Method to establish and enforce a network cryptographic security

Cryptography – Particular algorithmic function encoding – Nbs/des algorithm

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 30, H04K 100

Patent

active

051649888

ABSTRACT:
Device A in a public key cryptographic network will be constrained to continue to faithfully practice a security policy dictated by a network certification center, long after device A's public key PUMa has been certified. If device A alters its operations from the limits encoded in its configuration vector, for example by loading a new configuration vector, device A will be denied participation in the network. To accomplish this enforcement of the network security policy dictated by the certification center, it is necessary for the certification center to verify at the time device A requests certification of its public key PUMa, that device A is configured with the currently authorized configuration vector. Device A is required to transmit to the certification center a copy of device A's current configuration vector, in an audit record. the certification center then compares device A's copy of the configuration vector with the authorized configuration vector for device A stored at the certification center. If the comparison is satisfactory, then the certification center will issue the requested certificate and will produce a digital signiture dSigPRC on a representation of device A's public key PUMa, using the certification center's private certification key PRC. Thereafter, if device A attempts to change its configuration vector, device A's privacy key PRMa corresponding to the certified public key PUMa, will automatically become unavailable for use in communicating in the network.

REFERENCES:
patent: 4200770 (1980-04-01), Hellman et al.
patent: 4218582 (1980-08-01), Hellman et al.
patent: 4326098 (1982-04-01), Bouricius
patent: 4393269 (1983-07-01), Konheim et al.
patent: 4405829 (1983-09-01), Rivest et al.
patent: 4850017 (1989-07-01), Matyas, Jr. et al.
patent: 4853961 (1989-08-01), Pastor
patent: 4885777 (1989-12-01), Takaragi et al.
patent: 4893338 (1990-01-01), Pastor
patent: 4908861 (1990-03-01), Brachtl et al.
patent: 4918728 (1990-04-01), Matyas et al.
patent: 4924514 (1990-05-01), Matyas et al.
patent: 4924515 (1990-05-01), Matyas et al.
patent: 4941176 (1990-07-01), Matyas et al.
patent: 5001752 (1991-03-01), Fischer
patent: 5003593 (1991-03-01), Mihm, Jr.
patent: 5005200 (1991-04-01), Fischer
R. W. Jones, "Some techniques for Handling Encipherment Keys," ICL Technical Journal, Nov. 1982, pp. 175-188.
D. W. Davies & W. L. Price, "Security for Computer Networks," John Wiley & Sons, NY, 1984, Sec. 6.5, Key Management with Tagged Keys, pp. 168-172.
W. Diffie, et al., "Privacy and Authentication: An Introduction to Cryptography," Proc. of IEEE, vol. 67, No. 3, Mar. 1979; pp. 397-427.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method to establish and enforce a network cryptographic security does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method to establish and enforce a network cryptographic security, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method to establish and enforce a network cryptographic security will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1177862

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.