Internet protocol telephony security architecture

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S152000, C713S152000, C713S169000, C713S170000, C380S262000, C380S277000, C380S278000, C380S279000

Reexamination Certificate

active

06892308

ABSTRACT:
A system is provided in which a client/server
etwork can implement a key management session when the server initiates the key management session utilizing a nonce. The nonce allows a wakeup or trigger message to be conveyed to the client such that a service attack on the server can be avoided when a false nonce is received by the server with an AP request message. Thus the server can disregard AP request messages that are not accompanied by a nonce stored by the server. The method can be implemented through circuitry, electrical signals and code to accomplish the acts described in the method.

REFERENCES:
patent: 5261070 (1993-11-01), Ohta
patent: 5434918 (1995-07-01), Kung et al.
patent: 5590199 (1996-12-01), Krajewski, Jr. et al.
patent: 5668876 (1997-09-01), Falk et al.
patent: 5729608 (1998-03-01), Janson et al.
patent: 5778065 (1998-07-01), Hauser et al.
patent: 5812664 (1998-09-01), Bernobich et al.
patent: 5931947 (1999-08-01), Burns et al.
patent: 5974550 (1999-10-01), Maliszewski
patent: 6058480 (2000-05-01), Brown
patent: 6064736 (2000-05-01), Davis et al.
patent: 6065120 (2000-05-01), Laursen et al.
patent: 6148405 (2000-11-01), Liao et al.
patent: 6289451 (2001-09-01), Dice
patent: 6304969 (2001-10-01), Wasserman et al.
patent: 6363365 (2002-03-01), Kou
patent: 6424718 (2002-07-01), Holloway
patent: 6539093 (2003-03-01), Asad et al.
patent: 6601175 (2003-07-01), Arnold et al.
patent: 6775772 (2004-08-01), Binding et al.
patent: 6799270 (2004-09-01), Bull et al.
patent: WO9508885 (1995-03-01), None
patent: WO0195074 (2001-12-01), None
patent: WO0225899 (2002-03-01), None
Agranat, Ian, Authentication standardizes Web, 1998, Electronic Engineering Times, p. 78.*
Kapp, Steve, Securing connected devices, 2002, Embedded Systems Programming, pp. 21, 22, 24, 26, 28, 30, 33.*
Lee et al, A public-key based authenication and key establishment protocol coupled with a client puzzle, 2003, Journal of the American Society for Information Science and Technology, pp. 810-823.*
Takizawa et al, Secure Group Communication Protocol for Distributed Systems, 1993, IEEE, pp. 159-165.*
Roscoe, A.W., Proving security protocols with model checkers by data independence techniques, 1998, IEEE, pp. 84-95.*
Cheng et al, A security architecture for the Internet Protocol, 1998, IBM Systems Journal, pp. 42-60.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Internet protocol telephony security architecture does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Internet protocol telephony security architecture, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Internet protocol telephony security architecture will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3400075

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.