Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2005-06-28
2009-10-27
Chai, Longbit (Department: 2431)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S169000, C713S170000, C713S171000, C713S172000, C713S173000, C726S003000, C726S004000, C726S005000, C726S006000, C726S007000, C380S229000, C380S230000, C380S231000, C380S232000
Reexamination Certificate
active
07610487
ABSTRACT:
The hash extension technique used to generate an ECGA may be used to increase the strength of one-way hash functions and/or decrease the number of bits in any situation where some external requirement limits the number of hash bits, and that limit is below what is (or may be in the future) considered secure against brute-force attacks. For example, to decrease the length of human entered security codes (and maintain the same security), and/or to increase the strength of a human entered security code (and maintain the length of the security code), the security code may be generated and/or authenticated using an extended hash method.
REFERENCES:
patent: 5473691 (1995-12-01), Menezes et al.
patent: 5511122 (1996-04-01), Atkinson
patent: 5563998 (1996-10-01), Yakish et al.
patent: 5673319 (1997-09-01), Bellare et al.
patent: 5729608 (1998-03-01), Janson et al.
patent: 5778065 (1998-07-01), Hauser et al.
patent: 5784562 (1998-07-01), Diener
patent: 5787172 (1998-07-01), Arnold
patent: 5892904 (1999-04-01), Atkinson et al.
patent: 5903721 (1999-05-01), Sixtus et al.
patent: 5944794 (1999-08-01), Okamoto et al.
patent: 6028938 (2000-02-01), Malkis et al.
patent: 6055234 (2000-04-01), Aramaki
patent: 6055236 (2000-04-01), Nessett et al.
patent: 6088700 (2000-07-01), Larsen et al.
patent: 6101499 (2000-08-01), Ford et al.
patent: 6108673 (2000-08-01), Brandt et al.
patent: RE36946 (2000-11-01), Diffie et al.
patent: 6148405 (2000-11-01), Liao et al.
patent: 6175833 (2001-01-01), West et al.
patent: 6229806 (2001-05-01), Lockhart et al.
patent: 6237035 (2001-05-01), Himmel et al.
patent: 6247029 (2001-06-01), Kelley et al.
patent: 6367012 (2002-04-01), Atkinson et al.
patent: 6421673 (2002-07-01), Caldwell et al.
patent: 6424981 (2002-07-01), Isaac et al.
patent: 6526506 (2003-02-01), Lewis
patent: 6600823 (2003-07-01), Hayosh
patent: 6615348 (2003-09-01), Gibbs
patent: 6687755 (2004-02-01), Ford et al.
patent: 6732110 (2004-05-01), Rjaibi et al.
patent: 6832322 (2004-12-01), Boden et al.
patent: 6944672 (2005-09-01), Crow et al.
patent: 6957346 (2005-10-01), Kivinen et al.
patent: 7032242 (2006-04-01), Grabelsky et al.
patent: 7134019 (2006-11-01), Shelest et al.
patent: 7216233 (2007-05-01), Krueger
patent: 7370197 (2008-05-01), Huitema
patent: 7409544 (2008-08-01), Aura
patent: 2001/0010720 (2001-08-01), Kimball et al.
patent: 2002/0133607 (2002-09-01), Nikander
patent: 2002/0152380 (2002-10-01), O'Shea et al.
patent: 2002/0152384 (2002-10-01), Shelest et al.
patent: 2003/0028790 (2003-02-01), Bleumer
patent: 2003/0065934 (2003-04-01), Angelo et al.
patent: 2003/0070067 (2003-04-01), Saito
patent: 2003/0120929 (2003-06-01), Hoffstein et al.
patent: 2003/0142823 (2003-07-01), Swander et al.
patent: 2003/0233568 (2003-12-01), Maufer et al.
patent: 2004/0008845 (2004-01-01), Le et al.
patent: 2004/0010683 (2004-01-01), Huitema
patent: 2004/0088537 (2004-05-01), Swander et al.
patent: 2004/0151322 (2004-08-01), Sovio et al.
patent: 2004/0158714 (2004-08-01), Peyravian et al.
patent: 2004/0193875 (2004-09-01), Aura
patent: 2004/0225881 (2004-11-01), Walmsley
patent: 2004/0249757 (2004-12-01), Walmsley
patent: 2006/0005014 (2006-01-01), Aura et al.
patent: 2006/0020807 (2006-01-01), Aura et al.
patent: 2006/0077908 (2006-04-01), Park et al.
patent: 1333635 (2003-08-01), None
patent: WO 2006068450 (2006-06-01), None
Aura, T.Cryptographically Generated Addresses(CGA). RFC 3972, Mar. 2005, pp. 1-21.
Housley, R.Using Advanced Encryption Standard(AES)CCM Mode with IPsec Encapsulating Security Payload(ESP). RFC 4309, Dec. 2005, pp. 1-13.
IPSEC.Minutes of IPSEC Working Group Meeting. Proceedings of the 52ndInternet Engineering Task Force, Dec. 9-14, 2001, Salt Lake City, U.S.A. Dec. 12, 2001.
Kaufman, C.Internet Key Exchange(IKEv2)Protocol. RFC 4306, Dec. 2005, pp. 1-93.
Kent, C. and Mogul, J.Fragmentation Considered Harmful. Computer Communication Review, (Association of Computer Machinery), 25(1) 75-87 (Jan. 1995).
Kent, S. and Seo, K.Security Architecture for the Internet Protocol. RFC 4301, Dec. 2005, pp. 1-95.
Kent, S.IP Authentication Header. RFC 4302, Dec. 2005, pp. 1-35.
Kent, S.IP Encapsulating Security Payload(ESP). RFC 4303, Dec. 2005, pp. 1-42.
Laganier, J. and Montenegro, G.Using IKE with IPv6 Crypotgraphically Generated Address. Network Working Group, Internet-Draft, Feb. 24, 2003, pp. 1-14.
Link, B., Hager, T. and Flaks J.RTP Payload Format for AC-3 Audio. RFC 4184, Oct. 2005, pp. 1-13.
Nir, Y.Repeated Authentication in Internet Key Exchange(IKEv2)Protocol. RFC 4478, Apr. 2006, pp. 1-5.
Tanenbaum, Andrew S.Computer Networks, Ch. 4. Prentice-Hall, 1989.
Van De Snepscheut, JLA.The Sliding Window Protocol Revisited. Formal Aspects of Computing vol. 7, 1995, pp. 3-17.
PCT International Search Report in PCT/US06/25342, Feb. 6, 2008.
M. Burrows et al., “A Logic of Authentication” Proceedings of the Royal Society of London Series A, 426, pp. 233-271 (1989).
S. Deering et al., “Version 6 (IPv6) Specification” RFC2460 (Dec. 1998).
“Secure Hash Standard,” NIST, FIPS Pub 180-1, http://csrc.nist.goc/fips/fip180-1.txt. (Apr. 1995).
Harkins et al., “The Internet Key Exchange (IKE),” RFC2409 (Nov. 1998).
Hinden et al., “IP Version 6 Addressing Architecture,” (Feb. 2, 2001).
Huitema, “Ipv6 The New Internet Protocol,” Prentice Hall PTR, ISBN 0-13-850505-5 (1998).
Johnson et al., “Mobility Support in IPv6,” (Nov. 17, 2000).
Kent et al., “IP Authentication Header,” RFC2402 (Nov. 1998).
Mills, “Simple Network Time Protocol (SNMP) Version 4 for IPv6 and OSI,” RFC2030 (Oct. 1996).
Perkins, “IP Mobility Support,” RFC2002 (Oct. 1996).
Thomson et al., “IPv6 Stateless Address Autoconfiguration,” RFC2462 (Dec. 1998).
Kent et al., “Security Architecture for the Internet Protocol,” RFC2401 (Nov. 1998).
Aura et al.,Security of Internet Location Management, In Proc. 18thAnnual Computer Security Applications Conference, IEEE Press, Nevada (Dec. 2002).
Blaze et al.,The Keynote Trust-Management System Version 2, IETF Network Working Group (Sep. 1999).
Eastlake,Domain Name System Security Extensions, IETF Network Working Group (Mar. 1999).
Ellison et al.,SPK1 Certificate Theory, IETF Network Working Group (Sep. 1999).
Ferguson et al.,Network Ingress Filtering: Defeating Denial Of Service Attacks Which Employ IP Source Address Spoofing, IETF Network Working Group (May 2000).
Housley et al.,Internet X.509 Public Key Infrastructure Certificate And Certificate Revocation List(CRL)Profile, IETF Network Working Group (Apr. 2002).
Karn et al.,Photuris: Session-Key Management Protocol, IETF Network Working Group (Mar. 1999).
Montenegro et al.,Statistically Unique And Cryptographically Verifiable Identifiers And Addresses, In Proc. ISOC Symposium on Network and Distributed System Security (NDSS 2002), San Diego (Feb. 2002).
Moskowitz.Host Identity Payload And Protocol, Internet-Draft draft-ietf-moskowitz-hip-06.txt, (Oct. 2001) (Work in progress).
Narten et al.,Privacy Extensions For Stateless Address Autoconfiguration In Ipv6, IETF Network Working Group (Jan. 2001).
Narten et al.,Neighbor Discovery For IP Version 6(IPv6), IETF Network Working Group, (Dec. 1998).
Nikander,A Scaleable Architecture For IPv6 Address Ownership, Internet-draft (Mar. 2001).
Okazaki et al.,Mipv6 Binding Updates Using Address Based Keys(Abks). Internet-Draft, (Oct. 2002).
Roe et al.,Authentication Of Mobile IPv6 Binding Updates And Acknowledgments. Internet-Draft, IETF Mobile IP Working Group (Feb. 2002).
Savola.Security Of Ipv6 Routing Header And Home Address Options. Internet-draft, IETF (Dec. 2002).
Shamir,Identity-Based Cryptosystems And Signature Schemes, In Advances in Cryptology: Proc. CRYPTO 84, vol. 196 of LNCS, pp. 47-53, (1998).
Arkko et al.,Securing IPv6 Neighbor Discovery And Router Discovery, In Proc. 2002 ACM Workshop on Wireless Security (WiSe), pp. 77-86, (Sep. 2002) ACM Press.
Aura,Cryptographically Generated Addresses(CGA); Internet-Draft, lETF Securing Neighbor Di
Aura Tuomas
Roe Michael
Chai Longbit
Merchant & Gould P.C.
Microsoft Corporation
LandOfFree
Human input security codes does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Human input security codes, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Human input security codes will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4115285