GB201201930D0 - A method and database system for secure storage and communication of information - Google Patents
A method and database system for secure storage and communication of informationInfo
- Publication number
- GB201201930D0 GB201201930D0 GBGB1201930.3A GB201201930A GB201201930D0 GB 201201930 D0 GB201201930 D0 GB 201201930D0 GB 201201930 A GB201201930 A GB 201201930A GB 201201930 D0 GB201201930 D0 GB 201201930D0
- Authority
- GB
- United Kingdom
- Prior art keywords
- user
- hash
- communication
- keychain
- records
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
- H04L63/0421—Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
Abstract
A secure communications system for the secure storage and communication of authenticated user identity and personal information. The system includes a database of anonymised, individually encrypted user records. Access to the records is only permissible using a user key which is stored in a user keychain on a client device. The keychain itself is password protected and cryptographically tied to the client device. A first user may generate an open request having a public key, and use a private key to access a second users response. Notification messages may besend by encrypting user address information passing that to a notification server and decrypting the address to send a message to the user. A signed object may be sent where a first user makes a public key available and a hash of the data object and a private key produced, the object and encrypted hash are sent to a second user who can then decrypt the hash and generate a hash of the received object to compare the generated hash and the decrypted hash.
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1201930.3A GB2499193A (en) | 2012-02-03 | 2012-02-03 | Public private key usage in a Database System for Secure Storage and Communication of Information |
PCT/GB2013/050229 WO2013114125A2 (en) | 2012-02-03 | 2013-02-01 | A method and database system for secure storage and communication of information |
EP13703125.8A EP2810402B1 (en) | 2012-02-03 | 2013-02-01 | A method and database system for secure storage and communication of information |
US14/376,396 US20140372752A1 (en) | 2012-02-03 | 2013-02-01 | Method and database system for secure storage and communication of information |
US15/288,161 US20170026180A1 (en) | 2012-02-03 | 2016-10-07 | Method and database system for secure storage and communication of information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1201930.3A GB2499193A (en) | 2012-02-03 | 2012-02-03 | Public private key usage in a Database System for Secure Storage and Communication of Information |
Publications (2)
Publication Number | Publication Date |
---|---|
GB201201930D0 true GB201201930D0 (en) | 2012-03-21 |
GB2499193A GB2499193A (en) | 2013-08-14 |
Family
ID=45896616
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB1201930.3A Withdrawn GB2499193A (en) | 2012-02-03 | 2012-02-03 | Public private key usage in a Database System for Secure Storage and Communication of Information |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2499193A (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI566564B (en) * | 2012-04-25 | 2017-01-11 | Samton International Development Technology Co Ltd | Virtual reality authentication circuit, system and electronic consumption method |
US10341194B2 (en) | 2015-10-05 | 2019-07-02 | Fugue, Inc. | System and method for building, optimizing, and enforcing infrastructure on a cloud based computing environment |
US20180020008A1 (en) * | 2016-07-18 | 2018-01-18 | Fugue, Inc. | Secure asynchronous communications |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7174368B2 (en) * | 2001-03-27 | 2007-02-06 | Xante Corporation | Encrypted e-mail reader and responder system, method, and computer program product |
DE602005014119D1 (en) * | 2005-11-16 | 2009-06-04 | Totemo Ag | A method of establishing a secure e-mail communication channel between a sender and a recipient |
US8527751B2 (en) * | 2006-08-24 | 2013-09-03 | Privacydatasystems, Llc | Systems and methods for secure and certified electronic messaging |
US20110307695A1 (en) * | 2010-06-14 | 2011-12-15 | Salesforce.Com, Inc. | Methods and systems for providing a secure online feed in a multi-tenant database environment |
-
2012
- 2012-02-03 GB GB1201930.3A patent/GB2499193A/en not_active Withdrawn
Also Published As
Publication number | Publication date |
---|---|
GB2499193A (en) | 2013-08-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9813247B2 (en) | Authenticator device facilitating file security | |
IL261137A (en) | System and method for performing secure communications | |
GB2496354B (en) | A method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors | |
US20140355757A1 (en) | Encryption / decryption of data with non-persistent, non-shared passkey | |
JP2011151866A5 (en) | ||
RU2017131640A (en) | CONFIDENTIAL COMMUNICATION MANAGEMENT | |
US20180063105A1 (en) | Management of enciphered data sharing | |
WO2013114125A3 (en) | A method and database system for secure storage and communication of information | |
CN103248479A (en) | Cloud storage safety system, data protection method and data sharing method | |
CN104219228A (en) | User registration and user identification method and user registration and user identification system | |
CN103067160A (en) | Method and system of generation of dynamic encrypt key of encryption secure digital memory card (SD) | |
JP2014508456A5 (en) | ||
RU2013140418A (en) | SAFE ACCESS TO PERSONAL HEALTH RECORDS IN EMERGENCIES | |
GB201016672D0 (en) | Secure exchange/authentication of electronic documents | |
CN101924739A (en) | Method for encrypting, storing and retrieving software certificate and private key | |
TW201417546A (en) | Instant messaging method and system | |
CN105025019A (en) | Data safety sharing method | |
CN103546421A (en) | Network work communication security and secrecy system on basis of PKI (public key infrastructure) technology and method for implementing network work communication security and secrecy system | |
TW201409990A (en) | Communication method utilizing fingerprint information for authentication | |
CN102694650B (en) | Secret key generating method based on identity encryption | |
CN102404337A (en) | Data encryption method and device | |
CN103701596A (en) | Document access method, system and equipment and document access request response method, system and equipment | |
CN101984626B (en) | Method and system for safely exchanging files | |
KR101541165B1 (en) | Mobile message encryption method, computer readable recording medium recording program performing the method and download server storing the method | |
RU2015120264A (en) | AGENT FOR SECURING CLOUD SERVICE AND DEVELOPMENT OF SECURITY MARKERS FOR SECURE CLOUD SERVICE |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
732E | Amendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977) |
Free format text: REGISTERED BETWEEN 20140814 AND 20140820 |
|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |