Electrical computers and digital processing systems: support – System access control based on user identification by...
Reexamination Certificate
2006-02-21
2006-02-21
Barron, Jr., Gilberto (Department: 2132)
Electrical computers and digital processing systems: support
System access control based on user identification by...
C388S931000, C388S931000, C388S931000, C388S931000, C388S931000
Reexamination Certificate
active
07003667
ABSTRACT:
Secure transmission of data to an intended image output device, wherein the data can be used to generate an image at the intended image output device in the presence of an intended recipient. The data is encrypted using a first key. The first key is then encrypted using a second key and a third key. The second key is a public key of a first private key/public key pair, a private key of the first private key/public key pair being primarily in the sole possession of the intended image output device. The third key is a public key of a second private key/public key pair, a private key of the second private key/public key pair being primarily in the sole possession of the intended recipient of the image. The encrypted data and the twice-encrypted first key are transmitted to the intended image output device. The twice-encrypted first key is then decrypted by using the private keys of the second and first key pairs, respectively, which are primarily in the sole possession of the intended recipient device and the intended image output device, respectively. The data is then decrypted and printed at an image output device.
REFERENCES:
patent: 5392351 (1995-02-01), Hasebe et al.
patent: 5606613 (1997-02-01), Lee et al.
patent: 5633932 (1997-05-01), Davis et al.
patent: 5720012 (1998-02-01), McVeigh et al.
patent: 5752697 (1998-05-01), Mandel et al.
patent: 5903646 (1999-05-01), Rackman
patent: 5933498 (1999-08-01), Schneck et al.
patent: 5933501 (1999-08-01), Leppek
patent: 5949881 (1999-09-01), Davis
patent: 5956407 (1999-09-01), Slavin
patent: 6226618 (2001-05-01), Downs et al.
patent: 6243466 (2001-06-01), Young et al.
patent: 6314521 (2001-11-01), Debry
patent: 6343361 (2002-01-01), Nendell et al.
patent: 6378070 (2002-04-01), Chan et al.
patent: 6385728 (2002-05-01), DeBry
patent: 6430690 (2002-08-01), Vanstone et al.
patent: 6466921 (2002-10-01), Cordery et al.
patent: 859341 (1998-08-01), None
patent: 935182 (1999-08-01), None
Schneier, Bruce; “Applied Cryptography Second Edition;” 1996; John Wiley & Sons, Inc.; Chapter 15, p. 357-358; Chapter 8.1, p. 173-174.
Dannenberg, Roger B., et al., “A Butler Process for Resource Sharing on Spice Machines”, ACM Transactions on Office Information Systems, vol. 3, No. 3, pp. 234-252, Jul. 1985.
U.S. Appl. No. 09/222,846, filed Dec. 30, 1998.
Iwamoto Neil Y.
Mazzagatte Craig
Slick Royce E.
Barron Jr. Gilberto
Canon Kabushiki Kaisha
Fitzpatrick ,Cella, Harper & Scinto
Stulberger Cas
LandOfFree
Targeted secure printing does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Targeted secure printing, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Targeted secure printing will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3644935