Cryptography – Key management – Having particular key generator
Patent
1995-08-21
1998-10-27
Bowler, Alyssa H.
Cryptography
Key management
Having particular key generator
395800, 39520001, 39520006, 39520015, 39518801, 395186, 380 23, 380 24, 380 25, 380 30, 380 49, 34082534, G06F 1500
Patent
active
058288937
ABSTRACT:
A computer network comprising a trusted computer network (16), and an untrusted computer network (17). A plurality of firewall systems (21) provide controlled access between the trusted computer network and the first untrusted computer network. An Application layer bridge (22) establishes a transparent virtual circuit across the plurality of firewalls (21).
REFERENCES:
patent: 4584639 (1986-04-01), Hardy
patent: 4916704 (1990-04-01), Bruckert et al.
patent: 4924513 (1990-05-01), Herbison et al.
patent: 4977582 (1990-12-01), Nichols et al.
patent: 5200993 (1993-04-01), Wheeler et al.
patent: 5251205 (1993-10-01), Callon et al.
patent: 5260999 (1993-11-01), Wyman
patent: 5280529 (1994-01-01), N.o slashed.st
patent: 5313465 (1994-05-01), Perlman et al.
patent: 5313579 (1994-05-01), Chao
patent: 5329619 (1994-07-01), Page et al.
patent: 5490252 (1996-02-01), Macera et al.
"Eagle Network Isolator", User's Guide published by Raptor Systems, Inc., Wilmington, Delaware in 1992.
Casey et al., "A Secure Distributed Operating System", IEEE, May 1988, pp. 27-38.
Wong, "Issues in Secure Distributed Operating System Design," IEEE, Apr. 1989, pp. 338-341.
Vinter, "Extended Discretionary Access Controls", IEEE, 1988, pp. 39-49.
Rossen, "Network Security: Just Say `Know` at Layer 7," Data Communications, Mar. 1991, pp. 103-106.
Telstra, "Security Papers and Documents".
Bellovin, "Security Probrems in the TCP/IP Protocol Suite", Computer Communication Review, vol. 19, No. 2, pp. 32-48, Apr. 1989.
Bellovin et al., "Limitations of the Kerberos Authentication System", USENIX, Winter 1991, pp. 1-15.
Cheswick, "The Design of a Secure Internet Gateway", Apr. 20, 1990, pp. 1-5.
Bishop, "A Security Analysis of the NTP Protocol", Jun. 13, 1990, pp. 1-20.
"ICL Joins Hughes STX in US on Secure Networking", Computergram International, Jun. 16, 1992.
Loa Kan-chei
Wied William J.
Atkins Robert D.
Bowler Alyssa H.
Follansbee John
Motorola Inc.
LandOfFree
System and method of communicating between trusted and untrusted does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method of communicating between trusted and untrusted, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method of communicating between trusted and untrusted will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1621956