Cryptography – Key management – Having particular key generator
Patent
1995-05-01
1997-01-14
An, Meng-Ai T.
Cryptography
Key management
Having particular key generator
39518202, 395491, 380 4, 370474, G06F 700
Patent
active
055948693
ABSTRACT:
A technique to facilitate decryption processing of information packets transmitted over a communication network after encryption in accordance with a specific network protocol, the details of which may be subject to later change as standards are developed or modified. Programmable registers are used in the decryption process to hold information for identifying an incoming information packet as being subject to the specific protocol and requiring decryption, and identifying a starting location of a data field to be decrypted. Specifically one programmable register contains a first offset locating an identifier field in the packet, in which a cryptographic identifier will be found if the packet is one conforming to the protocol; another programmable register contains a cryptographic identifier value that will be found in the identifier field if decryption is to be performed, and a third programmable register contains a second offset to locate the beginning of a data field to be decrypted.
REFERENCES:
patent: 4438824 (1984-03-01), Muellor-Schloer
patent: 4588991 (1986-05-01), Atalla
patent: 4803725 (1989-02-01), Horne et al.
patent: 4882751 (1989-11-01), Kotzin et al.
patent: 4882779 (1989-11-01), Rahtgen
patent: 4905277 (1990-02-01), Nakamura
patent: 4933969 (1990-06-01), Marshall et al.
patent: 4943978 (1990-07-01), Rice
patent: 4995080 (1991-02-01), Bestler et al.
patent: 5029206 (1991-07-01), Marino, Jr. et al.
patent: 5048087 (1991-09-01), Trbovich et al.
patent: 5235644 (1993-08-01), Gupta et al.
"The Directory-Authentication Framework" (Recommendation X.509) paragraphs 1.6, 8.4, and 8.5, CCITT IXth Plenary Assembly vol. VIII, No. 8, Melbourne, Australia, 14 Nov. 1988.
Gupta Amar
Hawe William R.
Lampson Butler W.
An Meng-Ai T.
Digital Equipment Corporation
Kuta Christine M.
Shah Alpesh M.
LandOfFree
Method and apparatus for end-to-end encryption of a data packet does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for end-to-end encryption of a data packet , we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for end-to-end encryption of a data packet will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1395426