Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Security kernel or utility
Reexamination Certificate
2003-09-18
2008-08-05
Vu, Kimyen (Department: 2135)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Security kernel or utility
C713S165000, C713S176000, C713S180000, C713S181000, C713S189000, C713S193000, C380S028000, C380S030000, C380S277000, C380S278000, C380S282000
Reexamination Certificate
active
07409545
ABSTRACT:
A method and system is disclosed for utilizing an ephemeral encryption or decryption agent so as to preclude access by the ephemeral encryption agent or decryption agent, respectively, to the information being ephemerally encrypted or decrypted. To preclude access by the ephemeral encryption agent, a blinding function is applied to the information prior to forwarding such information to the encryption agent for encryption. To preclude access to the information by the ephemeral decryption agent, a blinding function is applied to the encrypted information prior to forwarding the encrypted information to the decryption agent for decryption. Once the information has been returned, the information is unblinded, leaving an encrypted or decrypted message respectively.
REFERENCES:
patent: 5347580 (1994-09-01), Molva et al.
patent: 5491750 (1996-02-01), Bellare et al.
patent: 5606617 (1997-02-01), Brands
patent: 5737419 (1998-04-01), Ganesan
patent: 5812669 (1998-09-01), Jenkins et al.
patent: 6009173 (1999-12-01), Sumner
patent: 6044462 (2000-03-01), Zubeldia et al.
patent: 6055314 (2000-04-01), Spies et al.
patent: 6185685 (2001-02-01), Morgan et al.
patent: 6240187 (2001-05-01), Lewis
patent: 6246970 (2001-06-01), Silverbrook et al.
patent: 6278783 (2001-08-01), Kocher et al.
patent: 6308277 (2001-10-01), Vaeth et al.
patent: 6363480 (2002-03-01), Perlman
patent: 6367019 (2002-04-01), Ansell et al.
patent: 6877092 (2005-04-01), Chandersekaran et al.
patent: 7016499 (2006-03-01), Perlman
patent: 7082536 (2006-07-01), Filipi-Martin et al.
patent: 7178030 (2007-02-01), Scheidt et al.
patent: 2002/0136410 (2002-09-01), Hanna et al.
patent: 2003/0059041 (2003-03-01), MacKenzie et al.
patent: 2003/0161472 (2003-08-01), Tong et al.
patent: 2004/0133781 (2004-07-01), Guillou
patent: 2 402 852 (2004-12-01), None
patent: WO0120836 (2005-03-01), None
Menezes, Alfred J., Van Oorschot, Paul C., and Vanstone, Scott A., “Handbook of Applied Cryptography”, CRC Press, Oct. 1996, pp. 475 and 487.
Gemplus, “Data Sheets of Gemplus”, date unknown.
McNamara, “E-mail that Disappears”, http://www.nwfusion.com/archive/1999b/0830netbuzz.html, Aug. 30, 1999, 4 pages.
Menezes, et al., “Handbook of Applied Cryptography”, CRC Press, 1997, 581-86.
Schlumberger, “Data Sheets of Schlumberger”, date unknown.
Chapin IP Law LLC
Chapin, Esq. Barry W.
Dada Beemnet W
Sun MicroSystems, Inc.
Vu Kimyen
LandOfFree
Ephemeral decryption utilizing binding functions does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Ephemeral decryption utilizing binding functions, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Ephemeral decryption utilizing binding functions will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4018516