Information security – Access control or authentication – Network
Reexamination Certificate
2004-03-17
2008-08-26
Zand, Kambiz (Department: 2134)
Information security
Access control or authentication
Network
C713S168000, C713S171000
Reexamination Certificate
active
07418728
ABSTRACT:
In a cryptographic system, the unlocking of secret keys on a user system is audited and correlated with other events that typically occur after the secret key is used to perform a cryptographic operation. Audit evidence of secret key cryptographic operations is recorded for later review and/or analysis, for use as stored evidence of unauthorized activity and/or for use in refuting false claims of repudiation of authorized activity. Some systems might also provide users with user activity reports that can alert a user to suspicious or unauthorized activity using that user's access.
REFERENCES:
patent: 6105012 (2000-08-01), Chang et al.
Feghhi et al. (Jalal Feghhi, Jalil Feghhi, Peter Williams, Digital Certificates Applied Internet Security, 1999, ISBN: 0201309807), p. 74-76, 331-333 and 326-327.
Sarbari Gupta, “Security Characteristics of Cryptographic Mobility Solutions”, 1st Annual PKI Research Workshop—Proceedings, Jul. 2.
Sampo Sovio, N. Asokan, Kaisa Nyberg, “Defining Authorization Domains Using Virtual Devices”, Nokia Research Center, Helsinki Finland, Jan. 2003.
Smith (Randy Franklin Smith, “Tracking Logon and Logoff Activity in windows 2000”, Feb. 2001).
Gupta, Sarbari, “Security Characteristics of Cryptographic Mobility Solutions,” 1st Annual PKI Research Workshop—Proceedings, http://www.google.com/search?hl=&cat=&meta=&q=pki+arcot+Dartmouth, Dec. 3, 2002, 11 pages.
Menezes, Alfred J. et al; “Handbook of Applied Cryptography”; 2001, Chapter 13, pp. 549-590.
SSi Service Strategies; “SSi Audit Central Features: Consolidate System Audit Data from a Variety of Source”; http://www.ssimail.com/Audit—central—features.htm; 12 pages.
Arcot Systems, Inc.
Poltorak Peter
Townsend and Townsend / and Crew LLP
Zand Kambiz
LandOfFree
Auditing secret key cryptographic operations does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Auditing secret key cryptographic operations, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Auditing secret key cryptographic operations will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3993251