CA1124811A - Cryptographic file security for single domain networks - Google Patents
Cryptographic file security for single domain networksInfo
- Publication number
- CA1124811A CA1124811A CA316,967A CA316967A CA1124811A CA 1124811 A CA1124811 A CA 1124811A CA 316967 A CA316967 A CA 316967A CA 1124811 A CA1124811 A CA 1124811A
- Authority
- CA
- Canada
- Prior art keywords
- key
- file
- data
- host
- enciphered
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
- H04L9/0662—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2153—Using hardware token as a secondary aspect
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
- H04L2209/125—Parallelization or pipelining, e.g. for accelerating processing of cryptographic operations
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Bioethics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US05/857,534 US4238854A (en) | 1977-12-05 | 1977-12-05 | Cryptographic file security for single domain networks |
| US857,534 | 1977-12-05 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CA1124811A true CA1124811A (en) | 1982-06-01 |
Family
ID=25326215
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CA316,967A Expired CA1124811A (en) | 1977-12-05 | 1978-11-28 | Cryptographic file security for single domain networks |
Country Status (5)
| Country | Link |
|---|---|
| US (1) | US4238854A (enExample) |
| EP (1) | EP0002579B1 (enExample) |
| JP (1) | JPS54116195A (enExample) |
| CA (1) | CA1124811A (enExample) |
| DE (1) | DE2862311D1 (enExample) |
Families Citing this family (74)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4408203A (en) * | 1978-01-09 | 1983-10-04 | Mastercard International, Inc. | Security system for electronic funds transfer system |
| US4317957A (en) * | 1980-03-10 | 1982-03-02 | Marvin Sendrow | System for authenticating users and devices in on-line transaction networks |
| US4314097A (en) * | 1980-03-10 | 1982-02-02 | Burroughs Corporation | Authenticator device for precluding compensating text modifications in transmitted messages |
| US4388643A (en) * | 1981-04-06 | 1983-06-14 | Northern Telecom Limited | Method of controlling scrambling and unscrambling in a pay TV system |
| US4593353A (en) * | 1981-10-26 | 1986-06-03 | Telecommunications Associates, Inc. | Software protection method and apparatus |
| US4965825A (en) | 1981-11-03 | 1990-10-23 | The Personalized Mass Media Corporation | Signal processing apparatus and methods |
| US7831204B1 (en) | 1981-11-03 | 2010-11-09 | Personalized Media Communications, Llc | Signal processing apparatus and methods |
| USRE47642E1 (en) | 1981-11-03 | 2019-10-08 | Personalized Media Communications LLC | Signal processing apparatus and methods |
| US4503287A (en) * | 1981-11-23 | 1985-03-05 | Analytics, Inc. | Two-tiered communication security employing asymmetric session keys |
| US4493028A (en) * | 1982-02-02 | 1985-01-08 | International Business Machines Corporation | Dual mode I/O |
| US4558176A (en) * | 1982-09-20 | 1985-12-10 | Arnold Mark G | Computer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software |
| US4652990A (en) * | 1983-10-27 | 1987-03-24 | Remote Systems, Inc. | Protected software access control apparatus and method |
| US4799061A (en) * | 1985-11-18 | 1989-01-17 | International Business Machines Corporation | Secure component authentication system |
| US5261070A (en) * | 1986-07-24 | 1993-11-09 | Meiji Milk Product Co., Ltd. | Method and apparatus for forming unique user identification data at remote terminal for secure transmission of data from host terminal |
| US4916738A (en) * | 1986-11-05 | 1990-04-10 | International Business Machines Corp. | Remote access terminal security |
| US5109413A (en) * | 1986-11-05 | 1992-04-28 | International Business Machines Corporation | Manipulating rights-to-execute in connection with a software copy protection mechanism |
| SE452082B (sv) * | 1986-12-15 | 1987-11-09 | Inter Innovation Ab | Manoverenhet for datakommunikation |
| US4933971A (en) * | 1989-03-14 | 1990-06-12 | Tandem Computers Incorporated | Method for encrypting transmitted data using a unique key |
| US5241597A (en) * | 1991-02-01 | 1993-08-31 | Motorola, Inc. | Method for recovering from encryption key variable loss |
| US5276735A (en) * | 1992-04-17 | 1994-01-04 | Secure Computing Corporation | Data enclave and trusted path system |
| US5596718A (en) * | 1992-07-10 | 1997-01-21 | Secure Computing Corporation | Secure computer network using trusted path subsystem which encrypts/decrypts and communicates with user through local workstation user I/O devices without utilizing workstation processor |
| US5444782A (en) * | 1993-03-09 | 1995-08-22 | Uunet Technologies, Inc. | Computer network encryption/decryption device |
| US5454039A (en) * | 1993-12-06 | 1995-09-26 | International Business Machines Corporation | Software-efficient pseudorandom function and the use thereof for encryption |
| US5495533A (en) * | 1994-04-29 | 1996-02-27 | International Business Machines Corporation | Personal key archive |
| US5757924A (en) * | 1995-09-18 | 1998-05-26 | Digital Secured Networks Techolognies, Inc. | Network security device which performs MAC address translation without affecting the IP address |
| US5727063A (en) * | 1995-11-27 | 1998-03-10 | Bell Communications Research, Inc. | Pseudo-random generator |
| JP2000503154A (ja) * | 1996-01-11 | 2000-03-14 | エムアールジェイ インコーポレイテッド | デジタル所有権のアクセスと分配を制御するためのシステム |
| JPH09238132A (ja) * | 1996-02-29 | 1997-09-09 | Oki Electric Ind Co Ltd | 携帯用端末通信システム及びその通信方法 |
| DE19629856A1 (de) * | 1996-07-24 | 1998-01-29 | Ibm | Verfahren und System zum sicheren Übertragen und Speichern von schützbaren Informationen |
| WO1998032065A2 (en) | 1997-01-03 | 1998-07-23 | Fortress Technologies, Inc. | Improved network security device |
| US6014745A (en) * | 1997-07-17 | 2000-01-11 | Silicon Systems Design Ltd. | Protection for customer programs (EPROM) |
| US6249866B1 (en) * | 1997-09-16 | 2001-06-19 | Microsoft Corporation | Encrypting file system and method |
| US7096358B2 (en) * | 1998-05-07 | 2006-08-22 | Maz Technologies, Inc. | Encrypting file system |
| JP4427693B2 (ja) * | 1998-10-02 | 2010-03-10 | ソニー株式会社 | データ処理装置および方法、並びにデータ復号処理装置および方法 |
| US6985583B1 (en) * | 1999-05-04 | 2006-01-10 | Rsa Security Inc. | System and method for authentication seed distribution |
| KR20010086038A (ko) * | 1999-09-17 | 2001-09-07 | 이데이 노부유끼 | 데이터 제공 시스템 및 그 방법 |
| US6986052B1 (en) * | 2000-06-30 | 2006-01-10 | Intel Corporation | Method and apparatus for secure execution using a secure memory partition |
| US7010689B1 (en) | 2000-08-21 | 2006-03-07 | International Business Machines Corporation | Secure data storage and retrieval in a client-server environment |
| US6947556B1 (en) | 2000-08-21 | 2005-09-20 | International Business Machines Corporation | Secure data storage and retrieval with key management and user authentication |
| US8006280B1 (en) | 2001-12-12 | 2011-08-23 | Hildebrand Hal S | Security system for generating keys from access rules in a decentralized manner and methods therefor |
| US7921284B1 (en) | 2001-12-12 | 2011-04-05 | Gary Mark Kinghorn | Method and system for protecting electronic data in enterprise environment |
| US7260555B2 (en) | 2001-12-12 | 2007-08-21 | Guardian Data Storage, Llc | Method and architecture for providing pervasive security to digital assets |
| US10033700B2 (en) | 2001-12-12 | 2018-07-24 | Intellectual Ventures I Llc | Dynamic evaluation of access rights |
| US7178033B1 (en) * | 2001-12-12 | 2007-02-13 | Pss Systems, Inc. | Method and apparatus for securing digital assets |
| US7565683B1 (en) | 2001-12-12 | 2009-07-21 | Weiqing Huang | Method and system for implementing changes to security policies in a distributed security system |
| US7921450B1 (en) | 2001-12-12 | 2011-04-05 | Klimenty Vainstein | Security system using indirect key generation from access rules and methods therefor |
| US10360545B2 (en) | 2001-12-12 | 2019-07-23 | Guardian Data Storage, Llc | Method and apparatus for accessing secured electronic data off-line |
| US7380120B1 (en) | 2001-12-12 | 2008-05-27 | Guardian Data Storage, Llc | Secured data format for access control |
| US7921288B1 (en) | 2001-12-12 | 2011-04-05 | Hildebrand Hal S | System and method for providing different levels of key security for controlling access to secured items |
| US7930756B1 (en) | 2001-12-12 | 2011-04-19 | Crocker Steven Toye | Multi-level cryptographic transformations for securing digital assets |
| US8065713B1 (en) | 2001-12-12 | 2011-11-22 | Klimenty Vainstein | System and method for providing multi-location access management to secured items |
| US7950066B1 (en) | 2001-12-21 | 2011-05-24 | Guardian Data Storage, Llc | Method and system for restricting use of a clipboard application |
| US8176334B2 (en) | 2002-09-30 | 2012-05-08 | Guardian Data Storage, Llc | Document security system that permits external users to gain access to secured files |
| US7773754B2 (en) * | 2002-07-08 | 2010-08-10 | Broadcom Corporation | Key management system and method |
| EP1429224A1 (en) * | 2002-12-10 | 2004-06-16 | Texas Instruments Incorporated | Firmware run-time authentication |
| US10176476B2 (en) | 2005-10-06 | 2019-01-08 | Mastercard Mobile Transactions Solutions, Inc. | Secure ecosystem infrastructure enabling multiple types of electronic wallets in an ecosystem of issuers, service providers, and acquires of instruments |
| US9064281B2 (en) | 2002-10-31 | 2015-06-23 | Mastercard Mobile Transactions Solutions, Inc. | Multi-panel user interface |
| US7383586B2 (en) | 2003-01-17 | 2008-06-03 | Microsoft Corporation | File system operation and digital rights management (DRM) |
| US7181016B2 (en) * | 2003-01-27 | 2007-02-20 | Microsoft Corporation | Deriving a symmetric key from an asymmetric key for file encryption or decryption |
| JP4891521B2 (ja) * | 2003-03-28 | 2012-03-07 | 三洋電機株式会社 | データ入出力方法、およびその方法を利用可能な記憶装置およびホスト装置 |
| US8707034B1 (en) | 2003-05-30 | 2014-04-22 | Intellectual Ventures I Llc | Method and system for using remote headers to secure electronic files |
| US7703140B2 (en) | 2003-09-30 | 2010-04-20 | Guardian Data Storage, Llc | Method and system for securing digital assets using process-driven security policies |
| US8127366B2 (en) | 2003-09-30 | 2012-02-28 | Guardian Data Storage, Llc | Method and apparatus for transitioning between states of security policies used to secure electronic documents |
| US6947493B2 (en) * | 2003-10-10 | 2005-09-20 | Atmel Corporation | Dual phase pulse modulation decoder circuit |
| WO2005036805A2 (en) * | 2003-10-10 | 2005-04-21 | Atmel Corporation | Dual phase pulse modulation system |
| KR100604828B1 (ko) * | 2004-01-09 | 2006-07-28 | 삼성전자주식회사 | 펌웨어 암호화 방법 및 해독 방법과 그 처리 장치 |
| WO2006089101A2 (en) * | 2005-02-18 | 2006-08-24 | Rsa Security Inc. | Derivative seeds |
| US10026079B2 (en) | 2005-10-06 | 2018-07-17 | Mastercard Mobile Transactions Solutions, Inc. | Selecting ecosystem features for inclusion in operational tiers of a multi-domain ecosystem platform for secure personalized transactions |
| WO2007044500A2 (en) * | 2005-10-06 | 2007-04-19 | C-Sam, Inc. | Transactional services |
| JP4930028B2 (ja) * | 2006-12-13 | 2012-05-09 | ソニー株式会社 | 情報処理装置、情報処理方法、プログラム |
| CN101661546B (zh) * | 2008-08-28 | 2012-12-19 | 深圳富泰宏精密工业有限公司 | 在手持行动电子装置中进行文件加密的系统及方法 |
| US8687814B2 (en) * | 2011-05-20 | 2014-04-01 | Citrix Systems, Inc. | Securing encrypted virtual hard disks |
| HK1203023A1 (en) | 2011-10-12 | 2015-10-09 | Mastercard Mobile Transactions Solutions, Inc. | A multi-tiered secure mobile transactions enabling platform |
| WO2020093290A1 (zh) * | 2018-11-07 | 2020-05-14 | 华为技术有限公司 | 一种存储控制器、文件处理方法、装置及系统 |
Family Cites Families (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US3985998A (en) * | 1970-11-18 | 1976-10-12 | Century International Corporation | Personal authority verification system |
| US3938091A (en) * | 1972-03-17 | 1976-02-10 | Atalla Technovations Company | Personal verification system |
| US3956615A (en) * | 1974-06-25 | 1976-05-11 | Ibm Corporation | Transaction execution system with secure data storage and communications |
| US3958081A (en) * | 1975-02-24 | 1976-05-18 | International Business Machines Corporation | Block cipher system for data security |
| US4004089A (en) * | 1975-02-28 | 1977-01-18 | Ncr Corporation | Programmable cryptic device for enciphering and deciphering data |
| US4025760A (en) * | 1975-08-14 | 1977-05-24 | Addressograph Multigraph Corporation | Security means for transaction terminal system |
| US4120030A (en) * | 1977-03-11 | 1978-10-10 | Kearney & Trecker Corporation | Computer software security system |
-
1977
- 1977-12-05 US US05/857,534 patent/US4238854A/en not_active Expired - Lifetime
-
1978
- 1978-11-28 CA CA316,967A patent/CA1124811A/en not_active Expired
- 1978-12-05 JP JP14978678A patent/JPS54116195A/ja active Granted
- 1978-12-05 EP EP78300744A patent/EP0002579B1/en not_active Expired
- 1978-12-05 DE DE7878300744T patent/DE2862311D1/de not_active Expired
Also Published As
| Publication number | Publication date |
|---|---|
| DE2862311D1 (en) | 1983-10-06 |
| US4238854A (en) | 1980-12-09 |
| JPS54116195A (en) | 1979-09-10 |
| JPS6133194B2 (enExample) | 1986-07-31 |
| EP0002579A1 (en) | 1979-06-27 |
| EP0002579B1 (en) | 1983-08-31 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CA1124811A (en) | Cryptographic file security for single domain networks | |
| EP0002390B1 (en) | Method for cryptographic file security in multiple domain data processing systems | |
| US4238853A (en) | Cryptographic communication security for single domain networks | |
| CA1149483A (en) | Cryptographic communication and file security using terminals | |
| EP0002580B1 (en) | A process for the verification of cryptographic operational keys used in data communication networks | |
| US5214698A (en) | Method and apparatus for validating entry of cryptographic keys | |
| US4227253A (en) | Cryptographic communication security for multiple domain networks | |
| US5200999A (en) | Public key cryptosystem key management based on control vectors | |
| CA1317677C (en) | Secure management of keys using control vectors | |
| US4993069A (en) | Secure key management using control vector translation | |
| CA2068488C (en) | Hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors | |
| EP0482371B1 (en) | Method and apparatus for controlling the use of a public key, based on the level of integrity for the key | |
| US5870477A (en) | Enciphering/deciphering device and method, and encryption/decryption communication system | |
| EP0539727B1 (en) | Cryptographic facility environment backup/restore and replication in a public key cryptosystem | |
| US20160094347A1 (en) | Method and system for secure management of computer applications | |
| JPH0793148A (ja) | ソフトウエア配布システム | |
| JPH11506588A (ja) | 暗号化アクセスおよびラベリング・システム | |
| JPS5925411B2 (ja) | 暗号処理装置 | |
| CN101997834A (zh) | 支持高性能安全协议的装置 | |
| US5177791A (en) | Secure translation of usage-control values for cryptographic keys | |
| CN110289946A (zh) | 一种区块链钱包本地化文件的生成方法及区块链节点设备 | |
| CN115865448B (zh) | 一种数据自加密装置和方法 | |
| CN115348093B (zh) | 图片验证方法、装置、存储介质以及图片验证设备 | |
| CN105897405B (zh) | 一种128位对称密钥生成及保护装置 | |
| CN118300779A (zh) | 基于aes与密钥派生函数的安全加密方法和系统 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| MKEX | Expiry |