GB2371656A - Security card - Google Patents
Security card Download PDFInfo
- Publication number
- GB2371656A GB2371656A GB0208740A GB0208740A GB2371656A GB 2371656 A GB2371656 A GB 2371656A GB 0208740 A GB0208740 A GB 0208740A GB 0208740 A GB0208740 A GB 0208740A GB 2371656 A GB2371656 A GB 2371656A
- Authority
- GB
- United Kingdom
- Prior art keywords
- security card
- secure
- security
- operating system
- security device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/4401—Bootstrapping
- G06F9/4406—Loading of operating system
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/1097—Boot, Start, Initialise, Power
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Virology (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Image Processing (AREA)
Description
AUK Patent Application.g,GB.,2 371 656. ,A {43) Date of Printing by UK
Office 31.07.2002 (21) Application No 0208740.1 (51) INT CL7 G06F 12/14 // G06F 9/445
(22) Date of Filing 06.10.2000 (52) UK CL (Edition T) (30) Priority Data G4A AAP AFL (31) PA 3342 (32) 08.10.1999 (33) AU
(56) Documents Cited by ISA (86) International Application Data GB 2304213 A WO 98/15086 At PCT/AU00/01213 En 06.10.2000 US 5742758 A US 5121345 A US 4975950 A
(87) International Publication Data "A secure reliable bootsrap architecture" William A. WO01/27770 En 19.04.2001 Arbaugh et al.; University of Pennsylvania; 2 December 1996 http://www.cis.upenn.edu/ switchware/papers/ (71) Applicant(s) aegis.ps Centurion Tech Holdings Pty Ltd llncorPorated in Australia) (58) Field of Search by ISA
Level 2 Colonial State Bank Building, WPAT keywords, INTERNET 3350 Pacific Highway, Springwood, Queensland 4127, Australia (74) Agent and/or Address for Service (72) Inventor(s) Dummett Copp B Hamilton 25 The Square, Martlesham Heath, IPSWICH, Suffolk, J Wallis IP5 3SL, United Kingdom {54) Abstract Title Secur-rty card {57) A security device for a personal computer that interrupts the normal boot sequence to execute a secure I PoworOn I operating system. The secure operating system may be,, stored and executed from configurable memory means I StariBlOS I on the security device. Alternatively, the configurable, memory means may store executable code for creating a 3 RAM drive and the secure operating system may be executed in the RAM drive from an image on a storage |Exca teV e ROMi device. The security device performs a number of ' I integrity and security checks before initiating a | Look for l non-secure operating system. L Exp on ROMS I , Exert Sera riq I Device ROM | : | Expansion ROMS I I Tasks i it= G) | Execute Security | I Request Boot Device C CD Boo' Non secure.
Oporaing Sy ern En D
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| AUPQ3342A AUPQ334299A0 (en) | 1999-10-08 | 1999-10-08 | Security card |
| PCT/AU2000/001213 WO2001027770A1 (en) | 1999-10-08 | 2000-10-06 | Security card |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| GB0208740D0 GB0208740D0 (en) | 2002-05-29 |
| GB2371656A true GB2371656A (en) | 2002-07-31 |
Family
ID=3817502
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| GB0208740A Withdrawn GB2371656A (en) | 1999-10-08 | 2000-10-06 | Security card |
Country Status (4)
| Country | Link |
|---|---|
| AU (1) | AUPQ334299A0 (en) |
| CA (1) | CA2386805A1 (en) |
| GB (1) | GB2371656A (en) |
| WO (1) | WO2001027770A1 (en) |
Families Citing this family (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR100654446B1 (en) | 2004-12-09 | 2006-12-06 | 삼성전자주식회사 | Secure boot device and method |
| SE531992C2 (en) * | 2006-02-24 | 2009-09-22 | Oniteo Ab | Method and system for secure software commissioning |
| SE532600C2 (en) | 2007-06-29 | 2010-03-02 | Oniteo Ab | Method and system for secure provisioning of hardware |
| EP2729893B1 (en) * | 2011-07-06 | 2018-08-29 | F-Secure Corporation | Security method and apparatus |
| FR2998689B1 (en) | 2012-11-27 | 2014-12-26 | Oberthur Technologies | ELECTRONIC ASSEMBLY COMPRISING A DEACTIVATION MODULE |
| WO2020254614A1 (en) * | 2019-06-21 | 2020-12-24 | Assa Abloy Ab | Securely sharing private information |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4975950A (en) * | 1988-11-03 | 1990-12-04 | Lentz Stephen A | System and method of protecting integrity of computer data and software |
| US5121345A (en) * | 1988-11-03 | 1992-06-09 | Lentz Stephen A | System and method for protecting integrity of computer data and software |
| GB2304213A (en) * | 1995-08-10 | 1997-03-12 | Samsung Electronics Co Ltd | Safeguarding hard drive data and preventing certain user input |
| WO1998015086A1 (en) * | 1996-09-30 | 1998-04-09 | Intel Corporation | Secure boot |
| US5742758A (en) * | 1996-07-29 | 1998-04-21 | International Business Machines Corporation | Password protecting ROM based utilities in an adapter ROM |
-
1999
- 1999-10-08 AU AUPQ3342A patent/AUPQ334299A0/en not_active Abandoned
-
2000
- 2000-10-06 WO PCT/AU2000/001213 patent/WO2001027770A1/en not_active Ceased
- 2000-10-06 GB GB0208740A patent/GB2371656A/en not_active Withdrawn
- 2000-10-06 CA CA002386805A patent/CA2386805A1/en not_active Abandoned
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4975950A (en) * | 1988-11-03 | 1990-12-04 | Lentz Stephen A | System and method of protecting integrity of computer data and software |
| US5121345A (en) * | 1988-11-03 | 1992-06-09 | Lentz Stephen A | System and method for protecting integrity of computer data and software |
| GB2304213A (en) * | 1995-08-10 | 1997-03-12 | Samsung Electronics Co Ltd | Safeguarding hard drive data and preventing certain user input |
| US5742758A (en) * | 1996-07-29 | 1998-04-21 | International Business Machines Corporation | Password protecting ROM based utilities in an adapter ROM |
| WO1998015086A1 (en) * | 1996-09-30 | 1998-04-09 | Intel Corporation | Secure boot |
Non-Patent Citations (1)
| Title |
|---|
| "A secure reliable bootsrap architecture" William A. Arbaugh et al.; University of pennsylvania; 2 December 1996 (http://www.cis.upenn.edu/ïswitchware/papers/aegis.ps * |
Also Published As
| Publication number | Publication date |
|---|---|
| CA2386805A1 (en) | 2001-04-19 |
| AUPQ334299A0 (en) | 1999-11-04 |
| GB0208740D0 (en) | 2002-05-29 |
| WO2001027770A1 (en) | 2001-04-19 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US6314492B1 (en) | System and method for server control of client cache | |
| NO20054081L (en) | Distribution and rights management of digital content | |
| WO2008033236A3 (en) | System and methods for an identity theft protection bot | |
| GB2371656A (en) | Security card | |
| EP1320013A3 (en) | Method and apparatus for securing electronic data | |
| EP1253502A3 (en) | Trusted computer system | |
| GB2383664B (en) | Transaction verification | |
| WO2003090074A3 (en) | Initialization of a computer system including a secure execution mode-capable processor | |
| EP1220078A3 (en) | Content distribution system, copyright protection system and content receiving terminal | |
| EP1830300A3 (en) | Data processing device and data processing method | |
| EP0874316A3 (en) | System and method for assisting exact garbage collection by segregating the contents of a stack into sub stacks | |
| WO2006071473A3 (en) | Translation engine for computer authorizations between active directory and mainframe systems | |
| US20110173384A1 (en) | Internet-Safe Computer | |
| US20050251693A1 (en) | Method and device for computer memory protection against unauthorized access | |
| US7328456B1 (en) | Method and system to detect dangerous file name extensions | |
| JP4568489B2 (en) | Program protection method, program protection program, and program protection apparatus | |
| EP1115050A3 (en) | General purpose computer and copyright management method for use therein | |
| AU2002211253A1 (en) | Method and apparatus to improve the protection of information presented by a computer | |
| EP1603000A3 (en) | Information processor, method, and program for preventing tampering | |
| FR2819068B1 (en) | DEVICE AND METHOD FOR PROTECTING DOCUMENTS OR VERIFYING THE AUTHENTICITY OF A DOCUMENT, BY USING A COMPUTERIZED INFORMATION PROVIDED BY THE METHOD, AND DOCUMENTS PROTECTED THEREFROM | |
| EP2325746A1 (en) | Dual-boot control method and dual-boot computer | |
| Goodman et al. | Equipping designers for inclusive design | |
| FR2869939A1 (en) | SECURE SYSTEM FOR TRANSPORTING OR RETAINING VALUES SUCH AS BANKNOTES | |
| EP1576554A2 (en) | Method of securing computer systems by means of software containment | |
| Tunbridge | The human touch |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |