Cryptography – Key management
Reexamination Certificate
2008-01-22
2008-01-22
Zand, Kambiz (Department: 2134)
Cryptography
Key management
C380S035000, C380S044000, C380S218000, C380S277000, C380S279000, C713S153000, C713S175000
Reexamination Certificate
active
10379455
ABSTRACT:
A computer system comprises a first computer entity arranged to encrypt data using an encryption key comprising a time value, and a second computer entity arranged to generate, at intervals, a decryption key using a current time value. The encryption and decryption processes are such that the decryption key generated using a current time value corresponding to that used for the encryption key, is apt to decrypt the encrypted s data.
REFERENCES:
patent: 5337357 (1994-08-01), Chou et al.
patent: 5768389 (1998-06-01), Ishii
patent: 5875247 (1999-02-01), Nakashima et al.
patent: 6603857 (2003-08-01), Batten-Carew et al.
patent: 6813358 (2004-11-01), Di Crescenzo et al.
patent: 2001/0052071 (2001-12-01), Kudo et al.
patent: 2003/0081785 (2003-05-01), Boneh et al.
patent: 2003/0099360 (2003-05-01), Hoang
patent: 0 784 256 (1997-07-01), None
patent: 0 997 808 (2000-05-01), None
patent: 1 043 878 (2000-10-01), None
patent: 2 276 965 (1994-10-01), None
patent: 11-27252 (1999-01-01), None
patent: 01/46782 (2001-06-01), None
Blake, Ian F. et al. “Scalable, Server-Passive, User-Anonymous Timed Release Public Key Encryption from Bilinear Pairing”, Sep. 2004.
Boneh, Dan et al. “Identity-Based Encryption from the Weil Pairing”, Aug. 2001.
Di Crescenzo, Giovanni et al. “Conditional Oblivious Transfer and Timed-Release Encryption”, May 1999.
Mao, Wenbo. “Timed-Release Cryptography”, Aug. 2001.
May, Timothy C. “Timed-Release Crypto”, published to Cypherpunks Feb. 1993, copy at <http://cypherpunks.venona.com/date/1995/09/msg01183.html>.
Microsoft Press. Computer Dictionary, Third Edition, 1997 Microsoft Corporation, pp. 93 and 399.
Mont, Marco Casassa et al. “The HP Time Vault Service: Innovating the Way Confidential Information is Disclosed, at the Right Time”, Sep. 2002.
Rivest, Ronald L. et al. “Time-lock puzzles and timed-release Crypto”, Mar. 1996.
Boneh et al. ; “Identity-Based Encryption from the Weil Pairing;”Crypto; 2001; pp. 1-31.
Cocks; “An Identity Based Encryption Scheme based On Quadratic Residues; ”Communications-Electronics Security Group; 2001; 4 pages; http;//www.cesg.gov.uk/technology/idpkc/media/ciren.pdf.
Rivest, R., et al., “Time Lock Puzzles and timed release cryptography”,Technology Report, MIT/LCS/TR-684, retrieved Nov. 29, 2006 from theory.lcs.mit.edu/˜rivest/ RivestShamirWagner-timelock.ps.
Harrison Keith Alexander
Mont Marco Casassa
Sadler Martin
Hewlett--Packard Development Company, L.P.
Ladas & Parry LLP
Simitoski Michael J
Zand Kambiz
LandOfFree
Method and apparatus for encrypting/decrypting data using... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for encrypting/decrypting data using..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for encrypting/decrypting data using... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3941284