Electrical computers and digital processing systems: support – Data processing protection using cryptography – By stored data protection
Reexamination Certificate
2008-05-27
2008-05-27
Peeso, Thomas R. (Department: 2132)
Electrical computers and digital processing systems: support
Data processing protection using cryptography
By stored data protection
C713S159000, C713S168000, C713S171000, C713S172000, C380S259000, C380S278000, C380S281000, C380S283000
Reexamination Certificate
active
10831350
ABSTRACT:
First data to be sent by a first party to a second party is encrypted using an encryption key that is formed using at least a hash value generated by a keyed hash of at least one condition that typically serves as an identifier of an intended recipient of the first data. The encrypted first data is provided to a data recipient who requests a decryption key from the trusted party. The trusted party is responsible for verifying that the recipient meets the specified conditions before providing the decryption key. A valid decryption key is only provided if the correct conditions have been supplied to the trusted party.
REFERENCES:
patent: 4926480 (1990-05-01), Chaum
patent: 5436972 (1995-07-01), Fischer
patent: 6446205 (2002-09-01), Lenstra
patent: 7103911 (2006-09-01), Spies et al.
patent: 7113594 (2006-09-01), Boneh et al.
patent: 2002/0164026 (2002-11-01), Huima
patent: 2003/0081785 (2003-05-01), Boneh et al.
patent: 2004/0019779 (2004-01-01), Harrison et al.
patent: 0 891 053 (1999-01-01), None
patent: 1 392 018 (2004-02-01), None
patent: 2 370 471 (2002-06-01), None
patent: 2 391 139 (2004-01-01), None
patent: 2 395 872 (2004-06-01), None
patent: WO 03/017559 (2003-02-01), None
patent: WO 2004/047352 (2004-09-01), None
The HP Time Vault Service: Innovating the Way Confidential Information is Disclosed, at the Right Time, Hewlett-Packard Company, accessed via Internet at http://www.hpl.hp.com/research/tsl/external%20publications/tech%20reports/HPL-2002-243.pdf (2002).
Shamir, A., “Identity-Based Cryptosystems and Signature Schemes,”Advances in Cryptology—CRYPTO '84, Lecture Notes in Computer Science, vol. 196, pp. 47-53 (1985).
Boneh, D. and M. Franklin, “Identity-Based Encryption from the Weil Pairing,”Advances in Cryptology—CRYPTO 2001, LNCS 2139, pp. 213-229, Springer-Verlag (2001).
Boneh, D., et al., “Identity-Based Mediated RSA,”3rd Workshop on Information Security Application, Jeju Island, Korea, 12 pages (Aug. 2002).
Cocks, C., “An Identity Based Encryption Scheme Based on Quadratic Residues,”Proceedings of the 8th IMA International Conference on Cryptography and Coding, LNCS 2260, pp. 360-363, Springer-Verlag (2001).
U.S. Appl. No. 10/831,548, filed Apr. 22, 2004, Chen et al.
U.S. Appl. No. 10/831,549, filed Apr. 22, 2004, Chen et al.
U.S. Appl. No. 10/831,776, filed Apr. 22, 2004, Chen et al.
Levy, I., “An Overview of Identifier-Based Public Key Cryptography,”Internet and Wireless Security, pp. 121-131 (2002).
http:www.hpl.hp.com/techreports/2003/HPL-2003-18.pdf (2003).
Microsoft ComputerDictionary, Fifth Edition Excerpt http://www.proquest.safaribooksonline.com/0735614954/ch04 (May 1, 2002).
Chen Liqun
Harrison Keith Alexander
Hewlett--Packard Development Company, L.P.
Ladas & Parry LLP
Peeso Thomas R.
LandOfFree
Cryptographic method and apparatus does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Cryptographic method and apparatus, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cryptographic method and apparatus will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3941113