Method and system to authenticate a peer in a peer-to-peer...

Cryptography – Key management – Key distribution

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S279000, C380S278000

Reexamination Certificate

active

07899188

ABSTRACT:
A system (100) and method (500) system to authenticate a peer in a peer-to-peer network is provided. The system can include a first peer (110) to locally create a secret key (112) and use the secret key to produce a public-key pair (120) comprising an identifier name (113) and a small public-key (115), and a second peer (160) to locally authenticate the identifier name of the public-key pair by requesting (405) the first peer to produce a unique dataset that does not reveal the secret-key and yet validates that the public-key pair was generated with the secret-key when the large public-key is applied to a portion of the unique dataset without using an external authentication system.

REFERENCES:
patent: 6061794 (2000-05-01), Angelo et al.
patent: 7065579 (2006-06-01), Traversat et al.
patent: 7206934 (2007-04-01), Pabla et al.
patent: 2003/0028484 (2003-02-01), Boylan et al.
patent: 2003/0229789 (2003-12-01), Morais et al.
patent: 2004/0019786 (2004-01-01), Zorn et al.
patent: 2005/0149723 (2005-07-01), Watkins et al.
patent: 2005/0152305 (2005-07-01), Ji et al.
patent: 2005/0152396 (2005-07-01), Pichna et al.
patent: 2005/0153725 (2005-07-01), Naghian et al.
patent: 2005/0154889 (2005-07-01), Ashley et al.
patent: 2005/0267991 (2005-12-01), Huitema et al.
(Couch) Peer-to-Peer File-Sharing Networks: Security Risks; William Couch; as published by SANS Institute in year 2002.
(Mills) CNET News; Security; Mar. 6, 2009 11:00 AM PST; Can peer-to-peer coexist with network security?; Elinor Mills; published in year 2009.
(Li) A Survey of Peer-to-Peer Network Security Issues; James Li; as printed in 2010.
(Bradley) Peer-to-Peer (P2P) Networking Security; Four Steps to Sharing and Swapping Files Without Becoming a Victim; about.com; Tony Bradley; printed out in year 2010.
Patent Cooperation Treaty, “International Search Report and Written Opinion”, ISA/EP, by Officer Liebhardt, Ingo, in PCT Application No. PCT/US2008/064833; Document of 12 pages dated Aug. 12, 2009.
Schneier, B., “Applied Cyrptography”, Second Edition, Protocols, Algorithms, and Source Code in C, 1996, John Wiley & Sons, Inc., New York 218930, XPOO2503291, p. 30, line 15—p. 31, line 8 and p. 503, line 1—p. 507, line 5.
Menezes, A.J., “Handbook of Applied Cryptography” 1997, CRC Press, Boca Raton 228210, XP002503292, pp. 405-412.
Vivek Haldar, “Zero Knowledge Cryptography”, Mar. 8, 2002, 52 pages.
Wikipedia, “Feige-Fiat-Shamir Identification Scheme”, May 3, 2007, 2 pages article. Http://en.wikipedia.org/wiki/Feige-Fiat-Shamir—Identification—Scheme. Web site last visited May 31, 2007.
Wikipedia, “ID-Based Cryptography”, Jun. 22, 2006, 2 pages article. Http://en.wikipedia.org/wiki/ Cocks—Identity—Based—Encryption. Web site last visited Jul. 12, 2006.
Wikipedia, “Zero-Knowledge Password Proof”, May 31, 2007, 2 pages article. Http://en.wikipedia.org/wiki/Zero-knowledge—password—proof. Web site last visited May 31, 2007.
Wikipedia, “Zero-Knowledge Proof”, May 26, 2007, 6 pages article. Http://en.wikipedia.org/wiki/Zero-knowledge—proof. Web site last visited May 31, 2007.
S. Cheshire, et al.; “Dynamic Configuration of IPv4 Link-Local Addresses”; Network Working Group, Request for Comments 3927, Standards Track; May 2005; pp. 1-34; http://tools.ietf.org/html/rfc3927.
S. Thomson and T. Narten; “IPv6 Stateless Address Autoconfiguration”; Network Working Group, Request for Comments 2462, Standards Track; Dec. 1998; pp. 1-26; http://tools.ietf.org/html/rfc2462.
T. Narten and R. Draves; “Privacy Extensions for Stateless Address Autoconfiguration in IPv6”; Network Working Group, Request for Comments 3041, Standards Track; Jan. 2001; pp. 1-18; http://tools.ietf.org/search/rfc3041.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system to authenticate a peer in a peer-to-peer... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system to authenticate a peer in a peer-to-peer..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system to authenticate a peer in a peer-to-peer... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2782650

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.