Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2006-02-28
2006-02-28
Barrón, Jr., Gilberto (Department: 2132)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S169000, C713S171000, C380S030000, C380S284000, C380S285000
Reexamination Certificate
active
07007164
ABSTRACT:
In order to authenticate a first entity at a second entity, a first number is generated by way of an asymmetric cryptographic method. This first number is symmetrically encoded and transmitted to the second entity. The second entity checks the first number by decoding the second number and thereby authenticates the first entity.
REFERENCES:
patent: 4200770 (1980-04-01), Hellman et al.
patent: 5241599 (1993-08-01), Bellovin et al.
patent: 5491749 (1996-02-01), Rogaway
patent: 6226383 (2001-05-01), Jablon
patent: 39 15 262 (1989-11-01), None
Jablon, D., Strong Password-Only Authenticated Key Exchange, Oct. 1996, ACM Computer Communications Review, pp. 1-22.
Menezes et al., Handbook of Applied Cryptography, 1997, CRC Press, pp. 103-113.
Schneier, B., “Applied Crytography”, 1996 John Wiley & Sons, 2nd Edition, pp. 513-514, 519-521.
Menezes, A. et al, “Handbook of Applied Cryptography”, 1997, CRC Press, pp. 359-368.
Harn, L, “Modified key agreement protocol based on the digital signature standard”, Electronics Letters, (1995) UK, vol. 31, No. 6, pp. 448-449.
Diffie W, et al, “Authentication and authenticated key exchanges”, Designs, Codes and Cryptography, (1992), Netherlands, vol. 2, No. 2, pp. 107-125.
Koblitz, N. , “Elliptic curve cryptosystems” Mathematics of Computation, (1987), USA, vol. 48, No. 177, pp. 203-209.
Ruland, C., Informationssicherheit in Datennetzen [Information security in data networks], DATACOM-Verlag, Bergheim (1993), ISBN 3-89238-081-3, pp. 42-46.
Ruland, C., Informationssicherheit in Datennetzen [Information security in data networks], DATACOM-Verlag, Bergheim (1993), ISBN 3-89238-081-3, pp. 73-85.
Ruland, C., Informationssicherheit in Datennetzen [Information security in data networks], DATACOM-Verlag, Bergheim (1993), ISBN 3-89238-081-3, pp. 101-117.
NIST, FIPS Pub 180-1: Secure Hash Standard, (1995), http://csrc.nist.gov/fips/fip180-1.ps.
NIST, FIPS Pub 81: DES Modes of Operation, (1980), http://www.itl.nist.gov/div897/pubs/fip81.htm.
Menezes, A. et al., Handbook of Applied Cryptography; CRC Press (1996), ISBN 0-8493-8523-7; chapter 12.6, pp. 515-524.
Barrón Jr. Gilberto
Dinh Minh
Greenberg Laurence A.
Infineon - Technologies AG
Locher Ralph E.
LandOfFree
Method and array for authenticating a first instance and a... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and array for authenticating a first instance and a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and array for authenticating a first instance and a... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3652497