Information security – Access control or authentication – Network
Reexamination Certificate
2002-06-27
2008-05-06
Revak, Christopher (Department: 2131)
Information security
Access control or authentication
Network
C726S014000, C713S168000, C713S182000, C380S259000
Reexamination Certificate
active
07370350
ABSTRACT:
A method of authenticating a first computing device in communication over a network to a second computing device is disclosed. The first computing device is authenticated to the second computing device using a first authentication mechanism. The first authentication mechanism is based on Extensible Authentication Protocol (EAP) or IEEE 802.1x authentication. Short-term re-authentication data is generated and issued to the first computing device. Later, a request from the first computing device to re-authenticate to the second computing device is received. The first computing device is re-authenticated to the second computing device using a challenge-response mechanism in which the first computing device authenticates itself by presenting the short-term authentication credential to the second computing device. Accordingly, re-authentication proceeds more quickly and with fewer message exchanges.
REFERENCES:
patent: 6032260 (2000-02-01), Sasmazel et al.
patent: 6067621 (2000-05-01), Yu et al.
patent: 6189098 (2001-02-01), Kaliski, Jr.
patent: 6856800 (2005-02-01), Henry et al.
patent: 6879690 (2005-04-01), Faccin et al.
patent: 6895502 (2005-05-01), Fraser
patent: 2002/0012433 (2002-01-01), Haverinen et al.
patent: 2002/0077078 (2002-06-01), Antti
patent: 2003/0120763 (2003-06-01), Volpano
patent: 2003/0188195 (2003-10-01), Abdo et al.
patent: 2003/0226017 (2003-12-01), Palekar et al.
patent: 2005/0152305 (2005-07-01), Ji et al.
patent: 2005/0232428 (2005-10-01), Little et al.
patent: 2005/0246531 (2005-11-01), Fabre
patent: 2005/0251680 (2005-11-01), Brown et al.
patent: 2006/0133613 (2006-06-01), Ando et al.
patent: 2006/0215601 (2006-09-01), Vleugels et al.
patent: 2006/0240802 (2006-10-01), Venkitaraman et al.
patent: 2007/0162751 (2007-07-01), Braskich et al.
B. Aboba, D. Simon. “RFC 2716—PPP EAP TLS Authentication Protocol” Oct. 1999.
M. Burrows, M. Abadi, R. Needham “A Logic of Authentication” (Feb. 1990) ACM Transactions on Computer Systems (TOCS) vol. 8 Issue 1 pp. 18-36.
B.C. Neuman, T. Ts'o. “Kerberos: An Authentication Service for Computer Networks” (Sep. 1994) IEEE Communications Magazine, vol. 32, No. 9, pp. 33-38.
H. Haverinen. “EAP SIM Authentication draft-haverinen-pppext-eap-sim-03.txt” (Feb. 2002).
R. Cosmin “SSL, Kerberos, and the Leighton-Micali Protocol” (Oct. 1993) ACM SIGOPS Operating System Review vol. 27 Issue 4. pp. 24-30.
M. Swift, J. Brezak “The Windows 2000 RC4-HMAC Kerberos Encryption Type” (Oct. 1999) CAT Working Group.
Lowe, Gavin. “An Attack on the Needham-Schroeder Public-Key Authentication Protocol” (Aug. 22, 1995) Information Processing Letters.
Syverson, P. 1993. On key distribution protocols for repeated authentication. SIGOPS Oper. Syst. Rev. 27, 4 (Oct. 1993), 24-30. DOI=http://doi.acm.org/10.1145/163640.163642.
Freier et a;, “The SSL Protocol: Version 3.0”, Nov. 18, 1996, Transport Layer Security Working Group Internet Draft, p. 1-62.
H. Haverinen, “EAP SIM Authentication,” Point-to-Point Extensions Working Group, Feb. 2002, pp. 1-26.
H. Haverinen, “EAP SIM Authentication, draft-haverinen-pppext-eap-sim-04.txt,” Point-to-Point Extensions Working Group, Jun. 2002, pp. 1-26.
Karl Fox, “2.3.9 Point-to-Point Protocol Extensions (pppext),” IETF Mar. 2001 Proceedings, http://www.ietf.org/proceedings/01mar/ietf50-57.htm, printed Nov. 14, 2002, pp. 1-5.
A. Medvinsky, et al., “Public Key Utilizing Tickets for Application Servers (PKTAPP),” Internet-Draft, Common Authentication Technology Working Group, Mar. 1998, pp. 1-6.
H. Anderson, et al., Protected EAP Protocol (PEAP), PPPEXT Working Group, Internet-Draft, Category: Standards Track, Feb. 23, 2002, pp. 1-42.
J. Kohl, et al., “The Kerberos Network Authentication Service (V5)” Network Working Group, Request for Comments: 1510, Sep. 1993, pp. 1-111.
Cisco Technology Inc.
Hickman Palermo & Truong & Becker LLP
Revak Christopher
LandOfFree
Method and apparatus for re-authenticating computing devices does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for re-authenticating computing devices, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for re-authenticating computing devices will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3986715