CA2100234A1 - Commercial Data Masking - Google Patents
Commercial Data MaskingInfo
- Publication number
- CA2100234A1 CA2100234A1 CA2100234A CA2100234A CA2100234A1 CA 2100234 A1 CA2100234 A1 CA 2100234A1 CA 2100234 A CA2100234 A CA 2100234A CA 2100234 A CA2100234 A CA 2100234A CA 2100234 A1 CA2100234 A1 CA 2100234A1
- Authority
- CA
- Canada
- Prior art keywords
- data
- data masking
- commercial data
- privacy
- text
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000000873 masking effect Effects 0.000 title abstract 4
- 238000000034 method Methods 0.000 abstract 2
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0625—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Abstract
A method and system are disclosed for the implementation of a weakened privacy channel. This is achieved through use of a weakened symmetric cryptographic algorithm called commercial data masking. The masked text is created from clear text at one system and may to transported electronically to another system where the masked text may be unmasked to produce the clear text. The reason to use the commercial data masking algorithm for data privacy is that it is exportable to organizations to which products which contain the Data Encryption Algorithm when used for data privacy are not exportable. In addition, a method and system is disclosed by which the key when used for commercial data masking may be transformed into a key that may be used with the Data Encryption Algorithm.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US962,951 | 1992-10-16 | ||
US07/962,951 US5323464A (en) | 1992-10-16 | 1992-10-16 | Commercial data masking |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2100234A1 true CA2100234A1 (en) | 1994-04-17 |
CA2100234C CA2100234C (en) | 1999-01-19 |
Family
ID=25506544
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002100234A Expired - Lifetime CA2100234C (en) | 1992-10-16 | 1993-07-09 | Commercial data masking |
Country Status (5)
Country | Link |
---|---|
US (1) | US5323464A (en) |
EP (1) | EP0592808B1 (en) |
JP (1) | JP2539164B2 (en) |
CA (1) | CA2100234C (en) |
DE (1) | DE69328334T2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8055668B2 (en) | 2008-02-13 | 2011-11-08 | Camouflage Software, Inc. | Method and system for masking data in a consistent manner across multiple data sources |
Families Citing this family (63)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH07271865A (en) * | 1994-04-01 | 1995-10-20 | Mitsubishi Corp | Method for managing copyright of data base |
US7036019B1 (en) * | 1994-04-01 | 2006-04-25 | Intarsia Software Llc | Method for controlling database copyrights |
US6744894B1 (en) | 1994-04-01 | 2004-06-01 | Mitsubishi Corporation | Data management system |
US6058478A (en) * | 1994-09-30 | 2000-05-02 | Intel Corporation | Apparatus and method for a vetted field upgrade |
US7302415B1 (en) | 1994-09-30 | 2007-11-27 | Intarsia Llc | Data copyright management system |
EP0715241B1 (en) * | 1994-10-27 | 2004-01-14 | Mitsubishi Corporation | Apparatus for data copyright management system |
EP0709760B1 (en) * | 1994-10-27 | 2006-05-31 | Intarsia Software LLC | Data copyright management system |
US6424715B1 (en) * | 1994-10-27 | 2002-07-23 | Mitsubishi Corporation | Digital content management system and apparatus |
GB9422389D0 (en) * | 1994-11-05 | 1995-01-04 | Int Computers Ltd | Authenticating access control for sensitive functions |
US5689565A (en) * | 1995-06-29 | 1997-11-18 | Microsoft Corporation | Cryptography system and method for providing cryptographic services for a computer application |
BR9610609A (en) * | 1995-07-27 | 1999-06-29 | Nextlevel Systems Inc | Cryptographic system with hidden work factor |
US8595502B2 (en) * | 1995-09-29 | 2013-11-26 | Intarsia Software Llc | Data management system |
US5659618A (en) * | 1995-09-29 | 1997-08-19 | Vlsi Technology, Inc. | Multi-size cryptographic key system |
US7801817B2 (en) * | 1995-10-27 | 2010-09-21 | Makoto Saito | Digital content management system and apparatus |
US5764772A (en) * | 1995-12-15 | 1998-06-09 | Lotus Development Coporation | Differential work factor cryptography method and system |
GB2308282B (en) * | 1995-12-15 | 2000-04-12 | Lotus Dev Corp | Differential work factor cryptography method and system |
JPH09233066A (en) * | 1996-02-23 | 1997-09-05 | Sony Corp | Encryption/decryption method and its device |
US6373952B2 (en) * | 1996-03-15 | 2002-04-16 | Sony Corporation | Data transmitting apparatus, data transmitting method, data receiving apparatus, data receiving method, data transmission apparatus, and data transmission method |
US6292896B1 (en) | 1997-01-22 | 2001-09-18 | International Business Machines Corporation | Method and apparatus for entity authentication and session key generation |
US6151678A (en) * | 1997-09-09 | 2000-11-21 | Intel Corporation | Anti-theft mechanism for mobile computers |
US6094485A (en) * | 1997-09-18 | 2000-07-25 | Netscape Communications Corporation | SSL step-up |
US6081598A (en) * | 1997-10-20 | 2000-06-27 | Microsoft Corporation | Cryptographic system and method with fast decryption |
JPH11177924A (en) * | 1997-12-10 | 1999-07-02 | Sony Corp | Signal reproducing device, signal recording device, signal recording system, signal reproducing method and signal recording method |
US6333983B1 (en) * | 1997-12-16 | 2001-12-25 | International Business Machines Corporation | Method and apparatus for performing strong encryption or decryption data using special encryption functions |
US6308266B1 (en) * | 1998-03-04 | 2001-10-23 | Microsoft Corporation | System and method for enabling different grades of cryptography strength in a product |
US6201871B1 (en) * | 1998-08-19 | 2001-03-13 | Qualcomm Incorporated | Secure processing for authentication of a wireless communications device |
JP3600454B2 (en) * | 1998-08-20 | 2004-12-15 | 株式会社東芝 | Encryption / decryption device, encryption / decryption method, and program storage medium therefor |
JP4763866B2 (en) | 1998-10-15 | 2011-08-31 | インターシア ソフトウェア エルエルシー | Method and apparatus for protecting digital data by double re-encryption |
US6560337B1 (en) | 1998-10-28 | 2003-05-06 | International Business Machines Corporation | Systems, methods and computer program products for reducing effective key length of ciphers using one-way cryptographic functions and an initial key |
US6363154B1 (en) | 1998-10-28 | 2002-03-26 | International Business Machines Corporation | Decentralized systems methods and computer program products for sending secure messages among a group of nodes |
US6578143B1 (en) * | 1998-12-18 | 2003-06-10 | Qualcomm Incorporated | Method for negotiating weakened keys in encryption systems |
KR100320183B1 (en) | 1999-03-17 | 2002-01-10 | 구자홍 | File encryption apparatus for digital data player |
US6715077B1 (en) * | 1999-03-23 | 2004-03-30 | International Business Machines Corporation | System and method to support varying maximum cryptographic strength for common data security architecture (CDSA) applications |
US6947560B1 (en) * | 1999-04-26 | 2005-09-20 | Telefonaktiebolaget L M Ericsson (Publ) | Method and device for effective key length control |
WO2000065767A1 (en) * | 1999-04-27 | 2000-11-02 | Mischenko Valentin Alexandrovi | Method for encrypting information and device for realization of the method |
US7103910B1 (en) * | 1999-11-22 | 2006-09-05 | Sun Microsystems, Inc. | Method and apparatus for verifying the legitimacy of an untrusted mechanism |
US6721888B1 (en) | 1999-11-22 | 2004-04-13 | Sun Microsystems, Inc. | Mechanism for merging multiple policies |
US7131008B1 (en) | 1999-11-22 | 2006-10-31 | Sun Microsystems, Inc. | Mechanism for dynamically constructing customized implementations to enforce restrictions |
US6792537B1 (en) | 1999-11-22 | 2004-09-14 | Sun Microsystems, Inc. | Mechanism for determining restrictions to impose on an implementation of a service |
US7051067B1 (en) * | 1999-11-22 | 2006-05-23 | Sun Microsystems, Inc. | Object oriented mechanism for dynamically constructing customized implementations to enforce restrictions |
US6823070B1 (en) * | 2000-03-28 | 2004-11-23 | Freescale Semiconductor, Inc. | Method for key escrow in a communication system and apparatus therefor |
US20020062452A1 (en) * | 2000-08-18 | 2002-05-23 | Warwick Ford | Countering credentials copying |
US7222233B1 (en) * | 2000-09-14 | 2007-05-22 | At&T Corp. | Method for secure remote backup |
FR2827722B1 (en) * | 2001-07-23 | 2004-08-20 | Gemplus Card Int | METHOD FOR GENERATING ELECTRONIC KEYS FOR THE IMPLEMENTATION OF A CRYTOGRAPHIC ALGORITHM, CHIP CARD IMPLEMENTING THE METHOD |
US8204929B2 (en) * | 2001-10-25 | 2012-06-19 | International Business Machines Corporation | Hiding sensitive information |
US7167560B2 (en) * | 2002-08-08 | 2007-01-23 | Matsushita Electric Industrial Co., Ltd. | Partial encryption of stream-formatted media |
US7274792B2 (en) * | 2002-08-09 | 2007-09-25 | Broadcom Corporation | Methods and apparatus for initialization vector processing |
WO2004023715A1 (en) * | 2002-09-03 | 2004-03-18 | The Regents Of The University Of California | Block cipher mode of operation for constructing a wide-blocksize block cipher from a conventional block cipher |
US8010467B2 (en) * | 2003-03-24 | 2011-08-30 | Fiske Software Llc | Active element machine computation |
US7366302B2 (en) * | 2003-08-25 | 2008-04-29 | Sony Corporation | Apparatus and method for an iterative cryptographic block |
US7263190B1 (en) * | 2004-04-06 | 2007-08-28 | United States Of America As Represented By The Secretary Of The Navy | System for securing the confidentiality of electronically stored data in the event of the physical theft thereof |
US7546461B2 (en) * | 2005-06-28 | 2009-06-09 | Microsoft Corporation | Strengthening secure hash functions |
US7657030B1 (en) | 2005-07-22 | 2010-02-02 | The United States Of America | Method for generating and distributing strong DES keys |
JP5384781B2 (en) * | 2005-08-18 | 2014-01-08 | 日本電気株式会社 | Secret communication system and method for generating shared secret information |
US7873166B2 (en) * | 2005-09-13 | 2011-01-18 | Avaya Inc. | Method for undetectably impeding key strength of encryption usage for products exported outside the U.S |
US20080037775A1 (en) | 2006-03-31 | 2008-02-14 | Avaya Technology Llc | Verifiable generation of weak symmetric keys for strong algorithms |
US7877398B2 (en) | 2007-11-19 | 2011-01-25 | International Business Machines Corporation | Masking related sensitive data in groups |
US8949155B2 (en) * | 2008-12-31 | 2015-02-03 | Microsoft Corporation | Protecting privacy of personally identifying information when delivering targeted assets |
US9207911B2 (en) * | 2009-07-31 | 2015-12-08 | Cassy Holdings Llc | Modular uncertainty random value generator and method |
CN103973651B (en) * | 2013-02-01 | 2018-02-27 | 腾讯科技(深圳)有限公司 | Setting, querying method and device are identified based on the account password of salt cryptographic libraries is added |
KR102154187B1 (en) * | 2014-08-07 | 2020-09-09 | 삼성전자 주식회사 | Memory device, memory system and operating method of memory system |
US10242000B2 (en) | 2016-05-27 | 2019-03-26 | International Business Machines Corporation | Consistent utility-preserving masking of a dataset in a distributed environment |
US10360820B2 (en) | 2016-09-04 | 2019-07-23 | Shahriar Pourazin | Instrumentation privacy apparatus and method |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3962539A (en) * | 1975-02-24 | 1976-06-08 | International Business Machines Corporation | Product block cipher system for data security |
US3958081A (en) * | 1975-02-24 | 1976-05-18 | International Business Machines Corporation | Block cipher system for data security |
US4405829A (en) * | 1977-12-14 | 1983-09-20 | Massachusetts Institute Of Technology | Cryptographic communications system and method |
WO1984000457A1 (en) * | 1982-07-15 | 1984-02-02 | Light Signatures Inc | Private communication system |
US4908861A (en) * | 1987-08-28 | 1990-03-13 | International Business Machines Corporation | Data authentication using modification detection codes based on a public one way encryption function |
US4941176A (en) * | 1988-08-11 | 1990-07-10 | International Business Machines Corporation | Secure management of keys using control vectors |
US5142578A (en) * | 1991-08-22 | 1992-08-25 | International Business Machines Corporation | Hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors |
-
1992
- 1992-10-16 US US07/962,951 patent/US5323464A/en not_active Expired - Lifetime
-
1993
- 1993-07-09 CA CA002100234A patent/CA2100234C/en not_active Expired - Lifetime
- 1993-09-08 EP EP93114398A patent/EP0592808B1/en not_active Expired - Lifetime
- 1993-09-08 DE DE69328334T patent/DE69328334T2/en not_active Expired - Lifetime
- 1993-09-21 JP JP5234451A patent/JP2539164B2/en not_active Expired - Fee Related
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8055668B2 (en) | 2008-02-13 | 2011-11-08 | Camouflage Software, Inc. | Method and system for masking data in a consistent manner across multiple data sources |
Also Published As
Publication number | Publication date |
---|---|
CA2100234C (en) | 1999-01-19 |
EP0592808B1 (en) | 2000-04-12 |
JP2539164B2 (en) | 1996-10-02 |
EP0592808A3 (en) | 1995-01-25 |
DE69328334T2 (en) | 2000-10-19 |
US5323464A (en) | 1994-06-21 |
EP0592808A2 (en) | 1994-04-20 |
DE69328334D1 (en) | 2000-05-18 |
JPH06202558A (en) | 1994-07-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2100234A1 (en) | Commercial Data Masking | |
EP0576224A3 (en) | Cryptographic key management apparatus and method. | |
ITTO940357A0 (en) | SECURITY LOCK AND FLAT KEY FOR SAID LOCK. | |
EP1505474A3 (en) | Process for protecting an information item transmitted from a security element to a decoder, security element and decoder using such a process | |
CA2318936A1 (en) | Method for protecting the audio/visual data across the nrss interface | |
IT9022351A0 (en) | CYLINDRICAL LOCK AND KEY, AS WELL AS KEY BLANK WITH MUTUALLY ADAPTED SAFETY ELEMENT. | |
WO1997005720A3 (en) | Cryptographic system with concealed work factor | |
WO1999044324A3 (en) | A method and apparatus for cryptographically secure algebraic key establishment protocols | |
AT399530B (en) | FLAT KEY AND OR OR LOCKING CYLINDER | |
AU1315100A (en) | System and method of securing a computer from unauthorized access | |
ZA936281B (en) | Identification cards, membership cards and the like. | |
ITTO930531A1 (en) | PROCEDURE FOR THE CONSTRUCTION OF PANELS APPLICABLE INSIDE VEHICLES, EQUIPMENT THAT IMPLEMENTS THE PROCEDURE AND PANEL PRODUCED WITH SUCH PROCEDURE. | |
EP0618477A3 (en) | Counterelectrode for smart window and smart window. | |
EP0634877A3 (en) | System and method for communicating with travelers. | |
AU5609694A (en) | Melanogenic inhibitor, and methods of producing and using the same | |
ATE167259T1 (en) | PERSONAL LOCK | |
SE9302648D0 (en) | Device for receiving equipment | |
Peel | GIS can do the job | |
Nye | Trick or treat? | |
Hales et al. | Expert systems in comminution | |
Navarro | National Polytechnic Institute (ipn) Receives Funds To Expand Research Facilities | |
Neagle | Mexico: No Plans For Privatization Of Pemex | |
Gary et al. | Income-generating Functions in a Low-income Country, Colombia | |
ATA87193A (en) | SECURITY DEVICE FOR SECURING VIDEO TAPES, AUDIO TAPES OR THE LIKE. | |
Holmes | Getting to grips with the daily grind |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKLA | Lapsed |
Effective date: 20130709 |
|
MKEC | Expiry (correction) |
Effective date: 20131009 |
|
MKEC | Expiry (correction) |
Effective date: 20131009 |