WO2020028950A1 - A method and system for securing data - Google Patents
A method and system for securing data Download PDFInfo
- Publication number
- WO2020028950A1 WO2020028950A1 PCT/AU2019/050828 AU2019050828W WO2020028950A1 WO 2020028950 A1 WO2020028950 A1 WO 2020028950A1 AU 2019050828 W AU2019050828 W AU 2019050828W WO 2020028950 A1 WO2020028950 A1 WO 2020028950A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data item
- character string
- algorithm
- environment
- argument
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/3033—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters details relating to pseudo-prime or prime number generation, e.g. primality test
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0872—Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/16—Obfuscation or hiding, e.g. involving white box
Definitions
- the mathematical disassembly step includes use of a disassembly key as a parameter in the algorithm which splits the encrypted data item into component parts.
- the data item is stored with reference to a credential.
- an argument is the second data item argument .
- an argument is the first data item argument .
- the second data item argument is the numerical value delta.
- the first data item argument is an ASCII look up table.
- the arguments comprise one or more of first modified data item character string, the second modified data item character string, the first data item argument and the second data item argument.
- the algorithm is irreversible such that the data item character string 16 input into the algorithm 17 cannot be obtained merely having possession of one or other of others of the arguments of the algorithm.
- the public key is used in combination with the additional prime number are used to calculate the initial prime number using the predetermined public key algorithm
- Figure 2 is a flowchart of the steps to perform at least a first embodiment of the system of the present invention
- the location separation is by geographic separation whereby the at least a first component part is stored in a first geographic location and the at least a second component part is stored in a second geographic location and wherein the first geographic location is geographically separated from the second geographic location.
- the data item 11 including the data item character string 13 is deleted from the first environment once one or more of the algorithms have been applied.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Priority Applications (8)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| AU2019319767A AU2019319767B2 (en) | 2018-08-07 | 2019-08-07 | A method and system for securing data |
| EP19848073.3A EP3830730B1 (en) | 2018-08-07 | 2019-08-07 | A method and system for securing data |
| SG11202101201UA SG11202101201UA (en) | 2018-08-07 | 2019-08-07 | A method and system for securing data |
| CA3108866A CA3108866A1 (en) | 2018-08-07 | 2019-08-07 | A method and system for securing data |
| CN201980065945.2A CN112805704A (zh) | 2018-08-07 | 2019-08-07 | 保护数据的方法和系统 |
| JP2021506422A JP7588854B2 (ja) | 2018-08-07 | 2019-08-07 | データをセキュアにするための方法およびシステム |
| ES19848073T ES3038236T3 (en) | 2018-08-07 | 2019-08-07 | A method and system for securing data |
| US17/266,537 US11438156B2 (en) | 2018-08-07 | 2019-08-07 | Method and system for securing data |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| AU2018902873 | 2018-08-07 | ||
| AU2018902873A AU2018902873A0 (en) | 2018-08-07 | A Method and System for Securing Data |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2020028950A1 true WO2020028950A1 (en) | 2020-02-13 |
Family
ID=69413232
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/AU2019/050828 Ceased WO2020028950A1 (en) | 2018-08-07 | 2019-08-07 | A method and system for securing data |
Country Status (9)
| Country | Link |
|---|---|
| US (1) | US11438156B2 (https=) |
| EP (1) | EP3830730B1 (https=) |
| JP (1) | JP7588854B2 (https=) |
| CN (1) | CN112805704A (https=) |
| AU (1) | AU2019319767B2 (https=) |
| CA (1) | CA3108866A1 (https=) |
| ES (1) | ES3038236T3 (https=) |
| SG (1) | SG11202101201UA (https=) |
| WO (1) | WO2020028950A1 (https=) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20230412624A1 (en) * | 2020-11-19 | 2023-12-21 | Nippon Telegraph And Telephone Corporation | Estimation device, estimation method, and estimation program |
Families Citing this family (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| SG11202101201UA (en) * | 2018-08-07 | 2021-03-30 | Haventec Pty Ltd | A method and system for securing data |
| US11456855B2 (en) * | 2019-10-17 | 2022-09-27 | Arm Limited | Obfuscating data at-transit |
| US11777714B2 (en) * | 2021-12-17 | 2023-10-03 | Watson Knox Williams, JR. | Matrix encryption—a symmetric key encryption technology |
| CN117688594B (zh) * | 2024-02-02 | 2024-04-16 | 北京华云安信息技术有限公司 | 数据库加密混淆的方法、装置、设备及存储介质 |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20090254572A1 (en) | 2007-01-05 | 2009-10-08 | Redlich Ron M | Digital information infrastructure and method |
| US20140082376A1 (en) * | 2012-09-14 | 2014-03-20 | Texas Tech University System | System, Method and Apparatus for Securely Saving/Retrieving Data on a Data Storage |
| US20140108796A1 (en) * | 2006-01-26 | 2014-04-17 | Unisys Corporation | Storage of cryptographically-split data blocks at geographically-separated locations |
| US20140164790A1 (en) * | 2012-12-06 | 2014-06-12 | David Dodgson | Storage security using cryptographic splitting |
| WO2016130030A1 (en) * | 2015-02-10 | 2016-08-18 | Nord-Systems Sp. Z O.O. | Method of securing data using threshold cryptography |
| AU2015203172B2 (en) * | 2010-09-20 | 2016-10-06 | Security First Corp. | Systems and methods for secure data sharing |
Family Cites Families (23)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6446205B1 (en) * | 1998-12-10 | 2002-09-03 | Citibank, N.A. | Cryptosystems with elliptic curves chosen by users |
| WO2000057290A1 (en) * | 1999-03-19 | 2000-09-28 | Hitachi, Ltd. | Information processor |
| US6662299B1 (en) * | 1999-10-28 | 2003-12-09 | Pgp Corporation | Method and apparatus for reconstituting an encryption key based on multiple user responses |
| EP1179912A1 (en) * | 2000-08-09 | 2002-02-13 | STMicroelectronics S.r.l. | Chaotic encryption |
| US6691141B2 (en) * | 2001-04-13 | 2004-02-10 | Science Applications International Corp. | Method and apparatus for generating random number generators |
| WO2006047694A1 (en) * | 2004-10-25 | 2006-05-04 | Orsini Rick L | Secure data parser method and system |
| US7685430B1 (en) * | 2005-06-17 | 2010-03-23 | Sun Microsystems, Inc. | Initial password security accentuated by triple encryption and hashed cache table management on the hosted site's server |
| US7865730B2 (en) * | 2006-01-30 | 2011-01-04 | Kronos Technology Systems Limited Partnership | Bcencryption (BCE)—a public-key based method to encrypt a data stream |
| US8472620B2 (en) * | 2007-06-15 | 2013-06-25 | Sony Corporation | Generation of device dependent RSA key |
| US9015281B2 (en) * | 2010-10-08 | 2015-04-21 | Brian Lee Moffat | Private data sharing system |
| CN102236766B (zh) * | 2011-05-10 | 2014-04-09 | 桂林电子科技大学 | 安全的数据项级数据库加密方法 |
| US8958547B2 (en) * | 2012-01-06 | 2015-02-17 | International Business Machines Corporation | Generation of relative prime numbers for use in cryptography |
| US9472189B2 (en) * | 2012-11-02 | 2016-10-18 | Sony Corporation | Language processing method and integrated circuit |
| US9374224B2 (en) * | 2013-04-18 | 2016-06-21 | RISOFTDEV, Inc. | System and methods for encrypting data |
| US9800407B2 (en) * | 2013-08-30 | 2017-10-24 | Qualcomm Incorporated | Methods and apparatuses for prime number generation and storage |
| CN105282090B (zh) * | 2014-06-03 | 2018-11-27 | 江南大学 | 一种互联网上防非法访问的公开url加密编码方法 |
| KR101675088B1 (ko) * | 2015-04-30 | 2016-11-10 | 성균관대학교산학협력단 | Mtc에서의 네트워크와의 상호 인증 방법 및 시스템 |
| CN105005718B (zh) * | 2015-06-23 | 2018-02-13 | 电子科技大学 | 一种利用马尔可夫链实现代码混淆的方法 |
| US10725990B2 (en) * | 2015-12-01 | 2020-07-28 | Facebook, Inc. | Co-prime hashing |
| CN105763322B (zh) * | 2016-04-13 | 2019-01-25 | 同济大学 | 一种可混淆的加密密钥隔离数字签名方法及系统 |
| AU2019280577A1 (en) * | 2018-06-04 | 2021-01-21 | Foogal, Inc. | Utility token-based systems and methods |
| US11184157B1 (en) * | 2018-06-13 | 2021-11-23 | Amazon Technologies, Inc. | Cryptographic key generation and deployment |
| SG11202101201UA (en) * | 2018-08-07 | 2021-03-30 | Haventec Pty Ltd | A method and system for securing data |
-
2019
- 2019-08-07 SG SG11202101201UA patent/SG11202101201UA/en unknown
- 2019-08-07 CN CN201980065945.2A patent/CN112805704A/zh active Pending
- 2019-08-07 JP JP2021506422A patent/JP7588854B2/ja active Active
- 2019-08-07 EP EP19848073.3A patent/EP3830730B1/en active Active
- 2019-08-07 AU AU2019319767A patent/AU2019319767B2/en active Active
- 2019-08-07 ES ES19848073T patent/ES3038236T3/es active Active
- 2019-08-07 CA CA3108866A patent/CA3108866A1/en active Pending
- 2019-08-07 US US17/266,537 patent/US11438156B2/en active Active
- 2019-08-07 WO PCT/AU2019/050828 patent/WO2020028950A1/en not_active Ceased
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20140108796A1 (en) * | 2006-01-26 | 2014-04-17 | Unisys Corporation | Storage of cryptographically-split data blocks at geographically-separated locations |
| US20090254572A1 (en) | 2007-01-05 | 2009-10-08 | Redlich Ron M | Digital information infrastructure and method |
| AU2015203172B2 (en) * | 2010-09-20 | 2016-10-06 | Security First Corp. | Systems and methods for secure data sharing |
| US20140082376A1 (en) * | 2012-09-14 | 2014-03-20 | Texas Tech University System | System, Method and Apparatus for Securely Saving/Retrieving Data on a Data Storage |
| US20140164790A1 (en) * | 2012-12-06 | 2014-06-12 | David Dodgson | Storage security using cryptographic splitting |
| WO2016130030A1 (en) * | 2015-02-10 | 2016-08-18 | Nord-Systems Sp. Z O.O. | Method of securing data using threshold cryptography |
Non-Patent Citations (3)
| Title |
|---|
| BALASARASWATHI, V.R. ET AL.: "Enhanced security for multi-cloud storage using cryptographic data splitting with dynamic approach", 2014 IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS, CONTROL AND COMPUTING TECHNOLOGIES, RAMANATHAPURAM, 2014, pages 1190 - 1194, XP032727169, Retrieved from the Internet <URL:http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7019286&isnumber=7019129> [retrieved on 20181126], DOI: 10.1109/ICACCCT.2014.7019286 * |
| ELETTE BOYLE ET AL.: "Homomorphic Secret Sharing: Optimizations and Applications", IACR, INTERNATIONAL ASSOCIATION FOR CRYPTOLOGIC RESEARCH, 11 May 2018 (2018-05-11), pages 1 - 58, XP061025755 |
| See also references of EP3830730A4 |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20230412624A1 (en) * | 2020-11-19 | 2023-12-21 | Nippon Telegraph And Telephone Corporation | Estimation device, estimation method, and estimation program |
| US12513171B2 (en) * | 2020-11-19 | 2025-12-30 | Ntt, Inc. | Estimation device, estimation method, and estimation program |
Also Published As
| Publication number | Publication date |
|---|---|
| CA3108866A1 (en) | 2020-02-13 |
| CN112805704A (zh) | 2021-05-14 |
| AU2019319767A1 (en) | 2021-03-11 |
| US11438156B2 (en) | 2022-09-06 |
| EP3830730A1 (en) | 2021-06-09 |
| JP7588854B2 (ja) | 2024-11-25 |
| US20210320795A1 (en) | 2021-10-14 |
| EP3830730A4 (en) | 2021-09-01 |
| ES3038236T3 (en) | 2025-10-10 |
| SG11202101201UA (en) | 2021-03-30 |
| EP3830730C0 (en) | 2025-06-11 |
| JP2021534443A (ja) | 2021-12-09 |
| AU2019319767B2 (en) | 2022-12-08 |
| EP3830730B1 (en) | 2025-06-11 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| AU2019319767B2 (en) | A method and system for securing data | |
| US10616213B2 (en) | Password manipulation for secure account creation and verification through third-party servers | |
| CN106548345B (zh) | 基于密钥分割实现区块链私钥保护的方法及系统 | |
| KR102717212B1 (ko) | 지갑 관리 시스템과 연계된 블록 체인 기반 시스템을 위한 암호키의 안전한 다기관 손실 방지 저장 및 전송 | |
| US9673975B1 (en) | Cryptographic key splitting for offline and online data protection | |
| US7676040B2 (en) | Changing encryption key of encrypted data | |
| US20180054316A1 (en) | Multiple Secrets in Quorum Based Data Processing | |
| US10089627B2 (en) | Cryptographic authentication and identification method using real-time encryption | |
| CN107453880B (zh) | 一种云数据安全存储方法和系统 | |
| US20100031045A1 (en) | Methods and system and computer medium for loading a set of keys | |
| CN109218251B (zh) | 一种防重放的认证方法及系统 | |
| EP3292654B1 (en) | A security approach for storing credentials for offline use and copy-protected vault content in devices | |
| CN112737783A (zh) | 一种基于sm2椭圆曲线的解密方法及设备 | |
| US11601291B2 (en) | Authentication method and device for matrix pattern authentication | |
| CA2913571A1 (en) | Multi-platform user authentication device with double and multilaterally blind on-the-fly key generation | |
| TWI430643B (zh) | Secure key recovery system and method | |
| Pawar et al. | Survey of cryptography techniques for data security | |
| Sri et al. | Concealing the Data Using Cryptography | |
| Reddy et al. | Data Storage on Cloud using Split-Merge and Hybrid Cryptographic Techniques | |
| Shrivas et al. | Migration Model for un secure Database driven Software System to Secure System using Cryptography | |
| CN110138545A (zh) | 一种隐私数据的保护方法和系统 | |
| Priya et al. | Securing data on the cloud server by the user authentication and data security techniques | |
| WO2026088824A1 (ja) | 情報処理装置および情報処理方法 | |
| HK40046880B (en) | Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system | |
| TW201947434A (zh) | 應用程式的登入方法 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19848073 Country of ref document: EP Kind code of ref document: A1 |
|
| DPE1 | Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101) | ||
| ENP | Entry into the national phase |
Ref document number: 3108866 Country of ref document: CA Ref document number: 2021506422 Country of ref document: JP Kind code of ref document: A |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| ENP | Entry into the national phase |
Ref document number: 2019319767 Country of ref document: AU Date of ref document: 20190807 Kind code of ref document: A |
|
| ENP | Entry into the national phase |
Ref document number: 2019848073 Country of ref document: EP Effective date: 20210305 |
|
| WWG | Wipo information: grant in national office |
Ref document number: 2019848073 Country of ref document: EP |