Key exchange verification

Cryptography – Key management – Key distribution

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S259000, C380S260000, C380S277000, C713S168000, C713S171000

Reexamination Certificate

active

07933413

ABSTRACT:
Key exchanges between peer-to-peer devices can be vulnerable to man in the middle attacks. Verification of the key exchanges can be made on a channel, network and/or device different from the channel, network and/or device used for the key exchange to determine whether the key exchange was secure. Verification of the key exchange can also be made through an established and trusted device and/or entity. If the key exchange was secure, the parties to a communication utilizing the key(s) exchanged can be notified, if desired. If the key exchange was not secure, the parties can be notified and the communication can be selectively disconnected.

REFERENCES:
patent: 5675648 (1997-10-01), Townsend
patent: 5696880 (1997-12-01), Gustafson et al.
patent: 6865681 (2005-03-01), Nuutinen
patent: 6907034 (2005-06-01), Begis
patent: 7039946 (2006-05-01), Binding
patent: 7131004 (2006-10-01), Lyle
patent: 2002/0025042 (2002-02-01), Saito
patent: 2002/0059516 (2002-05-01), Turtiainen
patent: 2003/0081774 (2003-05-01), Lin
patent: 2003/0123434 (2003-07-01), Hirayama
patent: 2003/0172280 (2003-09-01), Edward
patent: 2005/0044365 (2005-02-01), Haukka
patent: 2005/0182937 (2005-08-01), Bedi
patent: 2005/0185644 (2005-08-01), Tsuji
patent: 2006/0005033 (2006-01-01), Wood
patent: 2006/0190730 (2006-08-01), Iwamura
patent: 2006/0206705 (2006-09-01), Khosravi
patent: 2007/0112962 (2007-05-01), Lewontin
patent: 2007/0233860 (2007-10-01), Lillie et al.
patent: 11-149414 (1999-06-01), None
patent: 14-217896 (2002-08-01), None
patent: WO2005002131 (2005-01-01), None
Educated Guesswork. Detecting MITM attacks on VoIP systems. May 5, 2006. http://www.educatedguesswork.org/ movabletype/archives/2006/05/detecting—mitm.html. Last accessed Dec. 7, 2006.
Borderware. Securing and Federating VoIP Using Encryption—A Discussion of ZRTP Implementation Models. http:// www.borderware.com/pdfsWP—Zfone—0906.pdf. Last accessed Dec. 7, 2006.
Simon Horne. Technical Paper—eaRTP—Encryption and Authentication with Real Time Protocol—An End-to-End Security framework within deployed H.323 networks. Packetizer Labs. Nov. 28, 2005. http//www.packertizer.com/labs/eaRTP.pdf. Last accessed Dec. 7, 2006.
International Search Report and Written Opinion dated Jun. 30, 2008 for PCT Application Serial No. PCT/US2008/052698, 10 pages.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Key exchange verification does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Key exchange verification, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Key exchange verification will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2671917

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.