Method, apparatus, and manufacture for decryption of network...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S163000, C713S193000, C380S044000, C380S259000, C380S277000

Reexamination Certificate

active

07904717

ABSTRACT:
A network trace utility is provided. The network trace utility receives and copies packets in a secure session of (at least) two-way network communication between a client and a server. The network trace utility receives an administrator password, and uses a hash of the administrator password to decrypt the first session key. The network trace utility then decrypts one or more additional session keys, each one using the preceding session key. Then, the network trace utility decrypts the machine key using one of the session keys. A hash of the machine key is used to decrypt additional packets in the secure session. The network trace utility enables the contents of one or more additional packets in the secure session to be displayed to the user.

REFERENCES:
patent: 7668313 (2010-02-01), Nave
patent: 2002/0104001 (2002-08-01), Lotspiech et al.
patent: 2007/0006291 (2007-01-01), Barari et al.
patent: 2007/0058807 (2007-03-01), Marsh
“CAE Specification—DCE 1.1: Remote Procedure Call”, The Open Group, Oct. 1997, 748 pgs.
Krawczyk, H. et al., “HMAC: Keyed-Hashing for Message Authentication”, RFC 2104, Network Working Group, Feb. 1997, 11 pgs.
Baize, E. et al., “The Simple and Protected GSS-API Negotiation Mechanism”, RFC 2478, Network Working Group, Dec. 1998, 17 pgs.
Neuman, C. et al., “The Kerberos Network Authentication Services (V5)”, RFC 4120, Network Working Group, Jul. 2005, 139 pgs.
“Common Internet File System (CIFS) Technical Reference Revision 1.0”, SNIA Technical Proposal, SNIA CFS Technical Work Group, Feb. 27, 2002, http://www.snia.org/tech—activities/CIFS, 150 pgs.
Howes, T. et al., “The LDAP Application Program Interface”, RFC 1823, Network Working Group, Aug. 1995, 21 pgs.
Leach, Paul J. et al., “A Common Internet File System (CIFS/1.0) Protocol—Preliminary Draft”, Dec. 19, 1997, 116 pgs.
“SAMBA: Opening Windows to a Wider World”, samba.org, 5 pgs.
“Wireshark: Sniff Free or Die”, wireshark.org, 2 pgs.
“Etheral: Powerful Multi-platform Analysis”, etheral.org, 1 pg.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method, apparatus, and manufacture for decryption of network... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method, apparatus, and manufacture for decryption of network..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method, apparatus, and manufacture for decryption of network... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2635394

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.