) | AU3968500A (fr) |
CA (1) | CA2370603A1 (fr) |
FI (1) | FI109154B (fr) |
HK (1) | HK1047325A1 (fr) |
WO (1) | WO2000063778A1 (fr) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6578140B1 (en) * | 2000-04-13 | 2003-06-10 | Claude M Policard | Personal computer having a master computer system and an internet computer system and monitoring a condition of said master and internet computer systems |
DE10153402A1 (de) * | 2001-11-01 | 2003-05-15 | Kai Dorau | Verfahren und Vorrichtung zum sicheren Betreiben einer Computereinrichtung |
CN101006433B (zh) | 2004-08-25 | 2012-01-11 | 日本电气株式会社 | 信息通信装置和程序执行环境控制方法 |
US8365021B2 (en) | 2005-06-17 | 2013-01-29 | Nec Corporation | Information processing device comprising a plurality of domains having a plurality of processors, recovery device, program and recovery method |
AT502414B1 (de) * | 2005-09-20 | 2007-03-15 | Diaplan Elektronic Gmbh | Sicherheitssystem |
EP2106578B1 (fr) * | 2007-01-22 | 2016-09-14 | Simon Yoffe | Commutateur de sécurité |
US10930452B2 (en) | 2018-06-29 | 2021-02-23 | Purism | Electronic kill and physical cover switch |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5144692A (en) * | 1989-05-17 | 1992-09-01 | International Business Machines Corporation | System for controlling access by first system to portion of main memory dedicated exclusively to second system to facilitate input/output processing via first system |
TW369753B (en) * | 1996-02-14 | 1999-09-11 | Mitsubishi Electric Corp | Data security method and system |
-
2000
- 2000-02-28 FI FI20000456A patent/FI109154B/fi not_active IP Right Cessation
- 2000-04-12 EP EP00918906A patent/EP1196851A1/fr not_active Withdrawn
- 2000-04-12 CA CA002370603A patent/CA2370603A1/fr not_active Abandoned
- 2000-04-12 AU AU39685/00A patent/AU3968500A/en not_active Abandoned
- 2000-04-12 WO PCT/FI2000/000310 patent/WO2000063778A1/fr not_active Application Discontinuation
- 2000-04-12 JP JP2000612827A patent/JP2002542537A/ja active Pending
-
2002
- 2002-10-15 HK HK02107464.0A patent/HK1047325A1/zh unknown
Also Published As
Publication number | Publication date |
---|---|
FI20000456A (fi) | 2000-10-16 |
AU3968500A (en) | 2000-11-02 |
EP1196851A1 (fr) | 2002-04-17 |
WO2000063778A1 (fr) | 2000-10-26 |
CA2370603A1 (fr) | 2000-10-26 |
HK1047325A1 (zh) | 2003-02-14 |
FI20000456A0 (fi) | 2000-02-28 |
JP2002542537A (ja) | 2002-12-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5896499A (en) | Embedded security processor | |
EP0936787B1 (fr) | Sécurité informatique utilisant un virus sondeur | |
US5864683A (en) | System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights | |
US7788235B1 (en) | Extrusion detection using taint analysis | |
US20060190606A1 (en) | Data transfer security | |
Pham et al. | Universal serial bus based software attacks and protection solutions | |
US8082583B1 (en) | Delegation of content filtering services between a gateway and trusted clients in a computer network | |
FI109154B (fi) | Laite ja menetelmä tietoturvallisuuden parantamiseksi | |
US7404212B2 (en) | Apparatus and methods for intercepting, examining and controlling code, data and files and their transfer | |
Nikkel | A portable network forensic evidence collector | |
Fenzi et al. | Linux security HOWTO | |
Endsuleit et al. | A security analysis on jade (-s) v. 3.2 | |
Dunhaupt | Vulnerabilities of industrial automation systems | |
Likavec et al. | Enforcing messaging security policies | |
Gheorghe | " COBOT" TYPE MULTIAPLICATIVE INTELLIGENT PLATFORM WITH ROBOT & HEXAPOD MICROSYSTEM AND ULTRAPRECIS PING PROBE FOR MEASURING PARTS (WITH A 3KG TABLE) | |
Ahmad et al. | Design of a Network-Access Audit Log for Security Monitoring and Forensic Investigation. | |
KLAUS | EDPACS | |
Shermis et al. | Where Did All the Data Go? Internet Security for Web-Based Assessments. | |
EP1547340B1 (fr) | Procede, systeme et produit de programme informatique pour transmission d'un train de donnees de media entre terminaux clients | |
Skrzewski | Monitoring system’s network activity for rootkit malware detection | |
Blansit | Protecting your home broadband computer | |
Dhoot | DEVELOPING A LOW COST SOLUTION FOR ENTERPRISE SECURITY | |
US20080148385A1 (en) | Sectionalized Terminal System And Method | |
Volkamer et al. | Trust Modles for Remote Electronic Voting | |
Krasavin | Keyloggers-content monitoring exploits |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MA | Patent expired |