[go: up one dir, main page]

KR970064058A - 데이타 시큐어러티 방법 및 시스템 - Google Patents

데이타 시큐어러티 방법 및 시스템 Download PDF

Info

Publication number
KR970064058A
KR970064058A KR1019960046490A KR19960046490A KR970064058A KR 970064058 A KR970064058 A KR 970064058A KR 1019960046490 A KR1019960046490 A KR 1019960046490A KR 19960046490 A KR19960046490 A KR 19960046490A KR 970064058 A KR970064058 A KR 970064058A
Authority
KR
South Korea
Prior art keywords
memory
cpu
client device
server
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
KR1019960046490A
Other languages
English (en)
Other versions
KR100250351B1 (ko
Inventor
콜린 메이슨
코이치 마루노
Original Assignee
기다오까 다까시
미쓰비시 뎅끼 가부시끼가이샤
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 기다오까 다까시, 미쓰비시 뎅끼 가부시끼가이샤 filed Critical 기다오까 다까시
Publication of KR970064058A publication Critical patent/KR970064058A/ko
Application granted granted Critical
Publication of KR100250351B1 publication Critical patent/KR100250351B1/ko
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
    • G06F2211/008Public Key, Asymmetric Key, Asymmetric Encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
    • H04L69/322Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
    • H04L69/329Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer And Data Communications (AREA)

Abstract

[과 제]
서버기기와 클라이언트기기의 사이에 인테네트 및 타의 통신채널을 사용하여 비밀 데이타를 보내기 위한 시스템을 기술한다.
[해결수단]
클라이언트 기는 주 CPU와 주메모리 및 부가 CPU와 부가 메모리를 포함한다.
클라이언트 기기 속의 부가 CPU 및 메모리는 인터내트접속 또는 다른 통신채널 접속을 통하여, 서비기기의 CPU 및 메모리에 연결되어 있다.
클라이언트 및 서버의 CPU와 메모리는 협동적으로 동시처리적으로 연결되어 있어, 제 3자에게 해독되지 않도록 암호화코드 및 해독코드를 극적으로 수정하여 단일프로세스를 실행한다.

Description

데이타 시큐어러티 방법 및 시스템
본 내용은 요부공개 건이므로 전문내용을 수록하지 않았음
제 1도는 본 발명의 실시예의 의한 데이카 시큐어러티 시스템의 블럭도.
제 2도는 본 발명에 의한 데이타 시큐어러티 시스템의 동작을 설명하기 위한 플로우차트도.
제 3도는 본 발명에 의한 데이타 시큐어러티 시스템의 동작원리를 설명하는 개념도.

Claims (3)

  1. 서버 기기로 발생한 프로세스의 일부분을 클라이언트기기의 프로세서 실행 공간내에서 행하는 데이타 시큐어러티 방법에 있어서,(a) 클라이언트 기기내의 프로세스 실생공간을 할당하는 스텝; (b) 클라이언트 기기로부터 서버기기를 호출하는 스텝; (c) 사버 프로세스의 프로그램의 일부분을 서버 기기로부터 클라이언트기기의 프로세스 실행 공간에 옮기는 스텝; (d) 클라이언트기기의 프로세스 실행 공간내에서 서버기기로부터의 프로그램을 실행하는 스텝을 포함하고, 서버 프로세스의 일부분이 클라이언트 기기내의 프로세스 실행 공간내에서 실시되어, 서버 기기와 클라이언트 기기의 일부분이 협동하여 단일 프로세스를 실행하는 것을 특징으로 하는 데이타 시큐어러티 방법.
  2. 클라이언트기기의 프로세스 실행 공간내에서 서버 기기의 프로세스를 실시하는 데이타 시큐어러티 시스템에 있어서, (1)서버 기기(1)로서, (a)제 1CPU(4), (b) 제1메모리(5)으로 이루어져, (2) 클라이언트 서버기기 (2)로서, (a) 제 2CPU(8), (b) 제 2메모리(9), (c) 제 3CPU(6), (d)제 3메모리(7)로 이루어져, (3) 제 1메모리와 결합한 제1CPU와, 제 3메모리와 결합한 제 3CPU와의 사이에서 교신하고, 제 1메모리로부터 제 3메모리에 프로그램을 이송, 그 프로그램을 제 3CPU에서 실행하기 위해서,서버기기와 클라이언트 기기와의 사이에 설치된 제 1통신수단(3); (4)제 2CPU와 제 3CPU사이에 교신하기 위해서 클러이언트 기기에 설치한 제 2통신수단(10); (5) 클라이언트시스템에 의해 매니지먼트 프로그램이 실행되는 것에 따라 제어되는 경우 이외는 제2메모리와 제 3메모리간의 상호의 개입을 막기 위해 수단을 포함하는 것을 특징으로 하는 데이타 시큐어러티 시스템.
  3. 제 2항에 있어서, 상기 클라이언트 기기는 제 2CPU(8)와 제 2메모리(9)를 포함하는 기본 기기부와 제 3(CPU)(6)와 제 3메모리(7)를 포함하는 접속가능한 기기부를 보유하고 있는 것을 특징으로 하는 데이타 시큐어러티 시스템.
    ※ 참고사항 : 최초출원 내용에 의하여 공개하는 것임.
KR1019960046490A 1996-02-14 1996-10-17 데이타 시큐어러티 방법 및 시스템 Expired - Fee Related KR100250351B1 (ko)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP96-026864 1996-02-14
JP2686496 1996-02-14

Publications (2)

Publication Number Publication Date
KR970064058A true KR970064058A (ko) 1997-09-12
KR100250351B1 KR100250351B1 (ko) 2000-04-01

Family

ID=12205163

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1019960046490A Expired - Fee Related KR100250351B1 (ko) 1996-02-14 1996-10-17 데이타 시큐어러티 방법 및 시스템

Country Status (4)

Country Link
US (1) US5940516A (ko)
EP (1) EP0794639A3 (ko)
KR (1) KR100250351B1 (ko)
TW (1) TW369753B (ko)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100353513B1 (ko) * 1998-12-22 2002-09-19 미쓰비시덴키 가부시키가이샤 정보전송시스템

Families Citing this family (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1183449C (zh) 1996-10-25 2005-01-05 施卢默格系统公司 用微控制器使用高级程序设计语言
US7506020B2 (en) 1996-11-29 2009-03-17 Frampton E Ellis Global network computers
US7926097B2 (en) 1996-11-29 2011-04-12 Ellis Iii Frampton E Computer or microchip protected from the internet by internal hardware
EP0881559B1 (en) * 1997-05-28 2003-08-20 Siemens Aktiengesellschaft Computer system for protecting software and a method for protecting software
US6363482B1 (en) * 1997-09-08 2002-03-26 Harmonic Data Systems, Ltd. Secure broadband communication
US6615349B1 (en) * 1999-02-23 2003-09-02 Parsec Sight/Sound, Inc. System and method for manipulating a computer file and/or program
FI109154B (fi) * 1999-04-16 2002-05-31 Vesa Juhani Hukkanen Laite ja menetelmä tietoturvallisuuden parantamiseksi
US6708272B1 (en) * 1999-05-20 2004-03-16 Storage Technology Corporation Information encryption system and method
JP4436490B2 (ja) * 1999-07-22 2010-03-24 オリンパス株式会社 デジタルデータ記録再生システム
US6304972B1 (en) * 2000-01-03 2001-10-16 Massachusetts Institute Of Technology Secure software system and related techniques
US6578140B1 (en) * 2000-04-13 2003-06-10 Claude M Policard Personal computer having a master computer system and an internet computer system and monitoring a condition of said master and internet computer systems
AU2001261078A1 (en) * 2000-04-26 2001-11-07 Venice Technologies, Inc. Methods and systems for securing computer software
US6754819B1 (en) * 2000-07-06 2004-06-22 General Dynamics Decision Systems, Inc. Method and system for providing cryptographic services in a distributed application
US20020082918A1 (en) * 2000-10-31 2002-06-27 Beenz.Com Inc. Loyalty system incorporating embedded incentives
US7660902B2 (en) * 2000-11-20 2010-02-09 Rsa Security, Inc. Dynamic file access control and management
US20020152262A1 (en) * 2001-04-17 2002-10-17 Jed Arkin Method and system for preventing the infringement of intellectual property rights
US20020152261A1 (en) * 2001-04-17 2002-10-17 Jed Arkin Method and system for preventing the infringement of intellectual property rights
US7962741B1 (en) * 2002-09-12 2011-06-14 Juniper Networks, Inc. Systems and methods for processing packets for encryption and decryption
US7549166B2 (en) * 2002-12-05 2009-06-16 International Business Machines Corporation Defense mechanism for server farm
US8495305B2 (en) 2004-06-30 2013-07-23 Citrix Systems, Inc. Method and device for performing caching of dynamically generated objects in a data communication network
US8739274B2 (en) 2004-06-30 2014-05-27 Citrix Systems, Inc. Method and device for performing integrated caching in a data communication network
KR100589541B1 (ko) * 2004-11-25 2006-06-14 소프트캠프(주) 접근이 통제되는 가상디스크들 간의 온라인을 통한데이터의 보안전송시스템과 이를 통한 보안전송방법
US8549149B2 (en) 2004-12-30 2013-10-01 Citrix Systems, Inc. Systems and methods for providing client-side accelerated access to remote applications via TCP multiplexing
US7810089B2 (en) * 2004-12-30 2010-10-05 Citrix Systems, Inc. Systems and methods for automatic installation and execution of a client-side acceleration program
US20060253605A1 (en) * 2004-12-30 2006-11-09 Prabakar Sundarrajan Systems and methods for providing integrated client-side acceleration techniques to access remote applications
US8954595B2 (en) 2004-12-30 2015-02-10 Citrix Systems, Inc. Systems and methods for providing client-side accelerated access to remote applications via TCP buffering
US8255456B2 (en) 2005-12-30 2012-08-28 Citrix Systems, Inc. System and method for performing flash caching of dynamically generated objects in a data communication network
EP1737178A1 (en) * 2005-06-24 2006-12-27 Axalto SA Method and system using a portable object for providing an extension to a server
US8429735B2 (en) * 2010-01-26 2013-04-23 Frampton E. Ellis Method of using one or more secure private networks to actively configure the hardware of a computer or microchip
US12401619B2 (en) 2010-01-26 2025-08-26 Frampton E. Ellis Computer or microchip with a secure system bios having a separate private network connection to a separate private network

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3003998A1 (de) * 1980-02-04 1981-09-24 Licentia Patent-Verwaltungs-Gmbh, 6000 Frankfurt System zur ver- und entschluesselung von daten
US4677670A (en) * 1985-07-01 1987-06-30 Henderson Jr Paul B Paired-secure message identification controller for computers and the like
JPS6336634A (ja) * 1986-07-31 1988-02-17 Advance Co Ltd 暗号鍵共有方式
JPS63245035A (ja) * 1987-03-31 1988-10-12 Mitsubishi Electric Corp 暗号通信装置
JPS63278438A (ja) * 1987-05-11 1988-11-16 Hitachi Ltd 暗号手順非公開による暗号システム
JPH03233792A (ja) * 1990-02-09 1991-10-17 Nec Off Syst Ltd 暗号化・復号化方法
JP3080382B2 (ja) * 1990-02-21 2000-08-28 株式会社日立製作所 暗号通信システム
US5144664A (en) * 1990-11-16 1992-09-01 General Instrument Corporation Apparatus and method for upgrading terminals to maintain a secure communication network
JPH07502847A (ja) * 1992-07-31 1995-03-23 インターナショナル・スタンダード・エレクトリック・コーポレーション ネットワーク秘密保護を行う装置および方法
JP3466217B2 (ja) * 1992-11-07 2003-11-10 富士ゼロックス株式会社 ネットワーク処理装置および処理方法

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100353513B1 (ko) * 1998-12-22 2002-09-19 미쓰비시덴키 가부시키가이샤 정보전송시스템

Also Published As

Publication number Publication date
KR100250351B1 (ko) 2000-04-01
EP0794639A3 (en) 2001-01-31
TW369753B (en) 1999-09-11
US5940516A (en) 1999-08-17
EP0794639A2 (en) 1997-09-10

Similar Documents

Publication Publication Date Title
KR970064058A (ko) 데이타 시큐어러티 방법 및 시스템
US7305092B2 (en) Method and system to accelerate cryptographic functions for secure e-commerce applications
US11025415B2 (en) Cryptographic operation method, method for creating working key, cryptographic service platform, and cryptographic service device
CN109067528B (zh) 密码运算、创建工作密钥的方法、密码服务平台及设备
US7587608B2 (en) Method and apparatus for storing data on the application layer in mobile devices
US8959659B2 (en) Software authorization system and method
CN111274611A (zh) 数据脱敏方法、装置及计算机可读存储介质
KR970024734A (ko) 안전 네트워크 프로토콜 시스템 및 방법
CN103797489A (zh) 用于安全地将程序执行绑定到且节点锁定到受信任的签名授权机构的系统和方法
WO2001086372A3 (en) Information security method and system
CN113204772A (zh) 数据处理方法、装置、系统、终端、服务器和存储介质
KR20050084888A (ko) 재시작가능한 변조 방지 보안 시스템을 위해 자동으로발생된 암호 함수들
CN114329596A (zh) 一种物联网设备的固件更新方法、装置及系统
CN118118209A (zh) 一种基于wasm的通用数据加密方法和系统
KR100288843B1 (ko) 컴퓨터시스템및이컴퓨터시스템을이용한객체캡슐화실시방법
JP7331714B2 (ja) 情報処理装置、情報処理方法及びプログラム
JPS63278438A (ja) 暗号手順非公開による暗号システム
WO2025153866A1 (zh) 全密态数据库系统、数据处理方法、安全控制装置及设备
CN113783835B (zh) 一种口令分享方法、装置、设备及存储介质
Zum Felde et al. Securing remote policy enforcement by a multi-enclave based attestation architecture
US11157610B2 (en) Method for accessing a secure computer resource by a computer application
CN115361168B (zh) 一种数据加密方法、装置、设备及介质
CN111737725A (zh) 用户标记方法、装置、服务器和存储介质
KR20010110992A (ko) 독립된 장치들이 단일 토큰 인터페이스로서 함께 동작할수 있도록 해주는 방법 및 그래픽 사용자 인터페이스
HK40036851A (en) Cryptographic operation method, working key creation method, cryptographic service platform and equipment

Legal Events

Date Code Title Description
A201 Request for examination
PA0109 Patent application

St.27 status event code: A-0-1-A10-A12-nap-PA0109

PA0201 Request for examination

St.27 status event code: A-1-2-D10-D11-exm-PA0201

R17-X000 Change to representative recorded

St.27 status event code: A-3-3-R10-R17-oth-X000

R17-X000 Change to representative recorded

St.27 status event code: A-3-3-R10-R17-oth-X000

R17-X000 Change to representative recorded

St.27 status event code: A-3-3-R10-R17-oth-X000

PG1501 Laying open of application

St.27 status event code: A-1-1-Q10-Q12-nap-PG1501

PN2301 Change of applicant

St.27 status event code: A-3-3-R10-R13-asn-PN2301

St.27 status event code: A-3-3-R10-R11-asn-PN2301

PN2301 Change of applicant

St.27 status event code: A-3-3-R10-R13-asn-PN2301

St.27 status event code: A-3-3-R10-R11-asn-PN2301

R18-X000 Changes to party contact information recorded

St.27 status event code: A-3-3-R10-R18-oth-X000

PN2301 Change of applicant

St.27 status event code: A-3-3-R10-R13-asn-PN2301

St.27 status event code: A-3-3-R10-R11-asn-PN2301

E902 Notification of reason for refusal
PE0902 Notice of grounds for rejection

St.27 status event code: A-1-2-D10-D21-exm-PE0902

T11-X000 Administrative time limit extension requested

St.27 status event code: U-3-3-T10-T11-oth-X000

AMND Amendment
P11-X000 Amendment of application requested

St.27 status event code: A-2-2-P10-P11-nap-X000

P13-X000 Application amended

St.27 status event code: A-2-2-P10-P13-nap-X000

E601 Decision to refuse application
PE0601 Decision on rejection of patent

St.27 status event code: N-2-6-B10-B15-exm-PE0601

AMND Amendment
J201 Request for trial against refusal decision
P11-X000 Amendment of application requested

St.27 status event code: A-2-2-P10-P11-nap-X000

P13-X000 Application amended

St.27 status event code: A-2-2-P10-P13-nap-X000

PJ0201 Trial against decision of rejection

St.27 status event code: A-3-3-V10-V11-apl-PJ0201

PB0901 Examination by re-examination before a trial

St.27 status event code: A-6-3-E10-E12-rex-PB0901

B701 Decision to grant
PB0701 Decision of registration after re-examination before a trial

St.27 status event code: A-3-4-F10-F13-rex-PB0701

GRNT Written decision to grant
PR0701 Registration of establishment

St.27 status event code: A-2-4-F10-F11-exm-PR0701

PR1002 Payment of registration fee

St.27 status event code: A-2-2-U10-U11-oth-PR1002

Fee payment year number: 1

PG1601 Publication of registration

St.27 status event code: A-4-4-Q10-Q13-nap-PG1601

LAPS Lapse due to unpaid annual fee
PC1903 Unpaid annual fee

St.27 status event code: A-4-4-U10-U13-oth-PC1903

Not in force date: 20030105

Payment event data comment text: Termination Category : DEFAULT_OF_REGISTRATION_FEE

PC1903 Unpaid annual fee

St.27 status event code: N-4-6-H10-H13-oth-PC1903

Ip right cessation event data comment text: Termination Category : DEFAULT_OF_REGISTRATION_FEE

Not in force date: 20030105

R18-X000 Changes to party contact information recorded

St.27 status event code: A-5-5-R10-R18-oth-X000

PN2301 Change of applicant

St.27 status event code: A-5-5-R10-R13-asn-PN2301

St.27 status event code: A-5-5-R10-R11-asn-PN2301