Intermediate network authentication

Cryptography – Particular algorithmic function encoding – Nbs/des algorithm

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 23, 380 21, 380 30, H04K 100

Patent

active

055111220

ABSTRACT:
An internetwork authentication method is provided for verifying a sending host by a receiving host or an intermediate router or gateway. The method comprises the steps of: obtaining a network address and a public key of a receiving host; utilizing the public key from the receiving host in combination with a private key of the originating host to generate a cryptographic signature; transmitting the signature along with data through a first subnetwork in at least one packet; receiving at least one packet at the receiving host; and the receiving host utilizing a private key of said receiving host site and a public key of said originating host to verify said cryptographic signature.

REFERENCES:
patent: 4438824 (1984-03-01), Mueller-Schloer
patent: 4965827 (1990-10-01), McDonald
patent: 5175765 (1992-12-01), Perlman
patent: 5204901 (1993-04-01), Hershey et al.
patent: 5204961 (1993-04-01), Barlow
patent: 5241599 (1993-08-01), Bellovin et al.
patent: 5280583 (1994-01-01), Nakayama et al.
patent: 5371794 (1994-12-01), Diffie et al.
patent: 5416842 (1995-05-01), Aziz
Tsudik, Gene, "Datagram Authentication in Internet Gateways: Implications Fragmentation and Dynamic Routing", IEEE Journal on Selected Areas in Communications, vol. 7, No. 4, (May, 1989), IEEE, NY, NY.
ISI, Transmission Control Protocol, RFC-793 Network Information Center, (Sep., 1981).
Voydock, V. L. and Kent, S. T., "Security in High-Level Network Protocols", IEEE Communications, vol. 23, No. 7 (Jul., 1985).
Rivest, R. & Dusse, S., "The MDS Message-Digest Algorithm," RFC-1321, DDN Network Information Center (Apr., 1992).
Cole, Raymond, Jr. et al., "Multilevel Secure Mixed-Media Communication Networks," Proceedings of the 1989 IEEE Conference on Military Communications (MILCOM '89), IEEE, N.Y., N.Y.
Clark, D. D. and Wilson, "A Comparison of Commercial and Military Computer Security Policies," Proceedings of the 1987 IEEE Symposium on Security & Privacy, IEEE Computer Society, Oakland, California (1987).
NBS, FIPS PUB 46, "Data Encryption Standard (DES)," National Bureau of Standards, U.S. Department of Commerce (Jan., 1977).
Schneier, B., "Applied Cryptography," John Wiley & Sons, Inc., NY, NY (1994), p. 3.
Bellovin, Steven M., "Security Problems in the TCP/IP Protocol Suite" ACM, Computer Communications Review, vol. 19, No. 2 (Apr., 1989), pp. 32-48.
Bellovin, Steven M., "Limitations of the Kerberos Authentication System", Proceedings of the Winter 1991 Usenix Conference, Usenix Association, Berkley, CA (1991).
Kent, S. T. & Linn, J., Privacy Enhancement for Internet Electronic Mail: Part 11-Certificate-based Key Management, RFC-1114, DDN Network Information Center (Aug., 1989).
Kent, S. T. US DoD Security Options for the Internet Protocol, RFC-1108, DDN Network Information Center (Nov., 1991).
Mockapetris, Paul, Domain Names-Implementation and Specification, RFC-1035, DDN Network Information Center (Nov., 1987).
Needham, R. M. and Schroeder, M. D., "Using Encryption for Authentication in Large Networks of Computers", Communications of the ACM, vol. 21, No. 12 (Dec., 1978).
"Security Requirements for Cryptographic Modules", Federal Information Processing Standards Publication 140-1, (Jan. 11, 1994), pp. 1-53.
Branstad, Dennis et al., "SP4: A Transport Encapsulation Security Protocol", Proceedings of 1987 NCSC Conference, pp. 158-161.
Nelson, Ruth, "SDNS Services and Architecture", Proceedings of 1987 NCSC Conference, pp. 153-157.
Lambert, Paul A., "Layer Wars: Protect the Internet with Network Layer Security", Motorola, Inc., Secure Telecommunications.
Dinkel, Charles (Editor), "Secure Data Network System (SDNS) Network, Transport, and Message Security Protocols". U.S. Dept. of Commerce, Nat'l. Inst. Stds., NISTIR 90-4250.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Intermediate network authentication does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Intermediate network authentication, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Intermediate network authentication will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2315507

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.