Information security – Access control or authentication – Network
Reexamination Certificate
2007-12-25
2007-12-25
Heneghan, Matthew (Department: 2134)
Information security
Access control or authentication
Network
C709S229000, C709S250000, C713S154000, C713S170000, C726S012000
Reexamination Certificate
active
10943638
ABSTRACT:
A method for authenticating communication traffic includes receiving a first request, such as a DNS request, sent over a network from a source address, to provide network information regarding a given domain name. A response is sent to the source address in reply to the first request. When a second request is from the source address in reply to the response, the authenticity of the first request is assessed based on the second request.
REFERENCES:
patent: 5511122 (1996-04-01), Atkinson
patent: 5689508 (1997-11-01), Lyles
patent: 5805803 (1998-09-01), Birrell et al.
patent: 5826014 (1998-10-01), Coley et al.
patent: 5898830 (1999-04-01), Wesinger et al.
patent: 5905730 (1999-05-01), Yang et al.
patent: 5961593 (1999-10-01), Gabber et al.
patent: 6055236 (2000-04-01), Nessett et al.
patent: 6072800 (2000-06-01), Lee
patent: 6134217 (2000-10-01), Stiliadis et al.
patent: 6182226 (2001-01-01), Reid et al.
patent: 6185680 (2001-02-01), Shimbo et al.
patent: 6208652 (2001-03-01), Stephens et al.
patent: 6256671 (2001-07-01), Strentzsch et al.
patent: 6279113 (2001-08-01), Vaidya
patent: 6304913 (2001-10-01), Rune
patent: 6324648 (2001-11-01), Grantges, Jr.
patent: 6335927 (2002-01-01), Elliott et al.
patent: 6487666 (2002-11-01), Shanklin et al.
patent: 6502135 (2002-12-01), Munger et al.
patent: 6839761 (2005-01-01), Kadyk et al.
patent: 6907525 (2005-06-01), Pazi et al.
patent: 2001/0054157 (2001-12-01), Fukumoto
patent: 2002/0083175 (2002-06-01), Afek et al.
patent: 2002/0188862 (2002-12-01), Trethewey et al.
patent: 2003/0041091 (2003-02-01), Cheline et al.
patent: 2004/0093513 (2004-05-01), Cantrell et al.
patent: WO-02/33870 (2002-04-01), None
Needham et al., “Using Encryption for Authentication in Large Networks of Computers,” Communications of the ACM, vol. 21, No. 12, pp. 993-999, 1978.
Eastlake, RFC 2535, “Domain Name System Security Extensions”, 1999, pp. 1-47.
“Practical Approaches to Dealing with DdoS Attacks”, Presented at North America Network Operators' Group (NANOG22, Scottdale, Arizona), May 2001.
Mockapetris, “Domain Names—Concepts and Facilities”, published as Request for Comments (RFC) 1034, 1987, of the Internet Engieering Task Force (IETF) Network Working Group.
“Domain Names—Implementation and Specification”, published as IETF RFC 1035, 1987.
Pazi, et al., U.S. Appl. No. 10/232,993, “Protecting Against Distributed Denital of Service Attacks”, Aug. 29, 2002.
Afek Yehuda
Golan Alon
Pazi Guy
Touitou Dan
Cisco Technology Inc.
Darby & Darby
Heneghan Matthew
LandOfFree
Protecting against spoofed DNS messages does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Protecting against spoofed DNS messages, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Protecting against spoofed DNS messages will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3873966