Program, classification method and system

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S054000

Reexamination Certificate

active

07814323

ABSTRACT:
A system and method classifies multiple pieces of private data owned by multiple entities according to data type. Each of the entities has an encryption key. A representative entity is selected that is representative of the entities owning data of the type. Data of each of the representative entity and a target entity is encrypted and the encrypted data is exchanged between the entities. Each piece of the encrypted data that the target entity has obtained is re-encrypted by using its own encryption key to obtain data1, and the encrypted data that the representative entity has obtained is re-encrypted by using its own encryption key to obtain data2. If data1of the representative entity matches data2, it is determined that the representative entity and the target entity have data of an identical type.

REFERENCES:
patent: 5196840 (1993-03-01), Leith et al.
patent: 5212784 (1993-05-01), Sparks
patent: 5568556 (1996-10-01), Conley
patent: 5659616 (1997-08-01), Sudia
patent: 5793870 (1998-08-01), Conley
patent: 5857022 (1999-01-01), Sudia
patent: 5894521 (1999-04-01), Conley
patent: 5963642 (1999-10-01), Goldstein
patent: 5966441 (1999-10-01), Calamera
patent: 6009177 (1999-12-01), Sudia
patent: 6157917 (2000-12-01), Barber
patent: 7493661 (2009-02-01), Liu et al.
patent: 2000-68864 (2000-03-01), None
“Information Sharing Across Private Databases,”Agrawal, Rakesh, Evfimievski, Alexandre, Srikant, Ramakrishnan, Published: Jun. 2003.
“Information Sharing Across Private Databases,” by Rakesh Agrawal, Alexandre Evfimieski, Ramakrishan, Srikant, Published SIGMOD 2003, Jun. 9-12, 2003, San Diego, CA. Copyright 2003 ACM 1-58113-634-X/03/06.
Masayuki Numao, “Security and privacy for attribute specification type dynamic community production”, Journal of Information Processing Society of Japan, Japan, Information Processing Society of Japan, Jan. 15, 2004, vol. 45, No. 1 p. 103-111.
Michiel E. Houle, “Fast Approximate Similarity Search in Extremely High-Dimensional Data Sets”, Data Engineering, 2005, ICDE 2005 Proceedings 21st International Conference in Apr. 2005, No. 8556254, p. 619-630, http://ieeexplore.ieee.or.g/ie15/9680/30564/01410179.pdf?arnumber=1410179.
Jun Sakuma, “Secured SNPs linkage analysis by multiparty”, Collected Papers of Computer Security Symposium 2005 (CSS2005), Oct. 26, 2005, vol. I of II, p. 187-192.
“A Proposed Architecture for Trusted Third Party Services”, N. Jefferies, C. Mitchell, and M. Walker, in Cryptography: Policy and Algorithms, Springer LNCS v. 1029, pp. 98-110.
“Information sharing across private databases”, R. Agrawal, A. Evfimievski, and R. Srikant, In Proceedings of SIGMOD 2003.
“Protocol for private list matching”, Masayuki Numao, CSS 2001 Abstracts.
“A public key cryptosystem and a signature scheme based on discrete logarithms,” T. ElGamel, IEEE Transactions on Information Theory, IT-31 (4): 469, 72, Jul. 1985.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Program, classification method and system does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Program, classification method and system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Program, classification method and system will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4223583

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.