Method and system for authenticating messages

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Having particular address related cryptography

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S170000, C713S176000, C713S180000, C713S181000, C380S262000

Reexamination Certificate

active

07370197

ABSTRACT:
A method and system for authenticating a message is described, in which the message contains a network address, at least a portion of which is a digital fingerprint. Embedded in the message is data, such as a code, that indicates the size of the digital fingerprint. A device receiving the message uses the size data and, for example, the public key of the sender to attempt to reproduce the digital fingerprint. If successful, the device receiving the message verifies the identity of the sender.

REFERENCES:
patent: 5473691 (1995-12-01), Menezes et al.
patent: 5511122 (1996-04-01), Atkinson
patent: 5673319 (1997-09-01), Bellare et al.
patent: 5729608 (1998-03-01), Janson et al.
patent: 5778065 (1998-07-01), Hauser et al.
patent: 5892904 (1999-04-01), Atkinson et al.
patent: 6055234 (2000-04-01), Aramaki
patent: 6055236 (2000-04-01), Nessett et al.
patent: 6101499 (2000-08-01), Ford et al.
patent: RE36946 (2000-11-01), Diffie et al.
patent: 6367012 (2002-04-01), Atkinson et al.
patent: 6615348 (2003-09-01), Gibbs
patent: 6687755 (2004-02-01), Ford et al.
patent: 6832322 (2004-12-01), Boden et al.
patent: 6944672 (2005-09-01), Crow et al.
patent: 6957346 (2005-10-01), Kivinen et al.
patent: 7032242 (2006-04-01), Grabelsky et al.
patent: 2002/0152380 (2002-10-01), O'Shea et al.
patent: 2002/0152384 (2002-10-01), Shelest et al.
patent: 2003/0065934 (2003-04-01), Angelo et al.
patent: 2003/0120929 (2003-06-01), Hoffstein et al.
patent: 2003/0142823 (2003-07-01), Swander et al.
patent: 2003/0233568 (2003-12-01), Maufer et al.
patent: 2004/0008845 (2004-01-01), Le et al.
patent: 2004/0088537 (2004-05-01), Swander et al.
patent: 2004/0151322 (2004-08-01), Sovio et al.
patent: 2004/0158714 (2004-08-01), Peyravian et al.
patent: 2004/0193875 (2004-09-01), Aura
patent: 2006/0005014 (2006-01-01), Aura et al.
patent: 2006/0020796 (2006-01-01), Aura et al.
patent: 2006/0020807 (2006-01-01), Aura et al.
patent: 2006/0077908 (2006-04-01), Park et al.
patent: 1333635 (2003-06-01), None
patent: WO 2006068450 (2006-06-01), None
RFC 3972, T.Aura , Microsoft Research Mar. 2005.
“Glossary for the Linux FreeS/WAN project,” (Publication Date Not Available), [34 pages].
Bassil, Alessandro; Laganier, Julien. “Towards an IPv6-based Security Framework for Distributed Storage Resources,” Communications and Multimedia Security CMS 2003, Oct. 2-3, 2003, [9 pages].
Benantar, M. “The Internet Public Key Infrastructure,” IBM Systems Journal, Vol. 40, No. 3, 2001, pp. 648-665.
Cheng, P.C.; Garay, J.A; Herzberg, A.; Krawczyk, H. “A Security Architecture for the Internet Protocol,” 1998, vol. 37, No. 1, pp. 42-60.
Cheng, Pau-Chen; Garay, Juan A.; Herzberg, Amir; Krawczyk, Hugo. “Design and Implementation of Modular Key Management Protocol and IP Secure Tunnel on AIX,” Jun. 1995, [15 pages].
Cheng, PC. “An Architecture for the Internet Key Exchange Protocol,” IBM Systems Journal, vol. 40, No. 3, 2001, pp. 721-746.
Clark, David D. “IP Datagram Reassembly Algorithms,” RFC 815, Jul. 1982, [11 pages].
Higginson, Peter L.; Shand, Michael C. “Development of Router Clusters to Provide Fast Failover in IP Networks,” Digital Technical Journal vol. 9, No. 3, 1997, pp. 32-41.
Kent et al. “IP Encapsulating Security Payload (ESP),” The Internet Society, RFC 2406, Nov. 1998, [34 pages].
Koskiahde, Timo. “Security in Mobile IPv6,” Apr. 18, 2002, pp. 1-14.
Maughan et al. “Internet Security Association and Key Management Protocol (ISAKMP),” the Internet Society, RFC 2408, Nov. 1998, [141 pages].
Shannon, Colleen; Moore, David; Claffy, K. “Characteristics of Fragmented IP Traffic on Internet Links,” Internet Measurement Conference. 2001, pp. 83-97.
Aura, T. “Cryptographically Generated Addresses (CGA),” RFC 3972, Mar. 2005, [21 Pages].
“Computer Networks”, AS Tannenbaum, Prentice-Hall, 1989.
Kaufman, C. “Internet Key Exchange (IKEv2) Protocol,” RFC 4306, Dec. 2005, [93 pages].
Kent, S. and Atkinson, R. “Security Architecture for the Internet Protocol,” RFC 2401, Nov. 1998, [62 pages].
Laganier, J. “Using IKE with IPv6 Cryptographically Generated Address,” Network Working Group, Internet-Draft. Feb. 24, 2003, pp. 1-15.
Link, B., Hager, T. and Flaks J. “RTP Payload Format for AC-3 Audio,” RFC 4184, Oct. 2005, [13 pages].
Nir, Y. “Repeated Authentication in Internet Key Exchange (IKEv2) Protocol,” RFC 4478, Apr. 2006, [5 pages].
Office Action issued in U.S. Pat. Appl. No. 10/401,241 (Jan. 25, 2007).
Snapschout, JLA Van De. “The Sliding window protocol revisited,” Formal Aspects of Computing vol. 7, pp. 3-17, 1995.
Hinden et al., IPv6 Working Group Minutes, Minneapolis IETF, Mar. 18, 2002 [accessed May 29, 2005 from http://www.ietf.org/proceedings/02mar/minutes/ipv6.htm], 13pp.
Nordmark, “Allocating bit in IID for Mobile IPv6”, Mar. 2002, [accesses May 29, 2005 from http://www.ietf.org/proceedings/02mar/slides/ipv6-13.pdf], 8pp.
Nordmark,“Reserving space in the Interface ID”, from Mar. 2002[accessed May 20, 2005 from http://www.ietf.org/proceedings/02mar/slides/ipv6-14.pdf], 6pp.
IETF Proceedings, “Security and Mobile IPv6”, Mar. 2001 [accessed May 29, 2005 from http://www.ietf.org/proceedings/01mar/slides/mobileip-9], 1pg.
Kempf et al., “Threat Analysis for IPv6 Public Multi-Access Links”, draft-kempf-ipng-netaccess-threats-00.txt, Nov. 2001, 7pp.
Nikander et al., “Threat Models introduced by Mobile IPv6 and Requirements for Security in Mobile IPv6”, draft-team-mobileip-mipv6-sec-reqts-00.txt, Jul. 12, 2001, 28pp.
Thomas, “Binding Updates Security”, draft-thomas-mobile-bu-sec-00.txt, Nov. 2, 2001, 13pp.
Nikander et al., “Binding Authentication Key Establishment Protocol for Mobile IPv6”, draft-perkins-bake-01.txt, Jul. 2, 2001, 42pp.
Thomson, et al., “IPv6 Stateless Address Autoconfiguration,” RFC1971 (Aug. 1996) 22 pgs. downloaded from http://www.ietf.org/rfc1971.txt; on Apr. 11, 2006.
O'Shea, et al., “Child-Proof Authentication for MIPv6 (CAM),”vol. 31, No. 2, ACM SIGCOMM Computer Communications Review, Apr. 2001, pp. 4-8.
M. Burrows et al., “A Logic of Authentication” Proceedings of the Royal Society of London Series A, 426, pp. 233-271 (1989).
S. Deering et al., “Version 6 (IPv6) Specification”RFC2460 (Dec. 1998).
“Secure Hash Standard,” NIST, FIPS PUB 180-1, http://csrc.nist.goc/fips/fip180-1.txt. (Apr. 1995).
Harkins et al., “The Internet Key Exchange (IKE),” RFC2409 (Nov. 1998).
Hinden et al., “IP Version 6 Addressing Architecture,” (Mar. 10, 2000).
Huitema, “Ipv6 The New Internet Protocol,” Prentice Hall PTR, ISBN 0-13-850505-5 (1998).
Johnson et al., “Mobility Support in IPv6,” (Apr. 27, 2000).
Kent et al., “IP Authentication Header,” RFC2402 (Nov. 1998).
Mills, “Simple Network Time Protocol (SNMP) Version 4 for IPv6 and OSI,” RFC2030 (Oct. 1996).
Mills, “IP Mobility Support,” RFC2002 (Oct. 1996).
Thomson et al., “IPv6 Stateless Address Autoconfiguration,” RFC2462 (Dec. 1998).
Kent et al., “Security Architecture for the Internet Protocol,” RFC2401 (Nov. 1998).
Aura et al.,Security of Internet Location Management, Proc. 18thAnnual Computer Security Applications Conference, IEEE Press, Nevada (Dec. 2002).
Blaze et al.,The KeyNote Trust-Management System Version 2, IETF Network Working Group, RFC 2704 (Sep. 1999) pp. 1-35.
Eastlake,Domain Name System Security Extensions, IETF Network Working Group, RFC 2535 (Mar. 1999) pp. 1-44.
Ellison et al.,SPKI Certificate Theory, IETF Network Working Group, RFC 2693 (Sep. 1999) pp. 1-41.
Ferguson et al.,Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing, IETF Network Working Gr

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for authenticating messages does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for authenticating messages, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for authenticating messages will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2762912

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.