Cryptographic countermeasures against connection depletion attacks
First Claim
Patent Images
1. A method for allocating a resource, comprising the steps of:
- (a) receiving a resource allocation request from a client;
(b) imposing on said client a computational task and a time limit for correct completion of said computational task;
(c) receiving verification that said client has correctly performed said computational task within said time limit; and
(d) allocating said resource for said client if the verification is received;
wherein said step (b) comprises communicating a puzzle as at least a portion of said communication task.
13 Assignments
0 Petitions
Accused Products
Abstract
This invention relates to cryptographic communications methods and systems that protect a server from a connection depletion attack. Specifically, the invention presents a method for allocating a resource comprising the steps of receiving a resource allocation request from a client, imposing a computational task and a time limit for correct completion of the task upon the client, verifying that the task was performed correctly within the time limit, and allocating the resource if the task was correctly performed within the time limit.
319 Citations
55 Claims
-
1. A method for allocating a resource, comprising the steps of:
-
(a) receiving a resource allocation request from a client; (b) imposing on said client a computational task and a time limit for correct completion of said computational task; (c) receiving verification that said client has correctly performed said computational task within said time limit; and (d) allocating said resource for said client if the verification is received; wherein said step (b) comprises communicating a puzzle as at least a portion of said communication task. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for procuring a resource comprising the steps of:
-
(a) communicating a resource allocation request to a server; (b) receiving a computational task from said server; (c) performing or delegating the performance of said computational task correctly within a known time limit; and (d) communicating to said server a verification that said computational task has been performed correctly within the known time limit; wherein said step (b) comprises receiving said computational task and a time limit for performance of said computational task from said server. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
-
25. An apparatus for allocating a resource comprising:
-
a first receiver receiving a resource allocation request from a client; a computational task generator for imposing a computational task upon said client for correct performance within a time limit; and a transmitter communicating said computational task to said client; a second receiver receiving a verification from said client that said computational task was correctly performed with said time limit; and
an allocator allocating said resource for said client;wherein said computational task comprises a puzzle. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43)
-
-
44. An apparatus for procuring a resource comprising:
-
a first transmitter communicating a resource allocation request to a server; a first receiver receiving a computational task from said server; a computational task solver correctly performing said computational task within a known time limit; and a second transmitter communicating to said server a verification that said computational task has been performed; further comprising a second receiver receiving a time limit for performing said computational task. - View Dependent Claims (45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55)
-
Specification