Multiple level public key hierarchy for performance and high...

Cryptography – Key management

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S166000

Reexamination Certificate

active

07929701

ABSTRACT:
Multiple public/private key pairs of varying levels of security are used to provide a high level of security while still allowing fast processing of encrypted information. The lower-security level includes keys that are small in length, that are changed relatively often, and that require less or fewer resources to implement their functions. When it is required to change key pairs of low security, a key pair at a higher security level (i.e., longer length keys) than the lower-security level keys is used to transfer the new lower-security public keys to devices using those keys. The higher-security keys can, in turn, be changed at a frequency lower than the lower-security keys. The higher-security keys require a higher level of resources to perform their coding operations. This approach of using keys of escalating levels of security to replace lower-security keys, where the higher-security keys require more resources, are more secure, and are replaced less often than the lower-security keys, can be followed as many times as is desired to create a hierarchy of public key uses with the result that the lower-security operations can be performed quickly while the overall system security is high.

REFERENCES:
patent: 4578531 (1986-03-01), Everhart et al.
patent: 4868877 (1989-09-01), Fischer
patent: 4935962 (1990-06-01), Austin
patent: 5237611 (1993-08-01), Rasmussen et al.
patent: 5297206 (1994-03-01), Orton
patent: 5371794 (1994-12-01), Diffie et al.
patent: 5410602 (1995-04-01), Finkelstein et al.
patent: 5535276 (1996-07-01), Ganesan
patent: 5539824 (1996-07-01), Bjorklund et al.
patent: 5557678 (1996-09-01), Ganesan
patent: 5600722 (1997-02-01), Yamaguchi et al.
patent: 5664017 (1997-09-01), Gressel et al.
patent: 5680458 (1997-10-01), Spelman et al.
patent: 5761306 (1998-06-01), Lewis
patent: 5781629 (1998-07-01), Haber et al.
patent: 5796840 (1998-08-01), Davis
patent: 5812671 (1998-09-01), Ross, Jr.
patent: 5825888 (1998-10-01), Kimura et al.
patent: 5838792 (1998-11-01), Ganesan
patent: 5850443 (1998-12-01), Van Oorschot et al.
patent: 5864667 (1999-01-01), Barkan
patent: 5917912 (1999-06-01), Ginter et al.
patent: 5974043 (1999-10-01), Solomon
patent: 5999525 (1999-12-01), Krishnaswamy et al.
patent: 6026491 (2000-02-01), Hiles
patent: 6035402 (2000-03-01), Vaeth et al.
patent: 6044350 (2000-03-01), Weiant et al.
patent: 6058188 (2000-05-01), Chandersekaran et al.
patent: 6215877 (2001-04-01), Matsumoto
patent: 6233341 (2001-05-01), Riggins
patent: 6240183 (2001-05-01), Marchant
patent: 6263437 (2001-07-01), Liao et al.
patent: 6314521 (2001-11-01), Debry
patent: 6438666 (2002-08-01), Cassagnol et al.
patent: 6571221 (2003-05-01), Stewart et al.
patent: 6757823 (2004-06-01), Rao et al.
patent: 6795555 (2004-09-01), Parisien et al.
patent: 6889321 (2005-05-01), Kung et al.
patent: 0328232 (1989-08-01), None
patent: 0738058 (1996-10-01), None
patent: 96/39765 (1996-12-01), None
patent: WO 97/31450 (1997-08-01), None
patent: 9810558 (1998-03-01), None
patent: 9859467 (1998-12-01), None
patent: WO 99/09700 (1999-02-01), None
Schneier, “Applied Cryptography: Protocols, Algorithms, and Source Code in C,” Second Edition, 1996, pp. 183-184.
Menezes, van Oorschot, and Vanstone: “Handbook of Applied Cryptography”, CRC Press, pp. 551-553.
Menezes, van Oorschot, and Vanstone: “Handbook of Applied Cryptography”, CRC Press, pp. 551-553, 578-581.
Office Action, Japanese App. No. 2000-596433 (English Translation), May 19, 2010.
Japanese Laid-Open Publication #9-307544 (abstract), Nov. 28, 1997.
Shinji Ishii, et al, “2,048-bit Public Key Encryption Processor”, Mar. 10, 1998, vol. 47, Issue #3, pp. 261-268.
“Cisco Announces New Cable Broadband Access Product to Support Integrated Data, Voice, and Video”, Internet Citation dated Jan. 8, 1999; Cisco. (XP002147934) http:/
ewsroom.cisco.com/dlls/fspnisapi4a13.html.
“IP Telephony”, Internet Citation dated from 1998; Nortel Networks. (XP002147949) URL: http://www.cablenet.org/cn98/apps
or/t—teleph—col.pdf.
“Security and Encryption for H-series (H.323 and other H245-based) Multimedia Terminals; H.235” ITU-T Standard, International Telecommunication Union, dated Feb. 1, 1998 (XP017401338).
Schneier, Bruce. Applied Cryptography: Protocols, Algorithms, and Source Code in C. Oct. 1995.
Office Action, Japanese Application No. 2000-596433 (English translation), May 19, 2010.
Yu, Takamoto, “Self-Identification by S/MIME Electronic Signature Increasing with an Increase Mailers”, Nikkei BP, Sep. 22, 1997, Issue # 169, pp. 206-215.
Warwick Ford, “Digital Signature and Encryption Techniques”, 1st Version, Dec. 24, 1997, p. 166 & pp. 175-177.
Eiji Okamoto, “Introduction to Encryption Theory”, 1st Version, Feb. 25, 1993, pp. 109-112.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Multiple level public key hierarchy for performance and high... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Multiple level public key hierarchy for performance and high..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Multiple level public key hierarchy for performance and high... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2722148

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.