Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Reexamination Certificate
2005-05-10
2005-05-10
Sheikh, Ayaz (Department: 2131)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
C713S152000, C713S152000, C713S169000, C713S170000, C380S262000, C380S277000, C380S278000, C380S279000
Reexamination Certificate
active
06892308
ABSTRACT:
A system is provided in which a client/server
etwork can implement a key management session when the server initiates the key management session utilizing a nonce. The nonce allows a wakeup or trigger message to be conveyed to the client such that a service attack on the server can be avoided when a false nonce is received by the server with an AP request message. Thus the server can disregard AP request messages that are not accompanied by a nonce stored by the server. The method can be implemented through circuitry, electrical signals and code to accomplish the acts described in the method.
REFERENCES:
patent: 5261070 (1993-11-01), Ohta
patent: 5434918 (1995-07-01), Kung et al.
patent: 5590199 (1996-12-01), Krajewski, Jr. et al.
patent: 5668876 (1997-09-01), Falk et al.
patent: 5729608 (1998-03-01), Janson et al.
patent: 5778065 (1998-07-01), Hauser et al.
patent: 5812664 (1998-09-01), Bernobich et al.
patent: 5931947 (1999-08-01), Burns et al.
patent: 5974550 (1999-10-01), Maliszewski
patent: 6058480 (2000-05-01), Brown
patent: 6064736 (2000-05-01), Davis et al.
patent: 6065120 (2000-05-01), Laursen et al.
patent: 6148405 (2000-11-01), Liao et al.
patent: 6289451 (2001-09-01), Dice
patent: 6304969 (2001-10-01), Wasserman et al.
patent: 6363365 (2002-03-01), Kou
patent: 6424718 (2002-07-01), Holloway
patent: 6539093 (2003-03-01), Asad et al.
patent: 6601175 (2003-07-01), Arnold et al.
patent: 6775772 (2004-08-01), Binding et al.
patent: 6799270 (2004-09-01), Bull et al.
patent: WO9508885 (1995-03-01), None
patent: WO0195074 (2001-12-01), None
patent: WO0225899 (2002-03-01), None
Agranat, Ian, Authentication standardizes Web, 1998, Electronic Engineering Times, p. 78.*
Kapp, Steve, Securing connected devices, 2002, Embedded Systems Programming, pp. 21, 22, 24, 26, 28, 30, 33.*
Lee et al, A public-key based authenication and key establishment protocol coupled with a client puzzle, 2003, Journal of the American Society for Information Science and Technology, pp. 810-823.*
Takizawa et al, Secure Group Communication Protocol for Distributed Systems, 1993, IEEE, pp. 159-165.*
Roscoe, A.W., Proving security protocols with model checkers by data independence techniques, 1998, IEEE, pp. 84-95.*
Cheng et al, A security architecture for the Internet Protocol, 1998, IBM Systems Journal, pp. 42-60.
General Instrument Corporation
Moorthy Aravind K
Sheikh Ayaz
LandOfFree
Internet protocol telephony security architecture does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Internet protocol telephony security architecture, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Internet protocol telephony security architecture will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3400075