Wang, 1999 - Google Patents
Security issues to tele-medicine system designWang, 1999
- Document ID
- 3468211913115346431
- Author
- Wang C
- Publication year
- Publication venue
- Proceedings IEEE Southeastcon'99. Technology on the Brink of 2000 (Cat. No. 99CH36300)
External Links
Snippet
With the rapid development of the Internet and Internet based applications, tele-medicine can potentially provide important health care coverage for remote and rural areas where specialized medical expertise is lacking. Using Internet based tele-medicine application, the …
- 239000003814 drug 0 title abstract description 18
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Maughan et al. | Internet security association and key management protocol (ISAKMP) | |
US6988199B2 (en) | Secure and reliable document delivery | |
US9819666B2 (en) | Pass-thru for client authentication | |
EP1782213B1 (en) | Secure messaging system with derived keys | |
US6684332B1 (en) | Method and system for the exchange of digitally signed objects over an insecure network | |
US7096362B2 (en) | Internet authentication with multiple independent certificate authorities | |
US7016499B2 (en) | Secure ephemeral decryptability | |
US7688975B2 (en) | Method and apparatus for dynamic generation of symmetric encryption keys and exchange of dynamic symmetric key infrastructure | |
US7036010B2 (en) | Method and apparatus for a secure communications session with a remote system via an access-controlling intermediate system | |
US20030084292A1 (en) | Using atomic messaging to increase the security of transferring data across a network | |
US20010005883A1 (en) | Security protocol | |
US20020019932A1 (en) | Cryptographically secure network | |
JP2002290397A (en) | Secure communication method | |
CN102710605A (en) | Information security management and control method under cloud manufacturing environment | |
US11722466B2 (en) | Methods for communicating data utilizing sessionless dynamic encryption | |
KR20090098542A (en) | Encrypted data communication system and encrypted data communication method using proxy | |
Maughan et al. | Rfc2408: Internet security association and key management protocol (isakmp) | |
Wang | Security issues to tele-medicine system design | |
Markovic | Data protection techniques, cryptographic protocols and pki systems in modern computer networks | |
GB2395304A (en) | A digital locking system for physical and digital items using a location based indication for unlocking | |
Perrin et al. | Delegated cryptography, online trusted third parties, and PKI | |
Sreethu et al. | Secured-Mqtt: A Lightweight Security Framework for MQTT-based Systems | |
Gammage | Security application note | |
Xiong et al. | Secure Invisible Computing | |
Wang et al. | Application of IPsec to teleradiology |