International cryptography framework
First Claim
1. An international cryptography framework, comprising:
- a national flag card adapted to accommodate at least one defining parameter of any encryption scheme required by a particular national policy without affecting user system hardware, software, or data structures beyond anticipated adaptation.
2 Assignments
0 Petitions
Accused Products
Abstract
A cryptographic framework consists of four basic service elements that include a national flag card, a cryptographic unit, a host system, and a network security server. Three of the four service elements have a fundamentally hierarchical relationship. The National Flag Card (NFC) is installed into the Cryptographic Unit (CU) which, in turn, is installed into a Host System (HS). Cryptographic functions on the Host System cannot be executed without a Cryptographic Unit, which itself requires the presence of a valid National Flag Card before it'"'"'s services are available. The fourth service element, a Network Security Server (NSS), can provide a range of different security services including verification of the other three service elements. The framework addresses national policies governing cryptography, where such policies can be independently developed and maintained using a such a framework. Furthermore, the common service elements provide the necessary focus for establishing interoperability while reconciling these different National policies.
-
Citations
20 Claims
-
1. An international cryptography framework, comprising:
a national flag card adapted to accommodate at least one defining parameter of any encryption scheme required by a particular national policy without affecting user system hardware, software, or data structures beyond anticipated adaptation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
15. A cryptographic function for an international cryptography framework that includes a cryptographic unit, said cryptographic function comprising:
a national flag card for accommodating at least one defining parameter of a cryptographic scheme as required by a particular national policy without affecting user system hardware, software, or data structures beyond anticipated adaptation. - View Dependent Claims (16, 17, 18, 19, 20)
Specification