Information security – Access control or authentication – Stand-alone
Reexamination Certificate
2007-05-22
2007-05-22
Smithers, Matthew (Department: 2137)
Information security
Access control or authentication
Stand-alone
C705S064000
Reexamination Certificate
active
11067294
ABSTRACT:
According to the invention, a system for verifying a steganogram is disclosed. Included in the system are a first system, a second system, a steganogram, and a steganogram preparer. The first system is coupled to an access device by way of a public network. The second system coupled to the first system. The steganogram is comprised of random data and encrypted information, which is randomly dispersed throughout the steganogram. The steganogram preparer provides the steganogram to the access device. The first system gathers a subset of the encrypted information from the access device. The second system receives the subset or a derivative of the subset and verifies that the subset or a derivative of the subset is from the steganogram.
REFERENCES:
patent: 4259720 (1981-03-01), Campbell
patent: 4827508 (1989-05-01), Shear
patent: 4906828 (1990-03-01), Halpern
patent: 5220501 (1993-06-01), Lawlor et al.
patent: 5371797 (1994-12-01), Bocinsky, Jr.
patent: 5453601 (1995-09-01), Rosen
patent: 5457746 (1995-10-01), Dolphin
patent: 5539828 (1996-07-01), Davis
patent: 5590197 (1996-12-01), Chen et al.
patent: 5623547 (1997-04-01), Jones et al.
patent: 5677953 (1997-10-01), Dolphin
patent: 5734823 (1998-03-01), Saigh et al.
patent: 5771291 (1998-06-01), Newton et al.
patent: 5850446 (1998-12-01), Berger et al.
patent: 5870724 (1999-02-01), Lawlor et al.
patent: 5889863 (1999-03-01), Weber
patent: 5892900 (1999-04-01), Ginter et al.
patent: 5903881 (1999-05-01), Schrader et al.
patent: 5913202 (1999-06-01), Motoyama
patent: 5956483 (1999-09-01), Grate et al.
patent: 6065073 (2000-05-01), Booth
patent: 6073160 (2000-06-01), Grantham et al.
patent: 6098053 (2000-08-01), Slater
patent: 6173269 (2001-01-01), Solokl et al.
patent: 6195357 (2001-02-01), Polcyn
patent: 6505178 (2003-01-01), Flenley
patent: 6526489 (2003-02-01), Kikuchi et al.
patent: 6553492 (2003-04-01), Hosoe
patent: 2002/0152180 (2002-10-01), Turgeon
patent: 2003/0014371 (2003-01-01), Turgeon
patent: 2003/0204728 (2003-10-01), Irwin
patent: 2004/0064537 (2004-04-01), Anderson et al.
patent: 2004/0103325 (2004-05-01), Priebatsch
patent: 2005/0065886 (2005-03-01), Andelin et al.
Sueyoshi et al., “Steganography for e-Business: An Offensive Use of Information Security”, 2004, Asia Pacific Management Review , pp. 943-968.
Sung et al., “Defeating the Current Steganalysis Techniques (Robust Steganography)”, 2004, IEEE Computer Society.
Sueyoshi, T. “Steganography for e-Business: An Offensive Use of Information Security” Asia Pacific Management Review, (2004) 9(5), pp. 943-968, USA.
Sung, A.H. “Defeating the Current Steganalysis Techniques(Robust Steganography)” Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC '04), 5 pages, USA.
Metavante Corporation
Smithers Matthew
LandOfFree
Non-algorithmic vectored steganography does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Non-algorithmic vectored steganography, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Non-algorithmic vectored steganography will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3791246