System and method for preventing a first node from being emulate

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

713153, 713162, 709229, 370392, H04L 900, G06F 1516

Patent

active

061516791

ABSTRACT:
A network security device 10 is connected between a protected client 12 and a network 100. The network security device 10 negotiates a session key with any other protected client. Then, all communications between the two clients are encrypted. The inventive device is self-configuring and locks itself to the IP address of its client 12. Thus, the client 12 cannot change its IP address once set and therefore cannot emulate the IP address of another client. When a packet is transmitted from the protected host, the security device 10 translates the MAC address of the client to its own MAC address before transmitting the packet into the network. Packets addressed to the host, contain the MAC address of the security device. The security device 10 translates its MAC address to the client's 12 MAC address before transmitting the packet to the client 12.

REFERENCES:
patent: 3816666 (1974-06-01), Tomozawa et al.
patent: 4159468 (1979-06-01), Barnes et al.
patent: 4160120 (1979-07-01), Barnes et al.
patent: 4182933 (1980-01-01), Rosenblum
patent: 4185166 (1980-01-01), Kinch, Jr. et al.
patent: 4203166 (1980-05-01), Ehrsam et al.
patent: 4227253 (1980-10-01), Ehrsam et al.
patent: 4238854 (1980-12-01), Ehrsam et al.
patent: 4249180 (1981-02-01), Eberle et al.
patent: 4621321 (1986-11-01), Boebert et al.
patent: 4633391 (1986-12-01), Rundell
patent: 4701840 (1987-10-01), Boebert et al.
patent: 4713753 (1987-12-01), Boebert et al.
patent: 4727579 (1988-02-01), Wright et al.
patent: 4731841 (1988-03-01), Rosen et al.
patent: 4757536 (1988-07-01), Szczutkowski et al.
patent: 4799153 (1989-01-01), Hann et al.
patent: 4802220 (1989-01-01), Marker, Jr.
patent: 4829560 (1989-05-01), Evanyk et al.
patent: 4829569 (1989-05-01), Seth-Smith et al.
patent: 4837822 (1989-06-01), Crosly et al.
patent: 4901348 (1990-02-01), Nichols et al.
patent: 4910777 (1990-03-01), Larson et al.
patent: 4912762 (1990-03-01), Lee et al.
patent: 4916704 (1990-04-01), Bruckert et al.
patent: 4924513 (1990-05-01), Herbison et al.
patent: 4933969 (1990-06-01), Marshall et al.
patent: 4933971 (1990-06-01), Bestock et al.
patent: 4956863 (1990-09-01), Goss
patent: 4965804 (1990-10-01), Trobovich et al.
patent: 4980913 (1990-12-01), Skret
patent: 4991207 (1991-02-01), Shiraishi et al.
patent: 5001755 (1991-03-01), Skret
patent: 5056140 (1991-10-01), Kimbell
patent: 5070528 (1991-12-01), Hawe et al.
patent: 5086469 (1992-02-01), Gupta et al.
patent: 5161192 (1992-11-01), Carter et al.
patent: 5161193 (1992-11-01), Lampson et al.
patent: 5177788 (1993-01-01), Schanning et al.
patent: 5179554 (1993-01-01), Lomicka et al.
patent: 5182554 (1993-01-01), Kaiser et al.
patent: 5204961 (1993-04-01), Barlow
patent: 5222137 (1993-06-01), Barrett et al.
patent: 5222140 (1993-06-01), Beller et al.
patent: 5245696 (1993-09-01), Loeb et al.
patent: 5261003 (1993-11-01), Matsui
patent: 5268962 (1993-12-01), Abadi et al.
patent: 5272754 (1993-12-01), Boebert
patent: 5276735 (1994-01-01), Boebert et al.
patent: 5299263 (1994-03-01), Beller et al.
patent: 5303303 (1994-04-01), White
patent: 5309437 (1994-05-01), Perlman et al.
patent: 5311593 (1994-05-01), Carmi
patent: 5331637 (1994-07-01), Francis et al.
patent: 5353283 (1994-10-01), Tsuchiya
patent: 5361359 (1994-11-01), Tajalli et al.
patent: 5386470 (1995-01-01), Carter et al.
patent: 5386471 (1995-01-01), Bianco
patent: 5394402 (1995-02-01), Ross
patent: 5394469 (1995-02-01), Nagel et al.
patent: 5406628 (1995-04-01), Beller et al.
patent: 5414694 (1995-05-01), Crayford et al.
patent: 5416842 (1995-05-01), Aziz
patent: 5432850 (1995-07-01), Rothenberg
patent: 5442708 (1995-08-01), Adams, Jr. et al.
patent: 5489896 (1996-02-01), Sofer et al.
patent: 5499297 (1996-03-01), Boebert et al.
patent: 5502766 (1996-03-01), Boebert et al.
patent: 5537099 (1996-07-01), Liang
patent: 5548646 (1996-08-01), Aziz et al.
patent: 5548649 (1996-08-01), Jacobson
patent: 5557346 (1996-09-01), Lipner et al.
patent: 5557765 (1996-09-01), Lipner et al.
patent: 5577209 (1996-11-01), Boyle et al.
patent: 5588060 (1996-12-01), Aziz
patent: 5590201 (1996-12-01), Lo
patent: 5596718 (1997-01-01), Boebert et al.
patent: 5600722 (1997-02-01), Yamaguchi et al.
patent: 5623601 (1997-04-01), Vu
patent: 5699513 (1997-12-01), Feigen et al.
patent: 5781550 (1998-07-01), Templin
Shmuely, Composite Diffie-Hellman Public-Key Generating Systems Are Hard to Break, Technion Technical Report, Feb. 1985.
Rabin, Digitized Signatures & Public-Key Functions As Intractable A Facturization, (date unknown).
Williams, A Modification of the RSA Public-Key Encryption Procedure, IEEE Transactions On Information Theory, vol. IT-26, No. 6, pp. 726-729 (Nov. 1980).
Miyaguch, The FEAL Cipher Family, Crypto '90 (Aug. 1990).
Shimizu, et al., FEAL-Fast Date Encipherment Algorithm, Systems & Computer in Japan, vol. 19, No. 7, pp 20-34 (1988).
Federal Register, vol. 40, No. 52, Data Encryption Standard (Mar. 17, 1975).
Davis, et al., Security for Computer Networks, Chapters 3 (DES) and Chapter 4 (Block Cipher) pp. 47-108 (Wiley 1984).
Rivest, The MD5 Message-Digest Algorithm, Apr. 1992.
RSA Brochure (undated).
Diffie, The First Ten Years of Public-Key Cryptography, Proceedings of the IEEE, vol. 70, No. 5, pp. 560-577 (May 1988).
Fahn, Answers to Frequently Asked Questing About Today's Cryptography, RSA Laboratories (Sep. 1992).
Linn, Privacy Enhancement for Internet Electronic Mail: Part I: Message Encryption and Authentication Procedures, Network Working Group, RFC 1421 (Feb. 1993).
McCurley, A Key Distribution System Equivalent to Factoring, Jun. 3, 1987.
Kaliski, Privacy Enahncement for Internet Electronic Mail: Part IV: Key Certification and Related Services, Network Working Group, RFC 1424 (Feb. 1993).
Kent, Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-Based Key Management, Network Working Group, RFC 1422 (Feb. 1993).
Diffie, et al., Authentication and Authenticated Key Exchanges, Design, Codes, and Cryptography, 2, pp. 107-125 (1992).
Konigs, Cryptographic Identification Methods for Smart Cards in the Process of Standardization, IEEE Communications Magazine, vol. 29, No. 6, pp. 42-48 (Jun. 1991).
Ferreira, The Smart Card: A High Security Tool in EDP, Phillips TDS Review, vol. 47, No. 3, pp. 1-19, (Sep. 1989).
Day, et al., The OSI Reference Model, Proceedings of the IEEE, vol. 71, No. 12, pp. 1334-1340 (Dec. 1983).
Bellovin, Security Problems in the TCP/IP Protocol Suite, Computer Communication Review, Col. 19, No. 2, pp. 32-40 (Apr. 1989).
Balenson, Privacy Enchantment for Internet Electronic Mail: Part III: Algorithms, Modes, and Identifiers, Network Working Group, RFC 1115 (Feb. 1993).
Menezes, Qu, and Vanstone, "Some New Key Arrangement Protocols Providing Implicit Authentication," Apr. 24, 1995.
Diffie, The Ten Years of Public-Key Cryptography, Proceedings of the IEEE, vol. 70, No. 5, pp. 560-577 (May 1988).
Fahn, Answers to Frequently Asked Questions About Today's Cryptography, RSA Laboratories (Sep. 1992).
Linn, Privacy Enhancement for Internet Electronic Mail: PartI; Message Encryption and Authentication Procedures, Network Working Group, RFC 1421 (Feb. 1993).
McCurley, A Key Distribution System Equivalent to Factoring, Jun. 3, 1987.
Kaliski, Privacy Enhancement for Internet Electronic Mail: Part IV: Key Certification and Related Services, Network Working Group, RFC 1424 (Feb. 1993).
Kent, Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-Based Key Management, Network Working Group, RFC 1422 (Feb. 1993).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for preventing a first node from being emulate does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for preventing a first node from being emulate, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for preventing a first node from being emulate will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1267243

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.