Professional Documents
Culture Documents
US8023647 Cumberland Sample Chart
US8023647 Cumberland Sample Chart
US 8,023,647(Shaik) US 6,480,605(Uchiyama)
1.pre A method comprising:
1.a.i. submitting a user Describes a method identifying users using a secret key.
identification for a user See 1:41-43.
1.a.ii. from a user computer to a Discloses that the “encryption procedure by the encryption
server computer; device 100 may be implemented by recording the
procedure as an operation program on a recording medium
and reading it out for execution by a computer.”
See 11:1-4.
1.b. receiving a set of information See supra Claim 1.a.ii.
at the user computer from the
server computer, in response to
the submission of the user
identification for the user;
1.c. wherein the set of Discloses public and secret keys. “The encryption and
information includes a parameter decryption processes E(M) and D(C) of a message M are
of a key; and defined by the following equations using (n, e) as public
keys and (d, p, q) as Secret keys.” See 2:57-59.
1.d. further comprising
1.e.i. using the user computer to Discloses an example of conversion from "plaintext" to
convert user confidential numerical function.
information to a number x,
“Upon receiving a plaintext (m) from a user of the
encryption device 100, the exponent generation part 110
generates a random number r∊Z/nZ by a random generator
111, and inputs the random number r into the a multiplier
112.” See 10:36-40.