WO1994000936A1 - Procede et appareil servant a proteger des donnees dans un support de stockage et a transferer des donnees du support - Google Patents
Procede et appareil servant a proteger des donnees dans un support de stockage et a transferer des donnees du support Download PDFInfo
- Publication number
- WO1994000936A1 WO1994000936A1 PCT/US1992/005022 US9205022W WO9400936A1 WO 1994000936 A1 WO1994000936 A1 WO 1994000936A1 US 9205022 W US9205022 W US 9205022W WO 9400936 A1 WO9400936 A1 WO 9400936A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- media
- storage medium
- accessing device
- zones
- Prior art date
Links
- 238000003860 storage Methods 0.000 title claims abstract description 136
- 239000000463 material Substances 0.000 title claims abstract description 107
- 238000000034 method Methods 0.000 title claims abstract description 36
- 238000004891 communication Methods 0.000 claims description 20
- 230000006854 communication Effects 0.000 claims description 20
- 238000012545 processing Methods 0.000 claims description 11
- 230000008878 coupling Effects 0.000 claims 4
- 238000010168 coupling process Methods 0.000 claims 4
- 238000005859 coupling reaction Methods 0.000 claims 4
- 238000013480 data collection Methods 0.000 claims 4
- 230000000977 initiatory effect Effects 0.000 claims 4
- 238000012544 monitoring process Methods 0.000 claims 4
- 230000010365 information processing Effects 0.000 description 22
- 238000007726 management method Methods 0.000 description 12
- 238000010586 diagram Methods 0.000 description 8
- 230000004044 response Effects 0.000 description 8
- 230000005540 biological transmission Effects 0.000 description 7
- 230000000694 effects Effects 0.000 description 7
- 230000003287 optical effect Effects 0.000 description 6
- 230000008569 process Effects 0.000 description 6
- 230000008520 organization Effects 0.000 description 4
- 238000013461 design Methods 0.000 description 3
- 238000009826 distribution Methods 0.000 description 3
- 239000000835 fiber Substances 0.000 description 3
- 238000012432 intermediate storage Methods 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 230000001010 compromised effect Effects 0.000 description 2
- 230000001681 protective effect Effects 0.000 description 2
- 230000035945 sensitivity Effects 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000000007 visual effect Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000004888 barrier function Effects 0.000 description 1
- 150000001768 cations Chemical class 0.000 description 1
- 239000011093 chipboard Substances 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 230000003111 delayed effect Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000000994 depressogenic effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000004880 explosion Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000013101 initial test Methods 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 239000000123 paper Substances 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000000153 supplemental effect Effects 0.000 description 1
- 238000013519 translation Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2103—Challenge-response
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2135—Metering
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2153—Using hardware token as a secondary aspect
Definitions
- the access/information management control device such as an index table on the storage media is searched to determine if there is a match. If the corresponding ZAC is not stored in the access/information management control device of the storage medium or media, a message is displayed on the computer screen that access will not be granted. If there is a match of the ZAC's, then the associated system identification codes stored on the storage medium or media are accessed until an exact match is found. If no match of the system identification code is found, the accessor will not be granted access. If an exact match is found, the personal security key paired with the user's system identification code is retrieved by the computer and is used to operate upon a randomly computer generated number.
- the personal accessing device can be programmed to permit metering such as only one download or a specific number of downloads of the portion of the program or one or more programs from a plurality of programs on the media allowed access by the user.
- each of the users is assigned a Personal Identifi ⁇ cation Code (PIC) for use with the smart card PAD to corroborate the user's identity and thereafter enable the smart card to initiate the challenge-response dialogue with the storage medium or media.
- PIC Personal Identifi ⁇ cation Code
- a random number such as a four-digit number which is displayed by the computer or information processing device and serves as a challenge to the smart card 24.
- the user depresses the challenge key 38 and enters the random number into a smart card 24 using the keypad
- the material provided on the sto ⁇ -age media can be encrypted/decrypted utilizing the personal access device.
- Storage media and the access/information management control device can be initially organized or dynamically re-organized during the operation of the computer to include one or more logical zones for the user's or users' material, a logical zone or zones to store any software that is to be recorded on the storage media, and one or more logical zones for the management control information.
- the security transac ⁇ tions are performed within the smart card PAD for maximal security since it is located closest to the user.
- an internal smart card PAD protect program places the smart card in the alarm and rejection mode and subsequent transmissions are not possible. Clearing of this mode can be performed by an autho ⁇ rized designated source.
- the message can only be released at the recipient's terminal, i.e., imprinted or visual form, when the recipient has physically placed his smart card into the smart card reader and has successfully entered the correct PIC.
- the present invention is applicable to this type of information delivery and to "E Mail" or electronic mail message services, also achieving delivery of information without both sender and recipient interacting in concurrent or simultaneous exchanges of information.
- the invention may be embedded in current and new configurations and architectures for store-and-forward data communications, where messages are originated and transmitted from the sender's station without knowing the recipient is available at any particular receiving station.
- each scan line along with the control information can be specifically encoded and then encrypted by the sender's smart card using the recipient's public encryption key or any encryption/decryption schema dependent upon the environment, be it unclassified, or not.
- the encrypted message/document is then transmitted and stored in the recip ⁇ ient's logical zone on the SCFAX storage medium or media or within the store and forward storage media.
- a LAN wherein the secure storage medium is controlled from a file server 60 which would include a secure storage medium having an index table such as shown with respect to Figure 4.
- a user of the LAN is currently using non-secure data and then has need to access certain secure material.
- the user inserts his smart card PAD in the smart card reader of one of the work stations 62 (see Figure 7) .
- the user would then key in his PIC from the computer keyboard and the smart card starter program is executed.
- the user selects the secure storage system selection from the work station's displayed menu of options and the smart card transmits his encrypted security identification code to the file server.
- the file server checks to ensure that the user has privileges on the secure storage medium or media.
- Public key encryption can also be used to protect and transmit materials stored in logical zones and secure storage media at the user's work station, to other users on the network or to users on other interconnected networks.
- the computer can send back a challenge or identity code which the smart card will determine is the signal to deactivate itself, whenever the PAD is communi ⁇ cating with the computer as part of a "dialogue.” If this invention is used in situations in which the users can be subject to harm if they did not provide the correct PIC to activate the smart card, an alternate PIC can be issued to the users which will link to a special security identification code which will provide logical zone privileges for only non-secure user material or materials specifically prepared for this purpose. Additional- ly, once the alternate PIC is used, the original PIC would be deactivated automatically so that the original privileged user logical zones are no longer available.
- the stored user material can range from unencrypted, to scrambled, to encrypted form.
- the security of the user material is also established by controlling the permissions within any logical zone. In a timeshared system or a store-and-forward system for voice and message communications, where logical zone
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US1992/005022 WO1994000936A1 (fr) | 1992-06-19 | 1992-06-19 | Procede et appareil servant a proteger des donnees dans un support de stockage et a transferer des donnees du support |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US1992/005022 WO1994000936A1 (fr) | 1992-06-19 | 1992-06-19 | Procede et appareil servant a proteger des donnees dans un support de stockage et a transferer des donnees du support |
Publications (2)
Publication Number | Publication Date |
---|---|
WO1994000936A1 true WO1994000936A1 (fr) | 1994-01-06 |
WO1994000936A9 WO1994000936A9 (fr) | 1999-09-30 |
Family
ID=22231160
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US1992/005022 WO1994000936A1 (fr) | 1992-06-19 | 1992-06-19 | Procede et appareil servant a proteger des donnees dans un support de stockage et a transferer des donnees du support |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO1994000936A1 (fr) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0683613A2 (fr) * | 1994-05-20 | 1995-11-22 | AT&T Corp. | Emmagasinage et transmission de données de messages utilisant un vidéophone et une carte à puce |
WO1999019784A1 (fr) * | 1997-10-09 | 1999-04-22 | Pythagoras Participations, Coöperatieve Vennootschap met beperkte aansprakelijkheid | Procede et dispositif de commande utiles pour l'exploitation d'un dispositif de traitement d'informations numeriques |
WO2000067097A1 (fr) * | 1999-05-03 | 2000-11-09 | Microsoft Corporation | Systeme memoire securise portable a carte a puce permettant de transferer des profils d'utilisateurs et des documents |
WO2000067098A1 (fr) * | 1999-05-03 | 2000-11-09 | Microsoft Corporation | Systeme memoire securise a carte a puce pcmcia permettant de transferer des profils utilisateurs et des documents |
EP1098322A2 (fr) * | 1994-03-23 | 2001-05-09 | GMS (Recordings) Limited | Procédé de commande de la lecture d'un disque compact sur un lecteur de disque compact |
WO2002019073A2 (fr) * | 2000-08-31 | 2002-03-07 | Sun Microsystems, Inc. | Cles de chiffrement de reseau portable |
US6360945B1 (en) | 1998-06-16 | 2002-03-26 | Ncr Corporation | Methods and apparatus for employing a hidden security partition to enhance system security |
EP1237111A1 (fr) * | 2001-02-28 | 2002-09-04 | Accenture LLP | Fourniture d'informations douanières |
US6463418B1 (en) * | 1997-08-15 | 2002-10-08 | Sun Microsystems, Inc. | Secure and stateful electronic business transaction system |
EP1257949A1 (fr) * | 2000-01-11 | 2002-11-20 | Tso, Inc. | Procede et systeme pour la protection des secrets de fabrication |
SG93792A1 (en) * | 1995-04-20 | 2003-01-21 | At & T Corp | Electronic messaging in a wide area network |
US7137548B2 (en) | 1992-10-06 | 2006-11-21 | Interdigital Technology Corporation | Removable card for use in a radio unit |
WO2009071429A1 (fr) * | 2007-12-07 | 2009-06-11 | International Business Machines Corporation | Authentification basée sur la carte à puce d'un téléphone mobile |
EP1126705B1 (fr) * | 1994-07-08 | 2009-06-24 | Sony Corporation | Réception de signaux de télédiffusion en accès conditionnel |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4652698A (en) * | 1984-08-13 | 1987-03-24 | Ncr Corporation | Method and system for providing system security in a remote terminal environment |
US4799258A (en) * | 1984-02-13 | 1989-01-17 | National Research Development Corporation | Apparatus and methods for granting access to computers |
US4862501A (en) * | 1985-03-08 | 1989-08-29 | Kabushiki Kaisha Toshiba | Communications network using IC cards |
US5065429A (en) * | 1989-04-03 | 1991-11-12 | Lang Gerald S | Method and apparatus for protecting material on storage media |
-
1992
- 1992-06-19 WO PCT/US1992/005022 patent/WO1994000936A1/fr active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4799258A (en) * | 1984-02-13 | 1989-01-17 | National Research Development Corporation | Apparatus and methods for granting access to computers |
US4652698A (en) * | 1984-08-13 | 1987-03-24 | Ncr Corporation | Method and system for providing system security in a remote terminal environment |
US4862501A (en) * | 1985-03-08 | 1989-08-29 | Kabushiki Kaisha Toshiba | Communications network using IC cards |
US5065429A (en) * | 1989-04-03 | 1991-11-12 | Lang Gerald S | Method and apparatus for protecting material on storage media |
Cited By (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7137548B2 (en) | 1992-10-06 | 2006-11-21 | Interdigital Technology Corporation | Removable card for use in a radio unit |
US7708197B2 (en) | 1992-10-06 | 2010-05-04 | Interdigital Technology Corporation | Removable card for use in a communication unit |
EP1098322A2 (fr) * | 1994-03-23 | 2001-05-09 | GMS (Recordings) Limited | Procédé de commande de la lecture d'un disque compact sur un lecteur de disque compact |
EP1098322A3 (fr) * | 1994-03-23 | 2001-07-11 | GMS (Recordings) Limited | Procédé de commande de la lecture d'un disque compact sur un lecteur de disque compact |
US5821983A (en) * | 1994-05-20 | 1998-10-13 | Lucent Technologies, Inc. | Data message storage and transmission using a videophone and smart card |
EP0683613A3 (fr) * | 1994-05-20 | 1997-01-29 | At & T Corp | Emmagasinage et transmission de données de messages utilisant un vidéophone et une carte à puce. |
EP0683613A2 (fr) * | 1994-05-20 | 1995-11-22 | AT&T Corp. | Emmagasinage et transmission de données de messages utilisant un vidéophone et une carte à puce |
EP1126705B1 (fr) * | 1994-07-08 | 2009-06-24 | Sony Corporation | Réception de signaux de télédiffusion en accès conditionnel |
SG93792A1 (en) * | 1995-04-20 | 2003-01-21 | At & T Corp | Electronic messaging in a wide area network |
US6463418B1 (en) * | 1997-08-15 | 2002-10-08 | Sun Microsystems, Inc. | Secure and stateful electronic business transaction system |
WO1999019784A1 (fr) * | 1997-10-09 | 1999-04-22 | Pythagoras Participations, Coöperatieve Vennootschap met beperkte aansprakelijkheid | Procede et dispositif de commande utiles pour l'exploitation d'un dispositif de traitement d'informations numeriques |
AU743864B2 (en) * | 1997-10-09 | 2002-02-07 | Pythagoras Participations, cooperatieve vennootschap met beperkte aansprakelijkheid | Method and control-device for the operation of a digital information-processing device |
US6360945B1 (en) | 1998-06-16 | 2002-03-26 | Ncr Corporation | Methods and apparatus for employing a hidden security partition to enhance system security |
US7036738B1 (en) | 1999-05-03 | 2006-05-02 | Microsoft Corporation | PCMCIA-compliant smart card secured memory assembly for porting user profiles and documents |
US7284697B2 (en) | 1999-05-03 | 2007-10-23 | Microsoft Corporation | PCMCIA-compliant smart card secured memory assembly for porting user profiles and documents |
WO2000067097A1 (fr) * | 1999-05-03 | 2000-11-09 | Microsoft Corporation | Systeme memoire securise portable a carte a puce permettant de transferer des profils d'utilisateurs et des documents |
WO2000067098A1 (fr) * | 1999-05-03 | 2000-11-09 | Microsoft Corporation | Systeme memoire securise a carte a puce pcmcia permettant de transferer des profils utilisateurs et des documents |
EP1257949A4 (fr) * | 2000-01-11 | 2005-05-11 | Tso Inc | Procede et systeme pour la protection des secrets de fabrication |
EP1257949A1 (fr) * | 2000-01-11 | 2002-11-20 | Tso, Inc. | Procede et systeme pour la protection des secrets de fabrication |
WO2002019073A2 (fr) * | 2000-08-31 | 2002-03-07 | Sun Microsystems, Inc. | Cles de chiffrement de reseau portable |
US7360240B2 (en) | 2000-08-31 | 2008-04-15 | Sun Microsystems, Inc. | Portable network encryption keys |
WO2002019073A3 (fr) * | 2000-08-31 | 2003-09-04 | Sun Microsystems Inc | Cles de chiffrement de reseau portable |
US7464054B2 (en) | 2001-02-28 | 2008-12-09 | Accenture Llp | Providing customs information |
EP1237111A1 (fr) * | 2001-02-28 | 2002-09-04 | Accenture LLP | Fourniture d'informations douanières |
WO2009071429A1 (fr) * | 2007-12-07 | 2009-06-11 | International Business Machines Corporation | Authentification basée sur la carte à puce d'un téléphone mobile |
CN101874247A (zh) * | 2007-12-07 | 2010-10-27 | 国际商业机器公司 | 基于移动智能卡的认证 |
US8132244B2 (en) | 2007-12-07 | 2012-03-06 | International Business Machines Corporation | Mobile smartcard based authentication |
Also Published As
Publication number | Publication date |
---|---|
WO1994000936A9 (fr) | 1999-09-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5191611A (en) | Method and apparatus for protecting material on storage media and for transferring material on storage media to various recipients | |
US6848047B1 (en) | Security managing system, data distribution apparatus and portable terminal apparatus | |
KR100269527B1 (ko) | 저장및정보송신시스템과,정보송신및판독방법 | |
US5065429A (en) | Method and apparatus for protecting material on storage media | |
US7783887B2 (en) | Method and apparatus for providing television services using an authenticating television receiver device | |
CA2231082C (fr) | Methode et appareil de stockage et de controle d'acces aux renseignements | |
US5402490A (en) | Process for improving public key authentication | |
US20070136202A1 (en) | Personal-information managing apparatus, method of providing personal information, computer product, and personal-information-providing system | |
US7346779B2 (en) | System and method for authenticating electronic documents | |
US6041412A (en) | Apparatus and method for providing access to secured data or area | |
US5623637A (en) | Encrypted data storage card including smartcard integrated circuit for storing an access password and encryption keys | |
US9807065B2 (en) | Wireless device and computer readable medium for storing a message in a wireless device | |
US5559888A (en) | Secure information retrieval service (SIRS) | |
WO1994000936A1 (fr) | Procede et appareil servant a proteger des donnees dans un support de stockage et a transferer des donnees du support | |
KR19990022620A (ko) | 데이터 저장 매체용 액세스 제어 시스템 및 방법 | |
US6173282B1 (en) | Electronic sealed envelope | |
CA1329657C (fr) | Methode et appareil de protection d'informations enregistrees | |
JP3636087B2 (ja) | 個人情報提供システム、個人情報提供方法、および個人情報提供プログラム | |
US20040221164A1 (en) | Method for the encryption and decryption of data by various users | |
CN101424898A (zh) | 图像形成装置以及图像形成系统 | |
CN117201148B (zh) | 一种基于计算机的企业文档加密防护系统 | |
CN117768093A (zh) | 一种用于手机终端的数据加密系统 | |
KR20040022864A (ko) | 전자 내용증명 문서 전송 시스템 및 그 방법 | |
JP2001014436A (ja) | 電子記憶カード | |
JPS6180433A (ja) | 分散型デ−タベ−スの機密保護方式 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): CA JP |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH DE DK ES FR GB GR IT LU MC NL SE |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase |
Ref country code: CA |
|
AK | Designated states |
Kind code of ref document: C2 Designated state(s): CA JP |
|
AL | Designated countries for regional patents |
Kind code of ref document: C2 Designated state(s): AT BE CH DE DK ES FR GB GR IT LU MC NL SE |
|
COP | Corrected version of pamphlet |
Free format text: PAGES 24-26, DESCRIPTION, ADDED; PAGES 27-34, CLAIMS, ADDED; PAGES 1/9-9/9, DRAWINGS, ADDED |