Security context sharing

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S255000

Reexamination Certificate

active

09772256

ABSTRACT:
Networked computing entities which are members of a trusted group share knowledge of a secret value K that is unknown outside the trusted group. When an entity within the trusted group establishes a secure connection, it encodes its name along with the secret value K and an optional random number into a connection identifier. Encoding may use a hash function and/or encryption. By using this connection identifier and the secret value K, other members of the trusted group can decode the connection identifier and gain access to the specific secure connection by using the original cryptographic information for the connection. The connection identifier can be freely transmitted, with little risk that non-trusted entities will be able to use it to gain access to the secure connection.

REFERENCES:
patent: 5005200 (1991-04-01), Fischer
patent: 5349642 (1994-09-01), Kingdon
patent: 5369705 (1994-11-01), Bird et al.
patent: 5481611 (1996-01-01), Owens et al.
patent: 5687235 (1997-11-01), Perlman et al.
patent: 5787175 (1998-07-01), Carter
patent: 5818936 (1998-10-01), Mashayekhi
patent: 5857023 (1999-01-01), Demers et al.
patent: 5892828 (1999-04-01), Perlman
patent: 5913025 (1999-06-01), Higley et al.
patent: 5933503 (1999-08-01), Schell et al.
patent: 5991810 (1999-11-01), Shapiro et al.
patent: 6079020 (2000-06-01), Liu
patent: 6081900 (2000-06-01), Subramaniam et al.
patent: 6092191 (2000-07-01), Shimbo et al.
patent: 6092200 (2000-07-01), Muniyappa et al.
patent: 6119230 (2000-09-01), Carter
patent: 6215878 (2001-04-01), Harkins
patent: 6226751 (2001-05-01), Arrow et al.
patent: 6311272 (2001-10-01), Gressel
patent: 6701437 (2004-03-01), Hoke et al.
patent: 6742116 (2004-05-01), Matsui et al.
Bruce Schneier, Applied Cryptography, Second Edition , 1996.
Bruce Schneier, Applied Cryptography, Second Edition, 1996.
“What are the advantages and disadvantages of public-key cryptography compared with secret-key cryptography”, www.rsasecurity.com web site, pp. 1-2, no later than May 15, 2000.
Yinan Yang et al., “Tokens of Trust: Different Certificates for Different Trust Models”, pp. 1-17, no later than May 12, 2000.
“IPSec”, www.cisco.com web site, pp. 1-14, Apr. 3, 2000.
“Asymmetric Key Encryption”, www.pbg.mcgraw-hill.com web site, pp. 1-2, no later than May 12, 2000.
William Stallings, “SNMPv3: A Security Enhancement for SNMP”, www.comsoc.org web site, pp. 1-22, copyright 1998.
“Cryptography FAQ (06/10: Public Key Cryptography)”, www.faqs.org web site, pp. 1-5, Apr. 24, 2000.
Data Encryption Standard (DES), Federal Information Processing Standards Publication No. FIPS Pub 46-3, pp. 1-15, Oct. 25, 1999.
“IBM AIX VPNs”, www-1.ibm.com web site, pp. 1-7, no later than Jan. 23, 2001.
“All About . . . PKI”, www.entrust.com web site, pp. 1-3, no later than May 15, 2000.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Security context sharing does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Security context sharing, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security context sharing will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3762112

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.