Methods and systems for unilateral authentication of messages

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S176000, C380S247000

Reexamination Certificate

active

07134019

ABSTRACT:
Disclosed is an authentication mechanism that enables an information recipient to ascertain that the information comes from the sender it purports to be from. This mechanism integrates a private/public key pair with selection by the sender of a portion of its address. The sender derives its address from its public key, for example, by using a hash of the key. The recipient verifies the association between the address and the sender's private key. The recipient may retrieve the key from an insecure resource and know that it has the correct key because only that key can produce the sender's address in the message. The hash may be made larger than the sender-selectable portion of the address. The recipient may cache public key/address pairs and use the cache to detect brute force attacks and to survive denial of service attacks. The mechanism may be used to optimize security negotiation algorithms.

REFERENCES:
patent: 5473691 (1995-12-01), Menezes et al.
patent: 5511122 (1996-04-01), Atkinson
patent: 5673319 (1997-09-01), Bellare et al.
patent: 5729608 (1998-03-01), Janson et al.
patent: 5778065 (1998-07-01), Hauser et al.
patent: 5892904 (1999-04-01), Atkinson et al.
patent: 5944794 (1999-08-01), Okamoto et al.
patent: 6055236 (2000-04-01), Nessett et al.
patent: RE36946 (2000-11-01), Diffie et al.
patent: 6229806 (2001-05-01), Lockhart et al.
patent: 6314521 (2001-11-01), Debry
patent: 6367012 (2002-04-01), Atkinson et al.
patent: 6421673 (2002-07-01), Caldwell et al.
patent: 6526506 (2003-02-01), Lewis
patent: 6600823 (2003-07-01), Hayosh
patent: 6782474 (2004-08-01), Ylonen
patent: 6938154 (2005-08-01), Berson et al.
Greg O'Shea, Child-proof Authentication for MIPv6 (CAM), Jan.-Feb. 2000 ACM.
Aura et al.,Security of Internet Location Management, Proc. 18thAnnual Computer Security Applications Conference, IEEE Press, Nevada (Dec. 2002).
Blaze et al.,The KeyNote Trust-Management System Version 2, IETF Network Working Group, RFC 2704 (Sep. 1999) pp. 1-35.
Eastlake,Domain Name System Security Extensions, IETF Network Working Group, RFC 2535 (Mar. 1999) pp. 1-44.
Ferguson et al.,Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Source, Address Spoofing, IETF Network Working Group, RFC 2827 (May 2000) pp. 1-10.
Housley et al.,Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List(CRL)Profile, IETF Network Working Group, RFC 3280 (Apr. 2002) pp. 1-66.
Karn et al.,Photuris: Session-Key Management Protocol, IETF Network Working Group, RFC 2522 (Mar.1999) pp. 1-75.
Montenegro et al.,Statistically Unique and Cryptographically Verifiable(SUCV)Identifiers and Addresses, Proc. ISOC Symposium on Network and Distributed System Security (NDSS 2002), San Diego (Feb. 2002) pp. 1-13.
Moskowitz,Host Identity Payload and Protocol, Internet Draft <draft-ietf-moskowitz-hip-05.txt> (Oct. 2001) (work in progress) pp. 1-28.
Narten et al.,Privacy Extensions For Stateless Address Autoconfiguration In IPv6, IETF Network Working Group, RFC 3041(Jan. 2001) pp. 1-16.
Narten et al.,Neighbor Discovery for IP Version 6(IPv6), IETF Network Working Group, RFC 2461 (Dec. 1998) pp. 1-87.
Nikander,A Scaleable Architecture for IPv6 Address Ownership, Internet Draft <draft-nikander-ipng-pbk-addresses-00.txt> (work in progress) (Mar. 2001) pp. 1-27.
Okazaki et al.,Securing MIPv6 Binding Updates Using Address Based Keys(ABKs), Internet-Draft <draft-okazaki-mobileip-abk-01.txt> (Oct. 2002) (work in progress) pp. 1-26.
Roe et al.,Authentication of Mobile IPv6 Binding Updates and Acknowledgments, Internet Draft <draft-roe-mobileip-updateauth-02.txt> (Feb. 2002) (work in progress) pp. 1-22.
Savola,Security of IPv6 Routing Header and Home Address OptionsInternet Draft <draft-savola-ipv6-rh-ha-security-.03.txt> (work in progress) (Dec. 2002).
Shamir,Identity-Based Cryptosystems and Signature Schemes, Advances in Cryptology: Proc. CRYPTO 84, vol. 196 of LNCS (1998) pp. 47-53.
Arkko et al.,Securing IPv6 Neighbor and Router Discovery, Proc. 2002 ACM Workshop on Wireless Security (WiSe) (ACM Press) (Sep. 2002) pp. 77-86.
Aura,Cryptographically Generated Addresses(CGA), Internet Draft <draft-aura-cga-00.txt> (work in progress) (Feb. 2003) pp. 1-13.
O'Shea et al.,Child-Proof Authentication for MIPv6(CAM), ACM Computer Communications Review, 31(2) (Apr. 2001) pp. 1-5.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Methods and systems for unilateral authentication of messages does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Methods and systems for unilateral authentication of messages, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods and systems for unilateral authentication of messages will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3658339

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.