Asynchronous enhanced shared secret provisioning protocol

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S168000, C380S047000

Reexamination Certificate

active

07434054

ABSTRACT:
An Asynchronous Enhanced Shared Secret Provisioning Protocol (ESSPP) provides a novel method and system for adding devices to a network in a secure manner. A registration process is launched by at least one of two network devices together. These two devices then automatically register with each other. When two devices running Asynchronous ESSPP detect each other, they exchange identities and establish a key that can later be used by the devices to mutually authenticate each other and generate session encryption keys. An out-of-band examination of registration signatures generated at the two devices can be performed to help ensure that there was not a man-in-the-middle attacker involved in the key exchange.

REFERENCES:
patent: 5625888 (1997-04-01), Ruther et al.
patent: 6263437 (2001-07-01), Liao et al.
patent: 6377804 (2002-04-01), Lintulampi
patent: 6766453 (2004-07-01), Nessett et al.
patent: 7191467 (2007-03-01), Dujari et al.
patent: 2002/0012433 (2002-01-01), Haverinen et al.
patent: 2003/0221126 (2003-11-01), Berman et al.
patent: 0254812 (1987-04-01), None
patent: 1117271 (2000-11-01), None
patent: WO 00/72499 (2000-05-01), None
B. Aboba et al., “EAP GSS Authentication Protocol”, Internet-Draft, <draft-aboba-pppext-eapgss-12.txt>, http://www.ietf.org/ietf/lid-abstracts.html, The Internet Society, Apr. 2002.
H. Haverinen, “EAP SIM Authentication”, Internet-Draft, <draft-haverinen-pppext-eap-sim-04.txt>, http://www.ietf.org/ietf/lid-abstracts.html, The Internet Society, Jun. 2002.
J. Arkko et al., “EAP AKA Authentication”, Internet-Draft, <draft-arkko-pppext-eap-aka-03.txt>, http://www.ietf.org/ietf/lid-abstracts.html, The Internet Society, Feb. 2002.
H. Andersson et al., “Protected EAP Protocol (PEAP)”, Internet-Draft, <draft-josefsson-pppext-eap-tls-eap-02.txt>, http://www.ietf.org/ietf/lid-abstracts.html, The Internet Society, Feb. 2002.
B. Aboba et al., “The EAP Keying Problem”, Internet-Draft, <draft-aboba-pppext-key-problem-01.txt>, http://www.ietf.org/ietf/lid-abstracts.html, The Internet Society, Feb. 2002.
G. Tsirtsis, “EAP over ICMP”, Internet-Draft, <draft-tsirtsis-eap-over-icmp-00.txt>, http://www.ietf.org/ietf/lid-abstracts.html, The Internet Society, Jan. 2002.
S. Josefsson, “The EAP SecurID(r) Mechanism”, Internet-Draft, <draft-josefsson-eap-securid>, http://www.ietf.org/ietf/lid-abstracts.html, The Internet Society, Feb. 2002.
D. Potter et al., “PPP EAP MS-CHAP-V2 Authentication Protocol”, Internet-Draft, <draft-dpotter-pppext-eap-mschap-01.txt>, http://www.ietf.org/ietf/lid-abstracts.html, Jan. 2002.
B. Aboba, “EAP IANA Considerations”, Internet-Draft, <draft-aboba-pppext-eap-iana-01.txt>, http://www.ietf.org/ietf/lid-abstracts.html, The Internet Society, Feb. 2002.
B. Aboba, “The Vendor-Specific EAP Method”, Internet-Draft, <draft-aboba-pppext-eap-vendor-01.txt>, http://www.ietf.org/ietf/lid-abstracts.html, The Internet Society, Feb. 2002.
P. Engelstad, “EAP over UDP (EAPoUDP)”, Internet-Draft, <draft-engelstad-pana-eap-over-udp-00.txt>, http://www.ietf.org/ietf/lid-abstracts.html, Feb. 2002.
B. Aboba et al., “Radius Support For Extensible Authentication Protocol (EAP)”, Internet-Draft, <draft-aboba-radius-rfc2869bis-02.txt>, http://www.ietf.org/ietf/lid-abstracts.html, The Internet Society, May 2002.
B. Payne, “Extensible Authentication Protocol State Machine”, Internet-Draft, <draft-payne-eap-sm-00.txt>, http://www.ietf.org/ietf/lid-abstracts.html, The Internet Society, May 2002.
P. Funk et al., “EAP Tunneled TLS Authentication Protocol (EAP-TTLS)”, Internet-Draft, <draft-ietf-pppext-eap-ttls-01.txt>, http://www.ietf.org/ietf/lid-abstracts.html, The Internet Society, Aug. 2001.
L. Blunk et al., “Extensible Authentication Protocol (EAP)”, Internet-Draft, <draft-ietf-pppext-rfc2284bis-04.txt>, http://www.ietf.org/ietf/lid-abstracts.html, The Internet Society, Apr. 2002.
W. Simpson, “The Point-to-Point Protocol (PPP)”, Network Working Group, Jul. 1994.
L. Blunk et al., “PPP Extensible Authentication Protocol (EAP)”, Network Working Group, Mar. 1998 (XP-002239395).
B. Aboba et al., “PPP EAP TLS Authentication Protocol”, Network Working Group, Oct. 1999.
XP-002296898, “Shared Secret Provisioning Protocol,” by R. Moskowitz, ICSA Labs, Jan. 2003, pp. 1-6.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Asynchronous enhanced shared secret provisioning protocol does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Asynchronous enhanced shared secret provisioning protocol, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Asynchronous enhanced shared secret provisioning protocol will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4001852

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.