Method for operating proactively secured applications on an...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S286000

Reexamination Certificate

active

07003677

ABSTRACT:
A method for providing a proactive security in proactive operating environment. The proactive operating environment includes a group of proactive servers communicating over a network. Each proactive server (PSI) includes a storage that includes a non erasable part that stores a public, non proactive related, key VIStart. The storage further includes an erasable part for storing private and public data. The proactive server has a discardable one-time private key SIStartthat corresponds to the public key VIStart. The proactive server further has configuration data C. There is further provided a processor for providing a proactive services to applications. The proactive server has a group public proactive key VCERTcommon to the group of proactive servers and a share SICERTof a corresponding private proactive key SCERT. The method further includes the steps of invoking initialization procedure for generating restore related information, and invoking a restore procedure for utilizing the public, non proactive related, key VIStartand the restore related information for restoring the public proactive key VCERT.

REFERENCES:
patent: 6035041 (2000-03-01), Frankel et al.
patent: 6185678 (2001-02-01), Arbaugh et al.
patent: 6237097 (2001-05-01), Frankel et al.
patent: 6587946 (2003-07-01), Jakobsson
Canetti et al., “Proactive Security: Long-term protection against break-ins”,CryptoBytes: the technical newsletter of RSA Labs, vol. 3, No. 1, pp. 1-9, (1997).
Canetti et al., “Maintaining Authenticated Communication in the Presence of Break-ins”,Journal of Cryptography, pp. 1-39, (1998).
Chow et al., “Networking Randomization Protocol: A Proactive Pseudo-Random Generator”,Proc. 5thUNSENIX UNIX Security Symposium, pp. 55-63, (1995).
Istrail et al., “Implementation of proactive threshold public-key protocol”,Saudi National Labs, Proceeding of the 1998 RSA Data Security Conference.
Herzberg et al., “Proactive Public Key and Signature Systems”,ACM Security '97, pp.
Boneh et al. “Efficient Generation of Shared RSA Keys”,Proc. Crypto '97, pp. 425-539.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for operating proactively secured applications on an... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for operating proactively secured applications on an..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for operating proactively secured applications on an... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3669221

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.