DE69328334D1 - Geschäftliche Datenmaskierung - Google Patents

Geschäftliche Datenmaskierung

Info

Publication number
DE69328334D1
DE69328334D1 DE69328334T DE69328334T DE69328334D1 DE 69328334 D1 DE69328334 D1 DE 69328334D1 DE 69328334 T DE69328334 T DE 69328334T DE 69328334 T DE69328334 T DE 69328334T DE 69328334 D1 DE69328334 D1 DE 69328334D1
Authority
DE
Germany
Prior art keywords
business data
data masking
masking
business
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
DE69328334T
Other languages
English (en)
Other versions
DE69328334T2 (de
Inventor
Robert C Elander
Christopher J Holloway
Donald B Johnson
Michael J Kelly
An V Le
Paul G Lubold
Stephen M Matyas
James D Randall
John D Wilkins
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Application granted granted Critical
Publication of DE69328334D1 publication Critical patent/DE69328334D1/de
Publication of DE69328334T2 publication Critical patent/DE69328334T2/de
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/04Masking or blinding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
DE69328334T 1992-10-16 1993-09-08 Geschäftliche Datenmaskierung Expired - Lifetime DE69328334T2 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US07/962,951 US5323464A (en) 1992-10-16 1992-10-16 Commercial data masking

Publications (2)

Publication Number Publication Date
DE69328334D1 true DE69328334D1 (de) 2000-05-18
DE69328334T2 DE69328334T2 (de) 2000-10-19

Family

ID=25506544

Family Applications (1)

Application Number Title Priority Date Filing Date
DE69328334T Expired - Lifetime DE69328334T2 (de) 1992-10-16 1993-09-08 Geschäftliche Datenmaskierung

Country Status (5)

Country Link
US (1) US5323464A (de)
EP (1) EP0592808B1 (de)
JP (1) JP2539164B2 (de)
CA (1) CA2100234C (de)
DE (1) DE69328334T2 (de)

Families Citing this family (64)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH07271865A (ja) * 1994-04-01 1995-10-20 Mitsubishi Corp データベース著作権管理方法
US7036019B1 (en) * 1994-04-01 2006-04-25 Intarsia Software Llc Method for controlling database copyrights
US6744894B1 (en) 1994-04-01 2004-06-01 Mitsubishi Corporation Data management system
US6058478A (en) * 1994-09-30 2000-05-02 Intel Corporation Apparatus and method for a vetted field upgrade
US7302415B1 (en) 1994-09-30 2007-11-27 Intarsia Llc Data copyright management system
EP0715241B1 (de) * 1994-10-27 2004-01-14 Mitsubishi Corporation Gerät für Dateiurheberrechte-Verwaltungssystem
EP0709760B1 (de) * 1994-10-27 2006-05-31 Intarsia Software LLC Urheberrechtsdatenverwaltungssystem
US6424715B1 (en) * 1994-10-27 2002-07-23 Mitsubishi Corporation Digital content management system and apparatus
GB9422389D0 (en) * 1994-11-05 1995-01-04 Int Computers Ltd Authenticating access control for sensitive functions
US5689565A (en) * 1995-06-29 1997-11-18 Microsoft Corporation Cryptography system and method for providing cryptographic services for a computer application
BR9610609A (pt) * 1995-07-27 1999-06-29 Nextlevel Systems Inc Sistema criptográfico com fator trabalho oculto
US8595502B2 (en) * 1995-09-29 2013-11-26 Intarsia Software Llc Data management system
US5659618A (en) * 1995-09-29 1997-08-19 Vlsi Technology, Inc. Multi-size cryptographic key system
US7801817B2 (en) * 1995-10-27 2010-09-21 Makoto Saito Digital content management system and apparatus
US5764772A (en) * 1995-12-15 1998-06-09 Lotus Development Coporation Differential work factor cryptography method and system
GB2308282B (en) * 1995-12-15 2000-04-12 Lotus Dev Corp Differential work factor cryptography method and system
JPH09233066A (ja) * 1996-02-23 1997-09-05 Sony Corp 暗号化/解読化方法および装置
US6373952B2 (en) * 1996-03-15 2002-04-16 Sony Corporation Data transmitting apparatus, data transmitting method, data receiving apparatus, data receiving method, data transmission apparatus, and data transmission method
US6292896B1 (en) 1997-01-22 2001-09-18 International Business Machines Corporation Method and apparatus for entity authentication and session key generation
US6151678A (en) * 1997-09-09 2000-11-21 Intel Corporation Anti-theft mechanism for mobile computers
US6094485A (en) * 1997-09-18 2000-07-25 Netscape Communications Corporation SSL step-up
US6081598A (en) * 1997-10-20 2000-06-27 Microsoft Corporation Cryptographic system and method with fast decryption
JPH11177924A (ja) * 1997-12-10 1999-07-02 Sony Corp 信号再生装置、信号記録装置、信号記録システム、信号再生方法、並びに、信号記録方法
US6333983B1 (en) * 1997-12-16 2001-12-25 International Business Machines Corporation Method and apparatus for performing strong encryption or decryption data using special encryption functions
US6308266B1 (en) * 1998-03-04 2001-10-23 Microsoft Corporation System and method for enabling different grades of cryptography strength in a product
US6201871B1 (en) * 1998-08-19 2001-03-13 Qualcomm Incorporated Secure processing for authentication of a wireless communications device
JP3600454B2 (ja) * 1998-08-20 2004-12-15 株式会社東芝 暗号化・復号装置、暗号化・復号方法、およびそのプログラム記憶媒体
JP4763866B2 (ja) 1998-10-15 2011-08-31 インターシア ソフトウェア エルエルシー 2重再暗号化によりデジタルデータを保護する方法及び装置
US6560337B1 (en) 1998-10-28 2003-05-06 International Business Machines Corporation Systems, methods and computer program products for reducing effective key length of ciphers using one-way cryptographic functions and an initial key
US6363154B1 (en) 1998-10-28 2002-03-26 International Business Machines Corporation Decentralized systems methods and computer program products for sending secure messages among a group of nodes
US6578143B1 (en) * 1998-12-18 2003-06-10 Qualcomm Incorporated Method for negotiating weakened keys in encryption systems
KR100320183B1 (ko) 1999-03-17 2002-01-10 구자홍 디지탈데이터 플레이어의 파일 암호화 장치
US6715077B1 (en) * 1999-03-23 2004-03-30 International Business Machines Corporation System and method to support varying maximum cryptographic strength for common data security architecture (CDSA) applications
US6947560B1 (en) * 1999-04-26 2005-09-20 Telefonaktiebolaget L M Ericsson (Publ) Method and device for effective key length control
WO2000065767A1 (en) * 1999-04-27 2000-11-02 Mischenko Valentin Alexandrovi Method for encrypting information and device for realization of the method
US7103910B1 (en) * 1999-11-22 2006-09-05 Sun Microsystems, Inc. Method and apparatus for verifying the legitimacy of an untrusted mechanism
US6721888B1 (en) 1999-11-22 2004-04-13 Sun Microsystems, Inc. Mechanism for merging multiple policies
US7131008B1 (en) 1999-11-22 2006-10-31 Sun Microsystems, Inc. Mechanism for dynamically constructing customized implementations to enforce restrictions
US6792537B1 (en) 1999-11-22 2004-09-14 Sun Microsystems, Inc. Mechanism for determining restrictions to impose on an implementation of a service
US7051067B1 (en) * 1999-11-22 2006-05-23 Sun Microsystems, Inc. Object oriented mechanism for dynamically constructing customized implementations to enforce restrictions
US6823070B1 (en) * 2000-03-28 2004-11-23 Freescale Semiconductor, Inc. Method for key escrow in a communication system and apparatus therefor
US20020062452A1 (en) * 2000-08-18 2002-05-23 Warwick Ford Countering credentials copying
US7222233B1 (en) * 2000-09-14 2007-05-22 At&T Corp. Method for secure remote backup
FR2827722B1 (fr) * 2001-07-23 2004-08-20 Gemplus Card Int Procede de generation de cles electroniques pour la mise en oeuvre d'un algorithme crytographique,carte a puce mettant en oeuvre le procede
US8204929B2 (en) * 2001-10-25 2012-06-19 International Business Machines Corporation Hiding sensitive information
US7167560B2 (en) * 2002-08-08 2007-01-23 Matsushita Electric Industrial Co., Ltd. Partial encryption of stream-formatted media
US7274792B2 (en) * 2002-08-09 2007-09-25 Broadcom Corporation Methods and apparatus for initialization vector processing
WO2004023715A1 (en) * 2002-09-03 2004-03-18 The Regents Of The University Of California Block cipher mode of operation for constructing a wide-blocksize block cipher from a conventional block cipher
US8010467B2 (en) * 2003-03-24 2011-08-30 Fiske Software Llc Active element machine computation
US7366302B2 (en) * 2003-08-25 2008-04-29 Sony Corporation Apparatus and method for an iterative cryptographic block
US7263190B1 (en) * 2004-04-06 2007-08-28 United States Of America As Represented By The Secretary Of The Navy System for securing the confidentiality of electronically stored data in the event of the physical theft thereof
US7546461B2 (en) * 2005-06-28 2009-06-09 Microsoft Corporation Strengthening secure hash functions
US7657030B1 (en) 2005-07-22 2010-02-02 The United States Of America Method for generating and distributing strong DES keys
JP5384781B2 (ja) * 2005-08-18 2014-01-08 日本電気株式会社 秘匿通信システムおよび共有秘密情報の生成方法
US7873166B2 (en) * 2005-09-13 2011-01-18 Avaya Inc. Method for undetectably impeding key strength of encryption usage for products exported outside the U.S
US20080037775A1 (en) 2006-03-31 2008-02-14 Avaya Technology Llc Verifiable generation of weak symmetric keys for strong algorithms
US7877398B2 (en) 2007-11-19 2011-01-25 International Business Machines Corporation Masking related sensitive data in groups
US8055668B2 (en) 2008-02-13 2011-11-08 Camouflage Software, Inc. Method and system for masking data in a consistent manner across multiple data sources
US8949155B2 (en) * 2008-12-31 2015-02-03 Microsoft Corporation Protecting privacy of personally identifying information when delivering targeted assets
US9207911B2 (en) * 2009-07-31 2015-12-08 Cassy Holdings Llc Modular uncertainty random value generator and method
CN103973651B (zh) * 2013-02-01 2018-02-27 腾讯科技(深圳)有限公司 基于加盐密码库的账户密码标识设置、查询方法及装置
KR102154187B1 (ko) * 2014-08-07 2020-09-09 삼성전자 주식회사 메모리 장치, 메모리 시스템 및 메모리 시스템의 동작 방법
US10242000B2 (en) 2016-05-27 2019-03-26 International Business Machines Corporation Consistent utility-preserving masking of a dataset in a distributed environment
US10360820B2 (en) 2016-09-04 2019-07-23 Shahriar Pourazin Instrumentation privacy apparatus and method

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3962539A (en) * 1975-02-24 1976-06-08 International Business Machines Corporation Product block cipher system for data security
US3958081A (en) * 1975-02-24 1976-05-18 International Business Machines Corporation Block cipher system for data security
US4405829A (en) * 1977-12-14 1983-09-20 Massachusetts Institute Of Technology Cryptographic communications system and method
WO1984000457A1 (en) * 1982-07-15 1984-02-02 Light Signatures Inc Private communication system
US4908861A (en) * 1987-08-28 1990-03-13 International Business Machines Corporation Data authentication using modification detection codes based on a public one way encryption function
US4941176A (en) * 1988-08-11 1990-07-10 International Business Machines Corporation Secure management of keys using control vectors
US5142578A (en) * 1991-08-22 1992-08-25 International Business Machines Corporation Hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors

Also Published As

Publication number Publication date
CA2100234C (en) 1999-01-19
EP0592808B1 (de) 2000-04-12
JP2539164B2 (ja) 1996-10-02
EP0592808A3 (de) 1995-01-25
DE69328334T2 (de) 2000-10-19
US5323464A (en) 1994-06-21
CA2100234A1 (en) 1994-04-17
EP0592808A2 (de) 1994-04-20
JPH06202558A (ja) 1994-07-22

Similar Documents

Publication Publication Date Title
DE69328334D1 (de) Geschäftliche Datenmaskierung
DE69319364T2 (de) Elektronisches Schreibsystem
DE69321182T2 (de) Datenträgersystem
DE59309537D1 (de) Potentialfreie Datenschnittstelle
ATE176346T1 (de) Kartenförmiger datenträger
DE69322566T2 (de) Datenprozessor
DE69313796D1 (de) Maskierband
DE69304178T2 (de) Aufzeichnungsträger
NO924464D0 (no) Data-dekoeringsanordning
DE29500440U1 (de) Kartenförmiger Datenträger
DE69305466T2 (de) Geschäftsformular
DE9308446U1 (de) Visitenkarte
KR940026478U (ko) 명함지
DE9215909U1 (de) Notfall-Informationsträger
DE9316802U1 (de) Informationsträger
KR940004054U (ko) 중형 컴퓨터
KR950022994U (ko) 명함케이스
KR960004331U (ko) 명함 케이스
SE9300177D0 (sv) Bank - luck affaerskoncept
DE9218513U1 (de) Informations- oder Werbemittler
SE9301981D0 (sv) Visitkort
KR940019965U (ko) 명함겸용 성냥
FI932986A0 (fi) Foerfarande och kopplingsanordning foer serieoeverfoering av binaert kodat data
SE9203155D0 (sv) Datagiro
KR930012883U (ko) 명함 케이스

Legal Events

Date Code Title Description
8364 No opposition during term of opposition
8320 Willingness to grant licences declared (paragraph 23)