Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Having particular address related cryptography
Reexamination Certificate
2007-07-17
2007-07-17
Barron, Jr., Gilberto (Department: 2132)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Having particular address related cryptography
C713S160000, C713S190000
Reexamination Certificate
active
10284739
ABSTRACT:
In a network, a router uses some secret information combined with a cryptographic process in determination of a subnet's routing prefix. Several methods are disclosed, including using an IP suffix for prefix generation and for decryption, maintaining a pool of pseudo prefixes at the router, using public key encryption and symmetric key encryption,
REFERENCES:
patent: 5673263 (1997-09-01), Basso et al.
patent: 5732350 (1998-03-01), Marko et al.
patent: 6055236 (2000-04-01), Nessett et al.
patent: 6161180 (2000-12-01), Matyas et al.
patent: 6226751 (2001-05-01), Arrow et al.
patent: 6266707 (2001-07-01), Boden et al.
patent: 6317236 (2001-11-01), Saunders
patent: 6463533 (2002-10-01), Calamera et al.
patent: 6591291 (2003-07-01), Gabber et al.
patent: 6717949 (2004-04-01), Boden et al.
patent: 6826684 (2004-11-01), Fink et al.
patent: 6952769 (2005-10-01), Dubey et al.
patent: 1063811 (2000-12-01), None
Reiter et al. “Crowds: anonymity for Web Transactions” Nov. 1998; ACM Transactions on Information and System Security vol. 1, Issue 1; pp. 66-92.
Goldberg, Ian Avrum; “A Pseudonymous Communications Infrastructure for the Internet”; Fall 2000; dissertation, University of Callifornia at Berkeley, pp. 1-138.
Peterson et al.; Computer Networks, 2nd edition; 1996; Morgan Kaufmann; Chapter 4.
Cuellar, J., Morris, Jr., John B., Mulligan, D., “Geopriv Requirements,” Nov. 2002, pp. 1-24, available online at <http://www.ietf.org/internet-drafts/draft-ietf-geopriv-reqs-01.txt>.
Goldschlag, David M., Reed, Michael G., Syverson, Paul F., “Hiding Routing Information,” Information Hiding, R. Anderson (editor), Springer-Verlag LLNCS 1174, May 1996, pp. 137-150, available online at <http://www.onion-router.net/Publications/IH-1996.pdf>.
Goldschlag, David M., Reed, Michael G., Syverson, Paul F., “Onion Routing for Anonymous and Private Internet Connections,” Communications of the ACM, vol. 42, No. 2, Feb. 1999, pp. 1-5, available online at <http://www.onion-router.net/Publications/CACM-1999.pdf>.
Goldschlag, David M., Reed, Michael G., Syverson, Paul F., “Privacy on the Internet,” INET '97, Kuala Lumpur, Malaysia, Jun. 1997, pp. 1-10, available online at <http://www.onion-router.net/Publications/INET-1997.html>.
Jain, Ravi, “Phone Number Portability for PCS Systems with ATM Backbones Using Distributed Dynamic Hashing,” IEEE Journal on Selected Areas in Communications, vol. 15, No. 1, Jan. 1997, pp. 96-105.
Reed, Michael G., Syverson, Paul F., Goldschlag, David M., “Anonymous Connections and Onion Routing,” IEEE Journal on Selected Areas in Communication Special Issue on Copyright and Privacy Protection, 1998, pp. 1-15, available online at <http://www.onion-router.net/Publications/JSAC-1998.pdf>.
Reed, Michael G., Syverson, Paul F., “Onion Routing,” Proceeding of AIPA '99, Mar. 1999, p. 1, available online at <http://www.onion-router.net/Publications/AIPA-1999.pdf>.
Reed, Michael G., Syverson, Paul F., Goldschlag, David M., “Protocols using Anonymous Connections: Mobile Applications”, Security Protocols, 5thInternational Workshop Proceedings, B. Christianson, B. Crispo, M. Lomas, and M. Roe (editors), Springer-Verlag LLNCS 1361, 1998, pp. 13-23, available online at <http://www.onion-router.net/Publications/WSP-1997.pdf>.
Reed, Michael G., Syverson, Paul F., Goldschlag, David M., “Proxies for Anonymous Routing” Proceedings of the 12thAnnual Computer Security Applications Conference, IEEE CS Press, San Diego, CA, Dec. 1996, pp. 95-104, available online at <http://www.onion-router.net/Publications/ACSAC-1996.pdf>.
Soliman, Hesham, Castelluccia, Claude, El-Malki, Karim, Bellier, Ludovic, “Hierarchical Mobile IPv6 Mobility Management (HMIPv6),” IEFT Mobile IP Working Group, Internet-Draft, Oct. 2002, pp. 1-29, available online at <http://www.iesg.org/internet-drafts/draft-ietf-mobileip-hmipv6-07.txt>.
Syverson, Paul F., Goldschlag, David M., Reed, Michael G., “Anonymous Connections and Onion Routing,” Proceedings of the 18thAnnual Symposium on Security and Privacy, IEEE CS Press, Oakland, CA, May 1997, pp. 44-54, available online at <http://www.onion-router.net/Publications/SSP-1997.pdf>.
Syverson, Paul F., Reed, Michael G., Goldschlag, David M., “Onion Routing Access Configurations,” DISCEX 2000: Proceedings of the DARPA Information Survivability Conference and Exposition, vol. 1 Hilton Head, SC, IEEE CS Press, Jan. 2000, pp. 34-40, available online at <http://www.onion-router.net/Publications/DISCEX-2000.pdf>.
Syverson, Paul F., Reed, Michael G., Goldschlag, David M., “Private Web Browsing,” Journal of Computer Security Special Issue on Web Security, vol. 5, No. 3, 1997, pp. 237-248, available online at <http://www.onion-router.net/Publications/JCS-1997.pdf>.
Syverson, Paul F., Tsudik, Gene, Reed, Michael, Landwehr, Carl, “Towards an Analysis of Onion Routing Security,” Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, Jul. 2000, pp. 1-14, available online at <http://www.onion-router.net/Publications/WDIAU-2000.pdf>.
searchNetworking.com release titled, “address—a searchNetworking definition,” printed from the Internet web site at <http://searchnetworking.techtarget.com/sDefinition/0,,sid7—gci211528,00.html>, on Oct. 22, 2002, 2 pages.
searchNetworking.com release titled, “packet—a searchNetworking definition,” printed from the Internet web site at <http://searchnetworking.techtarget.com/sDefinition/0,,sid7—gci212736,00.html>, on Oct. 22, 2002, 2 pages.
searchNetworking.com release titled, “router—s searchNetworking definition,” printed from the Internet web site at <http://searchnetworking.techtarget.com/sDefinition/0,,sid7—gci212924,00.html>, on Oct. 22, 2002, 2 pages.
searchNetworking.com release titled, “IP network design, part 3: IP addressing and routing,” by Long, Cormac, dated Apr. 26, 2001, printed from the Internet web site at <http://searchnetworking.techtarget.com/originalContent/0,289142,sid7—gci803101,00.html>, on Oct. 22, 2002, 6 pages.
searchNetworking.com release titled, “host—a search WebServices definition”, printed from the Internet web site at <http://searchwebservices.techtarget.com/sDefinition/0,,sid26—gci212254,000.html>, on Oct. 22, 2002, 3 pages.
Kent et al., “Security Architecture for the Internet Protocol”, The Internet Society, Nov. 1998, pp. 1-60.
Peterson et al., “Computer Networks: A Systems Approach”, Morgan Kaufmann Publishers, Oct. 1, 1999, 2ndEd., pp. 68-168 and 248-366.
Stallings, W., “Cryptograpy and Network Security,” Prentice Hall, Inc., 1999, 2ndEd., pp. 21-47, 163-199, 237-269, 299-319.
Schneier, B., “Applied Cryptography” John Wiley & Sons, Inc. 1996, 2ndEd., pp. 169-187.
Gentry Craig B.
Jain Ravi
Kawahara Toshiro
Kempf James
Tariq Muhammad Mukarram Bin
Barron Jr. Gilberto
Kim Jung
MacPherson Kwok & Chen & Heid LLP
NTT DoCoMo Inc.
Shenker Michael
LandOfFree
Location privacy through IP address space scrambling does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Location privacy through IP address space scrambling, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Location privacy through IP address space scrambling will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3783382