GB2371401A - Personal data protector - Google Patents

Personal data protector Download PDF

Info

Publication number
GB2371401A
GB2371401A GB0101271A GB0101271A GB2371401A GB 2371401 A GB2371401 A GB 2371401A GB 0101271 A GB0101271 A GB 0101271A GB 0101271 A GB0101271 A GB 0101271A GB 2371401 A GB2371401 A GB 2371401A
Authority
GB
United Kingdom
Prior art keywords
personal data
data protector
keyword
cipher
character
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB0101271A
Other versions
GB0101271D0 (en
Inventor
Bryan Kelly
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to GB0101271A priority Critical patent/GB2371401A/en
Publication of GB0101271D0 publication Critical patent/GB0101271D0/en
Publication of GB2371401A publication Critical patent/GB2371401A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C1/00Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
    • G09C1/02Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system by using a ciphering code in chart form

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

A personal data protector which electronically encrypts and decrypts sensitive personal data such as passwords and pin numbers. The cipher is a polyalphabetical substitution cipher based on Vigenere, but which encrypts numbers as well as letters. The cipher encrypts data with the same number of digits as the original data, simplifying and facilitating written storage of the ciphertext. The cipher ensures encryption and decryption occur in a particular fashion dependant only on a user supplied keyword. Encrypted data can be stored in the machine's internal memory. The machine's size can vary, but one of its forms is pocket sized for convenient storage and transport. The encryption method involves assigning one character of the user-input keyword to each character of the message to be encoded. If the message is longer than the keyword, the keyword is repated as many times as necessary. The message character and keyword character are then combined by binary addition of the respective cipher code strings representing each character. The reverse process is performed for decryption.

Description

PERSONAL DATA PROTECTOR This invention relates to a personal data protector, which uses encryption technology.
Many people have passwords, pin numbers or account numbers that need to be remembered for a variety of purposes, such as using a cash machine. Such sensitive personal data should not normally be written down as it may be discovered, and must therefore either be memorised (with the risk of being forgotten) or stored in a password protected electronic device (with the risk of the device being lost or stolen).
One solution is to encrypt the data before it is written down. However the present methods of secure encryption suffer from one or more of the following problems that prevent general use for sensitive personal data: * encryption products are generally software only * the encryption process can be fairly complex and/or long-winded
'access to a relatively expensive and bulky machine is required, such as a personal computer or laptop, making transport to a point-of-use (such as a bank) very inconvenient * encryption can be machine dependant, such that if the machine is unavailable for any reason (e. g. faulty or stolen) decryption may be difficult or impossible.
According to the present invention there is provided a personal data protector, comprising of an electronic unit which contains a cipher that encrypts and decrypts both letters and numbers in a particular fashion dependant only on a keyword set by the user and has a display screen, keypad, numberpad, encrypt button and decrypt button.
A specific embodiment of the invention will now be described by way of example with reference to the accompanying drawing in which : Figure 1 shows a block diagram illustrating the encryption process Figure 2 shows a block diagram illustrating the decryption process Figure 3 shows the machine in perspective Referring to the drawing, plaintext 1 (i. e. data to be encrypted) is passed through a cipher 2 using a keyword 3 as shown in Fig 1. The ciphertext 4 (i. e. encrypted data) is written down and/or stored in the machine's internal memory 5. Data is decrypted by passing it back through the cipher 2 using the same keyword 3 that encrypted the data, as shown in Fig 2.
The cipher 2 is a polyalphabetical substitution cipher based on the Vigenere cipher, modified to include numbers. The substitution component of the cipher simplifies and facilitates written storage of the ciphertext.
Data is encrypted by mapping characters to binary numeric values, and adding keyword character values to the corresponding plaintext character values, modulo the number of letters in the alphabet for plaintext letters, or modulo the number of digits from 0 to 9 for plaintext numbers. The character mapping is performed to the following binary protocol whereby 7-bit binary numbers are assigned to each letter of the alphabet and the digits 0 to 9:
A 0 0 0 0 0 0 1 B0000010 C 0 0 0 0 0 1 1 D 0 0 0 0 1 0 0 E 0 0 0 0 1 0 1 F0000110 G 0 00011 1 H 0 0 1 0 0 0 0 10001001 J 0 0 0 1 0 1 0 K 0 0 0 1 0 1 1 L 0001100 M 0 0 0 1 1 0 1 N 0 0 0 1 1 1 1 O 0 0 0 1 1 1 1 P 0 0 1 0 0 0 0 Q 0 0 1 0 0 0 1 R 0 0 1 0 0 1 0 S 0 0 1 0 0 1 1 T 0 0 1 0 1 0 0 U 0 0 1 0 1 0 1 V 0 0 1 0 1 1 0 W 0 0 1 0 1 1 1 X 0 0 1 1 0 0 0 Y 0 0 1 1 0 0 1 Z 0 0 1 1 0 1 0 A 0 0 1 1 0 1 1 B0011100 C 0 0 1 1 1 0 1 D0011110 E0011111 F 0 1 0 0 0 0 0 G 0 1 0 0 0 0 1
H 0 1 0 0 0 1 0 I 0 1 0 0 0 1 1 J 0 1 0 0 1 0 0 K 0 1 0 0 1 0 1 L0100110 M 0 1 0 0 1 1 1 N 0 1 0 1 0 0 0 O 0 1 0 1 0 0 1 P0101010 Q 0 1 0 1 0 1 1 R 0 1 0 1 1 0 0 S 0 1 0 1 1 0 1 T0101110 U 0 1 0 1 1 1 1 V 0 1 1 0 0 0 0 W 0 1 1 0 0 0 1 X 0 1 1 0 0 1 0 Y 0 1 1 0 0 1 1 Z 0 1 1 0 1 0 0 0 0 1 1 0 1 0 1 10110110 2 0 1 1 0 1 1 1 3 0 1 1 1 0 0 0 4 0 1 1 1 0 0 1 5 0 1 1 1 0 1 0 6 0 1 1 1 0 1 1 7 0 1 1 1 1 0 0 8 0 1 1 1 1 0 1 9 0 1 1 1 1 1 0 0 0 1 1 1 1 1 1 1 1 0 0 0 0 0 0 2 1 0 0 0 0 0 1 3 1 0 0 0 0 1 0
4 1000011 5 1 0 0 0 1 0 0 6 1 0 0 0 1 0 1 7 1 0 0 0 1 1 0 81000111 91001000 0 1 0 0 1 0 0 1 1 1 0 0 1 0 1 0 2 1 0 0 1 0 1 1 3 1 0 0 1 1 0 0 4 1 0 0 1 1 0 1 5 1001110 6 1 0 0 1 1 1 1 7 1 0 1 0 0 0 0 8 1 0 1 0 0 0 1 9 1 0 1 0 0 1 0 0 1 0 1 0 0 1 1 1 1 0 1 0 1 0 0 2 1 0 1 0 1 0 1 3 1010110 41010111 4 1 0 1 0 1 1 1 5 1 0 1 1 0 0 0 To encrypt data the characters within the plaintext and keyword are first converted to binary form using a limited portion of the binary protocol of page 2, whereby characters A to Z are assigned binary numbers in the range 0000001 to 0011010, and characters 0 to 9 are assigned binary numbers in the range 0110101 to 0111110. Each binary element of the plaintext is added to the corresponding binary element of the keyword, cycling the keyword if it is smaller than the plaintext. The resultant binary data is then converted back to letters or numbers to form the ciphertext using the binary protocol of page 2.
Decryption is essentially a reverse of the above process. The ciphertext and the keyword are converted into binary, using the same limited portion of the binary protocol on page 2 as used for encryption. Each binary element of the keyword is subtracted from each binary element of the ciphertext. The resultant binary data is converted to letters or numbers using the binary protocol of page 2 to form the plaintext.
The process is now demonstrated using the plaintext 137RET and the keyword KING as an illustration. The plaintext and keyword are first converted to their binary form using the binary protocol of page 2: Plaintext 1 3 7 R E T Plaintext in binary 0110110 OH 1000 0111100 0010010 00001010010100 Keyword KING Keyword in binary 0001011 00010010001110 0000111 Each binary element of the plaintext is added to the corresponding element of the keyword. The keyword is cycled since it is smaller than the plaintext.
Plaintext in binary 011011001110000111100001001000001010010100 Keyword in binary 0001011 00010010001110 0000111 0001011 0001001 Ciphertext in binary 1000001 10000011001010 0011001 0010000 0011101 The resultant ciphertext in binary is then converted to letters or numbers using the binary protocol of page 2: Ciphertext in binary 1000001 10000011001010 0011001 0010000 0011101 Ciphertext 2 2 1 Y P C
Thus the original plaintext 137RET has become the ciphertext 221YPC.
During decryption, the keyword KING in binary is subtracted from the ciphertext 221YPC in binary to reveal the plaintext in binary, from which the plaintext 137RET is obtained using the binary protocol of page 2. Referring to Fig 3, data is encrypted as follows. The machine is switched on using the power button 6. Data is typed in using the keypad 7 and/or numberpad 8. The ENTER button 9 is then pressed. The keyword 3 is then typed in using the keypad 7.
The ENCRYPT button 10 is then pressed. The encrypted data then appears on the display screen 11, and can be stored into the machine's memory 5 by pressing the Min button 12 and/or written down on paper. Errors during typing are corrected by either pressing the DEL button 13 which clears the last entered character, or the AC button 14 which re-sets the machine to its power-up mode.
Data is decrypted by first typing it into the machine, using the keypad 7 and/or numberpad 8, or retrieving it from memory 5 by pressing the RM button 15. The ENTER button 9 is then pressed. The keyword 3 is then typed in using the keypad 7.
The DECRYPT button 16 is then pressed. The decrypted data then appears on the display screen 11.
The machine is portable, with dimensions such that it can be conveniently carried in a pocket or handbag.
The above example describes a simple form of the invention. There are other forms of the invention, such as including the electronic labelling of each data item, including storage of both the label and the encrypted data within internal memory, including storage of multiple label/data entries within internal memory, combining the keypad with the number pad (as seen on mobile phones), and dimensions that make the machine non-portable. In addition, the machine can be integrated with other electronic devices, such as mobile phones, calculators, organisers and electronic diaries.

Claims (12)

  1. CLAIMS 1. A personal data protector, comprising of an electronic unit which contains a cipher that encrypts and decrypts both letters and numbers in a particular fashion dependant only on a keyword set by the user and has a display screen, keypad, numberpad, encrypt button and decrypt button.
  2. 2 A personal data protector as claimed in Claim 1 which uses a polyalphabetical substitution cipher that maps characters to numeric values and adds keyword character values to corresponding plaintext character values, modulo the number of letters in the alphabet for plaintext letters, or modulo the number of digits from 0 to 9 for plaintext numbers.
  3. 3 A personal data protector as claimed in Claim 2 which uses a binary conversion protocol of the form as presented on page 2 of the Description.
  4. 4 A personal data protector as claimed in any preceding Claim, which has the facility to store encrypted data in internal memory.
  5. 5 A personal data protector as claimed in Claim 4, which has the facility to electronically label encrypted data and store the labelled encrypted data in internal memory.
  6. 6 A personal data protector as claimed in any preceding Claim, which has a keypad combined with the numberpad.
  7. 7 A personal data protector as claimed in any of the Claims 1,2, 3,4, 5, or 6 that is part of an electronic calculator.
  8. 8 A personal data protector as claimed in any of the Claims 1,2, 3,4, 5, or 6 that is part of an electronic organiser or electronic diary.
  9. 9 A personal data protector as claimed in any of the Claims 1,2, 3,4, 5, or 6 that is part of a mobile phone.
  10. 10 A personal data protector as claimed in any of the Claims 1,2, 3,4, 5, or 6 that is part of any other electronic device.
  11. 11 A personal data protector as claimed in any of the Claims 1,2, 3,4, 5, or 6 which is portable, with dimensions such that it can be conveniently carried in a pocket or handbag.
  12. 12 A personal data protector substantially as described herein with reference to Figures 1-3 of the accompanying drawing.
GB0101271A 2001-01-18 2001-01-18 Personal data protector Withdrawn GB2371401A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0101271A GB2371401A (en) 2001-01-18 2001-01-18 Personal data protector

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0101271A GB2371401A (en) 2001-01-18 2001-01-18 Personal data protector

Publications (2)

Publication Number Publication Date
GB0101271D0 GB0101271D0 (en) 2001-02-28
GB2371401A true GB2371401A (en) 2002-07-24

Family

ID=9907022

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0101271A Withdrawn GB2371401A (en) 2001-01-18 2001-01-18 Personal data protector

Country Status (1)

Country Link
GB (1) GB2371401A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4229817A (en) * 1978-04-28 1980-10-21 Datotek, Inc. Portable electronic cryptographic device
GB2080603A (en) * 1980-05-16 1982-02-03 Jebb Alan Coding devices
GB2342768A (en) * 1995-08-27 2000-04-19 Aliroo Ltd Encrypting portions of a secure document

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4229817A (en) * 1978-04-28 1980-10-21 Datotek, Inc. Portable electronic cryptographic device
GB2080603A (en) * 1980-05-16 1982-02-03 Jebb Alan Coding devices
GB2342768A (en) * 1995-08-27 2000-04-19 Aliroo Ltd Encrypting portions of a secure document

Also Published As

Publication number Publication date
GB0101271D0 (en) 2001-02-28

Similar Documents

Publication Publication Date Title
US6226382B1 (en) Method for implementing a private-key communication protocol between two processing devices
US6986050B2 (en) Computer security method and apparatus
US5485519A (en) Enhanced security for a secure token code
US8375212B2 (en) Method for personalizing an authentication token
JP4253543B2 (en) Hardware protection key and reissuing method
KR20100016579A (en) System and method for distribution of credentials
CA2593567A1 (en) Security code production method and methods of using the same, and programmable device therefor
US20030159053A1 (en) Secure reconfigurable input device with transaction card reader
CN101685425A (en) Mobile storage device and method of encrypting same
JPH01212041A (en) Cryptographic communication system
CN101196855A (en) Mobile encrypted memory device and cipher text storage area data encrypting and deciphering processing method
JP2001320768A (en) Portable telephone set and secrecy method of data
CN101795450A (en) Method and device for carrying out security protection on mobile phone data
EP1504424B1 (en) An authentication token
CN101789088A (en) SD card with payment function
CN201130381Y (en) Electric signature tool with cryptogram management function
WO2010038763A1 (en) Information management system, terminal unit, server device and program
CN101355740B (en) Method and system for protecting smart card data
JP4620307B2 (en) Technology for safely storing data in memory
GB2371401A (en) Personal data protector
JP2008312001A (en) Confidential data generating/reading system, and confidential data generating/reading method
JPH063905B2 (en) Authentication method between the center and the user
JPS62134679A (en) Encryption document generator/reader
KR20040014606A (en) A card reader and a method for reading of cards
JPH04107793A (en) Data access method and ic card for execution

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)