Chen et al., 2024 - Google Patents
An application-layer plausibly deniable encryption system for wearable devicesChen et al., 2024
View HTML- Document ID
- 8117199175020699337
- Author
- Chen N
- Chen B
- Shi W
- Publication year
- Publication venue
- Discover Internet of Things
External Links
Snippet
Wearable devices especially smartwatches are widely used in our daily life. With their increased use, a large amount of sensitive data are collected, stored, and managed in those devices. To protect sensitive data, encryption is often used but, traditional encryption is …
- 230000015556 catabolic process 0 abstract description 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/86—Secure or tamper-resistant housings
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Kumar et al. | A recent survey on multimedia and database watermarking | |
| CN101802833B (en) | Local stores service is provided to the application run in application execution environment | |
| CN111917540B (en) | Data encryption and decryption method and device, mobile terminal and storage medium | |
| US20120317423A1 (en) | Memory randomization for protection against side channel attacks | |
| WO2003048939A1 (en) | Methods and systems for cryptographically protecting secure content | |
| JP2003345654A (en) | Data protection system | |
| CN103765811A (en) | Method and device for securely sharing images across untrusted channels | |
| JP6756056B2 (en) | Cryptographic chip by identity verification | |
| Chang et al. | User-friendly deniable storage for mobile devices | |
| Backes et al. | X-pire 2.0: a user-controlled expiration date and copy protection mechanism | |
| CN108229190B (en) | Transparent encryption and decryption control method, device, program, storage medium and electronic equipment | |
| Chen et al. | MobiWear: a plausibly deniable encryption system for wearable mobile devices | |
| Chen et al. | An application-layer plausibly deniable encryption system for wearable devices | |
| Chen et al. | A cross-layer plausibly deniable encryption system for mobile devices | |
| Luo et al. | A data hiding approach for sensitive smartphone data | |
| WO2019086493A1 (en) | Method for securing a display of sensitive data by a graphics processing unit of an electronic device | |
| WO2019134276A1 (en) | Method and system for protecting web page code, storage medium, and electronic device | |
| Shi et al. | A novel NMF-based authentication scheme for encrypted speech in cloud computing | |
| CN108696355B (en) | A method and system for preventing the theft of user avatars | |
| Chen et al. | The block-based mobile pde systems are not secure-experimental attacks | |
| Srinivasan et al. | Steganographic information hiding that exploits a novel file system vulnerability | |
| Soualmi et al. | Medical data protection using blind watermarking technique | |
| Chen et al. | MobiWear: A Plausibly Deniable Encryption System for Wearable | |
| Xia et al. | A Simple Mobile Plausibly Deniable System Using Image Steganography and Secure Hardware | |
| JP5457860B2 (en) | Evidence preservation system for photographed photographs, evidence preservation method and program for photographed photographs |