Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Packet header designating cryptographically protected data
Reexamination Certificate
2004-05-26
2008-10-14
Moazzami, Nasser (Department: 2136)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Packet header designating cryptographically protected data
C713S165000
Reexamination Certificate
active
07437555
ABSTRACT:
Cryptographic protocols and methods of employing the same are described. The described protocols advantageously enable two or more identical encryptable objects that are coded for encryption with different keys to be identified as identical without access to either the unencrypted objects or the keys that are used in the encryption process. Additionally, the protocols enable two or more identical encryptable objects to be processed with different encryption keys, yet be stored in a manner so that the total required storage space is proportional to the space that is required to store a single encryptable object, plus a constant amount for each distinct encryption key. In various embodiments, the encryptable objects comprise files and the cryptographic protocols enable encrypted files to be used in connection with single instance store (SIS) systems.
REFERENCES:
patent: 5008936 (1991-04-01), Hamilton et al.
patent: 5073935 (1991-12-01), Pastor
patent: 5778395 (1998-07-01), Whiting et al.
patent: 5940507 (1999-08-01), Cane et al.
patent: 6049874 (2000-04-01), McClain et al.
patent: 6366988 (2002-04-01), Skiba et al.
patent: 6405315 (2002-06-01), Burns et al.
patent: 6574657 (2003-06-01), Dickinson
A Rahn: “(Offtopic) Microsoft: Single Instance Store and Symbolic Links Explained,” Internet Document, ′Online! Mar. 4, 2000, XP002215495, Retrieved from the Internet: <URL:http://www.linux.org.ve/archivo/1-linux-2000-march/014215.html> retrieved on Jan. 10, 2002.
J. Feigenbaum (AT&T Bell Laboratories), M. Liberman (AT&T Bell Laboratories), & R. Wright (Yale University), “Cryptographic Protection of Databases and Software,” Aug. 15, 1989, pp. 1-12.
J. Feigenbaum , E. Grosse & J. Reeds (AT&T Bell Laboratories), “Cryptographic Protection of Membership Lists,” typeset on Dec. 11, 1991, pp. 1-5.
Bolosky William J.
Douceur John R.
Theimer Marvin M.
Hoffman Brandon S
Lee & Hayes PLLC
Microsoft Corporation
Moazzami Nasser
LandOfFree
Encryption systems and methods for identifying and... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Encryption systems and methods for identifying and..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Encryption systems and methods for identifying and... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3990824