Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2006-11-07
2006-11-07
Moazzami, Nasser (Department: 2136)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S176000, C380S247000
Reexamination Certificate
active
07134019
ABSTRACT:
Disclosed is an authentication mechanism that enables an information recipient to ascertain that the information comes from the sender it purports to be from. This mechanism integrates a private/public key pair with selection by the sender of a portion of its address. The sender derives its address from its public key, for example, by using a hash of the key. The recipient verifies the association between the address and the sender's private key. The recipient may retrieve the key from an insecure resource and know that it has the correct key because only that key can produce the sender's address in the message. The hash may be made larger than the sender-selectable portion of the address. The recipient may cache public key/address pairs and use the cache to detect brute force attacks and to survive denial of service attacks. The mechanism may be used to optimize security negotiation algorithms.
REFERENCES:
patent: 5473691 (1995-12-01), Menezes et al.
patent: 5511122 (1996-04-01), Atkinson
patent: 5673319 (1997-09-01), Bellare et al.
patent: 5729608 (1998-03-01), Janson et al.
patent: 5778065 (1998-07-01), Hauser et al.
patent: 5892904 (1999-04-01), Atkinson et al.
patent: 5944794 (1999-08-01), Okamoto et al.
patent: 6055236 (2000-04-01), Nessett et al.
patent: RE36946 (2000-11-01), Diffie et al.
patent: 6229806 (2001-05-01), Lockhart et al.
patent: 6314521 (2001-11-01), Debry
patent: 6367012 (2002-04-01), Atkinson et al.
patent: 6421673 (2002-07-01), Caldwell et al.
patent: 6526506 (2003-02-01), Lewis
patent: 6600823 (2003-07-01), Hayosh
patent: 6782474 (2004-08-01), Ylonen
patent: 6938154 (2005-08-01), Berson et al.
Greg O'Shea, Child-proof Authentication for MIPv6 (CAM), Jan.-Feb. 2000 ACM.
Aura et al.,Security of Internet Location Management, Proc. 18thAnnual Computer Security Applications Conference, IEEE Press, Nevada (Dec. 2002).
Blaze et al.,The KeyNote Trust-Management System Version 2, IETF Network Working Group, RFC 2704 (Sep. 1999) pp. 1-35.
Eastlake,Domain Name System Security Extensions, IETF Network Working Group, RFC 2535 (Mar. 1999) pp. 1-44.
Ferguson et al.,Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Source, Address Spoofing, IETF Network Working Group, RFC 2827 (May 2000) pp. 1-10.
Housley et al.,Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List(CRL)Profile, IETF Network Working Group, RFC 3280 (Apr. 2002) pp. 1-66.
Karn et al.,Photuris: Session-Key Management Protocol, IETF Network Working Group, RFC 2522 (Mar.1999) pp. 1-75.
Montenegro et al.,Statistically Unique and Cryptographically Verifiable(SUCV)Identifiers and Addresses, Proc. ISOC Symposium on Network and Distributed System Security (NDSS 2002), San Diego (Feb. 2002) pp. 1-13.
Moskowitz,Host Identity Payload and Protocol, Internet Draft <draft-ietf-moskowitz-hip-05.txt> (Oct. 2001) (work in progress) pp. 1-28.
Narten et al.,Privacy Extensions For Stateless Address Autoconfiguration In IPv6, IETF Network Working Group, RFC 3041(Jan. 2001) pp. 1-16.
Narten et al.,Neighbor Discovery for IP Version 6(IPv6), IETF Network Working Group, RFC 2461 (Dec. 1998) pp. 1-87.
Nikander,A Scaleable Architecture for IPv6 Address Ownership, Internet Draft <draft-nikander-ipng-pbk-addresses-00.txt> (work in progress) (Mar. 2001) pp. 1-27.
Okazaki et al.,Securing MIPv6 Binding Updates Using Address Based Keys(ABKs), Internet-Draft <draft-okazaki-mobileip-abk-01.txt> (Oct. 2002) (work in progress) pp. 1-26.
Roe et al.,Authentication of Mobile IPv6 Binding Updates and Acknowledgments, Internet Draft <draft-roe-mobileip-updateauth-02.txt> (Feb. 2002) (work in progress) pp. 1-22.
Savola,Security of IPv6 Routing Header and Home Address OptionsInternet Draft <draft-savola-ipv6-rh-ha-security-.03.txt> (work in progress) (Dec. 2002).
Shamir,Identity-Based Cryptosystems and Signature Schemes, Advances in Cryptology: Proc. CRYPTO 84, vol. 196 of LNCS (1998) pp. 47-53.
Arkko et al.,Securing IPv6 Neighbor and Router Discovery, Proc. 2002 ACM Workshop on Wireless Security (WiSe) (ACM Press) (Sep. 2002) pp. 77-86.
Aura,Cryptographically Generated Addresses(CGA), Internet Draft <draft-aura-cga-00.txt> (work in progress) (Feb. 2003) pp. 1-13.
O'Shea et al.,Child-Proof Authentication for MIPv6(CAM), ACM Computer Communications Review, 31(2) (Apr. 2001) pp. 1-5.
O'Shea Gregory
Roe Michael
Shelest Art
Thaler David G.
Zill Brian D.
Microsoft Corporation
Microsoft Corporation
Moazzami Nasser
Parthasarathy Pramila
LandOfFree
Methods and systems for unilateral authentication of messages does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Methods and systems for unilateral authentication of messages, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods and systems for unilateral authentication of messages will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3658339