FI109154B - Laite ja menetelmä tietoturvallisuuden parantamiseksi - Google Patents

Laite ja menetelmä tietoturvallisuuden parantamiseksi Download PDF

Info

Publication number
FI109154B
FI109154B FI20000456A FI20000456A FI109154B FI 109154 B FI109154 B FI 109154B FI 20000456 A FI20000456 A FI 20000456A FI 20000456 A FI20000456 A FI 20000456A FI 109154 B FI109154 B FI 109154B
Authority
FI
Finland
Prior art keywords
processor
unit
processor unit
message
processor units
Prior art date
Application number
FI20000456A
Other languages
English (en)
Finnish (fi)
Swedish (sv)
Other versions
FI20000456A (fi
FI20000456A0 (fi
Inventor
Vesa Juhani Hukkanen
Original Assignee
Vesa Juhani Hukkanen
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from FI990851A external-priority patent/FI990851A0/fi
Publication of FI20000456A0 publication Critical patent/FI20000456A0/fi
Priority to FI20000456A priority Critical patent/FI109154B/fi
Application filed by Vesa Juhani Hukkanen filed Critical Vesa Juhani Hukkanen
Priority to CA002370603A priority patent/CA2370603A1/fr
Priority to AU39685/00A priority patent/AU3968500A/en
Priority to JP2000612827A priority patent/JP2002542537A/ja
Priority to PCT/FI2000/000310 priority patent/WO2000063778A1/fr
Priority to EP00918906A priority patent/EP1196851A1/fr
Publication of FI20000456A publication Critical patent/FI20000456A/fi
Publication of FI109154B publication Critical patent/FI109154B/fi
Application granted granted Critical
Priority to HK02107464.0A priority patent/HK1047325A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/22Arrangements for preventing the taking of data from a data transmission channel without authorisation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/03Protocol definition or specification 
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F2207/72Indexing scheme relating to groups G06F7/72 - G06F7/729
    • G06F2207/7219Countermeasures against side channel or fault attacks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)
  • Storage Device Security (AREA)
  • Small-Scale Networks (AREA)
FI20000456A 1999-04-16 2000-02-28 Laite ja menetelmä tietoturvallisuuden parantamiseksi FI109154B (fi)

Priority Applications (7)

Application Number Priority Date Filing Date Title
FI20000456A FI109154B (fi) 1999-04-16 2000-02-28 Laite ja menetelmä tietoturvallisuuden parantamiseksi
CA002370603A CA2370603A1 (fr) 1999-04-16 2000-04-12 Dispositif et procede d'amelioration de la securite des informations
EP00918906A EP1196851A1 (fr) 1999-04-16 2000-04-12 Dispositif et procede d'amelioration de la securite des informations
AU39685/00A AU3968500A (en) 1999-04-16 2000-04-12 Arrangement and method to improve information security
JP2000612827A JP2002542537A (ja) 1999-04-16 2000-04-12 情報セキュリティ改善用ハードウェア構造、移動体端末装置、コンピュータの情報セキュリティ改善方法
PCT/FI2000/000310 WO2000063778A1 (fr) 1999-04-16 2000-04-12 Dispositif et procede d'amelioration de la securite des informations
HK02107464.0A HK1047325A1 (zh) 1999-04-16 2002-10-15 改善信息安全性的裝置和方法

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
FI990851A FI990851A0 (fi) 1999-04-16 1999-04-16 Laite ja menetelmä tietokoneiden tietoturvallisuuden parantamiseksi
FI20000456A FI109154B (fi) 1999-04-16 2000-02-28 Laite ja menetelmä tietoturvallisuuden parantamiseksi
FI20000456 2000-02-28
FI990851 2000-02-28

Publications (3)

Publication Number Publication Date
FI20000456A0 FI20000456A0 (fi) 2000-02-28
FI20000456A FI20000456A (fi) 2000-10-16
FI109154B true FI109154B (fi) 2002-05-31

Family

ID=26160733

Family Applications (1)

Application Number Title Priority Date Filing Date
FI20000456A FI109154B (fi) 1999-04-16 2000-02-28 Laite ja menetelmä tietoturvallisuuden parantamiseksi

Country Status (7)

Country Link
EP (1) EP1196851A1 (fr)
JP (1) JP2002542537A (fr)
AU (1) AU3968500A (fr)
CA (1) CA2370603A1 (fr)
FI (1) FI109154B (fr)
HK (1) HK1047325A1 (fr)
WO (1) WO2000063778A1 (fr)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6578140B1 (en) * 2000-04-13 2003-06-10 Claude M Policard Personal computer having a master computer system and an internet computer system and monitoring a condition of said master and internet computer systems
DE10153402A1 (de) * 2001-11-01 2003-05-15 Kai Dorau Verfahren und Vorrichtung zum sicheren Betreiben einer Computereinrichtung
CN101006433B (zh) 2004-08-25 2012-01-11 日本电气株式会社 信息通信装置和程序执行环境控制方法
US8365021B2 (en) 2005-06-17 2013-01-29 Nec Corporation Information processing device comprising a plurality of domains having a plurality of processors, recovery device, program and recovery method
AT502414B1 (de) * 2005-09-20 2007-03-15 Diaplan Elektronic Gmbh Sicherheitssystem
EP2106578B1 (fr) * 2007-01-22 2016-09-14 Simon Yoffe Commutateur de sécurité
US10930452B2 (en) 2018-06-29 2021-02-23 Purism Electronic kill and physical cover switch

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5144692A (en) * 1989-05-17 1992-09-01 International Business Machines Corporation System for controlling access by first system to portion of main memory dedicated exclusively to second system to facilitate input/output processing via first system
TW369753B (en) * 1996-02-14 1999-09-11 Mitsubishi Electric Corp Data security method and system

Also Published As

Publication number Publication date
FI20000456A (fi) 2000-10-16
AU3968500A (en) 2000-11-02
EP1196851A1 (fr) 2002-04-17
WO2000063778A1 (fr) 2000-10-26
CA2370603A1 (fr) 2000-10-26
HK1047325A1 (zh) 2003-02-14
FI20000456A0 (fi) 2000-02-28
JP2002542537A (ja) 2002-12-10

Similar Documents

Publication Publication Date Title
US5896499A (en) Embedded security processor
EP0936787B1 (fr) Sécurité informatique utilisant un virus sondeur
US5864683A (en) System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights
US7788235B1 (en) Extrusion detection using taint analysis
US20060190606A1 (en) Data transfer security
Pham et al. Universal serial bus based software attacks and protection solutions
US8082583B1 (en) Delegation of content filtering services between a gateway and trusted clients in a computer network
FI109154B (fi) Laite ja menetelmä tietoturvallisuuden parantamiseksi
US7404212B2 (en) Apparatus and methods for intercepting, examining and controlling code, data and files and their transfer
Nikkel A portable network forensic evidence collector
Fenzi et al. Linux security HOWTO
Endsuleit et al. A security analysis on jade (-s) v. 3.2
Dunhaupt Vulnerabilities of industrial automation systems
Likavec et al. Enforcing messaging security policies
Gheorghe " COBOT" TYPE MULTIAPLICATIVE INTELLIGENT PLATFORM WITH ROBOT & HEXAPOD MICROSYSTEM AND ULTRAPRECIS PING PROBE FOR MEASURING PARTS (WITH A 3KG TABLE)
Ahmad et al. Design of a Network-Access Audit Log for Security Monitoring and Forensic Investigation.
KLAUS EDPACS
Shermis et al. Where Did All the Data Go? Internet Security for Web-Based Assessments.
EP1547340B1 (fr) Procede, systeme et produit de programme informatique pour transmission d'un train de donnees de media entre terminaux clients
Skrzewski Monitoring system’s network activity for rootkit malware detection
Blansit Protecting your home broadband computer
Dhoot DEVELOPING A LOW COST SOLUTION FOR ENTERPRISE SECURITY
US20080148385A1 (en) Sectionalized Terminal System And Method
Volkamer et al. Trust Modles for Remote Electronic Voting
Krasavin Keyloggers-content monitoring exploits

Legal Events

Date Code Title Description
MA Patent expired