Mobility architecture using pre-authentication,...

Multiplex communications – Communication over free space – Having a plurality of contiguous regions served by...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C370S338000, C370S401000, C455S436000

Reexamination Certificate

active

07548526

ABSTRACT:
In some illustrative embodiments, a novel system and method is provided that can, for example, extend concepts of pre-authentication (such as, e.g., IEEE 802.11i pre-authentication) so as to operate across networks or subnetworks (such as, e.g., IP subnets). In preferred embodiments, a novel architecture includes one or both of two new mechanisms that substantially improve, e.g., higher-layer handoff performance. A first mechanism is referred to as “pre-configuration,” which allows a mobile to pre-configure higher-layer information effective in candidate IP subnets to handoff. A second mechanism is referred to as “virtual soft-handoff,” which allows a mobile to send or receive packets through the candidate IP subnets even before it is actually perform a handoff to any of the candidate IP subnets.

REFERENCES:
patent: 6094426 (2000-07-01), Honkasalo et al.
patent: 6832087 (2004-12-01), Gwon et al.
patent: 7046647 (2006-05-01), Oba et al.
patent: 2002/0098840 (2002-07-01), Hanson et al.
patent: 2002/0118656 (2002-08-01), Agrawal et al.
patent: 2002/0167921 (2002-11-01), Vakil et al.
patent: 2003/0009576 (2003-01-01), Apostolopoulos et al.
patent: 2003/0125027 (2003-07-01), Gwon et al.
patent: 2003/0142647 (2003-07-01), Agrawal et al.
patent: 2003/0193910 (2003-10-01), Shoaib et al.
patent: 2004/0073786 (2004-04-01), O'Neill et al.
patent: 2004/0085931 (2004-05-01), Rezaiifar
patent: 2004/0120328 (2004-06-01), Adrangi et al.
patent: 2004/0208144 (2004-10-01), Vinayakray-Jani
patent: 2004/0208151 (2004-10-01), Haverinen et al.
patent: 2004/0240412 (2004-12-01), Winget
patent: 2005/0018637 (2005-01-01), Karoubalis et al.
patent: 2005/0076216 (2005-04-01), Nyberg
patent: 2005/0105491 (2005-05-01), Chaskar et al.
patent: 2005/0113109 (2005-05-01), Adrangi et al.
patent: 2005/0147068 (2005-07-01), Rajkotia
patent: 2005/0157673 (2005-07-01), Verma et al.
Mun, Y., “Layer 2 Handoff for Mobile-IPv4 With 802.11 . . . ,” Community.roxen.com, Sep. 2003, pp. 1-5.
Malki, K. El et al., “Local Mobility Management And Fast Handoffs In IPv6,” Local Mobility & Fast Handoffs in IPv6, 2001, pp. 1-11.
Malki, K. El et al., “Simultaneous Bindings For Mobile IPv6 Fast Handoffs,”Mobil IP Working Group, Jun. 2002, pp. 1-15.
Hsieh, Robert et al. “A Comparison Of Mechanisms For Improving Mobile IP Handoff Latency For End-To-End TCP,” 2003, pp. 1-13.
Daley, G. et al., “Movement Detection Optimization In Mobile IPv6,” Mobile-IP Working Group, Feb. 2003, pp. 1-15.
Aboba, B., “IEEE 802.1X Pre-Authentication,” Jun. 17, 2002, pp. 1-47.
Aboba, B. “PPP EAP TLS Authentication Protocol,” Network Working Group, Oct. 1999, pp. 1-22.
Blunk, L. et al. “Extensible Authentication Protocol (EAP),” EAP Working Group, Sep. 2003, pp. 1-42.
Droms, R. et al., “RFC 3118—Authentication For DHCP Messages,” Network Working Group, Jun. 2001, pp. 1-12.
Droms, R., “RFC 2131—Dynamic Host Configuration Protocol,” Network Working Group, Mar. 1997, pp. 1-33.
Funk, P., “EAP Tunneled TLS Authentication Protocol,”PPPEXT Working Group, Nov. 2002, pp. 1-37.
Funk, P., “EAP Tunneled TLS Authentication Protocol,”PPPEXT Working Group, Aug. 2003, pp. 1-38.
Forsberg, D. et al., “Protocol For Carrying Authentication For Network Access,” PANA Working Group, Oct. 24, 2003, pp. 1-63.
Glenn, R. et al., “RFC 2410—The Null Encryption Algorithm And Its Use With Ipsec,” Network Working Group, Nov. 1998, pp. 1-5.
Harkins, D. et al., “RFC 2409—The Internet Key Exchange,” Network Working Group, Nov. 1998, pp. 1-30.
Congdon, P., “IEEE 802.1X Overview—Port Based Network Access Control,” Hewlett Packard, Mar. 2000, pp. 1-11.
Loughney, J. et al., “Context Transfer Protocol,”Seamoby Working Group, Oct. 25, 2003, pp. 1-23.
Kent, S. et al., “RFC 2402—IP Authentication Header,” Network Working Group, Nov. 1998, pp. 1-17.
Kent, S et al. “RFC 2406—IP Encapsulating Security Payload,” Network Working Group, Nov. 1998, pp. 1-17.
Kivinen, T., “DHCP Over Ike,” IP Security Protocol Working Group, Apr. 2, 2003, pp. 1-13.
Liebsch, M. et al., “Candidate Access Router Discovery,” IETF Seamoby Working Group, Sep. 2003, pp. 1-41.
Liebsch, M. et al., “Candidate Access Router Discovery,” IETF Seamoby Working Group, Nov. 2003, pp. 1-28.
Palekar, A. et al., “Protected EAP Protocol Version 2,” PPPEXT Working Group, Oct. 26, 2003, pp. 1-68.
Patel, B. et al., “RFC 3456—Dynamic Host Configuration Protocol (DHCPv4) Configuration of Ipsec Tunnel Mode,” Network Working Group, Jan. 2003, pp. 1-13.
Puthenkulam, J. et al., “The Compound Authentication Binding Problem,” EAP Working Group, Oct. 27, 2003, pp. 1-33.
Sheffer, Y. et al., “PIC, A Pre-Ike Credential Provisioning Protocol,” IPSRA Working Group, Oct. 9, 2002, pp. 1-29.
Droms, R. et al., “RFC 3118—Authentication for DHCP Massages,” Network Working Group, Jun. 2001, pp. 1-12.
Kaufman, C., “Internet Key Exchange (IKEv2) Protocol,” Internet-Draft, Oct. 9, 2003, pp. 1-94.
Tschofenig, H. et al., “EAP IKEv2Method,” Internet-draft, Community.roxen.com, Oct. 2003, pp. 1-10.
B. Aboba, “IEEE 802.1X Pre-Authentication”, IEEE 802.11 Wireless LANs, Jun. 2002, p. 1-50, Microsoft, USA.
B. Aboba, “PPP EAP TLS Authentication Protocol”, Network Working Group, Oct. 1999, p. 1-23, Microsoft, USA.
R. Droms, “Authentication for DHCP Messages”, Network Working Group, Jun. 2001, p. 1-16, USA.
P. Funk, “EAP Tunneled TLS Authentication Protocol (EAP-TTLS)”, Internet-Draft, PPPEXT Working Group, Nov. 2002, p. 1-42, USA.
R. Glenn, “The Null Encryption Algorithm and Its Use With IPsec,” Network Working Group, Nov. 1998, p. 1-6, USA.
“Port-Based Network Access Control”, IEEE Standard for Local and Metropolitan Area Networks, Dec. 2004, p. 1-179, IEEE Std 802.1X-2004, USA.
“Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications,” IEEE Standard for Local and Metropolitan Area Networks, 1999, Institute of Electrical and Electronics Engineers, Inc., p. 1-90, USA.
J. Loughney, “Context Transfer Protocol,” Internet-Draft, Jun. 2003, p. 1-19, Seamoby WG, USA.
J. Loughney, “Context Transfer Protocol,” Internet-Draft, Oct. 2003, p. 1-19, Seamoby WG, USA.
S. Kent, “IP Authentication Header,” Network Working Group, Nov. 1998, p. 1-21, USA.
S. Kent, “IP Encapsulating Security Payload (ESP),” Network Working Group, Nov. 1998, p. 1-23, USA.
T. Kivinen, “DHCP over IKE”, Internet-Draft, Apr. 2003, p. 1-14, IP Security Protocol Working Group, USA.
M. Liebsch, “Candidate Access Router Discovery”, Internet-Draft, Mar. 2003, p. 1-28, IETF Seamoby Working Group, USA.
M. Liebsch, “Candidate Access Router Discovery”, Internet-Draft, Sep. 2003, p. 1-28, IETF Seamoby Working Group, USA.
B. Patel, “Dynamic Host Configuration Protocol (DHCPv4) Configuration of IPsec Tunnel Mode”, Jan. 2003, p. 1-17, USA.
J. Puthenkulam, Internet-Draft, Mar. 2003, p. 1-36, EAP Working Group, USA.
Y. Sheffer, “PIC, A Pre-IKE Credential Provisioning Protocol”, Internet-Draft, Oct. 2002, p. 1-30, IPSRA Working Group, USA.
H. Tschofenig, “Bootstrapping RFC3118 Delayed Authentication using PANA”, Internet-Draft, Jun. 2003, p. 1-19, IETF PANA Working Group, USA.
D. Foresberg, “Protocol for Carrying Authentication for Network Access (PANA)”, Internet-Draft, Mar. 2003, p. 1-36, PANA Working Group, USA.
C. Kaufman, “Internet Key Exchange (IKEv2) Protocol”, Internet-Draft, Apr. 2003, p. 1-94, IPSEC Working Group, USA.
B. Aboba, Extensible Authenti

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Mobility architecture using pre-authentication,... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Mobility architecture using pre-authentication,..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Mobility architecture using pre-authentication,... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4124418

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.