DATA ENCRYPTION KEY FAILURE MONITOR
An encryption key, required to encrypt and decrypt data according to a predefined algorithm, is usually retained in a volatile memory device. Detection of loss of the key or corruption of the key is freqeuntly possible only by means of the encryption circuit itself testing the key. Automated and rep...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Patent |
Sprache: | eng ; fre |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | BJERGA, ERLING SPIOTTA, MARK G |
description | An encryption key, required to encrypt and decrypt data according to a predefined algorithm, is usually retained in a volatile memory device. Detection of loss of the key or corruption of the key is freqeuntly possible only by means of the encryption circuit itself testing the key. Automated and repetitive testing of encryption keys by means of a processor or a control circuit periodically requesting the encryption circuit to test an encryption key minimizes data loss and system down time due to corrupted or lost keys. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CA2000252C</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CA2000252C</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CA2000252C3</originalsourceid><addsrcrecordid>eNrjZFB2cQxxVHD1cw6KDAjx9PdT8HaNVHBz9PQJDXJV8PX38wzxD-JhYE1LzClO5YXS3Azybq4hzh66qQX58anFBYnJqXmpJfHOjkYGBgZGpkbOxoRVAADV5CHE</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>DATA ENCRYPTION KEY FAILURE MONITOR</title><source>esp@cenet</source><creator>BJERGA, ERLING ; SPIOTTA, MARK G</creator><creatorcontrib>BJERGA, ERLING ; SPIOTTA, MARK G</creatorcontrib><description>An encryption key, required to encrypt and decrypt data according to a predefined algorithm, is usually retained in a volatile memory device. Detection of loss of the key or corruption of the key is freqeuntly possible only by means of the encryption circuit itself testing the key. Automated and repetitive testing of encryption keys by means of a processor or a control circuit periodically requesting the encryption circuit to test an encryption key minimizes data loss and system down time due to corrupted or lost keys.</description><edition>5</edition><language>eng ; fre</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; JAMMING OF COMMUNICATION ; SECRET COMMUNICATION ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>1994</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=19940830&DB=EPODOC&CC=CA&NR=2000252C$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25543,76293</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=19940830&DB=EPODOC&CC=CA&NR=2000252C$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>BJERGA, ERLING</creatorcontrib><creatorcontrib>SPIOTTA, MARK G</creatorcontrib><title>DATA ENCRYPTION KEY FAILURE MONITOR</title><description>An encryption key, required to encrypt and decrypt data according to a predefined algorithm, is usually retained in a volatile memory device. Detection of loss of the key or corruption of the key is freqeuntly possible only by means of the encryption circuit itself testing the key. Automated and repetitive testing of encryption keys by means of a processor or a control circuit periodically requesting the encryption circuit to test an encryption key minimizes data loss and system down time due to corrupted or lost keys.</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>JAMMING OF COMMUNICATION</subject><subject>SECRET COMMUNICATION</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>1994</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZFB2cQxxVHD1cw6KDAjx9PdT8HaNVHBz9PQJDXJV8PX38wzxD-JhYE1LzClO5YXS3Azybq4hzh66qQX58anFBYnJqXmpJfHOjkYGBgZGpkbOxoRVAADV5CHE</recordid><startdate>19940830</startdate><enddate>19940830</enddate><creator>BJERGA, ERLING</creator><creator>SPIOTTA, MARK G</creator><scope>EVB</scope></search><sort><creationdate>19940830</creationdate><title>DATA ENCRYPTION KEY FAILURE MONITOR</title><author>BJERGA, ERLING ; SPIOTTA, MARK G</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CA2000252C3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng ; fre</language><creationdate>1994</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>JAMMING OF COMMUNICATION</topic><topic>SECRET COMMUNICATION</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>BJERGA, ERLING</creatorcontrib><creatorcontrib>SPIOTTA, MARK G</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>BJERGA, ERLING</au><au>SPIOTTA, MARK G</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>DATA ENCRYPTION KEY FAILURE MONITOR</title><date>1994-08-30</date><risdate>1994</risdate><abstract>An encryption key, required to encrypt and decrypt data according to a predefined algorithm, is usually retained in a volatile memory device. Detection of loss of the key or corruption of the key is freqeuntly possible only by means of the encryption circuit itself testing the key. Automated and repetitive testing of encryption keys by means of a processor or a control circuit periodically requesting the encryption circuit to test an encryption key minimizes data loss and system down time due to corrupted or lost keys.</abstract><edition>5</edition><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng ; fre |
recordid | cdi_epo_espacenet_CA2000252C |
source | esp@cenet |
subjects | ELECTRIC COMMUNICATION TECHNIQUE ELECTRICITY JAMMING OF COMMUNICATION SECRET COMMUNICATION TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | DATA ENCRYPTION KEY FAILURE MONITOR |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-24T03%3A45%3A58IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=BJERGA,%20ERLING&rft.date=1994-08-30&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECA2000252C%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |