Methods for authenticating potential members invited to join...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S182000, C380S044000, C380S277000

Reexamination Certificate

active

07120797

ABSTRACT:
Disclosed are methods for an invitee to gain admittance to a group. An inviter already in the group and the invitee share a secret password. The inviter uses the password to create an invitation and then issues the invitation to the invitee and to an authenticator. The authenticator creates a challenge key and challenge value and sends the challenge value to the invitee. Using the password and information from the invitation, the invitee recreates the challenge key, uses the challenge key to derive a response value from the challenge value, and sends the response value to the authenticator. The authenticator compares the response value with an expected value and, if they match, knows that the invitee must have been able to recreate the challenge key. The authenticator trusts that this invitee must be the one for which the inviter issued the invitation and admits the invitee to the group.

REFERENCES:
patent: 4200770 (1980-04-01), Hellman et al.
patent: 5706349 (1998-01-01), Aditham et al.
patent: 5953420 (1999-09-01), Matyas, Jr. et al.
patent: 6226383 (2001-05-01), Jablon
patent: 6230269 (2001-05-01), Spies et al.
patent: 6292896 (2001-09-01), Guski et al.
patent: 6336188 (2002-01-01), Blake-Wilson et al.
patent: 6377691 (2002-04-01), Swift et al.
patent: 6539479 (2003-03-01), Wu
patent: 6986046 (2006-01-01), Tuvell et al.
patent: 2002/0067832 (2002-06-01), Jablon
patent: 1 102 430 (2001-05-01), None
Gong, “Enclaves: Enabling Secure Collaboration over the Internet”, Jul. 1996, Proceedings of the Sixth USENIX Security Symposium, p. 1-12.
Jablon, “Strong Password-Only Authenticated Key Exchange”, Sep. 25, 1996, ACM Computer Communication Review, p. 1-23.
Zhou et al.: “Securing Ad Hoc Networks,” IEEE Network (Nov./Dec. 1999), pp. 24-30.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Methods for authenticating potential members invited to join... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Methods for authenticating potential members invited to join..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods for authenticating potential members invited to join... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3649928

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.