GB2349964A - A method of data storage and apparatus therefor - Google Patents

A method of data storage and apparatus therefor

Info

Publication number
GB2349964A
GB2349964A GB0014589A GB0014589A GB2349964A GB 2349964 A GB2349964 A GB 2349964A GB 0014589 A GB0014589 A GB 0014589A GB 0014589 A GB0014589 A GB 0014589A GB 2349964 A GB2349964 A GB 2349964A
Authority
GB
United Kingdom
Prior art keywords
digital
valuable
parts
retrieve
valuables
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB0014589A
Other versions
GB2349964B (en
GB0014589D0 (en
Inventor
Jian Hu
Feng Bao
Huije Deng
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kent Ridge Digital Labs
Original Assignee
Kent Ridge Digital Labs
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kent Ridge Digital Labs filed Critical Kent Ridge Digital Labs
Publication of GB0014589D0 publication Critical patent/GB0014589D0/en
Publication of GB2349964A publication Critical patent/GB2349964A/en
Application granted granted Critical
Publication of GB2349964B publication Critical patent/GB2349964B/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6272Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database by registering files or documents with a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/08Error detection or correction by redundancy in data representation, e.g. by using checking codes
    • G06F11/10Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's
    • G06F11/1004Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's to protect a block of data words, e.g. CRC or checksum

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A method and apparatus for implementing a digital valuables depository system, for public or corporation users to store and to retrieve valuable digital information electronically is described. The apparatus is the electronic analogy to the physical safe boxes provided by banks whereby customers can keep their valuable belongings. The digital valuable depository service is provided by a Service Provider (SP). To make use of the services, a user first opens a Digital Safe account with the SP. The user can then deposit digital valuables into, as well as retrieve, copy and delete them from its account, all being carried out in an authentic and secure manner. To store a digital valuable, the SP first encodes it into N parts based on an encoding algorithm, and then stores the N parts into one or more data storage devices. To retrieve or copy a digital valuable which has been stored previously, the SP reads the N parts from corresponding storage devices, and recovers the digital valuable from the N parts based on a decoding algorithm. The encoding and decoding algorithms are selected such that the original digital valuable is recovered correctly even if some of the N parts are lost or corrupted. To avoid storage error/corruption accumulation, the system periodically checks the N parts of every stored digital valuables and recovers/corrects lost/corrupted parts when they are detected.
GB0014589A 1998-01-16 1998-01-16 A method of data storage and apparatus therefor Expired - Fee Related GB2349964B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/SG1998/000003 WO1999037054A1 (en) 1998-01-16 1998-01-16 A method of data storage and apparatus therefor

Publications (3)

Publication Number Publication Date
GB0014589D0 GB0014589D0 (en) 2000-08-09
GB2349964A true GB2349964A (en) 2000-11-15
GB2349964B GB2349964B (en) 2002-07-24

Family

ID=20429827

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0014589A Expired - Fee Related GB2349964B (en) 1998-01-16 1998-01-16 A method of data storage and apparatus therefor

Country Status (3)

Country Link
AU (1) AU6236498A (en)
GB (1) GB2349964B (en)
WO (1) WO1999037054A1 (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU7596500A (en) 1999-09-20 2001-04-24 Quintiles Transnational Corporation System and method for analyzing de-identified health care data
JP4011243B2 (en) * 1999-10-15 2007-11-21 富士通株式会社 Electronic original management apparatus and method
US20020077941A1 (en) * 2000-01-11 2002-06-20 Halligan R. Mark Method and apparatus for documentation, analysis, auditing, accounting, protection, registration, and verification of trade secrets
GB0014414D0 (en) 2000-06-12 2000-08-09 Business Information Publicati Electronic deposit box system
WO2008065351A1 (en) * 2006-12-01 2008-06-05 David Irvine Self encryption
WO2008065343A1 (en) * 2006-12-01 2008-06-05 David Irvine Shared access to private files
WO2008065344A1 (en) * 2006-12-01 2008-06-05 David Irvine Anonymous authentication
GB2446199A (en) * 2006-12-01 2008-08-06 David Irvine Secure, decentralised and anonymous peer-to-peer network
WO2008065342A1 (en) * 2006-12-01 2008-06-05 David Irvine Data maps
US9355273B2 (en) 2006-12-18 2016-05-31 Bank Of America, N.A., As Collateral Agent System and method for the protection and de-identification of health care data

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0033833A2 (en) * 1980-02-11 1981-08-19 International Business Machines Corporation Transaction execution system, method of operating such a system and terminal for use in such a system
EP0166541A2 (en) * 1984-06-25 1986-01-02 Kabushiki Kaisha Toshiba Communications network using an enciphering and deciphering device
EP0547975A1 (en) * 1991-12-19 1993-06-23 Bull Cp8 Method and system to authenticate, by an external medium, a portable object connected via a transmission line to this medium
EP0561150A2 (en) * 1992-02-14 1993-09-22 Siemens Aktiengesellschaft Method for implementing programs in host connected to a communication system
EP0582827A2 (en) * 1992-08-10 1994-02-16 General Instrument Corporation Of Delaware Method and apparatus for communicating interleaved data
WO1996002993A2 (en) * 1994-07-19 1996-02-01 Bankers Trust Company Method for securely using digital signatures in a commercial cryptographic system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0033833A2 (en) * 1980-02-11 1981-08-19 International Business Machines Corporation Transaction execution system, method of operating such a system and terminal for use in such a system
EP0166541A2 (en) * 1984-06-25 1986-01-02 Kabushiki Kaisha Toshiba Communications network using an enciphering and deciphering device
EP0547975A1 (en) * 1991-12-19 1993-06-23 Bull Cp8 Method and system to authenticate, by an external medium, a portable object connected via a transmission line to this medium
EP0561150A2 (en) * 1992-02-14 1993-09-22 Siemens Aktiengesellschaft Method for implementing programs in host connected to a communication system
EP0582827A2 (en) * 1992-08-10 1994-02-16 General Instrument Corporation Of Delaware Method and apparatus for communicating interleaved data
WO1996002993A2 (en) * 1994-07-19 1996-02-01 Bankers Trust Company Method for securely using digital signatures in a commercial cryptographic system

Also Published As

Publication number Publication date
AU6236498A (en) 1999-08-02
WO1999037054A1 (en) 1999-07-22
GB2349964B (en) 2002-07-24
GB0014589D0 (en) 2000-08-09

Similar Documents

Publication Publication Date Title
Qian et al. Reversible data hiding in encrypted JPEG bitstream
Bhowmik et al. The multimedia blockchain: A distributed and tamper-proof media transaction framework
Boneh et al. Collusion-secure fingerprinting for digital data
Mıhçak et al. A perceptual audio hashing algorithm: a tool for robust audio identification and information hiding
GB2349964A (en) A method of data storage and apparatus therefor
EP0261162B1 (en) Method for qualitative saving of digitized data
Bravo-Solorio et al. Fast fragile watermark embedding and iterative mechanism with high self-restoration performance
US20060218435A1 (en) Method and system for a consumer oriented backup
US20050240768A1 (en) Re-embedding of watermarks in multimedia signals
CN106657266A (en) Architecture and method of secure and reliable public cloud storage system based on public clouds
US7266466B2 (en) Watermark time scale searching
Chen et al. Combined digital signature and digital watermark scheme for image authentication
Atoum et al. MP3 steganography
EP0973265A2 (en) Encoding/decoding device and method
JP2007528017A (en) Digital watermark embedding and detection
CN111600712A (en) Safety encryption processing system for geographic information data
Iftikhar et al. A survey on reversible watermarking techniques for relational databases
Patel et al. Steganography over video file by hiding video in another video file, random byte hiding and LSB technique
EP0650122B1 (en) Remote back-up device and method for numerical data
Yu et al. Reversible data hiding with pixel prediction and additive homomorphism for encrypted image
US7546466B2 (en) Decoding of watermarked information signals
Lamy et al. Content-Based Watermarking for Image Authentication
UA70360C2 (en) Protection against unauthorized access to data by checking the completeness of the data set
EP1609326A2 (en) Method of protecting a mobile-telephone-type telecommunication terminal
FR2925730A1 (en) METHOD AND SYSTEM FOR AUTHENTICATING INDIVIDUALS FROM BIOMETRIC DATA

Legal Events

Date Code Title Description
PCNP Patent ceased through non-payment of renewal fee

Effective date: 20090116