WO2004029813A1 - Security arrangement - Google Patents
Security arrangement Download PDFInfo
- Publication number
- WO2004029813A1 WO2004029813A1 PCT/IB2003/004125 IB0304125W WO2004029813A1 WO 2004029813 A1 WO2004029813 A1 WO 2004029813A1 IB 0304125 W IB0304125 W IB 0304125W WO 2004029813 A1 WO2004029813 A1 WO 2004029813A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- computer
- receiver
- signal
- security arrangement
- emitter
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2153—Using hardware token as a secondary aspect
Definitions
- the present invention relates to a security arrangement.
- the present invention relates to a security arrangement for controlling access to information stored on a computer.
- Computers are often used to store documents or other information, which may be of a sensitive nature and should not be readily accessed by unintended or unauthorised persons. Much of this information is stored on networks that are joined to the internet and many security arrangements have been developed to prevent this information being accessed by so-called computer hackers. However, information can also be accessed from individual computers, desktops or laptops, when these computers are left unattended or are stolen.
- a security arrangement for securing information stored on a computer includes encryption software operatively associated with a computer, the encryption software being adapted to encrypt and decrypt information stored on the computer; a receiver operatively associated with the computer and being adapted to receive a signal; and an emitter remotely located and associated with the receiver, the emitter being adapted to emit a signal to be received by the receiver to control operation of the encryption software.
- the encryption software may be stored on a hard drive of the computer.
- the encryption software may be adapted to encrypt the information as soon as power is provided to the computer.
- the receiver may be integrally provided on the computer.
- the receiver may be adapted to be connected to an external communication port of the computer.
- the emitter may be adapted to be carried by a user of the computer.
- the emitter may be in the form of a card.
- the card may be an identification card.
- the signal may be encoded.
- the signal may be adapted to be received by the receiver only if the emitter is within a distance of less than a two metres from the receiver.
- the encryption software may be adapted to encrypt the information if the signal is not received by the receiver.
- the encryption software may be adapted to decrypt the information if the signal is received by the receiver.
- the encryption or decryption of the information may be adapted to take place within six seconds.
- the receiver and emitter may be transmitters.
- the invention extends to a computer provided with a security arrangement as set out herein.
- a method of protecting information stored on a computer includes the steps of programming a unique security code signal into an emitter; of causing the emitter to continuously emit the signal; of operatively associating a receiver with a computer, the receiver being adapted to receive the signal; and of providing encryption software on the computer, the encryption software being adapted to encrypt information stored on the computer when the signal is not received by the receiver and to decrypt the information when the signal is received by the receiver.
- the method may include the step of storing the encryption software on a hard drive of the computer.
- the method may include the step of causing the encryption software to encrypt the information as soon as power is provided to the computer.
- the method may include the step of encoding the signal.
- the method may include the step of limiting the emitter so that the signal is emitted through a distance of less than a two metres.
- the method may include the step of encrypting or decrypting the information within six seconds.
- FIG. 1 a security arrangement in accordance with the invention.
- FIG 2 a flow diagram of the operation of the security arrangement shown in Figure 1.
- the security- arrangement 10 is adapted to protect information stored on a computer 12 from unauthorised access.
- the security arrangement 10 includes a receiver 14 operatively joined to the computer 12, an emitter 16 associated with the receiver 14 and an encryption software program contained on a hard drive of the computer 12.
- the receiver 14 is shown joined to an external communication port of the computer 12, such as a serial port or universal serial bus port, but it can also be integrally provided in the computer 12.
- the emitter 16 continuously emits an encoded signal 18, which is received by the receiver 14.
- the signal 18 is adapted to be transmitted across a distance of about two metres, so that if the emitter 16 is removed more than two metres away from the receiver 14, then the signal 18 will no longer be received by the receiver 14.
- the encryption software on the computer 12 automatically encrypts or otherwise scrambles any or all or some of the information stored on a hard drive or in the memory of the computer 12. When a person wishes to work on the computer or to access the information, he must first obtain a suitable emitter 16 that is associated with the receiver 14 or that is operatively associated with the encryption program.
- the signal 18 is received by the receiver 14 and conveyed to the encryption software, which then decrypts the information.
- the encryption software automatically again encrypts the information.
- the software should encrypt or decrypt the information within about six seconds. This is also advantageous as it allows a person with the emitter 16 to start working immediately after returning to the computer 12.
- the encryption software is adapted to encrypt the information immediately upon activation of the computer 12 and before a user can cancel or interrupt the encryption.
- the information will be encrypted as soon as power is again provided to the computer 12.
- the encryption program is stored with the information on the hard drive and is activated as soon as power is supplied to the hard drive, the encryption software cannot be bypassed by installing the hard drive in another computer.
- the emitter 16 can be carried by a person, e.g. it can be a card such as an identification card carried in the person's wallet. Alternatively, the emitter 16 can be worn by the person, such as necklace or watch.
- the receiver 14 can be located directly on a motherboard of the computer 12. This will enable the receiver 14 to register all serial numbers of various components installed in the computer 12 and may reduce theft of the computer components.
- the receiver 14 and emitter 16 can be transmitters being adapted to provide one-way or two-way transmissions of the signal 18.
- the computer 12 can be a desktop computer or a portable computer, such as a laptop or notebook computer.
- the computer 12 can also be a network server or other integrated computer hardware.
- the security arrangement 10 can be adapted to operate in conjunction with software as a means of preventing pirate software from being used on a computer.
- the security arrangement 10 can be adapted for controlling access to a building.
- a person carrying the emitter 16 will be allowed access to the building and the time of his arrival and departure form the building can be stored on a computer system.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| AU2003264928A AU2003264928A1 (en) | 2002-09-25 | 2003-09-23 | Security arrangement |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| ZA200207667 | 2002-09-25 | ||
| ZA2002/7667 | 2002-09-25 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2004029813A1 true WO2004029813A1 (en) | 2004-04-08 |
Family
ID=32043733
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/IB2003/004125 Ceased WO2004029813A1 (en) | 2002-09-25 | 2003-09-23 | Security arrangement |
Country Status (2)
| Country | Link |
|---|---|
| AU (1) | AU2003264928A1 (en) |
| WO (1) | WO2004029813A1 (en) |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE19543455A1 (en) * | 1995-11-22 | 1997-11-27 | Peschke Peter Dipl Betriebsw | PC security system against unauthorized access |
| FR2800479A1 (en) * | 1999-10-28 | 2001-05-04 | Vks Keyboards Systems | DEVICE FOR CONTROLLING ACCESS TO COMPUTER |
| WO2001040906A2 (en) * | 1999-12-01 | 2001-06-07 | Ensure Technologies, Inc. | Method of determining distance between two electronic devices |
| US20030074575A1 (en) * | 2001-10-11 | 2003-04-17 | Hoberock Tim M. | Computer or computer resource lock control device and method of implementing same |
-
2003
- 2003-09-23 AU AU2003264928A patent/AU2003264928A1/en not_active Abandoned
- 2003-09-23 WO PCT/IB2003/004125 patent/WO2004029813A1/en not_active Ceased
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE19543455A1 (en) * | 1995-11-22 | 1997-11-27 | Peschke Peter Dipl Betriebsw | PC security system against unauthorized access |
| FR2800479A1 (en) * | 1999-10-28 | 2001-05-04 | Vks Keyboards Systems | DEVICE FOR CONTROLLING ACCESS TO COMPUTER |
| WO2001040906A2 (en) * | 1999-12-01 | 2001-06-07 | Ensure Technologies, Inc. | Method of determining distance between two electronic devices |
| US20030074575A1 (en) * | 2001-10-11 | 2003-04-17 | Hoberock Tim M. | Computer or computer resource lock control device and method of implementing same |
Also Published As
| Publication number | Publication date |
|---|---|
| AU2003264928A1 (en) | 2004-04-19 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US6628198B2 (en) | Security system for preventing a personal computer from being stolen or used by unauthorized people | |
| US7389536B2 (en) | System and apparatus for limiting access to secure data through a portable computer to a time set with the portable computer connected to a base computer | |
| EP0865695B1 (en) | An apparatus and method for cryptographic companion imprinting | |
| KR100334720B1 (en) | Adapter Having Secure Function and Computer Secure System Using It | |
| US7103782B1 (en) | Secure memory and processing system having laser-scribed encryption key | |
| US20040030908A1 (en) | Method and system for controlling access to data stored on a data storage device | |
| US6996547B1 (en) | Method for purchasing items over a non-secure communication channel | |
| EP1253503A3 (en) | Protection of software against use without permit | |
| WO2003054662A3 (en) | A system and method for preventing unauthorized use of protected software utilizing a portable security device | |
| KR20000005527A (en) | An authentication system based on periodic challenge and response protocol | |
| US20080256648A1 (en) | Secure portable computer and security method | |
| CN102017676A (en) | System and method for electronic data security | |
| US7089424B1 (en) | Peripheral device for protecting data stored on host device and method and system using the same | |
| US7780079B2 (en) | Data storage device with built-in data protection for ultra sensitive applications | |
| WO2007089266A3 (en) | Administration of data encryption in enterprise computer systems | |
| JP2000155876A (en) | Burglarproof device | |
| WO2004029813A1 (en) | Security arrangement | |
| ZA200505949B (en) | Security arrangement | |
| KR100379675B1 (en) | Adapter Having Secure Function and Computer Secure System Using It | |
| KR101610182B1 (en) | Client terminal security apparatus and method of remote learning data service system | |
| JP2001318875A (en) | System for preventing data burglary of computer | |
| KR20200082187A (en) | Secure usb dongle for usb memory without security | |
| WO1999035553A1 (en) | Cryptographic token | |
| AU633106B2 (en) | Security system | |
| EP1239358A2 (en) | Security system for preventing a personal computer from being stolen or used by unauthorized people |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| WWE | Wipo information: entry into national phase |
Ref document number: 2005/05949 Country of ref document: ZA Ref document number: 200505949 Country of ref document: ZA |
|
| 32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: COMMUNICATION PURSUANT TO RULE 69 EPC (EPO FORM 1205A OF 290905) |
|
| 122 | Ep: pct application non-entry in european phase | ||
| NENP | Non-entry into the national phase |
Ref country code: JP |
|
| WWW | Wipo information: withdrawn in national office |
Country of ref document: JP |