Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Patent
1997-08-22
1999-09-28
Palys, Joseph E.
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
709227, G06F 1100, H04K 100
Patent
active
059580534
ABSTRACT:
The protocol of the present invention includes two new first level protocols and several embodiments of a second level protocol. The two new first level protocols of the present invention include the TCP2B protocol and the TCP2E protocol. In the TCP2B protocol, both client and server indicate their support for this protocol using one or more bits in TCP header. According to the TCP2B protocol, the client retransmits its requested options in the ACK message so the server need not store the options after the connection request. In the TCP2E protocol, the server maintains a Friends Table listing addresses of device recently observed to be complying with TCP. If a client's address is on the Friends Table, the connection request is processed according to TCP. Otherwise, the server sends an ACK message to the client to prompt the client to send a reset message. The client's address can then be added to the Friends Table.
REFERENCES:
patent: 5311593 (1994-05-01), Carmi
patent: 5511122 (1996-04-01), Atkinson
patent: 5572678 (1996-11-01), Homma et al.
patent: 5675740 (1997-10-01), Heimsoth et al.
patent: 5684951 (1997-11-01), Goldman et al.
patent: 5754752 (1998-05-01), Sheh et al.
Brown et al. "Secure File Transfer Over TCO/IP", IEEE Region 10 Conf. pp. 494-498, Nov. 1992.
Ramaswamy, "A Security Archictecture and Mechanism for Data Confidentiuality in TCP/IP Protocols", SEcurity and Privacy, IEEE Symposium, pp. 249-259, 1990.
Stallings "IPV6: The New Internet Protocol", IEEE Communications Magazine, pp. 96-108, Jul. 1996.
Guha et al., "Network Security via Reverse Engineering of TCP Code: Vulnerability Analysis and Proposed Solutions" Infocom, IEEE, pp. 603-610, 1996.
RCF793, Transmission Control Protocol, DARPA Internet Program Protocol Specification, Sep., 1981, pp. 1-85.
"IP-Spoofing Demystified, Trust-Relationship Exploitation," Phrack Magazine, vol. 7, Issue Forty-eight, Jun., 1996, pp. 1-9.
Statements from Public Access Networks Corporation (PANIX), Sep., 1996, one page.
Syncookies Mailing List Archives, pp. 1-15.
Bellovin, S.M., Security Problems in the TCP/IP Protocol Suite, Computer Communications Review, vol. 19, No. 2, Apr. 1, 1989, pp. 32-48.
Reid, J., Open Systems Security, Traps and Pitfalls, Computers & Security International Journal Devoted to the Study of Technical and Financial Aspects of Computer Security, vol. 14, No. 6, Jan. 1, 1995.
Guha, B., et al., Network Security via Reverse Engineering of TCP Code: Vulnerability Analysis and Proposed Solutions, Proceedings of IEEE Infocom 1996, Conference on Computer Communications, Mar. 24-28, 1996, vol. 2, No. conf. 15, Mar. 24, 1996, Institute of Electrical and Electronics Engineers, pp. 603-610.
Hastings, N.E., et al., TCP/IP Spoofing Fundamentals, Proceedings of the 1996 IEEE Fifteenth Annual International Phoenix Conference on Computers and Communications, Scottsdale, Mar. 27, 1996 No. conf. 15, Mar. 27-29, 1996, Institute of Electrical and Electronics Engineers, pp. 218-224.
AT&T Corp.
Palys Joseph E.
LandOfFree
Communications protocol with improved security does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Communications protocol with improved security, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Communications protocol with improved security will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-697855