Centralized cryptographic key administration scheme for...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Security kernel or utility

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S168000, C380S277000

Reexamination Certificate

active

06901512

ABSTRACT:
In scalable multi-node systems, applications that interact with remote users often use sessions that involve multiple messages. Unless the application instance that initiates the conversation processes all subsequent parts of that session, the context of the conversation must be passed between application instances. This context often involves sensitive data, such as session keys. This invention uses a central service, known as a Key Repository process, to create and manage a set of symmetric encryption keys unique to this application. All authorized instances of the application then obtain these keys from the Key Repository process, enabling these application instances to encrypt and save the context on disk, and allowing a possibly different instance of the application to retrieve and decrypt the context. As a result, these application programs can be designed to operate in a context-free manner.

REFERENCES:
patent: 4405829 (1983-09-01), Rivest
patent: 5963646 (1999-10-01), Fielder et al.
patent: 6067623 (2000-05-01), Blakley et al.
patent: 6105012 (2000-08-01), Chang et al.
Smith, Richard. Internet Cryptography, 1997 Addison Wesley Longman, Inc.*
Microsoft Corporation, “Microsoft Authenticode™ Technology: Ensuring Accountability and Authenticity for Software Components on the Internet”, Oct. 1996, http://www.msdn.microsoft.com/workshop/security/authcode/authwp.asp.
Rivest et al., “On Digital Signatures and Public-Key Cryptosystems”, Massachussettes Institute of Technology, Lab. for Computer Science, Apr. 1977, MIT/LCS/TM-82.
Rivest et al., “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”, Massachussettes Institute of Technology, Lab. for Computer Science and Department of Mathematics, Feb. 1978, Communications of the ACM, vol. 21, No. 2.
S.C. Kothari, “Generalized Linear Threshold Scheme”, Lecture Notes in Computer Science, Iowa State University, Dep. of Computer Science, 1985, Library of Congress Catalogue ISBN 0-387-15658-5 (U.S.).
A. Menezes et al. “Handbook of Applied Cryptography”, 1997 by CRC Press, Library of Congress Card No. 96-27609, ISBN 0-8493-8523-7, Table of Contents pp iv-xxviii, Chapters 1, 8, 12.4 and 13 (pp. 1-48, 283-319,505-516 and 543-590).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Centralized cryptographic key administration scheme for... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Centralized cryptographic key administration scheme for..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Centralized cryptographic key administration scheme for... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3398210

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.