Cryptography – Communication system using cryptography – Wireless communication
Reexamination Certificate
2004-11-30
2010-06-08
Zand, Kambiz (Department: 2434)
Cryptography
Communication system using cryptography
Wireless communication
C380S270000, C380S278000, C713S168000
Reexamination Certificate
active
07734051
ABSTRACT:
Methods and systems are provided for trusted key distribution. A key distribution or an identity service acts as an intermediary between participants to a secure network. The service provisions and manages the distribution of keys. The keys are used for encrypting communications occurring within the secure network.
REFERENCES:
patent: 5513245 (1996-04-01), Mizikovsky et al.
patent: 5794139 (1998-08-01), Mizikovsky et al.
patent: 6453159 (2002-09-01), Lewis
patent: 6611913 (2003-08-01), Carroll et al.
patent: 6728529 (2004-04-01), Kuo et al.
patent: 7269653 (2007-09-01), Mentze et al.
patent: 7353533 (2008-04-01), Wright et al.
patent: 2003/0084287 (2003-05-01), Wang et al.
patent: 2003/0095663 (2003-05-01), Nelson et al.
patent: 2003/0219129 (2003-11-01), Whelan et al.
patent: 2004/0196977 (2004-10-01), Johnson et al.
patent: 2005/0125669 (2005-06-01), Stewart et al.
patent: 2006/0193297 (2006-08-01), Zhang et al.
patent: 1337087 (2005-09-01), None
Wi-Fi Protected Access: Strong, standards-based, interoperable security for today's Wi-Fi networks © 2003 Wi-Fi Alliance. Apr. 29, 2003 Wi-Fi Protected Access White Paper http://www.wi-fi.org/files/wp—8—WPA%20Security—4-29-03.pdf.
RSA Laboratories' Frequently Asked Questions About Today's Cryptography, Version 4.1 Copyright © 1992-2000 RSA Security Inc. All rights reserved. p. 127 What is the life cycle of a key?
Excerpt Network Intrusion Detection, Third Edition by Stephen Northcutt; Judy Novak Pub Date: Aug. 27, 2002.
“Application No. 05108881.3 Extended European Search Report”, (Aug. 21, 2007),7 pgs.
“Mobile IP Dynamic Security Association and Key Distribution”,Cisco IOS Release 12.3(4)T, (2003),1-14.
Camtepe, Seyit A., “Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks”, 1-18, Apr. 12, 2004.
Mishura, Arunesh, “Pro-active Key Distribution using Neighbor Graphs”, 1-7, (2004).
Salgarelli, Luca, “Efficient Authentication and Key Distribution in Wireless IP Networks”, 1-12, (2003).
Salgarelli, Luca, “Efficient Authentication and Key Distribution in Wireless IP Networks”,The Evolution of Wireless LANs and PANs, IEEE Wireless Communications, (Dec. 2003),52-61.
Wacker, Arno, “A Fault-tolerant Key-Distribution Scheme for Securing Wireless Ad-hoc Networks”,Institute for Paralellel and Distributed Systems, (2004).
Wacker, Arno, “A Key—Distribution Scheme for Wireless Home Automation Networks”,Institute for Parallel and Distributed Systems(IPVS), (2004).
Carter Stephen R.
McClain Carolyn B.
Kaplan Benjamin A
Novell Inc.
Schwegman Lundberg & Woessner, P.A.
Zand Kambiz
LandOfFree
Key distribution does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Key distribution, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Key distribution will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4192694