GB201201931D0 - A method and database system for secure storage and communication of information - Google Patents

A method and database system for secure storage and communication of information

Info

Publication number
GB201201931D0
GB201201931D0 GBGB1201931.1A GB201201931A GB201201931D0 GB 201201931 D0 GB201201931 D0 GB 201201931D0 GB 201201931 A GB201201931 A GB 201201931A GB 201201931 D0 GB201201931 D0 GB 201201931D0
Authority
GB
United Kingdom
Prior art keywords
communication
information
database system
secure storage
secure
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GBGB1201931.1A
Other versions
GB2499194A (en
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to GB1201931.1A priority Critical patent/GB2499194A/en
Publication of GB201201931D0 publication Critical patent/GB201201931D0/en
Priority to GB1209534.5A priority patent/GB2499269A/en
Priority to PCT/GB2013/050229 priority patent/WO2013114125A2/en
Priority to US14/376,396 priority patent/US20140372752A1/en
Priority to EP13703125.8A priority patent/EP2810402B1/en
Publication of GB2499194A publication Critical patent/GB2499194A/en
Priority to US15/288,161 priority patent/US20170026180A1/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • Bioethics (AREA)
  • Storage Device Security (AREA)
GB1201931.1A 2012-02-03 2012-02-03 Biometric information generation of a secure keychain Withdrawn GB2499194A (en)

Priority Applications (6)

Application Number Priority Date Filing Date Title
GB1201931.1A GB2499194A (en) 2012-02-03 2012-02-03 Biometric information generation of a secure keychain
GB1209534.5A GB2499269A (en) 2012-02-03 2012-05-29 Biometric information generation of a secure keychain
PCT/GB2013/050229 WO2013114125A2 (en) 2012-02-03 2013-02-01 A method and database system for secure storage and communication of information
US14/376,396 US20140372752A1 (en) 2012-02-03 2013-02-01 Method and database system for secure storage and communication of information
EP13703125.8A EP2810402B1 (en) 2012-02-03 2013-02-01 A method and database system for secure storage and communication of information
US15/288,161 US20170026180A1 (en) 2012-02-03 2016-10-07 Method and database system for secure storage and communication of information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB1201931.1A GB2499194A (en) 2012-02-03 2012-02-03 Biometric information generation of a secure keychain

Publications (2)

Publication Number Publication Date
GB201201931D0 true GB201201931D0 (en) 2012-03-21
GB2499194A GB2499194A (en) 2013-08-14

Family

ID=45896617

Family Applications (2)

Application Number Title Priority Date Filing Date
GB1201931.1A Withdrawn GB2499194A (en) 2012-02-03 2012-02-03 Biometric information generation of a secure keychain
GB1209534.5A Withdrawn GB2499269A (en) 2012-02-03 2012-05-29 Biometric information generation of a secure keychain

Family Applications After (1)

Application Number Title Priority Date Filing Date
GB1209534.5A Withdrawn GB2499269A (en) 2012-02-03 2012-05-29 Biometric information generation of a secure keychain

Country Status (1)

Country Link
GB (2) GB2499194A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113569258A (en) * 2021-07-27 2021-10-29 重庆市规划和自然资源信息中心 Real estate mortgage registration data security query working method

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI566564B (en) * 2012-04-25 2017-01-11 Samton International Development Technology Co Ltd Virtual reality authentication circuit, system and electronic consumption method

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006512864A (en) * 2002-12-31 2006-04-13 インターナショナル・ビジネス・マシーンズ・コーポレーション Allowed anonymous authentication
WO2009009788A1 (en) * 2007-07-12 2009-01-15 Jobmann Brian C Identity authentication and secured access systems, components, and methods
US7685629B1 (en) * 2009-08-05 2010-03-23 Daon Holdings Limited Methods and systems for authenticating users

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113569258A (en) * 2021-07-27 2021-10-29 重庆市规划和自然资源信息中心 Real estate mortgage registration data security query working method

Also Published As

Publication number Publication date
GB2499194A (en) 2013-08-14
GB2499269A (en) 2013-08-14
GB201209534D0 (en) 2012-07-11

Similar Documents

Publication Publication Date Title
HK1206158A1 (en) Method and system for providing beacon information
EP2823407A4 (en) Data collection system and method for fleet management
ZA201309034B (en) Social information management method and system adapted thereto
EP3077962A4 (en) System and method for inventory management
EP2936366A4 (en) Method and system for network validation of information
EP2728484A4 (en) Storage system and object management method
GB201504275D0 (en) System and method for matching data using probabilistic modeling techniques
EP2684118A4 (en) Method and system for information modeling and applications thereof
ZA201406088B (en) Method and system for transferring speech information
EP2893724A4 (en) Method and system for acquiring location information
EP2834744A4 (en) System and method for memory management
EP2706468A4 (en) Data storage and query method
EP2743859A4 (en) Information management system and information management method
EP2569921A4 (en) System and method for providing reliable storage
SG2012082020A (en) A system and method for tracking
EP2787452A4 (en) Information searching method and system
PL2854350T3 (en) System and method for cross-network data storage
EP2811685A4 (en) Transmission method and system for terminal-specific information
GB201115642D0 (en) Data storage method and system
HK1178649A1 (en) Method and system for storing and searching data
EP2850566C0 (en) Method and system for determining and implementing a viable containment design of a data center
EP2833276A4 (en) Data search system and data search method
GB201222866D0 (en) Business information management system and method
EP2852189A4 (en) Method and system for releasing and obtaining information
GB201217334D0 (en) System and method for data extraction and storage

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)