Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Having particular address related cryptography
Reexamination Certificate
2002-03-28
2008-07-01
Moazzami, Nasser (Department: 2136)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Having particular address related cryptography
C726S016000, C726S017000, C726S018000, C726S019000, C726S020000
Reexamination Certificate
active
07395425
ABSTRACT:
A data protection system is provided that reduces, to a degree, the amount of encrypted data that is distributed to a plurality of terminals. In the data protection system a terminal whose decryption keys are exposed by a dishonest party is made to be unable to decrypt the data correctly, while other terminals are able to decrypt the data correctly.The data protection system includes a plurality of terminals, and an encryption device that encrypts distribution data distributed to each terminal. Each terminal is corresponded with one node on a lowest level of a 4-ary tree structure or the like having a plurality of hierarchies. The data protection system, for each node in the tree structure, excluding those on the lowest level, determines a plurality of combination patterns that include combinations of two or more of all four nodes that are reached one level below the node, decides an individual decryption key for each determined combination pattern, and decides an individual decryption key for each node on the lowest level. Further, the data protection system has each terminal store all decryption keys decided for the nodes on the path from the node on the lowest level that corresponds to the terminal through to the node on the highest level. The data protection system prescribes nodes that are reached from the node on the lowest level that corresponds to the terminal through to the node on the highest level that correspond to a terminal that has been dishonestly analyzed as invalid nodes. For invalid nodes, other than invalid nodes on the lowest level, the data protection system designates an encryption key that corresponds to the decryption key decided in correspondence with the combination pattern that combines all nodes, excluding invalid nodes, of the four nodes that are reached one level below the node, and has the encryption device encrypt distribution data that uses each of the designated encryption keys.
REFERENCES:
patent: 5754938 (1998-05-01), Herz et al.
patent: 6081794 (2000-06-01), Saito et al.
patent: 6204844 (2001-03-01), Fumarolo et al.
patent: 6347145 (2002-02-01), Kato et al.
patent: 7050892 (2006-05-01), Liebl et al.
patent: 2002/0002466 (2002-01-01), Kambayashi et al.
patent: 2002/0097878 (2002-07-01), Ito et al.
patent: 2004/0010467 (2004-01-01), Hori et al.
patent: 2005/0132186 (2005-06-01), Khan et al.
patent: 2005/0225540 (2005-10-01), Kawakami et al.
patent: 2006/0062394 (2006-03-01), Kamijo
patent: 2006/0063527 (2006-03-01), Ito
patent: 1253739 (2002-10-01), None
patent: 11-187013 (1999-07-01), None
patent: 2000-99385 (2000-04-01), None
patent: 2001-500650 (2001-01-01), None
patent: 10-0270252 (2000-10-01), None
patent: 98/11487 (1998-03-01), None
R. W. Dijkerman et al.: “Modeling and Estimation of Multi-Resolution Reciprocal Processes on N-Ary Trees”, Conference Proceeding Article, Jun. 26, 1994, XP010214484, pp. 247-250.
M. Waldvogel et al.The Versakey Framework: Versatile Group Key Management, IEEE Journal on Selected Areas in Communications, vol. 17, No. 9, Sep. 9, 1999, pp. 1-18.
C. Kei Wong et al.Secure Group Communications Using Key Graphs, Department of Computer Sciences University of Texas at Austin, Austin, TX. Feb. 9, 1998, pp. 1-12.
Toshihisa Nakano et al., “Key management system for digital content protection”, SCIS 2001, The 2001 Symposium on Cryptography and Information Security, Oiso, Japan, Jan. 23-26, 2001, The Institute of Electronics, Information and Communication Engineers, pp. 213-218 with English translation.
Matsuzaki Natsume
Nakano Toshihisa
Ohmori Motoji
Tatebayashi Makoto
Matsushita Electric - Industrial Co., Ltd.
Moazzami Nasser
Okoronkwo Chinwendu C
Wenderoth , Lind & Ponack, L.L.P.
LandOfFree
Data protection system that protects data by encrypting the... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Data protection system that protects data by encrypting the..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Data protection system that protects data by encrypting the... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3964390