Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2005-05-31
2005-05-31
Barrón, Gilberto (Department: 2132)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S152000
Reexamination Certificate
active
06901515
ABSTRACT:
Residue calculating sections respectively obtain residues which take a plurality of integers as modulus, with respect to a user ID. The plurality of integers are stored in modulus storage sections and are prime to each other. Based on these residues and parameters stored in a coding parameter storage section, component codes constructed by continuous sequences of 1 and 0 using a predetermined number of bits as a unit are respectively generated by component code generating sections. These component codes are concatenated by a concatenating section, thereby to obtain a code to be embedded, which constructs watermark information.
REFERENCES:
patent: 5583941 (1996-12-01), Yoshida et al.
patent: 5664018 (1997-09-01), Leighton
patent: 5915027 (1999-06-01), Cox et al.
patent: 6603864 (2003-08-01), Matsunoshita et al.
patent: 9-191394 (1997-07-01), None
patent: 11-288217 (1999-10-01), None
patent: 2000-3129 (2000-01-01), None
patent: WO 97/34391 (1997-09-01), None
Jun Yoshida. et al., “A Coding Method for Collusion-Secure Watermark and Less Decline,” The 1998 Symposium on Cryptography and Information Security (SCIS '98), 10.2.A, Jan. 28-31, 1998.
Dan Boneh, et al., “Collusion-Secure Fingerprinting for Digital Data,” CRYPTO '95, 1995, pp. 452-465.
Masahiro Suzuoki, et al., “A Scheme of Making Collusion-Secure Watermark,” The 1997 Symposium on Cryptography and Information Security (SCIS '97), 31B, Jan. 29-Feb. 1, 1997, pp. 1-10.
Tetsuya Yamamoto, et al., “A Method of Image Watermarking Which Can Detect All Illegal Users in Collusion,” The 1998 Symposium on Cryptography and Information Security (SCIS '98), 10.2.B, Jan. 28-31, 1998, pp. 1-8.
Neal R. Wagner, “Fingerprinting,” Proceedings of the 1983 Symposium on Security and Privacy, Apr. 1983, pp. 18-22.
G. R. Blakley, et al., “Fingerprinting Long Forgiving Messages,” CRYPTO '85, PP. 180-189.
Ingemar J. Cox, et al., “Secure Spread Spectrum Watermarking for Multimedia,” NEC Research Institute, Technical Report 95-10, 1995, pp. 1-33.
Hirofumi Muratani, “Collusion Resilience of Digital Watermarking,” The 2000 Symposium on Cryptography and Information Security (SCIS 2000), C06, Jan. 26-28, 2000, pp. 1-8.
Joe Kilian, et al., “Resistance of Digital Watermarks to Collusive Attacks,” Department of Computer Science TR-585-98, pp. 1-23.
V. R. L. Shen, et al., IEICE Trans. Fundamentals, vol. E80-A, No. 10, pp. 2035-2037, XP-000767254, “Novel Cryptographic Key Assignment Scheme for Dynamic Access Control in a Hierarchy”, Oct. 1, 1997.
Barrón Gilberto
Gurshman G.
Kabushiki Kaisha Toshiba
Oblon & Spivak, McClelland, Maier & Neustadt P.C.
LandOfFree
Code generating method and unit thereof, code detecting... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Code generating method and unit thereof, code detecting..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Code generating method and unit thereof, code detecting... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3448291