Scheme for device and user authentication with key...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S004000, C726S012000, C709S225000

Reexamination Certificate

active

10016558

ABSTRACT:
In a computer network, a method of mutually authenticating a client device and a network interface, authenticating a user to the network and exchanging encryption keys. In one embodiment, the method comprises authenticating the client device at the local network device point, with which the client device exchanges an encryption key and then the user is authenticated by a central authentication server. In another embodiment, the method comprises authenticating the client device at the central authentication server, with which the client device exchanges a key which is passed to the network device with a secret shared between the central authentication server and the network device. In this embodiment, the user is also authenticated at the central authentication server.

REFERENCES:
patent: 5701343 (1997-12-01), Takashima et al.
patent: 5740361 (1998-04-01), Brown
patent: 6070243 (2000-05-01), See et al.
patent: 6075860 (2000-06-01), Ketcham
patent: 6173400 (2001-01-01), Perlman et al.
patent: 6856800 (2005-02-01), Henry et al.
patent: 7039021 (2006-05-01), Kokudo
patent: 7039190 (2006-05-01), Engwer et al.
patent: 2002/0012433 (2002-01-01), Haverinen et al.
patent: 2002/0144128 (2002-10-01), Rahman et al.
Aboba, B. et al. “PPP EAP TLS Authentication Protocol” (RFC2716), Oct. 1999, <ftp://ftp.rfc-editor.org/in-notes/rfc2716.txt>.
Blunk, L. et al. “PPP Extensible Authentication Protocol (EAP)” (RFC2284), Mar. 1998, <ftp://ftp.rfc-editor.org/in-notes/rfc2284.txt>.
Derfler, Frank J. et al. How Networks Work, Sep. 2000, pp. 114-115.
Microsoft Corporation. Computer Dictionary, Third Edition, 1997, p. 415.
Schneier, Bruce. Applied Cryptography, Second Edition, 1996 John Wiley & Sons, Inc., pp. 53-56.
Aboba, B. et al. “PPP EAP TLS Authentication Protocol”, Oct. 1999, RFC 2716.
Rigney, C. et al. “Remote Authentication Dial In User Service (RADIUS)”, Jun. 2000, RFC 2865.
Stallings, William. Network Security Essentials, Applications and Standard, 2000 Prentice-Hall, Inc., pp. 203-223.
Halasz, David, et al. “TGe Security Baseline”, Nov. 2000, <ftp://dimacs.rutgers.edu/pub/dimacs/TechnicalReports/TechReports/2001/2001-43.ps.gz>.
Sakura et al. “Service Description and Usage of Identities/Numbers for FPLMTS” 1995 Fourth IEEE International Conference on Universal Personal Communications Record. Gateway to the 21stcentury. Tokyo, Nov. 6-10, 1995, vol. 1 Conf. 6, Nov. 6, 1995, pp. 168-172, XP010160521 ISBN: 0-7803-2955-4 p. 168, left-hand column, p. 170, left-hand column figure 5 p. 171, left-hand column, line 1 p. 172, left-hand column, line 12 p. 172, line 22-line 30.
Brown, D. “Techniques for privacy and authentication in personal communication systems a well designed P&A technique is nevassary to protect assets” IEEE Personal Communication, IEEE Communications Society, US vol. 2, No. 4, Aug. 1, 1995, pp. 6-10, XP000517583 ISSN: 1070-9916 p. 8, right-hand column p. 10 right hand column.
PCT Written Opinion for application No. PCT/US02/15642, Aug. 14, 2007.
Aboba et al., “PPP EAP TLS Authentication Protocol,” Requests for Comments: 2716, Oct. 1999, <ftp://ftp.rfc-editor.org/in-notes/rfc2716.txt>.
Derfler, Frank J. et al., “How Networks Work,” Sep. 2000, pp. 114-115.
Microsoft Corporation, Computer Dictionary, Third Edition, 1997, p. 415.
Schneier, Bruce, “Applied Cryptography,” Second Edition, 1996 John Wiley & Sons, Inc., pp. 53-56.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Scheme for device and user authentication with key... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Scheme for device and user authentication with key..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Scheme for device and user authentication with key... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3951207

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.