CA2481577A1 - A secure information storage system using data splitting and separate storage - Google Patents

A secure information storage system using data splitting and separate storage Download PDF

Info

Publication number
CA2481577A1
CA2481577A1 CA002481577A CA2481577A CA2481577A1 CA 2481577 A1 CA2481577 A1 CA 2481577A1 CA 002481577 A CA002481577 A CA 002481577A CA 2481577 A CA2481577 A CA 2481577A CA 2481577 A1 CA2481577 A1 CA 2481577A1
Authority
CA
Canada
Prior art keywords
data
information
identifier
encoded
predetermined use
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA002481577A
Other languages
French (fr)
Other versions
CA2481577C (en
Inventor
Andrew Dominic Tune
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Endresz Allan
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2481577A1 publication Critical patent/CA2481577A1/en
Application granted granted Critical
Publication of CA2481577C publication Critical patent/CA2481577C/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/22Payment schemes or models
    • G06Q20/24Credit schemes, i.e. "pay after"
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/385Payment protocols; Details thereof using an alias or single-use codes

Abstract

A system for storing information having a predetermined use which requires the information to be secured. The information may comprise credit card details used to complete a transaction. The system includes: (a) A client system for storing an encoded version of the information and an identifier. The encoded version is generated from first data of the information and an encoded version of the second data of the information. The information can be generated from the first data and the second data, and the predetermined use is infeasible with only one of the first data and the second data. (b) A remote server for storing the second data and an encoded identifier generated from the identifier. The client system sends at least the encoded version of the second data to the remote server. The client system or the remote server is able to generate the information from the first data and the second data. Accordingly, only part of the information to be secured is stored locally on the client system, whilst the other part is stored on the remote server, and neither the client system nor the remote server have a record of the entire information.

Claims (26)

1. A system for storing information having a predetermined use which requires said information to be secured, including:
a client system for generating first data and second data from said information, such that said information can be generated from said first data and said second data, and said predetermined use is infeasible with only one of said first data and said second data, and for storing an identifier with said first data; and a remote server for storing said second data with an encoded identifier generated from said identifier.
2. A system as claimed in claim 1, wherein said remote server is adapted to send an encoded version of said second data to said client system, and said client system is adapted to generate an encoded version of said information from said first data and said encoded second data, and to store the encoded information with said identifier.
3. A system as claimed in claim 2, including a remote hash server for generating the encoded second data.
4. A system for storing information having a predetermined use which requires said information to be secured, including:
a client system for storing an encoded version of said information and an identifier, the encoded information having been generated from first data of said information and an encoded version of second data of said information, wherein said information can be generated from said first data and said second data, and said predetermined use is infeasible with only one of said first data and said second data;
and a remote server for storing said second data and an encoded identifier generated from said identifier;
wherein said client system is adapted to send at least the encoded version of the second data to said remote server.
5. A system as claimed in claim 4, including a plurality of said remote server, and a gateway for selecting at least one of the remote servers, and for forwarding data received from said client system to the selected at least one remote server.
6. A process for storing information having a predetermined use which requires said information to be secured, including generating first data and second data from said information, such that said information can be generated from said first data and said second data, and said predetermined use cannot be performed using only one of said first data and said second data.
7. A process as claimed in claim 6, including generating encoded data from said information, wherein said first data and second data are generated from said encoded data.
8. A process as claimed in claim 7, wherein the quantity of said encoded data is substantially larger than quantity of said information.
9. A process as claimed in claim 7, wherein said step of generating includes encrypting said information.
10. A process as claimed in claim 6, wherein said first data and said second data are stored at respective locations physically remote from one another.
11. A process as claimed in claim 6, wherein the process is executed by a client system, and the process includes:
sending said first data and an identifier to a remote server for storage; and storing said second data and said identifier.
12. A process as claimed in claim 11, wherein an encoded identifier generated from said identifier is stored with said first data.
13. A process as claimed in claim 12, wherein said encoded identifier includes a cryptographic hash of said identifier.
14. A process as claimed in claim 13, wherein said hash is remotely generated using a hash function unknown to said client system and unknown to said remote server.
15. A process as claimed in claim 11, including:
receiving an encoded version of said first data from said remote server; and generating an encoded version of said information from the encoded first data and said second data; and wherein said step of storing includes storing the encoded information and said identifier.
16. A process for storing information having a predetermined use which requires said information to be secured, including:
receiving an identifier and first data from a client system having second data, said first data and said second data being such that said information can be generated from said first data and said second data, and said predetermined use cannot be performed using only one of said first data and said second data; and storing said first data with an encoded identifier generated from said identifier, without storing said identifier.
17. A process as claimed in claim 16, including:
generating encoded first data from said first data; and sending said encoded first data to said client system for storage with said second data and said identifier.
18. A process for generating information having a predetermined use which requires said information to be secured, including:
determining, on the basis of an identifier, first data of said information;
receiving second data of said information from a remote server; and generating said information from said first data and said second data, wherein said predetermined use is infeasible with only one of said first data and said second data.
19. A process for generating information as claimed in claim 18, including sending said identifier to said remote server, and said step of receiving includes receiving, from said remote server, said second data determined on the basis of an encoded identifier generated from said identifier.
20. A process as claimed in claim 18, including using said information for said predetermined use and then discarding said information.
21. A process for generating information according to claim 20, wherein said information includes a credit card number and said predetermined use includes processing a financial transaction on the basis of said credit card number.
22. A process for generating information having a predetermined use which requires said information to be secured, including:
receiving an identifier;
determining first data of said information on the basis of said identifier;
and sending said first data to a client system to enable said information to be generated from said first data and second data of said information, wherein said predetermined use is infeasible with only one of said first data and said second data.
23. A process for generating information having a predetermined use which requires said information to be secured, including:
determining, on the basis of an identifier, an encoded version of said information, the encoded information having been generated from first data of said information and an encoded version of second data of said information; and sending said identifier and said encoded information to a remote server for generation of said information from said first data and said second data, wherein said predetermined use is infeasible with only one of said first data and said second data.
24. A process for generating information having a predetermined use which requires said information to be secured, including:
receiving an identifier and an encoded version of said information;
determining first data of said information on the basis of said identifier;
generating said information from said first data and second data of the encoded information, wherein said predetermined use is infeasible with only one of said first data and said second data;
using said information for said predetermined use; and discarding said information.
25. An information storage system having components for executing the steps of any one of claims 6 to 24.
26. A computer-readable storage medium having stored thereon program code for executing the steps of any one of claims 6 to 24.
CA2481577A 2002-04-11 2003-04-11 A secure information storage system using data splitting and separate storage Expired - Lifetime CA2481577C (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
AUPS1690 2002-04-11
AUPS1690A AUPS169002A0 (en) 2002-04-11 2002-04-11 An information storage system
PCT/AU2003/000433 WO2003088052A1 (en) 2002-04-11 2003-04-11 An information storage system

Publications (2)

Publication Number Publication Date
CA2481577A1 true CA2481577A1 (en) 2003-10-23
CA2481577C CA2481577C (en) 2012-08-28

Family

ID=3835267

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2481577A Expired - Lifetime CA2481577C (en) 2002-04-11 2003-04-11 A secure information storage system using data splitting and separate storage

Country Status (9)

Country Link
US (2) US7698560B2 (en)
EP (2) EP1495408B1 (en)
JP (1) JP2005522775A (en)
AU (1) AUPS169002A0 (en)
CA (1) CA2481577C (en)
HU (1) HUE045230T2 (en)
NZ (1) NZ535870A (en)
WO (1) WO2003088052A1 (en)
ZA (1) ZA200408325B (en)

Families Citing this family (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8281155B1 (en) * 2000-11-02 2012-10-02 Intel Corporation Content protection using block reordering
AUPS169002A0 (en) * 2002-04-11 2002-05-16 Tune, Andrew Dominic An information storage system
US20060064374A1 (en) * 2004-09-17 2006-03-23 David Helsper Fraud risk advisor
US7497374B2 (en) * 2004-09-17 2009-03-03 Digital Envoy, Inc. Fraud risk advisor
US20080010678A1 (en) * 2004-09-17 2008-01-10 Jeff Burdette Authentication Proxy
US7543740B2 (en) * 2004-09-17 2009-06-09 Digital Envoy, Inc. Fraud analyst smart cookie
US20060294383A1 (en) * 2005-06-28 2006-12-28 Paula Austel Secure data communications in web services
US8838536B2 (en) * 2006-04-18 2014-09-16 Sandeep Bhanote Method and apparatus for mobile data collection and management
JP2009009545A (en) * 2007-01-31 2009-01-15 Hewlett-Packard Development Co Lp Data processing system and method
US20080208697A1 (en) * 2007-02-23 2008-08-28 Kargman James B Secure system and method for payment card and data storage and processing via information splitting
US8233624B2 (en) * 2007-05-25 2012-07-31 Splitstreem Oy Method and apparatus for securing data in a memory device
US8549279B1 (en) 2007-10-23 2013-10-01 United Parcel Service Of America, Inc. Encryption and tokenization architectures
CA2730175A1 (en) * 2008-07-09 2010-01-14 Xtreme Mobility Inc. Secure wireless deposit system and method
JP5279379B2 (en) 2008-07-16 2013-09-04 株式会社セフティーアングル Authentication system and authentication method
FI20080534A0 (en) * 2008-09-22 2008-09-22 Envault Corp Oy Safe and selectively contested file storage
ES2674355T3 (en) * 2008-11-04 2018-06-29 Amadeus S.A.S. Method and system for storage and retrieval of information
US9727851B2 (en) * 2008-11-24 2017-08-08 International Business Machines Corporation Purchasing data management method and system
FI20090254A (en) 2009-06-29 2010-12-30 Envault Corp Oy Method and hardware for protecting file-based data
US8667329B2 (en) * 2009-09-25 2014-03-04 Ab Initio Technology Llc Processing transactions in graph-based applications
US20110152663A1 (en) * 2009-12-22 2011-06-23 Kabushiki Kaisha Toshiba Medical image diagnostic apparatus, medical image display device, personal information management system
US9596237B2 (en) 2010-12-14 2017-03-14 Salt Technology, Inc. System and method for initiating transactions on a mobile device
WO2013155627A1 (en) 2012-04-16 2013-10-24 Salt Technology Inc. Systems and methods for facilitating a transaction using a virtual card on a mobile device
KR101451214B1 (en) * 2012-09-14 2014-10-15 주식회사 엘지씨엔에스 Payment method, server performing the same, storage media storing the same and system performing the same
WO2014083519A1 (en) * 2012-11-27 2014-06-05 Mashinery Pty Ltd Data assembly, transfer and storage
US8504827B1 (en) * 2013-02-27 2013-08-06 WebFilings LLC Document server and client device document viewer and editor
US9245269B2 (en) * 2013-08-30 2016-01-26 Usa Technologies, Inc. Unattended retail systems, methods and devices for linking payments, loyalty, and rewards
US9159182B2 (en) 2013-08-30 2015-10-13 Usa Technologies, Inc. Vending approval systems, methods, and apparatus using card readers
CN104428803A (en) * 2014-05-07 2015-03-18 华为技术有限公司 Payment method and apparatus and payment element processing method and apparatus
JP2016006637A (en) * 2014-05-26 2016-01-14 DigitAddress株式会社 Credit card settlement system and credit card settlement method
CN105825371A (en) * 2015-01-07 2016-08-03 阿里巴巴集团控股有限公司 Method and device for processing service
US9953318B1 (en) 2015-05-22 2018-04-24 Intuit Inc. Automatic transaction-based verification of account ownership
US10897361B1 (en) * 2019-09-04 2021-01-19 Garantir LLC Automated hash validation
US11057215B1 (en) 2021-01-27 2021-07-06 Garantir LLC Automated hash validation

Family Cites Families (71)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3956615A (en) * 1974-06-25 1976-05-11 Ibm Corporation Transaction execution system with secure data storage and communications
US4123747A (en) * 1977-05-20 1978-10-31 International Business Machines Corporation Identity verification method and apparatus
US5530757A (en) * 1994-06-28 1996-06-25 International Business Machines Corporation Distributed fingerprints for information integrity verification
US5826245A (en) * 1995-03-20 1998-10-20 Sandberg-Diment; Erik Providing verification information for a transaction
US5839119A (en) 1996-09-27 1998-11-17 Xerox Corporation Method of electronic payments that prevents double-spending
US5937066A (en) 1996-10-02 1999-08-10 International Business Machines Corporation Two-phase cryptographic key recovery system
US6012144A (en) * 1996-10-08 2000-01-04 Pickett; Thomas E. Transaction security method and apparatus
JP3656688B2 (en) * 1997-03-31 2005-06-08 栄司 岡本 Cryptographic data recovery method and key registration system
US6240184B1 (en) 1997-09-05 2001-05-29 Rsa Security Inc. Password synchronization
US6289869B1 (en) 1997-09-12 2001-09-18 George D. Elliott Electromagnetic fuel ram-injector and improved ignitor
US5960411A (en) 1997-09-12 1999-09-28 Amazon.Com, Inc. Method and system for placing a purchase order via a communications network
US6411715B1 (en) 1997-11-10 2002-06-25 Rsa Security, Inc. Methods and apparatus for verifying the cryptographic security of a selected private and public key pair without knowing the private key
WO1999026207A1 (en) 1997-11-19 1999-05-27 Rsa Security Inc. Digital coin tracing using trustee tokens
US6157920A (en) 1997-11-19 2000-12-05 Lucent Technologies Inc. Executable digital cash for electronic commerce
GB2332833A (en) * 1997-12-24 1999-06-30 Interactive Magazines Limited Secure credit card transactions over the internet
US6850916B1 (en) * 1998-04-27 2005-02-01 Esignx Corporation Portable electronic charge and authorization devices and methods therefor
US6393447B1 (en) 1998-10-22 2002-05-21 Lucent Technologies Inc. Method and apparatus for extracting unbiased random bits from a potentially biased source of randomness
US6070154A (en) * 1998-11-27 2000-05-30 Activepoint Ltd. Internet credit card security
US6330588B1 (en) * 1998-12-21 2001-12-11 Philips Electronics North America Corporation Verification of software agents and agent activities
US6182214B1 (en) * 1999-01-08 2001-01-30 Bay Networks, Inc. Exchanging a secret over an unreliable network
US7197639B1 (en) 1999-02-05 2007-03-27 Rsa Security Inc. Cryptographic countermeasures against connection depletion attacks
US7219368B2 (en) 1999-02-11 2007-05-15 Rsa Security Inc. Robust visual passwords
US6985583B1 (en) 1999-05-04 2006-01-10 Rsa Security Inc. System and method for authentication seed distribution
US7260724B1 (en) 1999-09-20 2007-08-21 Security First Corporation Context sensitive dynamic authentication in a cryptographic system
US7269261B1 (en) 1999-09-22 2007-09-11 Raytheon Company Key escrow systems
US6925563B1 (en) 1999-09-22 2005-08-02 Raytheon Company Multiplication of modular numbers
AU7745100A (en) * 1999-10-01 2001-04-30 Ecomxml Inc. A method for prohibiting transacting parties from subsequently repudiating an executed transaction with trusted third party
IL133771A0 (en) * 1999-12-28 2001-04-30 Regev Eyal Closed loop transaction
US20030101346A1 (en) 2000-02-29 2003-05-29 Barron Austin Kesler Method for notarizing receipt of electronic communications and enabling electronic registered mail; method for verifying identity of account party
US6813354B1 (en) 2000-03-09 2004-11-02 Lucent Technologies Inc. Mixing in small batches
US7359507B2 (en) * 2000-03-10 2008-04-15 Rsa Security Inc. Server-assisted regeneration of a strong secret from a weak secret
US20010056409A1 (en) * 2000-05-15 2001-12-27 Bellovin Steven Michael Offline one time credit card numbers for secure e-commerce
US6598031B1 (en) * 2000-07-31 2003-07-22 Edi Secure Lllp Apparatus and method for routing encrypted transaction card identifying data through a public telephone network
JP2002123779A (en) * 2000-10-12 2002-04-26 Hitachi Ltd Method and system for processing settlement and recording medium with stored program
US20020141593A1 (en) 2000-12-11 2002-10-03 Kurn David Michael Multiple cryptographic key linking scheme on a computer system
US20020071566A1 (en) 2000-12-11 2002-06-13 Kurn David Michael Computer system employing a split-secret cryptographic key linked to a password-based cryptographic key security scheme
US20020071565A1 (en) 2000-12-11 2002-06-13 Kurn David Michael Software process pre-authorization scheme for applications on a computer system
US20020071564A1 (en) 2000-12-11 2002-06-13 Kurn David Michael Scalable computer system using password-based private key encryption
US20020071567A1 (en) 2000-12-12 2002-06-13 Kurn David Michael Scalable computer system using remote agents to manipulate cryptographic keys
US6901512B2 (en) 2000-12-12 2005-05-31 Hewlett-Packard Development Company, L.P. Centralized cryptographic key administration scheme for enabling secure context-free application operation
US20020071560A1 (en) 2000-12-12 2002-06-13 Kurn David Michael Computer system having an autonomous process for centralized cryptographic key administration
US20020071561A1 (en) 2000-12-12 2002-06-13 Kurn David Michael Method and apparatus for enforcing the separation of computer operations and business management roles in a cryptographic system
US20020071563A1 (en) 2000-12-12 2002-06-13 Kurn David Michael Method and apparatus for cryptographic key rollover during operation
US20030037237A1 (en) 2001-04-09 2003-02-20 Jean-Paul Abgrall Systems and methods for computer device authentication
US20030046210A1 (en) 2001-08-31 2003-03-06 Vora Poorvi L. Anonymous acquisition of digital products based on secret splitting
US20030046213A1 (en) 2001-08-31 2003-03-06 Vora Poorvi L. Anonymous processing of usage rights with variable degrees of privacy and accuracy
US7187772B2 (en) 2001-08-31 2007-03-06 Hewlett-Packard Development Company, L.P. Anonymous transactions based on distributed processing
AUPS169002A0 (en) * 2002-04-11 2002-05-16 Tune, Andrew Dominic An information storage system
US7254233B2 (en) * 2002-07-24 2007-08-07 Qualcomm Incorporated Fast encryption and authentication for data processing systems
US6950517B2 (en) * 2002-07-24 2005-09-27 Qualcomm, Inc. Efficient encryption and authentication for data processing systems
US7305084B2 (en) * 2002-07-24 2007-12-04 Qualcomm Incorporated Fast encryption and authentication for data processing systems
US7900052B2 (en) * 2002-11-06 2011-03-01 International Business Machines Corporation Confidential data sharing and anonymous entity resolution
US7428751B2 (en) 2002-12-05 2008-09-23 Microsoft Corporation Secure recovery in a serverless distributed file system
US7240192B1 (en) 2003-03-12 2007-07-03 Microsoft Corporation Combining a browser cache and cookies to improve the security of token-based authentication protocols
US7532104B2 (en) 2003-05-06 2009-05-12 Rsa Security, Inc. Low-complexity cryptographic techniques for use with radio frequency identification devices
US6970070B2 (en) 2003-05-08 2005-11-29 Rsa Security Inc. Method and apparatus for selective blocking of radio frequency identification devices
US7298243B2 (en) 2003-11-12 2007-11-20 Rsa Security Inc. Radio frequency identification system with privacy policy implementation based on device classification
US8135180B2 (en) 2003-12-24 2012-03-13 Telecom Italia S.P.A. User authentication method based on the utilization of biometric identification techniques and related architecture
US8983061B2 (en) * 2004-02-13 2015-03-17 Ivi Holdings Ltd. Method and apparatus for cryptographically processing data
US7275685B2 (en) * 2004-04-12 2007-10-02 Rearden Capital Corporation Method for electronic payment
US8156029B2 (en) 2005-02-24 2012-04-10 Michael Gregory Szydlo Process for verifiably communicating risk characteristics of an investment portfolio
DE102005030590B4 (en) 2005-06-30 2011-03-24 Advanced Micro Devices, Inc., Sunnyvale Safe patch system
US7587045B2 (en) 2005-10-03 2009-09-08 Kabushiki Kaisha Toshiba System and method for securing document transmittal
US7606769B2 (en) 2005-10-12 2009-10-20 Kabushiki Kaisha Toshiba System and method for embedding user authentication information in encrypted data
US7702106B2 (en) 2006-01-20 2010-04-20 Magiq Technologies, Inc. Quantum secret splitting based on non-orthogonal multi-particle states
US9137012B2 (en) 2006-02-03 2015-09-15 Emc Corporation Wireless authentication methods and apparatus
US8151116B2 (en) 2006-06-09 2012-04-03 Brigham Young University Multi-channel user authentication apparatus system and method
US7519830B2 (en) * 2006-08-03 2009-04-14 Motorola, Inc. Secure storage of data
US8958562B2 (en) * 2007-01-16 2015-02-17 Voltage Security, Inc. Format-preserving cryptographic systems
US20080208697A1 (en) * 2007-02-23 2008-08-28 Kargman James B Secure system and method for payment card and data storage and processing via information splitting
US9900150B2 (en) * 2009-10-30 2018-02-20 International Business Machines Corporation Dispersed storage camera device and method of operation

Also Published As

Publication number Publication date
EP1495408B1 (en) 2019-03-27
CA2481577C (en) 2012-08-28
EP1495408A1 (en) 2005-01-12
EP2560101A3 (en) 2013-08-14
ZA200408325B (en) 2006-07-26
AUPS169002A0 (en) 2002-05-16
WO2003088052A1 (en) 2003-10-23
EP1495408A4 (en) 2010-04-07
NZ535870A (en) 2006-03-31
HUE045230T2 (en) 2019-12-30
JP2005522775A (en) 2005-07-28
US7698560B2 (en) 2010-04-13
US8090953B2 (en) 2012-01-03
US20050188005A1 (en) 2005-08-25
EP2560101A2 (en) 2013-02-20
US20100146288A1 (en) 2010-06-10

Similar Documents

Publication Publication Date Title
CA2481577A1 (en) A secure information storage system using data splitting and separate storage
US11025423B2 (en) Technologies for private key recovery in distributed ledger systems
CN108182581B (en) Accounting method and device for block chain
EP2532140B1 (en) Method for identifying and authenticating an rfid tag by a reader
US20190179801A1 (en) File management/search system and file management/search method based on block chain
CN110689349B (en) Transaction hash value storage and searching method and device in blockchain
US11657171B2 (en) Large network attached storage encryption
CN109347835A (en) Information transferring method, client, server and computer readable storage medium
CA2540720A1 (en) System and method for generating reproducible session keys
CN114860735A (en) Method and device for inquiring hiding trace
KR102178583B1 (en) Contract apparatus and method of blockchain using digital contents orginal key
WO2004049144A3 (en) Generic security infrastructure for com based systems
AU2019223875A1 (en) Methods, application server, block chain node and media for logistics tracking and source tracing
CN102143131B (en) User logout method and authentication server
CN108052550B (en) Annuity data receiving method and device, computer equipment and storage medium
CN110445792A (en) Verification code generation method, verifying code verification method and identifying code login system
CN111342964B (en) Single sign-on method, device and system
US8914369B2 (en) Method and a system for data verification and/or authentication
CN105224541B (en) Uniqueness control method, information storage means and the device of data
CN115134087A (en) Client security data deduplication method for decentralized cloud storage
JP2012507767A5 (en)
CN110100413A (en) Robust for certification calculates Fuzzy extractor and method
EP3493141A1 (en) Blockchain communications and ordering
CN112541820A (en) Digital asset management method, device, computer equipment and readable storage medium
Zhan Anti-fake technology of commodity by using QR code

Legal Events

Date Code Title Description
EEER Examination request
MKEX Expiry

Effective date: 20230411