Information security – Access control or authentication – Network
Reexamination Certificate
2008-07-08
2008-07-08
Kincaid, Kristine (Department: 2139)
Information security
Access control or authentication
Network
Reexamination Certificate
active
10625846
ABSTRACT:
An Enhanced Shared Secret Provisioning Protocol (ESSPP) provides a novel method and system for adding devices to a network in a secure manner. A registration process is launched at two network devices together within a predetermined time interval. These two devices then automatically register with each other. When two devices running ESSPP detect each other, they exchange identities and establish a key that can later be used by the devices to mutually authenticate each other and generate session encryption keys. With ESSPP, two ESSPP devices that are attempting to register with each other will only provision a key when they detect that they are the only two ESSPP devices on the wireless network running ESSPP. If additional devices running ESSPP are detected, the ESSPP protocol is either terminated or suspended.
REFERENCES:
patent: 5537474 (1996-07-01), Brown et al.
patent: 5625888 (1997-04-01), Ruther et al.
patent: 5978669 (1999-11-01), Sanmugam
patent: 6119001 (2000-09-01), Delis et al.
patent: 6169893 (2001-01-01), Shaheen et al.
patent: 6591364 (2003-07-01), Patel
patent: 6690659 (2004-02-01), Ahmed et al.
patent: 6826401 (2004-11-01), Morvan et al.
patent: 7152238 (2006-12-01), Leung et al.
patent: 2003/0129979 (2003-07-01), Cooper
patent: 2004/0203773 (2004-10-01), Balasubramanian et al.
patent: 2005/0102517 (2005-05-01), Paddon et al.
patent: 0254812 (1987-04-01), None
patent: 1117271 (2000-11-01), None
patent: WO 00/72499 (2000-05-01), None
CDMA 1XRTT Security Overview, by C. Wingert and M Naidu, Aug. 2002.
B. Aboba et al., “EAP GSS Authentication Protocol”, Internet-Draft, <draft-aboba-pppext-eapgss-12.txt>, http://www.ietf.org/ietf/lid-abstracts.html, The Internet Society, Apr. 2002.
H. Haverinen, “EAP SIM Authentication”, Internet-Draft, <draft-haverinen-pppext-eap-sim-04.txt>, http://www.ietf.org/ietf/lid-abstracts.html, The Internet Society, Jun. 2002.
J. Arkko et al., “EAP AKA Authentication”, Internet-Draft, <draft-arkko-pppext-eap-aka-03.txt>, http://www.ietf.org/ietf/lid-abstracts.html, The Internet Society, Feb. 2002.
H. Andersson et al., “Protected EAP Protocol (PEAP)”, Internet-Draft, <draft-josefsson-pppext-eap-tls-eap-02.txt>, http://www.ietf.org/ietf/lid-abstracts.html, The Internet Society, Feb. 2002.
B. Aboba et al., “The EAP Keying Problem”, Internet-Draft, <draft-aboba-pppext-key-problem-01.txt>, http://www.ietf.org/ietf/lid-abstracts.html, The Internet Society, Feb. 2002.
G. Tsirtsis, “EAP over ICMP”, Internet-Draft, <draft-tsirtsis-eap-over-icmp-00.txt>, http://www.ietf.org/ietf/lid-abstracts.html, The Internet Society, Jan. 2002.
S. Josefsson, “The EAP SecurID(r) Mechanism”, Internet-Draft, <draft-josefsson-eap-securid>, http://www.ietf.org/ietf/lid-abstracts.html, The Internet Society, Feb. 2002.
D. Potter et al., “PPP EAP MS-CHAP-V2 Authentication Protocol”, Internet-Draft, <draft-dpotter-pppext-eap-mschap-01.txt>, http://www.ietf.org/ietf/lid-abstracts.html, Jan. 2002.
B. Aboba, “EAP IANA Considerations”, Internet-Draft, <draft-aboba-pppext-eap-iana-01.txt>, http://www.ietf.org/ietf/lid-abstracts.html, The Internet Society, Feb. 2002.
B. Aboba, “The Vendor-Specific EAP Method”, Internet-Draft, <draft-aboba-pppext-eap-vendor-01.txt>, http://www.ietf.org/ietf/lid-abstracts.html, The Internet Society, Feb. 2002.
P. Engelstad, “EAP over UDP (EAPoUDP)”, Internet-Draft, <draft-engelstad-pana-eap-over-udp-00.txt>, http://www.ietf.org/ietf/lid-abstracts.html, Feb. 2002.
B. Aboba et al., “RADIUS Support For Extensible Authentication Protocol (EAP)”, Internet-Draft, <draft-aboba-radius-rfc2869bis-02.txt>, http://www.ietf.org/ietf/lid-abstracts.html, The Internet Society, May 2002.
B. Payne, “Extensible Authentication Protocol State Machine”, Internet-Draft, <draft-payne-eap-sm-00.txt>, http://www.ietf.org/ietf/lid-abstracts.html, The Internet Society, May 2002.
P. Funk et al., “EAP Tunneled TLS Authentication Protocol (EAP-TTLS)”, Internet-Draft, <draft-ietf-pppext-eap-ttls-01.txt>, http://www.ietf.org/ietf/lid-abstracts.html, The Internet Society, Aug. 2001.
L. Blunk et al., “Extensible Authentication Protocol (EAP)”, Internet-Draft, <draft-ietf-pppext-rfc2284bis-04.txt>, http://www.ietf.org/ietf/lid-abstracts.html, The Internet Society, Apr. 2002.
W. Simpson, “The Point-to-Point Protocol (PPP)”, Network Working Group, Jul. 1994.
L. Blunk et al., “PPP Extensible Authentication Protocol (EAP)”, Network Working Group, Mar. 1998.
B. Aboba et al., “PPP EAP TLS Authentication Protocol”, Network Working Group, Oct. 1999.
L. Blunk et al., PPP Extensible Authentication Protocol (EAP), Network Working Group Request for Comments, Mar. 1, 1998 (XP-002239395).
XP-002296898, “Shared Secret Provisioning Protocol,” by R. Moskowitz, ICSA Labs, Jan. 2003, pp. 1-6.
Klein Michael J.
Moskowitz Robert G.
Zick Donald A.
Amin Turocy & Calvin LLP
Homayounmehr Farid
Kincaid Kristine
Microsoft Corporation
LandOfFree
Enhanced shared secret provisioning protocol does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Enhanced shared secret provisioning protocol, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Enhanced shared secret provisioning protocol will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3928669