Method for binding networked devices

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S182000, C380S270000

Reexamination Certificate

active

07409550

ABSTRACT:
A method binds devices connected by a wireless network by setting a first timeout in a master device. A key exchange is performed between the master and a slave device. The key exchange is terminated if the first timeout expires and the key exchange is incomplete. Then, a second timeout is set in the master device and a third timeout is set in the slave device if the key exchange is complete. A binding to the slave device is established in the master device if the master device receives a response from the slave device after the second time expires. Otherwise the slave device is disabled. A binding to the master device is established in the slave device if the third timeout expires and there is only one key exchange detected by the slave device.

REFERENCES:
patent: 4606072 (1986-08-01), Martin et al.
patent: 4646300 (1987-02-01), Goodman et al.
patent: 5216715 (1993-06-01), Markwitz
patent: 6119033 (2000-09-01), Spigelman et al.
patent: 6185685 (2001-02-01), Morgan et al.
patent: 6631841 (2003-10-01), Roberts et al.
patent: 6816970 (2004-11-01), Morgan et al.
patent: 7017180 (2006-03-01), Nagasaka
patent: 2002/0018458 (2002-02-01), Aiello et al.
patent: 2002/0178283 (2002-11-01), Robinson
patent: 2003/0210789 (2003-11-01), Farnham et al.
patent: 2004/0162983 (2004-08-01), Gotoh et al.
patent: 2005/0232277 (2005-10-01), See
patent: 2006/0148402 (2006-07-01), Hagiwara
patent: 349967 (1990-01-01), None
Mark Corner and Brian Noble. Zero-interaction authentication. In Proceedings of the 8th International Conference Mobile Computing and Networking, Atlanta, GA, Sep. 2002.
H. Krawczyk, M. Bellare, and R. Canetti. HMAC: Keyed-Hashing for Message Authentication, Feb. 1997. Internet RFC 2104.
Hugo Krawczyk. The order of encryption and authentication for protecting communications (or: How secure is ssl?). In Proceedings of CRYPTO 2001, Santa Barbara, CA, Aug. 2001.
Roger Needham and Michael Schroeder. Using encryption of authentication in large networks of computers. Communications of the ACM, 21 (12) :933-999, Dec. 1978.
Clifford Neuman and Theodore Ts'o. Kerberos: An authentication service for computer networks. IEEE Communications Magazine, 32 (9) :33-38, Sep. 1994.
Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen, and David E. Culler. Spins: Security protocols for sensor networks. Journal of Wireless Networks, 8 (5) :521-534, Sep. 2002.
Asad Amir Pirzada and Chris McDonald. Kerberos assisted authentication in mobile ad hoc networks. In Proceedings of the 27th Australasian Computer Conference, Dunedin, New Zealand, 2004.
Frank Stajano and Ross Anderson. The resurrecting duckling: Security issues for ubiquitous computing. IEEE Computer Magazine, 35 (4) :22-26, Apr. 2002.
Tom Yu, Sam Hartman, and Kenneth Raeburn. The perils of unauthenticated encryption: Kerberos 4. In Proceedings of Network and Distributed System Security Symposium, NDSS '04, San Diego, CA, Feb. 2004.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for binding networked devices does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for binding networked devices, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for binding networked devices will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4001087

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.