HK1091680A1 - 用於保護無線數據的系統和方法 - Google Patents
用於保護無線數據的系統和方法Info
- Publication number
- HK1091680A1 HK1091680A1 HK06108057.7A HK06108057A HK1091680A1 HK 1091680 A1 HK1091680 A1 HK 1091680A1 HK 06108057 A HK06108057 A HK 06108057A HK 1091680 A1 HK1091680 A1 HK 1091680A1
- Authority
- HK
- Hong Kong
- Prior art keywords
- wireless data
- securing wireless
- securing
- data
- wireless
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/214—Monitoring or handling of messages using selective forwarding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2117—User registration
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2129—Authenticate client device independently of the user
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2153—Using hardware token as a secondary aspect
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/58—Message adaptation for wireless communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Computing Systems (AREA)
- Mobile Radio Communication Systems (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US49754503P | 2003-08-25 | 2003-08-25 | |
PCT/CA2004/001561 WO2005020503A1 (en) | 2003-08-25 | 2004-08-25 | System and method for securing wireless data |
Publications (1)
Publication Number | Publication Date |
---|---|
HK1091680A1 true HK1091680A1 (zh) | 2007-01-26 |
Family
ID=34216131
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
HK06108057.7A HK1091680A1 (zh) | 2003-08-25 | 2006-07-18 | 用於保護無線數據的系統和方法 |
Country Status (6)
Country | Link |
---|---|
US (2) | US8205091B2 (zh) |
EP (1) | EP1665626B1 (zh) |
CN (1) | CN1856957B (zh) |
CA (1) | CA2536865C (zh) |
HK (1) | HK1091680A1 (zh) |
WO (1) | WO2005020503A1 (zh) |
Families Citing this family (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7647024B2 (en) | 2005-10-03 | 2010-01-12 | Sellerbid, Inc. | Method and system for improving client server transmission over fading channel with wireless location and authentication technology via electromagnetic radiation |
JP2006224550A (ja) * | 2005-02-18 | 2006-08-31 | Canon Inc | 画像形成装置、情報処理装置及び画像形成システム |
US8719397B2 (en) | 2005-11-03 | 2014-05-06 | Emoze Ltd. | Method and system for email and PIM synchronization and updating |
IL171774A (en) | 2005-11-03 | 2012-09-24 | Emoze Ltd | Method and system for an uncompromising connection from a computing device having information storage like e-mail server to a wireless mobile device |
US7890084B1 (en) * | 2006-10-30 | 2011-02-15 | Cellco Partnership | Enterprise instant message aggregator |
US8051297B2 (en) * | 2006-11-28 | 2011-11-01 | Diversinet Corp. | Method for binding a security element to a mobile device |
US20090028329A1 (en) | 2007-07-23 | 2009-01-29 | Savi Technology, Inc. | Method and Apparatus for Providing Security in a Radio Frequency Identification System |
US9391997B2 (en) * | 2007-08-23 | 2016-07-12 | Intel Deutschland Gmbh | Message processing apparatus, wireless device and method of storing a message in a wireless device |
US20090296926A1 (en) * | 2008-06-02 | 2009-12-03 | Sun Microsystems, Inc. | Key management using derived keys |
US8645687B2 (en) * | 2008-12-23 | 2014-02-04 | Nbcuniversal Media, Llc | Electronic file access control system and method |
US20110153668A1 (en) * | 2009-12-18 | 2011-06-23 | Research In Motion Limited | Accessing a data item stored in an unavailable mobile communication device |
US9454648B1 (en) * | 2011-12-23 | 2016-09-27 | Emc Corporation | Distributing token records in a market environment |
US9860059B1 (en) * | 2011-12-23 | 2018-01-02 | EMC IP Holding Company LLC | Distributing token records |
CN105389319A (zh) * | 2014-09-09 | 2016-03-09 | 中兴通讯股份有限公司 | 数据库的操作方法及装置 |
WO2018231697A1 (en) * | 2017-06-12 | 2018-12-20 | Daniel Maurice Lerner | Securitization of temporal digital communications with authentication and validation of user and access devices |
US10623384B2 (en) * | 2017-06-12 | 2020-04-14 | Daniel Maurice Lerner | Combined hidden dynamic random-access devices utilizing selectable keys and key locators for communicating randomized data together with sub-channels and coded encryption keys |
US10154031B1 (en) * | 2017-06-12 | 2018-12-11 | Ironclad Encryption Corporation | User-wearable secured devices provided assuring authentication and validation of data storage and transmission |
US10764282B2 (en) * | 2017-06-12 | 2020-09-01 | Daniel Maurice Lerner | Protected and secured user-wearable devices for assured authentication and validation of data storage and transmission that utilize securitized containers |
US10158613B1 (en) * | 2017-06-12 | 2018-12-18 | Ironclad Encryption Corporation | Combined hidden dynamic random-access devices utilizing selectable keys and key locators for communicating randomized data together with sub-channels and coded encryption keys |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5612682A (en) | 1995-05-30 | 1997-03-18 | Motorola, Inc. | Method and apparatus for controlling utilization of a process added to a portable communication device |
CA2233942A1 (en) * | 1996-09-18 | 1998-03-26 | Dew Engineering And Development Limited | Biometric identification system for providing secure access |
CA2301147C (en) * | 1997-07-24 | 2010-07-13 | Worldtalk Corporation | E-mail firewall with stored key encryption/decryption |
US7107246B2 (en) * | 1998-04-27 | 2006-09-12 | Esignx Corporation | Methods of exchanging secure messages |
US6219694B1 (en) | 1998-05-29 | 2001-04-17 | Research In Motion Limited | System and method for pushing information from a host system to a mobile data communication device having a shared electronic address |
JP4051510B2 (ja) * | 1998-07-16 | 2008-02-27 | ソニー株式会社 | データ記憶装置およびデータ記憶方法 |
JP3389186B2 (ja) * | 1999-04-27 | 2003-03-24 | 松下電器産業株式会社 | 半導体メモリカード及び読み出し装置 |
DE19925910B4 (de) * | 1999-06-07 | 2005-04-28 | Siemens Ag | Verfahren zum Be- oder Verarbeiten von Daten |
DE10159398A1 (de) * | 2001-12-04 | 2003-06-12 | Giesecke & Devrient Gmbh | Speichern von und Zugreifen auf Daten in einem Mobilgerät und einem Benutzermodul |
US7260555B2 (en) * | 2001-12-12 | 2007-08-21 | Guardian Data Storage, Llc | Method and architecture for providing pervasive security to digital assets |
US6987948B2 (en) | 2002-10-03 | 2006-01-17 | Wildseed Ltd. | Identification based operational modification of a portable electronic device |
CN1288933C (zh) * | 2002-12-28 | 2006-12-06 | 海尔集团公司 | 短信息、通话记录和电话簿菜单加密的手机 |
US7215778B2 (en) * | 2003-03-31 | 2007-05-08 | Intel Corporation | Encrypted content recovery |
-
2004
- 2004-08-25 CA CA2536865A patent/CA2536865C/en not_active Expired - Lifetime
- 2004-08-25 US US10/925,534 patent/US8205091B2/en active Active
- 2004-08-25 EP EP04761725.3A patent/EP1665626B1/en not_active Expired - Lifetime
- 2004-08-25 CN CN2004800279387A patent/CN1856957B/zh not_active Expired - Lifetime
- 2004-08-25 WO PCT/CA2004/001561 patent/WO2005020503A1/en active Search and Examination
-
2006
- 2006-07-18 HK HK06108057.7A patent/HK1091680A1/zh not_active IP Right Cessation
-
2012
- 2012-06-07 US US13/491,094 patent/US8533452B2/en not_active Expired - Lifetime
Also Published As
Publication number | Publication date |
---|---|
CN1856957B (zh) | 2010-05-05 |
WO2005020503A1 (en) | 2005-03-03 |
EP1665626A1 (en) | 2006-06-07 |
US8533452B2 (en) | 2013-09-10 |
CN1856957A (zh) | 2006-11-01 |
EP1665626A4 (en) | 2010-03-24 |
CA2536865C (en) | 2011-05-03 |
CA2536865A1 (en) | 2005-03-03 |
EP1665626B1 (en) | 2016-11-16 |
US20050154876A1 (en) | 2005-07-14 |
US20120246461A1 (en) | 2012-09-27 |
US8205091B2 (en) | 2012-06-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
HK1091680A1 (zh) | 用於保護無線數據的系統和方法 | |
AU2003279994A8 (en) | System and method for mobile data collection | |
GB0613933D0 (en) | Securing system and method | |
HK1073045A1 (en) | Roaming-service-enabling system and method | |
EP1758294A4 (en) | DATA COMMUNICATION PROCESS AND SYSTEM | |
GB0518043D0 (en) | Method and system for enhanced data searching | |
EP1702384A4 (en) | METHOD AND SYSTEM FOR WIRELESS LOADING | |
AU2003220556A8 (en) | Wireless data system | |
IL174556A0 (en) | Data compression system and method | |
HK1096218A1 (en) | Wireless communication system and method | |
GB0307406D0 (en) | Data analysis system and method | |
EP1671210A4 (en) | METHOD AND SYSTEM FOR IMPROVED WLAN POSITION DETERMINATION | |
EP1605619A4 (en) | RADIO COMMUNICATION SYSTEM AND RADIO COMMUNICATION METHOD | |
HK1087234A1 (en) | Communication system and communication method | |
AU2003226081A8 (en) | Method and system for enhancing data quality | |
EP1610221A4 (en) | INFORMATION PROVIDER DEVICE, ASSOCIATED METHOD, AND INFORMATION PROVIDER SYSTEM | |
GB0315156D0 (en) | Identification system and method | |
GB2415869B (en) | Data transfer system and data transfer method | |
GB0422295D0 (en) | System and method for data entry | |
EP1676392A4 (en) | SYSTEM AND METHOD FOR SECURE ACCESS | |
AU2003258956A8 (en) | Traffic data acquisition system and method | |
EP1640872A4 (en) | METHOD AND SYSTEM FOR DATA TRANSMISSION | |
GB0426911D0 (en) | Data communication system and method | |
GB0315308D0 (en) | Communication method and system | |
EP1695173A4 (en) | SYSTEM AND METHOD FOR FUNCTIONAL ELEMENTS |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PE | Patent expired |
Effective date: 20240824 |