Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2007-07-17
2007-07-17
Moazzami, Nasser (Department: 2136)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C380S203000, C380S036000, C380S043000, C380S044000
Reexamination Certificate
active
09896088
ABSTRACT:
A method for key verification through time varying item presentation based on a key hash result comprises generating a key hash result partially based on both a global identifier provided from a source and an estimated current time at that source. After generating the key hash result, a first time-varying item is produced using the key hash result as an index for a table lookup or generated based on Certain bit patterns forming the key hash result. Thereafter, the first time-varying item is presented for comparison with a second time-varying item being contemporaneously presented at the source. These computations are repeated, giving the impression of two views or instances of the same time-varying item. An attacker might be able to match one small portion of such a time sequence of presentations, by luck, but not any large portion of the sequence.
REFERENCES:
patent: 4033053 (1977-07-01), Engler
patent: 5224160 (1993-06-01), Paulini et al.
patent: 5425020 (1995-06-01), Gregg et al.
patent: 5530757 (1996-06-01), Krawczyk
patent: 5596641 (1997-01-01), Ohashi et al.
patent: 5889861 (1999-03-01), Ohashi et al.
patent: 5940513 (1999-08-01), Aucsmith et al.
patent: 6131162 (2000-10-01), Yoshiura et al.
patent: 6211870 (2001-04-01), Foster
patent: 6216004 (2001-04-01), Tiedemann et al.
patent: 6339429 (2002-01-01), Schug
patent: 6430608 (2002-08-01), Shaio
patent: 6553029 (2003-04-01), Alexander
patent: 6601172 (2003-07-01), Epstein
patent: 6661810 (2003-12-01), Skelly et al.
patent: 6664969 (2003-12-01), Emerson et al.
patent: 6694434 (2004-02-01), McGee
patent: 6741852 (2004-05-01), Mohrs
patent: 6804506 (2004-10-01), Freitag et al.
patent: 6996273 (2006-02-01), Mihcak et al.
patent: 2001/0016909 (2001-08-01), Gehrmann
patent: 2003/0095664 (2003-05-01), Asano et al.
patent: 1128597 (2001-08-01), None
patent: WO 98/49855 (1998-11-01), None
Rivest, R., “SDSI—A Simple Distributed Security Infrastructure,” Sep. 15, 1996, Laboratory for Computer Science, Massachusetts Institute of Technology, http://theory.Ics.mit.edu/˜rivest/sdsi10.html, pp. 1-41.
Ellison, C., et al., “SPKI Certificate Theory,” Sep. 1999, Network Working Group, RFC 2693, www.ietf.org/rfc/rfc2693.txt, pp. 1-38.
Diffie, Whitfield and Hellman, Martin E., New Directions in Cryptography, IEEE Transactions on Information Theory, Nov. 1976, pp. 644-654, vol. IT-22(6).
Housley, R., et al., Internet X.509 Public Key Infrastructure Certificate and CRL Profile, Request for Comments: 2459, www.ietf.org/rfc/ref2459.txt, p. 1-113.
Eleen Frisch, “Email Security That's Good Enough”, RS/ Magazine Online, Feb. 1997, pp. 16-20, XP002266633, <URL:http://swexpert.com/C5/RS.C2.FEB.97.pdf> retrieved on Feb. 12, 2004.
AJ Menes, PC Van Oorschot, Sa Vanstone, “Handbook of Applied Cryptography”, pp. 359-364, 1997 CRC Press, Boca Raton, XP-002266634.
Dohrmann Stephen H.
Ellison Carl M.
Blakely , Sokoloff, Taylor & Zafman LLP
Intel Corporation
Moazzami Nasser
Shiferaw Eleni
LandOfFree
Time varying presentation of items based on a key hash does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Time varying presentation of items based on a key hash, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Time varying presentation of items based on a key hash will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3738197