Cryptography – Communication system using cryptography – Having compression
Reexamination Certificate
2007-10-02
2007-10-02
Moazzami, Nasser (Department: 2136)
Cryptography
Communication system using cryptography
Having compression
C380S040000, C380S042000, C380S255000, C380S261000, C713S168000, C713S176000
Reexamination Certificate
active
10822219
ABSTRACT:
Methods and apparatus for converting original data into a plurality of sub-bands using wavelet decomposition; encrypting at least one of the sub-bands using a key to produce encrypted sub-band data; and transmitting the encrypted sub-band data to a recipient separately from the other sub-bands.
REFERENCES:
patent: 5687191 (1997-11-01), Lee et al.
patent: 6505299 (2003-01-01), Zeng et al.
patent: 2003/0128845 (2003-07-01), Kudumakis
patent: WO PCTUS04/10869 (2006-08-01), None
Pommer, A., et al, ‘Selective encryption of wavelet packet subband structures for secure transmission of visual data’, Dec. 2002, Multimedia & Security Workshop, ACM Multimedia, pp. 67-70, entire document, http://www.ganesh.org/publ/papers/2002/Pommer02b.pdf.
Alattar, A., et al, ‘Improved selective encryption technique for secure transmission of MPEG video bit-streams’, 1999, IEEE Signal Processing Society, Proceedings of the 1999 IEEE International Conference on Image Processing (ICIP'99), entire document, http://ieeexplore.ieee.org/iel5/6632/17687/00819590.pdf.
Roshan K. Thomas et al., A Trusted Subject Architecture for Multilevel Secure Object-Oriented Databases, IEEE Transactions on Knowledge and Data Engineering, Feb. 1996, pp. 16-31, vol. 8, No. 1.
Richard Graubart, The Integrity-Lock Approach To Secure Database Management, IEEE Symposium on Security and Privacy, 1984, pp. 62-74.
Bhavani Thuraisingham et al., Security Constraint Processing In A Multilevel Secure Distributed Database Management System, IEEE Transactions on Knowledge And Data, Engineering, Apr. 1995, pp. 274-293, vol. 7, No. 2.
Wen-Pai Lu, et al., A Model For Multilevel Security In Computer Networks, IEEE Transactions on Software Engineering, Jun. 1990, pp. 647-659., vol. 16, No. 6.
Richard A. Griffith et al., Designing & Operating A Multilevel Security Network Using Standard Commercial Products, csrc.nist.gov
issc/1996/papers/NISSC96/paper037/sctycon2.pdg.
Vijayalakshmi Atluri et al., Multilevel Secure Transaction Processing: Status and Prospects, Database Security, X: Status and Prospects, Chapman & Hall (1997), pp. 1-20.
http://www.disa.mil/, p. 1.
International Preliminary Report of PCT/US04/10869 of Sep. 26, 2006 by New Jersey Institute of Technology.
Baum Ronald
Dernier Matthew B.
Kaplan Gilman Gibson & Dernier LLP
Moazzami Nasser
New Jersey Institute of Technology
LandOfFree
Methods and apparatus for multi-level dynamic security system does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Methods and apparatus for multi-level dynamic security system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods and apparatus for multi-level dynamic security system will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3829642