http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-10887080-B2

Outgoing Links

Predicate Object
assignee http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_1b7a5c546db0678dbd6f9594fc43f2d6
classificationCPCAdditional http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F7-582
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L2209-12
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0631
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0625
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L2209-08
classificationCPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-72
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G09C1-00
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0643
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-002
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-78
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0662
classificationIPCAdditional http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F7-58
classificationIPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-72
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-78
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-06
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-00
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G09C1-00
filingDate 2018-03-14-04:00^^<http://www.w3.org/2001/XMLSchema#date>
grantDate 2021-01-05-04:00^^<http://www.w3.org/2001/XMLSchema#date>
inventor http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_e38af03d106310846b5bf5bc360f6756
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_e7e129df8efa226649e42139a1585e65
publicationDate 2021-01-05-04:00^^<http://www.w3.org/2001/XMLSchema#date>
publicationNumber US-10887080-B2
titleOfInvention Double-hashing operation mode for encryption
abstract A method and computer-readable storage medium for a computer system to perform an encryption scheme is disclosed that is capable of encrypting big data that includes complex data, including image data, sensor data, and text data, and supporting both symmetric and asymmetric-key handling. The encryption scheme uses double hashing using two different consecutively-applied hash functions. With double hashing, the encryption scheme eliminates the threat of known cryptanalysis attacks and provides a highly secure ciphering scheme. Also, the ciphertext header generated in the encryption scheme enables efficient cloud data sharing. A user can share the encrypted data later by re-encrypting the seed and sharing a new ciphertext header without the need of re-encrypting the data or changing the secret or private key. Thus, the encrypted data stays as is in the cloud, and only the seed is encrypted and shared as needed.
isCitedBy http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-11469881-B2
priorityDate 2017-03-16-04:00^^<http://www.w3.org/2001/XMLSchema#date>
type http://data.epo.org/linked-data/def/patent/Publication

Incoming Links

Predicate Subject
isDiscussedBy http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID2942
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID426079013

Total number of triples: 31.