Data protection system that protects data by encrypting the...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Having particular address related cryptography

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S016000, C726S017000, C726S018000, C726S019000, C726S020000

Reexamination Certificate

active

07395425

ABSTRACT:
A data protection system is provided that reduces, to a degree, the amount of encrypted data that is distributed to a plurality of terminals. In the data protection system a terminal whose decryption keys are exposed by a dishonest party is made to be unable to decrypt the data correctly, while other terminals are able to decrypt the data correctly.The data protection system includes a plurality of terminals, and an encryption device that encrypts distribution data distributed to each terminal. Each terminal is corresponded with one node on a lowest level of a 4-ary tree structure or the like having a plurality of hierarchies. The data protection system, for each node in the tree structure, excluding those on the lowest level, determines a plurality of combination patterns that include combinations of two or more of all four nodes that are reached one level below the node, decides an individual decryption key for each determined combination pattern, and decides an individual decryption key for each node on the lowest level. Further, the data protection system has each terminal store all decryption keys decided for the nodes on the path from the node on the lowest level that corresponds to the terminal through to the node on the highest level. The data protection system prescribes nodes that are reached from the node on the lowest level that corresponds to the terminal through to the node on the highest level that correspond to a terminal that has been dishonestly analyzed as invalid nodes. For invalid nodes, other than invalid nodes on the lowest level, the data protection system designates an encryption key that corresponds to the decryption key decided in correspondence with the combination pattern that combines all nodes, excluding invalid nodes, of the four nodes that are reached one level below the node, and has the encryption device encrypt distribution data that uses each of the designated encryption keys.

REFERENCES:
patent: 5754938 (1998-05-01), Herz et al.
patent: 6081794 (2000-06-01), Saito et al.
patent: 6204844 (2001-03-01), Fumarolo et al.
patent: 6347145 (2002-02-01), Kato et al.
patent: 7050892 (2006-05-01), Liebl et al.
patent: 2002/0002466 (2002-01-01), Kambayashi et al.
patent: 2002/0097878 (2002-07-01), Ito et al.
patent: 2004/0010467 (2004-01-01), Hori et al.
patent: 2005/0132186 (2005-06-01), Khan et al.
patent: 2005/0225540 (2005-10-01), Kawakami et al.
patent: 2006/0062394 (2006-03-01), Kamijo
patent: 2006/0063527 (2006-03-01), Ito
patent: 1253739 (2002-10-01), None
patent: 11-187013 (1999-07-01), None
patent: 2000-99385 (2000-04-01), None
patent: 2001-500650 (2001-01-01), None
patent: 10-0270252 (2000-10-01), None
patent: 98/11487 (1998-03-01), None
R. W. Dijkerman et al.: “Modeling and Estimation of Multi-Resolution Reciprocal Processes on N-Ary Trees”, Conference Proceeding Article, Jun. 26, 1994, XP010214484, pp. 247-250.
M. Waldvogel et al.The Versakey Framework: Versatile Group Key Management, IEEE Journal on Selected Areas in Communications, vol. 17, No. 9, Sep. 9, 1999, pp. 1-18.
C. Kei Wong et al.Secure Group Communications Using Key Graphs, Department of Computer Sciences University of Texas at Austin, Austin, TX. Feb. 9, 1998, pp. 1-12.
Toshihisa Nakano et al., “Key management system for digital content protection”, SCIS 2001, The 2001 Symposium on Cryptography and Information Security, Oiso, Japan, Jan. 23-26, 2001, The Institute of Electronics, Information and Communication Engineers, pp. 213-218 with English translation.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Data protection system that protects data by encrypting the... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Data protection system that protects data by encrypting the..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Data protection system that protects data by encrypting the... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3964390

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.