Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Patent
1997-10-14
2000-04-18
Beausoliel, Jr., Robert W.
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
380 23, G06F 1100, H04L 900
Patent
active
060527846
ABSTRACT:
A system and method for the discovery of information from a second resource by a first resource through a network using authentication. A discovery request message is received at the second resource. The discovery request message includes discovery request data. If the second resource determines that the discovery request data is authentic, the second resource sends a discovery response message to the first resource through the network. The discovery response message includes authenticated discovery response data. Authentication provides assurance that the purported source of authenticated data is the true source, and protects the integrity of the authenticated data.
REFERENCES:
patent: 5265164 (1993-11-01), Matyas et al.
patent: 5511122 (1996-04-01), Atkinson
patent: 5535276 (1996-07-01), Ganesan
patent: 5594869 (1997-01-01), Hawe et al.
patent: 5651068 (1997-07-01), Klemba et al.
patent: 5659616 (1997-08-01), Sudia
patent: 5671279 (1997-09-01), Elgamal
patent: 5689565 (1997-11-01), Spies et al.
patent: 5737419 (1998-04-01), Ganesan
patent: 5745574 (1998-04-01), Muftic
patent: 5799086 (1998-08-01), Sudia
patent: 5805712 (1998-09-01), Davis
patent: 5822434 (1998-10-01), Caronni et al.
patent: 5850442 (1998-12-01), Muftic
patent: 5872848 (1999-02-01), Romney et al.
patent: 5872849 (1999-02-01), Sudia
Bellovin et al., Encrypted key exchange: Password-based protocols secure against dictionary attacks, IEEE Trans. on computer security, pp. 72-84, Jan. 1992.
Carl H. Meyer, A state of the art review, IEEE Trans. on computer security, pp. 4-150, 4-154, May 1989.
Fred Piper, Encryption, European conference on security and detection, pp. 61-65, Apr. 1997.
V. Varadharajan, Design of a network security policy model, UK IT 1990 Conference, pp. 38-45, Jun. 1990.
Case, J., et al., RFC1157, A Simple Network Management Protocol (SNMP), May 1990.
Davin, J., et al., RFC1351, "SNMP Administrative Model," Jul. 1992.
Galvin, J., et al., RFC1352, "SNMP Security Protocols," Jul. 1992.
McCloghrie, K., et al., RFC1353, "Definitions of Managed Objects for Administration of SNMP Parties," Jul. 1992.
Oppen, Derek C., et al., "The Clearinghouse: A Decentralized Agent for Locating Named Objects in a Distributed Environmental," The Clearinghouse, Oct. 1981, pp. 1-58.
Veizades, J., et al., RFC2165, "Service Location Protocol," Jun. 1997.
Beausoliel, Jr. Robert W.
Intel Corporation
Iqbal Nadeem
LandOfFree
Network discovery system and method does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Network discovery system and method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Network discovery system and method will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2345522