[go: up one dir, main page]

Wang, 1999 - Google Patents

Security issues to tele-medicine system design

Wang, 1999

Document ID
3468211913115346431
Author
Wang C
Publication year
Publication venue
Proceedings IEEE Southeastcon'99. Technology on the Brink of 2000 (Cat. No. 99CH36300)

External Links

Snippet

With the rapid development of the Internet and Internet based applications, tele-medicine can potentially provide important health care coverage for remote and rural areas where specialized medical expertise is lacking. Using Internet based tele-medicine application, the …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption

Similar Documents

Publication Publication Date Title
Maughan et al. Internet security association and key management protocol (ISAKMP)
US6988199B2 (en) Secure and reliable document delivery
US9819666B2 (en) Pass-thru for client authentication
EP1782213B1 (en) Secure messaging system with derived keys
US6684332B1 (en) Method and system for the exchange of digitally signed objects over an insecure network
US7096362B2 (en) Internet authentication with multiple independent certificate authorities
US7016499B2 (en) Secure ephemeral decryptability
US7688975B2 (en) Method and apparatus for dynamic generation of symmetric encryption keys and exchange of dynamic symmetric key infrastructure
US7036010B2 (en) Method and apparatus for a secure communications session with a remote system via an access-controlling intermediate system
US20030084292A1 (en) Using atomic messaging to increase the security of transferring data across a network
US20010005883A1 (en) Security protocol
US20020019932A1 (en) Cryptographically secure network
JP2002290397A (en) Secure communication method
CN102710605A (en) Information security management and control method under cloud manufacturing environment
US11722466B2 (en) Methods for communicating data utilizing sessionless dynamic encryption
KR20090098542A (en) Encrypted data communication system and encrypted data communication method using proxy
Maughan et al. Rfc2408: Internet security association and key management protocol (isakmp)
Wang Security issues to tele-medicine system design
Markovic Data protection techniques, cryptographic protocols and pki systems in modern computer networks
GB2395304A (en) A digital locking system for physical and digital items using a location based indication for unlocking
Perrin et al. Delegated cryptography, online trusted third parties, and PKI
Sreethu et al. Secured-Mqtt: A Lightweight Security Framework for MQTT-based Systems
Gammage Security application note
Xiong et al. Secure Invisible Computing
Wang et al. Application of IPsec to teleradiology