Identification of an attacker in an electronic system

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S168000, C713S179000, C709S229000, C705S076000

Reexamination Certificate

active

07140039

ABSTRACT:
A method for identifying a particular component of an electronic system that accesses a resource of the electronic system using electronic security value units is described. First, electronic security value units are selectively distributing to a plurality of components, such as to a client, of the electronic system. Next, a unique first association is created with each individual component to which the security electronic security value units are distributed. Further, upon a particular access to a resource, a unique second association is created between particular ones of security electronic security value units and the particular access to the resource. In addition, the unique second association is analyzed to determine which particular security electronic security value units were used to access the particular resource. Then, the first association of the particular security electronic security value units is analyzed to determine the identity of the component which accessed the resource.

REFERENCES:
patent: 5506961 (1996-04-01), Carlson et al.
patent: 5542046 (1996-07-01), Carlson et al.
patent: 5627886 (1997-05-01), Bowman
patent: 5815574 (1998-09-01), Fortinsky
patent: 5819226 (1998-10-01), Gopinathan et al.
patent: 5930777 (1999-07-01), Barber
patent: 5956404 (1999-09-01), Schneier et al.
patent: 6000032 (1999-12-01), Millard
patent: 6018723 (2000-01-01), Siegel et al.
patent: 6032123 (2000-02-01), Jameson
patent: 6078818 (2000-06-01), Kingdon et al.
patent: 6122625 (2000-09-01), Rosen
patent: 6157917 (2000-12-01), Barber
patent: 6161139 (2000-12-01), Win et al.
patent: 6163604 (2000-12-01), Baulier et al.
patent: 6182142 (2001-01-01), Win et al.
patent: 6232974 (2001-05-01), Horvitz et al.
patent: 6327352 (2001-12-01), Betts et al.
patent: 6338046 (2002-01-01), Saari et al.
patent: 6339423 (2002-01-01), Sampson et al.
patent: 6374300 (2002-04-01), Masters
patent: 6389541 (2002-05-01), Patterson
patent: 6427140 (2002-07-01), Ginter et al.
patent: 6453305 (2002-09-01), Glassman et al.
patent: 6473802 (2002-10-01), Masters
patent: 6490601 (2002-12-01), Markus et al.
patent: 6490624 (2002-12-01), Sampson et al.
patent: 6529885 (2003-03-01), Johnson
patent: 6535728 (2003-03-01), Perfit et al.
patent: 6542729 (2003-04-01), Chmaytelli et al.
patent: 6567511 (2003-05-01), Betts et al.
patent: 6594481 (2003-07-01), Johnson et al.
patent: 6631473 (2003-10-01), Townsend
patent: 6640304 (2003-10-01), Ginter et al.
patent: 6643696 (2003-11-01), Davis et al.
patent: 6675261 (2004-01-01), Shandony
patent: 6704563 (2004-03-01), Senn et al.
patent: 6782379 (2004-08-01), Lee
patent: 6816871 (2004-11-01), Lee
patent: 2002/0111912 (2002-08-01), Hunter et al.
patent: 2002/0133412 (2002-09-01), Oliver et al.
patent: WO 98/32066 (1998-07-01), None
Neuman et al, “Kerberos: An Authentication Service for Computer Networks” Sep. 1994, IEEE Communications Magazine, pp. 33-38.
Gittler et al, “The DCE Security Service” Dec. 1995, Hewlett-Packard Journal, pp. 41-48.
Kohlk et al, “The Kerberos Network Authentication Service V5” Sep. 1993, Network Working Group Request for COmments: 1510, pp. 1-112.
Kohl and Neuman, The Kerberos Network Authentication Service (V5), RFC 1510, Sep. 1993.
Needham, FL, and VL Schroeder “Using Encryption for Authentication in Large Networks of Computers,” Communications of ACM, vol. 21, Dec. 1978, pp. 993-999.
Ilgun, Kemmerer, and Porras, “State Transition Analysis: A Rule-based Intrusion Detection Approach,” IEEE Transactions on Software Engineering, 21(3), pp. 181-199, Mar. 1995.
Lunt, Tamaru, et al., “A Real-time Intrusion Detection Expert System (IDES) -final technical report,” Technical Report, Computer Science Laboratory, SRI International, Feb. 1992.
Bellare, Garray, et al., “iKP -A family of secure electronic payment Protocols,” First USENIX Workshop on Electronic Commerce, pp. 89-106, Jul. 1995.
Jarecki, Odlyzko, “An Efficient Micropayment System Based on Probabilistic Polling,” in Proc. of Financial Cryptography '97, R. Hirschfeld, ed., Lecture Notes in Computer Science, Springer, 1997.
Manasse, “The Millicent protocols for electronic commerce,” Proceedings of the first USENIX Workshop on Electronic Commerce, Jul. 1995.
Pedersen, Electronic Payment of Small Amounts Cambridge Workshop of 1996.
Secure Electronic Transactions: Credit Card Payment on the Web in Theory and Practice, IBM International Technical Support Organization, Jun. 1997.
Sairamesh, J., D. Ferguson, and Y. Yemini An Approach to Pricing, Optimal Allocation and Quality of Service Provisioning in High-speed Packet Networks, in Proc. of the Conference on Computer Communications, Boston, Massachusetts, Apr. 1995.
Mark S. Manasse, “The Millicent Protocols for Electronic Commerce,” www.usenix.org, Jul. 1995.
Stanislaw Jarecki and Andrew Odlyzko, “An Efficient Micropayment System Based on Probabilistic Polling,” in Proc. of Financial Cryptography '97, R. Hirschfeld, ed., Lecture Notes in Computer Science, Springer, 1997.
Mihir Bellare, et al. “iKP—A Family of Secure Electronic Payment Protocols,” USENIX Workshop on Electronic Commerce, May 8, 1995.
“Network Security. Private Communication in a PUBLIC World,” Charlie Kaufman et al., Prentice Hall series in computer networking and distributed systems, 1994, pp. 177-203.
“Firewalls and Internet Security. Repelling the Wily Hacker,” Second Edition, William Cheswick et al., Addison-Wesley, Reading, Mass. 1995, pp. 175-232.
NIST, Special Pub 800-12-An Introduction to Computer Security: The NIST Handbook, NIST, (p. 60 and cover page).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Identification of an attacker in an electronic system does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Identification of an attacker in an electronic system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Identification of an attacker in an electronic system will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3677502

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.