Cryptography – Key management – Having particular key generator
Reexamination Certificate
2006-08-22
2006-08-22
Revak, Christopher (Department: 2131)
Cryptography
Key management
Having particular key generator
C713S169000, C713S170000, C713S171000, C713S176000, C380S283000, C380S284000, C380S285000, C380S028000
Reexamination Certificate
active
07095851
ABSTRACT:
A cryptographic key split combiner, which includes a number of key split generators (42, 48, and56) for generating cryptographic key splits (32, 34, 36, 38, and64) and a key split randomizer for randomizing the cryptographic key splits to produce a cryptographic key (62), and a process for forming cryptographic keys. Each of the key split generators (42, 48and56) generates key splits (32, 34, 36, 38, and64) from seed data (40, 44, 46, 50, 52, 54, 58, and60). The key split generators may include a random split generator (42) for generating a random key split (32) based on reference data (40) and encryption date/time (44). Other key split generators may include a token split generator (48) for generating a token key split (34) based on label data (46) and organization data (50), a console split generator (56) for generating a console key split (36) based on current maintenance data (52) and previous maintenance data (54), and a biometric split generator for generating a biometric key split (38) based on biometric data (58). All splits may further be based on static data, which may be updated, for example by modifying a prime number divisor of the static data. The label data may be read from a storage medium, and may include user authorization data. The label data may be associated with label categories and subcategories of addresses, which are meaningful to a user who is specifying or determining the intended recipient(s) of the encrypted information or object. An array associated with a software component object may use key splits (32, 34, 36, 38, and64) which determine which methods and properties are allowed and control access to the memory address for those allowed methods and properties. The resulting cryptographic key (62) may be, for example, a stream of symbols, at least one symbol block, or a key matrix.
REFERENCES:
patent: 4145568 (1979-03-01), Ehrat
patent: 4200770 (1980-04-01), Hellman et al.
patent: 4218582 (1980-08-01), Hellman et al.
patent: 4864616 (1989-09-01), Pond et al.
patent: 5276738 (1994-01-01), Hirsch
patent: 5311595 (1994-05-01), Bjerrum et al.
patent: 5499297 (1996-03-01), Boebert
patent: 5541994 (1996-07-01), Tomko et al.
patent: 5557678 (1996-09-01), Ganesan
patent: 5627894 (1997-05-01), Albert et al.
patent: 5657390 (1997-08-01), Elgamal et al.
patent: 5694472 (1997-12-01), Johnson et al.
patent: 5710815 (1998-01-01), Ming et al.
patent: 5751808 (1998-05-01), Anshel et al.
patent: 5761305 (1998-06-01), Vanstone et al.
patent: 5778069 (1998-07-01), Thomlinson et al.
patent: 5796833 (1998-08-01), Chen et al.
patent: 5815573 (1998-09-01), Johnson et al.
patent: 5857025 (1999-01-01), Anderson et al.
patent: 6009176 (1999-12-01), Gennaro et al.
patent: WO 98 36520 (1998-08-01), None
Adamouski, “Encryption Technology Other Than PKI,” Security Technology, Oct. 12, 1998, pp. 108-116, ISBN: 0-7803-4535-5, USA.
Chai Longbit
IP Strategies
Revak Christopher
Tecsec, Inc.
LandOfFree
Voice and data encryption method using a cryptographic key... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Voice and data encryption method using a cryptographic key..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Voice and data encryption method using a cryptographic key... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3678055