Cryptography – Key management – Having particular key generator
Patent
1995-09-18
1998-05-26
Tarcza, Thomas H.
Cryptography
Key management
Having particular key generator
380 21, 39518701, H04L 900
Patent
active
057579245
ABSTRACT:
A network security device is connected between a protected client and a network. The network security device negotiates a session key with any other protected client. Then, all communications between the two clients are encrypted. The inventive device is self-configuring and locks itself to the IP address of its client. Thus, the client cannot change its IP address once set and therefore cannot emulate the IP address of another client. When a packet is transmitted from the protected host, the security device translates the MAC address of the client to its own MAC address before transmitting the packet into the network. Packets addressed to the host, contain the MAC address of the security device. The security device translates its MAC address to the client's MAC address before transmitting the packet to the client.
REFERENCES:
patent: 3816666 (1974-06-01), Tomozawa et al.
patent: 4159468 (1979-06-01), Barnes et al.
patent: 4160120 (1979-07-01), Barnes et al.
patent: 4182933 (1980-01-01), Rosenblum
patent: 4185166 (1980-01-01), Kinch, Jr. et al.
patent: 4203166 (1980-05-01), Ehrsam et al.
patent: 4227253 (1980-10-01), Ehrsam et al.
patent: 4238854 (1980-12-01), Ehrsam et al.
patent: 4249180 (1981-02-01), Eberle et al.
patent: 4621321 (1986-11-01), Boebert et al.
patent: 4633391 (1986-12-01), Rundell
patent: 4701840 (1987-10-01), Boebert et al.
patent: 4713753 (1987-12-01), Boebert et al.
patent: 4727579 (1988-02-01), Wright et al.
patent: 4731841 (1988-03-01), Rosen et al.
patent: 4757536 (1988-07-01), Szczutkowski et al.
patent: 4799153 (1989-01-01), Hann et al.
patent: 4802220 (1989-01-01), Marker, Jr.
patent: 4829560 (1989-05-01), Evanyk et al.
patent: 4829569 (1989-05-01), Seth-Smith et al.
patent: 4837822 (1989-06-01), Crosly et al.
patent: 4901348 (1990-02-01), Nichols et al.
patent: 4910777 (1990-03-01), Larson et al.
patent: 4912762 (1990-03-01), Lee et al.
patent: 4916704 (1990-04-01), Bruckert et al.
patent: 4924513 (1990-05-01), Herbison et al.
patent: 4933969 (1990-06-01), Marshall et al.
patent: 4933971 (1990-06-01), Bestock et al.
patent: 4956803 (1990-09-01), Goss
patent: 4965804 (1990-10-01), Trobovich et al.
patent: 4980913 (1990-12-01), Skret
patent: 4991207 (1991-02-01), Shiraishi et al.
patent: 5001755 (1991-03-01), Skret
patent: 5056140 (1991-10-01), Kimbell
patent: 5070528 (1991-12-01), Hawe et al.
patent: 5086469 (1992-02-01), Gupta et al.
patent: 5161192 (1992-11-01), Carter et al.
patent: 5161193 (1992-11-01), Lampson et al.
patent: 5177788 (1993-01-01), Schanning et al.
patent: 5179554 (1993-01-01), Lomicka et al.
patent: 5182554 (1993-01-01), Kaiser et al.
patent: 5204961 (1993-04-01), Barlow
patent: 5222137 (1993-06-01), Barrett et al.
patent: 5222140 (1993-06-01), Beller et al.
patent: 5245696 (1993-09-01), Loeb et al.
patent: 5261003 (1993-11-01), Matsui
patent: 5268962 (1993-12-01), Abadi et al.
patent: 5272754 (1993-12-01), Boebert
patent: 5276735 (1994-01-01), Boebert et al.
patent: 5299263 (1994-03-01), Beller et al.
patent: 5303303 (1994-04-01), White
patent: 5309437 (1994-05-01), Perlman et al.
patent: 5311593 (1994-05-01), Carmi
patent: 5331637 (1994-07-01), Francis et al.
patent: 5353283 (1994-10-01), Tsuchiya
patent: 5361359 (1994-11-01), Tajalli et al.
patent: 5386470 (1995-01-01), Carter et al.
patent: 5386471 (1995-01-01), Bianco
patent: 5394402 (1995-02-01), Ross
patent: 5394469 (1995-02-01), Nagel et al.
patent: 5406628 (1995-04-01), Beller et al.
patent: 5414694 (1995-05-01), Crayford et al.
patent: 5416842 (1995-05-01), Aziz
patent: 5432850 (1995-07-01), Rothenberg
patent: 5442708 (1995-08-01), Adams, Jr. et al.
patent: 5444782 (1995-08-01), Adams, Jr. et al.
patent: 5489896 (1996-02-01), Sofer et al.
patent: 5499297 (1996-03-01), Boebert et al.
patent: 5502766 (1996-03-01), Boebert et al.
patent: 5537099 (1996-07-01), Liang
patent: 5548646 (1996-08-01), Aziz et al.
patent: 5548649 (1996-08-01), Jacobson
patent: 5550984 (1996-08-01), Gelb
patent: 5557346 (1996-09-01), Lipner et al.
patent: 5557765 (1996-09-01), Lipner et al.
patent: 5583940 (1996-12-01), Vidrascu et al.
patent: 5590201 (1996-12-01), Lo
patent: 5596718 (1997-01-01), Boebert et al.
patent: 5600722 (1997-02-01), Yamaguchi et al.
patent: 5623601 (1997-04-01), Vu
Menezes, Qu, and Vanstone, "Some New Key Arrangement Protocols Providing Implicit Authentication," Apr. 24, 1995.
Shmuely, Composite Diffie-Hellman Public-Key Generating Systems Are Hard to Break, Technion Technical Report, Feb. 1985.
Rabin, Digitized Signatures & Public-Key Functions As Intractable As Facturization, (date unknown).
Williams, A Modification of the RSA Public-Key Encryption Procedure, IEEE Transactions On Information Theory, vol. IT-26, No. 6, pp. 726-729 (Nov. 1980).
Miyaguch, The FEAL Cipher Family, Crypto '90 (Aug. 1990).
Shimizu, et al., FEAL-Fast Date Encipherment Algorithm, Systems & Computer in Japan, vol. 19, No. 7, pp. 20-34 (1988).
Federal Register, vol. 40, No. 52, Data Encryption Standard (Mar. 17, 1975).
Davies, et al., Security for Computer Networks, Chapters 3 (DES) and Chapter 4 (Block Cipher) pp. 47-108 (Wiley 1984).
Rivest, The MD5 Message-Digest Algorithm, Apr. 1992.
RSA Brochure (undated).
Diffie, The First Ten Years of Public-Key Cryptography, Proceedings of the IEEE, vol. 70, No. 5, pp. 560-577 (May 1988).
Fahn, Answers to Frequently Asked Questions About Today's Cryptography, RSA Laboratories (Sep. 1992).
Linn, Privacy Enhancement for Internet Electronic Mail: Part I: Message Encryption and Authentication Procedures, Network Working Group, RFC 1421 (Feb. 1993).
McCurley, A Key Distribution System Equivalent to Factoring, Jun. 3, 1987.
Kaliski, Privacy Enhancement for Internet Electronic Mail: Part IV: Key Certification and Related Services, Network Working Group, RFC 1424 (Feb. 1993).
Kent, Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-Based Key Management, Network Working Group, RFC 1422 (Feb. 1993).
Diffie, et al., Authentication and Authenticated Key Exchanges, Design, Codes, and Cryptogrpahy, 2, pp. 107-125 (1992).
Konigs, Cryptographic Identification Methods for Smart Cards in the Process of Standardization, IEEE Communications Magazine, vol. 29, No. 6, pp. 42-48 (Jun. 1991).
Ferreira, The Smart Card: A High Security Tool in EDP, Phillips TDS Review, vol. 47, No. 3, pp. 1-19, (Sep. 1989).
Day, et al., The OSI Reference Model, Proceedings of the IEEE, vol. 71, No. 12, pp. 1334-1340 (Dec. 1983).
Bellovin, Security Problems in the TCP/IP Protocol Suite, Computer Communication Review, Col. 19, No. 2, pp. 32-40 (Apr. 1989).
Balenson, Privacy Enchantment for Internet Electronic Mail: Part III: Algorithms, Modes, and Identifiers, Network Working Group, RFC 1115 (Feb. 1993).
Friedman Aharon
Levy Ben Zion
Digital Secured Networks Techolognies, Inc.
Laufer Pinchus M.
Tarcza Thomas H.
LandOfFree
Network security device which performs MAC address translation w does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Network security device which performs MAC address translation w, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Network security device which performs MAC address translation w will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1973306