IN2014CH00971A - - Google Patents
Download PDFInfo
- Publication number
- IN2014CH00971A IN2014CH00971A IN971CH2014A IN2014CH00971A IN 2014CH00971 A IN2014CH00971 A IN 2014CH00971A IN 971CH2014 A IN971CH2014 A IN 971CH2014A IN 2014CH00971 A IN2014CH00971 A IN 2014CH00971A
- Authority
- IN
- India
- Prior art keywords
- data
- passcode
- encrypted
- multiple entities
- secret shares
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
Abstract
Embodiments herein provide a method for data security. A data passcode used for data encryption in electronic devices is encrypted and secret shares of the encrypted passcode are distributed to multiple entities. Recovery of the passcode and the encrypted data is performed by obtaining the secret shares from the multiple entities to reconstruct the passcode used for data encryption. FIG. 6
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IN971CH2014 IN2014CH00971A (en) | 2014-02-26 | 2014-02-26 | |
US14/631,127 US20150244522A1 (en) | 2014-02-26 | 2015-02-25 | Method and system for providing data security |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IN971CH2014 IN2014CH00971A (en) | 2014-02-26 | 2014-02-26 |
Publications (1)
Publication Number | Publication Date |
---|---|
IN2014CH00971A true IN2014CH00971A (en) | 2015-08-28 |
Family
ID=53883307
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
IN971CH2014 IN2014CH00971A (en) | 2014-02-26 | 2014-02-26 |
Country Status (2)
Country | Link |
---|---|
US (1) | US20150244522A1 (en) |
IN (1) | IN2014CH00971A (en) |
Families Citing this family (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9582671B2 (en) * | 2014-03-06 | 2017-02-28 | Sensity Systems Inc. | Security and data privacy for lighting sensory networks |
JP6312344B2 (en) * | 2014-02-18 | 2018-04-18 | 日本電信電話株式会社 | Security device, method thereof, and program |
US10298555B2 (en) * | 2014-04-04 | 2019-05-21 | Zettaset, Inc. | Securing files under the semi-trusted user threat model using per-file key encryption |
US10873454B2 (en) | 2014-04-04 | 2020-12-22 | Zettaset, Inc. | Cloud storage encryption with variable block sizes |
US10043029B2 (en) | 2014-04-04 | 2018-08-07 | Zettaset, Inc. | Cloud storage encryption |
US9614968B2 (en) | 2015-06-09 | 2017-04-04 | International Business Machines Corporation | Managing access to a conference call |
JP2019500645A (en) * | 2015-12-03 | 2019-01-10 | アンバウンド テック リミテッド | Protecting SQL-based databases using cryptographic protocols |
US10326599B2 (en) * | 2016-05-09 | 2019-06-18 | Hewlett Packard Enterprise Development Lp | Recovery agents and recovery plans over networks |
US10333946B1 (en) * | 2016-06-22 | 2019-06-25 | Amazon Technologies, Inc. | Distributing variable entropy ephemeral security credentials across channels of variable assurance |
US10013560B1 (en) * | 2017-04-05 | 2018-07-03 | International Business Machines Corporation | Securely exchanging information during application startup |
US9892242B1 (en) * | 2017-04-28 | 2018-02-13 | Global Tel*Link Corporation | Unified enterprise management of wireless devices in a controlled environment |
GB2564442B (en) | 2017-07-10 | 2022-03-02 | Shayype Global Ltd | Method of registering and authenticating a user of an online system |
US10673626B2 (en) * | 2018-03-30 | 2020-06-02 | Spyrus, Inc. | Threshold secret share authentication proof and secure blockchain voting with hardware security modules |
CN109831580B (en) * | 2019-01-24 | 2020-12-18 | 王微静 | One-code universal data sharing system |
WO2020170225A2 (en) * | 2019-02-24 | 2020-08-27 | Nili Philipp | System and method for securing data |
US11182470B2 (en) | 2019-05-24 | 2021-11-23 | Qatar Foundation For Education, Science And Community Development | Online account access recovery system and method utilizing secret splitting |
CN112751665B (en) * | 2019-10-30 | 2022-12-09 | 阿里巴巴(中国)网络技术有限公司 | Secure multi-party computing method, device, system and storage medium |
US11394698B2 (en) * | 2020-07-29 | 2022-07-19 | Nec Corporation Of America | Multi-party computation (MPC) based authorization |
US11748272B2 (en) * | 2021-05-05 | 2023-09-05 | Seagate Technology, Llc | Shared keys for no PCBA cartridges |
US20230185892A1 (en) * | 2021-12-13 | 2023-06-15 | Shopify Inc. | Systems and methods for controlling access to a computing device |
Family Cites Families (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9191215B2 (en) * | 2003-12-30 | 2015-11-17 | Entrust, Inc. | Method and apparatus for providing authentication using policy-controlled authentication articles and techniques |
US7379551B2 (en) * | 2004-04-02 | 2008-05-27 | Microsoft Corporation | Method and system for recovering password protected private data via a communication network without exposing the private data |
EP1911191B1 (en) * | 2005-08-05 | 2017-12-06 | Hewlett-Packard Enterprise Development LP | System, method and apparatus for cryptography key management for mobile devices |
US20070061567A1 (en) * | 2005-09-10 | 2007-03-15 | Glen Day | Digital information protection system |
CN105978683A (en) * | 2005-11-18 | 2016-09-28 | 安全第公司 | Secure data parser method and system |
US7917963B2 (en) * | 2006-08-09 | 2011-03-29 | Antenna Vaultus, Inc. | System for providing mobile data security |
US8191131B2 (en) * | 2006-08-23 | 2012-05-29 | International Business Machines Corporation | Obscuring authentication data of remote user |
JP4881119B2 (en) * | 2006-09-29 | 2012-02-22 | 株式会社東芝 | User authentication method, user side authentication device, and program |
EP3010174A1 (en) * | 2006-11-07 | 2016-04-20 | Security First Corp. | Systems and methods for distributing and securing data |
EP2115919A2 (en) * | 2007-02-05 | 2009-11-11 | Vidoop, L.l.c. | Methods and systems for delivering sponsored out-of-band passwords |
US8639214B1 (en) * | 2007-10-26 | 2014-01-28 | Iwao Fujisaki | Communication device |
US20100150341A1 (en) * | 2008-12-17 | 2010-06-17 | David Dodgson | Storage security using cryptographic splitting |
CA2868581C (en) * | 2010-03-19 | 2016-03-29 | mr.QR10 GMBH & CO. KG | Concept for communicating between different entities using different data portions for different channels |
US8473743B2 (en) * | 2010-04-07 | 2013-06-25 | Apple Inc. | Mobile device management |
US20140006193A1 (en) * | 2011-01-12 | 2014-01-02 | Camelot Strategic Solutions Limited | Retail equipment |
US8595507B2 (en) * | 2011-02-16 | 2013-11-26 | Novell, Inc. | Client-based authentication |
US8756434B2 (en) * | 2011-04-08 | 2014-06-17 | Apple Inc. | System and method for executing an encrypted binary from a memory pool |
US9582678B2 (en) * | 2011-04-19 | 2017-02-28 | Invenia As | Method for secure storing of a data file via a computer communication network |
US20130061298A1 (en) * | 2011-09-01 | 2013-03-07 | International Business Machines Corporation | Authenticating session passwords |
US8898476B1 (en) * | 2011-11-10 | 2014-11-25 | Saife, Inc. | Cryptographic passcode reset |
US8767954B2 (en) * | 2011-12-01 | 2014-07-01 | Colloid, Llc | Methods and systems for deriving a cryptographic framework |
GB2505531B (en) * | 2012-11-16 | 2015-01-07 | F Secure Corp | Methods, systems and apparatus for managing data entries on a database |
KR101416542B1 (en) * | 2012-12-24 | 2014-07-09 | 주식회사 로웸 | Method for Apparatus for managing passcode |
WO2014108182A1 (en) * | 2013-01-09 | 2014-07-17 | Qatar Foundation | Storage system and method of storing and managing data |
US20160014110A1 (en) * | 2013-02-21 | 2016-01-14 | Personal, Inc. | Security systems and methods |
-
2014
- 2014-02-26 IN IN971CH2014 patent/IN2014CH00971A/en unknown
-
2015
- 2015-02-25 US US14/631,127 patent/US20150244522A1/en not_active Abandoned
Also Published As
Publication number | Publication date |
---|---|
US20150244522A1 (en) | 2015-08-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
IN2014CH00971A (en) | ||
IL253742A0 (en) | Computerized system and method of secret key management | |
SG11201708750TA (en) | Network system, and methods of encrypting data, decrypting encrypted data in the same | |
HK1221353A1 (en) | Method and device for encrypting and decrypting information | |
SG10201405852QA (en) | Encryption function and decryption function generating method, encryption and decryption method and related apparatuses | |
SG11201704361XA (en) | Block cryptographic method for encrypting/decrypting messages and cryptographic devices for implementing this method | |
WO2014116528A3 (en) | Providing an encrypted account credential from a first device to a second device | |
EP3254214A4 (en) | Data encryption/decryption using neuro and neuro-mechanical fingerprints | |
EP3197123A4 (en) | Method, terminal, and network server for information encryption and decryption and key management | |
EP3118771A4 (en) | Confidential data management method and device, and security authentication method and system | |
EP2947810A4 (en) | Encryption system, re-encryption key generation device, re-encryption device, encryption method and encryption program | |
EP3226463A4 (en) | Data encryption and decryption method and encryption and decryption device | |
EP3300294A4 (en) | Data encryption apparatus and method, and data decryption apparatus and method | |
SG10201509342WA (en) | Method and system for session key generation with diffie-hellman procedure | |
GB201703301D0 (en) | Password-based generation and management of secret cryptographic keys | |
GB2520778B (en) | Block encryption/decryption apparatus and method | |
EP2947640A4 (en) | Data decoding device, attribute-based encryption system, random number element removing device, randomized secret key generation device, data decoding method, and data decoding program | |
EP3096487A4 (en) | Crypt-system, re-encryption key generation apparatus, re-encryption apparatus, and crypt-program | |
EP2996280A4 (en) | Public key encryption communication method and apparatus | |
HK1199979A1 (en) | Data processing method based on negotiation secret keys | |
EP3096488A4 (en) | Hypersphere-based multivariable public key encryption/decryption system and method | |
DK3704829T3 (en) | Cryptographic key generation system and method | |
HK1199567A1 (en) | Data processing method based on negotiation secret keys | |
TW201614541A (en) | Method of bus protection with improved key entropy and electronic device using the same | |
EP3057262A4 (en) | Cipher system, encryption device, re-encryption key generation device, re-encryption device, and cipher program |