Document encryption

Cryptography – Electric signal modification – Having production of printed copy

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S037000, C380S046000, C380S055000, C380S056000, C713S170000, C713S194000

Reexamination Certificate

active

07436956

ABSTRACT:
Encryption of documents is used to restrict access to such documents to those users who have the appropriate decryption keys. The encryption of documents on public web servers hitherto has prevented indexing by search engines. By keeping words and possible sentences or paragraphs intact in the encrypted document but re-ordering elements of the document to prevent the document being human-readable, the possibility of encrypted documents being indexed by search engines is provided.

REFERENCES:
patent: 4751733 (1988-06-01), Delayaye et al.
patent: 4837737 (1989-06-01), Watanabe
patent: 5113444 (1992-05-01), Vobach
patent: 5321748 (1994-06-01), Zeidler et al.
patent: 5323313 (1994-06-01), Davis et al.
patent: 5343530 (1994-08-01), Viricel
patent: 5467447 (1995-11-01), Vogel
patent: 5590258 (1996-12-01), Aoyama
patent: 5666411 (1997-09-01), McCarty
patent: 5699427 (1997-12-01), Chow et al.
patent: 5870470 (1999-02-01), Johnson et al.
patent: 5909494 (1999-06-01), Blaze
patent: 6373947 (2002-04-01), Pomerantz et al.
patent: 6490353 (2002-12-01), Tan
patent: 6678694 (2004-01-01), Zimmermann et al.
patent: 6804355 (2004-10-01), Graunke
patent: 6836239 (2004-12-01), Scott
patent: 6934388 (2005-08-01), Clark
patent: 6941460 (2005-09-01), Carro et al.
patent: 6944344 (2005-09-01), Imagawa et al.
patent: 7162453 (2007-01-01), Tenorio
patent: 7277542 (2007-10-01), Duval
patent: 2002/0078343 (2002-06-01), Rubin et al.
patent: 2002/0150240 (2002-10-01), Henson et al.
patent: WO97/44736 (1997-11-01), None
Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone; Handbook of Applied Cryptography, 1997, CRC, Press LLC; pp. 15-21.
Dawn Xiaodong Song, David Wagner, Adrian Perrig; “Practical Techniques for Searches on Encrypted Data”; 2000; IEEE Symposium on Security and Privacy; pp. 1-12.
Bruce Schneier; “Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C”; (Publisher: John Wiley & Sons, Inc.); 1996; Chapters 9 and 13; and chapter/section (23.15) (one page).
Dorothy Elizabeth Robling Denning “Cryptography and Data Security”; 1982; Addison-Wesley Publishing Company, Inc.; Chapter 3, pp. 135-190.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Document encryption does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Document encryption, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Document encryption will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4008825

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.