Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
1999-11-02
2002-12-03
Smithers, Matthew B. (Department: 2132)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S182000, C380S277000
Reexamination Certificate
active
06490682
ABSTRACT:
FIELD OF THE INVENTION
The invention relates to a protocol for the secure receipt and transmission of data between a pair of correspondents and in particular for the secure receipt of data by a client in a client-server environment.
BACKGROUND OF THE INVENTION
With the advent of the Internet and the proliferation of Internet users along with the dramatic increase in data baud rates, there has been a move to distributed computing. For example, in the windows environment, a browser may be used to access a website and download a HTML page. Within the page might be included a program applet much like an image that is contained within the page. The applet's code is transferred from the server to the client system and executed by the client's computer. There are also instances where software or program applets are provided from a server to a client.
In the cases where the client does not trust the server a protocol has to be implemented whereby the client is able to authenticate the server. Or more generally where the client does not know the server since the server will serve any client, i.e. any requester is potentially valid as far as the client is concerned. Furthermore the applets received from the server include in some instances a log-on applet received from the server. Thus there exists a need for a log-on applet authentication protocol. The documents titled “Security Defects in CCITT Recommendation X.509-The Directory Authentication Framework”, “Elliptic Curves Over F
p
Suitable For Cryptosystems”, “Secure User Access Control For Public Networks”, and U.S. Pat. No. 5,434,918 are referenced as background art.
SUMMARY OF THE INVENTION
This invention seeks to provide a solution to the problem of server verification by a client.
According to an aspect of this invention there is provided a method of authenticating pair of correspondents C,S in an information exchange session to permit exchange of information there between, characterized in that:
a) the first correspondent C transmitting to the second correspondent S a first unique information,
b) the second correspondent S verifying the identity of C and generating a second unique information;
c) transmitting to C the first and second unique information;
d) the C verifying the first unique information to thereby establish currency of the session;
e) the first correspondent C then generating a third unique information and transmitting the third unique information to the S along with an information request;
f) the second correspondent S transmitting to C the requested information along with said second and third unique information;
g) said c verifying said third unique information to thereby establish currency of the request and verifying the second unique information to thereby establish currency of the session;
h) said C repeating steps e) to g) for each additional information requested by C.
Also, this aspect of the invention provides for apparatus for carrying out the method. Such an apparatus can comprise any computational apparatus such as a suitably programmed computer.
REFERENCES:
patent: 5434918 (1995-07-01), Kung et al.
patent: 6085320 (2000-07-01), Kalishi, Jr.
patent: 6151676 (2000-11-01), Cuccia et al.
Menezes et al, Handbook of Applied Cryptography, Oct. 17, 1996, pp. 172, 188, 397, 398, 404, 405, 494, 497, and 498.*
I'Anson, C. et al.: “Security Defects in CCITT Recommendation X.509—The Directory Authentication Framework” Computer Communication Review, vol. 20, No. 2, Apr. 20, 1990, pp. 30-34, XP 000133725 New York (US).
Miyaji, A.: “Elliptic Curves Over FpSuitable for Cryptosystems” Advances in Cryptology—AUCRYPT '92 Gold Coast, Queensland, Dec. 13-16, No. Conf. 3, Dec. 13, 1992, pp. 479-491, XP000470467 Berlin (DE).
Pil Joong Lee: “Secure User Access Control for Public Networks” Advances in Cryptology—AUCRYPT '90, Sydney, Jan. 8-11, 1990, No. Conf. 1, Jan. 8, 1990, pp. 46-57, XP000145201 Berlin (DE).
Johnson Donald
Vanstone Scott A.
Certicom Corporation
Jenkens & Gilchrist A Professional Corporation
Smithers Matthew B.
LandOfFree
Log-on verification protocol does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Log-on verification protocol, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Log-on verification protocol will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2987237