Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular node for directing data and applying cryptography
Reexamination Certificate
2003-04-10
2008-11-11
Zand, Kambiz (Department: 2134)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular node for directing data and applying cryptography
C726S012000
Reexamination Certificate
active
07451305
ABSTRACT:
A method of securely exchanging cryptographic identities through a mutually trusted intermediary is disclosed. Data, which specifies a petitioner's cryptographic identity and a petitioner's resource identifier, is received. Input, which specifies an authority's resource identifier, is received. The petitioner's cryptographic identity and the petitioner's resource identifier are sent to a destination that is associated with the authority's resource identifier. Data, which specifies the authority's cryptographic identity, is received. The authority's cryptographic identity is sent to a destination that is associated with the petitioner's resource identifier.
REFERENCES:
patent: 5268962 (1993-12-01), Abadi et al.
patent: 5668878 (1997-09-01), Brands
patent: 5850517 (1998-12-01), Verkler et al.
patent: 5961601 (1999-10-01), Iyengar
patent: 5963915 (1999-10-01), Kirsch
patent: 6134592 (2000-10-01), Montulli
patent: 6253326 (2001-06-01), Lincke et al.
patent: 6263437 (2001-07-01), Liao et al.
patent: 6496932 (2002-12-01), Trieger
patent: 6904521 (2005-06-01), Jivsov
patent: 6938171 (2005-08-01), Isomichi et al.
patent: 2004/0015725 (2004-01-01), Boneh et al.
patent: 2004/0030925 (2004-02-01), Raheman
patent: 2005/0154873 (2005-07-01), Cam-Winger et al.
T. Dierks, C. Allen. “The TLS Protocol Version 1.0.” RFC 2246. Jan. 1999. http://rfc.sunsite.dk/rfc/rfc2246/html. Accessed on Jul. 20, 2006. .pp. 1, 4, 29-32, 68-69.
Thomas Wason, et al., “Liberty ID-FF Architecture Overview, Version 1.2,” Liberty Alliance Project, www.project-liberty.org/, pp. 1-44.
T. Berners-Lee, et al., “Hypertext Markup Language—2.0,” Nov. 1995, Network Working Group, Request for Comments: 1866, http://www.ietf.org/rfc/rfc1866.txt?number=1866, printed Jul. 10, 2003, pp. 1-72.
R. Fielding, et al., “Hypertext Transfer Protocol—HTTP/1.1,” Jan. 1997, Network Working Group, Request for Comments: 2068, http://www.ietf.org/rfc/rfc2068.txt?number=2068, printed Jul. 10, 2003, pp. 1-152.
J. Jonsson, et al., “Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1,” Feb. 2003, Network Working Group, Request for Comments: 3347, http://www.ietf.org/rfc/rfc3447.txt?number=3447, printed Jul. 10, 2003, pp. 1-68.
B. Kaliski, et al., “PKCS #1: RSA Cryptography Specifications Version 2.0,” Oct. 1998, Networking Working Group, Request for Comments: 2437, http://www.ietf.org/rfc/rfc2437.txt?number=2437, printed Jul. 10, 2003, pp. 1-37.
B. Kaliski, “PKCS #1, RSA Encryption Version 1.5,” Mar. 1998, Network Working Group, Request for Comments: 2313, http://www.ietf.org/rfc/rfc2313.txt?number=2313, printed Jul. 10, 2003, pp. 1-18.
International Searching Authority, “Notification of Transmittal of the International Search Report and the Written Opinion of the International Searching Authority, or the Declaration,” PCT/US05/00812 (50325-1010), dated Jun. 14, 2006, 6 pages.
Claims, PCT/US05/00812 (50325-1010), 10 pages.
Baker, F. et al., “RSVP Cryptographic Authentication,”Network Working Group, RFC 2747, Jan. 2000, 20 pages.
Braden, R., et al., “Resource ReSerVation Protocol (RSVP),” Network Working Group, RFC 2205, Sep. 1997, 105 pages.
Herzog, S. et al., “RSVP Extension for Policy Control,” Network Working Group, RFC 2750, Jan. 2000, 13 pages.
Birk, Yithak, “Coding On Demand by an Informed Source (ISCOD) for Efficient Broadcast of Different Supplemental Data to Caching Clients,” IEEE Transactions on Information Theory, vol. 52, No. 6, Jun. 2006, pp. 2825-2830.
Phatak, S.H., et al., “Web&: An Architecture for Non-Interactive Web,” Internet Applications, 2001, WIAPP 2001, Proceedings of the Second IEEEE Workshop on Jul. 23-24, 2001, pp. 104-112.
Yao, Bin et al., “Proxy-based Recovery for Applications on Wireless Hand-held Devices,” Reliable Distributed Systems 2000, SRDS-2000, Proceedings of the 19thIEEE Symposium on Oct. 16-18, 2000. pp. 2-10.
International Searching Authority “Notification of Transmittal of The International Search Report and The Written Opinion of the International Searching Authority, or the Declaration”, PCT/US06/11479, dated May 1, 2007, 8 pages.
Cisco Technology Inc.
Gee Jason K
Hickman Palermo & Truong & Becker LLP
Zand Kambiz
LandOfFree
Method and apparatus for securely exchanging cryptographic... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for securely exchanging cryptographic..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for securely exchanging cryptographic... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4048049