IN2014CH00971A - - Google Patents

Download PDF

Info

Publication number
IN2014CH00971A
IN2014CH00971A IN971CH2014A IN2014CH00971A IN 2014CH00971 A IN2014CH00971 A IN 2014CH00971A IN 971CH2014 A IN971CH2014 A IN 971CH2014A IN 2014CH00971 A IN2014CH00971 A IN 2014CH00971A
Authority
IN
India
Prior art keywords
data
passcode
encrypted
multiple entities
secret shares
Prior art date
Application number
Other languages
English (en)
Inventor
Saheer Cheruvath Muhammad
Raj Sivarajan Perumal
Original Assignee
Samsung R & D Inst India Bangalore Private Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Samsung R & D Inst India Bangalore Private Ltd filed Critical Samsung R & D Inst India Bangalore Private Ltd
Priority to IN971CH2014 priority Critical patent/IN2014CH00971A/en
Priority to US14/631,127 priority patent/US20150244522A1/en
Publication of IN2014CH00971A publication Critical patent/IN2014CH00971A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
IN971CH2014 2014-02-26 2014-02-26 IN2014CH00971A (enrdf_load_stackoverflow)

Priority Applications (2)

Application Number Priority Date Filing Date Title
IN971CH2014 IN2014CH00971A (enrdf_load_stackoverflow) 2014-02-26 2014-02-26
US14/631,127 US20150244522A1 (en) 2014-02-26 2015-02-25 Method and system for providing data security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
IN971CH2014 IN2014CH00971A (enrdf_load_stackoverflow) 2014-02-26 2014-02-26

Publications (1)

Publication Number Publication Date
IN2014CH00971A true IN2014CH00971A (enrdf_load_stackoverflow) 2015-08-28

Family

ID=53883307

Family Applications (1)

Application Number Title Priority Date Filing Date
IN971CH2014 IN2014CH00971A (enrdf_load_stackoverflow) 2014-02-26 2014-02-26

Country Status (2)

Country Link
US (1) US20150244522A1 (enrdf_load_stackoverflow)
IN (1) IN2014CH00971A (enrdf_load_stackoverflow)

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9582671B2 (en) * 2014-03-06 2017-02-28 Sensity Systems Inc. Security and data privacy for lighting sensory networks
US10574438B2 (en) * 2014-02-18 2020-02-25 Nippon Telegraph And Telephone Corporation Security apparatus, method thereof, and program
US10873454B2 (en) 2014-04-04 2020-12-22 Zettaset, Inc. Cloud storage encryption with variable block sizes
US10298555B2 (en) * 2014-04-04 2019-05-21 Zettaset, Inc. Securing files under the semi-trusted user threat model using per-file key encryption
US10043029B2 (en) 2014-04-04 2018-08-07 Zettaset, Inc. Cloud storage encryption
US9614968B2 (en) * 2015-06-09 2017-04-04 International Business Machines Corporation Managing access to a conference call
JP2019500645A (ja) * 2015-12-03 2019-01-10 アンバウンド テック リミテッド 暗号プロトコルを用いたsqlベースのデータベースの保護
US10326599B2 (en) * 2016-05-09 2019-06-18 Hewlett Packard Enterprise Development Lp Recovery agents and recovery plans over networks
US10333946B1 (en) * 2016-06-22 2019-06-25 Amazon Technologies, Inc. Distributing variable entropy ephemeral security credentials across channels of variable assurance
US10013560B1 (en) * 2017-04-05 2018-07-03 International Business Machines Corporation Securely exchanging information during application startup
US9892242B1 (en) * 2017-04-28 2018-02-13 Global Tel*Link Corporation Unified enterprise management of wireless devices in a controlled environment
GB2564442B (en) 2017-07-10 2022-03-02 Shayype Global Ltd Method of registering and authenticating a user of an online system
US10673626B2 (en) * 2018-03-30 2020-06-02 Spyrus, Inc. Threshold secret share authentication proof and secure blockchain voting with hardware security modules
CN109831580B (zh) * 2019-01-24 2020-12-18 王微静 一码通用数据共享系统
WO2020170225A2 (en) * 2019-02-24 2020-08-27 Nili Philipp System and method for securing data
US11182470B2 (en) 2019-05-24 2021-11-23 Qatar Foundation For Education, Science And Community Development Online account access recovery system and method utilizing secret splitting
CN112751665B (zh) * 2019-10-30 2022-12-09 阿里巴巴(中国)网络技术有限公司 一种安全多方计算方法、设备、系统及存储介质
US11394698B2 (en) * 2020-07-29 2022-07-19 Nec Corporation Of America Multi-party computation (MPC) based authorization
US11748272B2 (en) * 2021-05-05 2023-09-05 Seagate Technology, Llc Shared keys for no PCBA cartridges
US12061684B2 (en) * 2021-12-13 2024-08-13 Shopify Inc. Systems and methods for controlling access to a computing device
CN115021910B (zh) * 2022-05-31 2025-08-12 苏州浪潮智能科技有限公司 一种服务器重置密码管理方法、装置、设备及存储介质

Family Cites Families (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9191215B2 (en) * 2003-12-30 2015-11-17 Entrust, Inc. Method and apparatus for providing authentication using policy-controlled authentication articles and techniques
US7379551B2 (en) * 2004-04-02 2008-05-27 Microsoft Corporation Method and system for recovering password protected private data via a communication network without exposing the private data
WO2007017882A1 (en) * 2005-08-05 2007-02-15 Hewlett-Packard Development Company L.P. System, method and apparatus for cryptography key management for mobile devices
US20070061567A1 (en) * 2005-09-10 2007-03-15 Glen Day Digital information protection system
BRPI0618725A2 (pt) * 2005-11-18 2011-09-06 Rick L Orsini método analisador de dados seguro e sistema
US7917963B2 (en) * 2006-08-09 2011-03-29 Antenna Vaultus, Inc. System for providing mobile data security
US8191131B2 (en) * 2006-08-23 2012-05-29 International Business Machines Corporation Obscuring authentication data of remote user
JP4881119B2 (ja) * 2006-09-29 2012-02-22 株式会社東芝 ユーザ認証方法、ユーザ側認証装置、および、プログラム
AU2007351552B2 (en) * 2006-11-07 2010-10-14 Security First Corporation Systems and methods for distributing and securing data
WO2008098004A2 (en) * 2007-02-05 2008-08-14 Vidoop Llc Methods and systems for delivering sponsored out-of-band passwords
US8639214B1 (en) * 2007-10-26 2014-01-28 Iwao Fujisaki Communication device
US20100150341A1 (en) * 2008-12-17 2010-06-17 David Dodgson Storage security using cryptographic splitting
CA2797660C (en) * 2010-03-19 2016-03-29 Shinji Hirasawa Concept for communicating between different entities using different data portions for different channels
US8473743B2 (en) * 2010-04-07 2013-06-25 Apple Inc. Mobile device management
US20140006193A1 (en) * 2011-01-12 2014-01-02 Camelot Strategic Solutions Limited Retail equipment
US8595507B2 (en) * 2011-02-16 2013-11-26 Novell, Inc. Client-based authentication
US8756434B2 (en) * 2011-04-08 2014-06-17 Apple Inc. System and method for executing an encrypted binary from a memory pool
US9582678B2 (en) * 2011-04-19 2017-02-28 Invenia As Method for secure storing of a data file via a computer communication network
US20130061298A1 (en) * 2011-09-01 2013-03-07 International Business Machines Corporation Authenticating session passwords
US8898476B1 (en) * 2011-11-10 2014-11-25 Saife, Inc. Cryptographic passcode reset
US8767954B2 (en) * 2011-12-01 2014-07-01 Colloid, Llc Methods and systems for deriving a cryptographic framework
GB2505531B (en) * 2012-11-16 2015-01-07 F Secure Corp Methods, systems and apparatus for managing data entries on a database
KR101416542B1 (ko) * 2012-12-24 2014-07-09 주식회사 로웸 패스코드 관리 방법 및 장치
WO2014108182A1 (en) * 2013-01-09 2014-07-17 Qatar Foundation Storage system and method of storing and managing data
US20160014110A1 (en) * 2013-02-21 2016-01-14 Personal, Inc. Security systems and methods

Also Published As

Publication number Publication date
US20150244522A1 (en) 2015-08-27

Similar Documents

Publication Publication Date Title
IN2014CH00971A (enrdf_load_stackoverflow)
SG11201708750TA (en) Network system, and methods of encrypting data, decrypting encrypted data in the same
IL253742A0 (en) Method and system for managing encryption keys
IL262352A (en) System and methods for validating and performing operations on homomorphically encrypted data
SG10201405852QA (en) Encryption function and decryption function generating method, encryption and decryption method and related apparatuses
EP3118771A4 (en) Confidential data management method and device, and security authentication method and system
WO2014116528A3 (en) Providing an encrypted account credential from a first device to a second device
SG11201701653WA (en) Remote server encrypted data provisioning system and methods
SG11201701564RA (en) Encrypting and decrypting information
EP3254214A4 (en) Data encryption/decryption using neuro and neuro-mechanical fingerprints
GB2567990A (en) Data protection system and method
EP3195522A4 (en) Generating shares of secret data
GB201701458D0 (en) Puf and address dependent data encryption
EP3467808A4 (en) ENCRYPTION DEVICE, ENCRYPTION METHOD, DECRYPTION DEVICE, AND DECRYPTION METHOD
GB201703301D0 (en) Password-based generation and management of secret cryptographic keys
EP3300294A4 (en) Data encryption apparatus and method, and data decryption apparatus and method
EP2882132A4 (en) SHARED SECRET KEY GENERATION DEVICE, ENCRYPTION DEVICE, DECRYPTION DEVICE, SHARED SECRET KEY GENERATION METHOD, ENCRYPTION METHOD, DECRYPTION METHOD, AND PROGRAM
EP3208967A4 (en) Entity authentication method and device based on pre-shared key
SG10201509342WA (en) Method and system for session key generation with diffie-hellman procedure
MX2020005598A (es) Provision de seguridad de datos para dispositivo de cliente.
EP3096487A4 (en) Crypt-system, re-encryption key generation apparatus, re-encryption apparatus, and crypt-program
DK3704829T3 (da) Kryptografisk nøglegenereringssystem og -fremgangsmåde
EP3461056B8 (en) Systems and methods for facilitating iterative key generation and data encryption and decryption
EP3079299A4 (en) Data processing system, encryption apparatus, decryption apparatus, and program
SG11201805601QA (en) Process for monovalent one-to-one extraction of keys from the propagation channel