Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Format-preserving cryptographic systems

a cryptographic system and data format technology, applied in the field of cryptography, can solve the problems of inefficient and cumbersome bulk encryption of files, difficult to design a data processing system that provides different levels of data access for different application programs and different personnel, and can be difficult to achieve the effect of preserving data format, and reducing the difficulty of data entry

Active Publication Date: 2017-05-25
MICRO FOCUS LLC
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, bulk encryption of files can be inefficient and cumbersome because it is not possible to selectively access a portion of the encrypted data in an encrypted file.
Without the ability to selectively decrypt part of a file, it can be difficult to design a data processing system that provides different levels of data access for different application programs and for different personnel.
Conventional encryption techniques can, however, significantly alter the format of a data item.
Because the format of the string is altered by the encryption process, it may not be possible to store the encrypted string in the same type of database table that is used to store unencrypted versions of the string.
The altered format of the encrypted string may therefore disrupt software applications that need to access the string from a database.
The altered format may also create problems when passing the encrypted string between applications.
Because of these compatibility problems, organizations may be unable to incorporate cryptographic capabilities into legacy data processing systems.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Format-preserving cryptographic systems
  • Format-preserving cryptographic systems
  • Format-preserving cryptographic systems

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033]An illustrative cryptographic system 10 in accordance with the present invention is shown in FIG. 1. System 10 includes computing equipment 12 and communications network 14. The computing equipment 12 may include one or more personal computers, workstations, computers configured as servers, mainframe computers, portable computers, etc. The communications network 14 may be a local area network or a wide area network such as the internet. System 10 may be used in processing data for one or more organizations.

[0034]Computing equipment 12 may be used to support applications 16 and databases 18. In computing equipment 12 in which multiple applications run on the same computer platform, applications and databases may communicate with each other directly. If desired, applications 16 can communicate with each other and with databases 18 remotely using communications network 14. For example, an application 16 that is run on a computer in one country may access a database 18 that is loc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Format-preserving encryption and decryption processes are provided. The encryption and decryption processes may use a block cipher. A string that is to be encrypted or decrypted may be converted to a unique binary value. The block cipher may operate on the binary value. If the output of the block cipher that is produced is not representative of a string that is in the same format as the original string, the block cipher may be applied again. The block cipher may be repeatedly applied in this way during format-preserving encryption operations and during format-preserving decryption operations until a format-compliant output is produced. Selective access may be provided to portions of a string that have been encrypted using format-preserving encryption.

Description

[0001]This patent application claims the benefit of provisional patent application No. 61 / 050,160, filed May 2, 2008, and patent application Ser. No. 12 / 432,258, filed Apr. 29, 2009, which are hereby incorporated by reference herein in their entireties.BACKGROUND OF THE INVENTION[0002]This invention relates to cryptography and more particularly, to preserving data formats during encryption and decryption operations.[0003]Cryptographic systems are used to secure data in a variety of contexts. For example, encryption algorithms are used to encrypt sensitive information such as financial account numbers, social security numbers, and other personal information. By encrypting sensitive data prior to transmission over a communications network, the sensitive data is secured, even if it passes over an unsecured communications channel. Sensitive data is also sometimes encrypted prior to storage in a database. This helps to prevent unauthorized access to the sensitive data by an intruder.[000...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): G06Q20/40H04L9/28
CPCH04L9/28H04L9/0625G06F21/6209H04L9/088H04L9/3213H04L9/3226H04L9/3239H04L2209/24H04L2209/34H04L2209/56G06Q20/22
Inventor PAUKER, MATTHEW J.SPIES, TERENCE
Owner MICRO FOCUS LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products