Mobile-ad-hoc network including node authentication features...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S153000, C713S156000, C713S170000, C713S171000

Reexamination Certificate

active

07581095

ABSTRACT:
A mobile ad-hoc network may include a first node having a first public key and a first private key associated therewith for generating an authentication request. The network may also include a second node having a second public key and a second private key associated therewith for receiving the authentication request and returning a certificate of authenticity including the second public key to the first node. Upon verifying that the second public key belongs to the second node, the first node may send challenge data to the second node, and the second node may encrypt the challenge data using the second private key and return the encrypted challenge data back to the first node. The first node may thus decrypt the encrypted challenge data using the verified second public key and authenticate the second node if the decryption of the encrypted challenge data yields the original challenge data.

REFERENCES:
patent: 5371794 (1994-12-01), Diffie et al.
patent: 5402490 (1995-03-01), Mihm, Jr.
patent: 5412654 (1995-05-01), Perkins
patent: 5515441 (1996-05-01), Faucher
patent: 5539824 (1996-07-01), Bjorklund et al.
patent: 5923756 (1999-07-01), Shambroom
patent: 5974550 (1999-10-01), Maliszewski
patent: 6092200 (2000-07-01), Muniyappa et al.
patent: 6246771 (2001-06-01), Stanton et al.
patent: 6292896 (2001-09-01), Guski et al.
patent: 6304556 (2001-10-01), Haas
patent: 6405313 (2002-06-01), Reiter et al.
patent: 6430690 (2002-08-01), Vanstone et al.
patent: 6546425 (2003-04-01), Hanson et al.
patent: 6574730 (2003-06-01), Bissell et al.
patent: 7096359 (2006-08-01), Agrawal et al.
patent: 7281057 (2007-10-01), Cain
Schneier, Bruce; Applied Cryptography; 1996; John Wiley & Sons, Inc.; Second Edition; pp. 47-75, 169-187.
Stallings, William; Cryptography and Network Security; 1999; Prentice-Hall, Inc.; Second Edition; pp. 131-159, 173-182, 323-353, 299-319.
Nguyen, Dan; Zhao, Li; Uisawang, Pra-ornsiri; Platt, John; Security Routing Analysis for Mobile Ad Hoc Networks; Spring 2000; Department of Interdisciplinary Telecommunications, University of Colorado at Boulder.
Zhou, Lidong; Haas, Zygmunt J.; Securing Ad Hoc Networks; IEEE Network Magazine, vol. 13, No. 6; Nov./Dec. 1999.
Stallings, William; Cryptography and Network Security; Jun. 4, 1998; Prentice Hall, Inc.; 2ndEdition; pp. 163-206.
Nguyen et al.,Security Routing Analysis for Mobile Ad Hoc Networks,Department of Interdisciplinary Telecommunications, University Of Colorado at Boulder, Spring 2000.
Zhou et al.,Securing Ad Hoc Networks,IEEE Network Magazine, vol. 13, No. 6, Nov./Dec. 1999.
Tyson,How Encryption Works,Howstuffworks, Inc., available at www.howstuffworks.com.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Mobile-ad-hoc network including node authentication features... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Mobile-ad-hoc network including node authentication features..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Mobile-ad-hoc network including node authentication features... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4056519

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.