Systems and methods for caching in authentication systems

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S181000, C713S166000, C726S005000

Reexamination Certificate

active

07490237

ABSTRACT:
A process for requesting authentication includes transmitting a hash digest formed from first client-specific data together with second client specific data and receiving, in response to transmitting, an indication of acceptance when the hash digest and second client-specific data correspond to a valid client authentication request.

REFERENCES:
patent: 5633931 (1997-05-01), Wright
patent: 6161181 (2000-12-01), Haynes et al.
patent: 6272632 (2001-08-01), Carman et al.
patent: 6468160 (2002-10-01), Eliott
patent: 6668283 (2003-12-01), Sitaraman et al.
patent: 6712704 (2004-03-01), Eliott
patent: 6769989 (2004-08-01), Smith et al.
patent: 6952781 (2005-10-01), Chang et al.
patent: 7069435 (2006-06-01), Sandhu et al.
patent: 7100047 (2006-08-01), Stamos et al.
patent: 7216236 (2007-05-01), Kou et al.
patent: 2003/0126464 (2003-07-01), McDaniel et al.
patent: 2003/0172269 (2003-09-01), Newcombe
patent: 2003/0172270 (2003-09-01), Newcombe et al.
patent: 2004/0049678 (2004-03-01), Walsmley et al.
patent: 2004/0049702 (2004-03-01), Subramaniam et al.
patent: 2004/0162137 (2004-08-01), Eliott
patent: 2004/0205248 (2004-10-01), Little et al.
patent: 2004/0247131 (2004-12-01), Buer
Wang Xue-yan, Chen Qian-bin, “HASH Function Implementation of the Integrity of Data in WAP's WTLS,” Journal of Chongqing University of Posts and Telecommunications, Jun. 2002, vol. 14, No. 2, pp. 57-61., China.
Hajime Watanabe, Toru Fujiwara, Tadao Kasami, “An Improved Method for Formal Security Verification of Crytographic Protocols,” IEICE Trans. Fundamentals, Jul. 1996, vol. E79-A, No. 7, pp. 1089-1096, Japan.
Sead Muftic, Morris Sloman, “Security architecture for distributed systems,” Computer Communications, Jul. 1994, vol. 17, No. 7, pp. 492-500, Butterworth-Heinemann Ltd., United Kingdom.
Ian Downnard, “Public-key crytography extensions into Kerberos,” IEEE Potentials, Dec. 2002/Jan. 2003, pp. 30-34, The Institute of Electrical and Electronics Engineers, Inc., New York.
Cheolhyun Kim, Ilyong Chung, “An Efficient Kerberos Authentication Mechanism Associated with X.509 and DNS (Domain Name System),” IEICE Trans. Inf. & Syst., Sep. 2002, vol. E85-D, No. 9, pp. 1384-1389, Japan.
Naomaru Itoi, Tomoko Fukuzawa, Peter Honeyman, “Secure Internet Smartcards,” Java Card 2000, LNCS 2041, pp. 73-89, 2001, Springer-Verlag Berlin Heidelberg.
Stelvio Cimato, “Design of an Authentication Protocol for Gsm Javacards,” ICICS 2001, LNCS 2288, pp. 355-368, 2002, Springer-Verlag Berlin Heidelberg.
Ed Dawson, Andrew Clark, Mark Looi, “Key management in a non-trusted distributed environment,” Future Generation Computer Systems 16 (2000), pp. 319-329, Elsevier Science B.V.
O. Elkeelany, M. M. Matalgah, K. P. Sheikh, M. Thaker, G. Chaudhry. D. Medhi, J. Qaddour, “Performance Analysis of IPSec Protocol: Encryption and Authentication,” 2002 IEEE International Conference on Communications, pp. 1164-1168.
Olga Kornievskaia, Peter Honeyman, Bill Doster, Kevin Coffman, “Kerberized Credential Translation: A Solution to Web Access Control,” 10th USENIX Security Symposium, pp. 235-248, USENIX Association, 2001.
Ding Yi-fan, et al., “Study of access control technologies and system in Extranet,” Computer Integrated Manufacturing Systems, vol. 7, No. 1, Jan. 2001, pp. 7-15, China.
Wang Heng, Sun Ye-min, Zhang Kun, “Self-Organized Network and Study of its Security,” Mini-Micro System, vol. 23, No. 2, Feb. 2002, pp. 214-217, China.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Systems and methods for caching in authentication systems does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Systems and methods for caching in authentication systems, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Systems and methods for caching in authentication systems will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4071642

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.