GB201811783D0 - Dynamic data encryption - Google Patents

Dynamic data encryption

Info

Publication number
GB201811783D0
GB201811783D0 GBGB1811783.8A GB201811783A GB201811783D0 GB 201811783 D0 GB201811783 D0 GB 201811783D0 GB 201811783 A GB201811783 A GB 201811783A GB 201811783 D0 GB201811783 D0 GB 201811783D0
Authority
GB
United Kingdom
Prior art keywords
data encryption
dynamic data
dynamic
encryption
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GBGB1811783.8A
Other versions
GB2575667A (en
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
British Telecommunications PLC
Original Assignee
British Telecommunications PLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by British Telecommunications PLC filed Critical British Telecommunications PLC
Priority to GB1811783.8A priority Critical patent/GB2575667A/en
Publication of GB201811783D0 publication Critical patent/GB201811783D0/en
Publication of GB2575667A publication Critical patent/GB2575667A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • H04L9/16Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)
GB1811783.8A 2018-07-19 2018-07-19 Dynamic data encryption Withdrawn GB2575667A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB1811783.8A GB2575667A (en) 2018-07-19 2018-07-19 Dynamic data encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB1811783.8A GB2575667A (en) 2018-07-19 2018-07-19 Dynamic data encryption

Publications (2)

Publication Number Publication Date
GB201811783D0 true GB201811783D0 (en) 2018-09-05
GB2575667A GB2575667A (en) 2020-01-22

Family

ID=63364326

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1811783.8A Withdrawn GB2575667A (en) 2018-07-19 2018-07-19 Dynamic data encryption

Country Status (1)

Country Link
GB (1) GB2575667A (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11017108B2 (en) * 2018-10-30 2021-05-25 International Business Machines Corporation Storage unification with security management
CN113806765A (en) * 2021-08-12 2021-12-17 中国信息通信研究院 Internet of things equipment data security protection method and device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8752142B2 (en) * 2009-07-17 2014-06-10 American Express Travel Related Services Company, Inc. Systems, methods, and computer program products for adapting the security measures of a communication network based on feedback
US20140109176A1 (en) * 2012-10-15 2014-04-17 Citrix Systems, Inc. Configuring and providing profiles that manage execution of mobile applications
US10498772B2 (en) * 2016-03-21 2019-12-03 Vireshwar K. Adhar Method and system for digital privacy management

Also Published As

Publication number Publication date
GB2575667A (en) 2020-01-22

Similar Documents

Publication Publication Date Title
GB202000292D0 (en) Anonymous encrypted data
EP3811561B8 (en) Dynamic data encryption
HK1258579A1 (en) Fast format-preserving encryption for variable length data
EP3403185A4 (en) Memory operation encryption
GB2574433B (en) Dongle for ciphering data
EP3631653A4 (en) Encryption of cloud-based data
GB2577451B (en) Audio data transfer
GB2561928B (en) Audio data transfer
GB201811807D0 (en) Encryption system
GB201817117D0 (en) Encryption method
EP3850926C0 (en) Data centre
EP3590045A4 (en) Obfuscation-enhanced memory encryption
EP3665537A4 (en) Generating geo-fence data
GB201814068D0 (en) Transmittinf data
GB2577104B (en) Viewing data
GB201810791D0 (en) Guaranteed data comperssion
GB201602873D0 (en) Secure data access
GB201811783D0 (en) Dynamic data encryption
GB2590239B (en) Secure operations on encrypted data
GB2601449B (en) Key-compressible encryption
GB201722299D0 (en) Encrypted data access
GB2584042C (en) Personal data management
GB201700736D0 (en) Data centre
IL284787B (en) Dynamic data storage
GB201819181D0 (en) Secure data access

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)