Processing

Please wait...

Settings

Settings

Goto Application

1. WO2002021280 - ADAPTIVE METHOD FOR AMORTIZING AUTHENTICATION OVERHEAD

Publication Number WO/2002/021280
Publication Date 14.03.2002
International Application No. PCT/US2001/028090
International Filing Date 06.09.2001
Chapter 2 Demand Filed 06.03.2002
IPC
G06F 21/00 2006.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
H04L 12/24 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
12Data switching networks
02Details
24Arrangements for maintenance or administration
H04L 29/06 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02Communication control; Communication processing
06characterised by a protocol
CPC
G06F 21/31
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
30Authentication, i.e. establishing the identity or authorisation of security principals
31User authentication
H04L 41/00
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
41Arrangements for maintenance or administration or management of packet switching networks
H04L 63/08
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
08for supporting authentication of entities communicating through a packet data network
H04L 63/123
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
12Applying verification of the received information
123received data contents, e.g. message integrity
H04L 63/18
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
18using different networks or paths for security, e.g. using out of band channels
Applicants
  • XANBOO, INC. [US]/[US] (AllExceptUS)
  • CHEN, Jack [US]/[US] (UsOnly)
  • REZVANI, Babak [US]/[US] (UsOnly)
Inventors
  • CHEN, Jack
  • REZVANI, Babak
Agents
  • DE ROSA, Kenneth, R.
Priority Data
09/698,76427.10.2000US
60/230,30106.09.2000US
60/230,31906.09.2000US
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) ADAPTIVE METHOD FOR AMORTIZING AUTHENTICATION OVERHEAD
(FR) PROCEDE ADAPTATIF POUR AMORTIR LE TRAFIC DE DONNEES D'AUTHENTIFICATION
Abstract
(EN)
A method is disclosed for amortizing the authentication overhead of data transmissions. The method comprises establishing a first secure transmission of data between a transmitter and a receiver by transmitting at least one token to the receiver during the first secure transmission. The method also comprises establishing at least one additional transmission of data between the sender and the receiver and transmitting the data and at least one token during the at least one additional transmission. In addition, the method compares the at least one token transmitted during the at least one additional transmission to the token transmitted during the first secure transmission to guarantee the authenticity of that at least one additional transmission. The method may also include transmitting a preselected number of tokens during the first secure transmission. The at least one additional transmission may be conducted over an unsecure connection using open communication.
(FR)
L invention concerne un procédé pour amortir le trafic de données nécessaire à l'authentification. Ce procédé comprend l'établissement d'une première transmission de données sécurisée entre un transmetteur et un récepteur par l'envoi d'au moins un jeton au destinataire pendant la première transmission sécurisée. Ledit procédé comprend également l'établissement d'au moins une transmission de données additionnelle entre l'émetteur et le récepteur, ainsi que la transmission des données et d'au moins un jeton pendant ladite transmission additionnelle. En outre, le procédé compare le jeton transmis durant la transmission additionnelle avec le jeton transmis au cours de la première transmission sécurisée, afin de garantir l'authenticité de cette transmission additionnelle. Le procédé peut également inclure la transmission d'un nombre présélectionné de jetons durant la première transmission sécurisée. La transmission additionnelle peut être réalisée par l'intermédiaire d'une connexion non sécurisée via une communication ouverte.
Also published as
Latest bibliographic data on file with the International Bureau