WO1994000936A1 - Procede et appareil servant a proteger des donnees dans un support de stockage et a transferer des donnees du support - Google Patents

Procede et appareil servant a proteger des donnees dans un support de stockage et a transferer des donnees du support Download PDF

Info

Publication number
WO1994000936A1
WO1994000936A1 PCT/US1992/005022 US9205022W WO9400936A1 WO 1994000936 A1 WO1994000936 A1 WO 1994000936A1 US 9205022 W US9205022 W US 9205022W WO 9400936 A1 WO9400936 A1 WO 9400936A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
media
storage medium
accessing device
zones
Prior art date
Application number
PCT/US1992/005022
Other languages
English (en)
Other versions
WO1994000936A9 (fr
Inventor
Gerald Lang
Original Assignee
Gerald Lang
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gerald Lang filed Critical Gerald Lang
Priority to PCT/US1992/005022 priority Critical patent/WO1994000936A1/fr
Publication of WO1994000936A1 publication Critical patent/WO1994000936A1/fr
Publication of WO1994000936A9 publication Critical patent/WO1994000936A9/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2103Challenge-response
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2135Metering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2153Using hardware token as a secondary aspect

Definitions

  • the access/information management control device such as an index table on the storage media is searched to determine if there is a match. If the corresponding ZAC is not stored in the access/information management control device of the storage medium or media, a message is displayed on the computer screen that access will not be granted. If there is a match of the ZAC's, then the associated system identification codes stored on the storage medium or media are accessed until an exact match is found. If no match of the system identification code is found, the accessor will not be granted access. If an exact match is found, the personal security key paired with the user's system identification code is retrieved by the computer and is used to operate upon a randomly computer generated number.
  • the personal accessing device can be programmed to permit metering such as only one download or a specific number of downloads of the portion of the program or one or more programs from a plurality of programs on the media allowed access by the user.
  • each of the users is assigned a Personal Identifi ⁇ cation Code (PIC) for use with the smart card PAD to corroborate the user's identity and thereafter enable the smart card to initiate the challenge-response dialogue with the storage medium or media.
  • PIC Personal Identifi ⁇ cation Code
  • a random number such as a four-digit number which is displayed by the computer or information processing device and serves as a challenge to the smart card 24.
  • the user depresses the challenge key 38 and enters the random number into a smart card 24 using the keypad
  • the material provided on the sto ⁇ -age media can be encrypted/decrypted utilizing the personal access device.
  • Storage media and the access/information management control device can be initially organized or dynamically re-organized during the operation of the computer to include one or more logical zones for the user's or users' material, a logical zone or zones to store any software that is to be recorded on the storage media, and one or more logical zones for the management control information.
  • the security transac ⁇ tions are performed within the smart card PAD for maximal security since it is located closest to the user.
  • an internal smart card PAD protect program places the smart card in the alarm and rejection mode and subsequent transmissions are not possible. Clearing of this mode can be performed by an autho ⁇ rized designated source.
  • the message can only be released at the recipient's terminal, i.e., imprinted or visual form, when the recipient has physically placed his smart card into the smart card reader and has successfully entered the correct PIC.
  • the present invention is applicable to this type of information delivery and to "E Mail" or electronic mail message services, also achieving delivery of information without both sender and recipient interacting in concurrent or simultaneous exchanges of information.
  • the invention may be embedded in current and new configurations and architectures for store-and-forward data communications, where messages are originated and transmitted from the sender's station without knowing the recipient is available at any particular receiving station.
  • each scan line along with the control information can be specifically encoded and then encrypted by the sender's smart card using the recipient's public encryption key or any encryption/decryption schema dependent upon the environment, be it unclassified, or not.
  • the encrypted message/document is then transmitted and stored in the recip ⁇ ient's logical zone on the SCFAX storage medium or media or within the store and forward storage media.
  • a LAN wherein the secure storage medium is controlled from a file server 60 which would include a secure storage medium having an index table such as shown with respect to Figure 4.
  • a user of the LAN is currently using non-secure data and then has need to access certain secure material.
  • the user inserts his smart card PAD in the smart card reader of one of the work stations 62 (see Figure 7) .
  • the user would then key in his PIC from the computer keyboard and the smart card starter program is executed.
  • the user selects the secure storage system selection from the work station's displayed menu of options and the smart card transmits his encrypted security identification code to the file server.
  • the file server checks to ensure that the user has privileges on the secure storage medium or media.
  • Public key encryption can also be used to protect and transmit materials stored in logical zones and secure storage media at the user's work station, to other users on the network or to users on other interconnected networks.
  • the computer can send back a challenge or identity code which the smart card will determine is the signal to deactivate itself, whenever the PAD is communi ⁇ cating with the computer as part of a "dialogue.” If this invention is used in situations in which the users can be subject to harm if they did not provide the correct PIC to activate the smart card, an alternate PIC can be issued to the users which will link to a special security identification code which will provide logical zone privileges for only non-secure user material or materials specifically prepared for this purpose. Additional- ly, once the alternate PIC is used, the original PIC would be deactivated automatically so that the original privileged user logical zones are no longer available.
  • the stored user material can range from unencrypted, to scrambled, to encrypted form.
  • the security of the user material is also established by controlling the permissions within any logical zone. In a timeshared system or a store-and-forward system for voice and message communications, where logical zone

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

Procédé et appareil servant à conférer des privilèges permettant d'extraire de manière sûre et sélective des éléments tels que des données et des bases de données, des messages et autres textes, graphismes, tables et éléments analogiques tels que des cartes, des télécopies de toutes sortes de données transmises, des données sonores telles que la voix ou la parole et la musique, des données vidéo, des images et des photographies présentes sur les supports de stockage (22), à l'aide d'informations codées dans ces supports. Ces supports de stockage sont compris dans un ou plusieurs dispositifs de lecture associés à un ou des ordinateurs. Un dispositif d'extraction de données (12), tel qu'une carte intelligente, est utilisé conjointement avec l'ordinateur (20) pour déterminer si l'extraction d'informations par un utilisateur particulier (14) des supports de stockage spécifiques (22) est permise. Les supports de stockage (22) peuvent être sous-divisés en une multiplicité de zones logiques, et l'accès à toutes les données, ou à une partie des données sur les supports est permis en fonction des zones logiques auxquelles l'utilisateur (14) peut accédér pour extraire des informations.
PCT/US1992/005022 1992-06-19 1992-06-19 Procede et appareil servant a proteger des donnees dans un support de stockage et a transferer des donnees du support WO1994000936A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/US1992/005022 WO1994000936A1 (fr) 1992-06-19 1992-06-19 Procede et appareil servant a proteger des donnees dans un support de stockage et a transferer des donnees du support

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US1992/005022 WO1994000936A1 (fr) 1992-06-19 1992-06-19 Procede et appareil servant a proteger des donnees dans un support de stockage et a transferer des donnees du support

Publications (2)

Publication Number Publication Date
WO1994000936A1 true WO1994000936A1 (fr) 1994-01-06
WO1994000936A9 WO1994000936A9 (fr) 1999-09-30

Family

ID=22231160

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1992/005022 WO1994000936A1 (fr) 1992-06-19 1992-06-19 Procede et appareil servant a proteger des donnees dans un support de stockage et a transferer des donnees du support

Country Status (1)

Country Link
WO (1) WO1994000936A1 (fr)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0683613A2 (fr) * 1994-05-20 1995-11-22 AT&T Corp. Emmagasinage et transmission de données de messages utilisant un vidéophone et une carte à puce
WO1999019784A1 (fr) * 1997-10-09 1999-04-22 Pythagoras Participations, Coöperatieve Vennootschap met beperkte aansprakelijkheid Procede et dispositif de commande utiles pour l'exploitation d'un dispositif de traitement d'informations numeriques
WO2000067097A1 (fr) * 1999-05-03 2000-11-09 Microsoft Corporation Systeme memoire securise portable a carte a puce permettant de transferer des profils d'utilisateurs et des documents
WO2000067098A1 (fr) * 1999-05-03 2000-11-09 Microsoft Corporation Systeme memoire securise a carte a puce pcmcia permettant de transferer des profils utilisateurs et des documents
EP1098322A2 (fr) * 1994-03-23 2001-05-09 GMS (Recordings) Limited Procédé de commande de la lecture d'un disque compact sur un lecteur de disque compact
WO2002019073A2 (fr) * 2000-08-31 2002-03-07 Sun Microsystems, Inc. Cles de chiffrement de reseau portable
US6360945B1 (en) 1998-06-16 2002-03-26 Ncr Corporation Methods and apparatus for employing a hidden security partition to enhance system security
EP1237111A1 (fr) * 2001-02-28 2002-09-04 Accenture LLP Fourniture d'informations douanières
US6463418B1 (en) * 1997-08-15 2002-10-08 Sun Microsystems, Inc. Secure and stateful electronic business transaction system
EP1257949A1 (fr) * 2000-01-11 2002-11-20 Tso, Inc. Procede et systeme pour la protection des secrets de fabrication
SG93792A1 (en) * 1995-04-20 2003-01-21 At & T Corp Electronic messaging in a wide area network
US7137548B2 (en) 1992-10-06 2006-11-21 Interdigital Technology Corporation Removable card for use in a radio unit
WO2009071429A1 (fr) * 2007-12-07 2009-06-11 International Business Machines Corporation Authentification basée sur la carte à puce d'un téléphone mobile
EP1126705B1 (fr) * 1994-07-08 2009-06-24 Sony Corporation Réception de signaux de télédiffusion en accès conditionnel

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4652698A (en) * 1984-08-13 1987-03-24 Ncr Corporation Method and system for providing system security in a remote terminal environment
US4799258A (en) * 1984-02-13 1989-01-17 National Research Development Corporation Apparatus and methods for granting access to computers
US4862501A (en) * 1985-03-08 1989-08-29 Kabushiki Kaisha Toshiba Communications network using IC cards
US5065429A (en) * 1989-04-03 1991-11-12 Lang Gerald S Method and apparatus for protecting material on storage media

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4799258A (en) * 1984-02-13 1989-01-17 National Research Development Corporation Apparatus and methods for granting access to computers
US4652698A (en) * 1984-08-13 1987-03-24 Ncr Corporation Method and system for providing system security in a remote terminal environment
US4862501A (en) * 1985-03-08 1989-08-29 Kabushiki Kaisha Toshiba Communications network using IC cards
US5065429A (en) * 1989-04-03 1991-11-12 Lang Gerald S Method and apparatus for protecting material on storage media

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7137548B2 (en) 1992-10-06 2006-11-21 Interdigital Technology Corporation Removable card for use in a radio unit
US7708197B2 (en) 1992-10-06 2010-05-04 Interdigital Technology Corporation Removable card for use in a communication unit
EP1098322A2 (fr) * 1994-03-23 2001-05-09 GMS (Recordings) Limited Procédé de commande de la lecture d'un disque compact sur un lecteur de disque compact
EP1098322A3 (fr) * 1994-03-23 2001-07-11 GMS (Recordings) Limited Procédé de commande de la lecture d'un disque compact sur un lecteur de disque compact
US5821983A (en) * 1994-05-20 1998-10-13 Lucent Technologies, Inc. Data message storage and transmission using a videophone and smart card
EP0683613A3 (fr) * 1994-05-20 1997-01-29 At & T Corp Emmagasinage et transmission de données de messages utilisant un vidéophone et une carte à puce.
EP0683613A2 (fr) * 1994-05-20 1995-11-22 AT&T Corp. Emmagasinage et transmission de données de messages utilisant un vidéophone et une carte à puce
EP1126705B1 (fr) * 1994-07-08 2009-06-24 Sony Corporation Réception de signaux de télédiffusion en accès conditionnel
SG93792A1 (en) * 1995-04-20 2003-01-21 At & T Corp Electronic messaging in a wide area network
US6463418B1 (en) * 1997-08-15 2002-10-08 Sun Microsystems, Inc. Secure and stateful electronic business transaction system
WO1999019784A1 (fr) * 1997-10-09 1999-04-22 Pythagoras Participations, Coöperatieve Vennootschap met beperkte aansprakelijkheid Procede et dispositif de commande utiles pour l'exploitation d'un dispositif de traitement d'informations numeriques
AU743864B2 (en) * 1997-10-09 2002-02-07 Pythagoras Participations, cooperatieve vennootschap met beperkte aansprakelijkheid Method and control-device for the operation of a digital information-processing device
US6360945B1 (en) 1998-06-16 2002-03-26 Ncr Corporation Methods and apparatus for employing a hidden security partition to enhance system security
US7036738B1 (en) 1999-05-03 2006-05-02 Microsoft Corporation PCMCIA-compliant smart card secured memory assembly for porting user profiles and documents
US7284697B2 (en) 1999-05-03 2007-10-23 Microsoft Corporation PCMCIA-compliant smart card secured memory assembly for porting user profiles and documents
WO2000067097A1 (fr) * 1999-05-03 2000-11-09 Microsoft Corporation Systeme memoire securise portable a carte a puce permettant de transferer des profils d'utilisateurs et des documents
WO2000067098A1 (fr) * 1999-05-03 2000-11-09 Microsoft Corporation Systeme memoire securise a carte a puce pcmcia permettant de transferer des profils utilisateurs et des documents
EP1257949A4 (fr) * 2000-01-11 2005-05-11 Tso Inc Procede et systeme pour la protection des secrets de fabrication
EP1257949A1 (fr) * 2000-01-11 2002-11-20 Tso, Inc. Procede et systeme pour la protection des secrets de fabrication
WO2002019073A2 (fr) * 2000-08-31 2002-03-07 Sun Microsystems, Inc. Cles de chiffrement de reseau portable
US7360240B2 (en) 2000-08-31 2008-04-15 Sun Microsystems, Inc. Portable network encryption keys
WO2002019073A3 (fr) * 2000-08-31 2003-09-04 Sun Microsystems Inc Cles de chiffrement de reseau portable
US7464054B2 (en) 2001-02-28 2008-12-09 Accenture Llp Providing customs information
EP1237111A1 (fr) * 2001-02-28 2002-09-04 Accenture LLP Fourniture d'informations douanières
WO2009071429A1 (fr) * 2007-12-07 2009-06-11 International Business Machines Corporation Authentification basée sur la carte à puce d'un téléphone mobile
CN101874247A (zh) * 2007-12-07 2010-10-27 国际商业机器公司 基于移动智能卡的认证
US8132244B2 (en) 2007-12-07 2012-03-06 International Business Machines Corporation Mobile smartcard based authentication

Also Published As

Publication number Publication date
WO1994000936A9 (fr) 1999-09-30

Similar Documents

Publication Publication Date Title
US5191611A (en) Method and apparatus for protecting material on storage media and for transferring material on storage media to various recipients
US6848047B1 (en) Security managing system, data distribution apparatus and portable terminal apparatus
KR100269527B1 (ko) 저장및정보송신시스템과,정보송신및판독방법
US5065429A (en) Method and apparatus for protecting material on storage media
US7783887B2 (en) Method and apparatus for providing television services using an authenticating television receiver device
CA2231082C (fr) Methode et appareil de stockage et de controle d'acces aux renseignements
US5402490A (en) Process for improving public key authentication
US20070136202A1 (en) Personal-information managing apparatus, method of providing personal information, computer product, and personal-information-providing system
US7346779B2 (en) System and method for authenticating electronic documents
US6041412A (en) Apparatus and method for providing access to secured data or area
US5623637A (en) Encrypted data storage card including smartcard integrated circuit for storing an access password and encryption keys
US9807065B2 (en) Wireless device and computer readable medium for storing a message in a wireless device
US5559888A (en) Secure information retrieval service (SIRS)
WO1994000936A1 (fr) Procede et appareil servant a proteger des donnees dans un support de stockage et a transferer des donnees du support
KR19990022620A (ko) 데이터 저장 매체용 액세스 제어 시스템 및 방법
US6173282B1 (en) Electronic sealed envelope
CA1329657C (fr) Methode et appareil de protection d'informations enregistrees
JP3636087B2 (ja) 個人情報提供システム、個人情報提供方法、および個人情報提供プログラム
US20040221164A1 (en) Method for the encryption and decryption of data by various users
CN101424898A (zh) 图像形成装置以及图像形成系统
CN117201148B (zh) 一种基于计算机的企业文档加密防护系统
CN117768093A (zh) 一种用于手机终端的数据加密系统
KR20040022864A (ko) 전자 내용증명 문서 전송 시스템 및 그 방법
JP2001014436A (ja) 電子記憶カード
JPS6180433A (ja) 分散型デ−タベ−スの機密保護方式

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): CA JP

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH DE DK ES FR GB GR IT LU MC NL SE

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: CA

AK Designated states

Kind code of ref document: C2

Designated state(s): CA JP

AL Designated countries for regional patents

Kind code of ref document: C2

Designated state(s): AT BE CH DE DK ES FR GB GR IT LU MC NL SE

COP Corrected version of pamphlet

Free format text: PAGES 24-26, DESCRIPTION, ADDED; PAGES 27-34, CLAIMS, ADDED; PAGES 1/9-9/9, DRAWINGS, ADDED