首页>
外国专利>
METHOD FOR PROTECTING ACCESSIBILITY AND CONFIDENTIALITY OF STORED DATA AND SYSTEM OF CUSTOMIZED PROTECTION OF STORED DATA
METHOD FOR PROTECTING ACCESSIBILITY AND CONFIDENTIALITY OF STORED DATA AND SYSTEM OF CUSTOMIZED PROTECTION OF STORED DATA
展开▼
机译:存储数据的可访问性和保密性的方法以及存储数据的自定义保护系统
展开▼
页面导航
摘要
著录项
相似文献
摘要
1. A method of protecting the availability and confidentiality of stored data, characterized in that: - each information block S of length k characters of the final field F is encoded into a code block C of length n characters of the field F using the codec f, randomly or pseudo-randomly, selected from a numbered set codecs FC (n, k, µ, v), converting information vectors of length k (over field F) into code vectors of length n (over same field F) so that the loss of no more than v characters of the code word allows you to uniquely restore the information word, and eavesdropping (nab people) no more than µ characters of the code word does not give the observer any information about the encoded message; - the code block C is divided into T parts (C, ..., C) so that the combination of any t parts together gives no more than v different code characters , and the union of any t parts together gave no more than μ different code symbols; - according to the size r of the selected code, using the (T, Tt) secret sharing scheme, T parts are obtained: R, ..., R; - pairs (C, R) , where (i = 1, ..., T) are combined in order into a block (C, R, C, R) .2. A method for protecting the accessibility and confidentiality of stored data according to claim 1, where the set of FC (n, k, µ, v) is a subset of factor codecs built on the basis of combinatorially equivalent linear base codecs. 3. The method of protecting the accessibility and confidentiality of stored data according to claim 1, wherein during a data recording operation, each pair (C, R), where (i = 1, ..., T), is written to one of T repositories so that there is one repository only one pair of the specified type is recorded. 4. A method for protecting the accessibility and confidentiality of stored data according to claim 3, wherein when reading the protected data: - at least T-t storages read pairs of the form (C, R), where i∈ {1; ...; T}; - in read parts of R using (T, Tt)
展开▼