Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2006-10-10
2006-10-10
Revak, Christopher (Department: 2131)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S182000, C380S044000, C380S277000
Reexamination Certificate
active
07120797
ABSTRACT:
Disclosed are methods for an invitee to gain admittance to a group. An inviter already in the group and the invitee share a secret password. The inviter uses the password to create an invitation and then issues the invitation to the invitee and to an authenticator. The authenticator creates a challenge key and challenge value and sends the challenge value to the invitee. Using the password and information from the invitation, the invitee recreates the challenge key, uses the challenge key to derive a response value from the challenge value, and sends the response value to the authenticator. The authenticator compares the response value with an expected value and, if they match, knows that the invitee must have been able to recreate the challenge key. The authenticator trusts that this invitee must be the one for which the inviter issued the invitation and admits the invitee to the group.
REFERENCES:
patent: 4200770 (1980-04-01), Hellman et al.
patent: 5706349 (1998-01-01), Aditham et al.
patent: 5953420 (1999-09-01), Matyas, Jr. et al.
patent: 6226383 (2001-05-01), Jablon
patent: 6230269 (2001-05-01), Spies et al.
patent: 6292896 (2001-09-01), Guski et al.
patent: 6336188 (2002-01-01), Blake-Wilson et al.
patent: 6377691 (2002-04-01), Swift et al.
patent: 6539479 (2003-03-01), Wu
patent: 6986046 (2006-01-01), Tuvell et al.
patent: 2002/0067832 (2002-06-01), Jablon
patent: 1 102 430 (2001-05-01), None
Gong, “Enclaves: Enabling Secure Collaboration over the Internet”, Jul. 1996, Proceedings of the Sixth USENIX Security Symposium, p. 1-12.
Jablon, “Strong Password-Only Authenticated Key Exchange”, Sep. 25, 1996, ACM Computer Communication Review, p. 1-23.
Zhou et al.: “Securing Ad Hoc Networks,” IEEE Network (Nov./Dec. 1999), pp. 24-30.
Marshall. Gerstein & Borun LLP
Revak Christopher
LandOfFree
Methods for authenticating potential members invited to join... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Methods for authenticating potential members invited to join..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods for authenticating potential members invited to join... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3649928