Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2006-05-31
2010-10-12
Zand, Kambiz (Department: 2434)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C380S054000
Reexamination Certificate
active
07814323
ABSTRACT:
A system and method classifies multiple pieces of private data owned by multiple entities according to data type. Each of the entities has an encryption key. A representative entity is selected that is representative of the entities owning data of the type. Data of each of the representative entity and a target entity is encrypted and the encrypted data is exchanged between the entities. Each piece of the encrypted data that the target entity has obtained is re-encrypted by using its own encryption key to obtain data1, and the encrypted data that the representative entity has obtained is re-encrypted by using its own encryption key to obtain data2. If data1of the representative entity matches data2, it is determined that the representative entity and the target entity have data of an identical type.
REFERENCES:
patent: 5196840 (1993-03-01), Leith et al.
patent: 5212784 (1993-05-01), Sparks
patent: 5568556 (1996-10-01), Conley
patent: 5659616 (1997-08-01), Sudia
patent: 5793870 (1998-08-01), Conley
patent: 5857022 (1999-01-01), Sudia
patent: 5894521 (1999-04-01), Conley
patent: 5963642 (1999-10-01), Goldstein
patent: 5966441 (1999-10-01), Calamera
patent: 6009177 (1999-12-01), Sudia
patent: 6157917 (2000-12-01), Barber
patent: 7493661 (2009-02-01), Liu et al.
patent: 2000-68864 (2000-03-01), None
“Information Sharing Across Private Databases,”Agrawal, Rakesh, Evfimievski, Alexandre, Srikant, Ramakrishnan, Published: Jun. 2003.
“Information Sharing Across Private Databases,” by Rakesh Agrawal, Alexandre Evfimieski, Ramakrishan, Srikant, Published SIGMOD 2003, Jun. 9-12, 2003, San Diego, CA. Copyright 2003 ACM 1-58113-634-X/03/06.
Masayuki Numao, “Security and privacy for attribute specification type dynamic community production”, Journal of Information Processing Society of Japan, Japan, Information Processing Society of Japan, Jan. 15, 2004, vol. 45, No. 1 p. 103-111.
Michiel E. Houle, “Fast Approximate Similarity Search in Extremely High-Dimensional Data Sets”, Data Engineering, 2005, ICDE 2005 Proceedings 21st International Conference in Apr. 2005, No. 8556254, p. 619-630, http://ieeexplore.ieee.or.g/ie15/9680/30564/01410179.pdf?arnumber=1410179.
Jun Sakuma, “Secured SNPs linkage analysis by multiparty”, Collected Papers of Computer Security Symposium 2005 (CSS2005), Oct. 26, 2005, vol. I of II, p. 187-192.
“A Proposed Architecture for Trusted Third Party Services”, N. Jefferies, C. Mitchell, and M. Walker, in Cryptography: Policy and Algorithms, Springer LNCS v. 1029, pp. 98-110.
“Information sharing across private databases”, R. Agrawal, A. Evfimievski, and R. Srikant, In Proceedings of SIGMOD 2003.
“Protocol for private list matching”, Masayuki Numao, CSS 2001 Abstracts.
“A public key cryptosystem and a signature scheme based on discrete logarithms,” T. ElGamel, IEEE Transactions on Information Theory, IT-31 (4): 469, 72, Jul. 1985.
Sakuma Jun
Uramoto Naohiko
Corsello Ken
Harriman Dant B Shaifer
International Business Machines - Corporation
Shimokaji & Assoc.
Zand Kambiz
LandOfFree
Program, classification method and system does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Program, classification method and system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Program, classification method and system will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4223583