Method and apparatus for transmitting authentication...

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S017000

Reexamination Certificate

active

07100200

ABSTRACT:
The invention relates to an apparatus and for facilitating the reauthentication of a user using a client computer to a server computer. In one embodiment, the method includes the steps of receiving, by the server, confidential information during a first communication session between the server and a client, encrypting the confidential information with a key to create encrypted confidential information, and storing the encrypted confidential information in the server's memory. The method also includes the steps of transmitting, by the server, the key to the client and deleting, by the server, the key from the server's memory. When the server receives the key from the client during a second communication session, the server uses the key to decrypt the encrypted confidential information.

REFERENCES:
patent: 4924378 (1990-05-01), Hershey et al.
patent: 5204897 (1993-04-01), Wyman
patent: 5359721 (1994-10-01), Kempf et al.
patent: 5390297 (1995-02-01), Barber et al.
patent: 5412717 (1995-05-01), Fischer
patent: 5455953 (1995-10-01), Russell
patent: 5491750 (1996-02-01), Bellare et al.
patent: 5504814 (1996-04-01), Miyahara
patent: 5509070 (1996-04-01), Schull
patent: 5524238 (1996-06-01), Miller et al.
patent: 5544246 (1996-08-01), Mandelbaum et al.
patent: 5550976 (1996-08-01), Henderson et al.
patent: 5550981 (1996-08-01), Bauer et al.
patent: 5553139 (1996-09-01), Ross et al.
patent: 5557732 (1996-09-01), Thompson
patent: 5564016 (1996-10-01), Korenshtein
patent: 5592549 (1997-01-01), Nagel et al.
patent: 5604490 (1997-02-01), Blakley, III et al.
patent: 5604801 (1997-02-01), Dolan et al.
patent: 5638513 (1997-06-01), Ananda
patent: 5657390 (1997-08-01), Elgamal et al.
patent: 5666501 (1997-09-01), Jones et al.
patent: 5668999 (1997-09-01), Gosling
patent: 5689708 (1997-11-01), Regnier et al.
patent: 5729734 (1998-03-01), Parker et al.
patent: 5737416 (1998-04-01), Cooper et al.
patent: 5742757 (1998-04-01), Hamadani et al.
patent: 5774551 (1998-06-01), Wu et al.
patent: 5794207 (1998-08-01), Walker et al.
patent: 5944791 (1999-08-01), Scherpbier
patent: 5956407 (1999-09-01), Slavin
patent: 6058480 (2000-05-01), Brown
patent: 6192473 (2001-02-01), Ryan et al.
patent: 6199113 (2001-03-01), Alegre et al.
patent: 6424718 (2002-07-01), Holloway
patent: 6760752 (2004-07-01), Liu et al.
patent: 2002/0029340 (2002-03-01), Pensak et al.
patent: 0 575 765 (1993-12-01), None
patent: 0 679 980 (1995-11-01), None
patent: 0 851 628 (1998-07-01), None
patent: 2 168 831 (1986-06-01), None
patent: 97/18635 (1997-05-01), None
patent: 00/72506 (2000-11-01), None
Patent Cooperation Treaty, International Search Report, International Application No. PCT/US02/18295, mailed on Nov. 20, 2002, 3 pages.
IBM: “IBM Operating System/2 Version 1.2 Profile Validation Hooks”, pp. 1-26, Nov. 22, 1989.
N.F. Maxemchuk, S. Low, “The Use of Communications Networks to Increase Personal Privacy” fromIEEE INFOCOM'95, Proceedings, vol. 2, Apr. 2-61995, pp. 504-512.
P.Y.A. Ryan, S.A. Schneider, “An attack on a recursive authentication protocol A cautionary tale”Information Processing Letters 65, 1998 Elsevier Science B.V., pp. 7-10.
Dave Otway and Owen Rees, “Efficient and Timely Mutual Authentication”, The ANSA Project, 24 Hills Road, Cambridge CB21JP United Kingdom, pp. 8-10.
Lawrence C. Paulson, “Mechanized Proofs for a Recursive Authentication Protocol” Computer Laboratory, University of Cambridge, Pembroke Street, Cambridge CB2 3QG, England, pp. 84-94.
Li Gong, “Using One-Way Functions for Authentication” University of Cambridge Computer Laboratory, Cambridge CB2 3QG, England, Jul. 1989, pp. 8-11.
Mark Nicholson, “How To Hold Mobile Users To Account” Financial Times, Tuesday, May 2, 2000.
Tony Savvas, “Handset Giants Launch Security System” www.computerweekly.com.
Charles Seife, “Algorithmic Gladiators Vie For Digital Glory” www.sciencemag.org, Science, vol. 288, May 19, 2000, pp. 1161 & 1163.
Russell Kay, “Authentication” Computerworld, Mar. 27, 2000, pp. 77-79.
Tom Yager, “OS Paradise” BYTE, Nov. 1995.
Bridget Allison, Robert Hawley, Andrea Borr, Mark Muhlestein, David Hitz, “File System Security: Secure Network Data Sharing For NT And UNIX” Network Appliance, Inc., Tech Library, Jan. 16, 1998 pp. 1-16 (double sided).
“Network Neighborhood”, http://www.internet.com, © 1999 internet.com.
Howard Millman, “Give Your Computer the Finger”, Computerworld, Mar. 27, 2000.
B. Clifford Neuman, “Proxy-Based Authorization and Accounting for Distributed Systems”, © IEEE, May 25, 1993, pp. 283-291.
Win95 Tutorial: Index of Topics, http://orion.valencia.cc.fl.us/tutorials/Win95demo
et.html, printed Dec. 27, 1999 (2 pages).
IPEA/US, International Preliminary Examination Report, PCT Application No. PCT/US02/18295, mailed on Dec. 15, 2003, 4 pages.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for transmitting authentication... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for transmitting authentication..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for transmitting authentication... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3703696

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.