News Column

Patent Application Titled "Mapping a Glyph to Character Code in Obfuscated Data" Published Online

September 9, 2014



By a News Reporter-Staff News Editor at Information Technology Newsweekly -- According to news reporting originating from Washington, D.C., by VerticalNews journalists, a patent application by the inventors KUROSAWA, RYOJI (TOKYO, JP); TAHARA, YOSHINORI (YAMATO, JP); UNNO, ASUKA (TOKYO, JP); ZETTSU, NATSUKI (YOKOHAMA, JP), filed on February 10, 2014, was made available online on August 28, 2014.

The assignee for this patent application is International Business Machines Corporation.

Reporters obtained the following quote from the background information supplied by the inventors: "The present invention relates to an apparatus and method for having a server hold obfuscated data. The present invention particularly relates to an apparatus and method for having a server hold obfuscated data obtained by obfuscating data as a result of converting a character code included in the data.

"Recently, online storage services for renting a storage space of a server to receive and hold user data in trust via the Internet have been widely used. Such online storage services are provided on the premise that the service provider is trustworthy and spreading belief is that there is no problem if data is held intact on the server. Therefore, techniques for protecting data held on a server on the faith of the server side have been proposed in the past. Known literature discloses a technique for holding text with various contents posted on a web page to provide the text readable only on an URL that designates encrypted text and makes the encrypted text indecipherable on the other URLs.

"On the other hand, in an online storage service using a SaaS (Software as a Service) based application, a service provider may be untrusted. In such a case, when data held on a server contains confidential information such as business secrets and personal information, there arises a problem that these pieces of information leak out to the service provider. Therefore, techniques for preventing confidential information held on the server from leaking out to the service provider are also proposed."

In addition to obtaining background information on this patent application, VerticalNews editors also obtained the inventors' summary information for this patent application: "According to one embodiment of the present invention, an apparatus for having a server hold obfuscated data obtained by obfuscating data as a result of converting a character code included in the data comprises: a mapping information storage device for storing mapping information indicating that a second glyph is mapped to the character code, wherein the second glyph is a glyph different from a first glyph identified by the server based on the character code and having a width identical to the first glyph; a receiving hardware device for receiving, from the server, the obfuscated data obtained by obfuscating the data as a result of converting the character code included in the data to a character code to which a glyph identified by the server, based on the character code included in the data, is mapped as the second glyph in the mapping information; an identification hardware device for identifying the glyph mapped as the second glyph in the mapping information to a character code included in the obfuscated data received from the receiving section; and a display for displaying the glyph identified by the identification hardware device.

"According to one embodiment of the present invention, an apparatus for having a server hold obfuscated data obtained by obfuscating data as a result of converting a character code included in the data comprises: a mapping information storage device for storing mapping information indicating that a second glyph is mapped to the character code, wherein the second glyph is a glyph different from a first glyph identified by the server based on the character code and having a width identical to the first glyph; an acquisition logic for acquiring the data according to a user operation; an obfuscation logic for obfuscating the data as a result of converting a character code included in the data acquired by the acquisition section to a character code to which a glyph identified by the server based on the character code included in the data is mapped as the second glyph in the mapping information; and a sending hardware device for sending the server the obfuscated data obtained by the obfuscation section obfuscating the data.

"According to one embodiment of the present invention, a method of having a server hold obfuscated data obtained by obfuscating data as a result of converting a character code included in the data comprises: storing, by one or more processors, mapping information indicating that a second glyph is mapped to the character code, wherein the second glyph is a glyph different from a first glyph identified by the server based on the character code and having a width identical to the first glyph; receiving, from the server, the obfuscated data obtained by obfuscating the data as a result of converting the character code included in the data to a character code to which a glyph identified by the server based on the character code included in the data is mapped as the second glyph in the mapping information; identifying, by one or more processors, the glyph mapped as the second glyph in the mapping information to a character code included in the obfuscated data received from the receiving section; and displaying, on a display, the identified glyph.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

"FIG. 1 is a table showing information defining, for each display width, characters having the display width.

"FIGS. 2A-2B contain tables showing an example of mapping between a character code and a glyph included in the normal font and an example of mapping between a character code and a glyph included in an obfuscated font to maintain each display width.

"FIGS. 3A-3B contain diagrams specifically showing the effect of obfuscation using the obfuscated font to maintain the display width.

"FIG. 4 is a block diagram showing a configuration example of a computer system to which an embodiment of the present invention is applied.

"FIG. 5 is a block diagram showing an example of the hardware configuration of a computer to which the embodiment of the present invention is applicable.

"FIG. 6 is a block diagram showing a functional configuration example of a font applying device in the embodiment of the present invention.

"FIG. 7 is a flowchart showing an operation example when the font applying device obfuscates document data in the embodiment of the present invention.

"FIG. 8 is a flowchart showing an operation example when the font applying device deobfuscates document data in the embodiment of the present invention.

"FIG. 9 is a table showing information defining, for each display width used in a first modification, characters having the display width.

"FIG. 10 is a table showing information defining, for each display width used in a second modification, characters having the display width.

"FIGS. 11A-11B contain diagrams specifically showing a problem when obfuscation is simply performed."

For more information, see this patent application: KUROSAWA, RYOJI; TAHARA, YOSHINORI; UNNO, ASUKA; ZETTSU, NATSUKI. Mapping a Glyph to Character Code in Obfuscated Data. Filed February 10, 2014 and posted August 28, 2014. Patent URL: http://appft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&u=%2Fnetahtml%2FPTO%2Fsearch-adv.html&r=454&p=10&f=G&l=50&d=PG01&S1=20140821.PD.&OS=PD/20140821&RS=PD/20140821

Keywords for this news article include: Information Technology, Information and Data Storage, International Business Machines Corporation.

Our reports deliver fact-based news of research and discoveries from around the world. Copyright 2014, NewsRx LLC


For more stories covering the world of technology, please see HispanicBusiness' Tech Channel



Source: Information Technology Newsweekly


Story Tools






HispanicBusiness.com Facebook Linkedin Twitter RSS Feed Email Alerts & Newsletters