[go: up one dir, main page]

WO2004029813A1 - Security arrangement - Google Patents

Security arrangement Download PDF

Info

Publication number
WO2004029813A1
WO2004029813A1 PCT/IB2003/004125 IB0304125W WO2004029813A1 WO 2004029813 A1 WO2004029813 A1 WO 2004029813A1 IB 0304125 W IB0304125 W IB 0304125W WO 2004029813 A1 WO2004029813 A1 WO 2004029813A1
Authority
WO
WIPO (PCT)
Prior art keywords
computer
receiver
signal
security arrangement
emitter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/IB2003/004125
Other languages
French (fr)
Inventor
Marcus Coetzee
Harmanus Jacobus Van Den Berg
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to AU2003264928A priority Critical patent/AU2003264928A1/en
Publication of WO2004029813A1 publication Critical patent/WO2004029813A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2153Using hardware token as a secondary aspect

Definitions

  • the present invention relates to a security arrangement.
  • the present invention relates to a security arrangement for controlling access to information stored on a computer.
  • Computers are often used to store documents or other information, which may be of a sensitive nature and should not be readily accessed by unintended or unauthorised persons. Much of this information is stored on networks that are joined to the internet and many security arrangements have been developed to prevent this information being accessed by so-called computer hackers. However, information can also be accessed from individual computers, desktops or laptops, when these computers are left unattended or are stolen.
  • a security arrangement for securing information stored on a computer includes encryption software operatively associated with a computer, the encryption software being adapted to encrypt and decrypt information stored on the computer; a receiver operatively associated with the computer and being adapted to receive a signal; and an emitter remotely located and associated with the receiver, the emitter being adapted to emit a signal to be received by the receiver to control operation of the encryption software.
  • the encryption software may be stored on a hard drive of the computer.
  • the encryption software may be adapted to encrypt the information as soon as power is provided to the computer.
  • the receiver may be integrally provided on the computer.
  • the receiver may be adapted to be connected to an external communication port of the computer.
  • the emitter may be adapted to be carried by a user of the computer.
  • the emitter may be in the form of a card.
  • the card may be an identification card.
  • the signal may be encoded.
  • the signal may be adapted to be received by the receiver only if the emitter is within a distance of less than a two metres from the receiver.
  • the encryption software may be adapted to encrypt the information if the signal is not received by the receiver.
  • the encryption software may be adapted to decrypt the information if the signal is received by the receiver.
  • the encryption or decryption of the information may be adapted to take place within six seconds.
  • the receiver and emitter may be transmitters.
  • the invention extends to a computer provided with a security arrangement as set out herein.
  • a method of protecting information stored on a computer includes the steps of programming a unique security code signal into an emitter; of causing the emitter to continuously emit the signal; of operatively associating a receiver with a computer, the receiver being adapted to receive the signal; and of providing encryption software on the computer, the encryption software being adapted to encrypt information stored on the computer when the signal is not received by the receiver and to decrypt the information when the signal is received by the receiver.
  • the method may include the step of storing the encryption software on a hard drive of the computer.
  • the method may include the step of causing the encryption software to encrypt the information as soon as power is provided to the computer.
  • the method may include the step of encoding the signal.
  • the method may include the step of limiting the emitter so that the signal is emitted through a distance of less than a two metres.
  • the method may include the step of encrypting or decrypting the information within six seconds.
  • FIG. 1 a security arrangement in accordance with the invention.
  • FIG 2 a flow diagram of the operation of the security arrangement shown in Figure 1.
  • the security- arrangement 10 is adapted to protect information stored on a computer 12 from unauthorised access.
  • the security arrangement 10 includes a receiver 14 operatively joined to the computer 12, an emitter 16 associated with the receiver 14 and an encryption software program contained on a hard drive of the computer 12.
  • the receiver 14 is shown joined to an external communication port of the computer 12, such as a serial port or universal serial bus port, but it can also be integrally provided in the computer 12.
  • the emitter 16 continuously emits an encoded signal 18, which is received by the receiver 14.
  • the signal 18 is adapted to be transmitted across a distance of about two metres, so that if the emitter 16 is removed more than two metres away from the receiver 14, then the signal 18 will no longer be received by the receiver 14.
  • the encryption software on the computer 12 automatically encrypts or otherwise scrambles any or all or some of the information stored on a hard drive or in the memory of the computer 12. When a person wishes to work on the computer or to access the information, he must first obtain a suitable emitter 16 that is associated with the receiver 14 or that is operatively associated with the encryption program.
  • the signal 18 is received by the receiver 14 and conveyed to the encryption software, which then decrypts the information.
  • the encryption software automatically again encrypts the information.
  • the software should encrypt or decrypt the information within about six seconds. This is also advantageous as it allows a person with the emitter 16 to start working immediately after returning to the computer 12.
  • the encryption software is adapted to encrypt the information immediately upon activation of the computer 12 and before a user can cancel or interrupt the encryption.
  • the information will be encrypted as soon as power is again provided to the computer 12.
  • the encryption program is stored with the information on the hard drive and is activated as soon as power is supplied to the hard drive, the encryption software cannot be bypassed by installing the hard drive in another computer.
  • the emitter 16 can be carried by a person, e.g. it can be a card such as an identification card carried in the person's wallet. Alternatively, the emitter 16 can be worn by the person, such as necklace or watch.
  • the receiver 14 can be located directly on a motherboard of the computer 12. This will enable the receiver 14 to register all serial numbers of various components installed in the computer 12 and may reduce theft of the computer components.
  • the receiver 14 and emitter 16 can be transmitters being adapted to provide one-way or two-way transmissions of the signal 18.
  • the computer 12 can be a desktop computer or a portable computer, such as a laptop or notebook computer.
  • the computer 12 can also be a network server or other integrated computer hardware.
  • the security arrangement 10 can be adapted to operate in conjunction with software as a means of preventing pirate software from being used on a computer.
  • the security arrangement 10 can be adapted for controlling access to a building.
  • a person carrying the emitter 16 will be allowed access to the building and the time of his arrival and departure form the building can be stored on a computer system.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a security arrangement for securing information stored on a computer. The arrangement includes encryption software operatively associated with a computer, which is adapted to encrypt and decrypt information stored on the computer. A receiver is operatively associated with the computer and is adapted to receive a signal from an emitter, which is remotely located from the receiver. The emitter is adapted to emit a signal to be received by the receiver to control the operation of the encryption software.

Description

SECURITY ARRANGEMENT
FIELD OF INVENTION
The present invention relates to a security arrangement.
More particularly, the present invention relates to a security arrangement for controlling access to information stored on a computer.
BACKGROUND TO INVENTION
Computers are often used to store documents or other information, which may be of a sensitive nature and should not be readily accessed by unintended or unauthorised persons. Much of this information is stored on networks that are joined to the internet and many security arrangements have been developed to prevent this information being accessed by so-called computer hackers. However, information can also be accessed from individual computers, desktops or laptops, when these computers are left unattended or are stolen.
One method used in preventing access to the information on a computer is to encrypt or scramble the information. These systems normally require a person to actively take part in the encryption and decryption process by entering codes to identify themselves. A disadvantage associated with these systems is that people find this a hassle as it is disruptive to their thinking. They may therefore disable the systems. Also, if the computers are stolen, there may not be sufficient time to encrypt the information.
It is an object of the invention to suggest a security arrangement, which will assist in overcoming these problems. SUMMARY OF INVENTION
According to the invention, a security arrangement for securing information stored on a computer includes encryption software operatively associated with a computer, the encryption software being adapted to encrypt and decrypt information stored on the computer; a receiver operatively associated with the computer and being adapted to receive a signal; and an emitter remotely located and associated with the receiver, the emitter being adapted to emit a signal to be received by the receiver to control operation of the encryption software.
The encryption software may be stored on a hard drive of the computer.
The encryption software may be adapted to encrypt the information as soon as power is provided to the computer.
The receiver may be integrally provided on the computer.
The receiver may be adapted to be connected to an external communication port of the computer.
The emitter may be adapted to be carried by a user of the computer.
The emitter may be in the form of a card.
The card may be an identification card.
The signal may be encoded.
The signal may be adapted to be received by the receiver only if the emitter is within a distance of less than a two metres from the receiver.
The encryption software may be adapted to encrypt the information if the signal is not received by the receiver. The encryption software may be adapted to decrypt the information if the signal is received by the receiver.
The encryption or decryption of the information may be adapted to take place within six seconds.
The receiver and emitter may be transmitters.
The invention extends to a computer provided with a security arrangement as set out herein.
Also according to the invention, a method of protecting information stored on a computer includes the steps of programming a unique security code signal into an emitter; of causing the emitter to continuously emit the signal; of operatively associating a receiver with a computer, the receiver being adapted to receive the signal; and of providing encryption software on the computer, the encryption software being adapted to encrypt information stored on the computer when the signal is not received by the receiver and to decrypt the information when the signal is received by the receiver.
The method may include the step of storing the encryption software on a hard drive of the computer.
The method may include the step of causing the encryption software to encrypt the information as soon as power is provided to the computer.
The method may include the step of encoding the signal.
The method may include the step of limiting the emitter so that the signal is emitted through a distance of less than a two metres.
The method may include the step of encrypting or decrypting the information within six seconds. BRIEF DESCRIPTION OF DRAWINGS
The invention will now be described by way of example with reference to the accompanying schematic drawings.
In the drawings there is shown in:
Figure 1 a security arrangement in accordance with the invention; and
Figure 2 a flow diagram of the operation of the security arrangement shown in Figure 1.
DETAILED DESCRIPTION OF DRAWINGS
Referring to the drawings, a security arrangement in accordance with the invention, generally indicated by reference numeral 10, is shown. The security- arrangement 10 is adapted to protect information stored on a computer 12 from unauthorised access.
The security arrangement 10 includes a receiver 14 operatively joined to the computer 12, an emitter 16 associated with the receiver 14 and an encryption software program contained on a hard drive of the computer 12.
The receiver 14 is shown joined to an external communication port of the computer 12, such as a serial port or universal serial bus port, but it can also be integrally provided in the computer 12.
The emitter 16 continuously emits an encoded signal 18, which is received by the receiver 14. The signal 18 is adapted to be transmitted across a distance of about two metres, so that if the emitter 16 is removed more than two metres away from the receiver 14, then the signal 18 will no longer be received by the receiver 14. In use, the encryption software on the computer 12 automatically encrypts or otherwise scrambles any or all or some of the information stored on a hard drive or in the memory of the computer 12. When a person wishes to work on the computer or to access the information, he must first obtain a suitable emitter 16 that is associated with the receiver 14 or that is operatively associated with the encryption program.
In use, the signal 18 is received by the receiver 14 and conveyed to the encryption software, which then decrypts the information. As long as the person remains within a distance of two metres from the receiver 14, the information will remain unencrypted and available for viewing without the requirement for the person to enter any other passwords. However, if the person leaves the computer 12, e.g. to go to the bathroom or if someone else picks up and walks away with the computer 12, and the emitter 16 is removed more than two metres away from the receiver 14, or vice versa, then the encryption software automatically again encrypts the information. As time delay is relatively important when encrypting the information, the software should encrypt or decrypt the information within about six seconds. This is also advantageous as it allows a person with the emitter 16 to start working immediately after returning to the computer 12.
The encryption software is adapted to encrypt the information immediately upon activation of the computer 12 and before a user can cancel or interrupt the encryption. Thus if power provided to the computer 12 is suddenly disconnected, such as during a power failure or if the computer 12 is switched off, before the encryption program is able to encrypt the information, then the information will be encrypted as soon as power is again provided to the computer 12. As the encryption program is stored with the information on the hard drive and is activated as soon as power is supplied to the hard drive, the encryption software cannot be bypassed by installing the hard drive in another computer.
The emitter 16 can be carried by a person, e.g. it can be a card such as an identification card carried in the person's wallet. Alternatively, the emitter 16 can be worn by the person, such as necklace or watch.
The receiver 14 can be located directly on a motherboard of the computer 12. This will enable the receiver 14 to register all serial numbers of various components installed in the computer 12 and may reduce theft of the computer components.
The receiver 14 and emitter 16 can be transmitters being adapted to provide one-way or two-way transmissions of the signal 18.
The computer 12 can be a desktop computer or a portable computer, such as a laptop or notebook computer. The computer 12 can also be a network server or other integrated computer hardware.
The security arrangement 10 can be adapted to operate in conjunction with software as a means of preventing pirate software from being used on a computer.
The security arrangement 10 can be adapted for controlling access to a building. A person carrying the emitter 16 will be allowed access to the building and the time of his arrival and departure form the building can be stored on a computer system.

Claims

1. A security arrangement for securing information stored on a computer including encryption software operatively associated with a computer, the encryption software being adapted to encrypt and decrypt information stored on the computer; a receiver operatively associated with the computer and being adapted to receive a signal; and an emitter remotely located from and associated with the receiver, the emitter being adapted to emit a signal to be received by the receiver to control operation of the encryption software.
2. A security arrangement as claimed in claim 1, in which the encryption software is stored on a hard drive of the computer.
3. A security arrangement as claimed in claim 1 or claim 2, in which the encryption software is adapted to encrypt the information as soon as power is provided to the computer.
4. A security arrangement as claimed in any one of the preceding claims, in which the receiver is integrally provided on the computer.
5. A security arrangement as claimed in any one of claims 1 to 3, in which the receiver is adapted to be connected to an external communication port of the computer.
6. A security arrangement as claimed in any one of the preceding claims, in which the emitter is adapted to be carried by a user of the computer.
7. A security arrangement as claimed in any one of the preceding claims, in which the emitter is in the form of a card.
8. A security arrangement as claimed in claim 7, in which the card is an identification card.
9. A security arrangement as claimed in any one of the preceding claims, in which the signal is encoded.
10. A security arrangement as claimed in any one of the preceding claims, in which the signal is adapted to be received by the receiver only if the emitter is within a distance of less than a two metres from the receiver.
11. A security arrangement as claimed in any one of the preceding claims, in which the encryption software is adapted to encrypt the information if the signal is not received by the receiver.
12. A security arrangement as claimed in any one of the preceding claims, in which the encryption software is adapted to decrypt the information if the signal is received by the receiver.
13. A security arrangement as claimed in claim 11 or claim 12, in which the encryption or decryption of the information is adapted to take place within six seconds.
14. A security arrangement as claimed in any one of the preceding claims, in which the receiver and emitter are transmitters.
15. A security arrangement substantially as hereinbefore described and illustrated with reference to the accompanying schematic drawings.
16. A computer arrangement including a computer provided with a security arrangement as claimed in any one of claims 1 to 15.
17. A method of protecting information stored on a computer including the steps of programming a unique security code signal into an emitter; of causing the emitter to continuously emit the signal; of operatively associating a receiver with a computer, the receiver being adapted to receive the signal; and of providing encryption software on the computer, the encryption software being adapted to encrypt information stored on the computer when the signal is not received by the receiver and to decrypt the information when the signal is received by the receiver.
18. A method as claimed in claim 17, which includes the step of storing the encryption software on a hard drive of the computer.
19. A method as claimed in claim 17 or claim 18, which includes the step of causing the encryption software to encrypt the information as soon as power is provided to the computer.
20. A method as claimed in any one of claims 17 to 19, which includes the step of encoding the signal.
21. A method as claimed in any one of claims 17 to 20, which includes the step of limiting the emitter so that the signal is emitted through a distance of less than a two metres.
22. A method as claimed in any one of claims 17 to 21, which includes the step of encrypting or decrypting the information within six seconds.
23. A method of protecting information substantially as hereinbefore described and illustrated with reference to the accompanying schematic drawings.
PCT/IB2003/004125 2002-09-25 2003-09-23 Security arrangement Ceased WO2004029813A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2003264928A AU2003264928A1 (en) 2002-09-25 2003-09-23 Security arrangement

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
ZA200207667 2002-09-25
ZA2002/7667 2002-09-25

Publications (1)

Publication Number Publication Date
WO2004029813A1 true WO2004029813A1 (en) 2004-04-08

Family

ID=32043733

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2003/004125 Ceased WO2004029813A1 (en) 2002-09-25 2003-09-23 Security arrangement

Country Status (2)

Country Link
AU (1) AU2003264928A1 (en)
WO (1) WO2004029813A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE19543455A1 (en) * 1995-11-22 1997-11-27 Peschke Peter Dipl Betriebsw PC security system against unauthorized access
FR2800479A1 (en) * 1999-10-28 2001-05-04 Vks Keyboards Systems DEVICE FOR CONTROLLING ACCESS TO COMPUTER
WO2001040906A2 (en) * 1999-12-01 2001-06-07 Ensure Technologies, Inc. Method of determining distance between two electronic devices
US20030074575A1 (en) * 2001-10-11 2003-04-17 Hoberock Tim M. Computer or computer resource lock control device and method of implementing same

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE19543455A1 (en) * 1995-11-22 1997-11-27 Peschke Peter Dipl Betriebsw PC security system against unauthorized access
FR2800479A1 (en) * 1999-10-28 2001-05-04 Vks Keyboards Systems DEVICE FOR CONTROLLING ACCESS TO COMPUTER
WO2001040906A2 (en) * 1999-12-01 2001-06-07 Ensure Technologies, Inc. Method of determining distance between two electronic devices
US20030074575A1 (en) * 2001-10-11 2003-04-17 Hoberock Tim M. Computer or computer resource lock control device and method of implementing same

Also Published As

Publication number Publication date
AU2003264928A1 (en) 2004-04-19

Similar Documents

Publication Publication Date Title
US6628198B2 (en) Security system for preventing a personal computer from being stolen or used by unauthorized people
US7389536B2 (en) System and apparatus for limiting access to secure data through a portable computer to a time set with the portable computer connected to a base computer
EP0865695B1 (en) An apparatus and method for cryptographic companion imprinting
KR100334720B1 (en) Adapter Having Secure Function and Computer Secure System Using It
US7103782B1 (en) Secure memory and processing system having laser-scribed encryption key
US20040030908A1 (en) Method and system for controlling access to data stored on a data storage device
US6996547B1 (en) Method for purchasing items over a non-secure communication channel
EP1253503A3 (en) Protection of software against use without permit
WO2003054662A3 (en) A system and method for preventing unauthorized use of protected software utilizing a portable security device
KR20000005527A (en) An authentication system based on periodic challenge and response protocol
US20080256648A1 (en) Secure portable computer and security method
CN102017676A (en) System and method for electronic data security
US7089424B1 (en) Peripheral device for protecting data stored on host device and method and system using the same
US7780079B2 (en) Data storage device with built-in data protection for ultra sensitive applications
WO2007089266A3 (en) Administration of data encryption in enterprise computer systems
JP2000155876A (en) Burglarproof device
WO2004029813A1 (en) Security arrangement
ZA200505949B (en) Security arrangement
KR100379675B1 (en) Adapter Having Secure Function and Computer Secure System Using It
KR101610182B1 (en) Client terminal security apparatus and method of remote learning data service system
JP2001318875A (en) System for preventing data burglary of computer
KR20200082187A (en) Secure usb dongle for usb memory without security
WO1999035553A1 (en) Cryptographic token
AU633106B2 (en) Security system
EP1239358A2 (en) Security system for preventing a personal computer from being stolen or used by unauthorized people

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2005/05949

Country of ref document: ZA

Ref document number: 200505949

Country of ref document: ZA

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: COMMUNICATION PURSUANT TO RULE 69 EPC (EPO FORM 1205A OF 290905)

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP