Cryptography – Key management – Having particular key generator
Patent
1997-11-03
1999-04-27
Cangialosi, Salvatore
Cryptography
Key management
Having particular key generator
H04L 900
Patent
active
058987843
ABSTRACT:
The invention features receiving encrypted network packets sent over a network at a network interface computer, and passing the encrypted network packets to a computer on an internal network.
The invention also features receiving encrypted network packets at a first computer over a network from a second computer, examining a field in each network packet to determine which of a plurality of encryption algorithms was used to encrypt the network packet, and decrypting the network packet in accordance with the determined encryption algorithm.
The invention further features receiving network packets sent over a network, determining which virtual tunnel each network packet was sent over, and routing each network packet to a destination computer in accordance with the determined virtual tunnel.
The invention features encrypting network packets at a computer connected to an internal network, passing the encrypted network packet over the internal network to a public network interface computer, and passing the encrypted network packet over a public network connected to the network interface computer.
REFERENCES:
patent: 5099517 (1992-03-01), Gupta et al.
patent: 5161193 (1992-11-01), Lampson et al.
patent: 5235644 (1993-08-01), Gupta et al.
patent: 5325362 (1994-06-01), Aziz
patent: 5416842 (1995-05-01), Aziz
patent: 5442708 (1995-08-01), Adams, Jr. et al.
patent: 5444782 (1995-08-01), Adams, Jr. et al.
patent: 5548646 (1996-08-01), Aziz et al.
patent: 5550984 (1996-08-01), Gelb
"Internet Portal, Version 1.1", pp. 1-16, Digital Equipment Corp.
"Digital Internet Tunnel V1.0", pp. 1-3, Digital Equipment Corp.
"Internet Security: Screening External Access Link (SEAL)", pp. 1-2, Digital Equipment Corp.
World Wide Web document of Digital Equipment Corporation's tunneling product, Nov. 15, 1995.
Kerberos Network Authentication Service (V5), Digital Equipment Corporation, pp. 1-106, Sep. 1993.
swIPe IP Security Protocol, Columbia University and AT&T, John Ioannidis and Matt Blaze, Dec. 1993.
Security Architecture for the Internet Protocol, R. Atkinson, Naval Research Laboratory, pp. 1-44, Aug. 1995.
IP Authentication Header, R. Atkinson, Naval Research Laboratory, pp. 1-26, Aug. 1995.
IP Encapsulating Security Payload (ESP), R. Atkinson, Naval Research Laboratory, pp. 1-24, Aug. 1995.
The Photuris Session Key Management Protocol, P. Karn, Qualcomm, W.A. Simpson, DayDreamer, pp. 1-106, Nov. 1995.
Simple Key-Management For Internet Protocols (SKIP), Ashar Aziz, et al. Sun Microsystems, Inc., pp. 1-72, Dec. 1995.
Internet Security Association and Key Management Protocol (ISAKMP), Douglas Maughan and Mark Schertler, National Security Agency, pp. 1-117, Nov. 1995.
U.S. application No. 08/561,790, filed Nov. 22, 1994, Kirby et al.--Controlling Passage Of Packets Or Messages.
U.S. application No. 08/585,765, filed Jan. 12, 1995, Kirby et al.--Data Encryption/Decryption For Network Communication.
U.S. application No. 08/586,231, filed Jan. 12, 1995, Levesque et al.--Key Management For Network Communication.
Kirby Alan J.
Kraemer Jeffrey A.
Nadkarni Ashok P.
Cangialosi Salvatore
Raptor Systems, Inc.
LandOfFree
Transferring encrypted packets over a public network does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Transferring encrypted packets over a public network, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Transferring encrypted packets over a public network will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-691071