Cryptography – Key management – Having particular key generator
Patent
1992-07-10
1997-01-21
Ellis, Richard L.
Cryptography
Key management
Having particular key generator
380 25, 380 49, G06F 1517
Patent
active
055967183
ABSTRACT:
A method and apparatus for ensuring secure communication over an unsecured communications medium between a user working on an unsecured workstation or computer and a host computer. A secure user interface is created by inserting a trusted path subsystem between input/output devices to the workstation and the workstation itself. Data transferred from the input/output devices is intercepted, encrypted and transmitted in packets to the host computer. Packets of screen display data from the host computer are decrypted and presented within a user-defined screen overlay.
REFERENCES:
patent: 3956615 (1976-05-01), Anderson et al.
patent: 4104721 (1978-08-01), Markstein et al.
patent: 4177510 (1979-12-01), Appell et al.
patent: 4227253 (1980-10-01), Ehrsam et al.
patent: 4238854 (1980-12-01), Ehrsam et al.
patent: 4264782 (1981-04-01), Konheim
patent: 4438824 (1984-03-01), Mueller-Schloer
patent: 4442484 (1984-04-01), Childs, Jr. et al.
patent: 4575797 (1986-03-01), Gruner et al.
patent: 4578530 (1986-03-01), Zeidler
patent: 4621321 (1986-11-01), Boebert et al.
patent: 4629872 (1986-12-01), Hallberg
patent: 4648031 (1987-03-01), Jenner
patent: 4652698 (1987-03-01), Hale et al.
patent: 4713753 (1987-12-01), Boebert et al.
patent: 4825050 (1989-04-01), Griffith et al.
patent: 4885789 (1989-12-01), Burger et al.
patent: 4888801 (1989-12-01), Foster et al.
patent: 4918653 (1990-04-01), John et al.
patent: 4965568 (1990-10-01), Atalla et al.
patent: 4980913 (1990-12-01), Skret
patent: 4998279 (1991-03-01), Weiss
patent: 5018096 (1991-05-01), Aoyama
patent: 5065429 (1991-11-01), Lang
patent: 5070528 (1991-12-01), Hawe et al.
patent: 5148479 (1992-09-01), Bird et al.
patent: 5272754 (1993-12-01), Boerbert
patent: 5283828 (1994-02-01), Saunders et al.
IEEE Proceedings of the Symposium on Security and Privacy, Apr. 22-24, 1985 Oakland, CA., Boebert et al. "Secure ADA Target: Issues, System Design, an Verification".
AFIPS Conference Proceedings, vol. 35, Nov. 18-20, 1969, Las Vegas, Nevada, Lampson, "Dynamic Protection Structures".
"A Hardware Architecture for Implementing Protection Rings", 1972.
IEEE Symposium on Research in Security and Privacy, May 4, 1992, Oakland, U.S. J. Epstein et al. "Evolution of a Trusted B3 Window System Prototype".
Proceedings, 1987 Fall Joint Computer Conference, Oct. 25, 1987, Dallas, U.S. J. Picciotto et al., "Privileges and Their Use by Trusted Applications".
"Secure Computing: The Secure Ada Target Approach," W. E. Boebert et al., Lock Selected Papers, 1985-1988, Secure Computing Technology Corp., Arden Hills, MN.
"Using Embedded COMSEC: An Integrator's Viewpoint," by Thomas Kibalo and W. E. Boebert, Proceedings of the 1st AFCEA Mid-Atlantic Intelligence Symposium (1986).
Boebert William E.
Hanson Mark H.
Markham Thomas R.
Ellis Richard L.
Secure Computing Corporation
LandOfFree
Secure computer network using trusted path subsystem which encry does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Secure computer network using trusted path subsystem which encry, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure computer network using trusted path subsystem which encry will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2331861