DATA ENCRYPTION KEY FAILURE MONITOR

An encryption key, required to encrypt and decrypt data according to a predefined algorithm, is usually retained in a volatile memory device. Detection of loss of the key or corruption of the key is freqeuntly possible only by means of the encryption circuit itself testing the key. Automated and rep...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: BJERGA, ERLING, SPIOTTA, MARK G
Format: Patent
Sprache:eng ; fre
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator BJERGA, ERLING
SPIOTTA, MARK G
description An encryption key, required to encrypt and decrypt data according to a predefined algorithm, is usually retained in a volatile memory device. Detection of loss of the key or corruption of the key is freqeuntly possible only by means of the encryption circuit itself testing the key. Automated and repetitive testing of encryption keys by means of a processor or a control circuit periodically requesting the encryption circuit to test an encryption key minimizes data loss and system down time due to corrupted or lost keys.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CA2000252C</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CA2000252C</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CA2000252C3</originalsourceid><addsrcrecordid>eNrjZFB2cQxxVHD1cw6KDAjx9PdT8HaNVHBz9PQJDXJV8PX38wzxD-JhYE1LzClO5YXS3Azybq4hzh66qQX58anFBYnJqXmpJfHOjkYGBgZGpkbOxoRVAADV5CHE</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>DATA ENCRYPTION KEY FAILURE MONITOR</title><source>esp@cenet</source><creator>BJERGA, ERLING ; SPIOTTA, MARK G</creator><creatorcontrib>BJERGA, ERLING ; SPIOTTA, MARK G</creatorcontrib><description>An encryption key, required to encrypt and decrypt data according to a predefined algorithm, is usually retained in a volatile memory device. Detection of loss of the key or corruption of the key is freqeuntly possible only by means of the encryption circuit itself testing the key. Automated and repetitive testing of encryption keys by means of a processor or a control circuit periodically requesting the encryption circuit to test an encryption key minimizes data loss and system down time due to corrupted or lost keys.</description><edition>5</edition><language>eng ; fre</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; JAMMING OF COMMUNICATION ; SECRET COMMUNICATION ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>1994</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=19940830&amp;DB=EPODOC&amp;CC=CA&amp;NR=2000252C$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25543,76293</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=19940830&amp;DB=EPODOC&amp;CC=CA&amp;NR=2000252C$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>BJERGA, ERLING</creatorcontrib><creatorcontrib>SPIOTTA, MARK G</creatorcontrib><title>DATA ENCRYPTION KEY FAILURE MONITOR</title><description>An encryption key, required to encrypt and decrypt data according to a predefined algorithm, is usually retained in a volatile memory device. Detection of loss of the key or corruption of the key is freqeuntly possible only by means of the encryption circuit itself testing the key. Automated and repetitive testing of encryption keys by means of a processor or a control circuit periodically requesting the encryption circuit to test an encryption key minimizes data loss and system down time due to corrupted or lost keys.</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>JAMMING OF COMMUNICATION</subject><subject>SECRET COMMUNICATION</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>1994</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZFB2cQxxVHD1cw6KDAjx9PdT8HaNVHBz9PQJDXJV8PX38wzxD-JhYE1LzClO5YXS3Azybq4hzh66qQX58anFBYnJqXmpJfHOjkYGBgZGpkbOxoRVAADV5CHE</recordid><startdate>19940830</startdate><enddate>19940830</enddate><creator>BJERGA, ERLING</creator><creator>SPIOTTA, MARK G</creator><scope>EVB</scope></search><sort><creationdate>19940830</creationdate><title>DATA ENCRYPTION KEY FAILURE MONITOR</title><author>BJERGA, ERLING ; SPIOTTA, MARK G</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CA2000252C3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng ; fre</language><creationdate>1994</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>JAMMING OF COMMUNICATION</topic><topic>SECRET COMMUNICATION</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>BJERGA, ERLING</creatorcontrib><creatorcontrib>SPIOTTA, MARK G</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>BJERGA, ERLING</au><au>SPIOTTA, MARK G</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>DATA ENCRYPTION KEY FAILURE MONITOR</title><date>1994-08-30</date><risdate>1994</risdate><abstract>An encryption key, required to encrypt and decrypt data according to a predefined algorithm, is usually retained in a volatile memory device. Detection of loss of the key or corruption of the key is freqeuntly possible only by means of the encryption circuit itself testing the key. Automated and repetitive testing of encryption keys by means of a processor or a control circuit periodically requesting the encryption circuit to test an encryption key minimizes data loss and system down time due to corrupted or lost keys.</abstract><edition>5</edition><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng ; fre
recordid cdi_epo_espacenet_CA2000252C
source esp@cenet
subjects ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
JAMMING OF COMMUNICATION
SECRET COMMUNICATION
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title DATA ENCRYPTION KEY FAILURE MONITOR
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-24T03%3A45%3A58IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=BJERGA,%20ERLING&rft.date=1994-08-30&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECA2000252C%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true