Apparatus and method for securing a distributed network
First Claim
Patent Images
1. An apparatus for secure data handling in a network, the apparatus comprising:
- a secure agent for combining a plurality of keys sourced from at least two key-sets for performing a cryptographic operation on the data sourced from at least two communication units.
1 Assignment
0 Petitions
Accused Products
Abstract
An apparatus and method for secure data handling in a distributed network is implemented by a secure agent connected by a secure channel to a primary communication unit, secondary communication unit, and clients. The primary communication unit and secondary communication units are connected to separate key-stores having keys. A method using distributed keys for encryption and decryption is disclosed. Another method utilizes multiple-time keys.
-
Citations
47 Claims
-
1. An apparatus for secure data handling in a network, the apparatus comprising:
a secure agent for combining a plurality of keys sourced from at least two key-sets for performing a cryptographic operation on the data sourced from at least two communication units. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
15. A method of encryption for secure data handling implemented over a network, the method comprising the steps of:
-
generating at least one encryption key corresponding to at least one data-block using a combination of at least two keys selected from at least two key-sets; and
encrypting said data-block with said encryption key to generate an encrypted data-block. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22)
-
-
23. A method of decryption for secure data handling implemented over a network, the method comprising the steps of:
-
generating at least one decryption key corresponding to at least one data-block using a combination of at least two keys selected from at least two key-sets, said data-block being an encrypted data-block; and
decrypting said data-block with said decryption key to generate a decrypted data-block. - View Dependent Claims (24, 25, 26, 27, 28)
-
-
29. A method of encryption for providing security against deceptive interference with communications, the method comprising steps of:
-
encrypting a data-block with at least one encryption key to generate an encrypted data-block; and
encrypting a subset of said encrypted data-block with at least one secondary key. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37, 38)
-
-
39. A method of decryption for providing security against deceptive interference with communications, the method comprising steps of:
-
decrypting a data-block with at least one decryption key to generate an non-encrypted data-block, said data-block being an encrypted data-block; and
encrypting a subset of said data-block with at least one secondary key. - View Dependent Claims (40, 41, 42, 43, 44, 45, 46, 47)
-
Specification