Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Reexamination Certificate
2006-02-21
2006-02-21
Smithers, Matthew (Department: 2137)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
C380S286000
Reexamination Certificate
active
07003677
ABSTRACT:
A method for providing a proactive security in proactive operating environment. The proactive operating environment includes a group of proactive servers communicating over a network. Each proactive server (PSI) includes a storage that includes a non erasable part that stores a public, non proactive related, key VIStart. The storage further includes an erasable part for storing private and public data. The proactive server has a discardable one-time private key SIStartthat corresponds to the public key VIStart. The proactive server further has configuration data C. There is further provided a processor for providing a proactive services to applications. The proactive server has a group public proactive key VCERTcommon to the group of proactive servers and a share SICERTof a corresponding private proactive key SCERT. The method further includes the steps of invoking initialization procedure for generating restore related information, and invoking a restore procedure for utilizing the public, non proactive related, key VIStartand the restore related information for restoring the public proactive key VCERT.
REFERENCES:
patent: 6035041 (2000-03-01), Frankel et al.
patent: 6185678 (2001-02-01), Arbaugh et al.
patent: 6237097 (2001-05-01), Frankel et al.
patent: 6587946 (2003-07-01), Jakobsson
Canetti et al., “Proactive Security: Long-term protection against break-ins”,CryptoBytes: the technical newsletter of RSA Labs, vol. 3, No. 1, pp. 1-9, (1997).
Canetti et al., “Maintaining Authenticated Communication in the Presence of Break-ins”,Journal of Cryptography, pp. 1-39, (1998).
Chow et al., “Networking Randomization Protocol: A Proactive Pseudo-Random Generator”,Proc. 5thUNSENIX UNIX Security Symposium, pp. 55-63, (1995).
Istrail et al., “Implementation of proactive threshold public-key protocol”,Saudi National Labs, Proceeding of the 1998 RSA Data Security Conference.
Herzberg et al., “Proactive Public Key and Signature Systems”,ACM Security '97, pp.
Boneh et al. “Efficient Generation of Shared RSA Keys”,Proc. Crypto '97, pp. 425-539.
Barak Boaz
Herzberg Amir
Naor Dalit
Shai Eldad
Browdy and Neimark , P.L.L.C.
Smithers Matthew
LandOfFree
Method for operating proactively secured applications on an... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method for operating proactively secured applications on an..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for operating proactively secured applications on an... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3669221