Time varying presentation of items based on a key hash

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S203000, C380S036000, C380S043000, C380S044000

Reexamination Certificate

active

09896088

ABSTRACT:
A method for key verification through time varying item presentation based on a key hash result comprises generating a key hash result partially based on both a global identifier provided from a source and an estimated current time at that source. After generating the key hash result, a first time-varying item is produced using the key hash result as an index for a table lookup or generated based on Certain bit patterns forming the key hash result. Thereafter, the first time-varying item is presented for comparison with a second time-varying item being contemporaneously presented at the source. These computations are repeated, giving the impression of two views or instances of the same time-varying item. An attacker might be able to match one small portion of such a time sequence of presentations, by luck, but not any large portion of the sequence.

REFERENCES:
patent: 4033053 (1977-07-01), Engler
patent: 5224160 (1993-06-01), Paulini et al.
patent: 5425020 (1995-06-01), Gregg et al.
patent: 5530757 (1996-06-01), Krawczyk
patent: 5596641 (1997-01-01), Ohashi et al.
patent: 5889861 (1999-03-01), Ohashi et al.
patent: 5940513 (1999-08-01), Aucsmith et al.
patent: 6131162 (2000-10-01), Yoshiura et al.
patent: 6211870 (2001-04-01), Foster
patent: 6216004 (2001-04-01), Tiedemann et al.
patent: 6339429 (2002-01-01), Schug
patent: 6430608 (2002-08-01), Shaio
patent: 6553029 (2003-04-01), Alexander
patent: 6601172 (2003-07-01), Epstein
patent: 6661810 (2003-12-01), Skelly et al.
patent: 6664969 (2003-12-01), Emerson et al.
patent: 6694434 (2004-02-01), McGee
patent: 6741852 (2004-05-01), Mohrs
patent: 6804506 (2004-10-01), Freitag et al.
patent: 6996273 (2006-02-01), Mihcak et al.
patent: 2001/0016909 (2001-08-01), Gehrmann
patent: 2003/0095664 (2003-05-01), Asano et al.
patent: 1128597 (2001-08-01), None
patent: WO 98/49855 (1998-11-01), None
Rivest, R., “SDSI—A Simple Distributed Security Infrastructure,” Sep. 15, 1996, Laboratory for Computer Science, Massachusetts Institute of Technology, http://theory.Ics.mit.edu/˜rivest/sdsi10.html, pp. 1-41.
Ellison, C., et al., “SPKI Certificate Theory,” Sep. 1999, Network Working Group, RFC 2693, www.ietf.org/rfc/rfc2693.txt, pp. 1-38.
Diffie, Whitfield and Hellman, Martin E., New Directions in Cryptography, IEEE Transactions on Information Theory, Nov. 1976, pp. 644-654, vol. IT-22(6).
Housley, R., et al., Internet X.509 Public Key Infrastructure Certificate and CRL Profile, Request for Comments: 2459, www.ietf.org/rfc/ref2459.txt, p. 1-113.
Eleen Frisch, “Email Security That's Good Enough”, RS/ Magazine Online, Feb. 1997, pp. 16-20, XP002266633, <URL:http://swexpert.com/C5/RS.C2.FEB.97.pdf> retrieved on Feb. 12, 2004.
AJ Menes, PC Van Oorschot, Sa Vanstone, “Handbook of Applied Cryptography”, pp. 359-364, 1997 CRC Press, Boca Raton, XP-002266634.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Time varying presentation of items based on a key hash does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Time varying presentation of items based on a key hash, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Time varying presentation of items based on a key hash will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3738197

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.