TWI560572B - Data protection device and data protection method thereof - Google Patents

Data protection device and data protection method thereof

Info

Publication number
TWI560572B
TWI560572B TW104128766A TW104128766A TWI560572B TW I560572 B TWI560572 B TW I560572B TW 104128766 A TW104128766 A TW 104128766A TW 104128766 A TW104128766 A TW 104128766A TW I560572 B TWI560572 B TW I560572B
Authority
TW
Taiwan
Prior art keywords
data protection
protection device
protection method
data
protection
Prior art date
Application number
TW104128766A
Other languages
Chinese (zh)
Other versions
TW201710941A (en
Inventor
Wen Jui Hsu
Pete Hewson
Jim Tran
Original Assignee
Wistron Neweb Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wistron Neweb Corp filed Critical Wistron Neweb Corp
Priority to TW104128766A priority Critical patent/TWI560572B/en
Priority to GB1610965.4A priority patent/GB2541975B/en
Application granted granted Critical
Publication of TWI560572B publication Critical patent/TWI560572B/en
Publication of TW201710941A publication Critical patent/TW201710941A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
    • H04L9/0662Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)
TW104128766A 2015-09-01 2015-09-01 Data protection device and data protection method thereof TWI560572B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
TW104128766A TWI560572B (en) 2015-09-01 2015-09-01 Data protection device and data protection method thereof
GB1610965.4A GB2541975B (en) 2015-09-01 2016-06-23 Data protection device and data protection method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW104128766A TWI560572B (en) 2015-09-01 2015-09-01 Data protection device and data protection method thereof

Publications (2)

Publication Number Publication Date
TWI560572B true TWI560572B (en) 2016-12-01
TW201710941A TW201710941A (en) 2017-03-16

Family

ID=56891673

Family Applications (1)

Application Number Title Priority Date Filing Date
TW104128766A TWI560572B (en) 2015-09-01 2015-09-01 Data protection device and data protection method thereof

Country Status (2)

Country Link
GB (1) GB2541975B (en)
TW (1) TWI560572B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111949606A (en) * 2019-09-12 2020-11-17 奕智链结科技股份有限公司 File fragmentation encryption engine and technique thereof

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR3102024B1 (en) * 2019-10-15 2021-11-05 My IDN A method of managing a public key database, a method of authenticating public keys, and server and client devices implementing these methods

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI242966B (en) * 2004-05-25 2005-11-01 Chung Shan Inst Of Science Security transmitting method and system of digital medical information
US20140082721A1 (en) * 2012-09-19 2014-03-20 Nuvoton Technology Corporation Secured computing system with asynchronous authentication
US20140337631A1 (en) * 2013-05-08 2014-11-13 Vorwerk & Co. Interholding Gmbh Method for copy-protected storage of information on a data carrier
TWM491898U (en) * 2014-04-21 2014-12-11 Ding Ding Integrated Marketing Service Co Ltd Authentication device of user information
TW201447635A (en) * 2013-06-10 2014-12-16 Jie Chen Content verification method based on digital signature codes

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6079018A (en) * 1997-10-08 2000-06-20 Agorics, Inc. System and method for generating unique secure values for digitally signing documents
WO2008133521A1 (en) * 2007-04-26 2008-11-06 Conax As Method for signing and encrypting digital data

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI242966B (en) * 2004-05-25 2005-11-01 Chung Shan Inst Of Science Security transmitting method and system of digital medical information
US20140082721A1 (en) * 2012-09-19 2014-03-20 Nuvoton Technology Corporation Secured computing system with asynchronous authentication
US20140337631A1 (en) * 2013-05-08 2014-11-13 Vorwerk & Co. Interholding Gmbh Method for copy-protected storage of information on a data carrier
TW201447635A (en) * 2013-06-10 2014-12-16 Jie Chen Content verification method based on digital signature codes
TWM491898U (en) * 2014-04-21 2014-12-11 Ding Ding Integrated Marketing Service Co Ltd Authentication device of user information

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111949606A (en) * 2019-09-12 2020-11-17 奕智链结科技股份有限公司 File fragmentation encryption engine and technique thereof
TWI712914B (en) * 2019-09-12 2020-12-11 奕智鏈結科技股份有限公司 Fractal file encryption engine and method thereof
CN111949606B (en) * 2019-09-12 2024-06-14 奕智链结科技股份有限公司 File shredding encryption engine and technology thereof

Also Published As

Publication number Publication date
GB2541975B (en) 2019-08-28
GB201610965D0 (en) 2016-08-10
TW201710941A (en) 2017-03-16
GB2541975A (en) 2017-03-08

Similar Documents

Publication Publication Date Title
ZA201800870B (en) Data processing method and device
GB2567990B (en) Data protection system and method
HK1231584A1 (en) Information pushing method and information pushing device
SG11201801335SA (en) Information processing method and device
HK1211354A1 (en) Data processing method and device
HK1221059A1 (en) System and method for circuit protection
HK1199992A1 (en) Information processing method and device
PL3376389T3 (en) Data processing method and device
HK1209251A1 (en) Data interaction method and device thereof
EP3287932A4 (en) Data protection method and device
EP2937782A4 (en) Data processing method and device
EP3190537A4 (en) Protection method and device for application data
ZA201706750B (en) Data sending method and device
TWI563837B (en) Data processing method and device
SG10201707935UA (en) Fall Protection System And Method
SG11201710020TA (en) Position information providing method and device
EP3244294A4 (en) Voiceprint-recognition-based security protection method and device
SG11201610723SA (en) Information processing method and information processing device
SG11201708159UA (en) Data transfer method and device
GB2539384B (en) Data search method and device
EP2916245A4 (en) Data processing device and data processing method
GB201610965D0 (en) Data protection device and data protection method thereof
GB201621119D0 (en) Device and method
TWI561046B (en) Key protecting device and key protecting method
GB201519443D0 (en) Device and method