Information security – Access control or authentication – Network
Reexamination Certificate
2007-11-06
2007-11-06
Moise, Emmanuel L. (Department: 2137)
Information security
Access control or authentication
Network
C713S156000, C713S168000
Reexamination Certificate
active
10334765
ABSTRACT:
Peer-to-peer authentication may be accomplished by sending a digital certificate to a responder, receiving a randomized codeword in response to the sending, creating a secure fingerprint based at least in part on the digital certificate and randomized codeword, creating a first bit sequence based at least in part on a first portion of the secure fingerprint and a second portion of the randomized codeword and indicating the first digital certificate is authenticated based upon whether the first bit sequence matches a second bit sequence received from the responder via an out-of-band communication in response to the sending. The size of the first bit sequence is less than the size of the secure fingerprint. According to another aspect, the first bit sequence is compared with a rendering of the second bit sequence, using an out-of-band communication, by associating the first bit sequence with one or more indices into an array of representations.
REFERENCES:
patent: 5148479 (1992-09-01), Bird et al.
patent: 5371794 (1994-12-01), Diffie et al.
patent: 2003/0014637 (2003-01-01), Ellison et al.
patent: 2003/0163739 (2003-08-01), Armington et al.
Ka-Ping Yee, “User Interaction Design for Secure Systems”, Computer Science Department University of California Berkeley (15 pages).
Walden Harvey, “Peer-To-Peer Network User Authentication Protocol”, http://toolkit.dialog.com/intranet/cgi/present?STYLE=621875714&PRESENT=DB=349, Dec. 10, 2002, (pp. 1-16).
Alma Whitten et al, Paper—Proceedings of the 8thUSENIX Security Symposium Aug. 23-26, 1999, Washington, D.C. [Technical Program], http:/www.usenix.org/publications/library/proceedings/sec99/full—papers/whitten/whitten—... Dec. 24, 2002, (pp. 1-22).
Hur Matthew et al., “Client Side Public Key Authentication Method and Apparatus With Short-Lived Certificates”, http://toolkit.dialog.com/intranet/cgi/present?STYLE=621875714&PRESENT=DB=349, Dec. 10, 2002, (pp. 1-18).
R. Rivest, “The MD4 Message-Digest Algorithm”, Apr. 1992, MIT Laboratory for Computer Science and RSA Data Security, Inc., pp. 1-22.
R. Rivest, “The MD5 Message-Digest Algorithm”, Apr. 1992, MIT Laboratory for Computer Science and RSA Data Security, Inc., pp. 1-18.
Federal Information Processing Standards Publication 180-1, “Secure Hash Standard”, Apr. 17, 1995, pp. 1-15.
Bartram Linda R.
Sawadsky Nicholas J.
Colligo Networks Inc.
Moise Emmanuel L.
Popham Jeffrey D.
Thelen Reid Brown Raysman & Steiner LLP
LandOfFree
Codeword-enhanced peer-to-peer authentication does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Codeword-enhanced peer-to-peer authentication, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Codeword-enhanced peer-to-peer authentication will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3866562