Cryptography – Key management – Key distribution
Reexamination Certificate
2001-10-27
2008-09-02
Sheikh, Ayaz (Department: 2131)
Cryptography
Key management
Key distribution
C380S277000, C380S281000, C380S282000, C380S283000, C713S162000, C725S031000
Reexamination Certificate
active
07421082
ABSTRACT:
A data delivery system providing multipoint delivery of encrypted digital data to specific destinations. A plurality of pieces of key information are generated on the basis of an encryption key specific to each digital data item to be delivered. The multiple pieces of key information are delivered over routes which differ from the routes used to deliver the digital data and which further differ from each other. Physically different media or transmission over a network at different times are used to separately transmit different sets of key information.
REFERENCES:
patent: 5309516 (1994-05-01), Takaragi et al.
patent: 5748734 (1998-05-01), Mizikovsky
patent: 5991399 (1999-11-01), Graunke et al.
patent: 6055314 (2000-04-01), Spies et al.
patent: 6182214 (2001-01-01), Hardjono
patent: 6295359 (2001-09-01), Cordery et al.
patent: 6381331 (2002-04-01), Kato
patent: 6636968 (2003-10-01), Rosner et al.
patent: 6907127 (2005-06-01), Kravitz et al.
patent: 6917685 (2005-07-01), Watanabe et al.
patent: 6934392 (2005-08-01), Vanstone
patent: 6959090 (2005-10-01), Alve et al.
patent: 6965992 (2005-11-01), Joseph et al.
patent: 7039803 (2006-05-01), Lotspiech et al.
patent: 7065216 (2006-06-01), Benaloh et al.
patent: 7065642 (2006-06-01), Sandhu et al.
patent: 2001/0007127 (2001-07-01), Staring
patent: 0 800 293 (1997-10-01), None
patent: WO 00 59154 (2000-10-01), None
Schneier, Bruce, “Applied Cryptography Second Edition”, John Wiley and Sons, pp. 225.
Schneier, Bruce “Applied Cryptography”Second Edition 1996, Wiley and Sons, pp. 70-71; 177.
Wenjing Lou; Yuguang Fang, “A multipath routing approach for secure data delivery,” Military Communcations Conference, 2001, MILCOM 2001. Communications for Network-Centric Operations: Creating the Information Force, IEEE. vol. 2, No., pp. 1467-1473 vol. 2, 2001.
Schneier B: “Applied Cryptography” Applied Cryptography. Protocols Algorithms, and Source Code In C, New York, John Wiley & Sons, US, 1996, pp. 176-177, XP002148578 ISBN: 0-471-11709-9.
Kamiya Shigeki
Yamashita Masami
Frommer William S.
Frommer & Lawrence & Haug LLP
Henning Matthew T
Sheikh Ayaz
Sony Corporation
LandOfFree
Data delivery method and data delivery system using sets of... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Data delivery method and data delivery system using sets of..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Data delivery method and data delivery system using sets of... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3984998