Method and array for authenticating a first instance and a...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S169000, C713S171000, C380S030000, C380S284000, C380S285000

Reexamination Certificate

active

07007164

ABSTRACT:
In order to authenticate a first entity at a second entity, a first number is generated by way of an asymmetric cryptographic method. This first number is symmetrically encoded and transmitted to the second entity. The second entity checks the first number by decoding the second number and thereby authenticates the first entity.

REFERENCES:
patent: 4200770 (1980-04-01), Hellman et al.
patent: 5241599 (1993-08-01), Bellovin et al.
patent: 5491749 (1996-02-01), Rogaway
patent: 6226383 (2001-05-01), Jablon
patent: 39 15 262 (1989-11-01), None
Jablon, D., Strong Password-Only Authenticated Key Exchange, Oct. 1996, ACM Computer Communications Review, pp. 1-22.
Menezes et al., Handbook of Applied Cryptography, 1997, CRC Press, pp. 103-113.
Schneier, B., “Applied Crytography”, 1996 John Wiley & Sons, 2nd Edition, pp. 513-514, 519-521.
Menezes, A. et al, “Handbook of Applied Cryptography”, 1997, CRC Press, pp. 359-368.
Harn, L, “Modified key agreement protocol based on the digital signature standard”, Electronics Letters, (1995) UK, vol. 31, No. 6, pp. 448-449.
Diffie W, et al, “Authentication and authenticated key exchanges”, Designs, Codes and Cryptography, (1992), Netherlands, vol. 2, No. 2, pp. 107-125.
Koblitz, N. , “Elliptic curve cryptosystems” Mathematics of Computation, (1987), USA, vol. 48, No. 177, pp. 203-209.
Ruland, C., Informationssicherheit in Datennetzen [Information security in data networks], DATACOM-Verlag, Bergheim (1993), ISBN 3-89238-081-3, pp. 42-46.
Ruland, C., Informationssicherheit in Datennetzen [Information security in data networks], DATACOM-Verlag, Bergheim (1993), ISBN 3-89238-081-3, pp. 73-85.
Ruland, C., Informationssicherheit in Datennetzen [Information security in data networks], DATACOM-Verlag, Bergheim (1993), ISBN 3-89238-081-3, pp. 101-117.
NIST, FIPS Pub 180-1: Secure Hash Standard, (1995), http://csrc.nist.gov/fips/fip180-1.ps.
NIST, FIPS Pub 81: DES Modes of Operation, (1980), http://www.itl.nist.gov/div897/pubs/fip81.htm.
Menezes, A. et al., Handbook of Applied Cryptography; CRC Press (1996), ISBN 0-8493-8523-7; chapter 12.6, pp. 515-524.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and array for authenticating a first instance and a... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and array for authenticating a first instance and a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and array for authenticating a first instance and a... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3652497

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.