Systems and methods for authenticating communications in a network medium
First Claim
1. A method for securing communications between at least two devices, comprising:
- connecting a location-limited physical token channel to a first one of the at least two devices;
storing at least pre-authentication information of the first device to the location-limited physical token channel;
providing the location-limited physical token channel to a next one of the at least two devices, the next device acting as a current device;
connecting the location-limited physical token channel to the current device;
storing at least pre-authentication information of the current device to the location-limited physical token channel;
copying at least the pre-authentication information of the first device from the location-limited physical token channel to the current device;
repeating, for each other device of the at least two devices as the current device, the providing, current device connecting, current device storing and current device copying steps;
reconnecting the location-limited physical token channel to the first device;
copying at least the pre-authentication information of each other device of the at least two devices from the location-limited physical token channel to the first device; and
establishing, for each other device of the at least two devices, secure communications between the first device and that device based on at least the pre-authentication information of the first device and that device exchanged between the first device and that device using the location-limited physical token channel.
1 Assignment
0 Petitions
Accused Products
Abstract
A location-limited channel is implemented using physical exchanges of physical tokens. The physical tokens are implemented using writeable or re-writeable storage media. Location-limited channels, when used to implement pre-authentication protocols, provide demonstrative identification and authenticity. A group originator loads pre-authentication information and a network location from a communication device onto the location-limited physical token channel. The location-limited physical token channel is passed to another participant, who copies the originator'"'"'s pre-authentication information and location onto that participant'"'"'s communication device. That participant then adds that participant'"'"'s own pre-authentication information and network location onto the location-limited physical token channel. This is repeated until the last participant passes the location-limited physical token channel back to the group originator. The originator thus has pre-authentication information and network locations for all other participants. The originator establishes secure communications with each participant based on the originator'"'"' and that participant'"'"'s shared information.
-
Citations
58 Claims
-
1. A method for securing communications between at least two devices, comprising:
-
connecting a location-limited physical token channel to a first one of the at least two devices;
storing at least pre-authentication information of the first device to the location-limited physical token channel;
providing the location-limited physical token channel to a next one of the at least two devices, the next device acting as a current device;
connecting the location-limited physical token channel to the current device;
storing at least pre-authentication information of the current device to the location-limited physical token channel;
copying at least the pre-authentication information of the first device from the location-limited physical token channel to the current device;
repeating, for each other device of the at least two devices as the current device, the providing, current device connecting, current device storing and current device copying steps;
reconnecting the location-limited physical token channel to the first device;
copying at least the pre-authentication information of each other device of the at least two devices from the location-limited physical token channel to the first device; and
establishing, for each other device of the at least two devices, secure communications between the first device and that device based on at least the pre-authentication information of the first device and that device exchanged between the first device and that device using the location-limited physical token channel. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A method for supplying pre-authentication information from a first party to a second party, comprising:
-
connecting a location-limited physical token channel to a device of the first party that contains the pre-authentication information;
storing at least pre-authentication information of the first party contained in the device to the location-limited physical token channel; and
providing the location-limited physical token channel at least indirectly to the second party.
-
-
31. A method for supplying pre-authentication information from a first party to a second party, comprising:
-
receiving, at least indirectly from the first party, a location-limited physical token channel that contains the pre-authentication information of the first party;
connecting the location-limited physical token channel to a device of the second party;
copying at least the pre-authentication information of the first party from the location-limited physical token channel to the device of the second party.
-
-
32. A storage medium storing a set of program instructions executable on a data processing device and usable to secure communications between at least two devices, the set of program instructions comprising:
-
instructions for storing at least pre-authentication information of the first device to a location-limited physical token channel connected to the first device;
instructions for storing at least pre-authentication information of another device to the location-limited physical token channel;
instructions for copying at least the pre-authentication information of at least the first device from the location-limited physical token channel to another device;
instructions for copying at least the pre-authentication information of each other device of the at least two devices from the location-limited physical token channel to the first device; and
instructions for establishing, for each other device of the at least two devices, secure communications between the first device and that device based on at least the pre-authentication information of the first device and that device exchanged between the first device and that device using the location-limited physical token channel. - View Dependent Claims (33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56)
-
-
57. A storage medium of a first device storing a set of program instructions executable on a data processing device and usable to secure communications between the first device and at least one other device, the set of program instructions comprising:
-
instructions for storing at least pre-authentication information of the first device to a location-limited physical token channel connected to the first device;
instructions for copying at least pre-authentication information of each of the at least one other device from the location-limited physical token channel to the first device; and
instructions for establishing, for each of the at least one other device, secure communications between the first device and that device based on at least the pre-authentication information of the first device and of that device exchanged between the first device and that device using the location-limited physical token channel.
-
-
58. A storage medium of a second device storing a set of program instructions executable on a data processing device and usable to secure communications between a first device and at least the second device using a location-limited physical token channel containing at least pre-authentication information of the first device, the set of program instructions comprising:
-
instructions for storing at least pre-authentication information of the second device to the location-limited physical token channel;
instructions for copying at least the pre-authentication information of at least the first device from the location-limited physical token channel to the second device; and
instructions for copying at least the pre-authentication information of any other device of at least the second device that is contained in the location-limited physical token channel from the location-limited physical token channel to the second device.
-
Specification