Methods, systems and computer program products for...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S161000, C713S170000, C713S180000, C713S181000

Reexamination Certificate

active

06920556

ABSTRACT:
Methods, systems and computer program products are provided of message authentication for an SSL-based protocol connection between a source device and a destination device. A group message authentication code (MAC) is generated based on a plurality of communication packets. Each of the communication packets has at least one data record. The plurality of communication packets is transmitted using the SSL-based protocol connection along with the generated group MAC. Individual ones of the plurality of communication packets do not include an associated packet MAC as transmitted. A data record count to a next group MAC may be transmitted before transmitting the data records corresponding to the data record count and transmitting the next group MAC. The data records of the communication packets may be pre-encrypted and transmitted using the SSL-based protocol connection to encrypt the group MAC but not the data records. Receiver side methods, systems and computer program products are also provided.

REFERENCES:
patent: 4933969 (1990-06-01), Marshall et al.
patent: 5048087 (1991-09-01), Trbovich et al.
patent: 5319710 (1994-06-01), Atalla et al.
patent: 5657390 (1997-08-01), Elgamal et al.
patent: 5671283 (1997-09-01), Michener et al.
patent: 5757924 (1998-05-01), Friedman et al.
patent: 6094426 (2000-07-01), Honkasalo et al.
patent: 6128737 (2000-10-01), Jakubowski et al.
patent: 6842860 (2005-01-01), Branstad et al.
Gennaro et al, “How to Sign Digital Streams”, Feb. 24, 1998, pp. 1-20.
Wagner et al, “Analysis of the SSI 3.0 Protocol”, Nov. 1996, pp. 1-12.
CSU webpage, “Introduction to Distributed Memory Programming”, Mar. 7, 2001, pp. 1-14. <http://web.archive.org/web/20010307131257/http://athene.csu.edu.au/˜ialtas/module2/section_9.html>.
Wong et al, “Digital Signatures for Flows and Multicasts,” Aug. 1999, pp. 502-513.
Golle et al, “Authenticating Streamed Data in the Presence of Random Packet Loss,” 2001, pp. 1-10.
Miner et al, “Graph-Based Authentication of Digital Streams,” May 2000, pp. 232-246.
Park et al, “An Efficient Stream Authentication Scheme,” Jan. 1999, pp. 1-8.
Perrig et al., “The TESLA Broadcast Authentication Protocol,” 2002, pp. 2-13.
CMU, “Introduction”, Nov. 5, 2000, pp. 1-2.
Metzger et al, RFC 2841, “IP Authentication using Keyed SHA1 with Interleaved (IP-MAC),” Nov. 2000, pp. 1-9.
Hoffman, RFC 2487, “SMTP Service Extension for Secure SMTP over TLS,” Jan. 1999, pp. 1-8.
Dierks et al, RFC 2246, “The TLS Protocol,” Jan. 1999, pp. 1-80.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Methods, systems and computer program products for... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Methods, systems and computer program products for..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods, systems and computer program products for... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3430170

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.