Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Central trusted authority provides computer authentication
Reexamination Certificate
2005-03-08
2005-03-08
Morse, Gregory (Department: 2134)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Central trusted authority provides computer authentication
C713S154000, C713S152000, C709S225000, C709S226000, C709S228000, C709S229000, C380S247000
Reexamination Certificate
active
06865673
ABSTRACT:
A method of installing a network device in a packet-based data communication network and checking the authenticity of the installation includes: (a) communicating identification information of the device to a management system; (b) installing the device; (c) obtaining from a protocol address administrator a protocol address for the device; (d) sending a communication from the device to the management system; (e) conducting a key agreement protocol exchange between the device and the management system to establish a set of encryption keys; (f) using the set of encryption keys to provide mutual authentication by the device and the management system; (g) associating, within the management system, the time of the communication in step (d) with the identification information and the protocol address of the device; and (h) communicating from the management system to the administrator a message including the identification information, the protocol address and the time.
REFERENCES:
patent: 4688250 (1987-08-01), Corrington et al.
patent: 5708780 (1998-01-01), Levergood et al.
patent: 5790548 (1998-08-01), Sistanizadeh et al.
patent: 6058420 (2000-05-01), Davies
patent: 6151679 (2000-11-01), Friedman et al.
patent: 6393565 (2002-05-01), Lockhart et al.
patent: 6516053 (2003-02-01), Ryan et al.
Arbaugh et al. “Network Working Group Internet Draft Authentication for DHCP Messages”, Jun. 1999.*
Droms, Ralph. “Automated Configuration of TCP/IP with DHCP”, Aug. 1999, IEEE.*
Schneier, Bruce. Applied Cryptography, Second Edition, 1996, John Wiley & Sons, Inc..*
Scourias, John. “Overview of the Global System for Mobile Communications”, Oct. 1997.
Brown Alexander S
Dolphin Clive
Nessett Danny M
3Com Corporation
Morse Gregory
Nixon & Vanderhye P.C.
Simitoski Michael J.
LandOfFree
Method for secure installation of device in packet based... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method for secure installation of device in packet based..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for secure installation of device in packet based... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3385970