Operational methods for a secure node in a computer network

Cryptography – Key management – Having particular key generator

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 9, 380 20, 380 23, 380 25, H04L 900

Patent

active

055307582

ABSTRACT:
A computer network (20) including secure nodes (26) and unsecured nodes (28). The secure nodes (26) may communicate private data without compromising security provisions. The secure nodes (26) include a security kernel (36) that implements communication security provisions and a trusted operating system (40) that imposes computer data security provisions. A trusted interface (44) is used to transfer data between the trusted operating system (40) and the security kernel (36). In addition, this interface (44) insures that computer security attributes are compatible with communication security attributes. If incompatibilities are discovered, requested communications are thwarted and audit records for the security linkage violations are recorded.

REFERENCES:
patent: 4888801 (1989-12-01), Foster et al.
patent: 4908861 (1990-03-01), Brachtl et al.
patent: 4932056 (1990-06-01), Shamir
patent: 4987595 (1991-01-01), Marino, Jr. et al.
patent: 5010572 (1991-04-01), Bathrick et al.
patent: 5029206 (1991-07-01), Marino, Jr. et al.
patent: 5115466 (1992-05-01), Presttun
patent: 5349643 (1994-09-01), Cox et al.
"An SDNS Platform For Trusted Products" by Ernie Borgoyne and Ralph G. Puga from FOR Publication at the 15th National Computer Security Conference (NCSC) Oct. 1992.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Operational methods for a secure node in a computer network does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Operational methods for a secure node in a computer network, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Operational methods for a secure node in a computer network will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2195888

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.