Method for undetectably impeding key strength of encryption...

Cryptography – Key management

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S286000, C380S044000

Reexamination Certificate

active

07873166

ABSTRACT:
In one embodiment, a communication device includes a key strength controlling agent308operable to (i) receive a request for a cryptographic key; (ii) determine, from a restriction identifier, whether the cryptographic key strength is restricted; (iii) when the cryptographic key is restricted, cause the use of a second cryptographic key having a second key strength; and (iv) when the cryptographic key is not restricted, cause the use of a first cryptographic key having a first key strength. The first and second key strengths are different.

REFERENCES:
patent: 4850017 (1989-07-01), Matyas et al.
patent: 5323464 (1994-06-01), Elander et al.
patent: 5416841 (1995-05-01), Merrick
patent: 5764772 (1998-06-01), Kaufman et al.
patent: 5815573 (1998-09-01), Johnson et al.
patent: 5850443 (1998-12-01), Van Oorschot et al.
patent: 5912973 (1999-06-01), Hiramatsu et al.
patent: 5949883 (1999-09-01), Ford
patent: 6125446 (2000-09-01), Olarig et al.
patent: 6307936 (2001-10-01), Ober et al.
patent: 6363480 (2002-03-01), Perlman
patent: 6424713 (2002-07-01), Sprunk
patent: 6891950 (2005-05-01), Oomori et al.
patent: 6937727 (2005-08-01), Yup et al.
patent: 6947560 (2005-09-01), Smeets et al.
patent: 7174020 (2007-02-01), Chui
patent: 7194090 (2007-03-01), Muratani et al.
patent: 7195173 (2007-03-01), Powell et al.
patent: 7212633 (2007-05-01), Yokota et
patent: 7218733 (2007-05-01), Li et al.
patent: 7272500 (2007-09-01), Walker
patent: 2002/0061107 (2002-05-01), Tham et al.
patent: 2002/0106080 (2002-08-01), Qi et al.
patent: 2002/0118828 (2002-08-01), Yoshimura et al.
patent: 2003/0039355 (2003-02-01), McCanny et al.
patent: 2003/0072444 (2003-04-01), Hu et al.
patent: 2003/0084332 (2003-05-01), Krasinski et al.
patent: 2003/0198345 (2003-10-01), Van Buer
patent: 2004/0202318 (2004-10-01), Lu
patent: 2004/0260950 (2004-12-01), Ougi et al.
patent: 2005/0141716 (2005-06-01), Kumar et al.
patent: 2005/0157879 (2005-07-01), Tanaka et al.
patent: 2005/0213756 (2005-09-01), Hubert
patent: 2006/0009238 (2006-01-01), Stanco et al.
patent: 2006/0034456 (2006-02-01), McGough
patent: 2006/0204005 (2006-09-01), Hassan et al.
patent: 0592808 (1994-04-01), None
patent: 0729252 (1996-08-01), None
patent: 982895 (2000-03-01), None
patent: 01351430 (2003-10-01), None
patent: 2329308 (1999-03-01), None
patent: 6-202558 (1994-07-01), None
patent: 10-28114 (1998-01-01), None
patent: 11-161486 (1999-06-01), None
patent: 2002-16594 (2002-01-01), None
patent: 2002-503007 (2002-01-01), None
patent: 2002-61115 (2002-07-01), None
patent: WO 99/40549 (1999-08-01), None
patent: WO 02/37222 (2002-05-01), None
David J. Kappos, “Subject Matter Eligibility of Computer Readable Media”, Jan. 26, 2010, 1 page.
Notice of Preliminary Rejection for Korean Patent Application No. 2006-0088689.
Official Action for U.S. Appl. No. 11/395,887, mailed Jan. 9, 2008.
European Search Report for European counterpart application, Application No. 06254606.4.
U.S. Appl. No. 11/395,877, filed Mar. 31, 2006, Gilman.
Alfred J. Menezes et al., Hand Book of Applied Cryptography, 1997, CRC Press LLC.
Bruce Scheiner, The Blowfish Encryption Algorithm—One Year Later, Sep. 1995, Dr. Dobb's Journal.
FIPS, Announcing the Advance Encryption Standard (AES), Nov. 26, 2001, Publication 197.
Mikey: Multimedia Internet KEYing, Arkko et al., The Internet Society, Aug. 2004, 60 pages.
Neal R. Wagner, The Laws of Cryptography with Java Code, 2003 pp. 131-307.
The Secure Real-time Transport Protocol (SRTP), Baugher et al., The Internet Society, Mar. 2004, 56 pages.
Official Action for U.S. Appl. No. 11/395,887, mailed Jan. 4, 2007.
Official Action for U.S. Appl. No. 11/395,887, mailed Jun. 20, 2007.
Translation of Notice of Preliminary Rejection for Korean Patent Application No. 2006-0088689, dated May 19, 2008.
Avaya—“SG200 Security Gateway—Product Features”, at http://www.avaya.com/gcm/master-usa/en-us/products/offers/sg200.htm&View=ProdFeat...., Copyright 2005, 2 pages.
Avaya—“SG200 Security Gateway—Product Description”, at http://www.avaya.com/gcm/master-usa/en-us/products/offers/sg200.htm&View=ProdDesc...., Copyright 2005, 2 pages.
Avaya—“SG200 Security Gateway—Prod Overview”, at http://www.avaya.com/gcm/master-usa/en-us/products/offers/sg200.htm, Copyright 2005, 2 pages.
Avaya—“VPNmanager Series—Product Features”, at http://www.avaya.com/gcm/master-usa/en-us/products/offers/vpnmanager.htm&View=Pro..., Copyright 2005, 2 pages.
Avaya—“VPNmanager Series—Product Description”, at http://www.avaya.com/gcm/master-usa/en-us/products/offers/vpnmanager.htm&View=Pro..., Copyright 2005, 2 pages.
Avaya—“VPNmanager Series—Prod Overview”, at http://www.avaya.com/gcm/master-usa/en-us/products/offers/vpnmanager.htm, Copyright 2005, 2 pages.
U.S. Bureau of Industry and Security—Encryption—“Commercial Encryption Export Controls”, at http://www.bxa.doc.gov/encryption/default.htm, Fact Sheet Dec. 9, 2004, 2 pages.
U.S. Bureau of Industry and Security—Encryption Fact Sheet Jun. 17, 2002 —“Commercial Encryption Export Controls”, at http://www.bxa.doc.gov/encryption/EncFactSheet12 09 04.htm, dated Dec. 9, 2004, 2 pages.
U.S. Bureau of Industry and Security—Export Control Basics (Exporting 101)—“Introduction to Commerce Department Expert Controls”, at http://www.bxa.doc.gov/Licensing/Exporting Basics.htm, updated May 8, 2003, 8 pages.
Official Action for U.S. Appl. No. 11/395,877, mailed Aug. 21, 2008.
Japanese Patent Application No. 2006-247807, mailed Nov. 17, 2008.
Official Action for U.S. Appl. No. 11/395,877, mailed Dec. 23, 2008.
Notification of First Office Action (including translation) for Chinese Patent Application No. 200610153931.0, date of notification Mar. 27, 2009.
Notice of Preliminary Rejection (including translation) for Korean Patent Application No. 2006-0088689, dated Feb. 10, 2009.
BEA WebLogic Server and WebLogic Express Installation Guide, Release 8.1 Beta, BEA Systems, Inc., 2002, 5 pages.
Configuring Avaya Communication Manager for Media Encryption—Issue 1.0, Avaya Inc., 2004, 3 pages.
Official Action for Canadian Patent Application No. 2,558,227, mailed Jan. 13, 2010.
Japanese Patent Application No. 2006-247807, mailed Feb. 18, 2010.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for undetectably impeding key strength of encryption... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for undetectably impeding key strength of encryption..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for undetectably impeding key strength of encryption... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2632574

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.