System and method for delivering encrypted information in a...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S045000, C380S258000

Reexamination Certificate

active

07143289

ABSTRACT:
Access to digital data is controlled by encrypting the data in such a manner that, in a single digital data acquisition step, it can be decrypted only at a specified location, within a specific time frame, and with a secret key. Data encrypted in such a manner is said to be geo-encrypted. This geo-encryption process comprises a method in which plaintext data is first encrypted using a data encrypting key that is generated at the time of encryption. The data encrypting key is then encrypted (or locked) using a key encrypting key and information derived from the location of the intended receiver. The encrypted data encrypting key is then transmitted to the receiver along with the ciphertext data. The receiver both must be at the correct location and must have a copy of the corresponding key decrypting key in order to derive the location information and decrypt the data encrypting key. After the data encrypting key is decrypted (or unlocked), it is used to decrypt the ciphertext. If an attempt is made to decrypt the data encrypting key at an incorrect location or using an incorrect secret key, the decryption will fail. If the sender so elects, access to digital data also can be controlled by encrypting it in such a manner that it must traverse a specific route from the sender to the recipient in order to enable decryption of the data. Key management can be handled using either private-key or public-key cryptography. If private-key cryptography is used, the sender can manage the secret key decrypting keys required for decryption in a secure manner that is transparent to the recipient. As a consequence of its ability to manipulate the secret keys, the sender of encrypted data retains the ability to control access to its plaintext even after its initial transmission.

REFERENCES:
patent: 4418425 (1983-11-01), Fennel, Jr. et al.
patent: 4531020 (1985-07-01), Wechselberger et al.
patent: 4709266 (1987-11-01), Hanas et al.
patent: 4860352 (1989-08-01), Laurance et al.
patent: 4887296 (1989-12-01), Horne
patent: 4993067 (1991-02-01), Leopold
patent: 5243652 (1993-09-01), Teare et al.
patent: 5532838 (1996-07-01), Barbari
patent: 5586185 (1996-12-01), Shibata et al.
patent: 5640452 (1997-06-01), Murphy
patent: 5659617 (1997-08-01), Fischer
patent: 5740252 (1998-04-01), Minor et al.
patent: 5754657 (1998-05-01), Schipper et al.
patent: 5757916 (1998-05-01), MacDoran et al.
patent: 5790074 (1998-08-01), Rangedahl et al.
patent: 5799083 (1998-08-01), Brothers et al.
patent: 5898680 (1999-04-01), Johnstone et al.
patent: 5915019 (1999-06-01), Ginter et al.
patent: 5920861 (1999-07-01), Hall et al.
patent: 5943422 (1999-08-01), Van Wie et al.
patent: 5956716 (1999-09-01), Kenner et al.
patent: 5978747 (1999-11-01), Craport et al.
patent: 5982897 (1999-11-01), Clark
patent: 5987136 (1999-11-01), Schipper et al.
patent: 5991739 (1999-11-01), Cupps et al.
patent: 5991876 (1999-11-01), Johnson et al.
patent: 6003030 (1999-12-01), Kenner et al.
patent: 6006332 (1999-12-01), Rabne et al.
patent: 6041411 (2000-03-01), Wyatt
patent: 6070174 (2000-05-01), Starek et al.
patent: 6104815 (2000-08-01), Alcorn et al.
patent: 6240514 (2001-05-01), Inoue et al.
patent: 6317500 (2001-11-01), Murphy
patent: 6434699 (2002-08-01), Jones et al.
Menezes (Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, “Handbook of applied cryptography”, 1997, ISBN: 0849385237) in view of Murphy (U.S. Patent No. 6317500).
Schneier (Bruce Schneier, “Applied Cryptography, Protocols, Algorithms and Source Code in C”, 2nd edition, 1996 ISBN:0471128457).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for delivering encrypted information in a... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for delivering encrypted information in a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for delivering encrypted information in a... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3675695

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.