SG11202009334WA - Remote secured terminal - Google Patents

Remote secured terminal

Info

Publication number
SG11202009334WA
SG11202009334WA SG11202009334WA SG11202009334WA SG11202009334WA SG 11202009334W A SG11202009334W A SG 11202009334WA SG 11202009334W A SG11202009334W A SG 11202009334WA SG 11202009334W A SG11202009334W A SG 11202009334WA SG 11202009334W A SG11202009334W A SG 11202009334WA
Authority
SG
Singapore
Prior art keywords
remote secured
secured terminal
terminal
remote
secured
Prior art date
Application number
SG11202009334WA
Other languages
English (en)
Inventor
Daniel Mondy Finchelstein
Yuval Moshe Porat
Shlomi Raz Marco
Original Assignee
Kazuar Advanced Tech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kazuar Advanced Tech Ltd filed Critical Kazuar Advanced Tech Ltd
Publication of SG11202009334WA publication Critical patent/SG11202009334WA/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/06Answer-back mechanisms or circuits
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/50Circuit switching systems, i.e. systems in which the path is physically permanent during the communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0877Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer And Data Communications (AREA)
  • Information Transfer Between Computers (AREA)
SG11202009334WA 2018-03-26 2019-03-25 Remote secured terminal SG11202009334WA (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IL258379A IL258379A (en) 2018-03-26 2018-03-26 Secure remote terminal
PCT/IL2019/050332 WO2019186536A1 (en) 2018-03-26 2019-03-25 Remote secured terminal

Publications (1)

Publication Number Publication Date
SG11202009334WA true SG11202009334WA (en) 2020-10-29

Family

ID=62454970

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11202009334WA SG11202009334WA (en) 2018-03-26 2019-03-25 Remote secured terminal

Country Status (8)

Country Link
US (2) US11563578B2 (ko)
EP (1) EP3776324A4 (ko)
JP (1) JP7335319B2 (ko)
KR (2) KR20210021282A (ko)
AU (1) AU2019245496A1 (ko)
IL (1) IL258379A (ko)
SG (1) SG11202009334WA (ko)
WO (1) WO2019186536A1 (ko)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114503105A (zh) * 2019-09-25 2022-05-13 联邦科学和工业研究组织 用于浏览器应用的密码服务
US11983287B2 (en) * 2020-12-02 2024-05-14 Capital One Services, Llc Non-persistent data caching web server
IL284485A (en) * 2021-06-29 2023-01-01 Kazuar Advanced Tech Ltd Secure communication between a client computer and a remote computer

Family Cites Families (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5596718A (en) * 1992-07-10 1997-01-21 Secure Computing Corporation Secure computer network using trusted path subsystem which encrypts/decrypts and communicates with user through local workstation user I/O devices without utilizing workstation processor
US20040230668A1 (en) * 1998-08-06 2004-11-18 Jason Carnahan Modular presentation device for use with PDA's and Smartphones
US20030159053A1 (en) * 2002-02-19 2003-08-21 Charles Fauble Secure reconfigurable input device with transaction card reader
US8180051B1 (en) * 2002-10-07 2012-05-15 Cisco Technology, Inc Methods and apparatus for securing communications of a user operated device
JP4586380B2 (ja) 2004-02-27 2010-11-24 ソニー株式会社 情報処理装置、および認証処理方法、並びにコンピュータ・プログラム
CA2630388A1 (en) 2008-05-05 2009-11-05 Nima Sharifmehr Apparatus and method to prevent man in the middle attack
GB2460275B (en) * 2008-05-23 2012-12-19 Exacttrak Ltd A Communications and Security Device
US8429435B1 (en) * 2008-07-25 2013-04-23 Autani Corporation Automation devices, systems, architectures, and methods for energy management and other applications
US8646105B2 (en) * 2008-08-29 2014-02-04 Blackberry Limited System, method and security device for authorizing use of a software tool
US8862872B2 (en) * 2008-09-12 2014-10-14 Qualcomm Incorporated Ticket-based spectrum authorization and access control
JP5628831B2 (ja) 2008-12-24 2014-11-19 ザ コモンウェルス オブ オーストラリア デジタルビデオガード
US9791944B2 (en) * 2010-02-24 2017-10-17 Hige Sec Labs Ltd Secured KVM system having remote controller-indicator
US8578161B2 (en) * 2010-04-01 2013-11-05 Intel Corporation Protocol for authenticating functionality in a peripheral device
US8769278B2 (en) * 2010-04-07 2014-07-01 Apple Inc. Apparatus and method for efficiently and securely exchanging connection data
US8958559B2 (en) * 2011-06-03 2015-02-17 Apple Inc. System and method for secure instant messaging
US9185080B2 (en) * 2011-08-12 2015-11-10 Intel Deutschland Gmbh Data transmitting devices, data receiving devices, methods for controlling a data transmitting device, and methods for controlling a data receiving device
US8639928B2 (en) * 2011-12-05 2014-01-28 Certicom Corp. System and method for mounting encrypted data based on availability of a key on a network
US8615656B2 (en) * 2012-01-09 2013-12-24 The Mitre Corporation Secure remote peripheral encryption tunnel
US20140067689A1 (en) * 2012-08-31 2014-03-06 Ncr Corporation Security module and method of securing payment information
US9471811B2 (en) 2012-08-31 2016-10-18 Ncr Corporation Learning a new peripheral using a security provisioning manifest
US8832813B1 (en) * 2012-12-19 2014-09-09 Emc Corporation Voice authentication via trusted device
US10152706B2 (en) * 2013-03-11 2018-12-11 Cellco Partnership Secure NFC data authentication
US9137659B2 (en) * 2013-04-25 2015-09-15 FusionPipe Software Solutions Inc. Method and system for decoupling user authentication and data encryption on mobile devices
US10331914B2 (en) * 2014-06-26 2019-06-25 Vertiv It Systems, Inc. System and method for KVM appliance forming a secure peripheral sharing switch to prevent data leakage
US9621547B2 (en) 2014-12-22 2017-04-11 Mcafee, Inc. Trust establishment between a trusted execution environment and peripheral devices
US10019605B2 (en) 2015-03-30 2018-07-10 Square, Inc. Systems, methods and apparatus for secure peripheral communication
GB2541000B (en) * 2015-08-04 2018-09-19 Displaylink Uk Ltd Security Device
US10382210B2 (en) * 2016-01-10 2019-08-13 Apple Inc. Secure device pairing
US11108741B2 (en) * 2017-02-12 2021-08-31 Noam Camiel System and method for the separation of systems that work together
US10284530B1 (en) * 2017-07-13 2019-05-07 Symantec Corporation Secure computer peripheral devices
US10650367B2 (en) * 2017-07-28 2020-05-12 Ncr Corporation Peer-to-peer (P2P) peripheral communication control
WO2020055419A1 (en) * 2018-09-14 2020-03-19 Hewlett-Packard Development Company, L.P. Secure connection

Also Published As

Publication number Publication date
JP2021519486A (ja) 2021-08-10
US11563578B2 (en) 2023-01-24
KR20210021282A (ko) 2021-02-25
EP3776324A4 (en) 2021-12-01
WO2019186536A1 (en) 2019-10-03
US20230117885A1 (en) 2023-04-20
KR20240116867A (ko) 2024-07-30
JP7335319B2 (ja) 2023-08-29
EP3776324A1 (en) 2021-02-17
IL258379A (en) 2018-05-31
US20210014058A1 (en) 2021-01-14
US11856101B2 (en) 2023-12-26
AU2019245496A1 (en) 2020-11-19

Similar Documents

Publication Publication Date Title
SG11202102516TA (en) Terminal device
PT3565224T (pt) Terminal móvel
GB2577811B (en) Connection
EP3557369A4 (en) TERMINAL
PT3793243T (pt) Terminal de utilizador
EP3813341A4 (en) TERMINAL
PL3454422T3 (pl) Zacisk przyłączeniowy przewodu
ZA202007390B (en) User terminal
EP3813342A4 (en) TERMINAL
PL3619773T3 (pl) Zacisk przyłączeniowy
ZA202100572B (en) User terminal
HUE063291T2 (hu) Felhasználói terminál
SG11202009334WA (en) Remote secured terminal
EP3758342A4 (en) TERMINAL
EP3579077A4 (en) TERMINAL
SG11202101563PA (en) Reception terminal
EP3582062A4 (en) TERMINAL
GB201816651D0 (en) Fitting assembly
GB201800145D0 (en) Terminal block
EP3674874A4 (en) TERMINAL DEVICE
GB2561219B (en) Electrical Terminal
IL275858A (en) receiver
GB201900427D0 (en) Remote device mamagement
GB202014642D0 (en) House
EP3817345A4 (en) TERMINAL