Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Having particular address related cryptography
Reexamination Certificate
2005-06-22
2009-11-24
Chai, Longbit (Department: 2431)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Having particular address related cryptography
C713S163000, C713S164000, C713S169000, C713S170000, C726S003000, C726S004000, C726S005000, C726S006000, C726S007000, C380S229000, C380S223000, C380S231000, C380S232000
Reexamination Certificate
active
07624264
ABSTRACT:
An extensible cryptographically generated network address may be generated by forming at least a portion of the network address as a portion of a first hash value. The first hash value may be formed by generating a plurality of hash values by hashing a concatenation of a public key and a modifier using a second hash function until a stop condition. The stop condition may include computing the plurality of hash values for a period of time specified by a time parameter. A second hash value may be selected from the plurality of hash values, and the modifier used to compute that hash value may be stored. A hash indicator may be generated which indicates the selected second hash value. The first hash value may be generated as a hash of a concatenation of at least the public key and the modifier. At least a portion of the node-selectable portion of the network address may include at least a portion of the first hash value.
REFERENCES:
patent: 5473691 (1995-12-01), Menezes et al.
patent: 5511122 (1996-04-01), Atkinson
patent: 5563998 (1996-10-01), Yakish et al.
patent: 5673319 (1997-09-01), Bellare et al.
patent: 5729608 (1998-03-01), Janson et al.
patent: 5778065 (1998-07-01), Hauser et al.
patent: 5784562 (1998-07-01), Diener
patent: 5787172 (1998-07-01), Arnold
patent: 5892904 (1999-04-01), Atkinson et al.
patent: 5903721 (1999-05-01), Sixtus et al.
patent: 5944794 (1999-08-01), Okamoto et al.
patent: 6028938 (2000-02-01), Malkis et al.
patent: 6055234 (2000-04-01), Aramaki
patent: 6055236 (2000-04-01), Nessett et al.
patent: 6088700 (2000-07-01), Larsen et al.
patent: 6101499 (2000-08-01), Ford et al.
patent: 6108673 (2000-08-01), Brandt et al.
patent: RE36946 (2000-11-01), Diffie et al.
patent: 6148405 (2000-11-01), Liao et al.
patent: 6175833 (2001-01-01), West et al.
patent: 6229806 (2001-05-01), Lockhart et al.
patent: 6237035 (2001-05-01), Himmel et al.
patent: 6247029 (2001-06-01), Kelley et al.
patent: 6367012 (2002-04-01), Atkinson et al.
patent: 6421673 (2002-07-01), Caldwell et al.
patent: 6424981 (2002-07-01), Isaac et al.
patent: 6526506 (2003-02-01), Lewis
patent: 6600823 (2003-07-01), Hayosh
patent: 6615348 (2003-09-01), Gibbs
patent: 6687755 (2004-02-01), Ford et al.
patent: 6732110 (2004-05-01), Rjaibi et al.
patent: 6832322 (2004-12-01), Boden et al.
patent: 6944672 (2005-09-01), Crow et al.
patent: 6957346 (2005-10-01), Kivinen et al.
patent: 7032242 (2006-04-01), Grabelsky et al.
patent: 7134019 (2006-11-01), Shelest et al.
patent: 7216233 (2007-05-01), Krueger
patent: 7370197 (2008-05-01), Huitema
patent: 7409544 (2008-08-01), Aura
patent: 2001/0010720 (2001-08-01), Kimball et al.
patent: 2002/0133607 (2002-09-01), Nikander
patent: 2002/0152380 (2002-10-01), O'Shea et al.
patent: 2002/0152384 (2002-10-01), Shelest et al.
patent: 2003/0028790 (2003-02-01), Blerumer
patent: 2003/0065934 (2003-04-01), Angelo et al.
patent: 2003/0070067 (2003-04-01), Saito
patent: 2003/0120929 (2003-06-01), Hoffstein et al.
patent: 2003/0142823 (2003-07-01), Swander et al.
patent: 2003/0233568 (2003-12-01), Maufer et al.
patent: 2004/0008845 (2004-01-01), Le et al.
patent: 2004/0010683 (2004-01-01), Huitema
patent: 2004/0088537 (2004-05-01), Swander et al.
patent: 2004/0151322 (2004-08-01), Sovio et al.
patent: 2004/0158714 (2004-08-01), Peyravian et al.
patent: 2004/0193875 (2004-09-01), Aura
patent: 2004/0225881 (2004-11-01), Walmsley
patent: 2004/0249757 (2004-12-01), Walmsley
patent: 2006/0020796 (2006-01-01), Aura et al.
patent: 2006/0020807 (2006-01-01), Aura et al.
patent: 2006/0077908 (2006-04-01), Park et al.
patent: 1333635 (2003-08-01), None
patent: WO 2006068450 (2006-06-01), None
Aura, T.Cryptographically Generated Addresses(CGA). RFC 3972, Mar. 2005, pp. 1-21.
Housley, R.Using Advanced Encryption Standard(AES)CCM Mode with IPsec Encapsulating Security Payload(ESP). RFC 4309, Dec. 2005, pp. 1-13.
ISPEC.Minutes of IPSEC Working Group Meeting. Proceedings of the 52ndInternet Engineering Task Force, Dec. 9-14, 2001, Salt Lake City, U.S.A. Dec. 12, 2001.
Kaufman, C.Internet Key Exchange(IKEv2)Protocol. RFC 4306, Dec. 2005, pp. 1-93.
Kent, C. and Mogul, J.Fragmentation Considered Harmful. Computer Communication Review, (Association of Computer Machinery), 25(1) 75-87 (Jan. 1995).
Kent, S. and Seo, K.Security Architecture for the Internet Protocol. RFC 4301, Dec. 2005, pp. 1-95.
Kent, S.IP Authentication Header. RFC 4302, Dec. 2005, pp. 1-35.
Kent, S.IP Encapsulating Security Payload(ESP). RFC 4303, Dec. 2005, pp. 1-42.
Laganier, J. and Montenegro, G.Using IKE with IPv6 Crypotgraphically Generated Address. Network Working Group, Internet-Draft, Feb. 24, 2003, pp. 1-14.
Link, B., Hager, T. and Flaks J.RTP Payload Format for AC-3 Audio. RFC 4184, Oct. 2005, pp. 1-13.
Nir, Y.Repeated Authentication in Internet Key Exchange(IKEv2)Protocol. RFC 4478, Apr. 2006, pp. 1-5.
Tanenbaum, Andrew S.Computer Networks, Ch. 4. Prentice-Hall, 1989.
Van De Snepscheut, JLA.The Sliding Window Protocol Revisited. Formal Aspects of Computing vol. 7, 1995, pp. 3-17.
PCT International Search Report in PCT/US06/25342, Feb. 6, 2008.
“Computer Networks”, AS Tannenbaum, Prentice-Hall, 1989.
Anderson, Ross, Stajano, Frank, Lee, Jong-Hyeon, “Security Policies”, 43 pgs.
Aura, Tuomas, Cryptographically Generated Addresses (CGA), Microsoft Research, Roger Needham Bldg, Cambridge CB3 OFB, UK.
Balfanz, Dirk, Smetters, Paul Stewart, Wong, Chi H., “Talking to Strangers: Authentication in Ad-Hoc Wireless Networks”, Xerox Palo Alto Research Center. 13 pgs.
Gehrmann, Christian, Mitchell, Chris J., Nyberg, Kaisa, “Manual Authentication for Wireless Devices”, Jan. 23, 2004, pp. 1-9.
Hinden et al., “IP Version 6 Addressing Architecture,” (Mar. 10, 2000).
Hinden et al., IP version 6 Working Group Minutes, Minneapolia IETF, Mar. 18, 2002 [accessed May 29, 2005 from http://www.ietf.org/proceedings/02mar/minutes/ipv6.htm], 13 pgs.
Intel Technology Journal, “Interoperable Home Infrastructure”, vol. 6, Issue 4, Published Nov. 15, 2002, ISSN 1535-766X, 78 pgs.
Johnson et al., Mobility Support in IPv6, (Apr. 27, 2000).
Kempf et al., “Threat Analysis for IPv6 Public Multi-Access Links”, draft-kempf-ipng-netaccess-threats-00.txt, Nov. 2001, 7 pgs.
Kent, Christopher A., Mogul, Jeffrey C., “Fragmentation Considered Harmful”, Digital Equipment Corporation, Western Research Lab (originally pub. In Proc. SIGCOMM '87, vol. 17, No. 5, Oct. 1987, 13 pgs.
Kent, S. and Atkinson, R. “Security Architecture for the Internet Protocol,” RFC 2401, Nov. 1998, [62 pages].
Koskiande, Timo. “Security in Mobile IPv6,” Apr. 18, 2002, pp. 1-14.
McCune, Jonathan M., Perrig, Adrian, Reiter, Michael K., “Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication”, School of Computer Science, Carnegie Mellon University, Nov. 2004, CMU-CS-04-174, pp. 1-20.
Nikander et al., “Threat Models introduced by Mobile IPv6 and requirements for Security in Mobile IPv6”, draft-team-mobileip-mipv6-sec-reqts-00.txt, Jul. 12, 2001, 28 pgs.
Nikander et al., Binding Authentication Key Establishment Protocol for Mobile IPv6, draft-perkins-bake-01.txt, Jul. 2, 2001, 42 pgs.
Nordmark, “Allocating bit in IID for Mobile IPv6”, Mar. 2002, [accessed May 29, 2005 from http://www.ietf.org/proceedings/02mar/slides/ipv6-13.pdf], 8 pgs.
Nordmark, “Reserving Space in the Interface ID”, from Mar. 2002 [accessed May 29, 2005 from http://www.ietf.org/proceedings/02mar/slides/ipv6-14.pdf], 6 pgs.
O'Shea et al. “Child-Proof Authentication for MOPv6(CAM),” vol. 31, No. 2, ACM SIGCOMM omputer Communications Review, Apr. 2001, 5 pgs.
Thomas, “Binding Updates Security”, draft-thomas-mobileip-bu-sec-00.txt, Nov. 2, 2001, 13 pgs.
Thomson et al., IPv6 Stateless Address Autoconfiguration, RFC 1971 (Aug. 1996) 22 pgs. downloaded from: http://www.ietf.org/rfc1971.txt; on Apr. 11, 2006.
IETF Proceedings, “Security and Mobile IPv6”, Mar. 2001 [acce
Aura Tuomas
Roe Michael
Chai Longbit
Merchant & Gould P.C.
Microsoft Corporation
LandOfFree
Using time to determine a hash extension does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Using time to determine a hash extension, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Using time to determine a hash extension will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4090212