Cryptography – Particular algorithmic function encoding – Nbs/des algorithm
Patent
1994-05-27
1995-08-15
Gregory, Bernarr E.
Cryptography
Particular algorithmic function encoding
Nbs/des algorithm
380 2, 380 9, 380 49, H04L 900
Patent
active
054427037
ABSTRACT:
A resource allocator (108) receives, from a first communication unit, a request to establish secure communications with at least a second communication unit. A key identifier is retrieved by the resource allocator and transmitted to at least the second communication unit. Based upon the transmitted key identifier, the second communication unit retrieves an identified encryption key and, at least when the identified encryption key is corrupt, transmits a corrupt key indication to the resource allocator. In response, the resource allocator can assign a default key identifier for use in the secure communication. In this manner, missed communications due to encryption key failures are reduced.
REFERENCES:
patent: 4176246 (1979-11-01), Gaetzi
patent: 4182933 (1980-01-01), Rosenblum
patent: 4876716 (1989-10-01), Okamoto
patent: 4881263 (1989-11-01), Herbison et al.
patent: 4924513 (1990-05-01), Herbison et al.
patent: 5081678 (1992-01-01), Kaufman et al.
patent: 5136642 (1992-08-01), Kawamura et al.
patent: 5193114 (1993-03-01), Moseley
patent: 5222137 (1993-06-01), Barrett et al.
Kim Charles C.
Woodhouse Robert D.
Egan Wayne J.
Gregory Bernarr E.
Markison Timothy W.
Moreno Christopher P.
Motorola Inc.
LandOfFree
Method for identifying corrupt encryption keys within a secure c does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method for identifying corrupt encryption keys within a secure c, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for identifying corrupt encryption keys within a secure c will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2189349