Method and apparatus for securely exchanging cryptographic...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular node for directing data and applying cryptography

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S012000

Reexamination Certificate

active

07451305

ABSTRACT:
A method of securely exchanging cryptographic identities through a mutually trusted intermediary is disclosed. Data, which specifies a petitioner's cryptographic identity and a petitioner's resource identifier, is received. Input, which specifies an authority's resource identifier, is received. The petitioner's cryptographic identity and the petitioner's resource identifier are sent to a destination that is associated with the authority's resource identifier. Data, which specifies the authority's cryptographic identity, is received. The authority's cryptographic identity is sent to a destination that is associated with the petitioner's resource identifier.

REFERENCES:
patent: 5268962 (1993-12-01), Abadi et al.
patent: 5668878 (1997-09-01), Brands
patent: 5850517 (1998-12-01), Verkler et al.
patent: 5961601 (1999-10-01), Iyengar
patent: 5963915 (1999-10-01), Kirsch
patent: 6134592 (2000-10-01), Montulli
patent: 6253326 (2001-06-01), Lincke et al.
patent: 6263437 (2001-07-01), Liao et al.
patent: 6496932 (2002-12-01), Trieger
patent: 6904521 (2005-06-01), Jivsov
patent: 6938171 (2005-08-01), Isomichi et al.
patent: 2004/0015725 (2004-01-01), Boneh et al.
patent: 2004/0030925 (2004-02-01), Raheman
patent: 2005/0154873 (2005-07-01), Cam-Winger et al.
T. Dierks, C. Allen. “The TLS Protocol Version 1.0.” RFC 2246. Jan. 1999. http://rfc.sunsite.dk/rfc/rfc2246/html. Accessed on Jul. 20, 2006. .pp. 1, 4, 29-32, 68-69.
Thomas Wason, et al., “Liberty ID-FF Architecture Overview, Version 1.2,” Liberty Alliance Project, www.project-liberty.org/, pp. 1-44.
T. Berners-Lee, et al., “Hypertext Markup Language—2.0,” Nov. 1995, Network Working Group, Request for Comments: 1866, http://www.ietf.org/rfc/rfc1866.txt?number=1866, printed Jul. 10, 2003, pp. 1-72.
R. Fielding, et al., “Hypertext Transfer Protocol—HTTP/1.1,” Jan. 1997, Network Working Group, Request for Comments: 2068, http://www.ietf.org/rfc/rfc2068.txt?number=2068, printed Jul. 10, 2003, pp. 1-152.
J. Jonsson, et al., “Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1,” Feb. 2003, Network Working Group, Request for Comments: 3347, http://www.ietf.org/rfc/rfc3447.txt?number=3447, printed Jul. 10, 2003, pp. 1-68.
B. Kaliski, et al., “PKCS #1: RSA Cryptography Specifications Version 2.0,” Oct. 1998, Networking Working Group, Request for Comments: 2437, http://www.ietf.org/rfc/rfc2437.txt?number=2437, printed Jul. 10, 2003, pp. 1-37.
B. Kaliski, “PKCS #1, RSA Encryption Version 1.5,” Mar. 1998, Network Working Group, Request for Comments: 2313, http://www.ietf.org/rfc/rfc2313.txt?number=2313, printed Jul. 10, 2003, pp. 1-18.
International Searching Authority, “Notification of Transmittal of the International Search Report and the Written Opinion of the International Searching Authority, or the Declaration,” PCT/US05/00812 (50325-1010), dated Jun. 14, 2006, 6 pages.
Claims, PCT/US05/00812 (50325-1010), 10 pages.
Baker, F. et al., “RSVP Cryptographic Authentication,”Network Working Group, RFC 2747, Jan. 2000, 20 pages.
Braden, R., et al., “Resource ReSerVation Protocol (RSVP),” Network Working Group, RFC 2205, Sep. 1997, 105 pages.
Herzog, S. et al., “RSVP Extension for Policy Control,” Network Working Group, RFC 2750, Jan. 2000, 13 pages.
Birk, Yithak, “Coding On Demand by an Informed Source (ISCOD) for Efficient Broadcast of Different Supplemental Data to Caching Clients,” IEEE Transactions on Information Theory, vol. 52, No. 6, Jun. 2006, pp. 2825-2830.
Phatak, S.H., et al., “Web&: An Architecture for Non-Interactive Web,” Internet Applications, 2001, WIAPP 2001, Proceedings of the Second IEEEE Workshop on Jul. 23-24, 2001, pp. 104-112.
Yao, Bin et al., “Proxy-based Recovery for Applications on Wireless Hand-held Devices,” Reliable Distributed Systems 2000, SRDS-2000, Proceedings of the 19thIEEE Symposium on Oct. 16-18, 2000. pp. 2-10.
International Searching Authority “Notification of Transmittal of The International Search Report and The Written Opinion of the International Searching Authority, or the Declaration”, PCT/US06/11479, dated May 1, 2007, 8 pages.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for securely exchanging cryptographic... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for securely exchanging cryptographic..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for securely exchanging cryptographic... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4048049

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.