Semantic Encoding

A New Technology for Database Compression and Security


Semantic Encoding addresses the urgent need to ensure the security of corporate, educational and government databases, especially in mobile or networked environments.

Depending on the data, the technology can compress a data table by an order of magnitude or more, while also making it highly secure. This can of course save valuable bandwidth if data are to be transmitted securely over a communications link.

Semantic Encoding is a new technology that is fundamentally different from all other existing database security technologies, because it is based on a method of splitting up a relational table, rather than encrypting the individual fields. This means that Semantic Encoding can be used together with encryption to increase the security of a database.

Semantic Encoding offers several features that current database security technologies do not:
  1. While current cryptographic methods are based on mathematical problems that are not yet known to have a solution, Semantic Encoding is based on a mathematical problem that is known to have no solution.

  2. Depending on the contents, a database can be compressed by an order of magnitude or more when it is encoded, reducing storage and transmission requirements;

  3. Semantic Encoding is impervious to cryptographic attack;

  4. If a non cryptographic method is used in an unauthorized to attempt to decode a semantically encoded database, there is no way for an attacker to tell, by just looking at the result, whether or not the method has succeeded;

  5. A Semantic Encoding key can be very quickly changed, helping to make key theft useless;

  6. Separate keys can be assigned to different authorized users;

  7. The database is split up into components that can easily be distributed on a network;
These capabilities augment the security of encryption-based methods, and provide the database administrator with new tools to combat key theft and network security problems.

Semantic Encoding can be applied to any database application. It can be implemented very easily using SQL, and is very efficient. A large organization can gain the most from such a general and powerful technology, and we are interested in discussing the joint exploitation of this invention.


About the Inventors   |   White Paper