SG158757A1 - Method and apparatus for protecting data in computers - Google Patents
Method and apparatus for protecting data in computersInfo
- Publication number
- SG158757A1 SG158757A1 SG200805210-2A SG2008052102A SG158757A1 SG 158757 A1 SG158757 A1 SG 158757A1 SG 2008052102 A SG2008052102 A SG 2008052102A SG 158757 A1 SG158757 A1 SG 158757A1
- Authority
- SG
- Singapore
- Prior art keywords
- virtual disk
- secure virtual
- computers
- token
- user
- Prior art date
Links
Abstract
A method and apparatus for protecting user data stored in computers are disclosed. The invention allows a user to create and manage a secure virtual disk in a host computer based on the presence of two factors - a password and an external portable token. To access the secure virtual disk, said user must connect the correct external portable token to the host computer and input a correct password. Data files are encrypted using a token key before they are written into the secure virtual disk and are decrypted using the same said token key before they are read from the secure virtual disk.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SG200805210-2A SG158757A1 (en) | 2008-07-10 | 2008-07-10 | Method and apparatus for protecting data in computers |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SG200805210-2A SG158757A1 (en) | 2008-07-10 | 2008-07-10 | Method and apparatus for protecting data in computers |
Publications (1)
Publication Number | Publication Date |
---|---|
SG158757A1 true SG158757A1 (en) | 2010-02-26 |
Family
ID=41716826
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG200805210-2A SG158757A1 (en) | 2008-07-10 | 2008-07-10 | Method and apparatus for protecting data in computers |
Country Status (1)
Country | Link |
---|---|
SG (1) | SG158757A1 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8996667B2 (en) | 2010-04-27 | 2015-03-31 | International Business Machines Corporation | Deploying an operating system |
US9052918B2 (en) | 2010-12-14 | 2015-06-09 | International Business Machines Corporation | Management of multiple software images with shared memory blocks |
US9058235B2 (en) | 2010-12-13 | 2015-06-16 | International Business Machines Corporation | Upgrade of software images based on streaming technique |
US9086892B2 (en) | 2010-11-23 | 2015-07-21 | International Business Machines Corporation | Direct migration of software images with streaming technique |
US9230118B2 (en) | 2010-12-09 | 2016-01-05 | International Business Machines Corporation | Encrypting and decrypting a virtual disc |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7178025B2 (en) * | 1998-02-13 | 2007-02-13 | Tec Sec, Inc. | Access system utilizing multiple factor identification and authentication |
EP1775673A2 (en) * | 2005-10-17 | 2007-04-18 | Saflink Corporation | Token authentication system |
US20080114980A1 (en) * | 2006-11-13 | 2008-05-15 | Thangapandi Sridhar | System, method and apparatus for using standard and extended storage devices in two-factor authentication |
US20080148057A1 (en) * | 2006-12-19 | 2008-06-19 | Ohanae, Inc. | Security token |
WO2009020920A1 (en) * | 2007-08-07 | 2009-02-12 | Christophe Niglio | Apparatus and method for securing digital data with a security token |
-
2008
- 2008-07-10 SG SG200805210-2A patent/SG158757A1/en unknown
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7178025B2 (en) * | 1998-02-13 | 2007-02-13 | Tec Sec, Inc. | Access system utilizing multiple factor identification and authentication |
EP1775673A2 (en) * | 2005-10-17 | 2007-04-18 | Saflink Corporation | Token authentication system |
US20080114980A1 (en) * | 2006-11-13 | 2008-05-15 | Thangapandi Sridhar | System, method and apparatus for using standard and extended storage devices in two-factor authentication |
US20080148057A1 (en) * | 2006-12-19 | 2008-06-19 | Ohanae, Inc. | Security token |
WO2009020920A1 (en) * | 2007-08-07 | 2009-02-12 | Christophe Niglio | Apparatus and method for securing digital data with a security token |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8996667B2 (en) | 2010-04-27 | 2015-03-31 | International Business Machines Corporation | Deploying an operating system |
US9086892B2 (en) | 2010-11-23 | 2015-07-21 | International Business Machines Corporation | Direct migration of software images with streaming technique |
US9230118B2 (en) | 2010-12-09 | 2016-01-05 | International Business Machines Corporation | Encrypting and decrypting a virtual disc |
US9230113B2 (en) | 2010-12-09 | 2016-01-05 | International Business Machines Corporation | Encrypting and decrypting a virtual disc |
US9626302B2 (en) | 2010-12-09 | 2017-04-18 | International Business Machines Corporation | Encrypting and decrypting a virtual disc |
US9058235B2 (en) | 2010-12-13 | 2015-06-16 | International Business Machines Corporation | Upgrade of software images based on streaming technique |
US9195452B2 (en) | 2010-12-13 | 2015-11-24 | International Business Machines Corporation | Upgrade of software images based on streaming technique |
US9052918B2 (en) | 2010-12-14 | 2015-06-09 | International Business Machines Corporation | Management of multiple software images with shared memory blocks |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2267628A3 (en) | Token passing technique for media playback devices | |
AU2012281313B2 (en) | Method and apparatus for using non-volatile storage device | |
TW200707255A (en) | Data transcription in a data storage device | |
WO2009044461A1 (en) | Device access control program, device access control method, and information processor | |
WO2012037247A1 (en) | Secure transfer and tracking of data using removable non-volatile memory devices | |
WO2011162990A3 (en) | Single-use authentication methods for accessing encrypted data | |
TW200623070A (en) | Information processing apparatus, information processing method, and computer program | |
CN102073826A (en) | System and method for digital copyright management using lightweight digital watermark adding component | |
EP2425369B1 (en) | Memory device and method for adaptive protection of content | |
TWI436235B (en) | Data encryption method and system, data decryption method | |
US8307181B2 (en) | Apparatus and method for password protection of secure hidden memory | |
GB2471630B8 (en) | System and method for providing secure access to system memory | |
EP1983461A3 (en) | External storage apparatus and method of preventing information leakage | |
CN1996328A (en) | Portable information safety device | |
TW201426307A (en) | Delivering secured media using a portable memory device | |
TW201530344A (en) | Application program access protection method and application program access protection device | |
SG158757A1 (en) | Method and apparatus for protecting data in computers | |
JP2012044577A5 (en) | ||
CN101578608A (en) | Methods and apparatuses for accessing content based on a session ticket | |
TW200745904A (en) | Method and apparatus for binding computer memeory to motherboard | |
WO2008099909A1 (en) | Ic tag system | |
CN103049705A (en) | Virtualization based method, terminal and system for secure storage | |
KR101043255B1 (en) | Usb hub device for providing datasecurity and method for providing datasecurity using the same | |
WO2010089083A3 (en) | Device and method for preventing unauthorized use and/or manipulation of software | |
CN101794260A (en) | Automatically imported method of encryption key for mobile storage device |