KR970064058A - 데이타 시큐어러티 방법 및 시스템 - Google Patents
데이타 시큐어러티 방법 및 시스템 Download PDFInfo
- Publication number
- KR970064058A KR970064058A KR1019960046490A KR19960046490A KR970064058A KR 970064058 A KR970064058 A KR 970064058A KR 1019960046490 A KR1019960046490 A KR 1019960046490A KR 19960046490 A KR19960046490 A KR 19960046490A KR 970064058 A KR970064058 A KR 970064058A
- Authority
- KR
- South Korea
- Prior art keywords
- memory
- cpu
- client device
- server
- client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/34—Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
- G06F2211/008—Public Key, Asymmetric Key, Asymmetric Encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
- H04L69/322—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
- H04L69/329—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
Claims (3)
- 서버 기기로 발생한 프로세스의 일부분을 클라이언트기기의 프로세서 실행 공간내에서 행하는 데이타 시큐어러티 방법에 있어서,(a) 클라이언트 기기내의 프로세스 실생공간을 할당하는 스텝; (b) 클라이언트 기기로부터 서버기기를 호출하는 스텝; (c) 사버 프로세스의 프로그램의 일부분을 서버 기기로부터 클라이언트기기의 프로세스 실행 공간에 옮기는 스텝; (d) 클라이언트기기의 프로세스 실행 공간내에서 서버기기로부터의 프로그램을 실행하는 스텝을 포함하고, 서버 프로세스의 일부분이 클라이언트 기기내의 프로세스 실행 공간내에서 실시되어, 서버 기기와 클라이언트 기기의 일부분이 협동하여 단일 프로세스를 실행하는 것을 특징으로 하는 데이타 시큐어러티 방법.
- 클라이언트기기의 프로세스 실행 공간내에서 서버 기기의 프로세스를 실시하는 데이타 시큐어러티 시스템에 있어서, (1)서버 기기(1)로서, (a)제 1CPU(4), (b) 제1메모리(5)으로 이루어져, (2) 클라이언트 서버기기 (2)로서, (a) 제 2CPU(8), (b) 제 2메모리(9), (c) 제 3CPU(6), (d)제 3메모리(7)로 이루어져, (3) 제 1메모리와 결합한 제1CPU와, 제 3메모리와 결합한 제 3CPU와의 사이에서 교신하고, 제 1메모리로부터 제 3메모리에 프로그램을 이송, 그 프로그램을 제 3CPU에서 실행하기 위해서,서버기기와 클라이언트 기기와의 사이에 설치된 제 1통신수단(3); (4)제 2CPU와 제 3CPU사이에 교신하기 위해서 클러이언트 기기에 설치한 제 2통신수단(10); (5) 클라이언트시스템에 의해 매니지먼트 프로그램이 실행되는 것에 따라 제어되는 경우 이외는 제2메모리와 제 3메모리간의 상호의 개입을 막기 위해 수단을 포함하는 것을 특징으로 하는 데이타 시큐어러티 시스템.
- 제 2항에 있어서, 상기 클라이언트 기기는 제 2CPU(8)와 제 2메모리(9)를 포함하는 기본 기기부와 제 3(CPU)(6)와 제 3메모리(7)를 포함하는 접속가능한 기기부를 보유하고 있는 것을 특징으로 하는 데이타 시큐어러티 시스템.※ 참고사항 : 최초출원 내용에 의하여 공개하는 것임.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP96-026864 | 1996-02-14 | ||
| JP2686496 | 1996-02-14 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| KR970064058A true KR970064058A (ko) | 1997-09-12 |
| KR100250351B1 KR100250351B1 (ko) | 2000-04-01 |
Family
ID=12205163
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| KR1019960046490A Expired - Fee Related KR100250351B1 (ko) | 1996-02-14 | 1996-10-17 | 데이타 시큐어러티 방법 및 시스템 |
Country Status (4)
| Country | Link |
|---|---|
| US (1) | US5940516A (ko) |
| EP (1) | EP0794639A3 (ko) |
| KR (1) | KR100250351B1 (ko) |
| TW (1) | TW369753B (ko) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR100353513B1 (ko) * | 1998-12-22 | 2002-09-19 | 미쓰비시덴키 가부시키가이샤 | 정보전송시스템 |
Families Citing this family (30)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1183449C (zh) | 1996-10-25 | 2005-01-05 | 施卢默格系统公司 | 用微控制器使用高级程序设计语言 |
| US7506020B2 (en) | 1996-11-29 | 2009-03-17 | Frampton E Ellis | Global network computers |
| US7926097B2 (en) | 1996-11-29 | 2011-04-12 | Ellis Iii Frampton E | Computer or microchip protected from the internet by internal hardware |
| EP0881559B1 (en) * | 1997-05-28 | 2003-08-20 | Siemens Aktiengesellschaft | Computer system for protecting software and a method for protecting software |
| US6363482B1 (en) * | 1997-09-08 | 2002-03-26 | Harmonic Data Systems, Ltd. | Secure broadband communication |
| US6615349B1 (en) * | 1999-02-23 | 2003-09-02 | Parsec Sight/Sound, Inc. | System and method for manipulating a computer file and/or program |
| FI109154B (fi) * | 1999-04-16 | 2002-05-31 | Vesa Juhani Hukkanen | Laite ja menetelmä tietoturvallisuuden parantamiseksi |
| US6708272B1 (en) * | 1999-05-20 | 2004-03-16 | Storage Technology Corporation | Information encryption system and method |
| JP4436490B2 (ja) * | 1999-07-22 | 2010-03-24 | オリンパス株式会社 | デジタルデータ記録再生システム |
| US6304972B1 (en) * | 2000-01-03 | 2001-10-16 | Massachusetts Institute Of Technology | Secure software system and related techniques |
| US6578140B1 (en) * | 2000-04-13 | 2003-06-10 | Claude M Policard | Personal computer having a master computer system and an internet computer system and monitoring a condition of said master and internet computer systems |
| AU2001261078A1 (en) * | 2000-04-26 | 2001-11-07 | Venice Technologies, Inc. | Methods and systems for securing computer software |
| US6754819B1 (en) * | 2000-07-06 | 2004-06-22 | General Dynamics Decision Systems, Inc. | Method and system for providing cryptographic services in a distributed application |
| US20020082918A1 (en) * | 2000-10-31 | 2002-06-27 | Beenz.Com Inc. | Loyalty system incorporating embedded incentives |
| US7660902B2 (en) * | 2000-11-20 | 2010-02-09 | Rsa Security, Inc. | Dynamic file access control and management |
| US20020152262A1 (en) * | 2001-04-17 | 2002-10-17 | Jed Arkin | Method and system for preventing the infringement of intellectual property rights |
| US20020152261A1 (en) * | 2001-04-17 | 2002-10-17 | Jed Arkin | Method and system for preventing the infringement of intellectual property rights |
| US7962741B1 (en) * | 2002-09-12 | 2011-06-14 | Juniper Networks, Inc. | Systems and methods for processing packets for encryption and decryption |
| US7549166B2 (en) * | 2002-12-05 | 2009-06-16 | International Business Machines Corporation | Defense mechanism for server farm |
| US8495305B2 (en) | 2004-06-30 | 2013-07-23 | Citrix Systems, Inc. | Method and device for performing caching of dynamically generated objects in a data communication network |
| US8739274B2 (en) | 2004-06-30 | 2014-05-27 | Citrix Systems, Inc. | Method and device for performing integrated caching in a data communication network |
| KR100589541B1 (ko) * | 2004-11-25 | 2006-06-14 | 소프트캠프(주) | 접근이 통제되는 가상디스크들 간의 온라인을 통한데이터의 보안전송시스템과 이를 통한 보안전송방법 |
| US8549149B2 (en) | 2004-12-30 | 2013-10-01 | Citrix Systems, Inc. | Systems and methods for providing client-side accelerated access to remote applications via TCP multiplexing |
| US7810089B2 (en) * | 2004-12-30 | 2010-10-05 | Citrix Systems, Inc. | Systems and methods for automatic installation and execution of a client-side acceleration program |
| US20060253605A1 (en) * | 2004-12-30 | 2006-11-09 | Prabakar Sundarrajan | Systems and methods for providing integrated client-side acceleration techniques to access remote applications |
| US8954595B2 (en) | 2004-12-30 | 2015-02-10 | Citrix Systems, Inc. | Systems and methods for providing client-side accelerated access to remote applications via TCP buffering |
| US8255456B2 (en) | 2005-12-30 | 2012-08-28 | Citrix Systems, Inc. | System and method for performing flash caching of dynamically generated objects in a data communication network |
| EP1737178A1 (en) * | 2005-06-24 | 2006-12-27 | Axalto SA | Method and system using a portable object for providing an extension to a server |
| US8429735B2 (en) * | 2010-01-26 | 2013-04-23 | Frampton E. Ellis | Method of using one or more secure private networks to actively configure the hardware of a computer or microchip |
| US12401619B2 (en) | 2010-01-26 | 2025-08-26 | Frampton E. Ellis | Computer or microchip with a secure system bios having a separate private network connection to a separate private network |
Family Cites Families (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE3003998A1 (de) * | 1980-02-04 | 1981-09-24 | Licentia Patent-Verwaltungs-Gmbh, 6000 Frankfurt | System zur ver- und entschluesselung von daten |
| US4677670A (en) * | 1985-07-01 | 1987-06-30 | Henderson Jr Paul B | Paired-secure message identification controller for computers and the like |
| JPS6336634A (ja) * | 1986-07-31 | 1988-02-17 | Advance Co Ltd | 暗号鍵共有方式 |
| JPS63245035A (ja) * | 1987-03-31 | 1988-10-12 | Mitsubishi Electric Corp | 暗号通信装置 |
| JPS63278438A (ja) * | 1987-05-11 | 1988-11-16 | Hitachi Ltd | 暗号手順非公開による暗号システム |
| JPH03233792A (ja) * | 1990-02-09 | 1991-10-17 | Nec Off Syst Ltd | 暗号化・復号化方法 |
| JP3080382B2 (ja) * | 1990-02-21 | 2000-08-28 | 株式会社日立製作所 | 暗号通信システム |
| US5144664A (en) * | 1990-11-16 | 1992-09-01 | General Instrument Corporation | Apparatus and method for upgrading terminals to maintain a secure communication network |
| JPH07502847A (ja) * | 1992-07-31 | 1995-03-23 | インターナショナル・スタンダード・エレクトリック・コーポレーション | ネットワーク秘密保護を行う装置および方法 |
| JP3466217B2 (ja) * | 1992-11-07 | 2003-11-10 | 富士ゼロックス株式会社 | ネットワーク処理装置および処理方法 |
-
1996
- 1996-10-11 TW TW085112423A patent/TW369753B/zh active
- 1996-10-11 EP EP96116368A patent/EP0794639A3/en not_active Withdrawn
- 1996-10-16 US US08/732,881 patent/US5940516A/en not_active Expired - Fee Related
- 1996-10-17 KR KR1019960046490A patent/KR100250351B1/ko not_active Expired - Fee Related
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR100353513B1 (ko) * | 1998-12-22 | 2002-09-19 | 미쓰비시덴키 가부시키가이샤 | 정보전송시스템 |
Also Published As
| Publication number | Publication date |
|---|---|
| KR100250351B1 (ko) | 2000-04-01 |
| EP0794639A3 (en) | 2001-01-31 |
| TW369753B (en) | 1999-09-11 |
| US5940516A (en) | 1999-08-17 |
| EP0794639A2 (en) | 1997-09-10 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| KR970064058A (ko) | 데이타 시큐어러티 방법 및 시스템 | |
| US7305092B2 (en) | Method and system to accelerate cryptographic functions for secure e-commerce applications | |
| US11025415B2 (en) | Cryptographic operation method, method for creating working key, cryptographic service platform, and cryptographic service device | |
| CN109067528B (zh) | 密码运算、创建工作密钥的方法、密码服务平台及设备 | |
| US7587608B2 (en) | Method and apparatus for storing data on the application layer in mobile devices | |
| US8959659B2 (en) | Software authorization system and method | |
| CN111274611A (zh) | 数据脱敏方法、装置及计算机可读存储介质 | |
| KR970024734A (ko) | 안전 네트워크 프로토콜 시스템 및 방법 | |
| CN103797489A (zh) | 用于安全地将程序执行绑定到且节点锁定到受信任的签名授权机构的系统和方法 | |
| WO2001086372A3 (en) | Information security method and system | |
| CN113204772A (zh) | 数据处理方法、装置、系统、终端、服务器和存储介质 | |
| KR20050084888A (ko) | 재시작가능한 변조 방지 보안 시스템을 위해 자동으로발생된 암호 함수들 | |
| CN114329596A (zh) | 一种物联网设备的固件更新方法、装置及系统 | |
| CN118118209A (zh) | 一种基于wasm的通用数据加密方法和系统 | |
| KR100288843B1 (ko) | 컴퓨터시스템및이컴퓨터시스템을이용한객체캡슐화실시방법 | |
| JP7331714B2 (ja) | 情報処理装置、情報処理方法及びプログラム | |
| JPS63278438A (ja) | 暗号手順非公開による暗号システム | |
| WO2025153866A1 (zh) | 全密态数据库系统、数据处理方法、安全控制装置及设备 | |
| CN113783835B (zh) | 一种口令分享方法、装置、设备及存储介质 | |
| Zum Felde et al. | Securing remote policy enforcement by a multi-enclave based attestation architecture | |
| US11157610B2 (en) | Method for accessing a secure computer resource by a computer application | |
| CN115361168B (zh) | 一种数据加密方法、装置、设备及介质 | |
| CN111737725A (zh) | 用户标记方法、装置、服务器和存储介质 | |
| KR20010110992A (ko) | 독립된 장치들이 단일 토큰 인터페이스로서 함께 동작할수 있도록 해주는 방법 및 그래픽 사용자 인터페이스 | |
| HK40036851A (en) | Cryptographic operation method, working key creation method, cryptographic service platform and equipment |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| A201 | Request for examination | ||
| PA0109 | Patent application |
St.27 status event code: A-0-1-A10-A12-nap-PA0109 |
|
| PA0201 | Request for examination |
St.27 status event code: A-1-2-D10-D11-exm-PA0201 |
|
| R17-X000 | Change to representative recorded |
St.27 status event code: A-3-3-R10-R17-oth-X000 |
|
| R17-X000 | Change to representative recorded |
St.27 status event code: A-3-3-R10-R17-oth-X000 |
|
| R17-X000 | Change to representative recorded |
St.27 status event code: A-3-3-R10-R17-oth-X000 |
|
| PG1501 | Laying open of application |
St.27 status event code: A-1-1-Q10-Q12-nap-PG1501 |
|
| PN2301 | Change of applicant |
St.27 status event code: A-3-3-R10-R13-asn-PN2301 St.27 status event code: A-3-3-R10-R11-asn-PN2301 |
|
| PN2301 | Change of applicant |
St.27 status event code: A-3-3-R10-R13-asn-PN2301 St.27 status event code: A-3-3-R10-R11-asn-PN2301 |
|
| R18-X000 | Changes to party contact information recorded |
St.27 status event code: A-3-3-R10-R18-oth-X000 |
|
| PN2301 | Change of applicant |
St.27 status event code: A-3-3-R10-R13-asn-PN2301 St.27 status event code: A-3-3-R10-R11-asn-PN2301 |
|
| E902 | Notification of reason for refusal | ||
| PE0902 | Notice of grounds for rejection |
St.27 status event code: A-1-2-D10-D21-exm-PE0902 |
|
| T11-X000 | Administrative time limit extension requested |
St.27 status event code: U-3-3-T10-T11-oth-X000 |
|
| AMND | Amendment | ||
| P11-X000 | Amendment of application requested |
St.27 status event code: A-2-2-P10-P11-nap-X000 |
|
| P13-X000 | Application amended |
St.27 status event code: A-2-2-P10-P13-nap-X000 |
|
| E601 | Decision to refuse application | ||
| PE0601 | Decision on rejection of patent |
St.27 status event code: N-2-6-B10-B15-exm-PE0601 |
|
| AMND | Amendment | ||
| J201 | Request for trial against refusal decision | ||
| P11-X000 | Amendment of application requested |
St.27 status event code: A-2-2-P10-P11-nap-X000 |
|
| P13-X000 | Application amended |
St.27 status event code: A-2-2-P10-P13-nap-X000 |
|
| PJ0201 | Trial against decision of rejection |
St.27 status event code: A-3-3-V10-V11-apl-PJ0201 |
|
| PB0901 | Examination by re-examination before a trial |
St.27 status event code: A-6-3-E10-E12-rex-PB0901 |
|
| B701 | Decision to grant | ||
| PB0701 | Decision of registration after re-examination before a trial |
St.27 status event code: A-3-4-F10-F13-rex-PB0701 |
|
| GRNT | Written decision to grant | ||
| PR0701 | Registration of establishment |
St.27 status event code: A-2-4-F10-F11-exm-PR0701 |
|
| PR1002 | Payment of registration fee |
St.27 status event code: A-2-2-U10-U11-oth-PR1002 Fee payment year number: 1 |
|
| PG1601 | Publication of registration |
St.27 status event code: A-4-4-Q10-Q13-nap-PG1601 |
|
| LAPS | Lapse due to unpaid annual fee | ||
| PC1903 | Unpaid annual fee |
St.27 status event code: A-4-4-U10-U13-oth-PC1903 Not in force date: 20030105 Payment event data comment text: Termination Category : DEFAULT_OF_REGISTRATION_FEE |
|
| PC1903 | Unpaid annual fee |
St.27 status event code: N-4-6-H10-H13-oth-PC1903 Ip right cessation event data comment text: Termination Category : DEFAULT_OF_REGISTRATION_FEE Not in force date: 20030105 |
|
| R18-X000 | Changes to party contact information recorded |
St.27 status event code: A-5-5-R10-R18-oth-X000 |
|
| PN2301 | Change of applicant |
St.27 status event code: A-5-5-R10-R13-asn-PN2301 St.27 status event code: A-5-5-R10-R11-asn-PN2301 |