Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An identity theft prevention method and hardware database device

A database and equipment technology, applied in the direction of electrical digital data processing, electrical components, digital transmission systems, etc., can solve the problems of users forgetting secret keys and inaccessible records, etc., and achieve enhanced security, affordable price, and low complexity Effect

Inactive Publication Date: 2018-08-03
威尔奇·伊沃 +1
View PDF10 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Second, users may forget the secret key and lose access to their own records

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An identity theft prevention method and hardware database device
  • An identity theft prevention method and hardware database device
  • An identity theft prevention method and hardware database device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The anti-identity theft system in the present invention is called "The Castle Keep" system, and for the sake of simplicity, it is called TCK hereinafter.

[0047] figure 1 An exemplary embodiment of a general TCK system 10 is shown in which an Internet server 12 is connected to the Internet 14 and a TCK hardware device 16 having at least one computing processor 18, the Computing processor 18 is connected via connector 26 to memory 20, which is shown configured to include at least a database program 22a and a channel control program 22b. It should be understood that the memory 20 may include any number of various types or combinations of types of memory, such as fixed memory, removable memory, non-volatile memory, solid state hard disk, memory stick, memory card, removable medium, and their combinations. It should additionally be understood that the data in the database to be maintained may be stored in the TCK, or in components 28 externally connected to the TCK (e.g....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a hardware device (TCK) for securing data in a database accessed through an Internet server. TCK controls access to its internal database through separate access channels between the two entities. Through at least one "unauthorized channel (port)", TCK provides one-at-a-time access to individual records subject to strict security regulations. An "authorized channel" separated by at least one entity, which cannot be reached by Internet servers through unauthorized channels. TCK provides access for administrative operations, facilitating more complete access to databases, thus allowing, for example, retrieval or listing Stored keys and key values, access to multimodal records, and / or the ability to run other computer programs. Thus, the TCK system is able to provide additional security for data that is required by an Internet server that is used by multiple known and / or anonymous users.

Description

[0001] Cross References to Related Applications [0002] This patent application claims priority and related benefits from U.S. Provisional Patent Application No. 62 / 015,819, filed June 23, 2014, the entire contents of which are incorporated herein by reference. [0003] Statement Regarding Federally Funded Research or Development [0004] not applied [0005] Reference entry of computer program appendix [0003] Appendix A cited here is a computer program, and the computer program is listed in the following two text files: [0006] (1) ""WEL6373.01A_allsource1.txt" was created on November 18, 2014, with a file size of 371kb; and [0007] (2) "WEL6373.01A_allsource2.txt" was created on November 18, 2014, and the file size is 256kb. The computer program code exceeds 300 lines, and the computer program code is submitted as an appendix to the computer program list through the EFS-Web website, and its entire content is incorporated herein by reference. [0008] Notice of Copyright...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57G06F21/55
CPCG06F21/554G06F21/57G06F2221/2141G06F21/74G06F21/6227G06F21/6218H04L9/3215H04L63/107H04L63/18
Inventor 威尔奇·伊沃
Owner 威尔奇·伊沃
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products