Cryptographic method and apparatus

Electrical computers and digital processing systems: support – Data processing protection using cryptography – By stored data protection

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S159000, C713S168000, C713S171000, C713S172000, C380S259000, C380S278000, C380S281000, C380S283000

Reexamination Certificate

active

10831350

ABSTRACT:
First data to be sent by a first party to a second party is encrypted using an encryption key that is formed using at least a hash value generated by a keyed hash of at least one condition that typically serves as an identifier of an intended recipient of the first data. The encrypted first data is provided to a data recipient who requests a decryption key from the trusted party. The trusted party is responsible for verifying that the recipient meets the specified conditions before providing the decryption key. A valid decryption key is only provided if the correct conditions have been supplied to the trusted party.

REFERENCES:
patent: 4926480 (1990-05-01), Chaum
patent: 5436972 (1995-07-01), Fischer
patent: 6446205 (2002-09-01), Lenstra
patent: 7103911 (2006-09-01), Spies et al.
patent: 7113594 (2006-09-01), Boneh et al.
patent: 2002/0164026 (2002-11-01), Huima
patent: 2003/0081785 (2003-05-01), Boneh et al.
patent: 2004/0019779 (2004-01-01), Harrison et al.
patent: 0 891 053 (1999-01-01), None
patent: 1 392 018 (2004-02-01), None
patent: 2 370 471 (2002-06-01), None
patent: 2 391 139 (2004-01-01), None
patent: 2 395 872 (2004-06-01), None
patent: WO 03/017559 (2003-02-01), None
patent: WO 2004/047352 (2004-09-01), None
The HP Time Vault Service: Innovating the Way Confidential Information is Disclosed, at the Right Time, Hewlett-Packard Company, accessed via Internet at http://www.hpl.hp.com/research/tsl/external%20publications/tech%20reports/HPL-2002-243.pdf (2002).
Shamir, A., “Identity-Based Cryptosystems and Signature Schemes,”Advances in Cryptology—CRYPTO '84, Lecture Notes in Computer Science, vol. 196, pp. 47-53 (1985).
Boneh, D. and M. Franklin, “Identity-Based Encryption from the Weil Pairing,”Advances in Cryptology—CRYPTO 2001, LNCS 2139, pp. 213-229, Springer-Verlag (2001).
Boneh, D., et al., “Identity-Based Mediated RSA,”3rd Workshop on Information Security Application, Jeju Island, Korea, 12 pages (Aug. 2002).
Cocks, C., “An Identity Based Encryption Scheme Based on Quadratic Residues,”Proceedings of the 8th IMA International Conference on Cryptography and Coding, LNCS 2260, pp. 360-363, Springer-Verlag (2001).
U.S. Appl. No. 10/831,548, filed Apr. 22, 2004, Chen et al.
U.S. Appl. No. 10/831,549, filed Apr. 22, 2004, Chen et al.
U.S. Appl. No. 10/831,776, filed Apr. 22, 2004, Chen et al.
Levy, I., “An Overview of Identifier-Based Public Key Cryptography,”Internet and Wireless Security, pp. 121-131 (2002).
http:www.hpl.hp.com/techreports/2003/HPL-2003-18.pdf (2003).
Microsoft ComputerDictionary, Fifth Edition Excerpt http://www.proquest.safaribooksonline.com/0735614954/ch04 (May 1, 2002).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Cryptographic method and apparatus does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Cryptographic method and apparatus, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cryptographic method and apparatus will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3941113

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.