Cryptography – Particular algorithmic function encoding – Public key
Reexamination Certificate
2005-12-19
2010-12-21
Moazzami, Nasser (Department: 2436)
Cryptography
Particular algorithmic function encoding
Public key
C380S059000, C380S255000, C713S150000, C726S002000, C726S027000, C708S200000
Reexamination Certificate
active
07856100
ABSTRACT:
A method and system for collecting data from devices using a homomorphic encryption of the data is provided. A collection system of a device adds contributions to homomorphically encrypted data and forwards the requests to another device. When the device receives a reply to the request, it uncombines its contribution to the homomorphic encryption of the data. The device then forwards the reply to the previous device. The initiator device ultimately removes its contribution to the encryption and identifies the data.
REFERENCES:
patent: 5511191 (1996-04-01), de Leeuw van Weenen et al.
patent: 5822743 (1998-10-01), Gupta et al.
patent: 5867714 (1999-02-01), Todd et al.
patent: 6026163 (2000-02-01), Micali
patent: 6108800 (2000-08-01), Asawa
patent: 6192472 (2001-02-01), Garay et al.
patent: 6473659 (2002-10-01), Shah et al.
patent: 6480605 (2002-11-01), Uchiyama et al.
patent: 6671811 (2003-12-01), Diep et al.
patent: 6691249 (2004-02-01), Barford et al.
patent: 6738811 (2004-05-01), Liang
patent: 6763482 (2004-07-01), Bernklau-halvor
patent: 6862696 (2005-03-01), Voas et al.
patent: 6880107 (2005-04-01), Kraft, IV
patent: 6885748 (2005-04-01), Wang
patent: 6990602 (2006-01-01), Skinner et al.
patent: 7058861 (2006-06-01), Adams
patent: 7069473 (2006-06-01), Yasuda
patent: 7100084 (2006-08-01), Unkle et al.
patent: 7103874 (2006-09-01), McCollum et al.
patent: 7134008 (2006-11-01), Dutt et al.
patent: 7320035 (2008-01-01), Kumar et al.
patent: 7386839 (2008-06-01), Golender et al.
patent: 7392295 (2008-06-01), Yuan et al.
patent: 7430598 (2008-09-01), Raden et al.
patent: 7492789 (2009-02-01), Shvodian
patent: 7584182 (2009-09-01), Wang et al.
patent: 7584382 (2009-09-01), Verbowski et al.
patent: 7694022 (2010-04-01), Garms et al.
patent: 2001/0005821 (2001-06-01), Ottosson
patent: 2002/0026345 (2002-02-01), Juels
patent: 2002/0124187 (2002-09-01), Lyle et al.
patent: 2002/0184555 (2002-12-01), Wong et al.
patent: 2003/0014662 (2003-01-01), Gupta et al.
patent: 2003/0050980 (2003-03-01), Dutta et al.
patent: 2003/0204632 (2003-10-01), Willebeek-LeMair et al.
patent: 2003/0237017 (2003-12-01), Jibbe
patent: 2004/0006546 (2004-01-01), Wedlake et al.
patent: 2004/0093513 (2004-05-01), Cantrell et al.
patent: 2004/0260678 (2004-12-01), Verbowski et al.
patent: 2005/0015639 (2005-01-01), Cornelius et al.
patent: 2005/0102370 (2005-05-01), Lin et al.
patent: 2005/0155031 (2005-07-01), Wang et al.
patent: 2005/0188268 (2005-08-01), Verbowski et al.
patent: 2005/0198110 (2005-09-01), Garms et al.
patent: 2006/0036708 (2006-02-01), Yuan et al.
patent: 2006/0117310 (2006-06-01), Daniels et al.
patent: 2007/0016902 (2007-01-01), Shozaki et al.
patent: 2007/0116283 (2007-05-01), Tuyls et al.
patent: 2007/0143280 (2007-06-01), Wang et al.
patent: 2007/0168508 (2007-07-01), Wang et al.
patent: 2007/0300103 (2007-12-01), Verbowski et al.
patent: 2008/0201337 (2008-08-01), Yuan et al.
patent: 2008/0304657 (2008-12-01), Tuyls et al.
patent: 2372670 (2002-08-01), None
patent: WO-01/65330 (2001-09-01), None
patent: WO-03/009140 (2003-01-01), None
Definition: canonical, retrieved Jan. 23, 2009. http://dictionary.die.net/canonical.
Novell Documentation's Aggregate Data, copyright 1999, retrieved Apr. 28, 2008. http://www.novell.com/documentation/extendas37/docs/help/java/jdkee/cloudscape/doc/html/tutorial/virt4.htm.
“Buffer Overrun in RPC Interface Could Allow Code Execution,” Microsoft Security Bulletin MS03-026, Microsoft TechNet, revised Sep. 10, 2003, 8 pages, http://www.micrsoft.com/technet/security/bulletin/MS03-026.mspx?pf=true, [last accessed Jul. 21, 2005].
“Byacc—Berkeley YACC,” 1 page, http://dickey.his.com/byacc/byacc.html, [last accessed Jul. 22, 2005].
“Change Auditing Solutions—Tripwire, Inc.,” © 2005 Tripwire, Inc., http://www.tripwire.com/, [last accessed Jul. 21, 2005].
“DCE 1.1: Remote Procedure Call,” Technical Standard, CAE Specification, © Oct. 1997, Published in the U.K. by The Open Group Oct. 1997, 748 pages.
“Flex—a scanner generator—Table of Contents,” GNU Project, Free Software Foundation, last updated Nov. 7, 1998, 1 page, http://www.gnu.org/software/flex/manual/, [last accessed Jul. 21, 2005].
“Snort—the de facto standard for intrusion detection/prevention”, 1 page, http://www.snort.org/, [last accessed Jul. 22, 2005].
“Unchecked Buffer in Index Server ISAPI Extension Could Enable Web Server Compromise,” Microsoft Security Bulletin MS01-033, Microsoft TechNet, updated Nov. 4, 2003, © 2005 Microsoft Corporation, http://www.microsoft.com/technet/security/bulletin/MS01-033.mspx?pf=true, [last accessed Jul. 21, 2005].
“UrlScan Security Tool,” Microsoft TechNet, 8 pages, © 2005 Microsoft Corporation, http://www.microsoft.com/technet/security/tools/urlscan.mspx?pf=true [last accessed Jul. 21, 2005].
“Web-to-Host: Reducing the Total Cost of Ownership,” The Tolly Group Total Cost of Ownership White Paper, May 2000, 13 pages, © 2000 The Tolly Group.
Agrawal, Rakesh and Ramakrishnan Srikant, “Privacy-Preserving Data Mining,” In Proceedings of ACM SIGMOD 2000.
Aguilera, Marcos K. et al., “Performance Debugging for Distributed Systems of Black Boxes,” SOSP'03, Oct. 19-22, 2003, ACM 2003, 16 pages.
Apap, Frank et al., “Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses,” RAID 2002, Zurich, Switzerland, pp. 1-13.
Bashar, Mohd A. et al., “Low-Threat Security Patches and Tools,” Proceedings of International Conference on Software Maintenance, Oct. 1-3, 1997, Bari, Italy, IEEE Computer Society, pp. 306-313, © 1997 by The Institute of Electrical and Electronics Engineers, Inc.
Beattie, Steve et al., “Timing the Application of Security Patches for Optimal Uptime,” 2002 LISA XVI, Nov. 3-8, 2002, Philadelphia, PA, pp. 101-110.
Benaloh, Josh Daniel Cohen, “Verifiable Secret-Ballot Elections,” Dissertation, Yale University, Dec. 1996, 132 pages.
Burgess, Mark, “A Site Configuration Engine,” USENIX Computing Systems, vol. 8, No. 3, 1995, pp. 1-29.
Canny, John, “Collaborative Filtering with Privacy,” 2002 IEEE Symposium on Security and Privacy, p. 45.
Chaum, David and Torben Pryds Pedersen, “Wallet Databases with Observers,” Advances in Cryptology—CRYPTO'92, LNCS 740, pp. 89-105, 1993, © Springer-Verlag Berlin Heidelberg 1993.
Chaum, David, “Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms,” Communications of the ACM, Feb. 1981, vol. 24, No. 2, © 1981 ACM, 8 pages.
Chen, Mike Y. et al., “Pinpoint: Problem Determination in Large, Dynamic Internet Services,” In Proceedings of International Conference on Dependable Systems and Networks 2002, 10 pages.
Chen, Shuo et al., “A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities,” Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN'03), © 2003 IEEE, 10 pages.
Chen, Zesheng et al., “Modeling the Spread of Active Worms,” IEEE INFOCOM 2003, © 2003 IEEE, 11 pages.
Clarke, Ian et al., “Freenet: A Distributed Anonymous Information Storage and Retrieval System,” Lecture Notes in Computer Science, Springer-Verlag GmbH, ISSN: 0302-9743, vol. 2009 / 2001, Jun. 2003, 21 pages.
Coney, Lillie et al., “Towards a Privacy Measurement Criterion for Voting Systems,” Poster paper, National Conference on Digital Government Research, May 2005.
Couch, Alva L. and Michael Gilfix, “It's Elementary Dear Watson: Applying Logic Programming to Convergent System Management Processes,” In Proceedings of LISA XIII 1999, Nov. 7-12, 1999, pp. 121-135.
Cramer, Ronald et al., “A Secure and Optimally Efficient Multi-Authority Election Scheme,” In Advances in Cryptology—EUROCRYPT'97, vol. 1233 of Lecture Notes in Computer Sc
Huang Qiang
Jao David
Wang Jiahe Helen
Louie Oscar A
Microsoft Corporation
Moazzami Nasser
Perkins Coie LLP
LandOfFree
Privacy-preserving data aggregation using homomorphic... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Privacy-preserving data aggregation using homomorphic..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Privacy-preserving data aggregation using homomorphic... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4154169