WO2001047175A2 - Vorrichtung zum passwort-geschützten handhaben eines elektronischen dokuments - Google Patents
Vorrichtung zum passwort-geschützten handhaben eines elektronischen dokuments Download PDFInfo
- Publication number
- WO2001047175A2 WO2001047175A2 PCT/EP2000/013270 EP0013270W WO0147175A2 WO 2001047175 A2 WO2001047175 A2 WO 2001047175A2 EP 0013270 W EP0013270 W EP 0013270W WO 0147175 A2 WO0147175 A2 WO 0147175A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- unit
- password
- key
- data
- information
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2127—Bluffing
Definitions
- the present invention relates to a device according to the preamble of claims 1 and 6 and a corresponding method.
- This technology is known in the form of an encryption system and usually consists of an encryption unit for producing an encrypted document and thus secured against unauthorized access, as well as a decryption unit or password checking unit that prompts for input or electrical merging with the correct key restores the original, open document.
- the object of the present invention is to overcome this lack of security and to improve the security of existing encryption devices and encryption methods.
- the aim of the present invention is to prevent a hacker from attempting any number of access attempts until the true, open content of the document to be protected is ultimately available to him.
- the object is achieved by the device having the features of claim 1, claim 6 and corresponding methods; advantageous developments of the invention are described in the subclaims. Independent protection within the scope of the invention is also for use regarding access or Log-in procedure used, such as could be useful when starting the operating system or when calling up user (text or similar) files.
- the invention achieves an uncertainty effect on the part of an illegally accessing (unauthorized) user, namely in that an improper entry of a password leads to a reaction of the functional unit and, typically, this reaction by the unauthorized user as an intended reaction (function) is recognized. Accordingly, he will then stop further unauthorized access attempts.
- the present invention relates to password-protected access to an electronic document encrypted in the manner described, the general password concept being based on the majority of passwords Keys (first key or the at least second key) is applied.
- the probability is that the hacker will gain access during his unauthorized attempts comes a decision result that is not equal to the original amount of data, so that the security effect of the present invention is supported accordingly.
- the diffusivity or non-recognizability achieved with the present invention as to whether the result of the decision actually corresponds to the correct, original amount of data thus opens up a completely new dimension in data backup.
- the present invention is particularly advantageously further developed in that an authorized or unauthorized user does not directly enter the key (or linked via electronic operations), but rather a password, which typically consists of only a few elements and thus, for example, can also be easily recognized, or access control and control instrument, together with a suitable unit, which is then linked to the first or second key via the key file provided for further training, and which is then used in the decryption unit for decryption.
- Such a key file which thus determines an assignment between the passwords to be entered by the user and the keys actually to be used, makes it possible to provide a large number of passwords, to assign them to one or more of the second key and in particular also to allow passwords to be predetermined in advance, which lead to the correct (ie first key) or to the only formally correct, but incorrect in terms of content (ie second key) result; this seems particularly appropriate for those application cases in which it is already conceivable which passwords a hacker would typically use to make an unauthorized access attempt, and such passwords, as expected, could automatically be used in advance for the second key and thus the only formally correct decision result were assigned (with the effect that the hacker would then probably interpret this as an already correct decryption attempt and thus stop further decryption attempts).
- the password and the key file is formed in such a way that a password entry triggers an indirect assignment operation, for example a jump in the key file formed as a table, so that the options for flexible password and key assignment can also be expanded.
- the information components of an electronic document according to the invention have meaning meaningful to the user and are realized as written words, numerical values, single images, film and / or sound sequences or frames or combinations thereof, the grammar em Written words, numerical values, single images, film or sound sequences or frames form the underlying system of the formal structure.
- a further preferred development of the invention also provides means for the inventive aspect of storing a or password-protected access to an electronic document, which are used to assign a plurality of passwords in an n: 1 relationship for the second key and / or Means for specifying at least one password by the user are provided by input into the key file unit.
- manipulation unit is assigned a random control unit according to the specific implementation of the encryption unit provided for the further development, which is used to interchange, remove, add and / or exchange the individual unit of information and / or sequence (s) by the manipulation unit ) of Controls information components randomly, in particular not reproducibly.
- the manipulation unit is assigned an encryption parameter unit which is designed to store and / or set predetermined parameters for the exchange, removal, addition and / or exchange by the manipulation unit, in particular with regard to The depth of encryption achieved by the number of exchanges, removals, additions and / or exchanges.
- the manipulation unit is also followed by a conversion unit which is designed to generate an electronically transferable volume file from the encrypted data set as an encrypted form of the electronic document and a preferably actively executable program and / or script file from the key data set as a reconstruction file.
- FIG. 1 a schematic block diagram of the device according to the invention in accordance with a first embodiment
- Fig. 4 a schematic block diagram of the functional components of the cryptographic unit 10 m Fig. 1 and
- a encryption unit 10 is designed in the manner shown in FIG. 1 with an input unit 12 for original data, in the present case data of an internal reporting system with financial data.
- Data to be encrypted is sent to the encryption unit 10 via the unit 12 (additionally or alternatively implemented as a data storage unit), which then generates an encrypted amount of data (encrypted file) and stores this data storage unit 14.
- the key file required for correct decryption is simultaneously n a final stored file unit 16, and a password with which a user can access the correct key file (hereinafter also referred to as the first key) is given to the user by means of a password interface or output unit (18) in a suitable manner, eg. B. by display, printout, Em or predefined by the user or the like. , communicates.
- a subsequent decryption unit 22 accesses the key file unit 16 with this password, and receives the correct decryption file (the first key), then carries out the decryption process on the encrypted document (ie the corresponding data record) stored in the data storage unit 14 and outputs the correct, decrypted result via a suitable output unit 24, e.g. B. a screen, printer or the like, the user.
- a suitable output unit 24 e.g. B. a screen, printer or the like
- the encryption unit 10 performs an encryption operation on the original data to be encrypted (the original data set), which involves exchanging and / or removing an information component from the original data set, adding an information component to a predetermined position m of the original data set or else There is an exchange of an information component for an information component that is not usually contained in the original data set.
- This process which is also to be cezeicnnet in the following as semantic encryption, is m the international patent application PCT / EP 00/06824 described as a method for encrypting an electronically stored, original amount of data and with regard to the generation of the key or decryption described there should be considered as fully included in the present application description as belonging to the invention.
- FIGS. 2 and 3 show an original file or the result of a correct decryption of a semantically encrypted original file
- FIG. 3 shows a corresponding data record of how it can be the result of a semantic encryption: as the comparison of FIGS. 2 and 3, the respective data records that describe a transaction process in the internal, company-specific information system of the exemplary embodiment are each a booking process that can still be recognized as a booking process even after encryption (FIG. 3)
- the various data contents have been modified: Both the date and date can be recognized, but the content differs from the original date of Fig. 2.
- the device according to FIG. 1, and there in particular the encryption unit 10, has the property of generating at least one encrypted data record according to FIG. 3, which, as explained above, does by its own Form corresponds to a correctly decrypted or original result, but is different in content from it and is therefore unusable for the user (or an unauthorized accesser); Without further checking measures, however, the accessing party is not able to determine whether the data record in FIG. 3 is actually a decryption that is correct in terms of content.
- At least one encryption result is generated, which is still encrypted in terms of content, but is formally and structurally an unauthorized accessing party It is not allowed to determine whether the correct result is actually available without checking the content.
- This technical measure is used in the context of the present invention in order to increase the security of the encryption system shown in FIG. 1: by performing the encryption process, the encryption unit 10 generates the first key (which enables the original data record according to FIG. 2 to be restored). and additionally generates at least one second key, which leads to a decryption result according to FIG. 3, the decryption result shown in FIG. 3 can induce an unauthorized accessor to refrain from further decryption or access attempts, on the assumption that it is actually a question of a decision the result he wanted.
- first and second keys can already be considered as passwords in the context of the present invention
- a key file A for Fig. 2) or B (for Fig. 3) would contain all the information and operations that are necessary for the restoration or production of the respective formally equivalent data records, such as the exchanged terms, index information for an order shift etc., so that immediate handling of the keys (or key files), e.g. B. in the form of character strings is not very practical.
- Table 1 shows that one assigns the respective key files A (for the correct decryption according to FIG. 2) or B (for the only formally correct decryption according to FIG. 3, which does not lead to content) in the form of a password four-digit number, handling is significantly easier for the user, since he only needs to remember the respective password:
- the encryption unit 10 generates a correct key file A, to which the password "7123", to be entered in the transmission unit 20, is assigned.
- the encryption unit 10 generates four further passwords (or these are entered by the user in a suitable manner), each of which is assigned the key file B, with the effect that when the number sequence “1302” is entered, the decryption unit 22 the result shown in FIG. 3.
- a variant of this edition of the decryption result could be that the recognizability of the wrong or unusable decryption result lies in a special form, design or labeling of the decryption result that is known to the user as such; Examples include a special coloring of an output document, an arrangement of an image or a graphic element of a certain position, an acoustic signal or the like.
- a further training option or preferred variant of this exemplary embodiment is not to explicitly specify predetermined (preselected) passwords, but rather to use them appropriately from an electronically available (typically extensive) selection list, for example a dictionary, and to take them into account as set passwords. This then had the consequence that, for example, in the case of a large number of improper access attempts also based on an electronic directory (dictionary), the reaction provided for in accordance with the invention, namely the drawing of the second function mode, can be reacted to at short notice, whereupon to be expected is that the abuser stops hacking.
- Another possibility of further developing this inventive idea, but also the previous general inventive idea, is to parameterize, preferably randomly, parameterize a large number of set passwords (second passwords within the scope of the invention), so that this additional measure also enables Possibility is created that passwords provided as second passwords within the scope of the invention nevertheless do not lead to a function triggering or to an error message or the like.
- the system eme fuzzy in accordance with the invention is generated automatically by the fact that adjacent characters of this character string, eg , B. "8123”, “7234", “7122” etc., automatically "B” is assigned as a key file. This measure can also effectively increase the security of traditional password-protected data access.
- FIG. 4 shows a schematic block diagram representation of the structure of the encryption unit 10 as a key generation and administration unit with the associated functional components within the scope of the present invention, which can be used to protect electronic electronics using the semantic encryption technology according to the invention Convert documents into the protected data set (volume file) and associated keys (key files or key data sets).
- the embodiment described in connection with FIG. 4 makes it possible within the scope of the invention not only to generate only a set of key data (which leads to the original, correct amount of data when restoring), but also a plurality of key data sets, so that this aspect of the The presence of a plurality of possible keys (one of which in turn also leads to the correct result in terms of content, and not only correctable in terms of schema) the security of the present invention can be realized.
- FIGS. 2 and 3 is to be used to describe an electronic text document which is in a conventional format (for example Microsoft WORD) and was created using suitable text editors.
- the text document consists of the sentence
- MSWORD format structure
- MSWORD format data unit
- the analysis unit 58 downstream of the reading / pulling unit 54 is now able to analyze and evaluate it on the basis of the document information read by the reading unit 54, the analysis unit 58 firstly breaking down the electronic document m and its individual information components and stores this in an information component storage unit 60 (in the present example these were the individual words), and additionally recognizes the document structure as a structure of two sentences delimited by points and stores this document structure in the document structure storage unit 62 decomposed.
- the content of the unit 62 is given the character of a document-specific metafile, which can also be accessed later (also possibly only selectively).
- the content of the document structure storage unit after the analysis of the original document by the analysis unit could look as follows:
- the information component storage unit 60 contains information components corresponding to this structural analysis, that is to say words:
- Thomas comes from the cemetery at 1:00 a.m. The train is on time.
- an equivalence unit 70 (which in its simplest version can be understood as a table or database of equivalent, ie corresponding and interchangeable, terms) was carried out as follows: The content component "Peter” of the original document was changed grammatically equivalent content component "Thomas” has been replaced, while sentence structure and grammar have been retained, but the meaning of the original document has already been destroyed.
- the functionality of the equivalence unit 70 or the semantic rule unit 72 corresponds to an electronically accessible form of a thesaurus or the like, with which, in the case of words, for example, equivalent 15 or opposite (but conceptually related) terms can be found easily and further can be used.
- the encryption depth of the encryption achieved by the encryption unit 10 according to FIG. 4 can be preselected.
- the manipulation unit 64 is assigned an encryption parameter unit 66 which makes the sequence of the individual operations achieved by the manipulation process in the unit 64 controllable and / or influenceable and thus enables an encoding depth or a number of emulation operations to be influenced can be.
- This can in particular also be achieved in a random manner, by means of the random control unit 68, which is also assigned to the manipulation unit.
- the associated first key file for the storage unit 74 could look as follows (in the following example, the reconstruction unit interprets the EXCHANGE command in order to carry out the swap specified in the argument):
- the vocabulary of the command language itself is dynamic and can be changed by functions of a script language; the EXCHANGE command itself could be replaced by any other expression.
- Key file 2 could accordingly begin as follows:
- an additional output unit 78 is connected downstream of these two storage units, which in a particularly simple manner prepares the plurality of keys 16 in the form of scripts and can output them as executable script files 84; this is done with the aid of a conversion unit 80 which, in an otherwise known manner, generates volume document 82 corresponding to the encrypted version from the volume data of the storage unit 14 and from the index or reconstruction data of the storage unit 16 several structure descriptions which can run independently within a suitable execution environment , Scripts, for example as Javascript, XML, VB-Sc ⁇ pt or the like. And which, in the case of the script file associated with the first key, can then independently process the volume document 82 when it runs and return it to the original, unencrypted form.
- the embodiment shown schematically in FIG. 4 is suitable not only for generating a key file for the storage unit 16 (or as an executable script file 84), but also for a plurality of these, of which, however, ideally only one content actually exists leads to a correct result, while key files other than scripts trigger a decryption process, which also leads to a meaningful (and thus apparently correct) result, but the content does not match the original version. This then increases the security of the locking device.
- the present invention is not limited to the exemplary example of number or text files. It is therefore particularly appropriate to encrypt any further electronic documents in the manner described in principle, as long as these electronic documents have a structure of content components that is suitable for the basic operations of exchanging, removing, adding or exchanging.
- Typical application cases are in particular music files, which are usually available in MP3 format and, where it is possible within the scope of the present invention, the data structures (so-called frames) specified by the MP3 format individually or in blocks (ideally also in cycles or sections) , related to the respective piece of music) to be exchanged, removed or exchanged.
- image and / or video files because the known document formats common there are also based on a sequence of frames as content components (in the case of images or electronic videos, these are the respective individual images), which can be manipulated in the manner according to the invention.
- a reconstruction file in particular in the form of a script or the like, is in an ASCII and / or HTML file format.
- a firewall protecting a client and / or server unit there are thus simplified possibilities for penetrating such a firewall unhindered.
- Another advantageous development of the invention provides for a reconstruction file suitable for electronic document data (of the same or a different file type). embedded in such a way that the format and (reproduced) content of such a guest file remains unchanged;
- a concealed transfer of reconstruction files with the purpose of further increasing security is therefore an area of the guest file which is not directly effective in terms of content, for example comment or information areas, etc.
- the possibility of realizing the keys or reconstruction files according to the invention as scripts offers numerous possibilities for further development: for example, the script-controlled merging within the scope of the present invention enables further flexibility or further increase in security by not restoring all of the script files as reconstruction files enables the unencrypted form of the electronic document by merging, but a plurality of scripts as reconstruction files is necessary, which, for example Cover predetermined time periods of the electronic document and then call them up successively.
- the invention could be implemented in such a way that each script file as a reconstruction file for a period of about 30 seconds enables an MP3 music piece to be reconstructed, and then another reconstruction calls (again script-controlled) a subsequent, further script file Reconstruction is necessary.
- there are possibilities of context-dependent generation or reconstruction of the original original document including even the possibility of contextually and specifically restoring different variants of the original document.
- a further embodiment of the present invention which corresponds to the most general form of the present invention and the functional unit according to the invention as an additional next abstract functional unit that can be implemented with any functionalities, either as a device for document encryption and document decryption according to 1, or additionally or alternatively as a device for controlling or triggering a payment transaction, for executing an (electronic) communication operation, for identifying and / or authenticating a user or (generally) for exporting a suitably preset program operation on a data processing device.
- the invention also encompasses that the functional unit according to the invention (in particular according to claim 6) can be operated in the first and second functional mode by means of at least one control parameter, with additional means being provided for deriving the control parameter from the first and / or second password.
- this control parameter (which is usually also present in a plurality) would influence a decryption or decryption operation of the functional unit. Specifically, this would then correspond to the first exemplary embodiment described above with reference to Table 1 or FIG. 1, where keys are assigned to the first or second passwords by means of a unit and these keys correspond in this respect to the control parameters provided in the further training.
- control parameter provided in accordance with the further training also goes beyond eme (traditionally already known) activation or deactivation of a functional unit, depending on whether a correct password has been entered:
- the control parameters in the sense of this aspect of the invention are, in particular, those directly related to the process
- the invention also encompasses control parameters provided according to further training not exclusively as parameters derived from keys or to be assigned to a key. to be understood, but in particular also as an internal variable or other, directly function-relevant parameters which, ideally without immediate perception or accessibility by a user, are critical elements in the proper functioning of the functional unit.
- control parameters in connection with or implemented by keys in a combination provided for further training, which semantically encrypts electronic documents or the like in the manner described above, ie. r. as control parameters in the semantic encryption process.
- an input unit 100 for a password is provided for interaction with a user, which may typically be implemented from a keyboard or the like.
- This input unit 100 is followed by a password checking unit 102 which, in the exemplary embodiment described using a password file device 106, compares the validity or correspondence of the password entered with stored passwords and, in response to this comparison, transmits a corresponding control signal to a downstream functional unit 104.
- the unit m 100 entered password corresponds to one of the second passwords (which eo
- Plural, m are stored in the data storage unit 106), a second functional operation predetermined according to the invention, which, however, does not correspond to the one actually intended by the user, was triggered.
- FIG. 1 Table 1
- FIG. 5 also describes a device which makes it possible to generate the first and, preferably, a plurality of second passwords in the manner according to the invention.
- a password generation unit 110 which is assigned to the data storage unit and which communicates with the user by means of a password communication unit 108, the unit 108 either for user input of the second key ice (and / or the first key, which is preferably to be provided in plural) ) is formed, or else the first and / or the second key is / are generated automatically by the unit 110 and is then output to the user by means of the communication unit 108.
- a particularly favorable form of implementation in the exemplary embodiment in FIG. 5 shows the directory or dictionary unit 112 assigned to the password generation unit 110, which, in accordance with further training, provides that not a (small) number of passwords is specifically generated and subsequently stored in the unit 106, instead, a password supply to unit 106 (with the purpose of password checking by unit 102) is dynamized and can be done automatically from the large number of terms or password specifications stored in unit 112.
- a particularly suitable example for the unit 112 would be an electronic lexicon or an electronic thesaurus.
- the user enters the password 100 into the system using the unit 100; the password checking unit then determines one of three possible operating cases: either it is an correct password (first password), which then triggers the first, predetermined (and intended) functional operation of the functional unit 104.
- the entered password is a second password in the sense of the invention, that is, the checking unit 102 recognizes this password as being present in the memory unit 106 (or introduced by the dictionary unit 112) without this password being the first Password corresponds.
- the decision of the password access unit therefore triggers the triggering of the second functional operation of the functional unit 104, which in turn is a planned, predetermined functional operation, which, however, does not correspond to the intended (intended). This could be practically realized, for example, in that a wrong or unselected document is reproduced in a document reproduction unit as a function unit 104, or a program that is not intended or planned runs in a program execution unit as a function unit 104 e.
- the third possibility in response to user input in unit 110 is that password checking unit 102 determines that neither the first nor one of the second passwords has been entered. As a result, a customary reject or error routine is output, as is expected or typically generated in conventional, password-protected systems in response to an incorrect password input.
- the present invention is not limited to the exemplary embodiments described. Rather, it should emerge from the description of FIG. 5 and the indicated context, in particular, that the invention can be used for a large number of possible uses and password environments is;
- the exemplary embodiments and functionalities described, in particular the unit 104 are only to be understood as exemplary, and the exemplary embodiment described with reference to FIG. 1 merely represents a concrete (but particularly favorable) form of implementation of the present invention. that inexpensive further training of the concrete form of implementation according to Fig. 1 can be analogous developments of the more general implementation form of FIG. 5.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Storage Device Security (AREA)
- Document Processing Apparatus (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP00991268A EP1245094A2 (de) | 1999-12-23 | 2000-12-27 | Vorrichtung zum passwort-geschützten handhaben eines elektronischen dokuments |
US10/175,127 US20050076247A1 (en) | 1999-12-23 | 2002-06-19 | Device for the password-protected handling of an electronic document |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE19962902A DE19962902A1 (de) | 1999-12-23 | 1999-12-23 | Vorrichtung zum Passwort-geschützten Handhaben eines elektronischen Dokuments |
DE19962902.1 | 1999-12-23 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/175,127 Continuation US20050076247A1 (en) | 1999-12-23 | 2002-06-19 | Device for the password-protected handling of an electronic document |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2001047175A2 true WO2001047175A2 (de) | 2001-06-28 |
WO2001047175A3 WO2001047175A3 (de) | 2002-05-23 |
Family
ID=7934420
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2000/013270 WO2001047175A2 (de) | 1999-12-23 | 2000-12-27 | Vorrichtung zum passwort-geschützten handhaben eines elektronischen dokuments |
Country Status (4)
Country | Link |
---|---|
US (1) | US20050076247A1 (de) |
EP (1) | EP1245094A2 (de) |
DE (1) | DE19962902A1 (de) |
WO (1) | WO2001047175A2 (de) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7664960B1 (en) * | 2005-09-23 | 2010-02-16 | Kenneth Wayne Clubb | Password enhancing device |
US8782402B2 (en) * | 2010-02-25 | 2014-07-15 | Bank Of America Corporation | System and method for secure communications |
US9713774B2 (en) | 2010-08-30 | 2017-07-25 | Disney Enterprises, Inc. | Contextual chat message generation in online environments |
US9552353B2 (en) | 2011-01-21 | 2017-01-24 | Disney Enterprises, Inc. | System and method for generating phrases |
US9245253B2 (en) * | 2011-08-19 | 2016-01-26 | Disney Enterprises, Inc. | Soft-sending chat messages |
US9176947B2 (en) | 2011-08-19 | 2015-11-03 | Disney Enterprises, Inc. | Dynamically generated phrase-based assisted input |
US8978158B2 (en) | 2012-04-27 | 2015-03-10 | Google Inc. | Privacy management across multiple devices |
US9165329B2 (en) | 2012-10-19 | 2015-10-20 | Disney Enterprises, Inc. | Multi layer chat detection and classification |
US10742577B2 (en) | 2013-03-15 | 2020-08-11 | Disney Enterprises, Inc. | Real-time search and validation of phrases using linguistic phrase components |
US10303762B2 (en) | 2013-03-15 | 2019-05-28 | Disney Enterprises, Inc. | Comprehensive safety schema for ensuring appropriateness of language in online chat |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0601500A1 (de) * | 1992-12-04 | 1994-06-15 | Testdrive Corporation | Verwandlung gelieferter Daten |
WO1997048034A1 (en) * | 1996-06-14 | 1997-12-18 | Wittkoetter Erland | Apparatus and method for the protected transmission and representation of electronically published documents |
WO1999041888A1 (en) * | 1998-02-17 | 1999-08-19 | Secure Computing Corporation | System and method for controlling access to stored documents |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5319705A (en) * | 1992-10-21 | 1994-06-07 | International Business Machines Corporation | Method and system for multimedia access control enablement |
JP3872626B2 (ja) * | 2000-02-14 | 2007-01-24 | シャープ株式会社 | メモリ装置 |
-
1999
- 1999-12-23 DE DE19962902A patent/DE19962902A1/de not_active Withdrawn
-
2000
- 2000-12-27 EP EP00991268A patent/EP1245094A2/de not_active Withdrawn
- 2000-12-27 WO PCT/EP2000/013270 patent/WO2001047175A2/de not_active Application Discontinuation
-
2002
- 2002-06-19 US US10/175,127 patent/US20050076247A1/en not_active Abandoned
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0601500A1 (de) * | 1992-12-04 | 1994-06-15 | Testdrive Corporation | Verwandlung gelieferter Daten |
WO1997048034A1 (en) * | 1996-06-14 | 1997-12-18 | Wittkoetter Erland | Apparatus and method for the protected transmission and representation of electronically published documents |
WO1999041888A1 (en) * | 1998-02-17 | 1999-08-19 | Secure Computing Corporation | System and method for controlling access to stored documents |
Also Published As
Publication number | Publication date |
---|---|
EP1245094A2 (de) | 2002-10-02 |
WO2001047175A3 (de) | 2002-05-23 |
DE19962902A1 (de) | 2001-07-05 |
US20050076247A1 (en) | 2005-04-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1410128A1 (de) | Datenverarbeitungsvorrichtung | |
DE69736310T2 (de) | Erzeugung und Verteilung digitaler Dokumente | |
DE69531082T2 (de) | Verfahren und Vorrichtung mit einem Verschlüsselungskopfteil, die es ermöglicht, Software zu erproben | |
DE60200616T2 (de) | Gesicherte Inhaltsobjekte | |
DE69531077T2 (de) | Verfahren und Vorrichtung mit Benutzereinwirkung der Art Erproben-und-Kaufen, die es ermöglicht, Software zu erproben | |
DE3044463C2 (de) | ||
EP1818844B1 (de) | Verfahren zur Benutzung von Sicherheitstoken | |
DE69626530T2 (de) | Schutz von software gegen benutzung ohne erlaubnis | |
DE69130175T2 (de) | Sicherheitssystem zur aktivierung von personalcomputerprogrammen an entfernten orten | |
DE60306844T2 (de) | Methode und System zur Datenaktualisierung | |
DE69417268T4 (de) | Verfahren zur elektronischen lizenzverteilung | |
DE19620346A1 (de) | Grafische Paßworteingabe | |
WO2001033318A1 (de) | Vorrichtung und verfahren zur geschützten ausgabe eines elektronischen dokuments über ein datenübertragungsnetz | |
EP1245094A2 (de) | Vorrichtung zum passwort-geschützten handhaben eines elektronischen dokuments | |
DE19851074C2 (de) | System und Verfahren zur sicheren Identifikation und Registrierung von Personen sowie eine hierfür geeignete Registriereinrichtung | |
WO2001059548A2 (de) | Vorrichtung zum zugriffsgeschützten behandeln elektronischer daten | |
DE102007021275A1 (de) | Verfahren zur Übertragung und/oder zur Bereitstellung persönlicher elektronischer Daten eines Inhabers, insbesondere gesundheitsbezogener elektronischer Daten eines Patienten | |
DE10359680A1 (de) | Verfahren zur Freischaltung eines Zugangs zu einem Computersystem oder zu einem Programm | |
DE69323730T2 (de) | Verfahren und einrichtung zur verhinderung des unberechtigten zugriffs auf ein rechnersystem. | |
DE3621543A1 (de) | Druckvorrichtung mit passwort-kontrolle | |
EP2492838A1 (de) | Verfahren zum Schutz vor maschinengenerierten Zugriffen auf eine zu schützende Resource einer Rechnereinheit | |
WO1999008171A1 (de) | Vorrichtung und verfahren zur geschützten ausgabe elektronisch übertragener und gespeicherter dokumente | |
DE4103173C2 (de) | Vorrichtung zum Schutz gegen unautorisierte Benutzung von Software | |
EP0947072A1 (de) | Verfahren zur elektronisch gesicherten speicherung von daten in einer datenbank | |
DE69710789T2 (de) | Vorrichtung und verfahren zur geschützten übertragung und darstellung von elektronisch publizierten dokumenten |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
AK | Designated states |
Kind code of ref document: A3 Designated state(s): US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A3 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 10175127 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2000991268 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2000991268 Country of ref document: EP |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 2000991268 Country of ref document: EP |