Cryptography – Communication system using cryptography – Having compression
Reexamination Certificate
2011-01-04
2011-01-04
LaForgia, Christian (Department: 2439)
Cryptography
Communication system using cryptography
Having compression
C380S031000, C380S033000, C380S038000, C380S042000, C726S030000, C709S230000, C709S239000, C709S240000, C709S246000, C709S247000, C713S151000, C713S154000, C713S162000, C713S168000, C370S203000, C370S204000, C370S343000, C370S431000, C370S464000, C370S473000, C375S213000
Reexamination Certificate
active
07864959
ABSTRACT:
Methods and apparatus for converting original data into a plurality of sub-bands using wavelet decomposition; encrypting at least one of the sub-bands using a key to produce encrypted sub-band data; and transmitting the encrypted sub-band data to a recipient separately from the other sub-bands.
REFERENCES:
patent: 4393276 (1983-07-01), Steele
patent: 4747137 (1988-05-01), Matsunaga
patent: 5687191 (1997-11-01), Lee et al.
patent: 6192158 (2001-02-01), Abousleman
patent: 6505299 (2003-01-01), Zeng et al.
patent: 7046818 (2006-05-01), Ratnakar et al.
patent: 7218251 (2007-05-01), Tsutsui et al.
patent: 7277546 (2007-10-01), Dhawan
patent: 2003/0128845 (2003-07-01), Kudumakis
patent: WO-PCTUS0410869 (2006-08-01), None
Pommer, A., et al, ‘Selective encryption of wavelet packet subband structures for secure transmission of visual data’, Dec. 2002, Multimedia &Security Workshop, ACM Multimedia, pp. 67-70, entire document, http://www.ganesh.org/publ/papers/2002/Pommer02b.pdf. cited by examiner.
Alattar, A., et al, ‘Improved selective encryption technique for secure transmission of MPEG video bit-streams’, 1999, IEEE Signal Processing Society, Proceedings of the 1999 IEEE International Conference on Image Processing (ICIP'99), entiredocument, http://ieeexplore.ieee.org/iel5/6632/17687/00819590.pdf. cited by examiner.
Roshan K. Thomas et al., A Trusted Subject Architecture for Multilevel Secure Object-Oriented Databases, IEEE Transactions on Knowledge and Data Engineering, Feb. 1996, pp. 16-31, vol. 8, No. 1. cited by other.
Richard Graubart, The Integrity-Lock Approach to Secure Database Management, IEEE Symposium on Security and Privacy, 1984, pp. 62-74. cited by other.
Bhavani Thuraisingham et al., Security Constraint Processing in a Multilevel Secure Distributed Database Management System, IEEE Transactions on Knowledge and Data, Engineering, Apr. 1995, pp. 274-293, vol. 7, No. 2. cited by other.
Wen-Pai Lu, et al., A Model for Multilevel Security in Computer Networks, IEEE Transactions on Software Engineering, Jun. 1990, pp. 647-659., vol. 16, No. 6. cited by other.
Richard A. Griffith et al., Designing & Operating a Multilevel Security Network Using Standard Commercial Products, csrc.nist.gov
issc/1996/papers/NISSC96/paper037/sctycon2.pdg. cited by other.
Vijayalakshmi Atluri et al., Multilevel Secure Transaction Processing: Status and Prospects, Database Security, X: Status and Prospects, Chapman & Hall (1997), pp. 1-20. cited by other.
http://www.disa.mil/, p. 1. cited by other.
International Preliminary Report of PCT/US04/10869 of Sep. 26, 2006 by New Jersey Institute of Technology. cited by other.
Baum Ronald
Connolly Bove & Lodge & Hutz LLP
LaForgia Christian
New Jersey Institute of Technology
LandOfFree
Methods and apparatus for multi-level dynamic security system does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Methods and apparatus for multi-level dynamic security system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods and apparatus for multi-level dynamic security system will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2622957