-
公开(公告)号:GB2589760A
公开(公告)日:2021-06-09
申请号:GB202020421
申请日:2019-04-30
Applicant: IBM
Inventor: ONUR GOEKCE , EMMANUEL DELAMARCHE , EDUARDA FREIRE-STOEGBUCHNER , JAN CAMENISCH
IPC: G06Q30/00
Abstract: Methods are provided for producing an authenticated packaged product. The method includes providing on the product a security code encoding security data for the product, packing the product in packaging, and providing a tag carrying encrypted product data on the packaging. The product data comprises the security data for the product. The method further comprises storing a decryption key for the encrypted product data at a network server, and providing on the packaging access data for accessing the decryption key at the network server. Corresponding methods and systems are provided for verifying authenticity of such an authenticated packaged product.
-
公开(公告)号:GB2576289A
公开(公告)日:2020-02-12
申请号:GB201917321
申请日:2018-05-17
Applicant: IBM
Inventor: ANGELO DE CARO , ESHA GHOSH , ALESSANDRO SORNIOTTI , JAN CAMENISCH
IPC: H04L9/00
Abstract: Generation of a cryptographic key is deterministically derived from client data of which a client computer proves knowledge in order to obtain the key. A client computer provides client data and is adapted to define a vector, having a plurality of data blocks with indices, corresponding to the client data. The client computer is further adapted to generate a first non-hiding vector commitment and a second hiding vector commitment, to the vector, and to generate a third commitment to the first commitment. The client computer sends the second and third commitments to the key server, and provides to the key server a first proof of knowledge, for a subset of the indices, of the corresponding data blocks of the vector in the second and third commitments. The key server stores a secret server key and is adapted to engage with the client computer in a key-generation protocol.
-
公开(公告)号:GB2589760B
公开(公告)日:2022-06-22
申请号:GB202020421
申请日:2019-04-30
Applicant: IBM
Inventor: ONUR GOEKCE , EMMANUEL DELAMARCHE , EDUARDA FREIRE-STOEGBUCHNER , JAN CAMENISCH
Abstract: Methods are provided for producing an authenticated packaged product. The method includes providing on the product a security code encoding security data for the product, packing the product in packaging, and providing a tag carrying encrypted product data on the packaging. The product data comprises the security data for the product. The method further comprises storing a decryption key for the encrypted product data at a network server, and providing on the packaging access data for accessing the decryption key at the network server. Corresponding methods and systems are provided for verifying authenticity of such an authenticated packaged product.
-
公开(公告)号:GB2574141A
公开(公告)日:2019-11-27
申请号:GB201911905
申请日:2018-01-02
Applicant: IBM
Inventor: ANJA LEHMANN , CHRISTIAN CACHIN , JAN CAMENISCH , EDUARDA FREIRE STOGBUCHNER
Abstract: Data masking is provided by, for at least one predetermined data item in data to be sent, applying a one-way function to that data item to produce a first value, producing a masked data item by encrypting the first value via a deterministic encryption scheme using a current encryption key for a current epoch, and replacing that data item by the masked data item. A data-provider computer sends the masked data to the data-user computer. On expiry of the current epoch, the data-provider computer generates a new encryption key for the encryption scheme in a new epoch, produces mask-update data, dependent on the current and new encryption keys, and sends the mask-update data to the data-user computer. The mask-update data permits updating, at the data-user computer, of masked data items produced with the current encryption key into masked data items produced with the new encryption key.
-
公开(公告)号:GB2576289B
公开(公告)日:2020-08-12
申请号:GB201917321
申请日:2018-05-17
Applicant: IBM
Inventor: ANGELO DE CARO , ESHA GHOSH , ALESSANDRO SORNIOTTI , JAN CAMENISCH
IPC: H04L9/00
Abstract: Generation of a cryptographic key is deterministically derived from client data of which a client computer proves knowledge in order to obtain the key. A client computer provides client data and is adapted to define a vector, having a plurality of data blocks with indices, corresponding to the client data. The client computer is further adapted to generate a first non-hiding vector commitment and a second hiding vector commitment, to the vector, and to generate a third commitment to the first commitment. The client computer sends the second and third commitments to the key server, and provides to the key server a first proof of knowledge, for a subset of the indices, of the corresponding data blocks of the vector in the second and third commitments. The key server stores a secret server key and is adapted to engage with the client computer in a key-generation protocol.
-
公开(公告)号:GB2562825A
公开(公告)日:2018-11-28
申请号:GB201803470
申请日:2017-02-24
Applicant: IBM
Inventor: JAN CAMENISCH , MARIA DUBOVITSKAYA , ANJA LEHMANN , GREGORY NEVEN
Abstract: A method performs anonymous read/write accesses of a set of user devices to a server. Write accesses of the user devices of the set comprise generating an encrypted file by an anonymous encryption scheme (510); computing a pseudorandom tag (520); indexing the encrypted file with the tag as user set index of the user set (530) and writing the encrypted file and the associated tag to the storage system of the server (540). Read accesses of the user devices of the set comprise downloading tag data corresponding to a plurality of tags from the server (610), the tag data enabling the user devices of a respective set to recognize so-called "own" tags computed by one of the user devices of the respective set of user devices; determining the own tags among the plurality of tags (620); reading one or more encrypted files associated to the own tags (630); and decrypting the encrypted files (640).
-
公开(公告)号:GB2562825B
公开(公告)日:2022-03-30
申请号:GB201803470
申请日:2017-02-24
Applicant: IBM
Inventor: JAN CAMENISCH , MARIA DUBOVITSKAYA , ANJA LEHMANN , GREGORY NEVEN
Abstract: The invention performs anonymous read/write accesses of a set of user devices to a server. Write accesses of the user devices of the set comprise generating an encrypted file by an anonymous encryption scheme; computing a pseudorandom tag; indexing the encrypted file with the tag as user set index of the user set and writing the encrypted file and the associated tag to the a storage system of the server. Read accesses of the user devices of the set comprise downloading tag data corresponding to a plurality of tags from the server, the tag data enabling the user devices of a respective set to recognize so-called “own” tags computed by one of the user devices of the respective set of user devices; determining the own tags among the plurality of tags; reading one or more encrypted files associated to the own tags; and decrypting the encrypted files.
-
公开(公告)号:GB2574141B
公开(公告)日:2020-05-20
申请号:GB201911905
申请日:2018-01-02
Applicant: IBM
Inventor: ANJA LEHMANN , CHRISTIAN CACHIN , JAN CAMENISCH , EDUARDA FREIRE STOGBUCHNER
Abstract: Data masking is provided by, for at least one predetermined data item in data to be sent, applying a one-way function to that data item to produce a first value, producing a masked data item by encrypting the first value via a deterministic encryption scheme using a current encryption key for a current epoch, and replacing that data item by the masked data item. A data-provider computer sends the masked data to the data-user computer. On expiry of the current epoch, the data-provider computer generates a new encryption key for the encryption scheme in a new epoch, produces mask-update data, dependent on the current and new encryption keys, and sends the mask-update data to the data-user computer. The mask-update data permits updating, at the data-user computer, of masked data items produced with the current encryption key into masked data items produced with the new encryption key.
-
-
-
-
-
-
-