Authentication for Ad Hoc network setup

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Central trusted authority provides computer authentication

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S163000, C380S270000

Reexamination Certificate

active

07571313

ABSTRACT:
A device (110) performs a method200for authentication and Ad Hoc network setup. The device (110) receives (210) a first security configuration; receives (220) a second security configuration based on location; authenticates (230) at least a second node (110) having the first security configuration and the second security configuration; and forms (240) a network with the at least a second node (110).

REFERENCES:
patent: 5887063 (1999-03-01), Varadharajan
patent: 6088450 (2000-07-01), Davis et al.
patent: 6173186 (2001-01-01), Dalley
patent: 6189098 (2001-02-01), Kaliski
patent: 6473078 (2002-10-01), Ikonen et al.
patent: 6532540 (2003-03-01), Kocher
patent: 6624760 (2003-09-01), Kinzel et al.
patent: 6901509 (2005-05-01), Kocher
patent: 6948066 (2005-09-01), Hind et al.
patent: 6968453 (2005-11-01), Doyle et al.
patent: 6981139 (2005-12-01), Enokida
patent: 7051212 (2006-05-01), Ginter et al.
patent: 7068789 (2006-06-01), Huitema et al.
patent: 7092943 (2006-08-01), Roese et al.
patent: 2003/0023849 (2003-01-01), Martin, Jr.
patent: 2003/0050009 (2003-03-01), Kurisko
patent: 2003/0108202 (2003-06-01), Clapper
patent: 2003/0217150 (2003-11-01), Roese et al.
patent: 2003/0217151 (2003-11-01), Roese et al.
patent: 2003/0222819 (2003-12-01), Karr
patent: 2004/0128500 (2004-07-01), Cihula
patent: 2004/0140925 (2004-07-01), Kim
patent: 2004/0199631 (2004-10-01), Natsume et al.
patent: 2005/0036622 (2005-02-01), Hay et al.
patent: 2006/0284732 (2006-12-01), Brock-Fisher
“Stimulating cooperation in self-organizing mobile ad hoc networks”,Levente Buttyán and Jean-Pierre Hubaux ,Oct. 2003, Mobile Networks and Applications, vol. 8 Issue 5,pp. 579-592, Publisher: Kluwer Academic Publishers.
“Authentication: An approach to certificate path discovery in mobile Ad Hoc networks” ,He Huang and Shyhtsun Felix Wu , Oct. 2003, Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks SASN '03,Publisher: ACM Press.
Edith C.H. Ngai and Michael R. Lyu, “Trust-and Clustering-Based Authentication Services in Mobile Ad Hoc Networks”, Department of Computer Science and Engineering, The Chinese University of Hong Kong, Jan. 2004.
Tseng, et al. “On Route Lifetime in Multihop Mobile Ad Hoc Networks”, IEEE Transactions on Mobile Computing, vol. 2, No. 4, Oct.-Dec. 2003.
Korean Notice of Preliminary Rejection - English Translation, Oct. 29, 2008.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Authentication for Ad Hoc network setup does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Authentication for Ad Hoc network setup, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Authentication for Ad Hoc network setup will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4061013

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.