Secure computer network using trusted path subsystem which encry

Cryptography – Key management – Having particular key generator

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 25, 380 49, G06F 1517

Patent

active

055967183

ABSTRACT:
A method and apparatus for ensuring secure communication over an unsecured communications medium between a user working on an unsecured workstation or computer and a host computer. A secure user interface is created by inserting a trusted path subsystem between input/output devices to the workstation and the workstation itself. Data transferred from the input/output devices is intercepted, encrypted and transmitted in packets to the host computer. Packets of screen display data from the host computer are decrypted and presented within a user-defined screen overlay.

REFERENCES:
patent: 3956615 (1976-05-01), Anderson et al.
patent: 4104721 (1978-08-01), Markstein et al.
patent: 4177510 (1979-12-01), Appell et al.
patent: 4227253 (1980-10-01), Ehrsam et al.
patent: 4238854 (1980-12-01), Ehrsam et al.
patent: 4264782 (1981-04-01), Konheim
patent: 4438824 (1984-03-01), Mueller-Schloer
patent: 4442484 (1984-04-01), Childs, Jr. et al.
patent: 4575797 (1986-03-01), Gruner et al.
patent: 4578530 (1986-03-01), Zeidler
patent: 4621321 (1986-11-01), Boebert et al.
patent: 4629872 (1986-12-01), Hallberg
patent: 4648031 (1987-03-01), Jenner
patent: 4652698 (1987-03-01), Hale et al.
patent: 4713753 (1987-12-01), Boebert et al.
patent: 4825050 (1989-04-01), Griffith et al.
patent: 4885789 (1989-12-01), Burger et al.
patent: 4888801 (1989-12-01), Foster et al.
patent: 4918653 (1990-04-01), John et al.
patent: 4965568 (1990-10-01), Atalla et al.
patent: 4980913 (1990-12-01), Skret
patent: 4998279 (1991-03-01), Weiss
patent: 5018096 (1991-05-01), Aoyama
patent: 5065429 (1991-11-01), Lang
patent: 5070528 (1991-12-01), Hawe et al.
patent: 5148479 (1992-09-01), Bird et al.
patent: 5272754 (1993-12-01), Boerbert
patent: 5283828 (1994-02-01), Saunders et al.
IEEE Proceedings of the Symposium on Security and Privacy, Apr. 22-24, 1985 Oakland, CA., Boebert et al. "Secure ADA Target: Issues, System Design, an Verification".
AFIPS Conference Proceedings, vol. 35, Nov. 18-20, 1969, Las Vegas, Nevada, Lampson, "Dynamic Protection Structures".
"A Hardware Architecture for Implementing Protection Rings", 1972.
IEEE Symposium on Research in Security and Privacy, May 4, 1992, Oakland, U.S. J. Epstein et al. "Evolution of a Trusted B3 Window System Prototype".
Proceedings, 1987 Fall Joint Computer Conference, Oct. 25, 1987, Dallas, U.S. J. Picciotto et al., "Privileges and Their Use by Trusted Applications".
"Secure Computing: The Secure Ada Target Approach," W. E. Boebert et al., Lock Selected Papers, 1985-1988, Secure Computing Technology Corp., Arden Hills, MN.
"Using Embedded COMSEC: An Integrator's Viewpoint," by Thomas Kibalo and W. E. Boebert, Proceedings of the 1st AFCEA Mid-Atlantic Intelligence Symposium (1986).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Secure computer network using trusted path subsystem which encry does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Secure computer network using trusted path subsystem which encry, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure computer network using trusted path subsystem which encry will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2331861

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.