Trusted flow and operation control method

Information security – Access control or authentication

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C709S225000

Reexamination Certificate

active

10219379

ABSTRACT:
The objective of this invention is to ensure that programs that generate and send data packets are well behaved. This invention discloses a method and system that consist of an end station and a network interface, such that, the network interface is capable of determining the authenticity of the program used by the end station to generate and send data packets. The method is based on using a hidden program that was obfuscated within the program that is used to generate and send data packets from the end station. The hidden program is being updated dynamically and it includes the functionality for generating a pseudo random sequence of security signals. Only the network interface knows how the pseudo random sequence of security signals were generated, and therefore, the network interface is able to check the validity of the pseudo random sequence of security signals, and thereby, verify the authenticity of the programs used to generate and send data packets.

REFERENCES:
patent: 5696937 (1997-12-01), White et al.
patent: 6754214 (2004-06-01), Mahalingaiah
patent: 6754702 (2004-06-01), Kennelly et al.
patent: 6769127 (2004-07-01), Bonomi et al.
patent: 6889805 (2005-05-01), Nakayama et al.
patent: 6925085 (2005-08-01), Krishna et al.
patent: 6957199 (2005-10-01), Fisher
patent: 6978367 (2005-12-01), Hind et al.
patent: 6990528 (2006-01-01), Neal et al.
patent: 7020464 (2006-03-01), Bahl et al.
patent: 7042359 (2006-05-01), Clucas
patent: 7048423 (2006-05-01), Stepanenko et al.
Derek Atkins et al., “Internet Security: Professional Reference,” Book & CD-ROM Edition, Feb. 1996, ISBN: 1562055577, New Riders Publishing, Indianapolis, IN, USA.
Andrew S. Tanenbaum, “Computer Networks,” Third Edition, Mar. 1996, ISBN: 0133499456, Prentice Hall PTR, Upper Saddle River, NJ, USA.
Douglas Comer, “Internetworking with TCP/IP: Principles, Protocols, and Architecture,” Apr. 1988 ISBN: 0134701542, Prentice-Hall, Englewood Cliffs, NJ, USA.
W. Richard Stevens, “TCP/IP Illustrated, vol. 1: The Protocols,” Dec. 1993, ISBN: 0201635469, Addison-Wesley, USA.
Elizabeth D. Zwicky et al., “Building Internet Firewalls,” Second Edition, Jan. 15, 2000, ISBN: 01565928717, O'Reily & Associates, USA.
Bruce Schneier, “Applied Cryptography: Protocols, Algorithms, and Source Code in C,” Second Edition, Oct. 18, 1995, ISBN: 0471117099, John Wiley & Sons, New York, NY, USA.
Alfred J. Menezes et al., “Handbook of Applied Cryptography,” Oct. 1996, ISBN: 0849385237, CRC Press, USA.
Christian Collberg et al., “Manufacturing Cheap, Resilient and Stealthy Opaque Constructs,”Principles of Programming Languages(POPL), 1998, pp. 184-196, Association for Computing Machinery (ACM), USA.
Christian Collberg et al., “Watermarking, Tamper-Proofing, and Obfuscation—Tools for Software Protection,”University of Arizona Computer Science Technical ReportFeb. 10, 2000, vol.-issue: 03, University of Arizona, Tucson, AZ, USA.
Christian Collberg et al., “A Taxonomy of Obfuscating Transformations,”Technical Report, 1997, vol.-issue: 148, University of Auckland Department of Computer Science, Auckland, New Zealand.
Enriquillo Valdez et al., “Software DisEngineering: Program Hiding Architecture and Experiments,”Information Hiding 1999, 1999, pp. 379-394, Springer Verlag Lectures in Computer Science, Heidelberg, Germany.
Enriquillo Valdez et al., “DISSECT: DIStribution for SECurity Tool,”ISC2001, 2001, pp. 125-143, Springer Verlag Lectures in Computer Science LNCS2200, Heidelberg, Germany.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Trusted flow and operation control method does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Trusted flow and operation control method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Trusted flow and operation control method will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3908464

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.