Information security – Prevention of unauthorized use of data including prevention...
Reexamination Certificate
2004-06-09
2009-10-27
Pich, Ponnoreay (Department: 2435)
Information security
Prevention of unauthorized use of data including prevention...
C726S022000, C713S168000
Reexamination Certificate
active
07610627
ABSTRACT:
Techniques utilizing common encryption approaches for data from multiple parties enable those parties to discover information that is held in common by the parties without disclosing to any party information that is not held in common by the parties. Encrypted information for each party can be compared to determine which encrypted values match, and those encrypted values can be returned to any of the parties such that a party can determine which corresponding data the parties have in common, without having access to any other data of any other parties.
REFERENCES:
patent: 2004/0148506 (2004-07-01), Prince
patent: 2005/0005164 (2005-01-01), Syiek et al.
Mihir Bellare, Ran Canetti, Hugo Krawczyk, “Keying Hash Functions for Message Authentication”, Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology, p. 1-15, Aug. 18-22, 1996.
Wayner, P., “Synchronization,” chapter 5 fromTranslucent Databases, pp. 57-68, Flyzone Press (2002).
Secure discovery of community intersections, Nov. 8, 2003, from Brad's life website—http://www.livejournal.com/users/brad/1932689.html pp. 1-7.
Who's my secret crush?, printed from http://www.crushlink.com/ on Oct. 5, 2004.
Acxiom Corporation
Pich Ponnoreay
Townsend and Townsend / and Crew LLP
LandOfFree
Secure data exchange technique does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Secure data exchange technique, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure data exchange technique will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4117870