WO2009133397A1 - Secure data cache - Google Patents
Secure data cache Download PDFInfo
- Publication number
- WO2009133397A1 WO2009133397A1 PCT/GB2009/050438 GB2009050438W WO2009133397A1 WO 2009133397 A1 WO2009133397 A1 WO 2009133397A1 GB 2009050438 W GB2009050438 W GB 2009050438W WO 2009133397 A1 WO2009133397 A1 WO 2009133397A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- electronic document
- cache
- cryptographic key
- unique cryptographic
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
Abstract
Description
Claims
Priority Applications (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020107026659A KR101656434B1 (en) | 2008-04-29 | 2009-04-29 | Secure data cache |
JP2011506780A JP5623388B2 (en) | 2008-04-29 | 2009-04-29 | Secure data cache |
CN200980115549.2A CN102016862B (en) | 2008-04-29 | 2009-04-29 | secure data cache |
DK09738427.5T DK2272021T3 (en) | 2008-04-29 | 2009-04-29 | SECURE DATACACHE |
ES09738427.5T ES2599615T3 (en) | 2008-04-29 | 2009-04-29 | Secure data cache |
EP09738427.5A EP2272021B1 (en) | 2008-04-29 | 2009-04-29 | Secure data cache |
US12/937,980 US20110138191A1 (en) | 2008-04-29 | 2009-04-29 | Secure data cache |
US15/597,022 US20170249471A1 (en) | 2008-04-29 | 2017-05-16 | Secure Data Cache |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0807753.9 | 2008-04-29 | ||
GB0807753.9A GB2459662B (en) | 2008-04-29 | 2008-04-29 | Secure data cache |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/937,980 A-371-Of-International US20110138191A1 (en) | 2008-04-29 | 2009-04-29 | Secure data cache |
US15/597,022 Continuation US20170249471A1 (en) | 2008-04-29 | 2017-05-16 | Secure Data Cache |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2009133397A1 true WO2009133397A1 (en) | 2009-11-05 |
Family
ID=39522724
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/GB2009/050438 WO2009133397A1 (en) | 2008-04-29 | 2009-04-29 | Secure data cache |
Country Status (10)
Country | Link |
---|---|
US (2) | US20110138191A1 (en) |
EP (1) | EP2272021B1 (en) |
JP (1) | JP5623388B2 (en) |
KR (1) | KR101656434B1 (en) |
CN (1) | CN102016862B (en) |
DK (1) | DK2272021T3 (en) |
ES (1) | ES2599615T3 (en) |
GB (1) | GB2459662B (en) |
PL (1) | PL2272021T3 (en) |
WO (1) | WO2009133397A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2290876A1 (en) * | 2009-08-24 | 2011-03-02 | Gemalto SA | Method for establishing an electronic authorisation for a user having an electronic identity document and method for controlling said authorization. |
Families Citing this family (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7162035B1 (en) | 2000-05-24 | 2007-01-09 | Tracer Detection Technology Corp. | Authentication method and system |
US8171567B1 (en) | 2002-09-04 | 2012-05-01 | Tracer Detection Technology Corp. | Authentication method and system |
US7995196B1 (en) | 2008-04-23 | 2011-08-09 | Tracer Detection Technology Corp. | Authentication method and system |
US8687902B2 (en) * | 2012-03-29 | 2014-04-01 | Intel Corporation | System, method, and computer program product for decompression of block compressed images |
US10469663B2 (en) | 2014-03-25 | 2019-11-05 | Intellisist, Inc. | Computer-implemented system and method for protecting sensitive information within a call center in real time |
FR3021435B1 (en) * | 2014-05-23 | 2017-09-22 | Oberthur Technologies | METHOD FOR DIFFUSION OF DATA FROM IDENTIAL DOCUMENTS |
US20150363334A1 (en) * | 2014-06-16 | 2015-12-17 | Texas Instruments Incorporated | Speculative cryptographic processing for out of order data |
DE102014010339A1 (en) * | 2014-07-11 | 2016-01-14 | Giesecke & Devrient Gmbh | Method for reading out an identity document |
EP2983143A1 (en) * | 2014-08-06 | 2016-02-10 | Gemalto SA | Security management system for revoking a token from at least one service provider terminal of a service provider system |
EP3018606A1 (en) * | 2014-11-04 | 2016-05-11 | HDS Group S.A. | Systems and methods for enhanced document recognition and security |
US9910655B1 (en) * | 2014-11-06 | 2018-03-06 | Accellion, Inc. | Secure content platform software developer kit |
US10867310B2 (en) * | 2014-11-14 | 2020-12-15 | Oath Inc. | Systems and methods for determining segments of online users from correlated datasets |
US9639687B2 (en) | 2014-11-18 | 2017-05-02 | Cloudfare, Inc. | Multiply-encrypting data requiring multiple keys for decryption |
US10146797B2 (en) * | 2015-05-29 | 2018-12-04 | Accenture Global Services Limited | Face recognition image data cache |
JP6682816B2 (en) | 2015-11-16 | 2020-04-15 | 富士通株式会社 | Secret information storage method, information processing terminal, and secret information storage program |
US10469487B1 (en) | 2016-05-31 | 2019-11-05 | Wells Fargo Bank, N.A. | Biometric electronic signature authenticated key exchange token |
CN107453759B (en) * | 2016-06-01 | 2020-08-28 | 卡斯柯信号有限公司 | Data delay transmission safety processing method in safety coding system |
GB2551051A (en) * | 2016-06-02 | 2017-12-06 | Univ Plymouth | Method of associating a person with a digital object |
JP6085783B1 (en) * | 2016-07-20 | 2017-03-01 | AI inside株式会社 | Data processing apparatus, method and program |
US10754978B2 (en) * | 2016-07-29 | 2020-08-25 | Intellisist Inc. | Computer-implemented system and method for storing and retrieving sensitive information |
BR102016029934A8 (en) * | 2016-12-20 | 2023-05-09 | Ferreira De Souza Antonio | PERSON SEARCH SYSTEM AND VERIFICATION OF AUTHENTICITY OF IDENTIFICATION DOCUMENTS THROUGH RECOGNITION BY FACIAL BIOMETRY WITH VALIDATION BY READING DOCUMENT DATA BY APPROXIMATION, DIGITAL BIOMETRY, PASSWORD OR OTHER MEANS, WITH ACCESSIBILITY FOR PEOPLE WITH VISUAL NEEDS (IT HAS SOFTW ARE AND EMBARKED MOBILE APPLICATION) |
US10855473B1 (en) * | 2017-12-15 | 2020-12-01 | Wells Fargo Bank, N.A. | Systems and methods for biometric electronic signature agreement and intention |
EP3509003B1 (en) * | 2018-01-04 | 2021-04-21 | Shenzhen Goodix Technology Co., Ltd. | Method and apparatus to protect code processed by an embedded micro-processor against altering |
CN111902841A (en) * | 2018-04-13 | 2020-11-06 | 株式会社劳得系统 | Mobile passport, mobile passport generation system, and mobile passport authentication method |
CN109639436A (en) * | 2019-01-04 | 2019-04-16 | 平安科技(深圳)有限公司 | The data property held verification method and terminal device based on salt figure |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002103496A2 (en) * | 2001-06-18 | 2002-12-27 | Daon Holdings Limited | An electronic data vault providing biometrically protected electronic signatures |
US20040153458A1 (en) * | 2002-11-08 | 2004-08-05 | Noble Brian D. | Peer-to-peer method and system for performing and managing backups in a network of nodes |
DE102006037879A1 (en) * | 2006-08-11 | 2008-02-14 | Bundesdruckerei Gmbh | Document reader, method of reading a data object and computer program product |
Family Cites Families (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH06259451A (en) * | 1993-01-11 | 1994-09-16 | Kyocera Corp | Device and method for collating signature |
WO1998047259A2 (en) * | 1997-03-10 | 1998-10-22 | Fielder Guy L | File encryption method and system |
US7111173B1 (en) * | 1998-09-01 | 2006-09-19 | Tecsec, Inc. | Encryption process including a biometric unit |
US6577735B1 (en) * | 1999-02-12 | 2003-06-10 | Hewlett-Packard Development Company, L.P. | System and method for backing-up data stored on a portable audio player |
JP2000358025A (en) * | 1999-06-15 | 2000-12-26 | Nec Corp | Information processing method, information processor and recording medium storing information processing program |
JP2002269051A (en) * | 2001-03-14 | 2002-09-20 | Nippon Telegr & Teleph Corp <Ntt> | Method and system for user authentication |
US7400726B2 (en) * | 2003-07-07 | 2008-07-15 | Mitsubishi Denki Kabushiki Kaisha | Apparatus for preventing unauthorized use of a copyrighted medium |
AU2004201058B1 (en) * | 2004-03-15 | 2004-09-09 | Lockstep Consulting Pty Ltd | Means and method of issuing Anonymous Public Key Certificates for indexing electronic record systems |
JP4304102B2 (en) * | 2004-03-16 | 2009-07-29 | 大日本印刷株式会社 | IC card |
US7475247B2 (en) * | 2004-12-16 | 2009-01-06 | International Business Machines Corporation | Method for using a portable computing device as a smart key device |
JP2006185201A (en) * | 2004-12-28 | 2006-07-13 | Toppan Printing Co Ltd | Content delivery server, content reproduction device, program, security chip, and content biometric authentication method and system |
WO2006137117A1 (en) * | 2005-06-20 | 2006-12-28 | Hewlett-Packard Development Company, L.P. | Information access control system and method thereof |
US20070049310A1 (en) * | 2005-08-29 | 2007-03-01 | Iomega Corporation | Data storage device with wireless interface for autonomous operation |
KR100906067B1 (en) * | 2005-09-22 | 2009-07-03 | 주식회사 케이티 | Standard file generation method using a steganography technology, and apparatus and method to validate the integrity of a metadata in its |
WO2007035062A1 (en) * | 2005-09-22 | 2007-03-29 | Kt Corporation | Method for generating standard file based on steganography technology, and apparatus and method for validating integrity of metadata in the standard file |
JP2008033805A (en) * | 2006-07-31 | 2008-02-14 | Nec Corp | Personal information protection system, personal information protection method and personal information protection program |
US8058972B2 (en) * | 2007-05-09 | 2011-11-15 | University Of North Texas | Methods and devices for enrollment and verification of biometric information in identification documents |
US8347098B2 (en) | 2007-05-22 | 2013-01-01 | Apple Inc. | Media storage structures for storing content, devices for using such structures, systems for distributing such structures |
-
2008
- 2008-04-29 GB GB0807753.9A patent/GB2459662B/en active Active
-
2009
- 2009-04-29 JP JP2011506780A patent/JP5623388B2/en active Active
- 2009-04-29 KR KR1020107026659A patent/KR101656434B1/en active IP Right Grant
- 2009-04-29 DK DK09738427.5T patent/DK2272021T3/en active
- 2009-04-29 EP EP09738427.5A patent/EP2272021B1/en active Active
- 2009-04-29 US US12/937,980 patent/US20110138191A1/en not_active Abandoned
- 2009-04-29 ES ES09738427.5T patent/ES2599615T3/en active Active
- 2009-04-29 WO PCT/GB2009/050438 patent/WO2009133397A1/en active Application Filing
- 2009-04-29 CN CN200980115549.2A patent/CN102016862B/en active Active
- 2009-04-29 PL PL09738427.5T patent/PL2272021T3/en unknown
-
2017
- 2017-05-16 US US15/597,022 patent/US20170249471A1/en not_active Abandoned
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002103496A2 (en) * | 2001-06-18 | 2002-12-27 | Daon Holdings Limited | An electronic data vault providing biometrically protected electronic signatures |
US20040153458A1 (en) * | 2002-11-08 | 2004-08-05 | Noble Brian D. | Peer-to-peer method and system for performing and managing backups in a network of nodes |
DE102006037879A1 (en) * | 2006-08-11 | 2008-02-14 | Bundesdruckerei Gmbh | Document reader, method of reading a data object and computer program product |
Non-Patent Citations (3)
Title |
---|
FOURNEL T ET AL: "Self-encryption for paper document authentication", JOURNAL OF PHYSICS: CONFERENCE SERIES, INSTITUTE OF PHYSICS PUBLISHING, BRISTOL, GB, vol. 77, no. 1, 1 July 2007 (2007-07-01), pages 12007, XP020125229, ISSN: 1742-6596 * |
JAAP-HENK HOEPMAN ET AL: "Crossing Borders: Security and Privacy Issues of the European e-Passport", ADVANCES IN INFORMATION AND COMPUTER SECURITY LECTURE NOTES IN COMPUTER SCIENCE;;LNCS, SPRINGER, BERLIN, DE, vol. 4266, 1 January 2006 (2006-01-01), pages 152 - 167, XP019047433, ISBN: 978-3-540-47699-3 * |
SCHNEIER: "Cryptographic protection of databases", APPLIED CRYPTOGRAPHY, XX, XX, 1 January 1996 (1996-01-01), pages 73 - 74, XP002958299 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2290876A1 (en) * | 2009-08-24 | 2011-03-02 | Gemalto SA | Method for establishing an electronic authorisation for a user having an electronic identity document and method for controlling said authorization. |
WO2011023555A1 (en) * | 2009-08-24 | 2011-03-03 | Gemalto Sa | Method for establishing an electronic authorization for a user bearing an electronic identity document, and method for supervising said authorization |
Also Published As
Publication number | Publication date |
---|---|
DK2272021T3 (en) | 2016-11-21 |
GB2459662A (en) | 2009-11-04 |
PL2272021T3 (en) | 2016-12-30 |
JP2011519102A (en) | 2011-06-30 |
CN102016862A (en) | 2011-04-13 |
EP2272021B1 (en) | 2016-07-27 |
KR20110018331A (en) | 2011-02-23 |
GB0807753D0 (en) | 2008-06-04 |
CN102016862B (en) | 2015-08-05 |
KR101656434B1 (en) | 2016-09-22 |
GB2459662B (en) | 2012-05-23 |
JP5623388B2 (en) | 2014-11-12 |
ES2599615T3 (en) | 2017-02-02 |
EP2272021A1 (en) | 2011-01-12 |
US20170249471A1 (en) | 2017-08-31 |
US20110138191A1 (en) | 2011-06-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2272021B1 (en) | Secure data cache | |
US11531781B2 (en) | Encryption scheme for making secure patient data available to authorized parties | |
EP2731046B1 (en) | Client computer for querying a database stored on a server via a network | |
CN111079171A (en) | Block chain-based medical data privacy protection method and storage medium | |
CN101484927A (en) | Method for encrypting and decrypting shared encrypted files | |
JPH10198606A (en) | Method and system for safely transferring and preserving protection enabled information | |
CN106022155A (en) | Method and server for security management in database | |
CN112530531B (en) | Electronic medical record storage and sharing method based on double-block chain | |
CN104239820A (en) | Secure storage device | |
KR102120942B1 (en) | Medical Block Chain System | |
US10956909B2 (en) | Systems and methods for identity atomization and usage | |
JP4047573B2 (en) | Electronic information management apparatus and program | |
CN110445756B (en) | Method for realizing searchable encryption audit logs in cloud storage | |
CN113806785A (en) | Method and system for carrying out safety protection on electronic document | |
EP4070519A1 (en) | Method, computer program and data sharing system for sharing user-specific data of a user | |
JP2011514060A (en) | System for controlled data exchange between at least two data carriers via mobile read / write memory | |
TWI444849B (en) | System for monitoring personal data file based on server verifying and authorizing to decrypt and method thereof | |
KR101049472B1 (en) | A portable USB security module device, a method of registering and querying a document file using the portable USB security module device, and a program recording medium for executing the method | |
CN112182628B (en) | Privacy information security access method and device | |
US20240107318A1 (en) | A method and a system for securely sharing datasets via glyphs | |
EP3616108A1 (en) | Systems and methods for identity atomization and usage | |
NZ758522B2 (en) | Systems and methods for identity atomization and usage | |
Abdallah et al. | An Efficient Framework for Storing and Retrieving Unstructured Patient Health Records in the Cloud. | |
KONDAREDDY et al. | Self-Determining Approach to Encrypted Cloud Databases | |
CN110914821A (en) | System and method for identity atomization and use |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200980115549.2 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09738427 Country of ref document: EP Kind code of ref document: A1 |
|
REEP | Request for entry into the european phase |
Ref document number: 2009738427 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2009738427 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2011506780 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 8100/DELNP/2010 Country of ref document: IN |
|
ENP | Entry into the national phase |
Ref document number: 20107026659 Country of ref document: KR Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 12937980 Country of ref document: US |