Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2006-06-27
2006-06-27
Jung, David (Department: 2134)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S151000, C726S014000
Reexamination Certificate
active
07069438
ABSTRACT:
A method and apparatus for establishing authenticated network (e.g., TCP/IP) connections augments the network (e.g., TCP/IP) protocol and enables concealment of the presence of network (e.g., TCP/IP) servers on the network. One methodology uses one or more cryptographic techniques, and/or combinations of such techniques, to achieve the goal. A network (e.g., TCP/IP) connection establishment could be authenticated using both shared secret cryptographic and public key cryptographic methods. The trust between peers could be established either directly or via a trusted third party. One methodology allows network (e.g., TCP/IP) server concealment against Internet based eavesdroppers and eavesdroppers staging man-in-the-middle attacks on the local network or in the close proximity to the server. The techniques described herein may be used to protect a network (e.g., TCP/IP) server from establishing unsanctioned connections from both local and remote networks.
REFERENCES:
patent: 5627886 (1997-05-01), Bowman
patent: 6772334 (2004-08-01), Glawitsch
patent: 2003/0035370 (2003-02-01), Brustoloni
patent: 2003/0051155 (2003-03-01), Martin
“FOLDOC—IPSec”, May 6, 2002, [Retrieved from Internet Aug. 30, 2004], “http://foldoc.doc.ic.ac.uk/foldoc/foldoc.cgi?IPsec”.
“IPSec”, Jun. 15, 2001, [Retrieved from Internet Aug. 30, 2004], “http://www.forsitesolutions.com/Techstuff/freeswan/ipsec—overview.html”.
“Virtual Network Computing”, Jan. 1998, [Retrieved from Internet Aug. 30, 2004], “http://www.uk.research.att.com/pub/docs/att/tr.98.1.pdf”.
Bruce Schneier, 1996, John Wiley & Sons, Inc., “Applied Cryptography”, 75-76, 426, 455.
A multilayer IP security protocol for TCP performance enhancement in wireless networks Yongguang Zhang; Selected Areas in Communications, IEEE Journal on vol. 22, Issue 4, May 2004 pp. 767-776.
Analysis of tradeoffs between security strength and energy savings in security protocols for WLANs Prasithsangaree, P.; Krishnamurthy, P.; Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 IEEE 60th vol. 7, Sep. 26-29, 2004 pp.: 5219-5223 V.
A study of the elliptic curve cryptology applies to the next generation protocol Po-Hsian, H.; Ching-Wei, C.; Security Technology, 2004. 38th Annual 2004 International Carnahan Conference on Oct. 11-14, 2004 pp.: 233-238.
Balabine Igor V.
Friedman William G.
Minkin Ilya G.
Blakely , Sokoloff, Taylor & Zafman LLP
Jung David
Sowl Associates, Inc.
LandOfFree
Establishing authenticated network connections does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Establishing authenticated network connections, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Establishing authenticated network connections will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3616695