Information security – Policy
Reexamination Certificate
2008-03-25
2008-03-25
Zand, Kambiz (Department: 2134)
Information security
Policy
C726S012000, C713S153000, C713S168000
Reexamination Certificate
active
11115542
ABSTRACT:
A method is disclosed for cryptographic peer discovery, authentication, and authorization. According to one embodiment, a data packet, which is addressed to a destination device other than an intermediary network device, is intercepted at the intermediary network device. The data packet contains a request and a group identifier. A shared secret cryptographic key, which is mapped to the group identifier, is selected. A challenge is sent toward an upstream device from whence the data packet came. A response is received. A verification value is generated based on the cryptographic key and the challenge. It is determined whether the response matches the verification value. If the response matches the verification value, then it is determined whether the request is allowed by an authorization set that is mapped to the group identifier. If the request is allowed, then a policy of the intermediary network device is configured based on the request.
REFERENCES:
patent: 5268962 (1993-12-01), Abadi et al.
patent: 5668878 (1997-09-01), Brands
patent: 5961601 (1999-10-01), Iyengar
patent: 5963915 (1999-10-01), Kirsch
patent: 6134592 (2000-10-01), Montulli
patent: 6253326 (2001-06-01), Lincke et al.
patent: 6263437 (2001-07-01), Liao et al.
patent: 6496932 (2002-12-01), Trieger
patent: 6904521 (2005-06-01), Jivsov
patent: 6938171 (2005-08-01), Isomichi et al.
patent: 2004/0015725 (2004-01-01), Boneh et al.
patent: 2004/0030925 (2004-02-01), Raheman
patent: 2005/0154873 (2005-07-01), Cam-Wing et al.
Baker, F. et al. “RSVP Cryptographic Authentication”, RFC 2747, Jan. 2000, <ftp://ftp.rfc-editor.org/in-notes/rfc2747.txt>.
Braden, R. et al. “Resource ReSerVation Protocol (RSVP)—Version 1 Functional Specification”, RFC 2205, Sep. 1997, <ftp://ftp.rfc-editor.org/in-notes/rfc2205.txt>.
Herzog, S. “RSVP Extensions for Policy Control”, RFC 2750, Jan. 2000, <ftp://ftp.rfc-editor.org/in-notes/rfc2750.txt>.
Baker, F. et al., “RSVP Cryptographic Authentication,” Network Working Group, Request for Comments: 2747, Jan. 2000, located at http://www.ietf.org/rfc/rfc2747.txt?number=2747, retrieved on Aug. 2, 2005, pp. 1-20. (Reference provided on enclosed CD-ROM).
Berners-Lee, T. et al., “Hypertext Markup Language—2.0,” Nov. 1995, Network Working Group, Request for Comments: 1866, located at http://www.ietf.org/rfc/rfc1866.txt?number=1866, retrieved on Jul. 10, 2003, pp. 1-72. (Reference provided on enclosed CD-ROM).
Braden, R. et al., “Resource ReSerVation Protocol (RSVP), Version 1 Functional Specification,” Network Working Group, Request for Comments: 2205, Sep. 1997, Located at http://www.ietf.org/rfc/rfc2205.txt?number=2205, retrieved on Aug. 2, 2005, pp. 1-105. (Reference provided on enclosed CD-ROM).
Fielding ,R. et al., “Hypertext Transfer Protocol—HTTP/1.1,” Jan. 1997, Network Working Group, Request for Comments: 2068, located at http://www.ietf.org/rfc/rfc2068.txt?number=2068, retrieved on Jul. 10, 2003, pp. 1-152. (Reference provided on enclosed CD-ROM).
Dierke, T. et al., “The TLS Protocol-Version 1.0,” Network Working Group, RFC 2246, Jan. 1999, 80 pages.
Birk, Yithak, “Coding On Demand by an Informaed Source (ISCOD) for Efficient Broadcast of Different Supplemental Data to Caching Clients,” IEEE Transactions on Information Theory, vol. 52, No. 6, Jun. 2006, pp. 2825-2830.
Phatak, S.H., et al., “Web&: An Architecture for Non-Interactive Web,” Internet Applications, 2001, WIAPP 2001, Proceedings of the Second IEEEE Workshop on Jul. 23-24, 2001, pp. 104-112.
Yao, Bin et al., “Proxy-based Recovery for Applications on Wireless Hand-held Devices,” Reliable Distributed Systems 2000, SRDS-2000, Proceedings of the 19thIEEE Symposium on Oct. 16-18, 2000. pp. 2-10.
Dierks, T. et al., “The TLS Protocol-Version 1.0,” Network Working Group, RFC 2246, Jan. 1999, retrieved from the internet at http://rfc.sunsite.dk/rfc/rfc2246.html, retrieved on Jul. 21, 2006, pp. 1, 4, 29-32, 68-69.
International Searching Authority “Notification of Transmittal of The International Search Report and The Written Opinion of the International Searching Authority, or the Declaration”, PCT/US06/11479, dated May 1, 2007, 8 pages.
International Searching Authority, “Notification of Transmittal of the International Search Report and the Written Opinion of the International Searching Authority, or the Declaration,” PCT/US05/00812, dated Jun. 14, 2006, 6 pages.
Claims, PCT/US05/00812, 10 pages. (Jun. 14, 2006).
Jonsson, J. et al., “Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1,” Feb. 2003, Network Working Group, Request for Comments: 3347, located at http://www.ietf.org/rfc/rfc3447.txt?number=3447, retrieved on Jul. 10, 2003, pp. 1-68. (Reference provided on enclosed CD-ROM).
Kaliski, B. et al., “PKCS #1: RSA Cryptography Specifications Version 2.0,” Oct. 1998, Network Working Group, Request for Comments: 2437, located at http://www.ietf.org/rfc/rfc2437.txt?number=2437, retrieved on Jul. 10, 2003, pp. 1-37. (Reference provided on enclosed CD-ROM).
Kaliski, B., “PKCS #1, RSA Encryption Version 1.5,” Mar. 1998, Network Working Group, Request for Comments: 2313, located at http://www.ietf.org/rfc/rfc2313.txt?number=2313, retrieved on Jul. 10, 2003, pp. 1-18. (Reference provided on enclosed CD-ROM).
Wason, Thomas, et al., “Liberty ID-FF Architecture Overview, Version 1.2,” Liberty Alliance Project, located at www.project-liberty.org/, pp. 1-44. (Reference provided on enclosed CD-ROM), 2003.
Yadav, S. et al., “Identity Representation for RSVP,” Network Working Group, Request for Comments: 3182, Oct. 2001, Located at http://www.ietf.org/rfc/rfc3182.txt?number=3182 , retrieved on Aug. 2, 2005, pp. 1-17. (Reference provided on enclosed CD-ROM).
McGrew David A.
Shore Melinda L.
Cisco Technology Inc.
Hickman Palermo & Truong & Becker LLP
Simitoski Michael J
Zand Kambiz
LandOfFree
Cryptographic peer discovery, authentication, and... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Cryptographic peer discovery, authentication, and..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cryptographic peer discovery, authentication, and... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3926438