Codeword-enhanced peer-to-peer authentication

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S156000, C713S168000

Reexamination Certificate

active

10334765

ABSTRACT:
Peer-to-peer authentication may be accomplished by sending a digital certificate to a responder, receiving a randomized codeword in response to the sending, creating a secure fingerprint based at least in part on the digital certificate and randomized codeword, creating a first bit sequence based at least in part on a first portion of the secure fingerprint and a second portion of the randomized codeword and indicating the first digital certificate is authenticated based upon whether the first bit sequence matches a second bit sequence received from the responder via an out-of-band communication in response to the sending. The size of the first bit sequence is less than the size of the secure fingerprint. According to another aspect, the first bit sequence is compared with a rendering of the second bit sequence, using an out-of-band communication, by associating the first bit sequence with one or more indices into an array of representations.

REFERENCES:
patent: 5148479 (1992-09-01), Bird et al.
patent: 5371794 (1994-12-01), Diffie et al.
patent: 2003/0014637 (2003-01-01), Ellison et al.
patent: 2003/0163739 (2003-08-01), Armington et al.
Ka-Ping Yee, “User Interaction Design for Secure Systems”, Computer Science Department University of California Berkeley (15 pages).
Walden Harvey, “Peer-To-Peer Network User Authentication Protocol”, http://toolkit.dialog.com/intranet/cgi/present?STYLE=621875714&PRESENT=DB=349, Dec. 10, 2002, (pp. 1-16).
Alma Whitten et al, Paper—Proceedings of the 8thUSENIX Security Symposium Aug. 23-26, 1999, Washington, D.C. [Technical Program], http:/www.usenix.org/publications/library/proceedings/sec99/full—papers/whitten/whitten—... Dec. 24, 2002, (pp. 1-22).
Hur Matthew et al., “Client Side Public Key Authentication Method and Apparatus With Short-Lived Certificates”, http://toolkit.dialog.com/intranet/cgi/present?STYLE=621875714&PRESENT=DB=349, Dec. 10, 2002, (pp. 1-18).
R. Rivest, “The MD4 Message-Digest Algorithm”, Apr. 1992, MIT Laboratory for Computer Science and RSA Data Security, Inc., pp. 1-22.
R. Rivest, “The MD5 Message-Digest Algorithm”, Apr. 1992, MIT Laboratory for Computer Science and RSA Data Security, Inc., pp. 1-18.
Federal Information Processing Standards Publication 180-1, “Secure Hash Standard”, Apr. 17, 1995, pp. 1-15.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Codeword-enhanced peer-to-peer authentication does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Codeword-enhanced peer-to-peer authentication, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Codeword-enhanced peer-to-peer authentication will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3866562

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.