GB2479074B - Format-preserving cryptographic systems - Google Patents
Format-preserving cryptographic systemsInfo
- Publication number
- GB2479074B GB2479074B GB1107288.1A GB201107288A GB2479074B GB 2479074 B GB2479074 B GB 2479074B GB 201107288 A GB201107288 A GB 201107288A GB 2479074 B GB2479074 B GB 2479074B
- Authority
- GB
- United Kingdom
- Prior art keywords
- format
- cryptographic systems
- preserving cryptographic
- preserving
- systems
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/654,054 US8958562B2 (en) | 2007-01-16 | 2007-01-16 | Format-preserving cryptographic systems |
GB0912403A GB2458844B (en) | 2007-01-16 | 2008-01-15 | Format-preserving cryptographic systems |
Publications (3)
Publication Number | Publication Date |
---|---|
GB201107288D0 GB201107288D0 (en) | 2011-06-15 |
GB2479074A GB2479074A (en) | 2011-09-28 |
GB2479074B true GB2479074B (en) | 2012-01-18 |
Family
ID=44546269
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB1107288.1A Active GB2479074B (en) | 2007-01-16 | 2008-01-15 | Format-preserving cryptographic systems |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2479074B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10135613B2 (en) | 2012-01-13 | 2018-11-20 | Qualcomm Incorporated | Method and apparatus for generating a privilege-based key |
GB2509064A (en) * | 2012-12-18 | 2014-06-25 | Completegp Ltd | Method and system for distributing health data |
EP3166041A1 (en) * | 2015-11-07 | 2017-05-10 | Tata Consultancy Services Limited | Format preserving masking system and method |
US10586057B2 (en) | 2017-11-16 | 2020-03-10 | Intuit Inc. | Processing data queries in a logically sharded data store |
EP3711256B1 (en) * | 2017-11-16 | 2022-01-05 | Intuit Inc. | Cryptographic key generation for logically sharded data stores |
US10873450B2 (en) | 2017-11-16 | 2020-12-22 | Intuit Inc. | Cryptographic key generation for logically sharded data stores |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6836765B1 (en) * | 2000-08-30 | 2004-12-28 | Lester Sussman | System and method for secure and address verifiable electronic commerce transactions |
US20050132070A1 (en) * | 2000-11-13 | 2005-06-16 | Redlich Ron M. | Data security system and method with editor |
-
2008
- 2008-01-15 GB GB1107288.1A patent/GB2479074B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6836765B1 (en) * | 2000-08-30 | 2004-12-28 | Lester Sussman | System and method for secure and address verifiable electronic commerce transactions |
US20050132070A1 (en) * | 2000-11-13 | 2005-06-16 | Redlich Ron M. | Data security system and method with editor |
Also Published As
Publication number | Publication date |
---|---|
GB201107288D0 (en) | 2011-06-15 |
GB2479074A (en) | 2011-09-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB2484382B (en) | Format-preserving cryptographic systems | |
PL2185293T3 (en) | Application system | |
GB0809107D0 (en) | Scannign systems | |
EP2069956A4 (en) | Tv-centric system | |
EP2185885A4 (en) | Protection system | |
IL199949A0 (en) | Defence system | |
EP2114541A4 (en) | Construction system | |
GB201017109D0 (en) | Digital-media systems | |
GB0725049D0 (en) | Communiactions systems | |
GB0804897D0 (en) | Messaging system | |
GB0709061D0 (en) | Expression system | |
DK200901203A (en) | Hydroponisk system | |
GB2479074B (en) | Format-preserving cryptographic systems | |
GB2452855B (en) | Security system | |
GB0724431D0 (en) | Protection system | |
HK1147354A1 (en) | Two-power-source system | |
EP2074825A4 (en) | Tv-centric system | |
GB0704931D0 (en) | Rotocraft system | |
GB0713688D0 (en) | Wattchmate-Avessel protection system | |
GB0715531D0 (en) | Vibracook system | |
GB0708137D0 (en) | T m | |
GB0521663D0 (en) | Encryption systems | |
GB0723483D0 (en) | System | |
GB0715508D0 (en) | Vibracook system | |
GB0705460D0 (en) | Tri-force system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
732E | Amendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977) |
Free format text: REGISTERED BETWEEN 20181105 AND 20181107 |