Patent application number | Description | Published |
20110154044 | COMPUTER IMPLEMENTED METHOD FOR SENDING A MESSAGE TO A RECIPIENT USER, RECEIVING A MESSAGE BY A RECIPIENT USER, A COMPUTER READABLE STORAGE MEDIUM AND A COMPUTER SYSTEM - The invention relates to a computer implemented method for sending a message to a recipient user, wherein a recipient asymmetric cryptographic key pair is associated with the recipient user, said key pair comprising a public recipient key and a private recipient key, the method comprising sending the message to said recipient user with the recipient address to which the message is sent comprising the public recipient key. | 06-23-2011 |
20110154054 | COMPUTER IMPLEMENTED METHOD FOR GENERATING A PSEUDONYM, COMPUTER READABLE STORAGE MEDIUM AND COMPUTER SYSTEM - The invention relates to a computer implemented method for generating a pseudonym for a user comprising entering a user-selected secret, storing the user-selected secret in memory, computing a private key by applying an embedding and randomizing function onto the secret, storing the private key in the memory, computing a public key using the private key, the public key and the private key forming an asymmetric cryptographic key, erasing the secret and the private key from the memory, and outputting the public key for providing the pseudonym | 06-23-2011 |
20110154055 | COMPUTER READABLE STORAGE MEDIUM FOR GENERATING A PSEUDONYM, COMPUTER IMPLEMENTED METHOD AND COMPUTING DEVICE - The invention relates to a method of generating a pseudonym, the method including accessing an input value and calculating a pseudonym by applying a cryptographic one-way function to the input value, where the cryptographic one-way function is an injective function. In alternative embodiments, the cryptographic one-way function is an embedding and/or randomizing function | 06-23-2011 |
20110154056 | COMPUTER READABLE STORAGE MEDIUM FOR GENERATING AN ACCESS KEY, COMPUTER IMPLEMENTED METHOD AND COMPUTING DEVICE - A computer readable storage medium having stored therein instructions, which when executed by a computing device cause the computing device to perform a method of generating an access key, the method comprising the steps of:
| 06-23-2011 |
20110173455 | DATABASE SYSTEM, COMPUTER SYSTEM, AND COMPUTER-READABLE STORAGE MEDIUM FOR DECRYPTING A DATA RECORD - A database system comprising: a memory containing multiple data records, wherein each of the data records has a data record asymmetric key pair for cryptographic encryption and decryption, wherein each data record asymmetric key pair comprises a data record public key and a data record private key, wherein the data contained in each of the multiple data records is encrypted by the data record public key, wherein the data record private key of each data record asymmetric key pair is encrypted with the public key of another asymmetric key pair; a set of user accounts, wherein each of the user accounts has a user asymmetric key pair for encryption and decryption, wherein each user asymmetric key pair has a user public key and a user private key; wherein data is added to a data record by encrypting it with the data record public key; wherein access to the data record is granted to a user account by encrypting the data record private key with the public key of an asymmetric cryptographic key pair whose encrypted private key is accessible from the user account via a sequence of successive decryptions of encrypted private keys; and wherein the data record private key allows decryption of the data record. | 07-14-2011 |
20110179286 | COMPUTER IMPLEMENTED METHOD FOR PERFORMING CLOUD COMPUTING ON DATA BEING STORED PSEUDONYMOUSLY IN A DATABASE - The invention relates to a computer implemented method for performing cloud computing on data of a first user employing cloud components, the cloud components comprising a first database and a data processing component, wherein an asymmetric cryptographic key pair is associated with the first user, said asymmetric cryptographic key pair comprising a public key and a private key, the data being stored pseudonymously non-encrypted in the first database with the data being assigned to an identifier, wherein the identifier comprises the public key, the method comprising retrieving the data from the first database by the data processing component, wherein retrieving the data from the first database comprises receiving the identifier and retrieving the data assigned to the identifier from the first database, wherein the method further comprises processing the retrieved data by the data processing component and providing a result of the analysis. | 07-21-2011 |
20110185177 | Method for generating an asymmetric cryptographic key pair and its application - The invention pertains to a method, computer readable medium, and data processing system for generation of an asymmetric cryptographic key pair including reception of an arbitrarily selectable login name, calculation of a first data object key, whereby a random value and the login name are included in the calculation, and calculation of a second data object key from the first data object key, whereby the first and second data object keys form the asymmetric cryptographic key pair. | 07-28-2011 |
20110185188 | COMPUTER IMPLEMENTED METHOD FOR ANALYZING DATA OF A USER WITH THE DATA BEING STORED PSEUDONYMOUSLY IN A DATABASE - The invention relates to a computer implemented method for analyzing data of a first user, wherein an asymmetric cryptographic key pair is associated with the first user, said asymmetric cryptographic key pair comprising a public key and a private key, the data being stored pseudonymously in a database with the data being assigned to an identifier, wherein the identifier comprises the public key, the method comprising: | 07-28-2011 |
20120063592 | APPARATUS FOR ENCRYPTING DATA - An apparatus for encrypting data is provided. The apparatus has a means for symmetrically encrypting data and a means for encrypting the symmetrically encrypted data with the aid of a bit string. The bit string has a maximum entropy. The means for encrypting the symmetrically encrypted data is designed such that a section of the bit string is used for encryption and successive encryption operations are carried out with varying sections of the bit string while the bit string remains unchanged. | 03-15-2012 |
20140095882 | METHOD FOR PROVIDING CRYPTOGRAPHIC KEY PAIRS - The invention relates to a method for creating a second asymmetric cryptographic pair of keys, wherein a first private key (G | 04-03-2014 |
20140136840 | COMPUTER SYSTEM FOR STORING AND RETRIEVAL OF ENCRYPTED DATA ITEMS USING A TABLET COMPUTER AND COMPUTER-IMPLEMENTED METHOD - A computer system comprising multiple sets of client computers coupled to a database system via a network. Each client computer having installed thereon an application program that comprises client computer specific log-in information. The database system having a log-in component for logging-in the client computers, and being partitioned into multiple relational databases. Each one of the relational databases being assigned to one set of the sets of client computers. Each one of the relational databases storing encrypted data items. Each data item being encrypted with one of the user or user-group specific cryptographic keys. A key identifier of the cryptographic key with which one of the data items is encrypted being stored in the relational database as an attribute of the one of the encrypted data items. The log-in component comprising assignment information indicative of the assignment of the databases to the set of client computers. | 05-15-2014 |
20140181512 | COMPUTER IMPLEMENTED METHOD FOR PERFORMING CLOUD COMPUTING ON DATA BEING STORED PSEUDONYMOUSLY IN A DATABASE - The invention relates to a computer implemented method for performing cloud computing on data of a first user employing cloud components, the cloud components comprising a first database and a data processing component, wherein an asymmetric cryptographic key pair is associated with the first user, said asymmetric cryptographic key pair comprising a public key and a private key, the data being stored pseudonymously non-encrypted in the first database with the data being assigned to an identifier, wherein the identifier comprises the public key, the method comprising retrieving the data from the first database by the data processing component, wherein retrieving the data from the first database comprises receiving the identifier and retrieving the data assigned to the identifier from the first database, wherein the method further comprises processing the retrieved data by the data processing component and providing a result of the analysis. | 06-26-2014 |
20140189372 | COMPUTER IMPLEMENTED METHOD FOR ANALYZING DATA OF A USER WITH THE DATA BEING STORED PSEUDONYMOUSLY IN A DATABASE - The invention relates to a computer implemented method for analyzing data of a first user, wherein an asymmetric cryptographic key pair is associated with the first user, said asymmetric cryptographic key pair comprising a public key and a private key, the data being stored pseudonymously in a database with the data being assigned to an identifier, wherein the identifier comprises the public key, the method comprising:
| 07-03-2014 |
20140205086 | APPARATUS FOR ENCRYPTING DATA - An apparatus for encrypting data is provided. The apparatus is capable of symmetrically encrypting data and then encrypting the symmetrically encrypted data with the aid of a bit string. The bit string has a maximum entropy. Encryption of the symmetrically encrypted data is designed such that a section of the bit string is used for encryption and successive encryption operations are carried out with carrying sections of the bit string while the bit string remains unchanged. | 07-24-2014 |
20140237230 | COMPUTER SYSTEM FOR STORING AND RETRIEVAL OF ENCRYPTED DATA ITEMS, CLIENT COMPUTER, COMPUTER PROGRAM PRODUCT AND COMPUTER-IMPLEMENTED METHOD - A system is disclosed comprising multiple sets of client computers each client computer having installed thereon an application program The application program comprising client computer specific log-in information, a database system coupled to the set of client computers via a network. The database system having a log-in component for logging-in the client computers, and being partitioned into multiple relational databases each one of which is assigned to one set of the sets of client computers. Each database further storing encrypted data items, each data item being encrypted with one of the user or user-group specific cryptographic keys, the key identifier of the cryptographic key with which one of the data items is encrypted being stored in the database as an attribute of the one of the encrypted data items. The log-in component comprising assignment information indicative of the assignment of the databases to the set of client computers. | 08-21-2014 |
20140237231 | COMPUTER SYSTEM FOR STORING AND RETRIEVAL OF ENCRYPTED DATA ITEMS, CLIENT COMPUTER, COMPUTER PROGRAM PRODUCT AND COMPUTER-IMPLEMENTED METHOD - A system is disclosed comprising multiple sets of client computers each client computer having installed thereon an application program. The application program comprising client computer specific log-in information, a database system coupled to the set of client computers via a network. The database system having a log-in component for logging-in the client computers, and being partitioned into multiple relational databases each one of which is assigned to one set of the sets of client computers. Each database further storing encrypted data items, each data item being encrypted with one of the user or user-group specific cryptographic keys, the key identifier of the cryptographic key with which one of the data items is encrypted being stored in the database as an attribute of the one of the encrypted data items. The log-in component comprising assignment information indicative of the assignment of the databases to the set of client computers. | 08-21-2014 |
20150207621 | METHOD FOR CREATING ASYMMETRICAL CRYPTOGRAPHIC KEY PAIRS - The invention relates to a method for creating a set of asymmetrical cryptographic key pairs, wherein the set of key pairs has a first key pair (K | 07-23-2015 |