Authentication methods and apparatus utilizing hash chains

Telecommunications – Radiotelephone system – Zoned or cellular telephone system

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S168000, C713S172000, C713S178000, C713S189000, C726S012000, C380S270000, C380S258000, C380S277000

Reexamination Certificate

active

07848746

ABSTRACT:
A first processing device, which may be, for example, a wireless authentication token or an RFID tag, comprises a memory, a processor coupled to the memory, and interface circuitry coupled to the processor. The processor is operative to control the output of authentication information via the interface circuitry, where the authentication information comprises a sequence of values corresponding to images of a hash chain. A given one of the values of the sequence is utilized by a second processing device to generate a modified value suitable for providing joint authentication of the first and second processing devices.

REFERENCES:
patent: 5657388 (1997-08-01), Weiss
patent: 7039021 (2006-05-01), Kokudo
patent: 2003/0014637 (2003-01-01), Ellison et al.
patent: 2004/0222878 (2004-11-01), Juels
patent: 2006/0137015 (2006-06-01), Fahrny et al.
J. Zheng et al., “Will IEEE 802.15.4 Make Ubiquitous Networking a Reality?: A Discussion on a Potential Low Power, Low Bit Rate Standard,” IEEE Communications Magazine, Topics in Emerging Technologies, Jun. 2004, pp. 140-146.
J-H. Hoepman, “The Ephemeral Pairing Problem,” Financial Cryptography '04, Lecture Notes in Computer Science, 2004, pp. 1-15, Springer-Verlag.
F. Stajano et al., “The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks,” 7th International Workshop Proceedings on Security Protocols, Lecture Notes in Computer Science, 1999, pp. 1-11, vol. 1796, Springer-Verlag.
G. Itkis et al., “Intrusion-Resilient Signatures, or Towards Obsoletion of Certificate Revocation,” Advances in Cryptology—CRYPTO '02, 2002, pp. 1-16, Springer-Verlag.
M. Jakobsson, “Fractal Hash Sequence Representation and Traversal,” Proceedings of the 2002 IEEE International Symposium on Information Theory (ISIT '02), 2002, pp. 1-8.
D. Boneh et al., “Identity-Based Encryption from the Weil Pairing,” Lecture Notes in Computer Science: Advances in Cryptology—CRYPTO 2001, 2001, pp. 1-27.
J. Hastad et al., “Funkspiel Schemes: An Alternative to Conventional Tamper Resistance,” Seventh ACM Conference on Computer and Communications Security, 2000, 9 pages.
Microsoft Corporation, “Scanning 802.11 Networks,” Microsoft Developer Network Library, 2007, pp. 1-3.
“Introduction to the Win32 NDIS API,” Rawether.net, Printing Communications Associates, Inc., 2007, pp. 1-2.
Ensure Technologies, “XyLoc for the Healthcare Industry,” www.ensuretech.com, 2004, 5 pages.
Privaris, “plusID Universal Biometric Device,” www.privaris.com, 2006, 2 pages.
Privaris, “Achieving Universal Secure Identity Verification with Convenience and Personal Privacy,” A Privaris Business White Paper, Dec. 11, 2006, 9 pages, Version 0.1.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Authentication methods and apparatus utilizing hash chains does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Authentication methods and apparatus utilizing hash chains, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Authentication methods and apparatus utilizing hash chains will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4180931

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.