GB2349964A - A method of data storage and apparatus therefor - Google Patents
A method of data storage and apparatus thereforInfo
- Publication number
- GB2349964A GB2349964A GB0014589A GB0014589A GB2349964A GB 2349964 A GB2349964 A GB 2349964A GB 0014589 A GB0014589 A GB 0014589A GB 0014589 A GB0014589 A GB 0014589A GB 2349964 A GB2349964 A GB 2349964A
- Authority
- GB
- United Kingdom
- Prior art keywords
- digital
- valuable
- parts
- retrieve
- valuables
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6272—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database by registering files or documents with a third party
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/08—Error detection or correction by redundancy in data representation, e.g. by using checking codes
- G06F11/10—Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's
- G06F11/1004—Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's to protect a block of data words, e.g. CRC or checksum
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
A method and apparatus for implementing a digital valuables depository system, for public or corporation users to store and to retrieve valuable digital information electronically is described. The apparatus is the electronic analogy to the physical safe boxes provided by banks whereby customers can keep their valuable belongings. The digital valuable depository service is provided by a Service Provider (SP). To make use of the services, a user first opens a Digital Safe account with the SP. The user can then deposit digital valuables into, as well as retrieve, copy and delete them from its account, all being carried out in an authentic and secure manner. To store a digital valuable, the SP first encodes it into N parts based on an encoding algorithm, and then stores the N parts into one or more data storage devices. To retrieve or copy a digital valuable which has been stored previously, the SP reads the N parts from corresponding storage devices, and recovers the digital valuable from the N parts based on a decoding algorithm. The encoding and decoding algorithms are selected such that the original digital valuable is recovered correctly even if some of the N parts are lost or corrupted. To avoid storage error/corruption accumulation, the system periodically checks the N parts of every stored digital valuables and recovers/corrects lost/corrupted parts when they are detected.
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/SG1998/000003 WO1999037054A1 (en) | 1998-01-16 | 1998-01-16 | A method of data storage and apparatus therefor |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| GB0014589D0 GB0014589D0 (en) | 2000-08-09 |
| GB2349964A true GB2349964A (en) | 2000-11-15 |
| GB2349964B GB2349964B (en) | 2002-07-24 |
Family
ID=20429827
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| GB0014589A Expired - Fee Related GB2349964B (en) | 1998-01-16 | 1998-01-16 | A method of data storage and apparatus therefor |
Country Status (3)
| Country | Link |
|---|---|
| AU (1) | AU6236498A (en) |
| GB (1) | GB2349964B (en) |
| WO (1) | WO1999037054A1 (en) |
Families Citing this family (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2003510694A (en) | 1999-09-20 | 2003-03-18 | クインタイルズ トランスナショナル コーポレイション | System and method for analyzing anonymized health care information |
| JP4011243B2 (en) * | 1999-10-15 | 2007-11-21 | 富士通株式会社 | Electronic original management apparatus and method |
| CA2396811A1 (en) * | 2000-01-11 | 2001-07-19 | Tso, Inc. | Method and apparatus for documentation, analysis, auditing, accounting, protection, registration, and verification of trade secrets |
| GB0014414D0 (en) * | 2000-06-12 | 2000-08-09 | Business Information Publicati | Electronic deposit box system |
| WO2008065344A1 (en) * | 2006-12-01 | 2008-06-05 | David Irvine | Anonymous authentication |
| WO2008065342A1 (en) * | 2006-12-01 | 2008-06-05 | David Irvine | Data maps |
| WO2008065351A1 (en) * | 2006-12-01 | 2008-06-05 | David Irvine | Self encryption |
| GB2446199A (en) * | 2006-12-01 | 2008-08-06 | David Irvine | Secure, decentralised and anonymous peer-to-peer network |
| WO2008065343A1 (en) * | 2006-12-01 | 2008-06-05 | David Irvine | Shared access to private files |
| US9355273B2 (en) | 2006-12-18 | 2016-05-31 | Bank Of America, N.A., As Collateral Agent | System and method for the protection and de-identification of health care data |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP0033833A2 (en) * | 1980-02-11 | 1981-08-19 | International Business Machines Corporation | Transaction execution system, method of operating such a system and terminal for use in such a system |
| EP0166541A2 (en) * | 1984-06-25 | 1986-01-02 | Kabushiki Kaisha Toshiba | Communications network using an enciphering and deciphering device |
| EP0547975A1 (en) * | 1991-12-19 | 1993-06-23 | Bull Cp8 | Method and system to authenticate, by an external medium, a portable object connected via a transmission line to this medium |
| EP0561150A2 (en) * | 1992-02-14 | 1993-09-22 | Siemens Aktiengesellschaft | Method for implementing programs in host connected to a communication system |
| EP0582827A2 (en) * | 1992-08-10 | 1994-02-16 | General Instrument Corporation Of Delaware | Method and apparatus for communicating interleaved data |
| WO1996002993A2 (en) * | 1994-07-19 | 1996-02-01 | Bankers Trust Company | Method for securely using digital signatures in a commercial cryptographic system |
-
1998
- 1998-01-16 WO PCT/SG1998/000003 patent/WO1999037054A1/en not_active Ceased
- 1998-01-16 AU AU62364/98A patent/AU6236498A/en not_active Abandoned
- 1998-01-16 GB GB0014589A patent/GB2349964B/en not_active Expired - Fee Related
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP0033833A2 (en) * | 1980-02-11 | 1981-08-19 | International Business Machines Corporation | Transaction execution system, method of operating such a system and terminal for use in such a system |
| EP0166541A2 (en) * | 1984-06-25 | 1986-01-02 | Kabushiki Kaisha Toshiba | Communications network using an enciphering and deciphering device |
| EP0547975A1 (en) * | 1991-12-19 | 1993-06-23 | Bull Cp8 | Method and system to authenticate, by an external medium, a portable object connected via a transmission line to this medium |
| EP0561150A2 (en) * | 1992-02-14 | 1993-09-22 | Siemens Aktiengesellschaft | Method for implementing programs in host connected to a communication system |
| EP0582827A2 (en) * | 1992-08-10 | 1994-02-16 | General Instrument Corporation Of Delaware | Method and apparatus for communicating interleaved data |
| WO1996002993A2 (en) * | 1994-07-19 | 1996-02-01 | Bankers Trust Company | Method for securely using digital signatures in a commercial cryptographic system |
Also Published As
| Publication number | Publication date |
|---|---|
| AU6236498A (en) | 1999-08-02 |
| GB0014589D0 (en) | 2000-08-09 |
| GB2349964B (en) | 2002-07-24 |
| WO1999037054A1 (en) | 1999-07-22 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Qian et al. | Reversible data hiding in encrypted JPEG bitstream | |
| Bhowmik et al. | The multimedia blockchain: A distributed and tamper-proof media transaction framework | |
| Boneh et al. | Collusion-secure fingerprinting for digital data | |
| GB2349964A (en) | A method of data storage and apparatus therefor | |
| US6473860B1 (en) | Information distribution and processing system | |
| Zhang | Commutative reversible data hiding and encryption | |
| US20050240768A1 (en) | Re-embedding of watermarks in multimedia signals | |
| JP2003005771A (en) | Recognition system for audio content within digital signal | |
| CA2383536A1 (en) | Method and device for inserting and authenticating a digital signature in digital data | |
| CN106657266A (en) | Architecture and method of secure and reliable public cloud storage system based on public clouds | |
| KR20060039436A (en) | Watermark embedding and detection | |
| EP1493145B1 (en) | Watermark time scale searching | |
| Chen et al. | Combined digital signature and digital watermark scheme for image authentication | |
| Iftikhar et al. | A survey on reversible watermarking techniques for relational databases | |
| US20220198470A1 (en) | Fraud Detection with a Stacked Auto Encoder with Embedding | |
| Voloshynovskiy et al. | Conception and limits of robust perceptual hashing: towards side information assisted hash functions. | |
| Zhu et al. | Multimedia authentication and watermarking | |
| US7546466B2 (en) | Decoding of watermarked information signals | |
| EP1493155A1 (en) | Window shaping functions for watermarking of multimedia signals | |
| Chowdhuri et al. | A new dual image-based steganographic scheme for authentication and tampered detection using (7, 4) hamming code | |
| Lamy et al. | Content-based watermarking for image authentication | |
| Kabir et al. | Watermarking with fast and highly secured encryption for real-time speech signals | |
| FR2925730A1 (en) | METHOD AND SYSTEM FOR AUTHENTICATING INDIVIDUALS FROM BIOMETRIC DATA | |
| van der Veen et al. | Watermarking and fingerprinting for electronic music delivery | |
| US20060140440A1 (en) | Reversible watermarking of digital signals |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PCNP | Patent ceased through non-payment of renewal fee |
Effective date: 20090116 |