WO2000056000A1 - Encryption device - Google Patents

Encryption device Download PDF

Info

Publication number
WO2000056000A1
WO2000056000A1 PCT/SE2000/000475 SE0000475W WO0056000A1 WO 2000056000 A1 WO2000056000 A1 WO 2000056000A1 SE 0000475 W SE0000475 W SE 0000475W WO 0056000 A1 WO0056000 A1 WO 0056000A1
Authority
WO
WIPO (PCT)
Prior art keywords
card
encryption
data
input
external
Prior art date
Application number
PCT/SE2000/000475
Other languages
French (fr)
Inventor
Jens Bogarve
Jörgen OLSSON
Roger Eriksson
Ove Linde
Original Assignee
Business Security
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Business Security filed Critical Business Security
Priority to AU38515/00A priority Critical patent/AU3851500A/en
Publication of WO2000056000A1 publication Critical patent/WO2000056000A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/001In-Line Device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Definitions

  • the present invention relates to an encryption device for encryption of a data flow, and more particularly to an encryption device comprising a PC-card, having a data input and a data output for encrypted data.
  • the crypto can be an encryption algorithm known for a few or everyone while the key is known for authorized senders and receivers but unknown for other users, who have access to the same network.
  • An unauthorized user encrypts a message with a key and then he transmits the encrypted message to an authorized receiver. In order to decode or decrypt the received message and verify that the message is sent by an authorized sender, the user uses the current key.
  • the encryption can be performed before the information is sent or in connection with the data stream passing the modem.
  • Laptop computers normally have card slots for connection to external hardware, such as different kinds of modems: analogue, ISDN, GSM; memory devices: hard disks, flash disks; or other kinds of interface cards for connection to the Ethernet, analogue or digital input and output signals. This kind of interface cards are called PC-cards or previously PCMCIA-cards.
  • a distance worker During for example communication between a distance worker and his company network via the Internet or the public switched network, the transmitted information is internal and important information for the company. Often, it can be directly detrimental for the company if the information falls into wrong hands, and, therefore, it should be protected by encryption.
  • a distance worker is often provided with a laptop computer, equipped with a modem to be able to work both at home and during business trips.
  • a modem can be a GSM or ISDN modem etc. on a PC- card for connection to a suitable network, for transmission of the information.
  • PC-cards with encryption functionality can be divided in two groups: PC-cards including only encryption functionality and PC-cards including encryption functionality and a modem.
  • the main functionality of the first group can be described as a file and/or a hard disk encryption tool, and is not relevant for the present invention as it lacks communication possibilities via the modem.
  • the integrated modem functionality of the latter group protects the calling modem connections in the first place.
  • Vkaart PCMCIA encryption card from Philips Crypto, Holland, is a PCMCIA-card providing a main functionality for a modem crypto and PC-related security functions, such as access control to a PC or laptop computer, digital signatures in order to secure the authority of the user for what is communicated, and encryption of files on the com- puter, with optional smart card support.
  • the modem crypto from Philips Crypto and other prior art modem cryptos comprise a PC-card for encryption with an integrated modem. This delimits the possibilities for connection of the modem crypto, or the computer connected to the modem crypto, to a certain kind of network, determined by the kind of modem.
  • the object of the present invention is to achieve an encryption device for encryption of a data flow between a computer and a PC-card, and decryption in the reverse direction, and to provide the possibility of connection of the encryption device to several kinds of networks in order to obtain a secure information transmission between a sender and a receiver over an insecure communication channel .
  • an encryption device comprising a PC-card part including encryption means/decryption means for en- cryption/decryption of data on the PC-card bus and a data output, which is operatively connected to connection means for an external PC-card.
  • An advantage of the encryption device according to the invention is that the communication between a computer, provided with the encryption device and a modem connected to its connection means for an external PC-card, and another computer, also provided with a corresponding encryption device in connection with the modem via the network, is encrypted in a simple and secure way.
  • Another advantage of the present invention is the possibility of changing the modem for other kinds of modems, for example for another communication medium.
  • FIG 1 is a schematic side view of an encryption de- vice according to the present invention.
  • FIG 2 is a block diagram illustrating the encryption device in FIG 1 connected to a computer and a PC-card modem.
  • FIG 1 shows an encryption device 1 according to the present invention, including a PC-card or a PC-card part 2 having a data input 3 and a data output 4 for encrypted data, a reader/writer 5 for active cards 6 with an encryp- tion key, wherein the reader/writer 5 is integrated with a keypad 7 for verification of a user of the active card 6.
  • the encryption device 1 has a PC-card 2 such as a PCMCIA- card type II in this embodiment, which can be placed into a card slot of a computer for PC-cards with a corresponding terminal.
  • the data output 4 is in turn operatively connected with a terminal in a card slot of the encryption device 1 for an external PC-card 8.
  • the block diagram in FIG 2 illustrates the encryption device 1 according to the invention connected to a computer 9, for example a laptop computer, and the external PC-card 8, a modem in the embodiment.
  • the encryption device 1 has encryption means 10 for encryption of data, encrypting data by means of an encryption algorithm directly from the PC- card input bus 11, which is operatively connected to the data output 3.
  • the encryption means 10 is connected to the data output 4 through the output bus 12, said output being operatively connected to the connection means for an external PC-card.
  • a filter 13 is operatively connected to the data input 3 via the input bus 11 of the PC-card 2 for wire tapping of the data flow, based on which the filter 13 activates and deactivates the encryption.
  • a key is required in addition to the crypto.
  • the key is sup- plied from the active card 6 via the card reader/writer 5 in this embodiment to the encryption means 10, which is operatively connected to the card reader/writer 5.
  • Secret information to be securely transmitted from the computer 9 to a receiving computer is performed by the encryption device 1 according to the invention, connected to the PCMCIA-bus 11' of the computer 9, the PC-card modem connected to the encryption device 1, and an insecure communication channel available for several users and connected to the receiver.
  • the security is obtained by means of the encryption device 1 being activated by a user, who put his active card 6 into the card reader/writer 5 and enters his authorisation code, a so-called PIN-code on the keypad 7.
  • a correctly entered code results in the encryption key stored on the card 6 being read into the encryp- tion device 10.
  • a connection established by a call is initiated between the transmitter computer 9 and the receiver computer.
  • the encryption device at the receiver computer automatically verifies that the key information of the calling computer 9 corresponds to the own information. If this verification is unsuccessful, the connection is interrupted and the line is automatically disconnected.
  • the filter 13 taps the data flow and searches for known bit patterns for identification of regulation and control information. Based on the identified information, the filter activates or deactivates the encryption function.
  • the information or the message from the computer is en clair and is translated in the encryption device 1 to a cryptogram by means of the crypto and a key in the encryption means. Then, the encrypted message is transmitted to the computer of the authorized receiver via the input bus 12, the data output 4, and the modem 8 placed in the card slot of the encryption device and its PCMCIA-bus 12'.
  • the user uses the current key.
  • the encryption device 1 also comprises decryption means 14 for decryption of received data from its external PC-card 8.
  • the data output 4 operates as input for encrypted input data and the data input 3 as output for decrypted data .
  • the user takes out his active card 6 from the card reader/writer 5. All secret information is stored on the card, and the encryption de- vice 2 automatically deletes internal memory circuits in the encryption means 10 and the decryption means 14 after the card has been removed from the reader. This implies that the key always has to be loaded after the active card has been removed from the card reader/writer 5 or that the computer has been turned off. Since the encryption device 1 gets power supplied from the computer 9, it will be automatically turned off when the computer 9 is turned off.
  • the encryption key can be entered manually on the keypad 7, from a network through the connection means for the external PC-card 8, via the computer 9, or via an IR-con- nection.
  • the encryption device 1 comprises a PC-card with a hardware based encryption. Encryption keys are supplied in several ways but preferably by a personal active card protected by a PIN- code . Additionally, the encryption device 1 provides functionality for encrypted information transmission through an analogue telecommunication network as well as GSM and ISDN. Examples of connectable external PC-cards 8 are the V90-, GSM- , ISDN-, XDSL- modem or a combination thereof. The flexibility of the construction facilitates a simple upgrade to future communication standards. In another embodiment, the PC-card part 2 is provided with an interface terminal for connection to a serial port or a USB-port (Universal Serial Bus) of a desktop computer.
  • a serial port or a USB-port (Universal Serial Bus) of a desktop computer.
  • USB-port Universal Serial Bus

Abstract

An encryption device for encryption of a data flow, comprising a PC-card part (2) having a data input (3) and a data output (4) for encrypted data. The PC-card part (2) comprises encryption means (10) for encryption of data on the PC-card bus (11, 12) and the data output (4) is operatively connected to a connection means for an external PC-card (8).

Description

TITLE: ENCRYPTION DEVICE
Technical Field
The present invention relates to an encryption device for encryption of a data flow, and more particularly to an encryption device comprising a PC-card, having a data input and a data output for encrypted data.
Prior Art
The increased use of computers in different networks for transmission of information involves at the same time an increased exposure of for example information of confidential nature, which the sender and receiver does not want to be available for unauthorized persons. This is a big problem, because it is relatively simple to tap data communication over different networks. It is very difficult to keep unauthorized persons from tapping information being transmitted over the Internet, because the network is available for everyone, including persons acquiring secret information in an illegitimate way. This problem can be solved by encryption of information, i.e. means for the sender and receiver to be able to transmit information over an insecure communication channel available for several users in a secure way. The security is achieved by means of a message en clair is translated into an encrypted text or a so-called cryptogram by means of a crypto and a key. The crypto can be an encryption algorithm known for a few or everyone while the key is known for authorized senders and receivers but unknown for other users, who have access to the same network. An unauthorized user encrypts a message with a key and then he transmits the encrypted message to an authorized receiver. In order to decode or decrypt the received message and verify that the message is sent by an authorized sender, the user uses the current key. The encryption can be performed before the information is sent or in connection with the data stream passing the modem. Laptop computers normally have card slots for connection to external hardware, such as different kinds of modems: analogue, ISDN, GSM; memory devices: hard disks, flash disks; or other kinds of interface cards for connection to the Ethernet, analogue or digital input and output signals. This kind of interface cards are called PC-cards or previously PCMCIA-cards.
During for example communication between a distance worker and his company network via the Internet or the public switched network, the transmitted information is internal and important information for the company. Often, it can be directly detrimental for the company if the information falls into wrong hands, and, therefore, it should be protected by encryption. A distance worker is often provided with a laptop computer, equipped with a modem to be able to work both at home and during business trips. For example, a modem can be a GSM or ISDN modem etc. on a PC- card for connection to a suitable network, for transmission of the information.
There are several prior art PC-cards with encryption functionality, which can be divided in two groups: PC-cards including only encryption functionality and PC-cards including encryption functionality and a modem. The main functionality of the first group can be described as a file and/or a hard disk encryption tool, and is not relevant for the present invention as it lacks communication possibilities via the modem. The integrated modem functionality of the latter group protects the calling modem connections in the first place.
Vkaart PCMCIA encryption card from Philips Crypto, Holland, is a PCMCIA-card providing a main functionality for a modem crypto and PC-related security functions, such as access control to a PC or laptop computer, digital signatures in order to secure the authority of the user for what is communicated, and encryption of files on the com- puter, with optional smart card support.
The modem crypto from Philips Crypto and other prior art modem cryptos comprise a PC-card for encryption with an integrated modem. This delimits the possibilities for connection of the modem crypto, or the computer connected to the modem crypto, to a certain kind of network, determined by the kind of modem.
Summary of the Invention
The object of the present invention is to achieve an encryption device for encryption of a data flow between a computer and a PC-card, and decryption in the reverse direction, and to provide the possibility of connection of the encryption device to several kinds of networks in order to obtain a secure information transmission between a sender and a receiver over an insecure communication channel .
The object is achieved by an encryption device according to the present invention, comprising a PC-card part including encryption means/decryption means for en- cryption/decryption of data on the PC-card bus and a data output, which is operatively connected to connection means for an external PC-card.
An advantage of the encryption device according to the invention is that the communication between a computer, provided with the encryption device and a modem connected to its connection means for an external PC-card, and another computer, also provided with a corresponding encryption device in connection with the modem via the network, is encrypted in a simple and secure way. Another advantage of the present invention is the possibility of changing the modem for other kinds of modems, for example for another communication medium.
The Drawings
The invention will be described in the following description with reference to the accompanying drawings, in which
FIG 1 is a schematic side view of an encryption de- vice according to the present invention, and
FIG 2 is a block diagram illustrating the encryption device in FIG 1 connected to a computer and a PC-card modem.
Description
FIG 1 shows an encryption device 1 according to the present invention, including a PC-card or a PC-card part 2 having a data input 3 and a data output 4 for encrypted data, a reader/writer 5 for active cards 6 with an encryp- tion key, wherein the reader/writer 5 is integrated with a keypad 7 for verification of a user of the active card 6. The encryption device 1 has a PC-card 2 such as a PCMCIA- card type II in this embodiment, which can be placed into a card slot of a computer for PC-cards with a corresponding terminal. The data output 4 is in turn operatively connected with a terminal in a card slot of the encryption device 1 for an external PC-card 8.
The block diagram in FIG 2 illustrates the encryption device 1 according to the invention connected to a computer 9, for example a laptop computer, and the external PC-card 8, a modem in the embodiment. The encryption device 1 has encryption means 10 for encryption of data, encrypting data by means of an encryption algorithm directly from the PC- card input bus 11, which is operatively connected to the data output 3. The encryption means 10 is connected to the data output 4 through the output bus 12, said output being operatively connected to the connection means for an external PC-card. A filter 13 is operatively connected to the data input 3 via the input bus 11 of the PC-card 2 for wire tapping of the data flow, based on which the filter 13 activates and deactivates the encryption.
In order to obtain a required security in the encryption and the possibility for authorisation control, a key is required in addition to the crypto. The key is sup- plied from the active card 6 via the card reader/writer 5 in this embodiment to the encryption means 10, which is operatively connected to the card reader/writer 5.
Secret information to be securely transmitted from the computer 9 to a receiving computer is performed by the encryption device 1 according to the invention, connected to the PCMCIA-bus 11' of the computer 9, the PC-card modem connected to the encryption device 1, and an insecure communication channel available for several users and connected to the receiver. The security is obtained by means of the encryption device 1 being activated by a user, who put his active card 6 into the card reader/writer 5 and enters his authorisation code, a so-called PIN-code on the keypad 7. A correctly entered code results in the encryption key stored on the card 6 being read into the encryp- tion device 10. A connection established by a call is initiated between the transmitter computer 9 and the receiver computer. The encryption device at the receiver computer automatically verifies that the key information of the calling computer 9 corresponds to the own information. If this verification is unsuccessful, the connection is interrupted and the line is automatically disconnected.
Regulation and control information for initialisation of the connection could usually not be encrypted. Therefore, the filter 13 taps the data flow and searches for known bit patterns for identification of regulation and control information. Based on the identified information, the filter activates or deactivates the encryption function.
The information or the message from the computer is en clair and is translated in the encryption device 1 to a cryptogram by means of the crypto and a key in the encryption means. Then, the encrypted message is transmitted to the computer of the authorized receiver via the input bus 12, the data output 4, and the modem 8 placed in the card slot of the encryption device and its PCMCIA-bus 12'.
In order to decode or decrypt the received message and verify that the message is transmitted by an authorized sender, the user uses the current key.
Usually, the information transmission is duplex and the computer 9 therefore has to operate both as a transmitter and a receiver of encrypted information. Therefore, the encryption device 1 according to the invention also comprises decryption means 14 for decryption of received data from its external PC-card 8. During decryption, the data output 4 operates as input for encrypted input data and the data input 3 as output for decrypted data .
After a completed session, the user takes out his active card 6 from the card reader/writer 5. All secret information is stored on the card, and the encryption de- vice 2 automatically deletes internal memory circuits in the encryption means 10 and the decryption means 14 after the card has been removed from the reader. This implies that the key always has to be loaded after the active card has been removed from the card reader/writer 5 or that the computer has been turned off. Since the encryption device 1 gets power supplied from the computer 9, it will be automatically turned off when the computer 9 is turned off.
Even though the invention has been described by way of an example thereof, it is apparent that the encryption device according to the present invention fulfils the aims and advantages set forth above, and alternatives, modifications and variations of the invention are possible within the scope of the accompanying claims.
In alternative embodiments of the encryption device 1, the encryption key can be entered manually on the keypad 7, from a network through the connection means for the external PC-card 8, via the computer 9, or via an IR-con- nection.
Thus, the encryption device 1 according to the in- vention comprises a PC-card with a hardware based encryption. Encryption keys are supplied in several ways but preferably by a personal active card protected by a PIN- code . Additionally, the encryption device 1 provides functionality for encrypted information transmission through an analogue telecommunication network as well as GSM and ISDN. Examples of connectable external PC-cards 8 are the V90-, GSM- , ISDN-, XDSL- modem or a combination thereof. The flexibility of the construction facilitates a simple upgrade to future communication standards. In another embodiment, the PC-card part 2 is provided with an interface terminal for connection to a serial port or a USB-port (Universal Serial Bus) of a desktop computer.

Claims

CLAIMS 1. An encryption device for encryption of a data flow, comprising a PC-card part (2) having a data input (3) and a data output (4) for encrypted data, characterized in that the PC-card part (2) comprises encryption means (10) for encryption of the data flow on the PC-card bus (11,12), and that the data output (4) is operatively connected to the connection means for transmission of encrypted data to an external PC-card (8) .
2. A device according to claim 1, characterized in that a filter 13 is operatively connected to the data input (3) and the encryption device (10) for wire tapping of the data flow, based on which the filter (13) activates or deactivates the encryption.
3. A device according to claim 1 or 2 , characterized in that a reader/writer (5) for active cards (6) with a encryption key is operatively connected to the PC-card part (2) .
4. A device according to claim 3, characterized in that the reader/writer (5) is integrated with a keypad (7) for verification of the user of the active card (6) .
5. A device according to any of the preceding claims, characterized in that a keypad (7) is operatively connected to the PC-card part (2) for manual input of the encryption key.
6. A device according to any of the preceding claims, characterized by means (1) for input of an encryption key from a network connectable to the external PC- card (8) .
7. A device according to any of the preceding claims, characterized by means (1) for input of an encryption key from a computer (9) connectable to the PC-card part (2) .
8. A device according to any of the preceding claims, characterized by means for input of a crypto key through an IR-connection at the encryption device (1) , operatively connected to the encryption means (10) .
9. A device according to any of the preceding claims, characterized in that the PC-card part (2) comprises decryption means (14) for decryption of an input data flow on the PC-card bus (11,12) from the connection means (4) for the external PC-card (8) for further transmission of a decrypted data flow to the data input (3) .
10. A device according to any of the preceding claims, characterized in that the external PC-card (8) is a PCMCIA-modem.
11. A device according to claim 10, characterized in that the external PC-card (8) is a V90-, GSM- , ISDN-, or XDSL-modem or a combination thereof.
12. A device according to any of the claims 1-9, characterized in that the external PC-card (8) is a hard disk for storage of encrypted data.
13. A device according to any of the preceding claims, characterized in that the data input (3) is provided with an interface terminal for connection to a serial port or USB-port of a computer.
14. An encryption system for encryption of a data flow, comprising a computer (9) having a PC-card connection operatively connected to an encryption device, characterized by an encryption device (1) according to any of the preceding claims, and a PC-card (8) connected thereto.
PCT/SE2000/000475 1999-03-12 2000-03-10 Encryption device WO2000056000A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU38515/00A AU3851500A (en) 1999-03-12 2000-03-10 Encryption device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
SE9900887A SE9900887L (en) 1999-03-12 1999-03-12 encryption device
SE9900887-2 1999-03-12

Publications (1)

Publication Number Publication Date
WO2000056000A1 true WO2000056000A1 (en) 2000-09-21

Family

ID=20414814

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SE2000/000475 WO2000056000A1 (en) 1999-03-12 2000-03-10 Encryption device

Country Status (3)

Country Link
AU (1) AU3851500A (en)
SE (1) SE9900887L (en)
WO (1) WO2000056000A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004025484A1 (en) * 2002-09-16 2004-03-25 Patrick Cameron Ata device attachment system
WO2008118539A2 (en) * 2007-02-07 2008-10-02 L3 Communications Corporation Multi-network cryptographic device

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0628908A1 (en) * 1993-05-20 1994-12-14 AT&T Corp. PCMCIA interface using shared memory
US5671367A (en) * 1992-01-14 1997-09-23 Gemplus Card International Microcomputer PC-card having switching circuit for controlling access to memory based on control signals from internal microprocessor on control signals from external PC
WO1998020408A1 (en) * 1996-11-06 1998-05-14 The Foxboro Company Externally powered interface
US5845114A (en) * 1997-01-08 1998-12-01 Telxon Corporation PC card initialization for microprocessor based devices
DE29814427U1 (en) * 1998-08-11 1998-12-10 Scm Microsystems Gmbh security system
US5857024A (en) * 1995-10-02 1999-01-05 International Business Machines Corporation IC card and authentication method for information processing apparatus
US5867579A (en) * 1994-10-27 1999-02-02 Mitsubishi Corporation Apparatus for data copyright management system
US5878142A (en) * 1994-07-12 1999-03-02 Information Resource Engineering, Inc. Pocket encrypting and authenticating communications device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5671367A (en) * 1992-01-14 1997-09-23 Gemplus Card International Microcomputer PC-card having switching circuit for controlling access to memory based on control signals from internal microprocessor on control signals from external PC
EP0628908A1 (en) * 1993-05-20 1994-12-14 AT&T Corp. PCMCIA interface using shared memory
US5878142A (en) * 1994-07-12 1999-03-02 Information Resource Engineering, Inc. Pocket encrypting and authenticating communications device
US5867579A (en) * 1994-10-27 1999-02-02 Mitsubishi Corporation Apparatus for data copyright management system
US5857024A (en) * 1995-10-02 1999-01-05 International Business Machines Corporation IC card and authentication method for information processing apparatus
WO1998020408A1 (en) * 1996-11-06 1998-05-14 The Foxboro Company Externally powered interface
US5845114A (en) * 1997-01-08 1998-12-01 Telxon Corporation PC card initialization for microprocessor based devices
DE29814427U1 (en) * 1998-08-11 1998-12-10 Scm Microsystems Gmbh security system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004025484A1 (en) * 2002-09-16 2004-03-25 Patrick Cameron Ata device attachment system
WO2008118539A2 (en) * 2007-02-07 2008-10-02 L3 Communications Corporation Multi-network cryptographic device
WO2008118539A3 (en) * 2007-02-07 2008-12-31 L3 Comm Corp Multi-network cryptographic device
US8032763B2 (en) 2007-02-07 2011-10-04 L3 Communications Corporation Multi-network cryptographic device

Also Published As

Publication number Publication date
SE9900887D0 (en) 1999-03-12
AU3851500A (en) 2000-10-04
SE9900887L (en) 2000-09-13

Similar Documents

Publication Publication Date Title
US6151677A (en) Programmable telecommunications security module for key encryption adaptable for tokenless use
US4484025A (en) System for enciphering and deciphering data
EP1035684B1 (en) Cryptographic communication system
EP0671830B1 (en) Secure communication apparatus and method
US7079653B2 (en) Cryptographic key split binding process and apparatus
US8275134B2 (en) Method for guaranteeing security of critical data, terminal and secured chip
CN1745555B (en) System and method of protecting data on a communication device
CN101027869B (en) System and method for determining a security encoding to be applied to outgoing messages
CN102781001A (en) Method for encrypting built-in file of mobile terminal and mobile terminal
US20060280297A1 (en) Cipher communication system using device authentication keys
US20060168658A1 (en) Protection of data to be stored in the memory of a device
EP1331752A1 (en) Module for personalizing content according to instruction contained in a voucher for devices
US7023998B2 (en) Cryptographic key processing and storage
JP2008535427A (en) Secure communication between data processing device and security module
US20020131599A1 (en) System for encryption of wireless transmissions from personal palm computers to world wide Web terminals
US20100090001A1 (en) Method and terminal for providing controlled access to a memory card
TW566024B (en) Method to create a virtual private network through a public network
WO2000056000A1 (en) Encryption device
WO2002103535A1 (en) Qualification certifying method using variable certification information
US20020001388A1 (en) High speed copy protection method
CA2243173A1 (en) System and method for secure data transmission
CN113162766B (en) Key management method and system for key component
WO2008040996A2 (en) Personal electronic device security
JPS60203036A (en) Privacy communication system
CN116366243A (en) Data transmission and encryption method and system for digital collaborative office

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase