Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Patent
1998-02-17
2000-10-03
Iqbal, Nadeem
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
G06F 1100
Patent
active
061287423
ABSTRACT:
There is disclosed a method of authenticating the identity of a first party involved in communicating over a computer network system. The method comprises the steps of: providing the first party with a first password set; providing a second party with a second password set; transmitting an authentication message based on the first password set from the first party to the second party; and authenticating the identity of the first party by the second party for further communications over the computer network if it is demonstrated, based on an analysis of the authentication message, that the first and second password sets contain at least one common password.
REFERENCES:
patent: 5060263 (1991-10-01), Bosen et al.
patent: 5398285 (1995-03-01), Borgelt et al.
patent: 5491750 (1996-02-01), Bellare et al.
patent: 5537544 (1996-07-01), Morisawa et al.
patent: 5604803 (1997-02-01), Aziz
patent: 5606663 (1997-02-01), Kadooka
patent: 5689566 (1997-11-01), Nguyen
patent: 5719941 (1998-02-01), Swift et al.
patent: 5721780 (1998-02-01), Ensor et al.
patent: 5734718 (1998-03-01), Prafullchandra
patent: 5751812 (1998-05-01), Anderson
patent: 5784464 (1998-07-01), Akiyama et al.
patent: 5799088 (1998-08-01), Raike
patent: 5832211 (1998-11-01), Blakley, III et al.
patent: 5881226 (1999-03-01), Veneklase
patent: 5892828 (1999-04-01), Perlman
patent: 5987232 (1999-11-01), Tabuki
http://www-tux/tuxdoc/doc63/docs/tins/chap 1.htm, Chapter 1: Preparing to Install BEA TUXEDO, Online Documentation of BEA TUXEDO System version 6.3 Software, first published Jun. 1997, pp. 1-12 (registration for online support required; see http//www.beasys.com/support/).
http://www-tux/tuxdoc/doc63/docs/sect1/tlisten.htm, Online Documentation of BEA TUXEDO System version 6.3 Software, first published Jun. 1997, pp. 1-4 (registration for online support required; see http://www.beasys.com/support/).
http://www-tux/tuxdoc/doc63/docs/sect1/wlisten.htm, Online Documentation of BEA TUXEDO System version 6.3 Software, first published Jun., 1997, pp. 1-4 (registration for online support required; see http://www.beasys.com/support/).
BEA Systems Inc.
Iqbal Nadeem
LandOfFree
Method of authentication based on intersection of password sets does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method of authentication based on intersection of password sets, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method of authentication based on intersection of password sets will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-205841