Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Reexamination Certificate
2005-07-19
2005-07-19
Caldwell, Andrew (Department: 2137)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
C713S161000, C713S170000, C713S180000, C713S181000
Reexamination Certificate
active
06920556
ABSTRACT:
Methods, systems and computer program products are provided of message authentication for an SSL-based protocol connection between a source device and a destination device. A group message authentication code (MAC) is generated based on a plurality of communication packets. Each of the communication packets has at least one data record. The plurality of communication packets is transmitted using the SSL-based protocol connection along with the generated group MAC. Individual ones of the plurality of communication packets do not include an associated packet MAC as transmitted. A data record count to a next group MAC may be transmitted before transmitting the data records corresponding to the data record count and transmitting the next group MAC. The data records of the communication packets may be pre-encrypted and transmitted using the SSL-based protocol connection to encrypt the group MAC but not the data records. Receiver side methods, systems and computer program products are also provided.
REFERENCES:
patent: 4933969 (1990-06-01), Marshall et al.
patent: 5048087 (1991-09-01), Trbovich et al.
patent: 5319710 (1994-06-01), Atalla et al.
patent: 5657390 (1997-08-01), Elgamal et al.
patent: 5671283 (1997-09-01), Michener et al.
patent: 5757924 (1998-05-01), Friedman et al.
patent: 6094426 (2000-07-01), Honkasalo et al.
patent: 6128737 (2000-10-01), Jakubowski et al.
patent: 6842860 (2005-01-01), Branstad et al.
Gennaro et al, “How to Sign Digital Streams”, Feb. 24, 1998, pp. 1-20.
Wagner et al, “Analysis of the SSI 3.0 Protocol”, Nov. 1996, pp. 1-12.
CSU webpage, “Introduction to Distributed Memory Programming”, Mar. 7, 2001, pp. 1-14. <http://web.archive.org/web/20010307131257/http://athene.csu.edu.au/˜ialtas/module2/section_9.html>.
Wong et al, “Digital Signatures for Flows and Multicasts,” Aug. 1999, pp. 502-513.
Golle et al, “Authenticating Streamed Data in the Presence of Random Packet Loss,” 2001, pp. 1-10.
Miner et al, “Graph-Based Authentication of Digital Streams,” May 2000, pp. 232-246.
Park et al, “An Efficient Stream Authentication Scheme,” Jan. 1999, pp. 1-8.
Perrig et al., “The TESLA Broadcast Authentication Protocol,” 2002, pp. 2-13.
CMU, “Introduction”, Nov. 5, 2000, pp. 1-2.
Metzger et al, RFC 2841, “IP Authentication using Keyed SHA1 with Interleaved (IP-MAC),” Nov. 2000, pp. 1-9.
Hoffman, RFC 2487, “SMTP Service Extension for Secure SMTP over TLS,” Jan. 1999, pp. 1-8.
Dierks et al, RFC 2246, “The TLS Protocol,” Jan. 1999, pp. 1-80.
Kuehr-McLaren David
Shoriak Timothy G.
Caldwell Andrew
International Business Machines - Corporation
Pyzocha Michael
Woods Gerald R.
LandOfFree
Methods, systems and computer program products for... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Methods, systems and computer program products for..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods, systems and computer program products for... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3430170