TWI560572B - Data protection device and data protection method thereof - Google Patents
Data protection device and data protection method thereofInfo
- Publication number
- TWI560572B TWI560572B TW104128766A TW104128766A TWI560572B TW I560572 B TWI560572 B TW I560572B TW 104128766 A TW104128766 A TW 104128766A TW 104128766 A TW104128766 A TW 104128766A TW I560572 B TWI560572 B TW I560572B
- Authority
- TW
- Taiwan
- Prior art keywords
- data protection
- protection device
- protection method
- data
- protection
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
- H04L9/0662—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW104128766A TWI560572B (en) | 2015-09-01 | 2015-09-01 | Data protection device and data protection method thereof |
GB1610965.4A GB2541975B (en) | 2015-09-01 | 2016-06-23 | Data protection device and data protection method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW104128766A TWI560572B (en) | 2015-09-01 | 2015-09-01 | Data protection device and data protection method thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
TWI560572B true TWI560572B (en) | 2016-12-01 |
TW201710941A TW201710941A (en) | 2017-03-16 |
Family
ID=56891673
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW104128766A TWI560572B (en) | 2015-09-01 | 2015-09-01 | Data protection device and data protection method thereof |
Country Status (2)
Country | Link |
---|---|
GB (1) | GB2541975B (en) |
TW (1) | TWI560572B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111949606A (en) * | 2019-09-12 | 2020-11-17 | 奕智链结科技股份有限公司 | File fragmentation encryption engine and technique thereof |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR3102024B1 (en) * | 2019-10-15 | 2021-11-05 | My IDN | A method of managing a public key database, a method of authenticating public keys, and server and client devices implementing these methods |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI242966B (en) * | 2004-05-25 | 2005-11-01 | Chung Shan Inst Of Science | Security transmitting method and system of digital medical information |
US20140082721A1 (en) * | 2012-09-19 | 2014-03-20 | Nuvoton Technology Corporation | Secured computing system with asynchronous authentication |
US20140337631A1 (en) * | 2013-05-08 | 2014-11-13 | Vorwerk & Co. Interholding Gmbh | Method for copy-protected storage of information on a data carrier |
TWM491898U (en) * | 2014-04-21 | 2014-12-11 | Ding Ding Integrated Marketing Service Co Ltd | Authentication device of user information |
TW201447635A (en) * | 2013-06-10 | 2014-12-16 | Jie Chen | Content verification method based on digital signature codes |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6079018A (en) * | 1997-10-08 | 2000-06-20 | Agorics, Inc. | System and method for generating unique secure values for digitally signing documents |
WO2008133521A1 (en) * | 2007-04-26 | 2008-11-06 | Conax As | Method for signing and encrypting digital data |
-
2015
- 2015-09-01 TW TW104128766A patent/TWI560572B/en active
-
2016
- 2016-06-23 GB GB1610965.4A patent/GB2541975B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI242966B (en) * | 2004-05-25 | 2005-11-01 | Chung Shan Inst Of Science | Security transmitting method and system of digital medical information |
US20140082721A1 (en) * | 2012-09-19 | 2014-03-20 | Nuvoton Technology Corporation | Secured computing system with asynchronous authentication |
US20140337631A1 (en) * | 2013-05-08 | 2014-11-13 | Vorwerk & Co. Interholding Gmbh | Method for copy-protected storage of information on a data carrier |
TW201447635A (en) * | 2013-06-10 | 2014-12-16 | Jie Chen | Content verification method based on digital signature codes |
TWM491898U (en) * | 2014-04-21 | 2014-12-11 | Ding Ding Integrated Marketing Service Co Ltd | Authentication device of user information |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111949606A (en) * | 2019-09-12 | 2020-11-17 | 奕智链结科技股份有限公司 | File fragmentation encryption engine and technique thereof |
TWI712914B (en) * | 2019-09-12 | 2020-12-11 | 奕智鏈結科技股份有限公司 | Fractal file encryption engine and method thereof |
CN111949606B (en) * | 2019-09-12 | 2024-06-14 | 奕智链结科技股份有限公司 | File shredding encryption engine and technology thereof |
Also Published As
Publication number | Publication date |
---|---|
GB2541975B (en) | 2019-08-28 |
GB201610965D0 (en) | 2016-08-10 |
TW201710941A (en) | 2017-03-16 |
GB2541975A (en) | 2017-03-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
ZA201800870B (en) | Data processing method and device | |
GB2567990B (en) | Data protection system and method | |
HK1231584A1 (en) | Information pushing method and information pushing device | |
SG11201801335SA (en) | Information processing method and device | |
HK1211354A1 (en) | Data processing method and device | |
HK1221059A1 (en) | System and method for circuit protection | |
HK1199992A1 (en) | Information processing method and device | |
PL3376389T3 (en) | Data processing method and device | |
HK1209251A1 (en) | Data interaction method and device thereof | |
EP3287932A4 (en) | Data protection method and device | |
EP2937782A4 (en) | Data processing method and device | |
EP3190537A4 (en) | Protection method and device for application data | |
ZA201706750B (en) | Data sending method and device | |
TWI563837B (en) | Data processing method and device | |
SG10201707935UA (en) | Fall Protection System And Method | |
SG11201710020TA (en) | Position information providing method and device | |
EP3244294A4 (en) | Voiceprint-recognition-based security protection method and device | |
SG11201610723SA (en) | Information processing method and information processing device | |
SG11201708159UA (en) | Data transfer method and device | |
GB2539384B (en) | Data search method and device | |
EP2916245A4 (en) | Data processing device and data processing method | |
GB201610965D0 (en) | Data protection device and data protection method thereof | |
GB201621119D0 (en) | Device and method | |
TWI561046B (en) | Key protecting device and key protecting method | |
GB201519443D0 (en) | Device and method |