Data delivery method and data delivery system using sets of...

Cryptography – Key management – Key distribution

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S277000, C380S281000, C380S282000, C380S283000, C713S162000, C725S031000

Reexamination Certificate

active

07421082

ABSTRACT:
A data delivery system providing multipoint delivery of encrypted digital data to specific destinations. A plurality of pieces of key information are generated on the basis of an encryption key specific to each digital data item to be delivered. The multiple pieces of key information are delivered over routes which differ from the routes used to deliver the digital data and which further differ from each other. Physically different media or transmission over a network at different times are used to separately transmit different sets of key information.

REFERENCES:
patent: 5309516 (1994-05-01), Takaragi et al.
patent: 5748734 (1998-05-01), Mizikovsky
patent: 5991399 (1999-11-01), Graunke et al.
patent: 6055314 (2000-04-01), Spies et al.
patent: 6182214 (2001-01-01), Hardjono
patent: 6295359 (2001-09-01), Cordery et al.
patent: 6381331 (2002-04-01), Kato
patent: 6636968 (2003-10-01), Rosner et al.
patent: 6907127 (2005-06-01), Kravitz et al.
patent: 6917685 (2005-07-01), Watanabe et al.
patent: 6934392 (2005-08-01), Vanstone
patent: 6959090 (2005-10-01), Alve et al.
patent: 6965992 (2005-11-01), Joseph et al.
patent: 7039803 (2006-05-01), Lotspiech et al.
patent: 7065216 (2006-06-01), Benaloh et al.
patent: 7065642 (2006-06-01), Sandhu et al.
patent: 2001/0007127 (2001-07-01), Staring
patent: 0 800 293 (1997-10-01), None
patent: WO 00 59154 (2000-10-01), None
Schneier, Bruce, “Applied Cryptography Second Edition”, John Wiley and Sons, pp. 225.
Schneier, Bruce “Applied Cryptography”Second Edition 1996, Wiley and Sons, pp. 70-71; 177.
Wenjing Lou; Yuguang Fang, “A multipath routing approach for secure data delivery,” Military Communcations Conference, 2001, MILCOM 2001. Communications for Network-Centric Operations: Creating the Information Force, IEEE. vol. 2, No., pp. 1467-1473 vol. 2, 2001.
Schneier B: “Applied Cryptography” Applied Cryptography. Protocols Algorithms, and Source Code In C, New York, John Wiley & Sons, US, 1996, pp. 176-177, XP002148578 ISBN: 0-471-11709-9.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Data delivery method and data delivery system using sets of... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Data delivery method and data delivery system using sets of..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Data delivery method and data delivery system using sets of... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3984998

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.