Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Patent
1997-05-30
2000-05-16
Beausoliel, Jr., Robert W.
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
G06F 1214
Patent
active
060651199
ABSTRACT:
A method of authenticating digital data such as measurements made for medical, environmental purposes, or forensic purpose, and destined for archival storage or transmission through communications channels in which corruption or modification in part is possible. Authenticated digital data contain data-metric quantities that can be constructed from the digital data by authorized persons having a digital key. To verify retrieved or received digital data, the data-metrics constructed from the retrieved or received data are compared with similar data-metrics calculated for the retrieved or received digital data. The comparison determines the location and measures the amount of modification or corruption in the retrieved or received digital data.
REFERENCES:
patent: 4405829 (1983-09-01), Rivest et al.
patent: 4868877 (1989-09-01), Fischer
patent: 5204897 (1993-04-01), Wyman
patent: 5659726 (1997-08-01), Sandford, II et al.
patent: 5694569 (1997-12-01), Fisher
patent: 5757092 (1998-05-01), Graham
patent: 5778102 (1998-07-01), Sandford, II et al.
patent: 5819289 (1998-10-01), Sandford, II et al.
Book by B. Schneier, Applied Cryptography Protocols, Algorithms, and Source Code in C, J. Wiley & Sons, New York, New York (1994). (Copy of title page, the page containing ISBN information, and that portion of the document that caused it to be listed.).
M. Bellare, R. Canetti, and H. Krawczk, encryption method for authenticating data which is based on a message authentication code (MAC) was presented in "The HMAC Construction," RSA Laboratories' CryptoBytes, 2, No. 1, 12, pp. 12-15 (1996).
W. Bender, D. Gruhl, and N. Morimoto, "Techniques for Data Hiding," Proc. SPIE, Storage and Retrieval for Image and Video Databases III, vol. 2420, pp. 164-173, Feb . 9-10, 1995, San Jose, CA.
Method for impressing a digital watermark by G. Caronni, in "Assuring Ownership Rights for Digital Images," Proc. Reliable IT Systems, VIS' 95, 1995, pp. 1-10, edited by H. H. Bruggemann and W. Gerhardt-Hackl (Vieweg Publ. Co.: Germany).
Another method for impressing a digital watermark by I. J. Cox, J. Kilian, T. Leighton, and T Shamoon in "Secure Spread Spectrum Watermarking for Multimedia," NEC Research Inst. Tech. Report 95-10, pp. 1-33, 1995.
Handel Theodore G.
Sandford, II Maxwell T.
Beausoliel, Jr. Robert W.
Elisca Pierre Eddy
The Regents of the University of California
Wyrick Milton D.
LandOfFree
Data validation does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Data validation, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Data validation will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-269038