Method and system for recovering the validity of...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S179000, C713S181000

Reexamination Certificate

active

07134021

ABSTRACT:
According to the present invention, techniques, including a method and system, for restoring and/or validating data and/or associated signature log entries are provided. One embodiment of the present invention provides a method for validating a restored message, having an entry generated in a signature log for a message, where the entry includes cryptographic information associated with the message; Next, when said message is lost, the restored message is generated responsive to a request; and the restored message is validated using the signature log. In another embodiment a method for validating a selected log entry by using a signature log having a plurality of recorded log entries is provided. The method includes: computing a cryptographic value for the selected log entry; and determining if the cryptographic value is part of another recorded log entry.

REFERENCES:
patent: 5136646 (1992-08-01), Haber et al.
patent: 5905800 (1999-05-01), Moskowitz et al.
patent: 5956404 (1999-09-01), Schneier et al.
patent: 6131162 (2000-10-01), Yoshiura et al.
patent: 3278721 (2002-02-01), None
Efficient key agreement and signature schemes using compact representations in GF(p/sup 10/) Giuliani, K.J.; Guang Gong; Information Theory, 2004. ISIT 2004. Proceedings. International Symposium on , Jun. 27-Jul. 2, 2004 pp.:13.
An efficient distributed group key management algorithm Rahul, S.; Hansdah, R.C.; Parallel and Distributed Systems, 2004. ICPADS 2004. Proceedings. Tenth International Conference on , Jul. 7-9, 2004 pp.:230-237.
An efficient key-evolving signature scheme based on pairing Yuefei Zhu; Dan Xu; Distributed Computing Systems, 2004. FTDCS 2004. Proceedings. 10th IEEE International Workshop on Future Trends of , May 26-28, 2004 pp.:68-73.
Nagai Yasuhiko et al., “Method for Generating Electronic Data Able to be Authenticated,” Patent Abstract of Japan 2000-078125, Mar. 3, 2000, p. 1, Japan.
“Digimarc Watermarking Guide,” PDF Version, pp. 5.
“Clear, Secure, and Portable Visual Marks for the Cyber World,” Nov. 27, 2000, pp. 1-8.
Hal Abelson et al., “The Risks of Key Recovery, Key Escrow, & Trusted Third Party Encryption,” http://www.cdl.org/crypto/risks98/, 1998, pp. 1-20.
Jack Lacy et al., “Intellectual property protection systems and digital watermarking,” Optics Express, vol. 3, No. 12, Dec. 7, 1998, pp. 478-484.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for recovering the validity of... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for recovering the validity of..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for recovering the validity of... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3634591

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.