Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2011-01-04
2011-01-04
Dada, Beemnet W (Department: 2435)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
Reexamination Certificate
active
07865731
ABSTRACT:
A system for providing secured access to an application service includes a security token that couples to the application service. The security token performs a first element of a cryptographic technique, such as, for example, encryption or decryption. A proximity token is provided that is associated with the security token. The proximity token performs a second element of the cryptographic technique to validate a communication between the application service and the security token. The proximity token is operable to validate the communication only when the proximity token is located within a predetermined validation distance from the security token or the application service. The security token may perform the first element of the cryptographic technique to verify that the proximity token has validated the communication between the application service and the security token. The system may be configured to provide secured access to the application service when the proximity token validates the communication and to prevent secured access to the application service when the proximity token does not validate the communication.
REFERENCES:
patent: 5638444 (1997-06-01), Chou
patent: 6088450 (2000-07-01), Davis
patent: 6175922 (2001-01-01), Wang
patent: 6515575 (2003-02-01), Kataoka
patent: 6570610 (2003-05-01), Kipust
patent: 6999589 (2006-02-01), Cato et al.
patent: 7107246 (2006-09-01), Wang
patent: 2003/0005300 (2003-01-01), Noble et al.
patent: 2003/0159040 (2003-08-01), Hashimoto et al.
patent: 2004/0103312 (2004-05-01), Messerges
patent: 2004/0143515 (2004-07-01), Kawasaki
patent: 1 283 474 (2003-02-01), None
patent: WO 01/43129 (2001-06-01), None
patent: 02/091704 (2002-11-01), None
patent: 03/009619 (2003-01-01), None
“802.11,” http://www.webopedia.com/TERM/8/802—11.html, printed from the Internet April 10, 2003, 3 pgs.
“Bluetooth,” http://www.webopedia.com/TERM/b/bluetooth.html, printed from the Internet Apr. 10, 2003, 2 pgs.
Bums, Jim, “Selecting an Appropriate EAP Method for Your Wireless LAN,” http://www.meetinghousedata.com/MDC—EAP—White—Paper.pdf, printed from the Internet Apr. 10, 2003, 8 pgs.
Chan, Michael, “Why Won't My Wireless Cell Phone Talk to My Xbox?” http://www.internetnews.com/wireless/article.php/1457431, printed from the Internet Apr. 10, 2003, 3 pgs.
Dashevsky, Jane, et al., “SIM Trust Parameters: Mobile Service Technologies,” ftp://download.intel.com/labs/wireless/download/sim.pdf, printed from the Internet Apr. 10, 2003, copyright 2003 Intel Corporation, 59 pgs.
“Embedded Intel® Architecture Reference Design for Communic Appliances,” http://www.intel.com/platforms/applied/eiacomm/papers/apprefdes.htm, printed from the Internet Apr. 10, 2003, 4 pgs.
Foerster, Jeff, et al., “Ultra-Wideband Technology for Short- or Medium-Range Wireless Communications,” http://developer.intel.com/technology/itj/q22001/pdf/art—4.pdf,Intel Technology Journal, May 8, 2001, 11 pgs.
Geier, Jim, “Minimizing WLAN Security Threats,” http://www.80211-planet.com/tutorials/article.php/1457211, printed from the Internet Apr. 10, 2003, 4 pgs.
“IBM Research: Personal Area Network,” http://domino.research.ibm.com/comm/bios.nsf/pages/pan.html, printed from the Internet Apr. 10, 2003, 2 pgs.
“Microsoft Windows 2000 Server: Smart Card Logon,” http://www.microsoft.com/singapore/downloads/sclogonwp.document, printed from the Internet Apr. 10, 2003, 21 pgs.
Monson, Heidi, “Bluetooth Technology and Implications,” http://www.sysopt.com/articles/bluetooth/, printed from the Internet Apr. 10, 2003, 3 pgs.
Monson, Heidi, “Bluetooth Technology and Implications,” http://www.sysopt.com/articles/bluetooth/index2.html, printed from the Internet Apr. 10, 2003, 4 pgs.
Pesonen, Lauri, “GSM Interception,” http://www.dja.unisa.it/ads.dir/corso-security/www/CORSO-9900/a5/Netsec
etsec.html, printed from the Internet Apr. 8, 2003, 16 pgs.
“Shared Wireless Access Protocol,” http://www.webopedia.com/TERM/S/Shared—WAP.html, printed from the Internet Apr. 10, 2003, 1 pg.
Smart Card Alliance, “Secure Personal Identification Systems: Policy Process and Technology Choices for a Privacy-Sensitive Solution,” http://www.smartcardalliance.org/pdf/alliance—activities/Secure—ID—White—Paper.pdf, printed from the Internet Apr. 10, 2003, copyright 2002 Smart Card Alliance, Inc., 15 pgs.
Sorenson, Dustin, “Smart-Card Devices and Applications,” http://itpapers.zdnet.com/thankyou.aspx?&sortby=comp&scid=423&docid=11252&view=11252, printed from the Internet Apr. 10, 2003, 11 pgs.
“WAP,” http://www.webopedia.com/TERM/W/WAP.html, printed from the Internet Apr. 10, 2003, 3 pgs.
Dada Beemnet W
Fish & Richardson P.C.
SAP Aktiengesellschaft
LandOfFree
Securing access to an application service based on a... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Securing access to an application service based on a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Securing access to an application service based on a... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2729104