GB201201931D0 - A method and database system for secure storage and communication of information - Google Patents
A method and database system for secure storage and communication of informationInfo
- Publication number
- GB201201931D0 GB201201931D0 GBGB1201931.1A GB201201931A GB201201931D0 GB 201201931 D0 GB201201931 D0 GB 201201931D0 GB 201201931 A GB201201931 A GB 201201931A GB 201201931 D0 GB201201931 D0 GB 201201931D0
- Authority
- GB
- United Kingdom
- Prior art keywords
- communication
- information
- database system
- secure storage
- secure
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Biomedical Technology (AREA)
- Bioethics (AREA)
- Storage Device Security (AREA)
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1201931.1A GB2499194A (en) | 2012-02-03 | 2012-02-03 | Biometric information generation of a secure keychain |
GB1209534.5A GB2499269A (en) | 2012-02-03 | 2012-05-29 | Biometric information generation of a secure keychain |
PCT/GB2013/050229 WO2013114125A2 (en) | 2012-02-03 | 2013-02-01 | A method and database system for secure storage and communication of information |
US14/376,396 US20140372752A1 (en) | 2012-02-03 | 2013-02-01 | Method and database system for secure storage and communication of information |
EP13703125.8A EP2810402B1 (en) | 2012-02-03 | 2013-02-01 | A method and database system for secure storage and communication of information |
US15/288,161 US20170026180A1 (en) | 2012-02-03 | 2016-10-07 | Method and database system for secure storage and communication of information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1201931.1A GB2499194A (en) | 2012-02-03 | 2012-02-03 | Biometric information generation of a secure keychain |
Publications (2)
Publication Number | Publication Date |
---|---|
GB201201931D0 true GB201201931D0 (en) | 2012-03-21 |
GB2499194A GB2499194A (en) | 2013-08-14 |
Family
ID=45896617
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB1201931.1A Withdrawn GB2499194A (en) | 2012-02-03 | 2012-02-03 | Biometric information generation of a secure keychain |
GB1209534.5A Withdrawn GB2499269A (en) | 2012-02-03 | 2012-05-29 | Biometric information generation of a secure keychain |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB1209534.5A Withdrawn GB2499269A (en) | 2012-02-03 | 2012-05-29 | Biometric information generation of a secure keychain |
Country Status (1)
Country | Link |
---|---|
GB (2) | GB2499194A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113569258A (en) * | 2021-07-27 | 2021-10-29 | 重庆市规划和自然资源信息中心 | Real estate mortgage registration data security query working method |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI566564B (en) * | 2012-04-25 | 2017-01-11 | Samton International Development Technology Co Ltd | Virtual reality authentication circuit, system and electronic consumption method |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006512864A (en) * | 2002-12-31 | 2006-04-13 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Allowed anonymous authentication |
WO2009009788A1 (en) * | 2007-07-12 | 2009-01-15 | Jobmann Brian C | Identity authentication and secured access systems, components, and methods |
US7685629B1 (en) * | 2009-08-05 | 2010-03-23 | Daon Holdings Limited | Methods and systems for authenticating users |
-
2012
- 2012-02-03 GB GB1201931.1A patent/GB2499194A/en not_active Withdrawn
- 2012-05-29 GB GB1209534.5A patent/GB2499269A/en not_active Withdrawn
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113569258A (en) * | 2021-07-27 | 2021-10-29 | 重庆市规划和自然资源信息中心 | Real estate mortgage registration data security query working method |
Also Published As
Publication number | Publication date |
---|---|
GB2499194A (en) | 2013-08-14 |
GB2499269A (en) | 2013-08-14 |
GB201209534D0 (en) | 2012-07-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
HK1206158A1 (en) | Method and system for providing beacon information | |
EP2823407A4 (en) | Data collection system and method for fleet management | |
ZA201309034B (en) | Social information management method and system adapted thereto | |
EP3077962A4 (en) | System and method for inventory management | |
EP2936366A4 (en) | Method and system for network validation of information | |
EP2728484A4 (en) | Storage system and object management method | |
GB201504275D0 (en) | System and method for matching data using probabilistic modeling techniques | |
EP2684118A4 (en) | Method and system for information modeling and applications thereof | |
ZA201406088B (en) | Method and system for transferring speech information | |
EP2893724A4 (en) | Method and system for acquiring location information | |
EP2834744A4 (en) | System and method for memory management | |
EP2706468A4 (en) | Data storage and query method | |
EP2743859A4 (en) | Information management system and information management method | |
EP2569921A4 (en) | System and method for providing reliable storage | |
SG2012082020A (en) | A system and method for tracking | |
EP2787452A4 (en) | Information searching method and system | |
PL2854350T3 (en) | System and method for cross-network data storage | |
EP2811685A4 (en) | Transmission method and system for terminal-specific information | |
GB201115642D0 (en) | Data storage method and system | |
HK1178649A1 (en) | Method and system for storing and searching data | |
EP2850566C0 (en) | Method and system for determining and implementing a viable containment design of a data center | |
EP2833276A4 (en) | Data search system and data search method | |
GB201222866D0 (en) | Business information management system and method | |
EP2852189A4 (en) | Method and system for releasing and obtaining information | |
GB201217334D0 (en) | System and method for data extraction and storage |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |