Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Having particular address related cryptography
Reexamination Certificate
2006-08-22
2006-08-22
Sheikh, Ayaz (Department: 2136)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Having particular address related cryptography
C380S264000, C380S279000, C380S280000, C713S162000, C713S167000, C713S168000, C713S176000, C726S026000, C726S030000
Reexamination Certificate
active
07096355
ABSTRACT:
In general, data exchanged between users is protected using any of various encoding approaches. An example of encoding is encryption, but any kind of encoding may be used. The data used to encrypt the data exchanged between the users, referred to as a “key”, is maintained only in a key repository. Users must obtain a key from the key repository to either encode or decode, encrypt or decrypt data, after which the user's copy of the key is destroyed or otherwise rendered inoperable. A key management policy is employed to control access to the keys maintained by the key repository. Encoding algorithms may be dynamically changed over time. Users may negotiate different algorithms to be used with specific users or messages. Thus, different algorithms may be used between different sets of users depending upon what the member users of those sets negotiate among themselves. The frequency at which algorithms are changed may also be separately negotiated between users. The frequency may vary depending, for example, upon the perceived risk of intrusion by unauthorized third parties, the content of the messages being transmitted, or both. According to an inline message decryption approach, an encoded message is provided to a user in a form that enables the user's client to process the encoded message using conventional client tools and obtain the cleartext message. This eliminates the need for a user's client to be aware of the particular encoding algorithm used to encode the message. Various embodiments of the inline message decryption approach include: a) in-situ decryption; b) remote decryption; and c) data uploading. An approach is also provided for exchanging data between nodes in a network using sets of associated URLs.
REFERENCES:
patent: 5265159 (1993-11-01), Kung
patent: 5410602 (1995-04-01), Finkelstein et al.
patent: 5775995 (1998-07-01), Okamoto
patent: 5786817 (1998-07-01), Sakano et al.
patent: 5794253 (1998-08-01), Norin et al.
patent: 5870548 (1999-02-01), Nielsen
patent: 5958005 (1999-09-01), Thorne et al.
patent: 6049838 (2000-04-01), Miller et al.
patent: 6134660 (2000-10-01), Boneh et al.
patent: 6215877 (2001-04-01), Matsumoto
patent: 6223287 (2001-04-01), Douglas et al.
patent: 6226752 (2001-05-01), Gupta et al.
patent: 6324650 (2001-11-01), Ogilvie
patent: 6334189 (2001-12-01), Granger et al.
patent: 6625734 (2003-09-01), Marvit et al.
patent: WO 98/49643 (1998-04-01), None
patent: WO 98/58321 (1998-06-01), None
patent: WO 98/05814 (1998-07-01), None
patent: WO 98/35474 (1998-08-01), None
Hush Communications Corp, “Hushmail — PGP Compatible Secure Free Email — Help”, 1999-2005 Hush Communications Corp, entire document, www.hushmail.com/help-faqs2.
Szor, P.,“Advanced Code Evolution Techniques and Computer Virus Generator Kits”, Pearson Educational, Inc., InformIT, Mar. 25, 2005, entire document, www.awprofessional.com/articles/article.asp?p=366890&seqNum=3.
Microsoft Corp., “Microsoft CryptoAPI,” Jan 17, 1996, Microsoft Corp., Version 0.9, entire document.
ZipLip Inc., web site URL “https://www.ziplip.com/products.html”, 1999-2002, entire page.
ZipLipInc., web site URL https://www.ziplip.com/products/ZLPublicKeyInfrastructure.html, 1999-2002, entire page.
ZipLip, Inc., web site URL https://www.ziplip.com/technology/summary.html, 1999-2002, entire page.
Brettle Dean
Goodnick Stuart
Marvit David
Marvit Maclen
Rosema Keith David
Baum Ronald
Becker Edward A.
Hickman Palermo & Truong & Becker LLP
Omniva Corporation
Sheikh Ayaz
LandOfFree
Dynamic encoding algorithms and inline message decryption does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Dynamic encoding algorithms and inline message decryption, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Dynamic encoding algorithms and inline message decryption will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3693879