Method and apparatus for re-authenticating computing devices

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S014000, C713S168000, C713S182000, C380S259000

Reexamination Certificate

active

07370350

ABSTRACT:
A method of authenticating a first computing device in communication over a network to a second computing device is disclosed. The first computing device is authenticated to the second computing device using a first authentication mechanism. The first authentication mechanism is based on Extensible Authentication Protocol (EAP) or IEEE 802.1x authentication. Short-term re-authentication data is generated and issued to the first computing device. Later, a request from the first computing device to re-authenticate to the second computing device is received. The first computing device is re-authenticated to the second computing device using a challenge-response mechanism in which the first computing device authenticates itself by presenting the short-term authentication credential to the second computing device. Accordingly, re-authentication proceeds more quickly and with fewer message exchanges.

REFERENCES:
patent: 6032260 (2000-02-01), Sasmazel et al.
patent: 6067621 (2000-05-01), Yu et al.
patent: 6189098 (2001-02-01), Kaliski, Jr.
patent: 6856800 (2005-02-01), Henry et al.
patent: 6879690 (2005-04-01), Faccin et al.
patent: 6895502 (2005-05-01), Fraser
patent: 2002/0012433 (2002-01-01), Haverinen et al.
patent: 2002/0077078 (2002-06-01), Antti
patent: 2003/0120763 (2003-06-01), Volpano
patent: 2003/0188195 (2003-10-01), Abdo et al.
patent: 2003/0226017 (2003-12-01), Palekar et al.
patent: 2005/0152305 (2005-07-01), Ji et al.
patent: 2005/0232428 (2005-10-01), Little et al.
patent: 2005/0246531 (2005-11-01), Fabre
patent: 2005/0251680 (2005-11-01), Brown et al.
patent: 2006/0133613 (2006-06-01), Ando et al.
patent: 2006/0215601 (2006-09-01), Vleugels et al.
patent: 2006/0240802 (2006-10-01), Venkitaraman et al.
patent: 2007/0162751 (2007-07-01), Braskich et al.
B. Aboba, D. Simon. “RFC 2716—PPP EAP TLS Authentication Protocol” Oct. 1999.
M. Burrows, M. Abadi, R. Needham “A Logic of Authentication” (Feb. 1990) ACM Transactions on Computer Systems (TOCS) vol. 8 Issue 1 pp. 18-36.
B.C. Neuman, T. Ts'o. “Kerberos: An Authentication Service for Computer Networks” (Sep. 1994) IEEE Communications Magazine, vol. 32, No. 9, pp. 33-38.
H. Haverinen. “EAP SIM Authentication draft-haverinen-pppext-eap-sim-03.txt” (Feb. 2002).
R. Cosmin “SSL, Kerberos, and the Leighton-Micali Protocol” (Oct. 1993) ACM SIGOPS Operating System Review vol. 27 Issue 4. pp. 24-30.
M. Swift, J. Brezak “The Windows 2000 RC4-HMAC Kerberos Encryption Type” (Oct. 1999) CAT Working Group.
Lowe, Gavin. “An Attack on the Needham-Schroeder Public-Key Authentication Protocol” (Aug. 22, 1995) Information Processing Letters.
Syverson, P. 1993. On key distribution protocols for repeated authentication. SIGOPS Oper. Syst. Rev. 27, 4 (Oct. 1993), 24-30. DOI=http://doi.acm.org/10.1145/163640.163642.
Freier et a;, “The SSL Protocol: Version 3.0”, Nov. 18, 1996, Transport Layer Security Working Group Internet Draft, p. 1-62.
H. Haverinen, “EAP SIM Authentication,” Point-to-Point Extensions Working Group, Feb. 2002, pp. 1-26.
H. Haverinen, “EAP SIM Authentication, draft-haverinen-pppext-eap-sim-04.txt,” Point-to-Point Extensions Working Group, Jun. 2002, pp. 1-26.
Karl Fox, “2.3.9 Point-to-Point Protocol Extensions (pppext),” IETF Mar. 2001 Proceedings, http://www.ietf.org/proceedings/01mar/ietf50-57.htm, printed Nov. 14, 2002, pp. 1-5.
A. Medvinsky, et al., “Public Key Utilizing Tickets for Application Servers (PKTAPP),” Internet-Draft, Common Authentication Technology Working Group, Mar. 1998, pp. 1-6.
H. Anderson, et al., Protected EAP Protocol (PEAP), PPPEXT Working Group, Internet-Draft, Category: Standards Track, Feb. 23, 2002, pp. 1-42.
J. Kohl, et al., “The Kerberos Network Authentication Service (V5)” Network Working Group, Request for Comments: 1510, Sep. 1993, pp. 1-111.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for re-authenticating computing devices does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for re-authenticating computing devices, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for re-authenticating computing devices will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3986715

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.