Identifying and coalescing identical objects encrypted with...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Security kernel or utility

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

07574598

ABSTRACT:
Cryptographic protocols and methods of employing the same are described. The described protocols advantageously enable two or more identical encryptable objects that are coded for encryption with different keys to be identified as identical without access to either the unencrypted objects or the keys that are used in the encryption process. Additionally, the protocols enable two or more identical encryptable objects to be processed with different encryption keys, yet be stored in a manner so that the total required storage space is proportional to the space that is required to store a single encryptable object, plus a constant amount for each distinct encryption key. In various embodiments, the encryptable objects comprise files and the cryptographic protocols enable encrypted files to be used in connection with single instance store (SIS) systems.

REFERENCES:
patent: 5008936 (1991-04-01), Hamilton et al.
patent: 5073935 (1991-12-01), Pastor
patent: 5778395 (1998-07-01), Whiting et al.
patent: 5940507 (1999-08-01), Cane et al.
patent: 6049874 (2000-04-01), McClain et al.
patent: 6366988 (2002-04-01), Skiba et al.
patent: 6405315 (2002-06-01), Burns et al.
patent: 6574657 (2003-06-01), Dickinson
J. Feigenbaum, E. Grosse & J. Reeds (AT&T Bell Laboratories), “CryptographicProtection of Memberhsip Lists,” typeset on Dec. 11, 1991, pp. 1-5.
J. Feigenbaum (AT&T Bell Laboratories), M. Liberman (AT&T Bell Laboratories) & R. Wright (Yale University) “Cryptographic Protection of Databases and Software” Aug. 15, 1989, pp. 1-12.
A Rahn: “(OFFTOPIC)Microsoft: Single Instance Store and Symbolic Links Explained” Internet document 'Online! Mar. 4, 2000 XP002215495 Retrieved from the Internet <URL:http://www.linux.org.ve/archivo/1-linux-2000-march/014215.html> retrieved on Jan. 10, 2002.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Identifying and coalescing identical objects encrypted with... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Identifying and coalescing identical objects encrypted with..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Identifying and coalescing identical objects encrypted with... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4132953

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.