[go: up one dir, main page]

GB201304451D0 - Data Security Device - Google Patents

Data Security Device

Info

Publication number
GB201304451D0
GB201304451D0 GBGB1304451.6A GB201304451A GB201304451D0 GB 201304451 D0 GB201304451 D0 GB 201304451D0 GB 201304451 A GB201304451 A GB 201304451A GB 201304451 D0 GB201304451 D0 GB 201304451D0
Authority
GB
United Kingdom
Prior art keywords
security device
data security
data
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GBGB1304451.6A
Other versions
GB2511779A (en
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Knightsbridge Portable Communications SP
Original Assignee
Knightsbridge Portable Communications SP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Knightsbridge Portable Communications SP filed Critical Knightsbridge Portable Communications SP
Priority to GB1304451.6A priority Critical patent/GB2511779A/en
Publication of GB201304451D0 publication Critical patent/GB201304451D0/en
Priority to PCT/GB2014/050721 priority patent/WO2014140559A1/en
Publication of GB2511779A publication Critical patent/GB2511779A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/72Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/80Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2129Authenticate client device independently of the user
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mathematical Physics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
GB1304451.6A 2013-03-13 2013-03-13 Data Security Device Withdrawn GB2511779A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
GB1304451.6A GB2511779A (en) 2013-03-13 2013-03-13 Data Security Device
PCT/GB2014/050721 WO2014140559A1 (en) 2013-03-13 2014-03-11 Data security device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB1304451.6A GB2511779A (en) 2013-03-13 2013-03-13 Data Security Device

Publications (2)

Publication Number Publication Date
GB201304451D0 true GB201304451D0 (en) 2013-04-24
GB2511779A GB2511779A (en) 2014-09-17

Family

ID=48189792

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1304451.6A Withdrawn GB2511779A (en) 2013-03-13 2013-03-13 Data Security Device

Country Status (2)

Country Link
GB (1) GB2511779A (en)
WO (1) WO2014140559A1 (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10185844B2 (en) 2015-01-19 2019-01-22 Hewlett-Packard Development Company, L.P. Security device for data component
US9847980B2 (en) * 2015-06-17 2017-12-19 Microsoft Technology Licensing, Llc Protecting communications with hardware accelerators for increased workflow security
US10289333B2 (en) * 2017-06-14 2019-05-14 Western Digital Technologies, Inc. Data storage device configured to perform operations using a wireless interface
CN109815738B (en) * 2019-01-31 2022-11-25 吕梁市军民融合协同创新研究院 Intelligent manufacturing production domain data safety universalization protection system
CN114297687A (en) * 2021-12-29 2022-04-08 河北网星软件有限公司 Data transmission system and data transmission method
CN115314489B (en) * 2022-08-10 2026-01-23 阿里巴巴(中国)有限公司 Data migration method, device and storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5802175A (en) * 1996-09-18 1998-09-01 Kara; Salim G. Computer file backup encryption system and method
GB0226658D0 (en) * 2002-11-15 2002-12-24 Koninkl Philips Electronics Nv Archive system and method for copy controlled storage devices
EP1612636A1 (en) * 2004-07-01 2006-01-04 Tecnostore AG Method for archiving data with automatic encryption and decryption
US8254882B2 (en) * 2007-01-29 2012-08-28 Cisco Technology, Inc. Intrusion prevention system for wireless networks
KR101824484B1 (en) * 2011-06-30 2018-02-01 인텔 코포레이션 System and method for controlling access to protected content

Also Published As

Publication number Publication date
WO2014140559A1 (en) 2014-09-18
GB2511779A (en) 2014-09-17

Similar Documents

Publication Publication Date Title
SG10202108884YA (en) Data security service
GB201309702D0 (en) Security
EP2956888A4 (en) Data security service
GB201313096D0 (en) A security device
GB201309682D0 (en) Security system
GB201301485D0 (en) Data entry
PL3008266T3 (en) Security device
GB201304451D0 (en) Data Security Device
EP2975524A4 (en) Information processing device
GB201516041D0 (en) Lens-foil based security device
GB2511882B (en) Security device
GB2518860B (en) Secure data entry device
GB2518585B (en) A security device
GB2515313B (en) Caravan security device
HU4337U (en) Heat-printable security print-carrier
GB2518861B (en) Secure data entry device
GB2514390B (en) Security device
GB201302205D0 (en) Security Device
GB2511397B (en) Lock device
GB2513899B (en) Security device
GB2516680B (en) Improving data security
GB201323117D0 (en) Security device
GB201310509D0 (en) Security Device
GB201309032D0 (en) Leg-Lock Security Device
GB2521773B (en) Data capture

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)