Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2007-07-03
2007-07-03
Zand, Kambiz (Department: 2134)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C380S255000
Reexamination Certificate
active
09772256
ABSTRACT:
Networked computing entities which are members of a trusted group share knowledge of a secret value K that is unknown outside the trusted group. When an entity within the trusted group establishes a secure connection, it encodes its name along with the secret value K and an optional random number into a connection identifier. Encoding may use a hash function and/or encryption. By using this connection identifier and the secret value K, other members of the trusted group can decode the connection identifier and gain access to the specific secure connection by using the original cryptographic information for the connection. The connection identifier can be freely transmitted, with little risk that non-trusted entities will be able to use it to gain access to the secure connection.
REFERENCES:
patent: 5005200 (1991-04-01), Fischer
patent: 5349642 (1994-09-01), Kingdon
patent: 5369705 (1994-11-01), Bird et al.
patent: 5481611 (1996-01-01), Owens et al.
patent: 5687235 (1997-11-01), Perlman et al.
patent: 5787175 (1998-07-01), Carter
patent: 5818936 (1998-10-01), Mashayekhi
patent: 5857023 (1999-01-01), Demers et al.
patent: 5892828 (1999-04-01), Perlman
patent: 5913025 (1999-06-01), Higley et al.
patent: 5933503 (1999-08-01), Schell et al.
patent: 5991810 (1999-11-01), Shapiro et al.
patent: 6079020 (2000-06-01), Liu
patent: 6081900 (2000-06-01), Subramaniam et al.
patent: 6092191 (2000-07-01), Shimbo et al.
patent: 6092200 (2000-07-01), Muniyappa et al.
patent: 6119230 (2000-09-01), Carter
patent: 6215878 (2001-04-01), Harkins
patent: 6226751 (2001-05-01), Arrow et al.
patent: 6311272 (2001-10-01), Gressel
patent: 6701437 (2004-03-01), Hoke et al.
patent: 6742116 (2004-05-01), Matsui et al.
Bruce Schneier, Applied Cryptography, Second Edition , 1996.
Bruce Schneier, Applied Cryptography, Second Edition, 1996.
“What are the advantages and disadvantages of public-key cryptography compared with secret-key cryptography”, www.rsasecurity.com web site, pp. 1-2, no later than May 15, 2000.
Yinan Yang et al., “Tokens of Trust: Different Certificates for Different Trust Models”, pp. 1-17, no later than May 12, 2000.
“IPSec”, www.cisco.com web site, pp. 1-14, Apr. 3, 2000.
“Asymmetric Key Encryption”, www.pbg.mcgraw-hill.com web site, pp. 1-2, no later than May 12, 2000.
William Stallings, “SNMPv3: A Security Enhancement for SNMP”, www.comsoc.org web site, pp. 1-22, copyright 1998.
“Cryptography FAQ (06/10: Public Key Cryptography)”, www.faqs.org web site, pp. 1-5, Apr. 24, 2000.
Data Encryption Standard (DES), Federal Information Processing Standards Publication No. FIPS Pub 46-3, pp. 1-15, Oct. 25, 1999.
“IBM AIX VPNs”, www-1.ibm.com web site, pp. 1-7, no later than Jan. 23, 2001.
“All About . . . PKI”, www.entrust.com web site, pp. 1-3, no later than May 15, 2000.
Nalven Andrew L.
Novell Inc.
Schwegman Lundberg Woessner & Kluth P.A.
LandOfFree
Security context sharing does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Security context sharing, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security context sharing will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3762112