[go: up one dir, main page]

WO2002019064A3 - Method and system for preventing unwanted alterations of data and programs stored in a computer system - Google Patents

Method and system for preventing unwanted alterations of data and programs stored in a computer system Download PDF

Info

Publication number
WO2002019064A3
WO2002019064A3 PCT/CA2001/001239 CA0101239W WO0219064A3 WO 2002019064 A3 WO2002019064 A3 WO 2002019064A3 CA 0101239 W CA0101239 W CA 0101239W WO 0219064 A3 WO0219064 A3 WO 0219064A3
Authority
WO
WIPO (PCT)
Prior art keywords
data
programs stored
computer system
preventing unwanted
storage device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CA2001/001239
Other languages
French (fr)
Other versions
WO2002019064A2 (en
Inventor
Conleth Buckley
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CA002420889A priority Critical patent/CA2420889A1/en
Priority to AU2001287444A priority patent/AU2001287444A1/en
Publication of WO2002019064A2 publication Critical patent/WO2002019064A2/en
Anticipated expiration legal-status Critical
Publication of WO2002019064A3 publication Critical patent/WO2002019064A3/en
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/572Secure firmware programming, e.g. of basic input output system [BIOS]
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/76Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in application-specific integrated circuits [ASIC] or field-programmable devices, e.g. field-programmable gate arrays [FPGA] or programmable logic devices [PLD]
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Mathematical Physics (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to a method and system for preventing the unwanted alteration of data and programs stored within a computer system. The system employs a field programmable gate array to control access to a storage device. Different profiles can be accessed through the use of passwords. Different profiles provide different control parameters for access to the storage device. The gate array can be reprogrammed from time to time using downloadable electronic files. Security is achieved in the download by using keys and encryption techniques.
PCT/CA2001/001239 2000-09-01 2001-08-31 Method and system for preventing unwanted alterations of data and programs stored in a computer system Ceased WO2002019064A2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CA002420889A CA2420889A1 (en) 2000-09-01 2001-08-31 Method and system for preventing unwanted alterations of data and programs stored in a computer system
AU2001287444A AU2001287444A1 (en) 2000-09-01 2001-08-31 Method and system for preventing unwanted alterations of data and programs stored in a computer system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US22985900P 2000-09-01 2000-09-01
US60/229,859 2000-09-01

Publications (2)

Publication Number Publication Date
WO2002019064A2 WO2002019064A2 (en) 2002-03-07
WO2002019064A3 true WO2002019064A3 (en) 2003-04-24

Family

ID=22862948

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CA2001/001239 Ceased WO2002019064A2 (en) 2000-09-01 2001-08-31 Method and system for preventing unwanted alterations of data and programs stored in a computer system

Country Status (3)

Country Link
AU (1) AU2001287444A1 (en)
CA (1) CA2420889A1 (en)
WO (1) WO2002019064A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106462137B (en) * 2013-12-20 2019-04-30 西屋电气有限责任公司 System and method for securing industrial control systems

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2558309A1 (en) 2004-03-05 2005-09-15 Secure Systems Limited Partition access control system and method for controlling partition access
US9483645B2 (en) * 2008-03-05 2016-11-01 Mcafee, Inc. System, method, and computer program product for identifying unwanted data based on an assembled execution profile of code
US8707434B2 (en) 2011-08-17 2014-04-22 Mcafee, Inc. System and method for indirect interface monitoring and plumb-lining

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5586301A (en) * 1994-11-09 1996-12-17 Ybm Technologies, Inc. Personal computer hard disk protection system
EP0851358A2 (en) * 1996-12-31 1998-07-01 Sun Microsystems, Inc. Processing system security
WO1999021094A2 (en) * 1997-10-20 1999-04-29 Quickflex, Inc. Reconfigurable secure hardware apparatus and method of operation
EP0945775A2 (en) * 1998-03-16 1999-09-29 Fujitsu Limited Storing apparatus and password control method
EP0949556A2 (en) * 1998-04-08 1999-10-13 Fujitsu Limited Access control method, storage apparatus and storage medium
WO1999056428A1 (en) * 1998-04-27 1999-11-04 Motorola Inc. Apparatus and method of reading a program into a processor

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5586301A (en) * 1994-11-09 1996-12-17 Ybm Technologies, Inc. Personal computer hard disk protection system
EP0851358A2 (en) * 1996-12-31 1998-07-01 Sun Microsystems, Inc. Processing system security
WO1999021094A2 (en) * 1997-10-20 1999-04-29 Quickflex, Inc. Reconfigurable secure hardware apparatus and method of operation
EP0945775A2 (en) * 1998-03-16 1999-09-29 Fujitsu Limited Storing apparatus and password control method
EP0949556A2 (en) * 1998-04-08 1999-10-13 Fujitsu Limited Access control method, storage apparatus and storage medium
WO1999056428A1 (en) * 1998-04-27 1999-11-04 Motorola Inc. Apparatus and method of reading a program into a processor

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106462137B (en) * 2013-12-20 2019-04-30 西屋电气有限责任公司 System and method for securing industrial control systems

Also Published As

Publication number Publication date
AU2001287444A1 (en) 2002-03-13
CA2420889A1 (en) 2002-03-07
WO2002019064A2 (en) 2002-03-07

Similar Documents

Publication Publication Date Title
AU5245599A (en) Notebook security system (nbs)
ATE386290T1 (en) PROTECTED CONTENT ACCESS SYSTEM AND METHODS IN A PERMISSION MANAGEMENT SYSTEM
WO2002027489A3 (en) Persistent data storage for client computer software programs
WO2004084017A3 (en) A method and system for implementing digital rights management
WO2002052386A3 (en) Method and system for software integrity control using secure hardware assisting device
WO2000045262A3 (en) Techniques for permitting access across a context barrier in a small footprint device using global data structures
CA3006804C (en) Security interface for a mobile device
WO2006069274A3 (en) Versatile content control with partitioning
WO2002001326A3 (en) System and method for client interaction in a multi-level rights-management architecture
TW200520507A (en) Remote accessing system, remote accessing method, and a media recording a remote accessing program
EP0359220A3 (en) Method and apparatus for protecting computer software utilizing coded filter network in conjunction with an active coded hardware device
WO2004070538A3 (en) Distribution and rights management of digital content
ATE445194T1 (en) A SECURE NETWORK-BASED CONTENT DISTRIBUTION PROCESS AND SYSTEM
WO2003001350A3 (en) Security system and software to prevent unauthorized use of a computing device
WO2005104426A3 (en) Geographic location based licensing system
WO2003023578A3 (en) Using data stored in a destructive-read memory
GB2368422B (en) Electronic settlement system, settlement management device, store device, client, data storage device, computer program, and storage medium
WO2006127919A3 (en) Data management and distribution
EP1916612A3 (en) Autonomous field reprogramming
WO2004099947A3 (en) Memory protection systems and methods for writable memory
DE60228554D1 (en) METHOD AND DEVICE FOR STORING CRYPTOGRESITZ AND SAFE DISTRIBUTION SAVED KEY TO BE AUTHENTICATED
WO2004013744A3 (en) Apparatuses and methods for decrypting encrypted blocks of data and locating the decrypted blocks of data in memory space used for execution
DE50213613D1 (en) Method for activating a control unit arranged in a housing, which is protected against spying on data
DE69839509D1 (en) Data storage device and password control method
WO2002019064A3 (en) Method and system for preventing unwanted alterations of data and programs stored in a computer system

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PH PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
WWE Wipo information: entry into national phase

Ref document number: 2420889

Country of ref document: CA

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP