DISTRIBUTION OF IMAGES USING COMPOSITE RE-ENCRYPTED IMAGES Russian patent published in 2024 - IPC H04L9/14 G09C5/00 G06F21/60 

Abstract RU 2828473 C1

FIELD: information technology.

SUBSTANCE: invention relates to means of distributing images that preserve privacy. In response to receiving the encrypted original image, decrypted using the administration key, image of the encrypted domain of the initial image is segmented to determine a plurality of encrypted private masks. Multiple encrypted private masks are transmitted to an image distribution server for decryption. Plurality of encrypted private images is determined, wherein each private image from the plurality of encrypted private images is determined in accordance with the initial image. Encrypted domain key modification procedures are performed to generate a plurality of repeatedly encrypted images, which contain the result of conversion of the corresponding private image. Multiple re-encrypted images are combined into a composite private image. Composite private image is transmitted to an image distribution server for further distribution to a plurality of client devices.

EFFECT: ensuring preservation of privacy when distributing images.

21 cl, 20 dwg

Similar patents RU2828473C1

Title Year Author Number
PRIVACY-PRESERVING IMAGE DISTRIBUTION 2021
  • Burceanu Elena
  • Bolboceanu Madalina
  • Haller Emanuela
  • Rosca Georgiana M.
  • Cebere Bogdan
  • Titiu Radu
RU2826373C1
IMAGE BASED KEY DERIVATION FUNCTION 2014
  • Aissi, Selim
  • Kgil, Taekho
  • Gaddam, Adzhit
RU2676231C2
MIGRATION OF DIGITAL LICENCE FROM FIRST PLATFORM TO SECOND PLATFORM 2006
  • Foks Kristofer Dzh.
  • Strom Klifford P.
  • Bordinet Mehtt'Ju Dzh.
  • Siu Majkl J.
  • Diasetis Stefen P.
RU2406116C2
KEY ALLOCATION FOR SECURE MESSAGING 2006
  • Kej Dzheffri B.
  • Tribbl Ehrik D.
  • Pirson Malkom I.
  • Primehn Trevor V.
  • Uill'Jams Roj
RU2425450C2
HOMOMORPHOUS ENCRYPTION FOR AUTHENTICATION USING PASSWORD 2018
  • De Khog, Sebastian Yakobus Antonius
  • Pestrin, Alan
RU2774807C2
RECOVERING ENCRYPTED TRANSACTION INFORMATION IN CONFIDENTIAL TRANSACTIONS WITH BLOCKCHAIN 2018
  • Liu, Zheng
  • Li, Lichun
  • Yin, Shan
RU2726157C1
METHODS AND SYSTEMS FOR AUTHENTICATION OF COMPONENTS IN GRAPHIC SYSTEM 2003
  • Inglehnd Pol
  • Pejnado Markus
  • Uilt Nikolas P.
RU2310227C2
METHODS FOR DECRYPTING, TRANSMITTING AND RECEIVING CONTROL WORDS, RECORDING MEDIUM AND CONTROL WORD SERVER TO IMPLEMENT SAID METHODS 2011
  • Djubrejk Zhil'
  • Mazhi Ehrvann
RU2541190C2
METHOD OF SAFE DATA TRANSFER ON PEER-TO-PEER PRINCIPLE AND ELECTRONIC MODULE TO IMPLEMENT THIS METHOD 2003
  • Nikolja Kristof
RU2329613C2
METHOD OF PROTECTING INFORMATION IN CLOUD COMPUTING USING HOMOMORPHIC ENCRYPTION 2017
  • Krendelev Sergej Fedorovich
  • Tormasov Aleksandr Gennadevich
RU2691874C2

RU 2 828 473 C1

Authors

Burceanu Elena

Bolboceanu Madalina

Haller Emanuela

Rosca Georgiana M.

Cebere Bogdan

Titiu Radu

Dates

2024-10-14Published

2021-07-06Filed