CA2481577A1 - A secure information storage system using data splitting and separate storage - Google Patents
A secure information storage system using data splitting and separate storage Download PDFInfo
- Publication number
- CA2481577A1 CA2481577A1 CA002481577A CA2481577A CA2481577A1 CA 2481577 A1 CA2481577 A1 CA 2481577A1 CA 002481577 A CA002481577 A CA 002481577A CA 2481577 A CA2481577 A CA 2481577A CA 2481577 A1 CA2481577 A1 CA 2481577A1
- Authority
- CA
- Canada
- Prior art keywords
- data
- information
- identifier
- encoded
- predetermined use
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/22—Payment schemes or models
- G06Q20/24—Credit schemes, i.e. "pay after"
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/385—Payment protocols; Details thereof using an alias or single-use codes
Abstract
A system for storing information having a predetermined use which requires the information to be secured. The information may comprise credit card details used to complete a transaction. The system includes: (a) A client system for storing an encoded version of the information and an identifier. The encoded version is generated from first data of the information and an encoded version of the second data of the information. The information can be generated from the first data and the second data, and the predetermined use is infeasible with only one of the first data and the second data. (b) A remote server for storing the second data and an encoded identifier generated from the identifier. The client system sends at least the encoded version of the second data to the remote server. The client system or the remote server is able to generate the information from the first data and the second data. Accordingly, only part of the information to be secured is stored locally on the client system, whilst the other part is stored on the remote server, and neither the client system nor the remote server have a record of the entire information.
Claims (26)
1. A system for storing information having a predetermined use which requires said information to be secured, including:
a client system for generating first data and second data from said information, such that said information can be generated from said first data and said second data, and said predetermined use is infeasible with only one of said first data and said second data, and for storing an identifier with said first data; and a remote server for storing said second data with an encoded identifier generated from said identifier.
a client system for generating first data and second data from said information, such that said information can be generated from said first data and said second data, and said predetermined use is infeasible with only one of said first data and said second data, and for storing an identifier with said first data; and a remote server for storing said second data with an encoded identifier generated from said identifier.
2. A system as claimed in claim 1, wherein said remote server is adapted to send an encoded version of said second data to said client system, and said client system is adapted to generate an encoded version of said information from said first data and said encoded second data, and to store the encoded information with said identifier.
3. A system as claimed in claim 2, including a remote hash server for generating the encoded second data.
4. A system for storing information having a predetermined use which requires said information to be secured, including:
a client system for storing an encoded version of said information and an identifier, the encoded information having been generated from first data of said information and an encoded version of second data of said information, wherein said information can be generated from said first data and said second data, and said predetermined use is infeasible with only one of said first data and said second data;
and a remote server for storing said second data and an encoded identifier generated from said identifier;
wherein said client system is adapted to send at least the encoded version of the second data to said remote server.
a client system for storing an encoded version of said information and an identifier, the encoded information having been generated from first data of said information and an encoded version of second data of said information, wherein said information can be generated from said first data and said second data, and said predetermined use is infeasible with only one of said first data and said second data;
and a remote server for storing said second data and an encoded identifier generated from said identifier;
wherein said client system is adapted to send at least the encoded version of the second data to said remote server.
5. A system as claimed in claim 4, including a plurality of said remote server, and a gateway for selecting at least one of the remote servers, and for forwarding data received from said client system to the selected at least one remote server.
6. A process for storing information having a predetermined use which requires said information to be secured, including generating first data and second data from said information, such that said information can be generated from said first data and said second data, and said predetermined use cannot be performed using only one of said first data and said second data.
7. A process as claimed in claim 6, including generating encoded data from said information, wherein said first data and second data are generated from said encoded data.
8. A process as claimed in claim 7, wherein the quantity of said encoded data is substantially larger than quantity of said information.
9. A process as claimed in claim 7, wherein said step of generating includes encrypting said information.
10. A process as claimed in claim 6, wherein said first data and said second data are stored at respective locations physically remote from one another.
11. A process as claimed in claim 6, wherein the process is executed by a client system, and the process includes:
sending said first data and an identifier to a remote server for storage; and storing said second data and said identifier.
sending said first data and an identifier to a remote server for storage; and storing said second data and said identifier.
12. A process as claimed in claim 11, wherein an encoded identifier generated from said identifier is stored with said first data.
13. A process as claimed in claim 12, wherein said encoded identifier includes a cryptographic hash of said identifier.
14. A process as claimed in claim 13, wherein said hash is remotely generated using a hash function unknown to said client system and unknown to said remote server.
15. A process as claimed in claim 11, including:
receiving an encoded version of said first data from said remote server; and generating an encoded version of said information from the encoded first data and said second data; and wherein said step of storing includes storing the encoded information and said identifier.
receiving an encoded version of said first data from said remote server; and generating an encoded version of said information from the encoded first data and said second data; and wherein said step of storing includes storing the encoded information and said identifier.
16. A process for storing information having a predetermined use which requires said information to be secured, including:
receiving an identifier and first data from a client system having second data, said first data and said second data being such that said information can be generated from said first data and said second data, and said predetermined use cannot be performed using only one of said first data and said second data; and storing said first data with an encoded identifier generated from said identifier, without storing said identifier.
receiving an identifier and first data from a client system having second data, said first data and said second data being such that said information can be generated from said first data and said second data, and said predetermined use cannot be performed using only one of said first data and said second data; and storing said first data with an encoded identifier generated from said identifier, without storing said identifier.
17. A process as claimed in claim 16, including:
generating encoded first data from said first data; and sending said encoded first data to said client system for storage with said second data and said identifier.
generating encoded first data from said first data; and sending said encoded first data to said client system for storage with said second data and said identifier.
18. A process for generating information having a predetermined use which requires said information to be secured, including:
determining, on the basis of an identifier, first data of said information;
receiving second data of said information from a remote server; and generating said information from said first data and said second data, wherein said predetermined use is infeasible with only one of said first data and said second data.
determining, on the basis of an identifier, first data of said information;
receiving second data of said information from a remote server; and generating said information from said first data and said second data, wherein said predetermined use is infeasible with only one of said first data and said second data.
19. A process for generating information as claimed in claim 18, including sending said identifier to said remote server, and said step of receiving includes receiving, from said remote server, said second data determined on the basis of an encoded identifier generated from said identifier.
20. A process as claimed in claim 18, including using said information for said predetermined use and then discarding said information.
21. A process for generating information according to claim 20, wherein said information includes a credit card number and said predetermined use includes processing a financial transaction on the basis of said credit card number.
22. A process for generating information having a predetermined use which requires said information to be secured, including:
receiving an identifier;
determining first data of said information on the basis of said identifier;
and sending said first data to a client system to enable said information to be generated from said first data and second data of said information, wherein said predetermined use is infeasible with only one of said first data and said second data.
receiving an identifier;
determining first data of said information on the basis of said identifier;
and sending said first data to a client system to enable said information to be generated from said first data and second data of said information, wherein said predetermined use is infeasible with only one of said first data and said second data.
23. A process for generating information having a predetermined use which requires said information to be secured, including:
determining, on the basis of an identifier, an encoded version of said information, the encoded information having been generated from first data of said information and an encoded version of second data of said information; and sending said identifier and said encoded information to a remote server for generation of said information from said first data and said second data, wherein said predetermined use is infeasible with only one of said first data and said second data.
determining, on the basis of an identifier, an encoded version of said information, the encoded information having been generated from first data of said information and an encoded version of second data of said information; and sending said identifier and said encoded information to a remote server for generation of said information from said first data and said second data, wherein said predetermined use is infeasible with only one of said first data and said second data.
24. A process for generating information having a predetermined use which requires said information to be secured, including:
receiving an identifier and an encoded version of said information;
determining first data of said information on the basis of said identifier;
generating said information from said first data and second data of the encoded information, wherein said predetermined use is infeasible with only one of said first data and said second data;
using said information for said predetermined use; and discarding said information.
receiving an identifier and an encoded version of said information;
determining first data of said information on the basis of said identifier;
generating said information from said first data and second data of the encoded information, wherein said predetermined use is infeasible with only one of said first data and said second data;
using said information for said predetermined use; and discarding said information.
25. An information storage system having components for executing the steps of any one of claims 6 to 24.
26. A computer-readable storage medium having stored thereon program code for executing the steps of any one of claims 6 to 24.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AUPS1690 | 2002-04-11 | ||
AUPS1690A AUPS169002A0 (en) | 2002-04-11 | 2002-04-11 | An information storage system |
PCT/AU2003/000433 WO2003088052A1 (en) | 2002-04-11 | 2003-04-11 | An information storage system |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2481577A1 true CA2481577A1 (en) | 2003-10-23 |
CA2481577C CA2481577C (en) | 2012-08-28 |
Family
ID=3835267
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2481577A Expired - Lifetime CA2481577C (en) | 2002-04-11 | 2003-04-11 | A secure information storage system using data splitting and separate storage |
Country Status (9)
Country | Link |
---|---|
US (2) | US7698560B2 (en) |
EP (2) | EP1495408B1 (en) |
JP (1) | JP2005522775A (en) |
AU (1) | AUPS169002A0 (en) |
CA (1) | CA2481577C (en) |
HU (1) | HUE045230T2 (en) |
NZ (1) | NZ535870A (en) |
WO (1) | WO2003088052A1 (en) |
ZA (1) | ZA200408325B (en) |
Families Citing this family (33)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8281155B1 (en) * | 2000-11-02 | 2012-10-02 | Intel Corporation | Content protection using block reordering |
AUPS169002A0 (en) * | 2002-04-11 | 2002-05-16 | Tune, Andrew Dominic | An information storage system |
US20060064374A1 (en) * | 2004-09-17 | 2006-03-23 | David Helsper | Fraud risk advisor |
US7497374B2 (en) * | 2004-09-17 | 2009-03-03 | Digital Envoy, Inc. | Fraud risk advisor |
US20080010678A1 (en) * | 2004-09-17 | 2008-01-10 | Jeff Burdette | Authentication Proxy |
US7543740B2 (en) * | 2004-09-17 | 2009-06-09 | Digital Envoy, Inc. | Fraud analyst smart cookie |
US20060294383A1 (en) * | 2005-06-28 | 2006-12-28 | Paula Austel | Secure data communications in web services |
US8838536B2 (en) * | 2006-04-18 | 2014-09-16 | Sandeep Bhanote | Method and apparatus for mobile data collection and management |
JP2009009545A (en) * | 2007-01-31 | 2009-01-15 | Hewlett-Packard Development Co Lp | Data processing system and method |
US20080208697A1 (en) * | 2007-02-23 | 2008-08-28 | Kargman James B | Secure system and method for payment card and data storage and processing via information splitting |
US8233624B2 (en) * | 2007-05-25 | 2012-07-31 | Splitstreem Oy | Method and apparatus for securing data in a memory device |
US8549279B1 (en) | 2007-10-23 | 2013-10-01 | United Parcel Service Of America, Inc. | Encryption and tokenization architectures |
CA2730175A1 (en) * | 2008-07-09 | 2010-01-14 | Xtreme Mobility Inc. | Secure wireless deposit system and method |
JP5279379B2 (en) | 2008-07-16 | 2013-09-04 | 株式会社セフティーアングル | Authentication system and authentication method |
FI20080534A0 (en) * | 2008-09-22 | 2008-09-22 | Envault Corp Oy | Safe and selectively contested file storage |
ES2674355T3 (en) * | 2008-11-04 | 2018-06-29 | Amadeus S.A.S. | Method and system for storage and retrieval of information |
US9727851B2 (en) * | 2008-11-24 | 2017-08-08 | International Business Machines Corporation | Purchasing data management method and system |
FI20090254A (en) | 2009-06-29 | 2010-12-30 | Envault Corp Oy | Method and hardware for protecting file-based data |
US8667329B2 (en) * | 2009-09-25 | 2014-03-04 | Ab Initio Technology Llc | Processing transactions in graph-based applications |
US20110152663A1 (en) * | 2009-12-22 | 2011-06-23 | Kabushiki Kaisha Toshiba | Medical image diagnostic apparatus, medical image display device, personal information management system |
US9596237B2 (en) | 2010-12-14 | 2017-03-14 | Salt Technology, Inc. | System and method for initiating transactions on a mobile device |
WO2013155627A1 (en) | 2012-04-16 | 2013-10-24 | Salt Technology Inc. | Systems and methods for facilitating a transaction using a virtual card on a mobile device |
KR101451214B1 (en) * | 2012-09-14 | 2014-10-15 | 주식회사 엘지씨엔에스 | Payment method, server performing the same, storage media storing the same and system performing the same |
WO2014083519A1 (en) * | 2012-11-27 | 2014-06-05 | Mashinery Pty Ltd | Data assembly, transfer and storage |
US8504827B1 (en) * | 2013-02-27 | 2013-08-06 | WebFilings LLC | Document server and client device document viewer and editor |
US9245269B2 (en) * | 2013-08-30 | 2016-01-26 | Usa Technologies, Inc. | Unattended retail systems, methods and devices for linking payments, loyalty, and rewards |
US9159182B2 (en) | 2013-08-30 | 2015-10-13 | Usa Technologies, Inc. | Vending approval systems, methods, and apparatus using card readers |
CN104428803A (en) * | 2014-05-07 | 2015-03-18 | 华为技术有限公司 | Payment method and apparatus and payment element processing method and apparatus |
JP2016006637A (en) * | 2014-05-26 | 2016-01-14 | DigitAddress株式会社 | Credit card settlement system and credit card settlement method |
CN105825371A (en) * | 2015-01-07 | 2016-08-03 | 阿里巴巴集团控股有限公司 | Method and device for processing service |
US9953318B1 (en) | 2015-05-22 | 2018-04-24 | Intuit Inc. | Automatic transaction-based verification of account ownership |
US10897361B1 (en) * | 2019-09-04 | 2021-01-19 | Garantir LLC | Automated hash validation |
US11057215B1 (en) | 2021-01-27 | 2021-07-06 | Garantir LLC | Automated hash validation |
Family Cites Families (71)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3956615A (en) * | 1974-06-25 | 1976-05-11 | Ibm Corporation | Transaction execution system with secure data storage and communications |
US4123747A (en) * | 1977-05-20 | 1978-10-31 | International Business Machines Corporation | Identity verification method and apparatus |
US5530757A (en) * | 1994-06-28 | 1996-06-25 | International Business Machines Corporation | Distributed fingerprints for information integrity verification |
US5826245A (en) * | 1995-03-20 | 1998-10-20 | Sandberg-Diment; Erik | Providing verification information for a transaction |
US5839119A (en) | 1996-09-27 | 1998-11-17 | Xerox Corporation | Method of electronic payments that prevents double-spending |
US5937066A (en) | 1996-10-02 | 1999-08-10 | International Business Machines Corporation | Two-phase cryptographic key recovery system |
US6012144A (en) * | 1996-10-08 | 2000-01-04 | Pickett; Thomas E. | Transaction security method and apparatus |
JP3656688B2 (en) * | 1997-03-31 | 2005-06-08 | 栄司 岡本 | Cryptographic data recovery method and key registration system |
US6240184B1 (en) | 1997-09-05 | 2001-05-29 | Rsa Security Inc. | Password synchronization |
US6289869B1 (en) | 1997-09-12 | 2001-09-18 | George D. Elliott | Electromagnetic fuel ram-injector and improved ignitor |
US5960411A (en) | 1997-09-12 | 1999-09-28 | Amazon.Com, Inc. | Method and system for placing a purchase order via a communications network |
US6411715B1 (en) | 1997-11-10 | 2002-06-25 | Rsa Security, Inc. | Methods and apparatus for verifying the cryptographic security of a selected private and public key pair without knowing the private key |
WO1999026207A1 (en) | 1997-11-19 | 1999-05-27 | Rsa Security Inc. | Digital coin tracing using trustee tokens |
US6157920A (en) | 1997-11-19 | 2000-12-05 | Lucent Technologies Inc. | Executable digital cash for electronic commerce |
GB2332833A (en) * | 1997-12-24 | 1999-06-30 | Interactive Magazines Limited | Secure credit card transactions over the internet |
US6850916B1 (en) * | 1998-04-27 | 2005-02-01 | Esignx Corporation | Portable electronic charge and authorization devices and methods therefor |
US6393447B1 (en) | 1998-10-22 | 2002-05-21 | Lucent Technologies Inc. | Method and apparatus for extracting unbiased random bits from a potentially biased source of randomness |
US6070154A (en) * | 1998-11-27 | 2000-05-30 | Activepoint Ltd. | Internet credit card security |
US6330588B1 (en) * | 1998-12-21 | 2001-12-11 | Philips Electronics North America Corporation | Verification of software agents and agent activities |
US6182214B1 (en) * | 1999-01-08 | 2001-01-30 | Bay Networks, Inc. | Exchanging a secret over an unreliable network |
US7197639B1 (en) | 1999-02-05 | 2007-03-27 | Rsa Security Inc. | Cryptographic countermeasures against connection depletion attacks |
US7219368B2 (en) | 1999-02-11 | 2007-05-15 | Rsa Security Inc. | Robust visual passwords |
US6985583B1 (en) | 1999-05-04 | 2006-01-10 | Rsa Security Inc. | System and method for authentication seed distribution |
US7260724B1 (en) | 1999-09-20 | 2007-08-21 | Security First Corporation | Context sensitive dynamic authentication in a cryptographic system |
US7269261B1 (en) | 1999-09-22 | 2007-09-11 | Raytheon Company | Key escrow systems |
US6925563B1 (en) | 1999-09-22 | 2005-08-02 | Raytheon Company | Multiplication of modular numbers |
AU7745100A (en) * | 1999-10-01 | 2001-04-30 | Ecomxml Inc. | A method for prohibiting transacting parties from subsequently repudiating an executed transaction with trusted third party |
IL133771A0 (en) * | 1999-12-28 | 2001-04-30 | Regev Eyal | Closed loop transaction |
US20030101346A1 (en) | 2000-02-29 | 2003-05-29 | Barron Austin Kesler | Method for notarizing receipt of electronic communications and enabling electronic registered mail; method for verifying identity of account party |
US6813354B1 (en) | 2000-03-09 | 2004-11-02 | Lucent Technologies Inc. | Mixing in small batches |
US7359507B2 (en) * | 2000-03-10 | 2008-04-15 | Rsa Security Inc. | Server-assisted regeneration of a strong secret from a weak secret |
US20010056409A1 (en) * | 2000-05-15 | 2001-12-27 | Bellovin Steven Michael | Offline one time credit card numbers for secure e-commerce |
US6598031B1 (en) * | 2000-07-31 | 2003-07-22 | Edi Secure Lllp | Apparatus and method for routing encrypted transaction card identifying data through a public telephone network |
JP2002123779A (en) * | 2000-10-12 | 2002-04-26 | Hitachi Ltd | Method and system for processing settlement and recording medium with stored program |
US20020141593A1 (en) | 2000-12-11 | 2002-10-03 | Kurn David Michael | Multiple cryptographic key linking scheme on a computer system |
US20020071566A1 (en) | 2000-12-11 | 2002-06-13 | Kurn David Michael | Computer system employing a split-secret cryptographic key linked to a password-based cryptographic key security scheme |
US20020071565A1 (en) | 2000-12-11 | 2002-06-13 | Kurn David Michael | Software process pre-authorization scheme for applications on a computer system |
US20020071564A1 (en) | 2000-12-11 | 2002-06-13 | Kurn David Michael | Scalable computer system using password-based private key encryption |
US20020071567A1 (en) | 2000-12-12 | 2002-06-13 | Kurn David Michael | Scalable computer system using remote agents to manipulate cryptographic keys |
US6901512B2 (en) | 2000-12-12 | 2005-05-31 | Hewlett-Packard Development Company, L.P. | Centralized cryptographic key administration scheme for enabling secure context-free application operation |
US20020071560A1 (en) | 2000-12-12 | 2002-06-13 | Kurn David Michael | Computer system having an autonomous process for centralized cryptographic key administration |
US20020071561A1 (en) | 2000-12-12 | 2002-06-13 | Kurn David Michael | Method and apparatus for enforcing the separation of computer operations and business management roles in a cryptographic system |
US20020071563A1 (en) | 2000-12-12 | 2002-06-13 | Kurn David Michael | Method and apparatus for cryptographic key rollover during operation |
US20030037237A1 (en) | 2001-04-09 | 2003-02-20 | Jean-Paul Abgrall | Systems and methods for computer device authentication |
US20030046210A1 (en) | 2001-08-31 | 2003-03-06 | Vora Poorvi L. | Anonymous acquisition of digital products based on secret splitting |
US20030046213A1 (en) | 2001-08-31 | 2003-03-06 | Vora Poorvi L. | Anonymous processing of usage rights with variable degrees of privacy and accuracy |
US7187772B2 (en) | 2001-08-31 | 2007-03-06 | Hewlett-Packard Development Company, L.P. | Anonymous transactions based on distributed processing |
AUPS169002A0 (en) * | 2002-04-11 | 2002-05-16 | Tune, Andrew Dominic | An information storage system |
US7254233B2 (en) * | 2002-07-24 | 2007-08-07 | Qualcomm Incorporated | Fast encryption and authentication for data processing systems |
US6950517B2 (en) * | 2002-07-24 | 2005-09-27 | Qualcomm, Inc. | Efficient encryption and authentication for data processing systems |
US7305084B2 (en) * | 2002-07-24 | 2007-12-04 | Qualcomm Incorporated | Fast encryption and authentication for data processing systems |
US7900052B2 (en) * | 2002-11-06 | 2011-03-01 | International Business Machines Corporation | Confidential data sharing and anonymous entity resolution |
US7428751B2 (en) | 2002-12-05 | 2008-09-23 | Microsoft Corporation | Secure recovery in a serverless distributed file system |
US7240192B1 (en) | 2003-03-12 | 2007-07-03 | Microsoft Corporation | Combining a browser cache and cookies to improve the security of token-based authentication protocols |
US7532104B2 (en) | 2003-05-06 | 2009-05-12 | Rsa Security, Inc. | Low-complexity cryptographic techniques for use with radio frequency identification devices |
US6970070B2 (en) | 2003-05-08 | 2005-11-29 | Rsa Security Inc. | Method and apparatus for selective blocking of radio frequency identification devices |
US7298243B2 (en) | 2003-11-12 | 2007-11-20 | Rsa Security Inc. | Radio frequency identification system with privacy policy implementation based on device classification |
US8135180B2 (en) | 2003-12-24 | 2012-03-13 | Telecom Italia S.P.A. | User authentication method based on the utilization of biometric identification techniques and related architecture |
US8983061B2 (en) * | 2004-02-13 | 2015-03-17 | Ivi Holdings Ltd. | Method and apparatus for cryptographically processing data |
US7275685B2 (en) * | 2004-04-12 | 2007-10-02 | Rearden Capital Corporation | Method for electronic payment |
US8156029B2 (en) | 2005-02-24 | 2012-04-10 | Michael Gregory Szydlo | Process for verifiably communicating risk characteristics of an investment portfolio |
DE102005030590B4 (en) | 2005-06-30 | 2011-03-24 | Advanced Micro Devices, Inc., Sunnyvale | Safe patch system |
US7587045B2 (en) | 2005-10-03 | 2009-09-08 | Kabushiki Kaisha Toshiba | System and method for securing document transmittal |
US7606769B2 (en) | 2005-10-12 | 2009-10-20 | Kabushiki Kaisha Toshiba | System and method for embedding user authentication information in encrypted data |
US7702106B2 (en) | 2006-01-20 | 2010-04-20 | Magiq Technologies, Inc. | Quantum secret splitting based on non-orthogonal multi-particle states |
US9137012B2 (en) | 2006-02-03 | 2015-09-15 | Emc Corporation | Wireless authentication methods and apparatus |
US8151116B2 (en) | 2006-06-09 | 2012-04-03 | Brigham Young University | Multi-channel user authentication apparatus system and method |
US7519830B2 (en) * | 2006-08-03 | 2009-04-14 | Motorola, Inc. | Secure storage of data |
US8958562B2 (en) * | 2007-01-16 | 2015-02-17 | Voltage Security, Inc. | Format-preserving cryptographic systems |
US20080208697A1 (en) * | 2007-02-23 | 2008-08-28 | Kargman James B | Secure system and method for payment card and data storage and processing via information splitting |
US9900150B2 (en) * | 2009-10-30 | 2018-02-20 | International Business Machines Corporation | Dispersed storage camera device and method of operation |
-
2002
- 2002-04-11 AU AUPS1690A patent/AUPS169002A0/en not_active Abandoned
-
2003
- 2003-04-11 WO PCT/AU2003/000433 patent/WO2003088052A1/en active Application Filing
- 2003-04-11 NZ NZ535870A patent/NZ535870A/en not_active IP Right Cessation
- 2003-04-11 CA CA2481577A patent/CA2481577C/en not_active Expired - Lifetime
- 2003-04-11 JP JP2003584925A patent/JP2005522775A/en active Pending
- 2003-04-11 EP EP03709443.0A patent/EP1495408B1/en not_active Expired - Lifetime
- 2003-04-11 US US10/511,254 patent/US7698560B2/en active Active
- 2003-04-11 HU HUE03709443A patent/HUE045230T2/en unknown
- 2003-04-11 EP EP12191864.3A patent/EP2560101A3/en not_active Withdrawn
-
2004
- 2004-10-14 ZA ZA200408325A patent/ZA200408325B/en unknown
-
2010
- 2010-02-10 US US12/703,722 patent/US8090953B2/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
EP1495408B1 (en) | 2019-03-27 |
CA2481577C (en) | 2012-08-28 |
EP1495408A1 (en) | 2005-01-12 |
EP2560101A3 (en) | 2013-08-14 |
ZA200408325B (en) | 2006-07-26 |
AUPS169002A0 (en) | 2002-05-16 |
WO2003088052A1 (en) | 2003-10-23 |
EP1495408A4 (en) | 2010-04-07 |
NZ535870A (en) | 2006-03-31 |
HUE045230T2 (en) | 2019-12-30 |
JP2005522775A (en) | 2005-07-28 |
US7698560B2 (en) | 2010-04-13 |
US8090953B2 (en) | 2012-01-03 |
US20050188005A1 (en) | 2005-08-25 |
EP2560101A2 (en) | 2013-02-20 |
US20100146288A1 (en) | 2010-06-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2481577A1 (en) | A secure information storage system using data splitting and separate storage | |
US11025423B2 (en) | Technologies for private key recovery in distributed ledger systems | |
CN108182581B (en) | Accounting method and device for block chain | |
EP2532140B1 (en) | Method for identifying and authenticating an rfid tag by a reader | |
US20190179801A1 (en) | File management/search system and file management/search method based on block chain | |
CN110689349B (en) | Transaction hash value storage and searching method and device in blockchain | |
US11657171B2 (en) | Large network attached storage encryption | |
CN109347835A (en) | Information transferring method, client, server and computer readable storage medium | |
CA2540720A1 (en) | System and method for generating reproducible session keys | |
CN114860735A (en) | Method and device for inquiring hiding trace | |
KR102178583B1 (en) | Contract apparatus and method of blockchain using digital contents orginal key | |
WO2004049144A3 (en) | Generic security infrastructure for com based systems | |
AU2019223875A1 (en) | Methods, application server, block chain node and media for logistics tracking and source tracing | |
CN102143131B (en) | User logout method and authentication server | |
CN108052550B (en) | Annuity data receiving method and device, computer equipment and storage medium | |
CN110445792A (en) | Verification code generation method, verifying code verification method and identifying code login system | |
CN111342964B (en) | Single sign-on method, device and system | |
US8914369B2 (en) | Method and a system for data verification and/or authentication | |
CN105224541B (en) | Uniqueness control method, information storage means and the device of data | |
CN115134087A (en) | Client security data deduplication method for decentralized cloud storage | |
JP2012507767A5 (en) | ||
CN110100413A (en) | Robust for certification calculates Fuzzy extractor and method | |
EP3493141A1 (en) | Blockchain communications and ordering | |
CN112541820A (en) | Digital asset management method, device, computer equipment and readable storage medium | |
Zhan | Anti-fake technology of commodity by using QR code |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKEX | Expiry |
Effective date: 20230411 |