WO2002052387A3 - Rechneranordnung, die an ein datenübertragungsnetz anschliessbar ist - Google Patents

Rechneranordnung, die an ein datenübertragungsnetz anschliessbar ist Download PDF

Info

Publication number
WO2002052387A3
WO2002052387A3 PCT/DE2001/004820 DE0104820W WO02052387A3 WO 2002052387 A3 WO2002052387 A3 WO 2002052387A3 DE 0104820 W DE0104820 W DE 0104820W WO 02052387 A3 WO02052387 A3 WO 02052387A3
Authority
WO
WIPO (PCT)
Prior art keywords
computer
data
transmission network
data transmission
computer system
Prior art date
Application number
PCT/DE2001/004820
Other languages
English (en)
French (fr)
Other versions
WO2002052387A2 (de
Inventor
Eduard Erhardt
Original Assignee
Siemens Ag
Eduard Erhardt
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Siemens Ag, Eduard Erhardt filed Critical Siemens Ag
Priority to EP01991653A priority Critical patent/EP1364270B1/de
Publication of WO2002052387A2 publication Critical patent/WO2002052387A2/de
Priority to US10/600,643 priority patent/US8171073B2/en
Publication of WO2002052387A3 publication Critical patent/WO2002052387A3/de

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2147Locking files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Storage Device Security (AREA)
  • Multi Processors (AREA)

Abstract

Um bei einer Rechneranordnung, die an ein Datenübertragungsnetz anschliessbar ist, einen sicheren Schutz gegen Computerviren, unerlaubte Zugriffe auf interne Daten und Datenverlust im Falle einer Infizierung zu erreichen, weist die Rechneranordnung einen ersten Rechner (1) und einen davon unabhängigen redundanten, zweiten Rechner (2) auf, wobei sich beide Rechner (1,2) durch Vergleich ihrer Arbeitsergebnisse abgleichen, wobei der Empfang von Daten aus dem Datenübertragungsnetz (6) auf den zweiten Rechner (2) beschränkt ist, wobei zumindest die Erst-Verarbeitung von empfangenen Daten auf den ersten Rechner (1) beschränkt ist und wobei von dem ersten Rechner (1) empfangene, nicht überprüfte oder nicht überprüfbare Daten nur verschlossen, d.h. nicht verarbeitbar, auf dem zweiten Rechner 82) gespeichert werden.
PCT/DE2001/004820 2000-12-22 2001-12-20 Rechneranordnung, die an ein datenübertragungsnetz anschliessbar ist WO2002052387A2 (de)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP01991653A EP1364270B1 (de) 2000-12-22 2001-12-20 Rechneranordnung, die an ein datenübertragungsnetz anschliessbar ist
US10/600,643 US8171073B2 (en) 2000-12-22 2003-06-23 Computer system connected to a data communications network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE10064658.1 2000-12-22
DE10064658A DE10064658B4 (de) 2000-12-22 2000-12-22 Rechneranordnung, die an ein Datenübertragungsnetz anschließbar ist

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US10/600,643 Continuation US8171073B2 (en) 2000-12-22 2003-06-23 Computer system connected to a data communications network

Publications (2)

Publication Number Publication Date
WO2002052387A2 WO2002052387A2 (de) 2002-07-04
WO2002052387A3 true WO2002052387A3 (de) 2003-09-18

Family

ID=7668729

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/DE2001/004820 WO2002052387A2 (de) 2000-12-22 2001-12-20 Rechneranordnung, die an ein datenübertragungsnetz anschliessbar ist

Country Status (4)

Country Link
US (1) US8171073B2 (de)
EP (1) EP1364270B1 (de)
DE (1) DE10064658B4 (de)
WO (1) WO2002052387A2 (de)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7602958B1 (en) * 2004-10-18 2009-10-13 Kla-Tencor Corporation Mirror node process verification
US20070168292A1 (en) * 2004-12-21 2007-07-19 Fabrice Jogand-Coulomb Memory system with versatile content control
US20080133639A1 (en) * 2006-11-30 2008-06-05 Anatoliy Panasyuk Client Statement of Health
US10084085B2 (en) 2015-06-11 2018-09-25 Taiwan Semiconductor Manufacturing Co., Ltd. Fin field effect transistor (FinFET) device structure with stop layer and method for forming the same

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6061794A (en) * 1997-09-30 2000-05-09 Compaq Computer Corp. System and method for performing secure device communications in a peer-to-peer bus architecture
DE20014381U1 (de) * 2000-08-21 2000-11-30 Rent A Brain Gmbh Vorrichtung zur Legitimationsprüfung
US6253334B1 (en) * 1997-05-13 2001-06-26 Micron Electronics, Inc. Three bus server architecture with a legacy PCI bus and mirrored I/O PCI buses

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3911407A1 (de) * 1989-04-07 1990-10-11 Siemens Ag Redundantes rechnersystem
JPH04257931A (ja) 1991-02-12 1992-09-14 Oki Electric Ind Co Ltd 計算機システム
US5799323A (en) * 1995-01-24 1998-08-25 Tandem Computers, Inc. Remote duplicate databased facility with triple contingency protection
US5857208A (en) * 1996-05-31 1999-01-05 Emc Corporation Method and apparatus for performing point in time backup operation in a computer system
US6167520A (en) * 1996-11-08 2000-12-26 Finjan Software, Inc. System and method for protecting a client during runtime from hostile downloadables
US6484109B1 (en) * 1998-05-20 2002-11-19 Dli Engineering Coporation Diagnostic vibration data collector and analyzer
AU758189B2 (en) * 1998-12-11 2003-03-20 Rvt Technologies, Inc. Method and apparatus for isolating a computer system upon detection of viruses and similar data
US6378014B1 (en) * 1999-08-25 2002-04-23 Apex Inc. Terminal emulator for interfacing between a communications port and a KVM switch
US6526418B1 (en) * 1999-12-16 2003-02-25 Livevault Corporation Systems and methods for backing up data files
US7093135B1 (en) * 2000-05-11 2006-08-15 Cybersoft, Inc. Software virus detection methods and apparatus
US6901519B1 (en) * 2000-06-22 2005-05-31 Infobahn, Inc. E-mail virus protection system and method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6253334B1 (en) * 1997-05-13 2001-06-26 Micron Electronics, Inc. Three bus server architecture with a legacy PCI bus and mirrored I/O PCI buses
US6061794A (en) * 1997-09-30 2000-05-09 Compaq Computer Corp. System and method for performing secure device communications in a peer-to-peer bus architecture
DE20014381U1 (de) * 2000-08-21 2000-11-30 Rent A Brain Gmbh Vorrichtung zur Legitimationsprüfung

Also Published As

Publication number Publication date
DE10064658B4 (de) 2004-04-08
EP1364270A2 (de) 2003-11-26
DE10064658A1 (de) 2002-07-18
EP1364270B1 (de) 2012-10-17
US20040059948A1 (en) 2004-03-25
US8171073B2 (en) 2012-05-01
WO2002052387A2 (de) 2002-07-04

Similar Documents

Publication Publication Date Title
CA2099026A1 (en) Trusted Personal Computer System with Identification
CA2191331A1 (en) Secure computer architecture
WO2003034188A3 (en) Method and system for detecting unauthorised executable programs _______________________________________________________________
EP1217802A3 (de) Verfahren und Vorrichtung zur Verwaltung von Information, und Rechnerprogramm
EP0382468A3 (de) Netzeinschaltkennwortfunktionen für Rechnersysteme
WO2004070564A3 (en) System and method for money management in electronic trading environment
EP1411430A3 (de) Verfahren und System zum flexiblen Delegieren in einem Computersystem
WO2002057935A8 (en) Method and device for monitoring data traffic and preventing unauthorized access to a network
WO2002056156A3 (en) Computer system protection
WO2004036426B1 (en) Web service security filter
CA2288892A1 (en) Method for preventing buffer deadlock in dataflow computations
WO2001010079A1 (en) Adapter having secure function and computer secure system using it
CA2265473A1 (en) Systems and methods for secure transaction management and electronic rights protection
WO2004057834A3 (en) Methods and apparatus for administration of policy based protection of data accessible by a mobile device
AU2001274856A1 (en) Evidence-based security policy manager
WO2007140487A3 (en) Data access control systems and methods
EP0836131A3 (de) Sicherheit entfernter Rechnereinrichtungen
WO2007076340A3 (en) Methods and systems to restrict usage of a dma channel
WO2002093314A3 (en) Encryption based security system for network storage
WO2002052387A3 (de) Rechneranordnung, die an ein datenübertragungsnetz anschliessbar ist
WO2004077203A3 (en) A method and system of securely enforcing a computer policy
WO2002051057A3 (en) Methods for rights enabled peer-to-peer networking
WO2001025886A3 (en) Power management method for a computer system having a hub interface architecture
WO2001091418A3 (en) Distributed firewall system and method
WO2002093829A3 (de) Multimediasystem für ein fahrzeug

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): US

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2001991653

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 10600643

Country of ref document: US

WWP Wipo information: published in national office

Ref document number: 2001991653

Country of ref document: EP