Using a portable security token to facilitate public key...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Central trusted authority provides computer authentication

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S155000, C713S156000, C713S168000, C726S004000, C726S007000, C380S029000, C380S030000, C380S255000, C380S270000

Reexamination Certificate

active

07552322

ABSTRACT:
One embodiment of the present invention provides a system that uses a portable security token to facilitate public key certification for a target device in a network. During system operation, the portable security token is located in close physical proximity to the target device to allow the portable security token to communicate with the target device through a location-limited communication channel. During this communication, the portable security token receives an authenticator for the target device, and forms a ticket by digitally signing the authenticator with a key previously agreed upon by the portable security token and a certification authority (CA). Next, the portable security token sends the ticket to the target device, whereby the target device can subsequently present the ticket to the CA to prove that the target device is authorized to receive a credential from the CA.

REFERENCES:
patent: 5408250 (1995-04-01), Bier
patent: 5519778 (1996-05-01), Leighton et al.
patent: 5539824 (1996-07-01), Bjorklund et al.
patent: 5781723 (1998-07-01), Yee et al.
patent: 5784463 (1998-07-01), Chen et al.
patent: 6064741 (2000-05-01), Horn et al.
patent: 6075860 (2000-06-01), Ketcham
patent: 6105133 (2000-08-01), Fielder et al.
patent: 6243373 (2001-06-01), Turock
patent: 6243772 (2001-06-01), Ghori et al.
patent: 6366654 (2002-04-01), Cramer et al.
patent: 6601171 (2003-07-01), Carter et al.
patent: 2001/0048744 (2001-12-01), Kimura
patent: 2002/0061748 (2002-05-01), Nakakita et al.
patent: 2002/0065065 (2002-05-01), Lunsford et al.
patent: 2002/0094087 (2002-07-01), Dellmo et al.
patent: 2002/0147920 (2002-10-01), Mauro
patent: 2002/0159598 (2002-10-01), Rubinstein et al.
patent: 2003/0014646 (2003-01-01), Buddhikot et al.
patent: 2003/0051140 (2003-03-01), Buddhikot et al.
patent: 2003/0078072 (2003-04-01), Serceki et al.
patent: 2003/0081774 (2003-05-01), Lin et al.
patent: 2003/0115468 (2003-06-01), Aull et al.
patent: 2003/0117985 (2003-06-01), Fujii et al.
patent: 2003/0149874 (2003-08-01), Balfanz et al.
patent: 2004/0088548 (2004-05-01), Smetters et al.
patent: 2004/0103280 (2004-05-01), Balfanz et al.
patent: 001024626 (2000-08-01), None
patent: 1 363 424 (2003-11-01), None
patent: WO 99/41876 (1999-08-01), None
Balfanz, Dirk et al., “Talking To Strangers: Authentication in Ad-Hoc Wireless Networks,” Xerox Palo Alto Rearch Center, Mar. 11, 2002, pp. 1-14.
“Secured Network Authentication Using Biometrics Application”, Muhammad Hafiz b. Laili et al., Proceedings of IEEE 2002 Student Conference on Research and Development, Shah Alam, Malaysia, pp. 368-370.
U.S. Appl. No. 60/480,909, entitled “Methods and Apparatus for Establishing and Using a Secure Credential Infrastructure” to Diana K. Smetters et al., filed Jun. 24, 2003.
U.S. Appl. No. 10/231,194 entitled “Apparatus and Methods for Providing Secured Communication” to Dirk Balfanz et al., filed Aug. 30, 2002.
U.S. Appl. No. 10/424,191 entitled “System and Method for Establishing Secondary Channels” to Conley et al., filed Apr. 25, 2003.
U.S. Appl. No. 10/656,439 entitled “Method, Apparatus, and Program Product for Securely Presenting Situation Information” to Smetters et al., filed Sep. 5, 2003.
U.S. Appl. No. 10/656,551 entitled “Method, Apparatus, and Program Product for Provisioning Secure Wireless Sensors” to Smetters et al., filed Sep. 5, 2003.
“ACC: Automatic Cryptographic Configuration of Embedded Devices” XML Trust Center White Paper 19thFeb. 2002, http://research.verisign.com/Papers/ACC1.html.
Asokan, N. et al.: “Key agreement in ad hoc networks”, Computer Communications, Elsevier Science Publishers BV, Amsterdam, NL, vol. 23, No. 17, Nov. 1, 2000, pp. 1627-1637.
Balfanz, D. et al., “Talking To Strangers: Authentication in Ad-Hoc Wireless Networks,” Xerox Palo Alto Research Center, [Retrieved from the Internet at http://www.isoc.org/isoc/conferences ndss/02/proceedings/papers/balfan.pdf on Feb. 18, 2003] (Posted on the Internet on Feb. 11, 2002).
Bardram, Jakob E. et al. “Context-Aware User Authentication-Supporting Proximity-Based Login in Pervasive Computing”, A.K. Dey et al. (Eds.): UbiComp 2003, LNCS 2864, pp. 107-123, 2003.
Dridi, F. et al., “How to Implement Web-Based Groupware Systems Based on WebDAV,” Published in Proc. of WETICE 99, IEEE 8th Intl. Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, Stanford, CA, pp. 1-7 (1999).
Fielding, R. et al., “Web-Based Development of Complex Information Products,” Communications of the ACM, vol. 41, No. 8, pp. 84-92 (1998).
Geer, Daniel E. et al. “Token-Mediated Certification and Electronic Commerce”, Proceedings of the Second USENIX Workshop on Electronic Commerce, Oakland, California, Nov. 1996.
Kindberg, Tim and Zhang, Kan “Secure Spontaneous Device Association”, A.K Dey et al. (Eds.): UbiComp 2003, LNCS 2864, pp. 124-131, 2003.
Kindberg, Tim and Zhang, Kan “Validating and Securing Spontaneous Associations between Wireless Devices” HP Laboratories, Palo Alto, HPL-2002-256, Hewlett-Packard Company, Sep. 12, 2002.
Lopes, D. et al., “Aerial Acoustic Communication,” IEEE Workshop on Applications of Signal Processing to Audio and Acoustics, pp. 21-24, (2001).
Schneier, Bruce: “Applied Cryptography: Protocols, Algorithms, and Source Code in C” 1996, John Wiley & Sons, New York, US, Section 8.3 “Transferring Keys”.
Stajano, F. and Anderson, R.: “The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks” 1999, AT&T Software Symposium, ‘Online!’ Sep. 15, 1999.
Whitehead, Jr., E. et al., “WebDAV, A Network Protocol for Remote Collaborative Authoring on the Web,” pp. 1-21 (1999) [Retrieved from the Internet at http://citeseer.nj.nec.com/whitehead99webdav.html on Mar. 11, 2003].
Whitehead, Jr., E. et al., “Lessons from WebDAV for the Next Generation Web Infrastructure,” Department of Information and Computer Science, University of California [Retrieved from the Internet at http://www.ics.uci.edu/˜ejw/http-future/Whitehead/http—pos—paper.html on Sep. 20, 2002].

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Using a portable security token to facilitate public key... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Using a portable security token to facilitate public key..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Using a portable security token to facilitate public key... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4070345

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.