发明名称 TUNNELED AUTHENTICATION PROTOCOL FOR PREVENTING MAN-IN-THE-MIDDLE ATTACKS
摘要 Systems and methods for preventing a Man-in-the-Middle attack on a communications network, without combining encryption keys of an inner authentication protocol and a tunneling protocol encapsulating the inner authentication protocol. The performance of a hash function may be split between two network devices on the communications network. For example, in response to a challenge issued by a tunnel server, a client may initiate performance of a hash function using only a first part only of the challenge and generate an intermediate result of the hash function (i.e., a preliminary hash). The client then may transmit the preliminary hash to the tunnel server as part of a response to the challenge. The tunnel server then may complete the hash function using the preliminary hash and the remaining part of the challenge to produce a final hash. The final hash then may be used to authenticate a user.
申请公布号 WO2004051964(A3) 申请公布日期 2004.08.05
申请号 WO2003US38527 申请日期 2003.12.03
申请人 FUNK SOFTWARE, INC. 发明人 FUNK, PAUL
分类号 H04L9/00;H04L9/32;H04L29/06 主分类号 H04L9/00
代理机构 代理人
主权项
地址