CA3108866A1 - A method and system for securing data - Google Patents
A method and system for securing data Download PDFInfo
- Publication number
- CA3108866A1 CA3108866A1 CA3108866A CA3108866A CA3108866A1 CA 3108866 A1 CA3108866 A1 CA 3108866A1 CA 3108866 A CA3108866 A CA 3108866A CA 3108866 A CA3108866 A CA 3108866A CA 3108866 A1 CA3108866 A1 CA 3108866A1
- Authority
- CA
- Canada
- Prior art keywords
- data
- tem
- wherei
- rst
- stri
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/3033—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters details relating to pseudo-prime or prime number generation, e.g. primality test
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0872—Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/16—Obfuscation or hiding, e.g. involving white box
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| AU2018902873 | 2018-08-07 | ||
| AU2018902873A AU2018902873A0 (en) | 2018-08-07 | A Method and System for Securing Data | |
| PCT/AU2019/050828 WO2020028950A1 (en) | 2018-08-07 | 2019-08-07 | A method and system for securing data |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CA3108866A1 true CA3108866A1 (en) | 2020-02-13 |
Family
ID=69413232
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CA3108866A Pending CA3108866A1 (en) | 2018-08-07 | 2019-08-07 | A method and system for securing data |
Country Status (9)
| Country | Link |
|---|---|
| US (1) | US11438156B2 (https=) |
| EP (1) | EP3830730B1 (https=) |
| JP (1) | JP7588854B2 (https=) |
| CN (1) | CN112805704A (https=) |
| AU (1) | AU2019319767B2 (https=) |
| CA (1) | CA3108866A1 (https=) |
| ES (1) | ES3038236T3 (https=) |
| SG (1) | SG11202101201UA (https=) |
| WO (1) | WO2020028950A1 (https=) |
Families Citing this family (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| SG11202101201UA (en) * | 2018-08-07 | 2021-03-30 | Haventec Pty Ltd | A method and system for securing data |
| US11456855B2 (en) * | 2019-10-17 | 2022-09-27 | Arm Limited | Obfuscating data at-transit |
| AU2020477732B2 (en) * | 2020-11-19 | 2024-02-01 | Ntt, Inc. | Estimation device, estimation method, and estimation program |
| US11777714B2 (en) * | 2021-12-17 | 2023-10-03 | Watson Knox Williams, JR. | Matrix encryption—a symmetric key encryption technology |
| CN117688594B (zh) * | 2024-02-02 | 2024-04-16 | 北京华云安信息技术有限公司 | 数据库加密混淆的方法、装置、设备及存储介质 |
Family Cites Families (29)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6446205B1 (en) * | 1998-12-10 | 2002-09-03 | Citibank, N.A. | Cryptosystems with elliptic curves chosen by users |
| WO2000057290A1 (en) * | 1999-03-19 | 2000-09-28 | Hitachi, Ltd. | Information processor |
| US6662299B1 (en) * | 1999-10-28 | 2003-12-09 | Pgp Corporation | Method and apparatus for reconstituting an encryption key based on multiple user responses |
| EP1179912A1 (en) * | 2000-08-09 | 2002-02-13 | STMicroelectronics S.r.l. | Chaotic encryption |
| US6691141B2 (en) * | 2001-04-13 | 2004-02-10 | Science Applications International Corp. | Method and apparatus for generating random number generators |
| WO2006047694A1 (en) * | 2004-10-25 | 2006-05-04 | Orsini Rick L | Secure data parser method and system |
| US7685430B1 (en) * | 2005-06-17 | 2010-03-23 | Sun Microsystems, Inc. | Initial password security accentuated by triple encryption and hashed cache table management on the hosted site's server |
| US20140108796A1 (en) * | 2006-01-26 | 2014-04-17 | Unisys Corporation | Storage of cryptographically-split data blocks at geographically-separated locations |
| US7865730B2 (en) * | 2006-01-30 | 2011-01-04 | Kronos Technology Systems Limited Partnership | Bcencryption (BCE)—a public-key based method to encrypt a data stream |
| US8468244B2 (en) * | 2007-01-05 | 2013-06-18 | Digital Doors, Inc. | Digital information infrastructure and method for security designated data and with granular data stores |
| US8472620B2 (en) * | 2007-06-15 | 2013-06-25 | Sony Corporation | Generation of device dependent RSA key |
| AU2015203172B2 (en) | 2010-09-20 | 2016-10-06 | Security First Corp. | Systems and methods for secure data sharing |
| US9015281B2 (en) * | 2010-10-08 | 2015-04-21 | Brian Lee Moffat | Private data sharing system |
| CN102236766B (zh) * | 2011-05-10 | 2014-04-09 | 桂林电子科技大学 | 安全的数据项级数据库加密方法 |
| US8958547B2 (en) * | 2012-01-06 | 2015-02-17 | International Business Machines Corporation | Generation of relative prime numbers for use in cryptography |
| US20140082376A1 (en) * | 2012-09-14 | 2014-03-20 | Texas Tech University System | System, Method and Apparatus for Securely Saving/Retrieving Data on a Data Storage |
| US9472189B2 (en) * | 2012-11-02 | 2016-10-18 | Sony Corporation | Language processing method and integrated circuit |
| US20140164790A1 (en) * | 2012-12-06 | 2014-06-12 | David Dodgson | Storage security using cryptographic splitting |
| US9374224B2 (en) * | 2013-04-18 | 2016-06-21 | RISOFTDEV, Inc. | System and methods for encrypting data |
| US9800407B2 (en) * | 2013-08-30 | 2017-10-24 | Qualcomm Incorporated | Methods and apparatuses for prime number generation and storage |
| CN105282090B (zh) * | 2014-06-03 | 2018-11-27 | 江南大学 | 一种互联网上防非法访问的公开url加密编码方法 |
| WO2016130030A1 (en) * | 2015-02-10 | 2016-08-18 | Nord-Systems Sp. Z O.O. | Method of securing data using threshold cryptography |
| KR101675088B1 (ko) * | 2015-04-30 | 2016-11-10 | 성균관대학교산학협력단 | Mtc에서의 네트워크와의 상호 인증 방법 및 시스템 |
| CN105005718B (zh) * | 2015-06-23 | 2018-02-13 | 电子科技大学 | 一种利用马尔可夫链实现代码混淆的方法 |
| US10725990B2 (en) * | 2015-12-01 | 2020-07-28 | Facebook, Inc. | Co-prime hashing |
| CN105763322B (zh) * | 2016-04-13 | 2019-01-25 | 同济大学 | 一种可混淆的加密密钥隔离数字签名方法及系统 |
| AU2019280577A1 (en) * | 2018-06-04 | 2021-01-21 | Foogal, Inc. | Utility token-based systems and methods |
| US11184157B1 (en) * | 2018-06-13 | 2021-11-23 | Amazon Technologies, Inc. | Cryptographic key generation and deployment |
| SG11202101201UA (en) * | 2018-08-07 | 2021-03-30 | Haventec Pty Ltd | A method and system for securing data |
-
2019
- 2019-08-07 SG SG11202101201UA patent/SG11202101201UA/en unknown
- 2019-08-07 CN CN201980065945.2A patent/CN112805704A/zh active Pending
- 2019-08-07 JP JP2021506422A patent/JP7588854B2/ja active Active
- 2019-08-07 EP EP19848073.3A patent/EP3830730B1/en active Active
- 2019-08-07 AU AU2019319767A patent/AU2019319767B2/en active Active
- 2019-08-07 ES ES19848073T patent/ES3038236T3/es active Active
- 2019-08-07 CA CA3108866A patent/CA3108866A1/en active Pending
- 2019-08-07 US US17/266,537 patent/US11438156B2/en active Active
- 2019-08-07 WO PCT/AU2019/050828 patent/WO2020028950A1/en not_active Ceased
Also Published As
| Publication number | Publication date |
|---|---|
| CN112805704A (zh) | 2021-05-14 |
| WO2020028950A1 (en) | 2020-02-13 |
| AU2019319767A1 (en) | 2021-03-11 |
| US11438156B2 (en) | 2022-09-06 |
| EP3830730A1 (en) | 2021-06-09 |
| JP7588854B2 (ja) | 2024-11-25 |
| US20210320795A1 (en) | 2021-10-14 |
| EP3830730A4 (en) | 2021-09-01 |
| ES3038236T3 (en) | 2025-10-10 |
| SG11202101201UA (en) | 2021-03-30 |
| EP3830730C0 (en) | 2025-06-11 |
| JP2021534443A (ja) | 2021-12-09 |
| AU2019319767B2 (en) | 2022-12-08 |
| EP3830730B1 (en) | 2025-06-11 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP3830730B1 (en) | A method and system for securing data | |
| US10938792B2 (en) | Layered encryption for end to end communication | |
| EP3373557B1 (en) | Secure information retrieval and update | |
| US7676040B2 (en) | Changing encryption key of encrypted data | |
| JP5742849B2 (ja) | 暗号化データベースシステム、クライアント端末、暗号化データベースサーバ、自然結合方法およびプログラム | |
| US20220014367A1 (en) | Decentralized computing systems and methods for performing actions using stored private data | |
| CN113434878A (zh) | 基于联邦学习的建模及应用方法、装置、设备及存储介质 | |
| Poduval et al. | Secure file storage on cloud using hybrid cryptography | |
| CN110298186B (zh) | 一种基于动态可重构密码芯片的无密钥数据加解密方法 | |
| Saikumar | DES-Data Encryption Standard | |
| CN112989321A (zh) | 一种基于秘密共享算法的密钥管理方法和系统 | |
| JP2017130720A (ja) | 暗号文管理方法、暗号文管理装置及びプログラム | |
| US11997191B2 (en) | System and method for protecting secret data items using multiple tiers of encryption and secure element | |
| CN112149166B (zh) | 非常规密码保护方法及银行智能机器 | |
| Noor et al. | Learning the basics of cryptography with practical examples | |
| Irwanto | File encryption and decryption using algorithm AES-128 bit based website | |
| Bhardwaj | End-to-end data security for multi-tenant cloud environment | |
| CN106972928A (zh) | 一种堡垒机私钥管理方法、装置及系统 | |
| Shrivas et al. | Migration Model for un secure Database driven Software System to Secure System using Cryptography | |
| Pawar et al. | Survey of cryptography techniques for data security | |
| Ofosu et al. | A Cryptographic Algorithm Based On Aes Cipher Andnondeterministic Algorithm Approach For Key Generation | |
| JP4807785B2 (ja) | 実行権限分散方法及びシステム | |
| Das et al. | A Two layer secure image encryption technique | |
| Amin et al. | Hill Cipher algorithm with Self Repetitive Matrix for Secured Data Communication | |
| Jain et al. | Data Privacy Using Cryptographic Approaches |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| MFA | Maintenance fee for application paid |
Free format text: FEE DESCRIPTION TEXT: MF (APPLICATION, 5TH ANNIV.) - STANDARD Year of fee payment: 5 |
|
| U00 | Fee paid |
Free format text: ST27 STATUS EVENT CODE: A-1-1-U10-U00-U101 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: MAINTENANCE REQUEST RECEIVED Effective date: 20240812 |
|
| U11 | Full renewal or maintenance fee paid |
Free format text: ST27 STATUS EVENT CODE: A-1-1-U10-U11-U102 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: MAINTENANCE FEE PAYMENT DETERMINED COMPLIANT Effective date: 20240812 Free format text: ST27 STATUS EVENT CODE: A-1-1-U10-U11-U102 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: MAINTENANCE FEE PAYMENT PAID IN FULL Effective date: 20240812 |
|
| D11 | Substantive examination requested |
Free format text: ST27 STATUS EVENT CODE: A-1-1-D10-D11-D117 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: REQUEST FOR EXAMINATION RECEIVED Effective date: 20241106 |
|
| P11 | Amendment of application requested |
Free format text: ST27 STATUS EVENT CODE: A-1-1-P10-P11-P101 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: AMENDMENT RECEIVED - VOLUNTARY AMENDMENT Effective date: 20241106 |
|
| W00 | Other event occurred |
Free format text: ST27 STATUS EVENT CODE: A-1-1-W10-W00-W111 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: CORRESPONDENT DETERMINED COMPLIANT Effective date: 20241106 |
|
| D00 | Search and/or examination requested or commenced |
Free format text: ST27 STATUS EVENT CODE: A-1-1-D10-D00-D118 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: REQUEST FOR EXAMINATION REQUIREMENTS DETERMINED COMPLIANT Effective date: 20241219 |
|
| P11 | Amendment of application requested |
Free format text: ST27 STATUS EVENT CODE: A-1-1-P10-P11-P102 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: AMENDMENT DETERMINED COMPLIANT Effective date: 20241219 |
|
| P13 | Application amended |
Free format text: ST27 STATUS EVENT CODE: A-1-1-P10-P13-X000 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: APPLICATION AMENDED Effective date: 20241219 |
|
| W00 | Other event occurred |
Free format text: ST27 STATUS EVENT CODE: A-1-1-W10-W00-W111 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: CORRESPONDENT DETERMINED COMPLIANT Effective date: 20241219 |
|
| W00 | Other event occurred |
Free format text: ST27 STATUS EVENT CODE: A-1-1-W10-W00-W100 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: LETTER SENT Effective date: 20250424 |
|
| D11 | Substantive examination requested |
Free format text: ST27 STATUS EVENT CODE: A-1-2-D10-D11-D155 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: ALL REQUIREMENTS FOR EXAMINATION DETERMINED COMPLIANT Effective date: 20250501 |
|
| MFA | Maintenance fee for application paid |
Free format text: FEE DESCRIPTION TEXT: MF (APPLICATION, 6TH ANNIV.) - STANDARD Year of fee payment: 6 |
|
| U00 | Fee paid |
Free format text: ST27 STATUS EVENT CODE: A-2-2-U10-U00-U101 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: MAINTENANCE REQUEST RECEIVED Effective date: 20250806 |
|
| U11 | Full renewal or maintenance fee paid |
Free format text: ST27 STATUS EVENT CODE: A-2-2-U10-U11-U102 (AS PROVIDED BY THE NATIONAL OFFICE); EVENT TEXT: MAINTENANCE FEE PAYMENT PAID IN FULL Effective date: 20250828 |