Cryptography – Key management – Having particular key generator
Patent
1997-10-29
1998-10-20
Cangialosi, Salvatore
Cryptography
Key management
Having particular key generator
H04L 900
Patent
active
058258914
ABSTRACT:
The invention features a method for enabling computers to communicate using encrypted network packets. A configuration request is sent over a network from a first computer to a second computer, and tunnel record information is sent over the network from the second computer to the first computer. The tunnel record information is encrypted in accordance with a temporary configuration password.
The invention also features a method for updating a tunnel record. A connection request is sent from a first computer to a second computer, and the first computer is authorized. A tunnel record corresponding to the connection request with the first computer's network address is then updated.
REFERENCES:
patent: 5099517 (1992-03-01), Gupta et al.
patent: 5161193 (1992-11-01), Lampson et al.
patent: 5235644 (1993-08-01), Gupta et al.
patent: 5325362 (1994-06-01), Aziz
patent: 5416842 (1995-05-01), Aziz
patent: 5442708 (1995-08-01), Adams, Jr. et al.
patent: 5444782 (1995-08-01), Adams, Jr. et al.
patent: 5548646 (1996-08-01), Aziz et al.
patent: 5550984 (1996-08-01), Gelb
"Internet Portal, Version 1.1", pp. 1-16, Digital Equipment Corp., May 18, 1990.
"Digital Internet Tunnel V 1.0" pp. 1-3 Digital Equipment Corp., Nov. 15, 1995.
"Internet Security: Screening External Access Link Seal", Digital Equiment Corp pp. 1-2, May 1, 1994.
World Wide Web document of Digital Equipment Corprration's tunneling product, Jan. 1996.
Kerberos Network Authentication Service (V5), Digital Equipment Corporation, pp. 1-106, Sep. 1993.
swIPe IP Security Protocol, Columbia University and AT&T, John Ioannidis and Matt Blaze, Dec. 1993.
Security Architecture for the Internet Protocol, R. Atkinson, Naval Research Laboratory, pp. 1-44, Aug. 1995.
IP Authentication Header, R. Atkinson, Naval Research Laboratory, pp. 1-26, Aug. 1995.
IP Encapsulating Security Payload (ESP), R. Atkinson, Naval Research Laboratory, pp. 1-24, Aug. 1995.
The Photuris Session Key Management Protocol, P. Karn, Qualcomm, W.A. Simpson, DayDreamer, pp. 1-106, Nov. 1995.
Simple Key-Management For Internet Protocols (SKIP), Ashar Aziz, et al. Sun Microsystems, Inc., pp. 1-72, Dec. 1995.
Internet Security Association and Key Management Protocol (ISAKMP), Douglas Maughan and Mark Schertler, National Security Agency, pp. 1-117, Nov. 1995.
U.S. Patent Application Serial No. 08/561,790, filed Nov. 22, 1995, Kirby et al.--Controlling Passage Of Packets Or Messages.
U.S. Patent Application Serial No. 08/585,765, filed Jan. 12, 1996, Kirby et al.--Data Encryption/Decryption For Network Communication.
U.S. Patent Application Serial No. 08/586,230, filed Jan. 12, 1996, Kirby et al.--Transferring Encrypted Packets Over A Public Network.
Kraemer Jeffrey A.
Levesque Roger H.
Nadkarni Ashok P.
Cangialosi Salvatore
Raptor Systems, Inc.
LandOfFree
Key management for network communication does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Key management for network communication, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Key management for network communication will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-254093