Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2008-07-08
2008-07-08
Jung, David Y (Department: 2134)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S150000, C713S170000
Reexamination Certificate
active
07398394
ABSTRACT:
A system and a method for a first node in a communications network to authenticate a second node. The second node is connected by a communications link to a port of the first node. The method comprises setting a status that the second node is regarded as untrusted by the first node, so that the first node discards selected network management messages received over the communications link from the second node while it is regarded as untrusted. The method further comprises performing an authentication protocol with the second node by receiving at least one message from the second node over the communications link. Such message is discarded if it does not form part of the authentication protocol. The first node then treats the second node as trusted if the authentication protocol is successful, so that the selected network management messages received from the second node are no longer discarded.
REFERENCES:
http://www.infinibandta.org/about/, year 2007.
A Comprehensive Framework for Enhancing Security in InfiniBand Architecture Lee, Manhee; Kim, Eun Jung; Parallel and Distributed Systems, IEEE Transactions on vol. 18, Issue 10, Oct. 2007 pp. 1393-1406.
An Enhanced Congestion Control Mechanism in InfiniBand Networks for High Performance Computing Systems Shihang Yan; Geyong Min; Awan, I.; Advanced Information Networking and Applications, 2006. AINA 2006. 20th International Conference on vol. 1, Apr. 18-20, 2006 pp. 845-850.
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks Sencun Zhu; Setia, S.; Jajodia, S.; Peng Ning; Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium on May 9-12, 2004 pp. 259-271.
A Survey of Authentication Mechanisms: Authentication for Ad-Hoc Wireless Sensor Networks Boyle, P.; Newe, T.; Sensors Applications Symposium, 2007. SAS '07. IEEE Feb. 6-8, 2007 pp. 1-6.
A secure mobile IP authentication based on identification protocol; Doo Ho Choi; Hyungon Kim; Kyoil Jung; Intelligent Signal Processing and Communication Systems, 2004. ISPACS 2004. Proceedings of 2004 International Symposium on; Nov. 18-19, 2004 pp. 709-712.
Brean David
Jackson Christopher
Johnsen Bjorn Dag
Jung David Y
Park Vaughan & Fleming LLP
LandOfFree
Method and apparatus for authenticating nodes in a... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for authenticating nodes in a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for authenticating nodes in a... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2768322