FI20000456A - Device and method for improving data security - Google Patents
Device and method for improving data security Download PDFInfo
- Publication number
- FI20000456A FI20000456A FI20000456A FI20000456A FI20000456A FI 20000456 A FI20000456 A FI 20000456A FI 20000456 A FI20000456 A FI 20000456A FI 20000456 A FI20000456 A FI 20000456A FI 20000456 A FI20000456 A FI 20000456A
- Authority
- FI
- Finland
- Prior art keywords
- processor units
- processor
- workstation
- data networks
- public data
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/22—Arrangements for preventing the taking of data from a data transmission channel without authorisation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/03—Protocol definition or specification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
- Storage Device Security (AREA)
- Small-Scale Networks (AREA)
Abstract
The invention relates to an arrangement and method for preventing unauthorised access to an information system via a network. A workstation according to the invention comprises at least two separate processor units (PA, PB) in one and the same housing and a switch unit (16). Part of the processor units (PA) are connected to public data networks. The other processor units (PB), which are not connected to public data networks, are used as work machines proper. The processor units in the workstation have got separate power supplies (21, 22), separate fixed disk drives (9, 10) and hardware interfaces for electrically isolating data transfer between the processor units. The processor units share a display (20), keyboard (18) and a mouse (19) with their associated interfaces. By means of a control switch (17) the user can select the processor unit to work with. In conjunction with the switch unit there is an indicator (23, 24) which indicates to the user the processor unit to which said devices are connected at any given time. An advantage of the invention is that the workstation, which can be connected to public data networks when needed, is secure against unauthorised access so one can safety work and save information on it. Information received from the network is transferred to the protected processor unit in an encrypted form on a diskette or printing paper, for example.
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FI20000456A FI109154B (en) | 1999-04-16 | 2000-02-28 | Device and method for improving data security |
CA002370603A CA2370603A1 (en) | 1999-04-16 | 2000-04-12 | Arrangement and method to improve information security |
EP00918906A EP1196851A1 (en) | 1999-04-16 | 2000-04-12 | Arrangement and method to improve information security |
AU39685/00A AU3968500A (en) | 1999-04-16 | 2000-04-12 | Arrangement and method to improve information security |
JP2000612827A JP2002542537A (en) | 1999-04-16 | 2000-04-12 | Hardware structure for improving information security, mobile terminal device, and method for improving information security of computer |
PCT/FI2000/000310 WO2000063778A1 (en) | 1999-04-16 | 2000-04-12 | Arrangement and method to improve information security |
HK02107464.0A HK1047325A1 (en) | 1999-04-16 | 2002-10-15 | Arrangement and method to improve information security |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FI990851A FI990851A0 (en) | 1999-04-16 | 1999-04-16 | Device and method for improving computer security in computers |
FI990851 | 1999-04-16 | ||
FI20000456A FI109154B (en) | 1999-04-16 | 2000-02-28 | Device and method for improving data security |
FI20000456 | 2000-02-28 |
Publications (3)
Publication Number | Publication Date |
---|---|
FI20000456A0 FI20000456A0 (en) | 2000-02-28 |
FI20000456A true FI20000456A (en) | 2000-10-16 |
FI109154B FI109154B (en) | 2002-05-31 |
Family
ID=26160733
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
FI20000456A FI109154B (en) | 1999-04-16 | 2000-02-28 | Device and method for improving data security |
Country Status (7)
Country | Link |
---|---|
EP (1) | EP1196851A1 (en) |
JP (1) | JP2002542537A (en) |
AU (1) | AU3968500A (en) |
CA (1) | CA2370603A1 (en) |
FI (1) | FI109154B (en) |
HK (1) | HK1047325A1 (en) |
WO (1) | WO2000063778A1 (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6578140B1 (en) * | 2000-04-13 | 2003-06-10 | Claude M Policard | Personal computer having a master computer system and an internet computer system and monitoring a condition of said master and internet computer systems |
DE10153402A1 (en) * | 2001-11-01 | 2003-05-15 | Kai Dorau | Method for secure exchange of electronic data in an online process, whereby access to the hard drive or storage unit is switched off when a processor has an online connection via a data line |
CN101006433B (en) | 2004-08-25 | 2012-01-11 | 日本电气株式会社 | Information communication device, and program execution environment control method |
CN101198934B (en) | 2005-06-17 | 2010-09-15 | 日本电气株式会社 | Information processing device and restoration method |
AT502414B1 (en) * | 2005-09-20 | 2007-03-15 | Diaplan Elektronic Gmbh | SECURITY SYSTEM |
JP2010532588A (en) * | 2007-01-22 | 2010-10-07 | シモン ヨフェ | Security switch |
WO2020006477A1 (en) | 2018-06-29 | 2020-01-02 | Purism | Electronic kill and physical cover switch |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5144692A (en) * | 1989-05-17 | 1992-09-01 | International Business Machines Corporation | System for controlling access by first system to portion of main memory dedicated exclusively to second system to facilitate input/output processing via first system |
TW369753B (en) * | 1996-02-14 | 1999-09-11 | Mitsubishi Electric Corp | Data security method and system |
-
2000
- 2000-02-28 FI FI20000456A patent/FI109154B/en not_active IP Right Cessation
- 2000-04-12 EP EP00918906A patent/EP1196851A1/en not_active Withdrawn
- 2000-04-12 CA CA002370603A patent/CA2370603A1/en not_active Abandoned
- 2000-04-12 WO PCT/FI2000/000310 patent/WO2000063778A1/en not_active Application Discontinuation
- 2000-04-12 JP JP2000612827A patent/JP2002542537A/en active Pending
- 2000-04-12 AU AU39685/00A patent/AU3968500A/en not_active Abandoned
-
2002
- 2002-10-15 HK HK02107464.0A patent/HK1047325A1/en unknown
Also Published As
Publication number | Publication date |
---|---|
EP1196851A1 (en) | 2002-04-17 |
AU3968500A (en) | 2000-11-02 |
CA2370603A1 (en) | 2000-10-26 |
HK1047325A1 (en) | 2003-02-14 |
FI109154B (en) | 2002-05-31 |
FI20000456A0 (en) | 2000-02-28 |
JP2002542537A (en) | 2002-12-10 |
WO2000063778A1 (en) | 2000-10-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7205883B2 (en) | Tamper detection and secure power failure recovery circuit | |
AU2002302776A1 (en) | Recovery computer for a plurality of networked computers | |
JP4933946B2 (en) | External storage device and information leakage prevention method | |
SE524778C2 (en) | Procedure and arrangements for protecting software for unauthorized use or copying | |
ATE237841T1 (en) | FAULT TOLERANT DISTRIBUTED COMPUTER SYSTEM | |
AU3771489A (en) | Card-computer moderated systems | |
AU678937B2 (en) | Cryptographic data security in a secured computer system | |
AU2225495A (en) | Methods for monitoring a plurality of remote local units connected in a network and generating messages therefrom, and a device employed in said local units | |
EP0770997A3 (en) | Password protection for removable hard drive | |
EP0836131A3 (en) | Security of remote computing devices | |
US20040148547A1 (en) | UPS-based file data storage apparatus and computer program products | |
WO2018164503A1 (en) | Context awareness-based ransomware detection | |
SE0101087D0 (en) | System for distribution of position-dependent information | |
FI20000456A (en) | Device and method for improving data security | |
US20070064935A1 (en) | Generating key information for mutual access among multiple computers | |
ATE335258T1 (en) | SYSTEM AND METHOD FOR MANAGING FANCER MACHINE LICENSES | |
IL150035A0 (en) | Computer-readable medium with microprocessor to control reading and computer arranged to communicate with such a medium | |
CN108023732A (en) | A kind of data guard method, device, equipment and storage medium | |
WO2005045595A3 (en) | Cable network access control solution | |
CN111885179B (en) | External terminal protection device and protection system based on file monitoring service | |
WO2000059286A3 (en) | Method and system for administrating context | |
CN207882905U (en) | A kind of leakage prevention terminal | |
SE0002302D0 (en) | Method and system for communication checking | |
US20040243825A1 (en) | Netsafe computer security switch | |
KR200247675Y1 (en) | Internet Firewall Server System |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MA | Patent expired |