Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Systems and methods for authenticating communications in a network medium

a network medium and communication authentication technology, applied in the field of systems and methods for authenticating communications in a network medium, can solve the problems of immense public key infrastructure, inability to provide information to others, and high cos

Inactive Publication Date: 2003-08-07
CISCO TECH INC
View PDF25 Cites 203 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, users typically desire that such information received not be available to others.
However, several problems are associated with this approach.
This is typically very expensive.
Further, an immense public key infrastructure may not be practical.
In addition, Bluetooth has been subject to security breaches.
Wired Equivalent Privacy (WEP), the link-layer security protocol for ANSI / IEEE 802.11, also has usability issues.
WEP too has been subject to security breaches.
However, among the many problems associated with this approach is that the radio frequencies in which the wireless devices operate penetrate the conference room walls.
However, the properties of the wireless network prevents them from doing so.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Systems and methods for authenticating communications in a network medium
  • Systems and methods for authenticating communications in a network medium
  • Systems and methods for authenticating communications in a network medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In various exemplary embodiments of systems and methods according to this invention, pre-authenticating a number of wireless devices is used to securely authenticate arbitrary peer-to-peer ad-hoc interactions. This may also include a bootstrap to a key exchange protocol that is used to set up an encrypted channel. In one exemplary embodiment, a public key is committed to on the pre-authentication channel. A key exchange protocol using public key cryptography is used in the main wireless link to establish secure communications. Due to pre-authenticating the wireless devices using public keys, the types of media usable as location-limited channels do not need to be immune to eavesdropping and can include, for example, audio and / or infra-red channels. In various embodiments, pre-authenticating the wireless devices using public keys allows a range of public-key-base key exchange protocols which can authenticate wireless devices to be used. As a result, a large range of location-l...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Pre-authentication information of devices is used to securely authenticate arbitrary peer-to-peer ad-hoc interactions. In one embodiment, public key cryptography is used in the main wireless link with location-limited channels being initially used to pre-authenticate devices. Use of public keys in the pre-authenticate data allows for the broadening of types of media suitable for use as location-limited channels to include, for example, audio and infrared. Also, it allows a range of key exchange protocols which can be authenticated in this manner to include most public-key-protocols. As a result, a large range of devices, protocols can be used in various applications. Further, an eavesdropper is forced to mount an active attack on the location-limited channel itself in order to access an ad-hoc exchange. However, this results in the discovery of the eavesdropper.

Description

[0001] 1. Field of Invention[0002] This invention relates to systems and methods for authenticating a communication between at least two devices that is transmitted using a network medium.[0003] 2. Background of the Related Art[0004] Developments in network communications have enabled users to receive information, such as documents, over the network medium. The network medium includes wired networks and wireless networks. Information transmitted over the network medium may be accessible to others. However, users typically desire that such information received not be available to others.[0005] FIG. 1 illustrates an example where a user 110 is in a public place that is accessible to others. The user 110 wants to print a sensitive document that the user 110 just received on the user's wireless device 112. As shown in FIG. 1, the user 110 may have access to a number of printers 122, 124, 126 or 128 with wireless capabilities by various companies, some of which may be familiar to the use...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F21/31G06F21/44G09C1/00H04L9/08H04L9/32H04L12/28H04L12/56H04L29/06H04L29/08H04W12/06
CPCH04L63/0492G06F2221/2111H04L63/18H04W12/06H04W84/18H04L67/34H04L69/16H04L69/162H04L69/168H04L69/329G06F21/43G06F21/445H04L9/0844H04L2209/805H04L63/065H04W12/50H04W12/062
Inventor BALFANZ, DIRKLOPES, CRISTINASMETTERS, DIANASTEWART, PAULWONG, HAO-CHI
Owner CISCO TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products