Authentication protocol for network security services

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S002000, C726S003000, C726S011000

Reexamination Certificate

active

07941830

ABSTRACT:
In one embodiment, an authentication protocol used in a network security service is performed over non-secure connection, such as HTTP. A router subscribing to the service may send a service request for information about a URL to a server computer providing the service. The service request may be included in a first data set posted by the router to the server computer. The first data set may be described by an HTML form and include an encrypted device authenticator used by the server computer to validate the router. The first data set may further include a server authentication code. In responding to the service request, the server computer returns the server authentication code to the router along with information about the URL. The response may be in a second data set, such as an XML document sent by the server computer to the router over an HTTP connection.

REFERENCES:
patent: 5623600 (1997-04-01), Ji et al.
patent: 6195587 (2001-02-01), Hruska et al.
patent: 6938097 (2005-08-01), Vincent et al.
patent: 7010807 (2006-03-01), Yanovsky
patent: 7545748 (2009-06-01), Riddle
patent: 2002/0052968 (2002-05-01), Bonefas et al.
patent: 2004/0015725 (2004-01-01), Boneh et al.
patent: 2004/0078604 (2004-04-01), Rice et al.
patent: 2005/0120221 (2005-06-01), Arnold et al.
patent: 2007/0162766 (2007-07-01), Watanabe
Microsoft Computer Dictionary, Fifth Edition, May 1, 2002.
What is SSL and what are Certificates?, SSL Certificates HOWTO, 6 sheets [retrieved on Oct. 28, 2006]. Retrieved from the internet: http://tldp.org/HOWTO/SSL-Certificates-HOWTO/×64.html.
Microsoft TechNet, “Unsolicited Commercial E-Mail Prevention and Filtering Performance Analysis”, Jan. 1999, pp. 1-14, [retrieved on Nov. 2, 2006]. Retrieved from the internet: http://www.microsoft.com/technet/archive/mcis/rkspmcpa.mspx?pf=true.
Martin Roesch, “Snort-Lightweight Intrusion Detection for Networks”, 13thLISA Conference, 1999, 17 sheets, pp. 229-238 of the Proceeding, [retrieved on Nov. 2, 2006]. Retrieved from the internet: http://www.usenix.org/events/lisa99/full—papers/roesch/roesch—html/.
John Wack, et al. “Guide to Firewall Selection and Policy Recommendations”, Oct. 2001, pp. 1-63, NIST Special Publication X-X, National Institute of Standards and Technology, U.S. Department of Commerce.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Authentication protocol for network security services does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Authentication protocol for network security services, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Authentication protocol for network security services will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2676601

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.