Methods and apparatus for multi-level dynamic security system

Cryptography – Communication system using cryptography – Having compression

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S031000, C380S033000, C380S038000, C380S042000, C726S030000, C709S230000, C709S239000, C709S240000, C709S246000, C709S247000, C713S151000, C713S154000, C713S162000, C713S168000, C370S203000, C370S204000, C370S343000, C370S431000, C370S464000, C370S473000, C375S213000

Reexamination Certificate

active

07864959

ABSTRACT:
Methods and apparatus for converting original data into a plurality of sub-bands using wavelet decomposition; encrypting at least one of the sub-bands using a key to produce encrypted sub-band data; and transmitting the encrypted sub-band data to a recipient separately from the other sub-bands.

REFERENCES:
patent: 4393276 (1983-07-01), Steele
patent: 4747137 (1988-05-01), Matsunaga
patent: 5687191 (1997-11-01), Lee et al.
patent: 6192158 (2001-02-01), Abousleman
patent: 6505299 (2003-01-01), Zeng et al.
patent: 7046818 (2006-05-01), Ratnakar et al.
patent: 7218251 (2007-05-01), Tsutsui et al.
patent: 7277546 (2007-10-01), Dhawan
patent: 2003/0128845 (2003-07-01), Kudumakis
patent: WO-PCTUS0410869 (2006-08-01), None
Pommer, A., et al, ‘Selective encryption of wavelet packet subband structures for secure transmission of visual data’, Dec. 2002, Multimedia &Security Workshop, ACM Multimedia, pp. 67-70, entire document, http://www.ganesh.org/publ/papers/2002/Pommer02b.pdf. cited by examiner.
Alattar, A., et al, ‘Improved selective encryption technique for secure transmission of MPEG video bit-streams’, 1999, IEEE Signal Processing Society, Proceedings of the 1999 IEEE International Conference on Image Processing (ICIP'99), entiredocument, http://ieeexplore.ieee.org/iel5/6632/17687/00819590.pdf. cited by examiner.
Roshan K. Thomas et al., A Trusted Subject Architecture for Multilevel Secure Object-Oriented Databases, IEEE Transactions on Knowledge and Data Engineering, Feb. 1996, pp. 16-31, vol. 8, No. 1. cited by other.
Richard Graubart, The Integrity-Lock Approach to Secure Database Management, IEEE Symposium on Security and Privacy, 1984, pp. 62-74. cited by other.
Bhavani Thuraisingham et al., Security Constraint Processing in a Multilevel Secure Distributed Database Management System, IEEE Transactions on Knowledge and Data, Engineering, Apr. 1995, pp. 274-293, vol. 7, No. 2. cited by other.
Wen-Pai Lu, et al., A Model for Multilevel Security in Computer Networks, IEEE Transactions on Software Engineering, Jun. 1990, pp. 647-659., vol. 16, No. 6. cited by other.
Richard A. Griffith et al., Designing & Operating a Multilevel Security Network Using Standard Commercial Products, csrc.nist.gov
issc/1996/papers/NISSC96/paper037/sctycon2.pdg. cited by other.
Vijayalakshmi Atluri et al., Multilevel Secure Transaction Processing: Status and Prospects, Database Security, X: Status and Prospects, Chapman & Hall (1997), pp. 1-20. cited by other.
http://www.disa.mil/, p. 1. cited by other.
International Preliminary Report of PCT/US04/10869 of Sep. 26, 2006 by New Jersey Institute of Technology. cited by other.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Methods and apparatus for multi-level dynamic security system does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Methods and apparatus for multi-level dynamic security system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods and apparatus for multi-level dynamic security system will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2622957

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.