Remote authentication based on exchanging signals...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S030000, C713S169000, C713S178000, C713S186000

Reexamination Certificate

active

06910129

ABSTRACT:
A method, an apparatus, and a computer program product for remote authentication are disclosed. The methods are based on exchanging of signals representing remote party's biometrics information (such as acoustic waveforms) and have application in secure telephony or video-conferencing communications over open networks. The apparatus includes a speech encoding/decoding module (632), a control module (636), an encryption/decryption module (640), a key generator (650), a Diffie Hellman key exchange system (660), a timer module (670) for measuring time between a challenged statement and a corresponding response statement, an input/output (I/O) module (680) for transmitting and receiving data via a communications channel610.

REFERENCES:
patent: 4710613 (1987-12-01), Shigenaga
patent: 4761807 (1988-08-01), Matthews et al.
patent: 4998279 (1991-03-01), Weiss
patent: 5412738 (1995-05-01), Brunelli et al.
patent: 5440635 (1995-08-01), Bellovin et al.
patent: 5491750 (1996-02-01), Bellare et al.
patent: 5712912 (1998-01-01), Tomko et al.
patent: 5720034 (1998-02-01), Case
patent: 5737420 (1998-04-01), Tomko et al.
patent: 5761329 (1998-06-01), Chen et al.
patent: 5910989 (1999-06-01), Naccache
patent: 6571344 (2003-05-01), Sitnik
patent: 0752143 (1997-01-01), None
patent: 0924657 (1999-06-01), None
patent: 2734679 (1996-11-01), None
patent: 9857247 (1998-12-01), None
Dwork et al., “Concurrent Zero-Knowledge,” 1998.
Needham, R. et al. “Using Encryption for Authentication and in Large Networks of Computers.” Communications of the ACM, vol. 21 (1978) pp. 993-999.
Otway D. et al. “Efficient and Timely Mutual Authentication.” Operating Systems Review, vol. 21, No. 1(1987) pp. 8-10.
Gong, L. et al. “Protecting Poorly Chosen Secrets from Guessing Attacks.” IEEE Journal on Selected Areas in Communication, vol. 11 (1993) pp. 648-656.
Zimmerman, P.R. “PGPfone Owners Manual.” Version 1.0 beta 5, Jan. 5, 1996, http://web.mit/edu
etwork/pgpfone/manual.
Diffie W. et al. “New Directions in Cyrptography.” IEEE Transaction on Information Theory, vol. IT-22, No. 6 (1976) pp. 644-654.
English Abstract of FR 2734679 Dated Nov. 29, 1996.
Jedwab, J. et al. “Minimum Weight Modified Signed-Digit Representations and Fast Exponentiation.” Electronics Letters (1989) vol. 25, No. 17 pp. 1171-1172.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Remote authentication based on exchanging signals... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Remote authentication based on exchanging signals..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Remote authentication based on exchanging signals... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3460879

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.