Authenticated and metered flow control method

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S154000, C726S002000, C726S011000, C726S013000, C380S277000

Reexamination Certificate

active

07398398

ABSTRACT:
An authenticated and metered flow control method provides a network interface with the capability to determine the authenticity of programs used to generate and send data packets, thereby ensuring that users who send data packets are well behaved. The method is based on using a hidden program that was obfuscated into the program used for generating and sending data packets. More specifically, the hidden program generates a pseudo random sequence of security signals that are included in the sequence of data packets that are sent from the user to the network interface. Only the network interface knows how the pseudo random sequence of security signals was generated, and therefore, the network interface is able to check the validity of the pseudo random sequence of security signals, and thereby verify the authenticity of the programs used to generate and send data packets.

REFERENCES:
patent: 6085249 (2000-07-01), Wang et al.
patent: 6154839 (2000-11-01), Arrow et al.
patent: 2003/0037235 (2003-02-01), Aziz et al.
Derek Atkins et al., “Internet Security: Professional Reference,” Book & CD-ROM Edition, Feb. 1996, ISBN: 1562055577, New Riders Publishing, Indianapolis, IN, USA.
Andrew S. Tanenbaum, “Computer Networks,” Third Edition, Mar. 1996, ISBN: 0133499456, Prentice Hall PTR, Upper Saddle River, NJ, USA.
Douglas Comer, “Internetworking with TCP/IP: Principles, Protocols, and Architecture,” Apr. 1988, ISBN: 0134701542, Prentice-Hall, Englewood Cliffs, NJ, USA.
W. Richard Stevens, “TCP/IP Illustrated, vol. 1: The Protocols,” Dec. 1993, ISBN: 0201633469, Addison-Wesley, USA.
Elizabeth D. Zwicky et al., “Building Internet Firewalls,” Second Edition, Jan. 15, 2000, ISBN: 01565928717, O'Reilly & Associates, USA.
Bruce Schneier, “Applied Cryptography: Protocols, Algorithms, and Source Code in C,” Second Edition, Oct. 18, 1995, ISBN: 0471117099, John Wiley & Sons, New York, NY, USA.
Alfred J. Menezes et al., “Handbook of Applied Cryptography,” Oct. 1996, ISBN: 0849385237, CRC Press, USA.
Christian Collberg et al., “Manufacturing Cheap, Resilient and Stealthy Opaque Constructs,”Principles of Programming Languages(POPL), 1998, pp. 184-196, Association for Computing Machinery (ACM), USA.
Christian Collberg et al., “Watermarking, Tamper-Proofing, and Obfuscation—Tools for Software Protection,”University of Arizona Computer Science Technical Report,Feb. 10, 2000, vol.-issue: 03, University of Arizona, Tucson, AZ, USA.
Christian Collberg et al., “A Taxonomy of Obfuscating Transformations,”Technical Report1997, vol.-issue: 148, University of Auckland Department of Computer Science, Auckland, New Zealand.
Enriquillo Valdez et al., “Software DisEngineering: Program Hiding Architecture and Experiments,”Information Hiding 1999, 1999, pp. 379-394, Springer Verlag Lectures in Computer Science, Heidelberg, Germany.
Enriquillo Valdez et al., “Dissect: DIStribution for SECurity Tool,”ISC2001, 2001, pp. 125-143, Springer Verlag Lectures in Computer Science LNCS2200, Heidelberg, Germany.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Authenticated and metered flow control method does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Authenticated and metered flow control method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Authenticated and metered flow control method will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2742561

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.