SG10202105796SA - Module and method for authenticating data transfer between a storage device and a host device - Google Patents
Module and method for authenticating data transfer between a storage device and a host deviceInfo
- Publication number
- SG10202105796SA SG10202105796SA SG10202105796SA SG10202105796SA SG10202105796SA SG 10202105796S A SG10202105796S A SG 10202105796SA SG 10202105796S A SG10202105796S A SG 10202105796SA SG 10202105796S A SG10202105796S A SG 10202105796SA SG 10202105796S A SG10202105796S A SG 10202105796SA
- Authority
- SG
- Singapore
- Prior art keywords
- module
- data transfer
- storage device
- authenticating data
- host device
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Mathematical Physics (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SG10202105796SA SG10202105796SA (en) | 2021-06-01 | 2021-06-01 | Module and method for authenticating data transfer between a storage device and a host device |
US17/575,221 US11610026B2 (en) | 2021-06-01 | 2022-01-13 | Module and method for authenticating data transfer between a storage device and a host device |
EP22152382.2A EP4099618A1 (en) | 2021-06-01 | 2022-01-20 | Module and method for authenticating data transfer between a storage device and a host device |
AU2022200588A AU2022200588A1 (en) | 2021-06-01 | 2022-01-28 | Module and method for authenticating data transfer between a storage device and a host device |
KR1020220031568A KR102695289B1 (en) | 2021-06-01 | 2022-03-14 | Module and method for authenticating data transfer between a storage device and a host device |
TW111115436A TWI789291B (en) | 2021-06-01 | 2022-04-22 | Module and method for authenticating data transfer between a storage device and a host device |
AU2023201855A AU2023201855A1 (en) | 2021-06-01 | 2023-03-25 | Module and method for authenticating data transfer between a storage device and a host device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SG10202105796SA SG10202105796SA (en) | 2021-06-01 | 2021-06-01 | Module and method for authenticating data transfer between a storage device and a host device |
Publications (1)
Publication Number | Publication Date |
---|---|
SG10202105796SA true SG10202105796SA (en) | 2021-07-29 |
Family
ID=77338412
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG10202105796SA SG10202105796SA (en) | 2021-06-01 | 2021-06-01 | Module and method for authenticating data transfer between a storage device and a host device |
Country Status (5)
Country | Link |
---|---|
US (1) | US11610026B2 (en) |
EP (1) | EP4099618A1 (en) |
AU (2) | AU2022200588A1 (en) |
SG (1) | SG10202105796SA (en) |
TW (1) | TWI789291B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI811178B (en) * | 2023-02-04 | 2023-08-01 | 長茂科技股份有限公司 | Cybersecurity method and system based on multiparty and multifactor dynamic strong encryption authentication |
Family Cites Families (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6442686B1 (en) * | 1998-07-02 | 2002-08-27 | Networks Associates Technology, Inc. | System and methodology for messaging server-based management and enforcement of crypto policies |
DE60211655D1 (en) * | 2002-04-16 | 2006-06-29 | Izecom B V | Secure communication over the Internet |
US20050268328A1 (en) * | 2002-07-03 | 2005-12-01 | Gabriele Corliano | Trust establishment for multi-party communications |
KR100608585B1 (en) | 2004-07-12 | 2006-08-03 | 삼성전자주식회사 | Method and apparatus for searching rights objects stored in portable storage device using object location data |
US7284082B2 (en) | 2004-08-19 | 2007-10-16 | Lsi Corporation | Controller apparatus and method for improved data transfer |
US8219776B2 (en) | 2009-09-23 | 2012-07-10 | Lsi Corporation | Logical-to-physical address translation for solid state disks |
US9270683B2 (en) | 2009-05-15 | 2016-02-23 | Amazon Technologies, Inc. | Storage device authentication |
JP4802274B2 (en) * | 2009-10-30 | 2011-10-26 | インターナショナル・ビジネス・マシーンズ・コーポレーション | How to send and receive messages |
US8812860B1 (en) | 2010-12-03 | 2014-08-19 | Symantec Corporation | Systems and methods for protecting data stored on removable storage devices by requiring external user authentication |
US9948467B2 (en) | 2015-12-21 | 2018-04-17 | Mastercard International Incorporated | Method and system for blockchain variant using digital signatures |
US10097525B2 (en) * | 2016-03-08 | 2018-10-09 | Qualcomm Incorporated | System, apparatus and method for generating dynamic IPV6 addresses for secure authentication |
US10482036B2 (en) * | 2016-09-18 | 2019-11-19 | Winbond Electronics Corporation | Securely binding between memory chip and host |
US20190354694A1 (en) * | 2017-01-05 | 2019-11-21 | Serelay Limited | Verification of data captured by a consumer electronic device |
US10541818B2 (en) * | 2017-04-19 | 2020-01-21 | International Business Machines Corporation | Decentralized biometric signing of digital contracts |
WO2020049593A1 (en) * | 2018-09-07 | 2020-03-12 | Sling Media Pvt Ltd. | Security architecture for video streaming |
US20200117795A1 (en) * | 2018-10-16 | 2020-04-16 | KameleonSec Ltd. | System and method for generating and authenticating a trusted polymorphic and distributed unique hardware identifier |
CN109657426B (en) * | 2019-01-30 | 2023-08-15 | 贵州大学 | Data tracing method based on digital signature and digital watermark |
CN109918451B (en) * | 2019-03-28 | 2021-06-25 | 中国联合网络通信集团有限公司 | Database management method and system based on block chain |
CN111193750A (en) * | 2020-01-06 | 2020-05-22 | 李蕴光 | Mailbox encryption method, mailbox decryption method and mailbox processing method based on block chain |
CN112487380B (en) * | 2020-12-16 | 2024-04-05 | 江苏国科微电子有限公司 | Data interaction method, device, equipment and medium |
-
2021
- 2021-06-01 SG SG10202105796SA patent/SG10202105796SA/en unknown
-
2022
- 2022-01-13 US US17/575,221 patent/US11610026B2/en active Active
- 2022-01-20 EP EP22152382.2A patent/EP4099618A1/en active Pending
- 2022-01-28 AU AU2022200588A patent/AU2022200588A1/en not_active Abandoned
- 2022-04-22 TW TW111115436A patent/TWI789291B/en active
-
2023
- 2023-03-25 AU AU2023201855A patent/AU2023201855A1/en active Pending
Also Published As
Publication number | Publication date |
---|---|
US20220382918A1 (en) | 2022-12-01 |
TW202249471A (en) | 2022-12-16 |
AU2023201855A1 (en) | 2023-05-04 |
KR20220162609A (en) | 2022-12-08 |
AU2022200588A1 (en) | 2022-12-15 |
EP4099618A1 (en) | 2022-12-07 |
TWI789291B (en) | 2023-01-01 |
US11610026B2 (en) | 2023-03-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG11202104064PA (en) | Blockchain-Based Data Verification System And Method, Computing Device And Storage Medium | |
EP3972203A4 (en) | Data transmission method and apparatus, device, and computer storage medium | |
EP3676702A4 (en) | Method and apparatus for data compilation, electronic device and computer readable storage medium | |
EP4024907A4 (en) | Data processing method, bluetooth module, electronic device, and readable storage medium | |
EP4113322A4 (en) | Method and apparatus for updating data, electronic device, and computer readable storage medium | |
ZA202206487B (en) | Method and apparatus for storing data, and computer device and storage medium thereof | |
SG11202100802QA (en) | Data read and write method and apparatus, and electronic device | |
GB2425379B (en) | Method and apparatus for disconnecting an external data storage device from a computer | |
EP4024311A4 (en) | Method and apparatus for authenticating biometric payment device, computer device and storage medium | |
SG11202111634UA (en) | Map generation method and apparatus, electronic device, and computer storage medium | |
SG11202106254TA (en) | Data processing method and apparatus, electronic device, and storage medium | |
SG10202105796SA (en) | Module and method for authenticating data transfer between a storage device and a host device | |
EP4224781A4 (en) | Interface data transmission method and apparatus, electronic device, and storage medium | |
EP4174677A4 (en) | Data reading and writing method and device | |
EP4283891A4 (en) | Data transmission method and apparatus, and electronic device and storage medium | |
EP4161117A4 (en) | Data transmission method and system, electronic device, and computer readable storage medium | |
EP4198774A4 (en) | Data storage adjustment method and apparatus, and computer device | |
EP4068748A4 (en) | Camera module, control method and apparatus, electronic device, and storage medium | |
EP4304219A4 (en) | Data transmission method and system, electronic device, and storage medium | |
EP4224338A4 (en) | Data labeling method, apparatus, and system, device, and storage medium | |
EP4120096A4 (en) | Method and device for data retrieval, electronic device, and storage medium | |
EP4099646A4 (en) | Method and device for information exchange, electronic device, and storage medium | |
EP3965361C0 (en) | Data exchange between a client and a remote device, for example a secure module | |
EP4250673A4 (en) | Data transmission method, electronic device, and storage medium | |
EP4184361A4 (en) | Federated learning method, apparatus and system, electronic device and storage medium |