Electrical computers and digital processing systems: support – Data processing protection using cryptography
Reexamination Certificate
2007-03-13
2007-03-13
Jung, David (Department: 2134)
Electrical computers and digital processing systems: support
Data processing protection using cryptography
C713S193000, C713S150000
Reexamination Certificate
active
10351258
ABSTRACT:
Methods and apparatus are provided for sequencing data in a cryptography accelerator with multiple cryptographic processing cores. Cryptographic processing cores are grouped into blocks of cryptographic processing cores to efficiently process received data. Mechanisms are provided to order data sequences at both the cryptographic processing core block level and the cryptographic processing core level.
REFERENCES:
patent: RE33189 (1990-03-01), Lee et al.
patent: 5161193 (1992-11-01), Lampson et al.
patent: 5297206 (1994-03-01), Orton
patent: 5471482 (1995-11-01), Byers et al.
patent: 5734829 (1998-03-01), Robinson
patent: 5796744 (1998-08-01), Krawczak et al.
patent: 5796836 (1998-08-01), Markham
patent: 5867706 (1999-02-01), Martin et al.
patent: 5870474 (1999-02-01), Wasilewski et al.
patent: 5936967 (1999-08-01), Baldwin et al.
patent: 5943338 (1999-08-01), Duclos et al.
patent: 5953416 (1999-09-01), Hasebe et al.
patent: 5983350 (1999-11-01), Minear et al.
patent: 6003135 (1999-12-01), Bialick et al.
patent: 6038551 (2000-03-01), Barlow et al.
patent: 6101255 (2000-08-01), Harrison et al.
patent: 6111858 (2000-08-01), Greaves et al.
patent: 6115816 (2000-09-01), Davis
patent: 6157955 (2000-12-01), Narad et al.
patent: 6189100 (2001-02-01), Barr et al.
patent: 6216167 (2001-04-01), Momirov
patent: 6226710 (2001-05-01), Melchior
patent: 6269163 (2001-07-01), Rivest et al.
patent: 6295604 (2001-09-01), Callum
patent: 6320964 (2001-11-01), Callum
patent: 6349405 (2002-02-01), Welfeld
patent: 6378072 (2002-04-01), Collins et al.
patent: 6393026 (2002-05-01), Irwin
patent: 6421730 (2002-07-01), Narad et al.
patent: 6477646 (2002-11-01), Krishna et al.
patent: 6708273 (2004-03-01), Ober et al.
patent: 6751677 (2004-06-01), Ilnicki et al.
patent: 6751728 (2004-06-01), Gunter et al.
patent: 6760444 (2004-07-01), Leung
patent: 6778495 (2004-08-01), Blair
patent: 6831979 (2004-12-01), Callum
patent: 6862278 (2005-03-01), Chang et al.
patent: 6909713 (2005-06-01), Magnussen et al.
patent: 6963979 (2005-11-01), Fairclough et al.
patent: 6996842 (2006-02-01), Strahm et al.
patent: 7003118 (2006-02-01), Yang et al.
patent: 7039641 (2006-05-01), Woo
patent: 7055029 (2006-05-01), Collins et al.
patent: 7062657 (2006-06-01), Law
patent: 2002/0001384 (2002-01-01), Buer et al.
patent: 2002/0004904 (2002-01-01), Blaker et al.
patent: 2002/0009076 (2002-01-01), Engbersen et al.
patent: 2002/0039418 (2002-04-01), Dror et al.
patent: 2002/0044649 (2002-04-01), Gallant et al.
patent: 2002/0057796 (2002-05-01), Lambert et al.
patent: 2002/0078342 (2002-06-01), Matthews, Jr.
patent: 2002/0097724 (2002-07-01), Halme et al.
patent: 2003/0005144 (2003-01-01), Engel et al.
patent: 2003/0046423 (2003-03-01), Narad et al.
patent: 2004/0039936 (2004-02-01), Lai
patent: 0876026 (1998-11-01), None
patent: 1132800 (2001-09-01), None
patent: WO 01/80483 (2001-10-01), None
patent: WO 02/41599 (2002-05-01), None
FPGA implementation of MD5 hash algorithm; Deepakumara, J.; Heys, H.M.; Venkatesan, R.; Electrical and Computer Engineering, 2001. Canadian Conference on vol. 2, May 13-16, 2001 pp.: 919-924 vol. 2.
Accelerating application-level security protocols; Burnside, M.; Keromytis, A.D.; Networks, 2003. ICON2003. The 11th IEEE International Conference on Sep. 28-Oct. 1, 2003 pp.: 313-318.
Securing Web servers against insider attack; Jiang, S.; Smith, S.; Minami, K.; Computer Security Applications Conference, 2001. ACSAC 2001. Proceedings 17th Annual Dec. 10-14, 2001 pp.: 265-276.
“Server ECS”, Mar. 9, 1998, [Retreived from Internet Sep. 2, 2004], “http://home.expertcanmore.net/expert/servers.htm”.
IPSec Overview, Jun. 5, 2001, [Retreived from Internet Sep. 2, 2004], “http://forsitesolutions.com/Techstuff/freeswan/inside—overview.html”.
“RFC 2402”, Oct. 1998, [Retreived from Internet Sep. 3, 2004], “http://www.ietf.org/rfc/rfc2402.txt?number=2402”.
Secure Products VMS115, VLSI Technology, Inc., Printed in the USA, Document Control:VMS115, VI, 0, Jan. 1999, pp. 1-2.
VMS 115 Data Sheet, VLSI Technology, Inc., a subsidiary of Philips Semiconductors, Revision2:3, Aug. 10, 1999, pp. 1-64.
Data Sheet 7751 Encryption Processor, Network Security Processors, Jun. 1999, pp. 1-84.
Senie, D., “NAT Friendly Application Design Guilelines”, Amaranth Networks, Inc., NAT Working Group, Internet-Draft, Sep. 1999, pp. 1-7.
Floyd, S. and Jacobson, V., “Random Early Detection Gateways for Congestion Avoidance”,IEEE/ACMTransactions on Networking,vol. 1, No. 4, Aug. 1993, pp. 397-413.
Egevang, K. and Francis, P., “The IP Network Address Translator (NAT)”, Network Working Group, Request for Comments: 1631, May 1994, pp. 1-10.
Pall, G. S. and Zorn, G., “Microsoft Point-To-Point Encryption (MPPE) Protocol”, Microsoft Corporation, Network Working Group, Internet Draft, Updates: RFC 2118, Oct. 1999, pp. 1-12.
Deutsch, P., “Deflate Compressed Data Format Specification Version 1.3”, Aladdin Enterprises, Network Working Group, Request for Comments: 1951, May 1996, pp. 1-17.
Kent, S. and Atkinson, R., “IP Authentication Header”, Network Working Group, Request for Comments: 2402, printed from http://www.ietf.org/rfc/rfc2402.txt?number=2402, Nov. 1998, 21 pages.
Kent, S. and Atkinson, R., “IP Encapsulating Security Payload (ESP)”, Network Working Group, Request for Comments: 2406, printed from http://www.ietf.org/rfc/rfc2406.txt?number=2406, Nov. 1998, 21 pages.
Maughan, D. et al., “Internet Security Association and Key Management Protocol (ISAKMP)”, Network Working Group, Request for Comments: 2408, Nov. 1998, pp. 1-20.
Harkins, D. et al., “The Internet Key Exchange (IKE)”, Cisco Systems, Network Working Group, Request for Comments: 2409, Nov. 1998, pp. 1-12.
Srisuresh, P., “Security Model with Tunnel-mode IPsec for NAT Domains”, Lucent Technologies, Network Working Group, request for Comments: 2709, Oct. 1999, pp. 1-11.
Shenker, S. et al., “Specification of Guaranteed Quality of Service”, Network Working Group, Request for Comments: 2212, Sep. 1997, pp. 1-20.
Srisuresh, P. and Holdrege, M., “IP Network Address Translator (NAT) Terminology and Considerations”, Lucent Technologies, Network Working Group, Request for Comments: 2663, Aug. 1999, pp. 1-30.
Kent, S. and Atkinson, R., “Security Architecture for the Internet Protocol”, Network Working Group, Request for Comments: 2401, Nov. 1998, pp. 1-66.
Compression for Broadband Data Communications, BlueSteel Networks, Inc., Sep. 8, 1999, pp. 1-9.
Securing and Accelerating e-Commerce Transactions, BlueSteel Networks, Inc., Revision 2.0, Oct. 20, 1999, pp. 1-7.
Securing Broadband Communications, by BlueSteel Networks, Inc., Sep. 8, 1999, pp. 1-10.
Keromytis, A.D. et al., “Implementing IPsec”,Global Telecommunications Conference (Globecom), IEEE, Nov. 3, 1997, pp. 1949-1952.
Pierson, L.G. et al., “Context-Agile Encryption for High Speed Communication Networks”,Computer Communications Review, Association for Computing Machinery, vol. 29, No. 1, Jan. 1999, pp. 35-49.
Sholander, P. et al.,. “The Effect of Algorithm-Agile Encryption on ATM Quality of Service”,Global Telecommunications Conference (Globcom), IEEE, Nov. 3, 1997, pp. 470-474.
Smirni, E. et al., “Evaluation of Multiprocessor Allocation Policies”, Technical Report, Vanderbilt University, Online, 1993, pp. 1-21.
Tarman, T.D. et al., “Algorithm-Agile Encryption in ATM Networks”,IEEE Computer, Sep. 1998, vol. 31, No. 1, pp. 57-64.
Wassal, A.G. and Hasan, M.A., “A VLSI Architecture for ATM Algorithm-Agile Encryption”,Proceedings Ninth Great Lakes Symposiun on VLSI, 4-6 Mar.1999, pp. 325-328.
Analog Devices: “Analog Devices and IRE Announce First DSP-Based Internet Security System-On-A-Chip”, Analog Devices Press Release, Online, Jan. 19, 1999, pp. 1-3, printed from http://content.analog.com/pressrel
Buer Mark
Paaske Tim
Broadcom Corporation
Jung David
Sterne Kessler Goldstein & Fox P.L.L.C.
LandOfFree
Methods and apparatus for ordering data in a cryptography... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Methods and apparatus for ordering data in a cryptography..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods and apparatus for ordering data in a cryptography... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3771483