Information security – Prevention of unauthorized use of data including prevention... – Copy inactivation
Reexamination Certificate
2001-06-13
2008-08-26
Simitoski, Michael J (Department: 2134)
Information security
Prevention of unauthorized use of data including prevention...
Copy inactivation
C713S193000, C726S026000, C726S031000, C705S051000, C705S057000
Reexamination Certificate
active
07418737
ABSTRACT:
A mechanism for encrypting confidential information, uses a transmission package than can be attached to an electronic message. The transmission package is an executable application and controls the decryption, using a separately stored key, and rendering of the contents. On termination of the rendering of the information the transmission package triggers deletion of the encrypted file, the transmission package, and the separately stored key.
REFERENCES:
patent: 5199070 (1993-03-01), Matsuzaki et al.
patent: 5321749 (1994-06-01), Virga
patent: 5557678 (1996-09-01), Ganesan
patent: 5604801 (1997-02-01), Dolan et al.
patent: 5956406 (1999-09-01), Maldy
patent: 6006328 (1999-12-01), Drake
patent: 6023506 (2000-02-01), Ote et al.
patent: 6052780 (2000-04-01), Glover
patent: 6246771 (2001-06-01), Stanton et al.
patent: 6301660 (2001-10-01), Benson
patent: 6324569 (2001-11-01), Ogilvie et al.
patent: 6625734 (2003-09-01), Marvit et al.
patent: 6785716 (2004-08-01), Nobakht
patent: 6847719 (2005-01-01), Ballard
patent: 2001/0000265 (2001-04-01), Schreiber et al.
patent: 2001/0001147 (2001-05-01), Hutchison et al.
patent: 2002/0016922 (2002-02-01), Richards et al.
patent: 2002/0078361 (2002-06-01), Giroux et al.
patent: 2002/0099766 (2002-07-01), Tuli
patent: 2002/0121546 (2002-09-01), Clark
patent: 2002/0152170 (2002-10-01), Dutta et al.
patent: 2002/0178353 (2002-11-01), Graham
patent: 2003/0028801 (2003-02-01), Liberman et al.
patent: 2003/0195856 (2003-10-01), Bramhill et al.
eZip95. “What is eZip Wizard v3.0?”, Nov. 2000, <http://www.edisys.com/Support/2626.htm>.
Gong, Li. Inside Java 2 Platform Security, Architecture, API Design and Implementation, Jun. 1999 Sun Microsystems, pp. 21-25.
Menezes, Alfred J. et al. Handbook of Applied Cryptography, 1997 CRC Press LLC, Ch. 13.
PC-Shareware.com. “How to Unzip ZIP Archive Files”, 1997 PC Shareware, Inc., <http://www.pc-shareware.com/pkunzip2.htm>.
WavPack. “Using WavPack”, Feb. 2001, <http://web.archive.org/web/20010205012700/www.wavpack.com/documentation.htm>.
WinZip. “WinZip Self-Extractor 2.1”, Sep. 1999, <http://web.archive.org/web/19990507020557/www.winzip.com/winzipse.htm>.
Authentica, Inc. Press Release Jan. 16, 2001, “Authentica Delivers MailRecall for Lotus Notes”.
Authentica Web Site pages “MailRecall” date not provided.
Hamaty Christopher J.
McAfee, Inc.
Simitoski Michael J
Zilka-Kotab, PC
LandOfFree
Encrypted data file transmission does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Encrypted data file transmission, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Encrypted data file transmission will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3999841