Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2007-05-08
2007-05-08
Zand, Kambiz (Department: 2132)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S181000
Reexamination Certificate
active
09294956
ABSTRACT:
A method for inserting a digital signature into digital data is provided. The digital data has bits and the method includes the steps of: assigning predetermined bits of the digital data for receiving the digital signature; signing the digital data excluding the predetermined bits resulting in the digital signature; and inserting the digital signature into the predetermined bits of the digital data for subsequent authentication of the digital data. Also provided is a method for authenticating digital data having the embedded digital signature in the predetermined bits of the digital data including the steps of: extracting the digital signature from the predetermined bits; decrypting the digital signature from the digital data resulting in a first hash; applying a known one-way hashing function used by an encoder of the digital data to the digital data excluding the predetermined bits resulting in a second hash; and comparing the first hash to the second hash wherein if the first hash matches the second hash the digital data is authentic. In a preferred version of the methods of the present invention, the method further includes the step of inserting associated data into the digital data prior to the signing step such that the digital signature authenticates both the associated data as well as the digital data. Preferably, the associated data is inserted into the bits of the digital data excluding the predetermined bits.
REFERENCES:
patent: 5175765 (1992-12-01), Perlman
patent: RE34954 (1995-05-01), Haber et al.
patent: 5455865 (1995-10-01), Perlman
patent: 5499294 (1996-03-01), Friedman
patent: 5557518 (1996-09-01), Rosen
patent: 5579393 (1996-11-01), Conner et al.
patent: 5613012 (1997-03-01), Hoffman et al.
patent: 5621797 (1997-04-01), Rosen
patent: 5640002 (1997-06-01), Ruppert et al.
patent: 5646997 (1997-07-01), Barton
patent: 5648648 (1997-07-01), Chou et al.
patent: 5712679 (1998-01-01), Coles
patent: 5715487 (1998-02-01), McIntyre et al.
patent: 5734752 (1998-03-01), Knox
patent: 5742771 (1998-04-01), Fontaine
patent: 5771101 (1998-06-01), Bramall
patent: 5787172 (1998-07-01), Arnold
patent: 5841886 (1998-11-01), Rhoads
patent: 5850444 (1998-12-01), Rune
patent: 5862217 (1999-01-01), Steinberg et al.
patent: 5862218 (1999-01-01), Steinberg
patent: 5870499 (1999-02-01), Bender et al.
patent: 5875249 (1999-02-01), Mintzer et al.
patent: 5889861 (1999-03-01), Ohashi et al.
patent: 5898779 (1999-04-01), Squilla et al.
patent: 6005936 (1999-12-01), Shimiau et al.
patent: 6061451 (2000-05-01), Muratani et al.
patent: 6154541 (2000-11-01), Zhang
patent: 6182218 (2001-01-01), Saito
patent: 6256736 (2001-07-01), Coppersmith et al.
patent: 6263438 (2001-07-01), Walker et al.
patent: 6367013 (2002-04-01), Bisbee et al.
patent: 6389538 (2002-05-01), Gruse et al.
patent: 6396937 (2002-05-01), Chen et al.
patent: 6507371 (2003-01-01), Hashimoto et al.
patent: 6587837 (2003-07-01), Spagna et al.
Schneier, Bruce. Applied Cryptography. 1995. pp. 38, 59, 75-76.
Daly, James, Computerworld, “Fingerprinting a Computer Security Code”, Jul. 27, 1992, vol. 26, Iss 30, p. 25.
Kundur, et al., Towards a Telltale Watermarking Technique for Tamper Proofing.
Lin, et al., An Image Authenticator Surviving DCT-Based Variable Quantization Table Compressions.
Lin, et al., A Watermark-Based Robust Image Authentication Method Using Wavelets, Advent Report, Columbia, University, Apr. 1998.
Lin, et al., Generating Robust Digital Signature For Image/Video Authentication, Multimedia and Security Workshop at a ACM Multimedia '98, Bristol, U.K., Sep. 1998.
Lin, et al., A Robust Image Authentication Method Surviving JPEG Lossy Compression, SPIE Storage and Retrieval of Image/Video Databases, San Jose, CA, Jan. 1998.
Matsui, et al., Video-Stenography: How To Secretly Embed a Signature in a Picture, IMA Intellectual Property Project Proceedings, vol. 1, Issue 1, pp. 187-206, Jan. 1994.
Schneider, et al., A Robust Content Based Digital Signature For Image Authentication, 3rd IEEE International Conference on Image Processing, vol. 3, pp. 227-230, 1996.
Schyndel, et al., A Digital Watermark, IEEE Conference Publication.
Wong, A Public Key Watermarking For Image Verification and Authentication.
Friedman, The Trustworthy Digital Camera, Restoring Credibility To The Photographic Image, IEEE Transactions on Consumer Electronics, vol. 39, No. 4, pp. 905-910, Nov. 1993.
Hsu, et al., Hidden Signatures In Images, Proceedings of the 1996 IEEE International Conference In Image Processing, ICIP '96, vol. 3, pp. 223-226, 1996.
Cox Ingemar J.
Miller Matthew L.
Rayner Douglas F.
NEC Corporation
Scully , Scott, Murphy & Presser, P.C.
Zand Kambiz
LandOfFree
Method and device for inserting and authenticating a digital... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and device for inserting and authenticating a digital..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and device for inserting and authenticating a digital... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3773424