Establishing authenticated network connections

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S151000, C726S014000

Reexamination Certificate

active

07069438

ABSTRACT:
A method and apparatus for establishing authenticated network (e.g., TCP/IP) connections augments the network (e.g., TCP/IP) protocol and enables concealment of the presence of network (e.g., TCP/IP) servers on the network. One methodology uses one or more cryptographic techniques, and/or combinations of such techniques, to achieve the goal. A network (e.g., TCP/IP) connection establishment could be authenticated using both shared secret cryptographic and public key cryptographic methods. The trust between peers could be established either directly or via a trusted third party. One methodology allows network (e.g., TCP/IP) server concealment against Internet based eavesdroppers and eavesdroppers staging man-in-the-middle attacks on the local network or in the close proximity to the server. The techniques described herein may be used to protect a network (e.g., TCP/IP) server from establishing unsanctioned connections from both local and remote networks.

REFERENCES:
patent: 5627886 (1997-05-01), Bowman
patent: 6772334 (2004-08-01), Glawitsch
patent: 2003/0035370 (2003-02-01), Brustoloni
patent: 2003/0051155 (2003-03-01), Martin
“FOLDOC—IPSec”, May 6, 2002, [Retrieved from Internet Aug. 30, 2004], “http://foldoc.doc.ic.ac.uk/foldoc/foldoc.cgi?IPsec”.
“IPSec”, Jun. 15, 2001, [Retrieved from Internet Aug. 30, 2004], “http://www.forsitesolutions.com/Techstuff/freeswan/ipsec—overview.html”.
“Virtual Network Computing”, Jan. 1998, [Retrieved from Internet Aug. 30, 2004], “http://www.uk.research.att.com/pub/docs/att/tr.98.1.pdf”.
Bruce Schneier, 1996, John Wiley & Sons, Inc., “Applied Cryptography”, 75-76, 426, 455.
A multilayer IP security protocol for TCP performance enhancement in wireless networks Yongguang Zhang; Selected Areas in Communications, IEEE Journal on vol. 22, Issue 4, May 2004 pp. 767-776.
Analysis of tradeoffs between security strength and energy savings in security protocols for WLANs Prasithsangaree, P.; Krishnamurthy, P.; Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 IEEE 60th vol. 7, Sep. 26-29, 2004 pp.: 5219-5223 V.
A study of the elliptic curve cryptology applies to the next generation protocol Po-Hsian, H.; Ching-Wei, C.; Security Technology, 2004. 38th Annual 2004 International Carnahan Conference on Oct. 11-14, 2004 pp.: 233-238.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Establishing authenticated network connections does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Establishing authenticated network connections, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Establishing authenticated network connections will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3616695

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.