Data processing: financial – business practice – management – or co – Business processing using cryptography – Usage protection of distributed data files
Reexamination Certificate
2005-10-12
2009-10-20
Hewitt, II, Calvin L (Department: 3685)
Data processing: financial, business practice, management, or co
Business processing using cryptography
Usage protection of distributed data files
C705S050000
Reexamination Certificate
active
07606769
ABSTRACT:
The present invention is directed to a system and method for secure document transmission. The method begins by receiving first and second key portions into a data storage associated with a document processing device. The first key portion suitably includes data representing a user of the document processing device and the second key portion suitably includes data representing a source of at least one electronic document directed for transmission to the document processing device. Next, at least one encrypted electronic document is received into the document processing device, wherein the document includes the second key portion. The received electronic document is then decrypted using the second key portion and the first key portion, which was retrieved from the data storage. Following decryption, a document processing operation is commenced on the decrypted electronic document.
REFERENCES:
patent: 5544245 (1996-08-01), Tsubakiyama
patent: 5796830 (1998-08-01), Johnson et al.
patent: 5815573 (1998-09-01), Johnson et al.
patent: 6049612 (2000-04-01), Fielder et al.
patent: 6363154 (2002-03-01), Peyravian et al.
patent: 6510519 (2003-01-01), Wasilewski et al.
patent: 6567794 (2003-05-01), Cordery et al.
patent: 6973671 (2005-12-01), Hsing et al.
patent: 7221762 (2007-05-01), Gentry et al.
patent: 2002/0071565 (2002-06-01), Kurn et al.
patent: 2002/0126840 (2002-09-01), Robbins et al.
patent: 2003/0021417 (2003-01-01), Vasic et al.
patent: WO 9627155 (1996-09-01), None
patent: WO-99/17495 (1999-04-01), None
Phillips, Ken, RecoverKey unlocks data. (technical view of Trusted Information Systems' key-recovery technology), Sep. 15, 1997, PC Week, v14, n39, p. 138(2).
Shahindoust Amir
Yami Sameer
Yeung Michael
Hewitt II Calvin L
Kabushiki Kaisha Toshiba
Nigh James D
Toshiba Tec Kabushiki Kaisha
Tucker Ellis & West LLP
LandOfFree
System and method for embedding user authentication... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for embedding user authentication..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for embedding user authentication... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4084773