Network discovery system and method

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 23, G06F 1100, H04L 900

Patent

active

060527846

ABSTRACT:
A system and method for the discovery of information from a second resource by a first resource through a network using authentication. A discovery request message is received at the second resource. The discovery request message includes discovery request data. If the second resource determines that the discovery request data is authentic, the second resource sends a discovery response message to the first resource through the network. The discovery response message includes authenticated discovery response data. Authentication provides assurance that the purported source of authenticated data is the true source, and protects the integrity of the authenticated data.

REFERENCES:
patent: 5265164 (1993-11-01), Matyas et al.
patent: 5511122 (1996-04-01), Atkinson
patent: 5535276 (1996-07-01), Ganesan
patent: 5594869 (1997-01-01), Hawe et al.
patent: 5651068 (1997-07-01), Klemba et al.
patent: 5659616 (1997-08-01), Sudia
patent: 5671279 (1997-09-01), Elgamal
patent: 5689565 (1997-11-01), Spies et al.
patent: 5737419 (1998-04-01), Ganesan
patent: 5745574 (1998-04-01), Muftic
patent: 5799086 (1998-08-01), Sudia
patent: 5805712 (1998-09-01), Davis
patent: 5822434 (1998-10-01), Caronni et al.
patent: 5850442 (1998-12-01), Muftic
patent: 5872848 (1999-02-01), Romney et al.
patent: 5872849 (1999-02-01), Sudia
Bellovin et al., Encrypted key exchange: Password-based protocols secure against dictionary attacks, IEEE Trans. on computer security, pp. 72-84, Jan. 1992.
Carl H. Meyer, A state of the art review, IEEE Trans. on computer security, pp. 4-150, 4-154, May 1989.
Fred Piper, Encryption, European conference on security and detection, pp. 61-65, Apr. 1997.
V. Varadharajan, Design of a network security policy model, UK IT 1990 Conference, pp. 38-45, Jun. 1990.
Case, J., et al., RFC1157, A Simple Network Management Protocol (SNMP), May 1990.
Davin, J., et al., RFC1351, "SNMP Administrative Model," Jul. 1992.
Galvin, J., et al., RFC1352, "SNMP Security Protocols," Jul. 1992.
McCloghrie, K., et al., RFC1353, "Definitions of Managed Objects for Administration of SNMP Parties," Jul. 1992.
Oppen, Derek C., et al., "The Clearinghouse: A Decentralized Agent for Locating Named Objects in a Distributed Environmental," The Clearinghouse, Oct. 1981, pp. 1-58.
Veizades, J., et al., RFC2165, "Service Location Protocol," Jun. 1997.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Network discovery system and method does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Network discovery system and method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Network discovery system and method will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2345522

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.