Method and apparatus for verifying the legitimacy of an...

Information security – Access control or authentication

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S168000

Reexamination Certificate

active

07103910

ABSTRACT:
The legitimacy of an untrusted mechanism is verified by submitting a first set of information and a second set of information to the untrusted mechanism in an unpredictable sequence. For each submission of either the first set or the second set of information, a response is received from the untrusted mechanism. Each response is tested to determine if the response is correct for the information set submitted. If any of the responses from the untrusted mechanism is incorrect, then it is determined that the untrusted mechanism is not legitimate. Because the submission sequence is unpredictable, it is highly difficult if not impossible for an illegitimate untrusted mechanism to “fake” proper responses. As a result, this verification process provides an effective means for testing and verifying the legitimacy of the untrusted mechanism.

REFERENCES:
patent: 5493692 (1996-02-01), Theimer et al.
patent: 5555376 (1996-09-01), Theimer et al.
patent: 5649099 (1997-07-01), Theimer et al.
patent: 6209104 (2001-03-01), Jalili
patent: 6298445 (2001-10-01), Shostack et al.
patent: 6535980 (2003-03-01), Kumar et al.
patent: 2002/0112171 (2002-08-01), Ginter et al.
patent: WO 98/58322 (1998-12-01), None
Roger S. Pressman, Ph.D., “Software Engineering, A Practitioner's Approach,” Fourth Edition, 1982-1987, pp. 1-22 and 549-576.
European Patent Office, “Communication pursuant to Article 96(2) EPC,” Aug. 4, 2004, 4 pages.
European Patent Office, “Communication pursuant to Article 96(2) EPC,” Aug. 20, 2004, 5 pages.
Current Claims in European patent application, Application No. 00309875.3, 13 pages.
Current Claims in European patent application, Application No. 00309877.9, 11 pages.
FOLDOC Online Dictionary of Computing, “wild card,” Jul. 16, 1997, XP-002261382, 1 page.
Simon N. Foley, “A Model for Secure Information Flow,” Feb. 1, 1989, IEEE, pp. 248-258.
European Patent Office, “Communication,” Nov. 11, 2003, 4 pages.
Current Claims in European patent application no. 00309875.3, 13 pages.
David A. Taylor, “Object-Oriented Inforamtion Systems, Planning and Implementations,” 1992, John Wiley and Sons, 369 pages.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for verifying the legitimacy of an... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for verifying the legitimacy of an..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for verifying the legitimacy of an... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3555340

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.