Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2006-11-07
2006-11-07
Jung, David (Department: 2134)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S179000, C713S181000
Reexamination Certificate
active
07134021
ABSTRACT:
According to the present invention, techniques, including a method and system, for restoring and/or validating data and/or associated signature log entries are provided. One embodiment of the present invention provides a method for validating a restored message, having an entry generated in a signature log for a message, where the entry includes cryptographic information associated with the message; Next, when said message is lost, the restored message is generated responsive to a request; and the restored message is validated using the signature log. In another embodiment a method for validating a selected log entry by using a signature log having a plurality of recorded log entries is provided. The method includes: computing a cryptographic value for the selected log entry; and determining if the cryptographic value is part of another recorded log entry.
REFERENCES:
patent: 5136646 (1992-08-01), Haber et al.
patent: 5905800 (1999-05-01), Moskowitz et al.
patent: 5956404 (1999-09-01), Schneier et al.
patent: 6131162 (2000-10-01), Yoshiura et al.
patent: 3278721 (2002-02-01), None
Efficient key agreement and signature schemes using compact representations in GF(p/sup 10/) Giuliani, K.J.; Guang Gong; Information Theory, 2004. ISIT 2004. Proceedings. International Symposium on , Jun. 27-Jul. 2, 2004 pp.:13.
An efficient distributed group key management algorithm Rahul, S.; Hansdah, R.C.; Parallel and Distributed Systems, 2004. ICPADS 2004. Proceedings. Tenth International Conference on , Jul. 7-9, 2004 pp.:230-237.
An efficient key-evolving signature scheme based on pairing Yuefei Zhu; Dan Xu; Distributed Computing Systems, 2004. FTDCS 2004. Proceedings. 10th IEEE International Workshop on Future Trends of , May 26-28, 2004 pp.:68-73.
Nagai Yasuhiko et al., “Method for Generating Electronic Data Able to be Authenticated,” Patent Abstract of Japan 2000-078125, Mar. 3, 2000, p. 1, Japan.
“Digimarc Watermarking Guide,” PDF Version, pp. 5.
“Clear, Secure, and Portable Visual Marks for the Cyber World,” Nov. 27, 2000, pp. 1-8.
Hal Abelson et al., “The Risks of Key Recovery, Key Escrow, & Trusted Third Party Encryption,” http://www.cdl.org/crypto/risks98/, 1998, pp. 1-20.
Jack Lacy et al., “Intellectual property protection systems and digital watermarking,” Optics Express, vol. 3, No. 12, Dec. 7, 1998, pp. 478-484.
Matsuki Takeshi
Miyazaki Kunihiko
Sasaki Ryoichi
Susaki Seiichi
Takaragi Kazuo
LandOfFree
Method and system for recovering the validity of... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system for recovering the validity of..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for recovering the validity of... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3634591