JP7588854B2 - データをセキュアにするための方法およびシステム - Google Patents

データをセキュアにするための方法およびシステム Download PDF

Info

Publication number
JP7588854B2
JP7588854B2 JP2021506422A JP2021506422A JP7588854B2 JP 7588854 B2 JP7588854 B2 JP 7588854B2 JP 2021506422 A JP2021506422 A JP 2021506422A JP 2021506422 A JP2021506422 A JP 2021506422A JP 7588854 B2 JP7588854 B2 JP 7588854B2
Authority
JP
Japan
Prior art keywords
data item
string
algorithm
data
argument
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
JP2021506422A
Other languages
English (en)
Japanese (ja)
Other versions
JPWO2020028950A5 (https=
JP2021534443A5 (https=
JP2021534443A (ja
Inventor
マードック,ヴァーノン
ネティ,ナヴィーン
ケライタ,ジョン
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Haventec Pty Ltd
Original Assignee
Haventec Pty Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from AU2018902873A external-priority patent/AU2018902873A0/en
Application filed by Haventec Pty Ltd filed Critical Haventec Pty Ltd
Publication of JP2021534443A publication Critical patent/JP2021534443A/ja
Publication of JPWO2020028950A5 publication Critical patent/JPWO2020028950A5/ja
Publication of JP2021534443A5 publication Critical patent/JP2021534443A5/ja
Application granted granted Critical
Publication of JP7588854B2 publication Critical patent/JP7588854B2/ja
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/3033Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters details relating to pseudo-prime or prime number generation, e.g. primality test
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0872Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/16Obfuscation or hiding, e.g. involving white box

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
JP2021506422A 2018-08-07 2019-08-07 データをセキュアにするための方法およびシステム Active JP7588854B2 (ja)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
AU2018902873 2018-08-07
AU2018902873A AU2018902873A0 (en) 2018-08-07 A Method and System for Securing Data
PCT/AU2019/050828 WO2020028950A1 (en) 2018-08-07 2019-08-07 A method and system for securing data

Publications (4)

Publication Number Publication Date
JP2021534443A JP2021534443A (ja) 2021-12-09
JPWO2020028950A5 JPWO2020028950A5 (https=) 2022-09-05
JP2021534443A5 JP2021534443A5 (https=) 2022-09-05
JP7588854B2 true JP7588854B2 (ja) 2024-11-25

Family

ID=69413232

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2021506422A Active JP7588854B2 (ja) 2018-08-07 2019-08-07 データをセキュアにするための方法およびシステム

Country Status (9)

Country Link
US (1) US11438156B2 (https=)
EP (1) EP3830730B1 (https=)
JP (1) JP7588854B2 (https=)
CN (1) CN112805704A (https=)
AU (1) AU2019319767B2 (https=)
CA (1) CA3108866A1 (https=)
ES (1) ES3038236T3 (https=)
SG (1) SG11202101201UA (https=)
WO (1) WO2020028950A1 (https=)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SG11202101201UA (en) * 2018-08-07 2021-03-30 Haventec Pty Ltd A method and system for securing data
US11456855B2 (en) * 2019-10-17 2022-09-27 Arm Limited Obfuscating data at-transit
AU2020477732B2 (en) * 2020-11-19 2024-02-01 Ntt, Inc. Estimation device, estimation method, and estimation program
US11777714B2 (en) * 2021-12-17 2023-10-03 Watson Knox Williams, JR. Matrix encryption—a symmetric key encryption technology
CN117688594B (zh) * 2024-02-02 2024-04-16 北京华云安信息技术有限公司 数据库加密混淆的方法、装置、设备及存储介质

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030005005A1 (en) 2001-04-13 2003-01-02 Schmidt Douglas Charles Method and apparatus for generating random number generators
JP2010530081A (ja) 2007-06-15 2010-09-02 ソニー エリクソン モバイル コミュニケーションズ, エービー デバイス依存rsaキーの生成
JP2016535310A (ja) 2013-08-30 2016-11-10 クアルコム,インコーポレイテッド 素数の生成および記憶のための方法および装置

Family Cites Families (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6446205B1 (en) * 1998-12-10 2002-09-03 Citibank, N.A. Cryptosystems with elliptic curves chosen by users
WO2000057290A1 (en) * 1999-03-19 2000-09-28 Hitachi, Ltd. Information processor
US6662299B1 (en) * 1999-10-28 2003-12-09 Pgp Corporation Method and apparatus for reconstituting an encryption key based on multiple user responses
EP1179912A1 (en) * 2000-08-09 2002-02-13 STMicroelectronics S.r.l. Chaotic encryption
WO2006047694A1 (en) * 2004-10-25 2006-05-04 Orsini Rick L Secure data parser method and system
US7685430B1 (en) * 2005-06-17 2010-03-23 Sun Microsystems, Inc. Initial password security accentuated by triple encryption and hashed cache table management on the hosted site's server
US20140108796A1 (en) * 2006-01-26 2014-04-17 Unisys Corporation Storage of cryptographically-split data blocks at geographically-separated locations
US7865730B2 (en) * 2006-01-30 2011-01-04 Kronos Technology Systems Limited Partnership Bcencryption (BCE)—a public-key based method to encrypt a data stream
US8468244B2 (en) * 2007-01-05 2013-06-18 Digital Doors, Inc. Digital information infrastructure and method for security designated data and with granular data stores
AU2015203172B2 (en) 2010-09-20 2016-10-06 Security First Corp. Systems and methods for secure data sharing
US9015281B2 (en) * 2010-10-08 2015-04-21 Brian Lee Moffat Private data sharing system
CN102236766B (zh) * 2011-05-10 2014-04-09 桂林电子科技大学 安全的数据项级数据库加密方法
US8958547B2 (en) * 2012-01-06 2015-02-17 International Business Machines Corporation Generation of relative prime numbers for use in cryptography
US20140082376A1 (en) * 2012-09-14 2014-03-20 Texas Tech University System System, Method and Apparatus for Securely Saving/Retrieving Data on a Data Storage
US9472189B2 (en) * 2012-11-02 2016-10-18 Sony Corporation Language processing method and integrated circuit
US20140164790A1 (en) * 2012-12-06 2014-06-12 David Dodgson Storage security using cryptographic splitting
US9374224B2 (en) * 2013-04-18 2016-06-21 RISOFTDEV, Inc. System and methods for encrypting data
CN105282090B (zh) * 2014-06-03 2018-11-27 江南大学 一种互联网上防非法访问的公开url加密编码方法
WO2016130030A1 (en) * 2015-02-10 2016-08-18 Nord-Systems Sp. Z O.O. Method of securing data using threshold cryptography
KR101675088B1 (ko) * 2015-04-30 2016-11-10 성균관대학교산학협력단 Mtc에서의 네트워크와의 상호 인증 방법 및 시스템
CN105005718B (zh) * 2015-06-23 2018-02-13 电子科技大学 一种利用马尔可夫链实现代码混淆的方法
US10725990B2 (en) * 2015-12-01 2020-07-28 Facebook, Inc. Co-prime hashing
CN105763322B (zh) * 2016-04-13 2019-01-25 同济大学 一种可混淆的加密密钥隔离数字签名方法及系统
AU2019280577A1 (en) * 2018-06-04 2021-01-21 Foogal, Inc. Utility token-based systems and methods
US11184157B1 (en) * 2018-06-13 2021-11-23 Amazon Technologies, Inc. Cryptographic key generation and deployment
SG11202101201UA (en) * 2018-08-07 2021-03-30 Haventec Pty Ltd A method and system for securing data

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030005005A1 (en) 2001-04-13 2003-01-02 Schmidt Douglas Charles Method and apparatus for generating random number generators
JP2010530081A (ja) 2007-06-15 2010-09-02 ソニー エリクソン モバイル コミュニケーションズ, エービー デバイス依存rsaキーの生成
JP2016535310A (ja) 2013-08-30 2016-11-10 クアルコム,インコーポレイテッド 素数の生成および記憶のための方法および装置

Also Published As

Publication number Publication date
CA3108866A1 (en) 2020-02-13
CN112805704A (zh) 2021-05-14
WO2020028950A1 (en) 2020-02-13
AU2019319767A1 (en) 2021-03-11
US11438156B2 (en) 2022-09-06
EP3830730A1 (en) 2021-06-09
US20210320795A1 (en) 2021-10-14
EP3830730A4 (en) 2021-09-01
ES3038236T3 (en) 2025-10-10
SG11202101201UA (en) 2021-03-30
EP3830730C0 (en) 2025-06-11
JP2021534443A (ja) 2021-12-09
AU2019319767B2 (en) 2022-12-08
EP3830730B1 (en) 2025-06-11

Similar Documents

Publication Publication Date Title
JP7588854B2 (ja) データをセキュアにするための方法およびシステム
US11818262B2 (en) Method and system for one-to-many symmetric cryptography and a network employing the same
US7676040B2 (en) Changing encryption key of encrypted data
US9077537B2 (en) Generating secure private keys for use in a public key communications environment
US20180054316A1 (en) Multiple Secrets in Quorum Based Data Processing
KR20180115701A (ko) 지갑 관리 시스템과 연계된 블록 체인 기반 시스템을 위한 암호키의 안전한 다기관 손실 방지 저장 및 전송
JP6961324B2 (ja) 検索可能暗号処理システム
CN112737783B (zh) 一种基于sm2椭圆曲线的解密方法及设备
Baby et al. Combined Strength of Steganography and Cryptography-A Literature Survey.
Kumari et al. One time pad encryption technique in cryptography
Veeraragavan et al. Enhanced encryption algorithm (EEA) for protecting users' credentials in public cloud
Domada et al. Super-Encryption with Pell-Lucas Matrices and Graphs via Laplace Transformations
Sri et al. Concealing the Data Using Cryptography
Pawar et al. Survey of cryptography techniques for data security
CN120471621B (zh) 基于5g融合应用的珠宝交易数据安全与隐私保护方法
US12254104B1 (en) Hidden compartments in data encrypted using machine learning
Reddy et al. Data Storage on Cloud using Split-Merge and Hybrid Cryptographic Techniques
Shaik et al. A compatible hexadecimal encryption-booster algorithm for augmenting security in the advanced encryption standard
Mary Sheeba et al. Hybrid Security for Data in Cloud Computing: A Review
Jain et al. Data Privacy Using Cryptographic Approaches
Raghuwanshi et al. A secure transmission of 2D image using randomized chaotic mapping
Pulyala et al. Portable Cloud-Based Data Storage Security Using Dual Encryption
CN121009583A (zh) 一种基于同态加密的密文检索方法及系统
Shukur Transmitted Data Encryption Using RC4 Algorithm Via Proposed Multi-tier Infrastructure Environment
Christie Aiswarya et al. Secure Data Concealing Using Diamond Encoding Method

Legal Events

Date Code Title Description
A529 Written submission of copy of amendment under article 34 pct

Free format text: JAPANESE INTERMEDIATE CODE: A529

Effective date: 20210319

A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20220805

A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20220805

A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20220826

A977 Report on retrieval

Free format text: JAPANESE INTERMEDIATE CODE: A971007

Effective date: 20230726

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20230829

A601 Written request for extension of time

Free format text: JAPANESE INTERMEDIATE CODE: A601

Effective date: 20231124

A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20240124

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20240402

A601 Written request for extension of time

Free format text: JAPANESE INTERMEDIATE CODE: A601

Effective date: 20240625

A601 Written request for extension of time

Free format text: JAPANESE INTERMEDIATE CODE: A601

Effective date: 20240829

A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20240925

TRDD Decision of grant or rejection written
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 20241008

A61 First payment of annual fees (during grant procedure)

Free format text: JAPANESE INTERMEDIATE CODE: A61

Effective date: 20241106

R150 Certificate of patent or registration of utility model

Ref document number: 7588854

Country of ref document: JP

Free format text: JAPANESE INTERMEDIATE CODE: R150