Cryptographic peer discovery, authentication, and...

Information security – Policy

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S012000, C713S153000, C713S168000

Reexamination Certificate

active

07350227

ABSTRACT:
A method is disclosed for cryptographic peer discovery, authentication, and authorization. According to one embodiment, a data packet, which is addressed to a destination device other than an intermediary network device, is intercepted at the intermediary network device. The data packet contains a request and a group identifier. A shared secret cryptographic key, which is mapped to the group identifier, is selected. A challenge is sent toward an upstream device from whence the data packet came. A response is received. A verification value is generated based on the cryptographic key and the challenge. It is determined whether the response matches the verification value. If the response matches the verification value, then it is determined whether the request is allowed by an authorization set that is mapped to the group identifier. If the request is allowed, then a policy of the intermediary network device is configured based on the request.

REFERENCES:
patent: 5268962 (1993-12-01), Abadi et al.
patent: 5668878 (1997-09-01), Brands
patent: 5961601 (1999-10-01), Iyengar
patent: 5963915 (1999-10-01), Kirsch
patent: 6134592 (2000-10-01), Montulli
patent: 6253326 (2001-06-01), Lincke et al.
patent: 6263437 (2001-07-01), Liao et al.
patent: 6496932 (2002-12-01), Trieger
patent: 6904521 (2005-06-01), Jivsov
patent: 6938171 (2005-08-01), Isomichi et al.
patent: 2004/0015725 (2004-01-01), Boneh et al.
patent: 2004/0030925 (2004-02-01), Raheman
patent: 2005/0154873 (2005-07-01), Cam-Wing et al.
Baker, F. et al. “RSVP Cryptographic Authentication”, RFC 2747, Jan. 2000, <ftp://ftp.rfc-editor.org/in-notes/rfc2747.txt>.
Braden, R. et al. “Resource ReSerVation Protocol (RSVP)—Version 1 Functional Specification”, RFC 2205, Sep. 1997, <ftp://ftp.rfc-editor.org/in-notes/rfc2205.txt>.
Herzog, S. “RSVP Extensions for Policy Control”, RFC 2750, Jan. 2000, <ftp://ftp.rfc-editor.org/in-notes/rfc2750.txt>.
Baker, F. et al., “RSVP Cryptographic Authentication,” Network Working Group, Request for Comments: 2747, Jan. 2000, located at http://www.ietf.org/rfc/rfc2747.txt?number=2747, retrieved on Aug. 2, 2005, pp. 1-20. (Reference provided on enclosed CD-ROM).
Berners-Lee, T. et al., “Hypertext Markup Language—2.0,” Nov. 1995, Network Working Group, Request for Comments: 1866, located at http://www.ietf.org/rfc/rfc1866.txt?number=1866, retrieved on Jul. 10, 2003, pp. 1-72. (Reference provided on enclosed CD-ROM).
Braden, R. et al., “Resource ReSerVation Protocol (RSVP), Version 1 Functional Specification,” Network Working Group, Request for Comments: 2205, Sep. 1997, Located at http://www.ietf.org/rfc/rfc2205.txt?number=2205, retrieved on Aug. 2, 2005, pp. 1-105. (Reference provided on enclosed CD-ROM).
Fielding ,R. et al., “Hypertext Transfer Protocol—HTTP/1.1,” Jan. 1997, Network Working Group, Request for Comments: 2068, located at http://www.ietf.org/rfc/rfc2068.txt?number=2068, retrieved on Jul. 10, 2003, pp. 1-152. (Reference provided on enclosed CD-ROM).
Dierke, T. et al., “The TLS Protocol-Version 1.0,” Network Working Group, RFC 2246, Jan. 1999, 80 pages.
Birk, Yithak, “Coding On Demand by an Informaed Source (ISCOD) for Efficient Broadcast of Different Supplemental Data to Caching Clients,” IEEE Transactions on Information Theory, vol. 52, No. 6, Jun. 2006, pp. 2825-2830.
Phatak, S.H., et al., “Web&: An Architecture for Non-Interactive Web,” Internet Applications, 2001, WIAPP 2001, Proceedings of the Second IEEEE Workshop on Jul. 23-24, 2001, pp. 104-112.
Yao, Bin et al., “Proxy-based Recovery for Applications on Wireless Hand-held Devices,” Reliable Distributed Systems 2000, SRDS-2000, Proceedings of the 19thIEEE Symposium on Oct. 16-18, 2000. pp. 2-10.
Dierks, T. et al., “The TLS Protocol-Version 1.0,” Network Working Group, RFC 2246, Jan. 1999, retrieved from the internet at http://rfc.sunsite.dk/rfc/rfc2246.html, retrieved on Jul. 21, 2006, pp. 1, 4, 29-32, 68-69.
International Searching Authority “Notification of Transmittal of The International Search Report and The Written Opinion of the International Searching Authority, or the Declaration”, PCT/US06/11479, dated May 1, 2007, 8 pages.
International Searching Authority, “Notification of Transmittal of the International Search Report and the Written Opinion of the International Searching Authority, or the Declaration,” PCT/US05/00812, dated Jun. 14, 2006, 6 pages.
Claims, PCT/US05/00812, 10 pages. (Jun. 14, 2006).
Jonsson, J. et al., “Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1,” Feb. 2003, Network Working Group, Request for Comments: 3347, located at http://www.ietf.org/rfc/rfc3447.txt?number=3447, retrieved on Jul. 10, 2003, pp. 1-68. (Reference provided on enclosed CD-ROM).
Kaliski, B. et al., “PKCS #1: RSA Cryptography Specifications Version 2.0,” Oct. 1998, Network Working Group, Request for Comments: 2437, located at http://www.ietf.org/rfc/rfc2437.txt?number=2437, retrieved on Jul. 10, 2003, pp. 1-37. (Reference provided on enclosed CD-ROM).
Kaliski, B., “PKCS #1, RSA Encryption Version 1.5,” Mar. 1998, Network Working Group, Request for Comments: 2313, located at http://www.ietf.org/rfc/rfc2313.txt?number=2313, retrieved on Jul. 10, 2003, pp. 1-18. (Reference provided on enclosed CD-ROM).
Wason, Thomas, et al., “Liberty ID-FF Architecture Overview, Version 1.2,” Liberty Alliance Project, located at www.project-liberty.org/, pp. 1-44. (Reference provided on enclosed CD-ROM), 2003.
Yadav, S. et al., “Identity Representation for RSVP,” Network Working Group, Request for Comments: 3182, Oct. 2001, Located at http://www.ietf.org/rfc/rfc3182.txt?number=3182 , retrieved on Aug. 2, 2005, pp. 1-17. (Reference provided on enclosed CD-ROM).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Cryptographic peer discovery, authentication, and... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Cryptographic peer discovery, authentication, and..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cryptographic peer discovery, authentication, and... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2806364

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.