Patents by Inventor Charles W. Kaufman

Charles W. Kaufman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 5540860
    Abstract: The present invention relates to a process for producing a gel-free dispersion or solution of copper pyrithione employing at least one surfactant. Also claimed is the dispersion or solution itself, as well as a solid particulate copper pyrithione composition comprising copper pyrithione particles having a particle shape selected from the group consisting of rods, spheres, needles, platelets and combinations thereof, and optionally containing at least a trace amount of a surfactant on the outer surface of at least a portion of said particles.
    Type: Grant
    Filed: February 28, 1994
    Date of Patent: July 30, 1996
    Assignee: Olin Corporation
    Inventors: Saeed M. Hosseini, Charles W. Kaufman, Patrick Hobbs, John J. Jardas, Murray A. Ruggiero, Shoaib Arif
  • Patent number: 5500860
    Abstract: An apparatus for forwarding a data packet from a first link to a second link is disclosed. The apparatus is coupled with a plurality of computer networks through ports on the apparatus. The apparatus maintains a spanning tree list indicating which of the apparatus ports are active. The apparatus receives a packet, and determines if the packet was received from a port that is active. If the packet was received from a port that is not active, the packet is discarded. If the packet is not discarded, the data link source address of the packet is stored in a database within the apparatus for the computer network coupled with the port from which the packet was received. The apparatus then decides, responsive to a contents of a data link destination address field in the packet, whether to forward the packet as a bridge or to forward the packet as a router.
    Type: Grant
    Filed: June 14, 1991
    Date of Patent: March 19, 1996
    Assignee: Digital Equipment Corporation
    Inventors: Radia J. Perlman, Alan J. Kirby, Floyd J. Backes, Charles W. Kaufman
  • Patent number: 5497421
    Abstract: Apparatus for protecting the confidentiality of a user's password during a remote login authentication exchange between a user node and a directory service node of a distributed, public key cryptography system includes a specialized server application functioning as an intermediary agent for the login procedure. The login agent has responsibility for approving the user's login attempt and distributing a private key to the user. However, the login agent is not trusted with the user's password and is therefore a "semi-trusted" node. In another aspect of the invention, a login protocol enables remote authentication of the user password without transmitting the password over the network.
    Type: Grant
    Filed: September 28, 1994
    Date of Patent: March 5, 1996
    Assignee: Digital Equipment Corporation
    Inventors: Charles W. Kaufman, Morrie Gasser, Butler W. Lampson, Joseph J. Tardo, Kannan Alagappan
  • Patent number: 5491752
    Abstract: An improved security system inhibits eavesdropping, dictionary attacks, and intrusion into stored password lists. In one implementation, the user provides a workstation with a "password", and a "token" obtained from a passive authentication token generator. The workstation calculates a "transmission code" by performing a first hashing algorithm upon the password and token. The workstation sends the transmission code to the server. Then, the server attempts to reproduce the transmission code by combining passwords from a stored list with tokens generated by a second identical passive authentication token generator just prior to receipt of the transmission code. If any password/token combination yields the transmission code, the workstation is provided with a message useful in communicating with a desired computing system; the message is encrypted with a session code calculated by applying a different hashing algorithm to the password and token.
    Type: Grant
    Filed: September 2, 1994
    Date of Patent: February 13, 1996
    Assignee: Digital Equipment Corporation, Patent Law Group
    Inventors: Charles W. Kaufman, Radia J. Pearlman, Morrie Gasser
  • Patent number: 5483598
    Abstract: An encryption system employing a one-time key-pad uses a shared secret number and a one-way hash function with which both the originator and recipient of a message generate successive segments of a key-pad to encrypt and decrypt the message respectively. In one arrangement each key-pad segment is generated by applying the hash function to a combination of the secret number and the previous key-pad segment. In the other embodiment of the invention, each key-pad section is generated by applying the one-way hash function to a combination of the secret number and a corresponding segment of the ciphertext version of the message.
    Type: Grant
    Filed: July 1, 1993
    Date of Patent: January 9, 1996
    Assignee: Digital Equipment Corp., Patent Law Group
    Inventors: Charles W. Kaufman, Radia J. Perlman
  • Patent number: 5475763
    Abstract: A signature system, such as an El Gamal or DSS system, involving the use of a long-term secret number and a per-message secret number generates the per-message secret number without the use of a random number generator or non-volatile storage. The per-message secret number is generated by applying a one-way hash function to a combination of the long-term secret number and the message itself.
    Type: Grant
    Filed: February 28, 1994
    Date of Patent: December 12, 1995
    Assignee: Digital Equipment Corp., Patent Law Group
    Inventors: Charles W. Kaufman, Radia J. Perlman
  • Patent number: 5434855
    Abstract: A novel mechanism prevents interleaving of packet cells from different source nodes on the same multicast port group at switches of a multicast virtual circuit in a cell-switched network: however, different cells bound for different multicast port groups may be interleaved. The mechanism comprises specific routing information that is stored in each multicast group port entry of a forwarding table located within each switch of the multicast virtual circuit. The forwarding table also stores information relating to each multicast port group including a virtual circuit value for each port of the multicast group. The specific routing information is provided for each multicast port group entry to notify the switch when data traffic for a particular packet is pending through a port of the multicast group and when that data traffic ceases, i.e., when the "end-of-packet" is reached. This ensures that the packets may be correctly reassembled at the destination nodes.
    Type: Grant
    Filed: October 28, 1994
    Date of Patent: July 18, 1995
    Assignee: Digital Equipment Corporation, Patent Law Group
    Inventors: Radia J. Perlman, Charles W. Kaufman, Robert E. Thomas, William R. Hawe
  • Patent number: 5418854
    Abstract: Apparatus for protecting the confidentiality of a user's password during a remote login authentication exchange between a user node and a directory service node of a distributed, public key cryptography system includes a specialized server application functioning as an intermediary agent for the login procedure. The login agent has responsibility for approving the user's login attempt and distributing a private key to the user. However, the login agent is not trusted with the user's password and is therefore a "semi-trusted" node. In another aspect of the invention, a login protocol enables remote authentication of the user password without transmitting the password over the network.
    Type: Grant
    Filed: April 28, 1992
    Date of Patent: May 23, 1995
    Assignee: Digital Equipment Corporation
    Inventors: Charles W. Kaufman, Morrie Gasser, Butler W. Lampson, Joseph J. Tardo, Kannan Alagappan
  • Patent number: 5418781
    Abstract: A novel switch architecture maintains the sequence of packet cells, received at one port of a multicast port group, during subsequent transfer of the cells to the remaining ports of the group. The novel architecture includes a 2-stage buffering arrangement whereby the first stage comprises a plurality of local buffers, each associated with a port of the switch, and the second stage comprises a single, global buffer. Each local buffer services its associated port of the multicast port group by temporarily storing incoming packet cells until a complete packet is received at that port, at which time the packet cells may be passed to the global buffer as outgoing cells. The global buffer services the remaining ports of the multicast port group by forwarding copies of the outgoing cells, in sequence, to those ports.
    Type: Grant
    Filed: August 2, 1994
    Date of Patent: May 23, 1995
    Assignee: Digital Equipment Corporation
    Inventors: Charles W. Kaufman, Radia J. Perlman
  • Patent number: 5373559
    Abstract: An improved security system inhibits eavesdropping, dictionary attacks, and intrusion into stored password lists. In one implementation, the user provides a workstation with a "password", and a "token" obtained from a passive authentication token generator. The workstation calculates a "transmission code" by performing a first hashing algorithm upon the password and token. The workstation sends the transmission code to the server. Then, the server attempts to reproduce the transmission code by combining passwords from a stored list with tokens generated by a second identical passive authentication token generator just prior to receipt of the transmission code. If any password/token combination yields the transmission code, the workstation is provided with a message useful in communicating with a desired computing system; the message is encrypted with a session code calculated by applying a different hashing algorithm to the password and token.
    Type: Grant
    Filed: March 18, 1993
    Date of Patent: December 13, 1994
    Inventors: Charles W. Kaufman, Radia J. Pearlman, Morrie Gasser
  • Patent number: 5351295
    Abstract: A secure arrangement in which stations in a communications network are informed of the addresses of their neighbors by means of identifying messages transmitted by the stations. To prevent the insertion of illegitimate stations into the network, the system makes use of passwords included in the station-identifying messages. In networks where eavesdropping is possible, the passwords are encrypted versions of the identities of the stations transmitting the messages and in systems where stations can also be impersonated, the encrypted passwords also include time stamps.
    Type: Grant
    Filed: July 1, 1993
    Date of Patent: September 27, 1994
    Assignee: Digital Equipment Corporation
    Inventors: Radia J. Perlman, Charles W. Kaufman
  • Patent number: 5261002
    Abstract: A technique for issuing and revoking user certificates of authenticity in a public key cryptography system, wherein certificates do not need expiration dates, and the inconvenience and overhead associated with routine certificate renewals are minimized or avoided entirely. A Certification Authority issues certificates as required, and issues a blacklist having a start date, an expiration date, and an entry for every invalid certificate issued after the start date. Users assume that every certificate issued prior to the blacklist start date is invalid, and that invalid certificates issued after the start date will be included in the current blacklist. A new blacklist is issued prior to expiration of the current one, and the blacklist start date is changed only when the blacklist becomes unmanageably long.
    Type: Grant
    Filed: March 13, 1992
    Date of Patent: November 9, 1993
    Assignee: Digital Equipment Corporation
    Inventors: Radia J. Perlman, Charles W. Kaufman
  • Patent number: 5235644
    Abstract: A decryption method, and associated cryptographic processor, for performing in-line decryption of information frames received from a communication network through a first in-line processing stage. As an information packet is streamed into the cryptographic processor, a determination is made to an acceptable level of probability whether the packet contains data that should be decrypted. The decision whether or not decrypt is made by analyzing the incoming packet header, recognizing a limited number of packet formats, and further parsing the packet to locate any encrypted data and to make sure that the packet is not a segment of a larger message. Falsely decrypted packets are looped back through the cryptographic processor, to regenerate the data that was falsely decrypted. Decryption and encryption are performed in such a manner that a false decryption is completely reversible without loss of data.
    Type: Grant
    Filed: June 29, 1990
    Date of Patent: August 10, 1993
    Assignee: Digital Equipment Corporation
    Inventors: Amar Gupta, Butler W. Lampson, William R. Hawe, Joseph J. Tardo, Charles W. Kaufman, Mark F. Kempf, Morrie Gasser, B. J. Herbison
  • Patent number: 5224163
    Abstract: A method for delegating authorization from one entity in a distributed computing system to another for a computing session is disclosed wherein a session public/private encryption key pair is utilized for each computing session. The private encryption key is erased to terminate the computing session.
    Type: Grant
    Filed: September 28, 1990
    Date of Patent: June 29, 1993
    Assignee: Digital Equipment Corporation
    Inventors: Morrie Gasser, Andrew C. Goldstein, Charles W. Kaufman, Butler W. Lampson
  • Patent number: 5220604
    Abstract: A method for denying a first group access to a system resource wherein a second group is selected such that the first group is a subgroup of the second group. Access is granted only to those members of the second group who do not derive their membership in the second group through their membership in the first group.
    Type: Grant
    Filed: September 28, 1990
    Date of Patent: June 15, 1993
    Assignee: Digital Equipment Corporation
    Inventors: Morrie Gasser, Andrew C. Goldstein, Charles W. Kaufman
  • Patent number: 5128926
    Abstract: Stored information used for routing packets of a network of nodes interconnected by links. A link state packet is sent to the first node indicating the states of links connected to some given node in the network. At the first node, an attempt is made to derive from the link state packet sent in step (a), the states of the links. If the states of fewer than all of the links connected to the given node are derived in step (b), the stored information used for routing packets is updated using the derived link states without regard to other link state packets sent to the first node. Another aspect features organizing, at a node in a network of nodes interconnected by links, a database of entries concerning respective links, by (a) providing indicators associated with the entries, (b) when a link becomes inoperable, setting or clearing the indicator associated with the entry related to the link, and (c) when the link becomes operable, clearing or setting the indicator.
    Type: Grant
    Filed: March 21, 1990
    Date of Patent: July 7, 1992
    Assignee: Digital Equipment Corporation
    Inventors: Radia J. Perlman, Ross Callon, Charles W. Kaufman
  • Patent number: 5086469
    Abstract: A method for selective disclosure of the identity of a communication protocol under which an information packet originated, but without incorrectly identifying the protocol in a header accompanying the packet. If there is a need to conceal the identity of the underlying source protocol, a special anonymous protocol identifier is used, instead of the real protocol identifier, in the header of an encrypted information packet. Network monitors can then still provide accurate information concerning traffic on the network, without having this information distorted by the use of incorrect communication protocols. If there is a desire to reveal the underlying protocol, a subnetwork protocol frame format is used to store the protocol identity and signify whether the packet is encrypted. A packet that is of a non-subnetwork protocol can be encapsulated with a subnetwork header containing a special code signifying that there is an encapsulated packet and containing the original protocol identifier.
    Type: Grant
    Filed: June 29, 1990
    Date of Patent: February 4, 1992
    Assignee: Digital Equipment Corporation
    Inventors: Amar Gupta, Charles W. Kaufman, Mark F. Kempf, G. Paul Koning
  • Patent number: 5081678
    Abstract: The nodes in a computer network utilize an encrypted key as a key identifier in a data packets transferred between nodes which eliminates the need for a receiving node to perform a memory look up operation to ascertain the key used to encrypt the data. Each node is provided with a master key that is unique to each node. When two nodes want to establish communications they first negotiate a shared key. This shared key is then encrypted under each nodes' master key. The nodes then exchange their respective encrypted key. The encrypted key of the receiving node is placed in the data packet to be sent by the transmitting node. Upon receiving a data packet, the receiving node decrypts the encrypted key to determine the shared key. This shared key is then used to decrypt encrypted data in the data packet.
    Type: Grant
    Filed: June 28, 1989
    Date of Patent: January 14, 1992
    Assignee: Digital Equipment Corporation
    Inventors: Charles W. Kaufman, B. J. Herbison
  • Patent number: 5070528
    Abstract: A method and related cryptographic processing apparatus for handling information packets that are to be cryptographically processed prior to transmission onto a communication network, or that are to be locally cryptographically processed and looped back to a node processor. A special cryptographic preamble is included in each information packet that is to be subject to cryptographic processing. The cryptographic preamble contains an offset value pointing to the starting location of information that is to be processed, and completely defines the type of cryptographic processing to be performed. The cryptographic processor can then perform the processing as specified in the preamble without regard to a specific protocol. If the packet is to be transmitted onto the network, the preamble is stripped from the packet after cryptographic processing, so that the formats of packets transmitted onto the network will be unaffected by the preamble.
    Type: Grant
    Filed: June 29, 1990
    Date of Patent: December 3, 1991
    Assignee: Digital Equipment Corporation
    Inventors: William R. Hawe, Joseph J. Tardo, Charles W. Kaufman, Amar Gupta, Barry A. Spinney, Gregory M. Waters
  • Patent number: 5018137
    Abstract: A method for improving communications in a bridge network between end nodes involving sensing trunking configurations and executing binding schemes to make certain daughter bridges involved in the trunking conditions behave as a plurality of bridges and forward messages in the correct time sequence. This can be done by creating "forwarding groups" associating different groups of networks connected to those daughter bridges.
    Type: Grant
    Filed: October 16, 1990
    Date of Patent: May 21, 1991
    Assignee: Digital Equipment Corporation
    Inventors: Floyd J. Backes, George Varghese, Charles W. Kaufman