Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Having particular address related cryptography
Reexamination Certificate
2011-01-25
2011-01-25
Jung, David Y (Department: 2431)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Having particular address related cryptography
C713S162000, C713S150000
Reexamination Certificate
active
07877602
ABSTRACT:
A mechanism for enabling efficient encryption and integrity validation of network files. When a request to read a file stored in a local network file system is received, the local network file system examines cryptographic attributes associated with the file to determine if the file is encrypted or integrity-verified. If the cryptographic attributes indicate the file is encrypted, the local network file system omits the encryption of the file by the local network file system prior to passing the file to the remote network file system. If the cryptographic attributes indicate the file is integrity-verified, the local network file system omits the integrity-verification of the file by the local network file system prior to passing the file to the remote network file system. The local network file system then transmits the file to the remote network file system.
REFERENCES:
patent: 6128737 (2000-10-01), Jakubowski et al.
patent: 6199162 (2001-03-01), Luyster
patent: 6226742 (2001-05-01), Jakubowski et al.
patent: 6523022 (2003-02-01), Hobbs
patent: 6868495 (2005-03-01), Glover
patent: 6986043 (2006-01-01), Andrew et al.
patent: 7580919 (2009-08-01), Hannel et al.
A Next Generation CIFS Client; Steven French; Linux Technology Center; IBM Austin Connectathon 2002 Mar. 5, 2002.
Halcrow, M. 2005. eCryptfs: An enterprise-class cryptographic filesystem for Linux. In Proceedings of the Linux Symposium. vol. 1, 201-218; year 2005.
IBM Linux Technology Center Library, web page, as printed out in year 2010.
A cross-layer key management scheme in Ad hoc network ; , Zeng-Ping; , Hu-Ronglei; , Yang-Yatao; , Song-Jie; Signal Processing Systems (ICSPS), 2010 2nd International Conference on vol. 1 ; Publication Year: 2010 , pp. V1-132-V1-137.
Kubiatowicz et al., “OceanStore: An Architecture for Global-Scale Persistent Storage”, ACM 2000, ASPLOS 2000, Cambridge MA, Nov. 12-15, 2000, pp. 190-201.
Pang et al., “A High-level Programming Environment for Packet Trace Anonymization and Transformation”, ACM 2003, SIGCOMM'03, Aug. 25-29, 2003, Karlsruhe, Germany, pp. 339-351.
Hadzic et al., “Balancing Performance and Flexibility with Hardware Support for Network Architectures”, ACM Transactions on Computer Systems, vol. 21, Issue 4, Nov. 2003, pp. 375-411.
Blaze, “A Cryptographic File system for Unix”, ACM Conference on Communications and computing Security, Fairfax VA, Nov. 1993, pp. 1-8. http://www.crypto.com/papers/cfs.pdf.
Halcrow, “eCryptfs: A Stacked Cryptographic Filesystem*”, May 1, 2007, pp. 1-10, retrieved Dec. 16, 2008 http://ecryptfs.sourceforge.net/ecryptfs-article.pdf.
French Steven Michael
Halcrow Michael Austin
Potluri Prasad Venkata
Bennett Steven L.
International Business Machines - Corporation
Jung David Y
Yee & Associates P.C.
LandOfFree
Transparent aware data transformation at file system level... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Transparent aware data transformation at file system level..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Transparent aware data transformation at file system level... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2701805