Codeword-enhanced peer-to-peer authentication

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S168000, C713S173000

Reexamination Certificate

active

07856556

ABSTRACT:
Peer-to-peer authentication may be accomplished by sending a digital certificate to a responder, receiving a randomized codeword in response to the sending, creating a secure fingerprint based at least in part on the digital certificate and randomized codeword, creating a first bit sequence based at least in part on a first portion of the secure fingerprint and a second portion of the randomized codeword and indicating the first digital certificate is authenticated based upon whether the first bit sequence matches a second bit sequence received from the responder via an out-of-band communication in response to the sending. The size of the first bit sequence is less than the size of the secure fingerprint. According to another aspect, the first bit sequence is compared with a rendering of the second bit sequence, using an out-of-band communication, by associating the first bit sequence with one or more indices into an array of representations.

REFERENCES:
patent: 4597057 (1986-06-01), Snow
patent: 5148479 (1992-09-01), Bird et al.
patent: 5371794 (1994-12-01), Diffie et al.
patent: 5764772 (1998-06-01), Kaufman et al.
patent: 6606040 (2003-08-01), Abdat
patent: 7243231 (2007-07-01), Ellison et al.
patent: 2003/0014637 (2003-01-01), Ellison et al.
patent: 2003/0163739 (2003-08-01), Armington et al.
Baird, Cathy, “Oracle9i Database—Globalization Support Guide”, Release 2 (9.2), Mar. 2002, Chapter 5, pp. 1/22-22/22, obtained from http://download.oracle.com/docs/cd/B10501—01/server.920/a96529/toc.htm.
Federal Information Processing Standards publication 180-1, “Secure Hash Standard”, Apr. 17, 1995, downloaded from http://www.it1.nist.gov/fipspubs/fip180-1.htm, 18 pgs.
“How PGP Works,” downloaded from http://www.pgpi.org/doc/pgpintro/, Jan. 9, 2008, 23 pgs.
Hur, Matthew et al., “Client side Public Key Authentication Method and Apparatus with Short-Lived Certificates,” downloaded from http://toolkit.dialog.com/intranet/cgi/present?STYLE=621875714&PRESENT=DB=349 . . . , Dec. 10, 2002, 18 pgs.
Rivest, R., “The MD4 Message-Digest Algorithm”, MIT Laboratory for Computer Science and RSA Data Security, Inc., Oct. 1990, pp. 1-22.
Rivest, R., “The MD5 Message-Digest Algorithm”, MIT Laboratory for Computer Science and RSA Data Security, Inc., Apr. 1992, pp. 1-18.
Waldman, Harvey, “Peer-to-Peer Network User Authentication Protocol,” downloaded from http://toolkit. Dialog.com/intranet/cgi/present?STYLE=621875714&PRESENT=DB=349 . . . , Dec. 10, 2002, 16 pgs.
Whitten, Alma et al., Paper—Proceedings of the 8thUSENIX Security Symposium, [Technical Program: Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0], Washington, DC, Aug. 23-26, 1999, Dec. 24, 2002, 22 pgs.
Yee, Ka-Ping, “User Interaction Design for Secure Systems,” Computer Science Dept., University of California, Berkeley, 15 pgs.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Codeword-enhanced peer-to-peer authentication does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Codeword-enhanced peer-to-peer authentication, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Codeword-enhanced peer-to-peer authentication will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4223055

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.