Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2005-09-06
2005-09-06
Morse, Gregory (Department: 2134)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S165000, C713S166000, C713S167000, C713S170000, C713S176000, C380S051000, C380S268000, C380S269000
Reexamination Certificate
active
06941461
ABSTRACT:
A system and method for unique authentication of each replication of a plurality of soft-copy documents, forming a group. One soft-copy document, out of the group, becomes a carrier for an authentication code aimed at protecting the group. The authentication code is computed from the concatenation of the plurality of soft-copy documents and a key. A random number is also generated for each replication of the group of files. The random number is combined with the authentication code to mark the soft-copy document which has been selected to become the carrier. Thus, the invention introduces randomization in the insertion of the authentication code so that for each replication of an identical group of data files, unique authentication data can be associated, merged and hidden in the transmitted information.
REFERENCES:
patent: 5319710 (1994-06-01), Atalla et al.
patent: 6128737 (2000-10-01), Jakubowski et al.
patent: 6785738 (2004-08-01), Ivaturi
patent: WO 94/21066 (1994-09-01), None
patent: WO 00/08541 (2000-02-01), None
patent: WO 01/11818 (2001-02-01), None
Jueneman et al., “Message Authentication”, Sep. 1985, vol. 23, No. 9, pp. 29-40.
Krawczyk et al., “HMAC: Keyed-Hashing for Message Authentication”, Network Working Group, Feb. 1997, pp. 1-9.
http://www.graphcomp.com/info/specs/ms/pct.html; Benaloh et al., “The Private Communication Technology (PCT) Protocol”, Oct. 1995.
Schneier, “Applied Cryptography, Protocols, Algorithm, and Source Code in C”, 1996, John Wiley & Sons, Second Edition, pp. 31, 455-459.
Bender et al., “Techniques for Data Hiding”, 1996, IBM Systems Journal, vol. 35, pp. 313-336.
Carro Fernando Incertis
Matyas Stephen
Dougherty Anne Vachon
Herzberg Louis P.
International Business Machines - Corporation
Morse Gregory
Tran Tongoc
LandOfFree
System and method of uniquely authenticating each... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method of uniquely authenticating each..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method of uniquely authenticating each... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3449195