Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2011-08-16
2011-08-16
Zia, Syed A. (Department: 2431)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S150000, C713S187000, C713S170000, C713S171000, C709S202000, C709S201000, C709S213000, C709S217000, C709S219000, C380S200000, C380S270000, C705S050000, C705S064000, C719S317000, C719S318000
Reexamination Certificate
active
08001378
ABSTRACT:
The present description refers to a method for protecting data of a mobile agent (MA) from a first server (A) which are intended for at least one second server (B) within a network system against an attack and an unauthorized access, wherein the first server (A) as well as the at least one second server (B) have a pair of a public key (KA, KB) and a private key (PKA, PKB) associated therewith, respectively, the method comprising, starting from the first server, at least the steps of choosing an unique number (r0) and assigning it to the mobile agent (MA), choosing a secret symmetric key (SKo) and assigning it to the data (mB) to be protected, encoding the secret key (SKo) with the public key (KB) of the second server (B), encrypting the secret key (SKo) and the public key (KA) of the first server via a cryptographic wrapping function (h), thus forming a data authentication code (h(KA, SKo)), encoding the data (mB) with the secret key (SKo), and combining the unique number (r0), the encoded data ({mB}SKo) and the data authentication code (h (KA, SKo)) and encoding that combination with the private key (PKA) of the first server (A), thus forming a nested structure to be decoded successively for access to the data (mB).
REFERENCES:
patent: 6513059 (2003-01-01), Gupta et al.
patent: 7240015 (2007-07-01), Karmouch et al.
patent: 7669207 (2010-02-01), Johnson
patent: 7827406 (2010-11-01), Brown et al.
patent: 2001/0016911 (2001-08-01), Obana
patent: 2002/0144118 (2002-10-01), Maruyama
patent: 2004/0044739 (2004-03-01), Ziegler
patent: 2005/0015435 (2005-01-01), Johnson
patent: 2005/0141706 (2005-06-01), Regli et al.
patent: 2005/0289650 (2005-12-01), Kalogridis
patent: 2006/0059253 (2006-03-01), Goodman et al.
patent: 2006/0227971 (2006-10-01), Haddad
patent: 2006/0242411 (2006-10-01), Lin
patent: 2007/0286424 (2007-12-01), Rits
patent: 2010/0124333 (2010-05-01), Godfrey et al.
patent: 10023818 (2001-11-01), None
patent: 2000031958 (2000-01-01), None
patent: 20010077858 (2002-09-01), None
patent: 2002305513 (2002-10-01), None
patent: 2005149205 (2005-06-01), None
patent: WO-2004046846 (2004-06-01), None
“European Search Report, Application No. 06290876.9”, (Sep. 29, 2006),2 pgs.
“European Search Report, Application No. 06290878.5”, (Oct. 18, 2006),2 pgs.
Ametller, S. Robles “Self-Protected Mobile Agents,” AAMAS/04 Jul. 19-23, 2004, New York, New York USA—6 pages.
Hohl, Fritz , “Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts”,In Giovanni Vigna, Mobile Agent Security, Springer-Verlag,(1998),92-113.
Karnik, Neeran , et al., “Security in the Ajanta mobile agent system”,In Software, Practice and Experience, 31(4), Neeran M. Karnik and Anand R. Tripathi. Security in the Ajanta mobile agent system. Software, Practice and Experience, 31(4),(2001),301-329.
Negm, K E A , “Design, implementation and testing of mobile agent protection mechanism for MAMETS”,Computer Systems and Applications 2005, The 3rd ACS/IEEE, (Jan. 3, 2005).
Park, Jong-Youl, “On-Time Key Generation System for Agent Data Protection,”IEICE Trans. Inf. &Syst., vol. E85-D, No. 3 Mar. 2002).
Roth, Volker , “On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection”, InMobile Agents : 5th International Conference, MA 2001 Atlanta, GA, USA, Dec. 2-4, 2001Computer Science, vol 2240/2001Book Mobile Agents : 5th International Conference, MA 2001 Atlanta, GA, USA, Dec. 2-4, 2001.Proceedings, (2001),0302-9743 (Print) 1611-3349 (Online).
Sander, T , et al., “Towards Mobile Cryptography”,In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, (1998).
Wilhelm, U G., et al., “Introducing Trusted Third Parties to the Mobile Agent Paradigm”,In J. Vitek and C. Jensen, Secure Internet Programming: Security Issues for Mobile and Distributed Objects, vol. 1603, (1999),471-491.
Yee, Bennet , “Using Secure Coprocessors”,PhD Thesis, (May 1994).
SAP (AG)
Schwegman Lundberg & Woessner, P.A.
Zia Syed A.
LandOfFree
Method and system for protecting data of a mobile agent... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system for protecting data of a mobile agent..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for protecting data of a mobile agent... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2651309