Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Central trusted authority provides computer authentication
Reexamination Certificate
2007-11-20
2007-11-20
Zand, Kambiz (Department: 2132)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Central trusted authority provides computer authentication
Reexamination Certificate
active
09956260
ABSTRACT:
A method for use in a peer-to-peer communication system to ensure valid connections are made in a secure manner includes the steps of receiving an address record for a peer node which includes an ID certificate. The ID certificate is validated and checked to verify that the ID certificate has not expired. Further, the method determines if the node from whom the address record was received is to be trusted, and the number of instances of the IP address included in the certificate is already stored in cache. When the foregoing are completed successfully, i.e. the certificate is valid, not expired, has been supplied by a trusted neighbor, and does not point to an IP address that already exists for different ID's multiple times, the method opportunistically verifies ownership of the ID certificate at the peer node's IP address. That is, the verification of ownership only occurs when the advertiser of the ID is the owner of that ID (or when the ID is to be used). If any of the above cannot be completed successfully, the address record is discarded.
REFERENCES:
patent: 5371794 (1994-12-01), Diffie et al.
patent: 5901227 (1999-05-01), Perlman
patent: 5922074 (1999-07-01), Richard et al.
patent: 5982898 (1999-11-01), Hsu et al.
patent: 5987376 (1999-11-01), Olson et al.
patent: 6044350 (2000-03-01), Weiant et al.
patent: 6085320 (2000-07-01), Kaliski, Jr.
patent: 6088805 (2000-07-01), Davis et al.
patent: 6097811 (2000-08-01), Micali
patent: 6128740 (2000-10-01), Curry et al.
patent: 6134658 (2000-10-01), Multerer et al.
patent: 6754829 (2004-06-01), Butt et al.
patent: 6775782 (2004-08-01), Buros et al.
patent: 6912622 (2005-06-01), Miller
patent: 7130999 (2006-10-01), Yasala et al.
patent: 2002/0143989 (2002-10-01), Huitema et al.
U.S. Appl. No. 09/942,164, Huitema et al.
Microsoft.com,Peer-To-Peer Common Documentation, http://msdn.microsoft.com/library/default.asp?url=/library/en-us/p2psdk/p2p/peer—to—common—documentation.asp, (last vistited Aug. 5, 2005).
Adam Langley,The Freenet Protocol, The Free Network Project, at http://freenet.sourceforge.net/index.php?page=protocol (last visited May 21, 2001).
Philip J. Erdelsky,The Birthday Paradox, EFG, at http://www.efgh.com/math/birthday.htm (last visited Mar. 8, 2002).
Red-Black Tree, National Institute of Standards and Technology, at http://www.nist.gov/dads/HTML/redblack.html (last visited Mar. 5, 2002).
Ellison, C.,SPKI Requirements, (The Internet Society 1999), at http://www.ietf.org/rfc/rfc2692.txt?number=2692 (last visited Aug. 6, 2001).
Ellison, Carl, Bill Frantz, Butler Lampson, Ron Rivest, Brian M. Thomas, and Tatu Ylonen,Simple Public Key Certificate, (Internet Draft 1999), at http://www.world.std.com/˜cme/spki.txt (last visited Aug. 6, 2001).
Ellison, C., B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen,SPKI Certificate Theory, (The Internet Society 1999), at http://www.ietf.org/rfc/rfc2693.txt?number=2693 (last visited Aug. 6, 2001).
Gavrilescu Alexandru
Huitema Christian
Miller John L.
Ho Thomas M
Marshall & Gerstein & Borun LLP
Zand Kambiz
LandOfFree
Peer-to-peer name resolution protocol (PNRP) security... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Peer-to-peer name resolution protocol (PNRP) security..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Peer-to-peer name resolution protocol (PNRP) security... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3870352