Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Security kernel or utility
Reexamination Certificate
2005-05-31
2005-05-31
Moise, Emmanuel L. (Department: 2131)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Security kernel or utility
C713S168000, C380S277000
Reexamination Certificate
active
06901512
ABSTRACT:
In scalable multi-node systems, applications that interact with remote users often use sessions that involve multiple messages. Unless the application instance that initiates the conversation processes all subsequent parts of that session, the context of the conversation must be passed between application instances. This context often involves sensitive data, such as session keys. This invention uses a central service, known as a Key Repository process, to create and manage a set of symmetric encryption keys unique to this application. All authorized instances of the application then obtain these keys from the Key Repository process, enabling these application instances to encrypt and save the context on disk, and allowing a possibly different instance of the application to retrieve and decrypt the context. As a result, these application programs can be designed to operate in a context-free manner.
REFERENCES:
patent: 4405829 (1983-09-01), Rivest
patent: 5963646 (1999-10-01), Fielder et al.
patent: 6067623 (2000-05-01), Blakley et al.
patent: 6105012 (2000-08-01), Chang et al.
Smith, Richard. Internet Cryptography, 1997 Addison Wesley Longman, Inc.*
Microsoft Corporation, “Microsoft Authenticode™ Technology: Ensuring Accountability and Authenticity for Software Components on the Internet”, Oct. 1996, http://www.msdn.microsoft.com/workshop/security/authcode/authwp.asp.
Rivest et al., “On Digital Signatures and Public-Key Cryptosystems”, Massachussettes Institute of Technology, Lab. for Computer Science, Apr. 1977, MIT/LCS/TM-82.
Rivest et al., “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”, Massachussettes Institute of Technology, Lab. for Computer Science and Department of Mathematics, Feb. 1978, Communications of the ACM, vol. 21, No. 2.
S.C. Kothari, “Generalized Linear Threshold Scheme”, Lecture Notes in Computer Science, Iowa State University, Dep. of Computer Science, 1985, Library of Congress Catalogue ISBN 0-387-15658-5 (U.S.).
A. Menezes et al. “Handbook of Applied Cryptography”, 1997 by CRC Press, Library of Congress Card No. 96-27609, ISBN 0-8493-8523-7, Table of Contents pp iv-xxviii, Chapters 1, 8, 12.4 and 13 (pp. 1-48, 283-319,505-516 and 543-590).
Kurn David Michael
Panero Robert A.
Salmond Kent Adams
Moise Emmanuel L.
Revak Christopher
LandOfFree
Centralized cryptographic key administration scheme for... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Centralized cryptographic key administration scheme for..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Centralized cryptographic key administration scheme for... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3398210