Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Having particular address related cryptography
Reexamination Certificate
2008-05-06
2008-05-06
Moazzami, Nasser (Department: 2136)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Having particular address related cryptography
C713S170000, C713S176000, C713S180000, C713S181000, C380S262000
Reexamination Certificate
active
10242705
ABSTRACT:
A method and system for authenticating a message is described, in which the message contains a network address, at least a portion of which is a digital fingerprint. Embedded in the message is data, such as a code, that indicates the size of the digital fingerprint. A device receiving the message uses the size data and, for example, the public key of the sender to attempt to reproduce the digital fingerprint. If successful, the device receiving the message verifies the identity of the sender.
REFERENCES:
patent: 5473691 (1995-12-01), Menezes et al.
patent: 5511122 (1996-04-01), Atkinson
patent: 5673319 (1997-09-01), Bellare et al.
patent: 5729608 (1998-03-01), Janson et al.
patent: 5778065 (1998-07-01), Hauser et al.
patent: 5892904 (1999-04-01), Atkinson et al.
patent: 6055234 (2000-04-01), Aramaki
patent: 6055236 (2000-04-01), Nessett et al.
patent: 6101499 (2000-08-01), Ford et al.
patent: RE36946 (2000-11-01), Diffie et al.
patent: 6367012 (2002-04-01), Atkinson et al.
patent: 6615348 (2003-09-01), Gibbs
patent: 6687755 (2004-02-01), Ford et al.
patent: 6832322 (2004-12-01), Boden et al.
patent: 6944672 (2005-09-01), Crow et al.
patent: 6957346 (2005-10-01), Kivinen et al.
patent: 7032242 (2006-04-01), Grabelsky et al.
patent: 2002/0152380 (2002-10-01), O'Shea et al.
patent: 2002/0152384 (2002-10-01), Shelest et al.
patent: 2003/0065934 (2003-04-01), Angelo et al.
patent: 2003/0120929 (2003-06-01), Hoffstein et al.
patent: 2003/0142823 (2003-07-01), Swander et al.
patent: 2003/0233568 (2003-12-01), Maufer et al.
patent: 2004/0008845 (2004-01-01), Le et al.
patent: 2004/0088537 (2004-05-01), Swander et al.
patent: 2004/0151322 (2004-08-01), Sovio et al.
patent: 2004/0158714 (2004-08-01), Peyravian et al.
patent: 2004/0193875 (2004-09-01), Aura
patent: 2006/0005014 (2006-01-01), Aura et al.
patent: 2006/0020796 (2006-01-01), Aura et al.
patent: 2006/0020807 (2006-01-01), Aura et al.
patent: 2006/0077908 (2006-04-01), Park et al.
patent: 1333635 (2003-06-01), None
patent: WO 2006068450 (2006-06-01), None
RFC 3972, T.Aura , Microsoft Research Mar. 2005.
“Glossary for the Linux FreeS/WAN project,” (Publication Date Not Available), [34 pages].
Bassil, Alessandro; Laganier, Julien. “Towards an IPv6-based Security Framework for Distributed Storage Resources,” Communications and Multimedia Security CMS 2003, Oct. 2-3, 2003, [9 pages].
Benantar, M. “The Internet Public Key Infrastructure,” IBM Systems Journal, Vol. 40, No. 3, 2001, pp. 648-665.
Cheng, P.C.; Garay, J.A; Herzberg, A.; Krawczyk, H. “A Security Architecture for the Internet Protocol,” 1998, vol. 37, No. 1, pp. 42-60.
Cheng, Pau-Chen; Garay, Juan A.; Herzberg, Amir; Krawczyk, Hugo. “Design and Implementation of Modular Key Management Protocol and IP Secure Tunnel on AIX,” Jun. 1995, [15 pages].
Cheng, PC. “An Architecture for the Internet Key Exchange Protocol,” IBM Systems Journal, vol. 40, No. 3, 2001, pp. 721-746.
Clark, David D. “IP Datagram Reassembly Algorithms,” RFC 815, Jul. 1982, [11 pages].
Higginson, Peter L.; Shand, Michael C. “Development of Router Clusters to Provide Fast Failover in IP Networks,” Digital Technical Journal vol. 9, No. 3, 1997, pp. 32-41.
Kent et al. “IP Encapsulating Security Payload (ESP),” The Internet Society, RFC 2406, Nov. 1998, [34 pages].
Koskiahde, Timo. “Security in Mobile IPv6,” Apr. 18, 2002, pp. 1-14.
Maughan et al. “Internet Security Association and Key Management Protocol (ISAKMP),” the Internet Society, RFC 2408, Nov. 1998, [141 pages].
Shannon, Colleen; Moore, David; Claffy, K. “Characteristics of Fragmented IP Traffic on Internet Links,” Internet Measurement Conference. 2001, pp. 83-97.
Aura, T. “Cryptographically Generated Addresses (CGA),” RFC 3972, Mar. 2005, [21 Pages].
“Computer Networks”, AS Tannenbaum, Prentice-Hall, 1989.
Kaufman, C. “Internet Key Exchange (IKEv2) Protocol,” RFC 4306, Dec. 2005, [93 pages].
Kent, S. and Atkinson, R. “Security Architecture for the Internet Protocol,” RFC 2401, Nov. 1998, [62 pages].
Laganier, J. “Using IKE with IPv6 Cryptographically Generated Address,” Network Working Group, Internet-Draft. Feb. 24, 2003, pp. 1-15.
Link, B., Hager, T. and Flaks J. “RTP Payload Format for AC-3 Audio,” RFC 4184, Oct. 2005, [13 pages].
Nir, Y. “Repeated Authentication in Internet Key Exchange (IKEv2) Protocol,” RFC 4478, Apr. 2006, [5 pages].
Office Action issued in U.S. Pat. Appl. No. 10/401,241 (Jan. 25, 2007).
Snapschout, JLA Van De. “The Sliding window protocol revisited,” Formal Aspects of Computing vol. 7, pp. 3-17, 1995.
Hinden et al., IPv6 Working Group Minutes, Minneapolis IETF, Mar. 18, 2002 [accessed May 29, 2005 from http://www.ietf.org/proceedings/02mar/minutes/ipv6.htm], 13pp.
Nordmark, “Allocating bit in IID for Mobile IPv6”, Mar. 2002, [accesses May 29, 2005 from http://www.ietf.org/proceedings/02mar/slides/ipv6-13.pdf], 8pp.
Nordmark,“Reserving space in the Interface ID”, from Mar. 2002[accessed May 20, 2005 from http://www.ietf.org/proceedings/02mar/slides/ipv6-14.pdf], 6pp.
IETF Proceedings, “Security and Mobile IPv6”, Mar. 2001 [accessed May 29, 2005 from http://www.ietf.org/proceedings/01mar/slides/mobileip-9], 1pg.
Kempf et al., “Threat Analysis for IPv6 Public Multi-Access Links”, draft-kempf-ipng-netaccess-threats-00.txt, Nov. 2001, 7pp.
Nikander et al., “Threat Models introduced by Mobile IPv6 and Requirements for Security in Mobile IPv6”, draft-team-mobileip-mipv6-sec-reqts-00.txt, Jul. 12, 2001, 28pp.
Thomas, “Binding Updates Security”, draft-thomas-mobile-bu-sec-00.txt, Nov. 2, 2001, 13pp.
Nikander et al., “Binding Authentication Key Establishment Protocol for Mobile IPv6”, draft-perkins-bake-01.txt, Jul. 2, 2001, 42pp.
Thomson, et al., “IPv6 Stateless Address Autoconfiguration,” RFC1971 (Aug. 1996) 22 pgs. downloaded from http://www.ietf.org/rfc1971.txt; on Apr. 11, 2006.
O'Shea, et al., “Child-Proof Authentication for MIPv6 (CAM),”vol. 31, No. 2, ACM SIGCOMM Computer Communications Review, Apr. 2001, pp. 4-8.
M. Burrows et al., “A Logic of Authentication” Proceedings of the Royal Society of London Series A, 426, pp. 233-271 (1989).
S. Deering et al., “Version 6 (IPv6) Specification”RFC2460 (Dec. 1998).
“Secure Hash Standard,” NIST, FIPS PUB 180-1, http://csrc.nist.goc/fips/fip180-1.txt. (Apr. 1995).
Harkins et al., “The Internet Key Exchange (IKE),” RFC2409 (Nov. 1998).
Hinden et al., “IP Version 6 Addressing Architecture,” (Mar. 10, 2000).
Huitema, “Ipv6 The New Internet Protocol,” Prentice Hall PTR, ISBN 0-13-850505-5 (1998).
Johnson et al., “Mobility Support in IPv6,” (Apr. 27, 2000).
Kent et al., “IP Authentication Header,” RFC2402 (Nov. 1998).
Mills, “Simple Network Time Protocol (SNMP) Version 4 for IPv6 and OSI,” RFC2030 (Oct. 1996).
Mills, “IP Mobility Support,” RFC2002 (Oct. 1996).
Thomson et al., “IPv6 Stateless Address Autoconfiguration,” RFC2462 (Dec. 1998).
Kent et al., “Security Architecture for the Internet Protocol,” RFC2401 (Nov. 1998).
Aura et al.,Security of Internet Location Management, Proc. 18thAnnual Computer Security Applications Conference, IEEE Press, Nevada (Dec. 2002).
Blaze et al.,The KeyNote Trust-Management System Version 2, IETF Network Working Group, RFC 2704 (Sep. 1999) pp. 1-35.
Eastlake,Domain Name System Security Extensions, IETF Network Working Group, RFC 2535 (Mar. 1999) pp. 1-44.
Ellison et al.,SPKI Certificate Theory, IETF Network Working Group, RFC 2693 (Sep. 1999) pp. 1-41.
Ferguson et al.,Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing, IETF Network Working Gr
Merchant & Gould P.C.
Microsoft Corporation
Moazzami Nasser
Yalew Fikremarima
LandOfFree
Method and system for authenticating messages does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system for authenticating messages, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for authenticating messages will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3919492