GB201201930D0 - A method and database system for secure storage and communication of information - Google Patents

A method and database system for secure storage and communication of information

Info

Publication number
GB201201930D0
GB201201930D0 GBGB1201930.3A GB201201930A GB201201930D0 GB 201201930 D0 GB201201930 D0 GB 201201930D0 GB 201201930 A GB201201930 A GB 201201930A GB 201201930 D0 GB201201930 D0 GB 201201930D0
Authority
GB
United Kingdom
Prior art keywords
user
hash
communication
keychain
records
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GBGB1201930.3A
Other versions
GB2499193A (en
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to GB1201930.3A priority Critical patent/GB2499193A/en
Publication of GB201201930D0 publication Critical patent/GB201201930D0/en
Priority to EP13703125.8A priority patent/EP2810402B1/en
Priority to PCT/GB2013/050229 priority patent/WO2013114125A2/en
Priority to US14/376,396 priority patent/US20140372752A1/en
Publication of GB2499193A publication Critical patent/GB2499193A/en
Priority to US15/288,161 priority patent/US20170026180A1/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)

Abstract

A secure communications system for the secure storage and communication of authenticated user identity and personal information. The system includes a database of anonymised, individually encrypted user records. Access to the records is only permissible using a user key which is stored in a user keychain on a client device. The keychain itself is password protected and cryptographically tied to the client device. A first user may generate an open request having a public key, and use a private key to access a second users response. Notification messages may besend by encrypting user address information passing that to a notification server and decrypting the address to send a message to the user. A signed object may be sent where a first user makes a public key available and a hash of the data object and a private key produced, the object and encrypted hash are sent to a second user who can then decrypt the hash and generate a hash of the received object to compare the generated hash and the decrypted hash.
GB1201930.3A 2012-02-03 2012-02-03 Public private key usage in a Database System for Secure Storage and Communication of Information Withdrawn GB2499193A (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
GB1201930.3A GB2499193A (en) 2012-02-03 2012-02-03 Public private key usage in a Database System for Secure Storage and Communication of Information
EP13703125.8A EP2810402B1 (en) 2012-02-03 2013-02-01 A method and database system for secure storage and communication of information
PCT/GB2013/050229 WO2013114125A2 (en) 2012-02-03 2013-02-01 A method and database system for secure storage and communication of information
US14/376,396 US20140372752A1 (en) 2012-02-03 2013-02-01 Method and database system for secure storage and communication of information
US15/288,161 US20170026180A1 (en) 2012-02-03 2016-10-07 Method and database system for secure storage and communication of information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB1201930.3A GB2499193A (en) 2012-02-03 2012-02-03 Public private key usage in a Database System for Secure Storage and Communication of Information

Publications (2)

Publication Number Publication Date
GB201201930D0 true GB201201930D0 (en) 2012-03-21
GB2499193A GB2499193A (en) 2013-08-14

Family

ID=45896616

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1201930.3A Withdrawn GB2499193A (en) 2012-02-03 2012-02-03 Public private key usage in a Database System for Secure Storage and Communication of Information

Country Status (1)

Country Link
GB (1) GB2499193A (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI566564B (en) * 2012-04-25 2017-01-11 Samton International Development Technology Co Ltd Virtual reality authentication circuit, system and electronic consumption method
US10341194B2 (en) 2015-10-05 2019-07-02 Fugue, Inc. System and method for building, optimizing, and enforcing infrastructure on a cloud based computing environment
US20180020008A1 (en) * 2016-07-18 2018-01-18 Fugue, Inc. Secure asynchronous communications

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7174368B2 (en) * 2001-03-27 2007-02-06 Xante Corporation Encrypted e-mail reader and responder system, method, and computer program product
EP1788770B1 (en) * 2005-11-16 2009-04-22 Totemo AG A method for establishing a secure e-mail communication channel between a sender and a recipient
US8527751B2 (en) * 2006-08-24 2013-09-03 Privacydatasystems, Llc Systems and methods for secure and certified electronic messaging
US20110307695A1 (en) * 2010-06-14 2011-12-15 Salesforce.Com, Inc. Methods and systems for providing a secure online feed in a multi-tenant database environment

Also Published As

Publication number Publication date
GB2499193A (en) 2013-08-14

Similar Documents

Publication Publication Date Title
US9813247B2 (en) Authenticator device facilitating file security
IL261137A (en) System and method for performing secure communications
GB2496354B (en) A method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors
US20140355757A1 (en) Encryption / decryption of data with non-persistent, non-shared passkey
RU2017131640A (en) CONFIDENTIAL COMMUNICATION MANAGEMENT
JP2011151866A5 (en)
CN102624522A (en) Key encryption method based on file attribution
CN104219228A (en) User registration and user identification method and user registration and user identification system
WO2013114125A3 (en) A method and database system for secure storage and communication of information
CN103248479A (en) Cloud storage safety system, data protection method and data sharing method
CN103067160A (en) Method and system of generation of dynamic encrypt key of encryption secure digital memory card (SD)
CN105025019A (en) Data safety sharing method
JP2014508456A5 (en)
TW201417546A (en) Instant messaging method and system
GB201016672D0 (en) Secure exchange/authentication of electronic documents
US20180063105A1 (en) Management of enciphered data sharing
RU2013140418A (en) SAFE ACCESS TO PERSONAL HEALTH RECORDS IN EMERGENCIES
CN101924739A (en) Method for encrypting, storing and retrieving software certificate and private key
CN103546421A (en) Network work communication security and secrecy system on basis of PKI (public key infrastructure) technology and method for implementing network work communication security and secrecy system
TW201409990A (en) Communication method utilizing fingerprint information for authentication
CN102694650B (en) Secret key generating method based on identity encryption
CN102404337A (en) Data encryption method and device
CN103701596A (en) Document access method, system and equipment and document access request response method, system and equipment
KR101541165B1 (en) Mobile message encryption method, computer readable recording medium recording program performing the method and download server storing the method
RU2015120264A (en) AGENT FOR SECURING CLOUD SERVICE AND DEVELOPMENT OF SECURITY MARKERS FOR SECURE CLOUD SERVICE

Legal Events

Date Code Title Description
732E Amendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977)

Free format text: REGISTERED BETWEEN 20140814 AND 20140820

WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)