Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2004-08-16
2008-08-05
Barron, Jr., Gilberto (Department: 2132)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S182000, C380S270000
Reexamination Certificate
active
07409550
ABSTRACT:
A method binds devices connected by a wireless network by setting a first timeout in a master device. A key exchange is performed between the master and a slave device. The key exchange is terminated if the first timeout expires and the key exchange is incomplete. Then, a second timeout is set in the master device and a third timeout is set in the slave device if the key exchange is complete. A binding to the slave device is established in the master device if the master device receives a response from the slave device after the second time expires. Otherwise the slave device is disabled. A binding to the master device is established in the slave device if the third timeout expires and there is only one key exchange detected by the slave device.
REFERENCES:
patent: 4606072 (1986-08-01), Martin et al.
patent: 4646300 (1987-02-01), Goodman et al.
patent: 5216715 (1993-06-01), Markwitz
patent: 6119033 (2000-09-01), Spigelman et al.
patent: 6185685 (2001-02-01), Morgan et al.
patent: 6631841 (2003-10-01), Roberts et al.
patent: 6816970 (2004-11-01), Morgan et al.
patent: 7017180 (2006-03-01), Nagasaka
patent: 2002/0018458 (2002-02-01), Aiello et al.
patent: 2002/0178283 (2002-11-01), Robinson
patent: 2003/0210789 (2003-11-01), Farnham et al.
patent: 2004/0162983 (2004-08-01), Gotoh et al.
patent: 2005/0232277 (2005-10-01), See
patent: 2006/0148402 (2006-07-01), Hagiwara
patent: 349967 (1990-01-01), None
Mark Corner and Brian Noble. Zero-interaction authentication. In Proceedings of the 8th International Conference Mobile Computing and Networking, Atlanta, GA, Sep. 2002.
H. Krawczyk, M. Bellare, and R. Canetti. HMAC: Keyed-Hashing for Message Authentication, Feb. 1997. Internet RFC 2104.
Hugo Krawczyk. The order of encryption and authentication for protecting communications (or: How secure is ssl?). In Proceedings of CRYPTO 2001, Santa Barbara, CA, Aug. 2001.
Roger Needham and Michael Schroeder. Using encryption of authentication in large networks of computers. Communications of the ACM, 21 (12) :933-999, Dec. 1978.
Clifford Neuman and Theodore Ts'o. Kerberos: An authentication service for computer networks. IEEE Communications Magazine, 32 (9) :33-38, Sep. 1994.
Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen, and David E. Culler. Spins: Security protocols for sensor networks. Journal of Wireless Networks, 8 (5) :521-534, Sep. 2002.
Asad Amir Pirzada and Chris McDonald. Kerberos assisted authentication in mobile ad hoc networks. In Proceedings of the 27th Australasian Computer Conference, Dunedin, New Zealand, 2004.
Frank Stajano and Ross Anderson. The resurrecting duckling: Security issues for ubiquitous computing. IEEE Computer Magazine, 35 (4) :22-26, Apr. 2002.
Tom Yu, Sam Hartman, and Kenneth Raeburn. The perils of unauthenticated encryption: Kerberos 4. In Proceedings of Network and Distributed System Security Symposium, NDSS '04, San Diego, CA, Feb. 2004.
Avramopoulos Ioannis
Bhatti Ghulam
Cukier Johnas I.
Armouche Hadi
Barron Jr. Gilberto
Brinkman Dirk
Mitsubishi Electric Research Laboratories Inc.
Mueller Clifton D.
LandOfFree
Method for binding networked devices does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method for binding networked devices, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for binding networked devices will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4001087