Computing system with decryption functions and secure data...

Information security – Prevention of unauthorized use of data including prevention... – Access control

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S280000, C713S161000

Reexamination Certificate

active

07640595

ABSTRACT:
A navigation system with decryption functions. The navigation system may receive from a portable data storage medium an encrypted authentication key, an encrypted first portion of a geographic database, and an unencrypted second portion of the geographic database. The navigation system may then decrypt the encrypted authentication key so as to gain access to a set of verification information and to a decryption key for decryption of the encrypted first portion. The navigation system may then use the verification information to validate use of the database, such as by ensuring that the data storage medium is authorized to hold the database or that the navigation system is authorized to access the database. In turn, the navigation system may then use the decryption key to decrypt the encrypted first portion, so as to gain access to the database as a whole. The navigation system may then use information in the database to convert location coordinates into map information for presentation to a user. Also disclosed is a secure geographic database for use with a navigation system.

REFERENCES:
patent: 5412718 (1995-05-01), Narasimhalu et al.
patent: 5623546 (1997-04-01), Hardy et al.
patent: 5654746 (1997-08-01), McMullan, Jr. et al.
patent: 5764762 (1998-06-01), Kazmierczak et al.
patent: 5805551 (1998-09-01), Oshima et al.
patent: 5845067 (1998-12-01), Porter
patent: 5857020 (1999-01-01), Peterson, Jr. et al.
patent: 5887269 (1999-03-01), Brunts et al.
patent: 5917908 (1999-06-01), Takenaka et al.
patent: 5938721 (1999-08-01), Dussell et al.
patent: 5951620 (1999-09-01), Ahrens et al.
patent: 5987124 (1999-11-01), Matyas et al.
patent: 5999622 (1999-12-01), Yasukawa et al.
patent: 6035039 (2000-03-01), Tisdale et al.
patent: 6049830 (2000-04-01), Saib
patent: 6052645 (2000-04-01), Harada
patent: 6073214 (2000-06-01), Fawcett
patent: 6104815 (2000-08-01), Alcorn et al.
patent: 6107944 (2000-08-01), Behr et al.
patent: 6126071 (2000-10-01), Yoshimura
patent: 6131066 (2000-10-01), Ahrens et al.
patent: 6138236 (2000-10-01), Mirov et al.
patent: 6151624 (2000-11-01), Teare et al.
patent: 6199045 (2001-03-01), Giniger et al.
patent: 6204774 (2001-03-01), Miwa et al.
patent: 6237786 (2001-05-01), Ginter et al.
patent: 6289276 (2001-09-01), Ahrens et al.
patent: 6297891 (2001-10-01), Kara
patent: 6308179 (2001-10-01), Petersen et al.
patent: 6314409 (2001-11-01), Schneck et al.
patent: 6408307 (2002-06-01), Semple et al.
patent: 6473860 (2002-10-01), Chan
patent: 6522875 (2003-02-01), Dowling et al.
patent: 6615349 (2003-09-01), Hair
patent: 6768942 (2004-07-01), Chojnacki
patent: 7051211 (2006-05-01), Matyas et al.
patent: 2001/0032088 (2001-10-01), Utsumi et al.
patent: 2004/0039741 (2004-02-01), Benson et al.
patent: 792041 (1997-08-01), None
patent: WO 9909374 (1999-02-01), None
patent: WO 01/57469 (2001-08-01), None
Schneier, B., Chapters 18 and 19,Applied Crypotograph—Protocols, Algorithms, and Source Code in C, (2d ed., John Wiley & Sons, Inc. 1996).
Riordan et al., Environmental Key Generation towards Clueless Agents (http://www.counterpane.com/clueless-agents.html), pp. 1-10, before Sep. 2000.
“Announcing Development of a Federal Information Processing Standard for Advanced Encryption Standard”, Department of Commerce,National Institute of Standards and Technology, (Docket No. 960924272-6272-01, RIN # 0693-ZA13) pp. 1-5, Jan. 1997.
Schneier, B., Counterpane Systems: Security Pitfalls in Cryptography, (http://www.counterpane.com/pitfalls.html) pp. 1-11, 1998.
RSA Security, Inc., PKCS31 v. 2.1: RSA Cryptography Standard, (http://www.rsasecurity.com/rsalabs/pkcs/pkcs-1/index.html), pp. 1-47, 1999.
Jurisic et al., Elliptic Curves and Cryptography, (http://www.certicom.com/research/download/paper4wd.zip) pp. 1-13, before Sep. 2000.
Certicom, Current Public-Key Cryptographic Systems, ECC: The Elliptic Curve Cryptosystem, (http://www.certicom.com/research/download/eccwhit1.zip) pp. 1-17, 1997.
Schneier, B., Security in the Real World. How to Evaluate Security Technology,Computer Security Journal, vol. XV, Nov. 1999.
Schneier, et al., Twofish: A 128-Bit Block Cipher, (http://www.counterpane.com/twofish.html), pp. 1-68, Jun. 1998.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Computing system with decryption functions and secure data... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Computing system with decryption functions and secure data..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Computing system with decryption functions and secure data... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4059454

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.