Data validation

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

G06F 1214

Patent

active

060651199

ABSTRACT:
A method of authenticating digital data such as measurements made for medical, environmental purposes, or forensic purpose, and destined for archival storage or transmission through communications channels in which corruption or modification in part is possible. Authenticated digital data contain data-metric quantities that can be constructed from the digital data by authorized persons having a digital key. To verify retrieved or received digital data, the data-metrics constructed from the retrieved or received data are compared with similar data-metrics calculated for the retrieved or received digital data. The comparison determines the location and measures the amount of modification or corruption in the retrieved or received digital data.

REFERENCES:
patent: 4405829 (1983-09-01), Rivest et al.
patent: 4868877 (1989-09-01), Fischer
patent: 5204897 (1993-04-01), Wyman
patent: 5659726 (1997-08-01), Sandford, II et al.
patent: 5694569 (1997-12-01), Fisher
patent: 5757092 (1998-05-01), Graham
patent: 5778102 (1998-07-01), Sandford, II et al.
patent: 5819289 (1998-10-01), Sandford, II et al.
Book by B. Schneier, Applied Cryptography Protocols, Algorithms, and Source Code in C, J. Wiley & Sons, New York, New York (1994). (Copy of title page, the page containing ISBN information, and that portion of the document that caused it to be listed.).
M. Bellare, R. Canetti, and H. Krawczk, encryption method for authenticating data which is based on a message authentication code (MAC) was presented in "The HMAC Construction," RSA Laboratories' CryptoBytes, 2, No. 1, 12, pp. 12-15 (1996).
W. Bender, D. Gruhl, and N. Morimoto, "Techniques for Data Hiding," Proc. SPIE, Storage and Retrieval for Image and Video Databases III, vol. 2420, pp. 164-173, Feb . 9-10, 1995, San Jose, CA.
Method for impressing a digital watermark by G. Caronni, in "Assuring Ownership Rights for Digital Images," Proc. Reliable IT Systems, VIS' 95, 1995, pp. 1-10, edited by H. H. Bruggemann and W. Gerhardt-Hackl (Vieweg Publ. Co.: Germany).
Another method for impressing a digital watermark by I. J. Cox, J. Kilian, T. Leighton, and T Shamoon in "Secure Spread Spectrum Watermarking for Multimedia," NEC Research Inst. Tech. Report 95-10, pp. 1-33, 1995.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Data validation does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Data validation, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Data validation will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-269038

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.