CA2100234A1 - Commercial Data Masking - Google Patents

Commercial Data Masking

Info

Publication number
CA2100234A1
CA2100234A1 CA2100234A CA2100234A CA2100234A1 CA 2100234 A1 CA2100234 A1 CA 2100234A1 CA 2100234 A CA2100234 A CA 2100234A CA 2100234 A CA2100234 A CA 2100234A CA 2100234 A1 CA2100234 A1 CA 2100234A1
Authority
CA
Canada
Prior art keywords
data
data masking
commercial data
privacy
text
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA2100234A
Other languages
French (fr)
Other versions
CA2100234C (en
Inventor
Robert C. Elander
Christopher J. Holloway
Donald B. Johnson
Michael J. Kelly
An V. Le
Paul G. Lubold
Stephen M. Matyas
James D. Randall
John D. Wilkins
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Publication of CA2100234A1 publication Critical patent/CA2100234A1/en
Application granted granted Critical
Publication of CA2100234C publication Critical patent/CA2100234C/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/04Masking or blinding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Abstract

A method and system are disclosed for the implementation of a weakened privacy channel. This is achieved through use of a weakened symmetric cryptographic algorithm called commercial data masking. The masked text is created from clear text at one system and may to transported electronically to another system where the masked text may be unmasked to produce the clear text. The reason to use the commercial data masking algorithm for data privacy is that it is exportable to organizations to which products which contain the Data Encryption Algorithm when used for data privacy are not exportable. In addition, a method and system is disclosed by which the key when used for commercial data masking may be transformed into a key that may be used with the Data Encryption Algorithm.
CA002100234A 1992-10-16 1993-07-09 Commercial data masking Expired - Lifetime CA2100234C (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US962,951 1992-10-16
US07/962,951 US5323464A (en) 1992-10-16 1992-10-16 Commercial data masking

Publications (2)

Publication Number Publication Date
CA2100234A1 true CA2100234A1 (en) 1994-04-17
CA2100234C CA2100234C (en) 1999-01-19

Family

ID=25506544

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002100234A Expired - Lifetime CA2100234C (en) 1992-10-16 1993-07-09 Commercial data masking

Country Status (5)

Country Link
US (1) US5323464A (en)
EP (1) EP0592808B1 (en)
JP (1) JP2539164B2 (en)
CA (1) CA2100234C (en)
DE (1) DE69328334T2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8055668B2 (en) 2008-02-13 2011-11-08 Camouflage Software, Inc. Method and system for masking data in a consistent manner across multiple data sources

Families Citing this family (63)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH07271865A (en) * 1994-04-01 1995-10-20 Mitsubishi Corp Method for managing copyright of data base
US7036019B1 (en) * 1994-04-01 2006-04-25 Intarsia Software Llc Method for controlling database copyrights
US6744894B1 (en) 1994-04-01 2004-06-01 Mitsubishi Corporation Data management system
US6058478A (en) * 1994-09-30 2000-05-02 Intel Corporation Apparatus and method for a vetted field upgrade
US7302415B1 (en) 1994-09-30 2007-11-27 Intarsia Llc Data copyright management system
EP0715241B1 (en) * 1994-10-27 2004-01-14 Mitsubishi Corporation Apparatus for data copyright management system
EP0709760B1 (en) * 1994-10-27 2006-05-31 Intarsia Software LLC Data copyright management system
US6424715B1 (en) * 1994-10-27 2002-07-23 Mitsubishi Corporation Digital content management system and apparatus
GB9422389D0 (en) * 1994-11-05 1995-01-04 Int Computers Ltd Authenticating access control for sensitive functions
US5689565A (en) * 1995-06-29 1997-11-18 Microsoft Corporation Cryptography system and method for providing cryptographic services for a computer application
BR9610609A (en) * 1995-07-27 1999-06-29 Nextlevel Systems Inc Cryptographic system with hidden work factor
US8595502B2 (en) * 1995-09-29 2013-11-26 Intarsia Software Llc Data management system
US5659618A (en) * 1995-09-29 1997-08-19 Vlsi Technology, Inc. Multi-size cryptographic key system
US7801817B2 (en) * 1995-10-27 2010-09-21 Makoto Saito Digital content management system and apparatus
US5764772A (en) * 1995-12-15 1998-06-09 Lotus Development Coporation Differential work factor cryptography method and system
GB2308282B (en) * 1995-12-15 2000-04-12 Lotus Dev Corp Differential work factor cryptography method and system
JPH09233066A (en) * 1996-02-23 1997-09-05 Sony Corp Encryption/decryption method and its device
US6373952B2 (en) * 1996-03-15 2002-04-16 Sony Corporation Data transmitting apparatus, data transmitting method, data receiving apparatus, data receiving method, data transmission apparatus, and data transmission method
US6292896B1 (en) 1997-01-22 2001-09-18 International Business Machines Corporation Method and apparatus for entity authentication and session key generation
US6151678A (en) * 1997-09-09 2000-11-21 Intel Corporation Anti-theft mechanism for mobile computers
US6094485A (en) * 1997-09-18 2000-07-25 Netscape Communications Corporation SSL step-up
US6081598A (en) * 1997-10-20 2000-06-27 Microsoft Corporation Cryptographic system and method with fast decryption
JPH11177924A (en) * 1997-12-10 1999-07-02 Sony Corp Signal reproducing device, signal recording device, signal recording system, signal reproducing method and signal recording method
US6333983B1 (en) * 1997-12-16 2001-12-25 International Business Machines Corporation Method and apparatus for performing strong encryption or decryption data using special encryption functions
US6308266B1 (en) * 1998-03-04 2001-10-23 Microsoft Corporation System and method for enabling different grades of cryptography strength in a product
US6201871B1 (en) * 1998-08-19 2001-03-13 Qualcomm Incorporated Secure processing for authentication of a wireless communications device
JP3600454B2 (en) * 1998-08-20 2004-12-15 株式会社東芝 Encryption / decryption device, encryption / decryption method, and program storage medium therefor
JP4763866B2 (en) 1998-10-15 2011-08-31 インターシア ソフトウェア エルエルシー Method and apparatus for protecting digital data by double re-encryption
US6560337B1 (en) 1998-10-28 2003-05-06 International Business Machines Corporation Systems, methods and computer program products for reducing effective key length of ciphers using one-way cryptographic functions and an initial key
US6363154B1 (en) 1998-10-28 2002-03-26 International Business Machines Corporation Decentralized systems methods and computer program products for sending secure messages among a group of nodes
US6578143B1 (en) * 1998-12-18 2003-06-10 Qualcomm Incorporated Method for negotiating weakened keys in encryption systems
KR100320183B1 (en) 1999-03-17 2002-01-10 구자홍 File encryption apparatus for digital data player
US6715077B1 (en) * 1999-03-23 2004-03-30 International Business Machines Corporation System and method to support varying maximum cryptographic strength for common data security architecture (CDSA) applications
US6947560B1 (en) * 1999-04-26 2005-09-20 Telefonaktiebolaget L M Ericsson (Publ) Method and device for effective key length control
WO2000065767A1 (en) * 1999-04-27 2000-11-02 Mischenko Valentin Alexandrovi Method for encrypting information and device for realization of the method
US7103910B1 (en) * 1999-11-22 2006-09-05 Sun Microsystems, Inc. Method and apparatus for verifying the legitimacy of an untrusted mechanism
US6721888B1 (en) 1999-11-22 2004-04-13 Sun Microsystems, Inc. Mechanism for merging multiple policies
US7131008B1 (en) 1999-11-22 2006-10-31 Sun Microsystems, Inc. Mechanism for dynamically constructing customized implementations to enforce restrictions
US6792537B1 (en) 1999-11-22 2004-09-14 Sun Microsystems, Inc. Mechanism for determining restrictions to impose on an implementation of a service
US7051067B1 (en) * 1999-11-22 2006-05-23 Sun Microsystems, Inc. Object oriented mechanism for dynamically constructing customized implementations to enforce restrictions
US6823070B1 (en) * 2000-03-28 2004-11-23 Freescale Semiconductor, Inc. Method for key escrow in a communication system and apparatus therefor
US20020062452A1 (en) * 2000-08-18 2002-05-23 Warwick Ford Countering credentials copying
US7222233B1 (en) * 2000-09-14 2007-05-22 At&T Corp. Method for secure remote backup
FR2827722B1 (en) * 2001-07-23 2004-08-20 Gemplus Card Int METHOD FOR GENERATING ELECTRONIC KEYS FOR THE IMPLEMENTATION OF A CRYTOGRAPHIC ALGORITHM, CHIP CARD IMPLEMENTING THE METHOD
US8204929B2 (en) * 2001-10-25 2012-06-19 International Business Machines Corporation Hiding sensitive information
US7167560B2 (en) * 2002-08-08 2007-01-23 Matsushita Electric Industrial Co., Ltd. Partial encryption of stream-formatted media
US7274792B2 (en) * 2002-08-09 2007-09-25 Broadcom Corporation Methods and apparatus for initialization vector processing
WO2004023715A1 (en) * 2002-09-03 2004-03-18 The Regents Of The University Of California Block cipher mode of operation for constructing a wide-blocksize block cipher from a conventional block cipher
US8010467B2 (en) * 2003-03-24 2011-08-30 Fiske Software Llc Active element machine computation
US7366302B2 (en) * 2003-08-25 2008-04-29 Sony Corporation Apparatus and method for an iterative cryptographic block
US7263190B1 (en) * 2004-04-06 2007-08-28 United States Of America As Represented By The Secretary Of The Navy System for securing the confidentiality of electronically stored data in the event of the physical theft thereof
US7546461B2 (en) * 2005-06-28 2009-06-09 Microsoft Corporation Strengthening secure hash functions
US7657030B1 (en) 2005-07-22 2010-02-02 The United States Of America Method for generating and distributing strong DES keys
JP5384781B2 (en) * 2005-08-18 2014-01-08 日本電気株式会社 Secret communication system and method for generating shared secret information
US7873166B2 (en) * 2005-09-13 2011-01-18 Avaya Inc. Method for undetectably impeding key strength of encryption usage for products exported outside the U.S
US20080037775A1 (en) 2006-03-31 2008-02-14 Avaya Technology Llc Verifiable generation of weak symmetric keys for strong algorithms
US7877398B2 (en) 2007-11-19 2011-01-25 International Business Machines Corporation Masking related sensitive data in groups
US8949155B2 (en) * 2008-12-31 2015-02-03 Microsoft Corporation Protecting privacy of personally identifying information when delivering targeted assets
US9207911B2 (en) * 2009-07-31 2015-12-08 Cassy Holdings Llc Modular uncertainty random value generator and method
CN103973651B (en) * 2013-02-01 2018-02-27 腾讯科技(深圳)有限公司 Setting, querying method and device are identified based on the account password of salt cryptographic libraries is added
KR102154187B1 (en) * 2014-08-07 2020-09-09 삼성전자 주식회사 Memory device, memory system and operating method of memory system
US10242000B2 (en) 2016-05-27 2019-03-26 International Business Machines Corporation Consistent utility-preserving masking of a dataset in a distributed environment
US10360820B2 (en) 2016-09-04 2019-07-23 Shahriar Pourazin Instrumentation privacy apparatus and method

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3962539A (en) * 1975-02-24 1976-06-08 International Business Machines Corporation Product block cipher system for data security
US3958081A (en) * 1975-02-24 1976-05-18 International Business Machines Corporation Block cipher system for data security
US4405829A (en) * 1977-12-14 1983-09-20 Massachusetts Institute Of Technology Cryptographic communications system and method
WO1984000457A1 (en) * 1982-07-15 1984-02-02 Light Signatures Inc Private communication system
US4908861A (en) * 1987-08-28 1990-03-13 International Business Machines Corporation Data authentication using modification detection codes based on a public one way encryption function
US4941176A (en) * 1988-08-11 1990-07-10 International Business Machines Corporation Secure management of keys using control vectors
US5142578A (en) * 1991-08-22 1992-08-25 International Business Machines Corporation Hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8055668B2 (en) 2008-02-13 2011-11-08 Camouflage Software, Inc. Method and system for masking data in a consistent manner across multiple data sources

Also Published As

Publication number Publication date
CA2100234C (en) 1999-01-19
EP0592808B1 (en) 2000-04-12
JP2539164B2 (en) 1996-10-02
EP0592808A3 (en) 1995-01-25
DE69328334T2 (en) 2000-10-19
US5323464A (en) 1994-06-21
EP0592808A2 (en) 1994-04-20
DE69328334D1 (en) 2000-05-18
JPH06202558A (en) 1994-07-22

Similar Documents

Publication Publication Date Title
CA2100234A1 (en) Commercial Data Masking
EP0576224A3 (en) Cryptographic key management apparatus and method.
ITTO940357A0 (en) SECURITY LOCK AND FLAT KEY FOR SAID LOCK.
EP1505474A3 (en) Process for protecting an information item transmitted from a security element to a decoder, security element and decoder using such a process
CA2318936A1 (en) Method for protecting the audio/visual data across the nrss interface
IT9022351A0 (en) CYLINDRICAL LOCK AND KEY, AS WELL AS KEY BLANK WITH MUTUALLY ADAPTED SAFETY ELEMENT.
WO1997005720A3 (en) Cryptographic system with concealed work factor
WO1999044324A3 (en) A method and apparatus for cryptographically secure algebraic key establishment protocols
AT399530B (en) FLAT KEY AND OR OR LOCKING CYLINDER
AU1315100A (en) System and method of securing a computer from unauthorized access
ZA936281B (en) Identification cards, membership cards and the like.
ITTO930531A1 (en) PROCEDURE FOR THE CONSTRUCTION OF PANELS APPLICABLE INSIDE VEHICLES, EQUIPMENT THAT IMPLEMENTS THE PROCEDURE AND PANEL PRODUCED WITH SUCH PROCEDURE.
EP0618477A3 (en) Counterelectrode for smart window and smart window.
EP0634877A3 (en) System and method for communicating with travelers.
AU5609694A (en) Melanogenic inhibitor, and methods of producing and using the same
ATE167259T1 (en) PERSONAL LOCK
SE9302648D0 (en) Device for receiving equipment
Peel GIS can do the job
Nye Trick or treat?
Hales et al. Expert systems in comminution
Navarro National Polytechnic Institute (ipn) Receives Funds To Expand Research Facilities
Neagle Mexico: No Plans For Privatization Of Pemex
Gary et al. Income-generating Functions in a Low-income Country, Colombia
ATA87193A (en) SECURITY DEVICE FOR SECURING VIDEO TAPES, AUDIO TAPES OR THE LIKE.
Holmes Getting to grips with the daily grind

Legal Events

Date Code Title Description
EEER Examination request
MKLA Lapsed

Effective date: 20130709

MKEC Expiry (correction)

Effective date: 20131009

MKEC Expiry (correction)

Effective date: 20131009