Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2007-10-22
2010-12-21
Popham, Jeffrey D (Department: 2437)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S168000, C713S173000
Reexamination Certificate
active
07856556
ABSTRACT:
Peer-to-peer authentication may be accomplished by sending a digital certificate to a responder, receiving a randomized codeword in response to the sending, creating a secure fingerprint based at least in part on the digital certificate and randomized codeword, creating a first bit sequence based at least in part on a first portion of the secure fingerprint and a second portion of the randomized codeword and indicating the first digital certificate is authenticated based upon whether the first bit sequence matches a second bit sequence received from the responder via an out-of-band communication in response to the sending. The size of the first bit sequence is less than the size of the secure fingerprint. According to another aspect, the first bit sequence is compared with a rendering of the second bit sequence, using an out-of-band communication, by associating the first bit sequence with one or more indices into an array of representations.
REFERENCES:
patent: 4597057 (1986-06-01), Snow
patent: 5148479 (1992-09-01), Bird et al.
patent: 5371794 (1994-12-01), Diffie et al.
patent: 5764772 (1998-06-01), Kaufman et al.
patent: 6606040 (2003-08-01), Abdat
patent: 7243231 (2007-07-01), Ellison et al.
patent: 2003/0014637 (2003-01-01), Ellison et al.
patent: 2003/0163739 (2003-08-01), Armington et al.
Baird, Cathy, “Oracle9i Database—Globalization Support Guide”, Release 2 (9.2), Mar. 2002, Chapter 5, pp. 1/22-22/22, obtained from http://download.oracle.com/docs/cd/B10501—01/server.920/a96529/toc.htm.
Federal Information Processing Standards publication 180-1, “Secure Hash Standard”, Apr. 17, 1995, downloaded from http://www.it1.nist.gov/fipspubs/fip180-1.htm, 18 pgs.
“How PGP Works,” downloaded from http://www.pgpi.org/doc/pgpintro/, Jan. 9, 2008, 23 pgs.
Hur, Matthew et al., “Client side Public Key Authentication Method and Apparatus with Short-Lived Certificates,” downloaded from http://toolkit.dialog.com/intranet/cgi/present?STYLE=621875714&PRESENT=DB=349 . . . , Dec. 10, 2002, 18 pgs.
Rivest, R., “The MD4 Message-Digest Algorithm”, MIT Laboratory for Computer Science and RSA Data Security, Inc., Oct. 1990, pp. 1-22.
Rivest, R., “The MD5 Message-Digest Algorithm”, MIT Laboratory for Computer Science and RSA Data Security, Inc., Apr. 1992, pp. 1-18.
Waldman, Harvey, “Peer-to-Peer Network User Authentication Protocol,” downloaded from http://toolkit. Dialog.com/intranet/cgi/present?STYLE=621875714&PRESENT=DB=349 . . . , Dec. 10, 2002, 16 pgs.
Whitten, Alma et al., Paper—Proceedings of the 8thUSENIX Security Symposium, [Technical Program: Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0], Washington, DC, Aug. 23-26, 1999, Dec. 24, 2002, 22 pgs.
Yee, Ka-Ping, “User Interaction Design for Secure Systems,” Computer Science Dept., University of California, Berkeley, 15 pgs.
Bartram Linda R.
Sawadsky Nicholas J.
McDonnell Boehnen & Hulbert & Berghoff LLP
Popham Jeffrey D
LandOfFree
Codeword-enhanced peer-to-peer authentication does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Codeword-enhanced peer-to-peer authentication, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Codeword-enhanced peer-to-peer authentication will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4223055