GB0709761D0 - Self encryption - Google Patents

Self encryption

Info

Publication number
GB0709761D0
GB0709761D0 GBGB0709761.1A GB0709761A GB0709761D0 GB 0709761 D0 GB0709761 D0 GB 0709761D0 GB 0709761 A GB0709761 A GB 0709761A GB 0709761 D0 GB0709761 D0 GB 0709761D0
Authority
GB
United Kingdom
Prior art keywords
chunk
chunks
file
hashes
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GBGB0709761.1A
Other versions
GB2444343A (en
GB2444343B (en
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of GB0709761D0 publication Critical patent/GB0709761D0/en
Priority to PCT/GB2007/004440 priority Critical patent/WO2008065351A1/en
Publication of GB2444343A publication Critical patent/GB2444343A/en
Application granted granted Critical
Publication of GB2444343B publication Critical patent/GB2444343B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1074Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
    • H04L67/1078Resource delivery mechanisms
    • H04L67/108Resource delivery mechanisms characterised by resources being split in blocks or fragments
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C1/00Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
    • H04L29/06659
    • H04L29/06687
    • H04L29/08306
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0457Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply dynamic encryption, e.g. stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1074Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/16Obfuscation or hiding, e.g. involving white box
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/42Anonymization, e.g. involving pseudonyms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

A file is divided into chunks 2 and small data elements, such as bytes, are permuted between the chunks 3. Each chunk is hashed 4 to form a chunk hash, and each chunk hash is encrypted using one or more other chunk hashes 5 in a self encryption process. The chunk hashes and the encrypted chunk hashes are constituents of a mapping function. The chunks are distributed across various nodes of a peer-to-peer network. The permutation of the chunks contributes towards the effective encryption of the file. The file can be recovered using the mapping function.
GB0709761.1A 2006-12-01 2007-05-22 Self encryption Active GB2444343B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/GB2007/004440 WO2008065351A1 (en) 2006-12-01 2007-11-21 Self encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0624058A GB2446200A (en) 2006-12-01 2006-12-01 Encryption system for peer-to-peer networks which relies on hash based self-encryption and mapping

Publications (3)

Publication Number Publication Date
GB0709761D0 true GB0709761D0 (en) 2007-06-27
GB2444343A GB2444343A (en) 2008-06-04
GB2444343B GB2444343B (en) 2012-04-18

Family

ID=37671713

Family Applications (2)

Application Number Title Priority Date Filing Date
GB0624058A Withdrawn GB2446200A (en) 2006-12-01 2006-12-01 Encryption system for peer-to-peer networks which relies on hash based self-encryption and mapping
GB0709761.1A Active GB2444343B (en) 2006-12-01 2007-05-22 Self encryption

Family Applications Before (1)

Application Number Title Priority Date Filing Date
GB0624058A Withdrawn GB2446200A (en) 2006-12-01 2006-12-01 Encryption system for peer-to-peer networks which relies on hash based self-encryption and mapping

Country Status (1)

Country Link
GB (2) GB2446200A (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
IL210169A0 (en) 2010-12-22 2011-03-31 Yehuda Binder System and method for routing-based internet security
US9900384B2 (en) * 2013-07-12 2018-02-20 Adobe Systems Incorporated Distributed caching in a communication network
US9621586B2 (en) 2014-02-08 2017-04-11 International Business Machines Corporation Methods and apparatus for enhancing business services resiliency using continuous fragmentation cell technology
US9521128B2 (en) 2014-11-07 2016-12-13 Qualcomm Incorporated Using a hash of a filename to control encoding/decoding of a digital file

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6807632B1 (en) * 1999-01-21 2004-10-19 Emc Corporation Content addressable information encapsulation, representation, and transfer
US7412462B2 (en) * 2000-02-18 2008-08-12 Burnside Acquisition, Llc Data repository and method for promoting network storage of data
AU2001238269B2 (en) * 2000-02-18 2006-06-22 Emc Corporation Hash file system and method for use in a commonality factoring system
US20020080888A1 (en) * 2000-12-22 2002-06-27 Li Shu Message splitting and spatially diversified message routing for increasing transmission assurance and data security over distributed networks
US7043637B2 (en) * 2001-03-21 2006-05-09 Microsoft Corporation On-disk file format for a serverless distributed file system
US7418454B2 (en) * 2004-04-16 2008-08-26 Microsoft Corporation Data overlay, self-organized metadata overlay, and application level multicasting
EP1752002A1 (en) * 2004-05-19 2007-02-14 Wurld Media, Inc. Dynamic connection structure topologies and methods for facilitating the peer-to-peer transfer of digital files
FR2878673B1 (en) * 2004-11-26 2007-02-09 Univ Picardie Jules Verne Etab PERENNE DISTRIBUTED BACKUP SYSTEM AND METHOD
WO2007008567A1 (en) * 2005-07-08 2007-01-18 Matsushita Electric Industrial Co., Ltd. Secure peer to peer messaging service
CN1925388A (en) * 2005-08-31 2007-03-07 西门子(中国)有限公司 Resource encrypting and deencrypting method and system

Also Published As

Publication number Publication date
GB2444343A (en) 2008-06-04
GB2446200A (en) 2008-08-06
GB2444343B (en) 2012-04-18
GB0624058D0 (en) 2007-01-10

Similar Documents

Publication Publication Date Title
TW200610349A (en) Key derivation functions to enhance security
NZ603822A (en) Permutation data transform to enhance security
EP1278113A3 (en) On-disk file format for a serverless distributed file system
NO20044028L (en) Use of isogenies for the development of cryptosystems
ATE532144T1 (en) DOCUMENT SECURITY MANAGEMENT SYSTEM
TNSN07055A1 (en) Permutation data transform to enhance security
CN108200172B (en) Cloud storage system and method supporting safe data deduplication and deletion
JP2017511920A5 (en)
WO2005059717A3 (en) Certificate based digital rights management
GB0624056D0 (en) msSAN
EP1982263A4 (en) Automatically determining file replication mechanisms
AU2001295208A1 (en) Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys
WO2010141445A3 (en) Workgroup key wrapping for community of interest membership authentication
MX2008001850A (en) Protecting digital media of various content types.
WO2010040078A3 (en) System and method for organizing data to facilitate data deduplication
TW200711436A (en) Secure patch system
AR076255A1 (en) METHODS FOR THE OPERATION OF A POINT-TO-POINT NETWORK WITH FIXED PREFIX
WO2007120772A3 (en) Method, system, and computer-readable medium to maintain and/or purge files of a document management system
GB2444343B (en) Self encryption
DE602007004262D1 (en) Creation of substrings while preserving privacy
GB0013356D0 (en) A method of validating an encrypted message
ES2198201B1 (en) PROCEDURE AND SYSTEM OF DISTRIBUTION AND MANAGEMENT OF RIGHTS OF USE ASSOCIATED WITH A CONTENT PURCHASED, FOR MOBILE TERMINALS.
CN104636369A (en) Duplicated data deleting method capable of verifying file ownership
TW200702989A (en) Data structure using memory blocks to encrypt data
KR101315683B1 (en) Encrypting and decrypting method without causing change of data size and type

Legal Events

Date Code Title Description
732E Amendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977)

Free format text: REGISTERED BETWEEN 20151029 AND 20151104

PCNP Patent ceased through non-payment of renewal fee

Effective date: 20200522

S28 Restoration of ceased patents (sect. 28/pat. act 1977)

Free format text: APPLICATION FILED

S28 Restoration of ceased patents (sect. 28/pat. act 1977)

Free format text: RESTORATION ALLOWED

Effective date: 20210820