Information security – Access control or authentication – Network
Reexamination Certificate
2003-12-17
2010-02-16
Zand, Kambiz (Department: 2439)
Information security
Access control or authentication
Network
C726S003000
Reexamination Certificate
active
07665126
ABSTRACT:
In an exemplary method implementation, a method includes: designating a neighborhood administrator; receiving notification of a delinquent router from the designated neighborhood administrator; and excluding the delinquent router responsive to the notification. In an exemplary mesh router implementation, a mesh router is capable of establishing a wireless mesh network with other mesh routers, the mesh router is further capable of designating a neighborhood administrator mesh router; and the mesh router is adapted to exclude another mesh router that is associated with a particular certificate when the particular certificate has been identified as delinquent by the designated neighborhood administrator. mesh router.
REFERENCES:
patent: 5220604 (1993-06-01), Gasser et al.
patent: 5434863 (1995-07-01), Onishi et al.
patent: 5548728 (1996-08-01), Danknick
patent: 5580177 (1996-12-01), Gase et al.
patent: 5613096 (1997-03-01), Danknick
patent: 6389532 (2002-05-01), Gupta et al.
patent: 6397260 (2002-05-01), Wils et al.
patent: 6397329 (2002-05-01), Aiello et al.
patent: 6425004 (2002-07-01), Hardjono
patent: 6788648 (2004-09-01), Peterson
patent: 6853988 (2005-02-01), Dickinson et al.
patent: 6879574 (2005-04-01), Naghian et al.
patent: 6917985 (2005-07-01), Madruga et al.
patent: 7047409 (2006-05-01), Aull et al.
patent: 7096359 (2006-08-01), Agrawal et al.
patent: 7181614 (2007-02-01), Gehrmann et al.
patent: 7286489 (2007-10-01), Ades
patent: 7308574 (2007-12-01), Dare et al.
patent: 7317914 (2008-01-01), Adya et al.
patent: 7382762 (2008-06-01), Chmora et al.
patent: 2002/0053020 (2002-05-01), Teijido et al.
patent: 2002/0124169 (2002-09-01), Agrawal et al.
patent: 2002/0162018 (2002-10-01), Gunter et al.
patent: 2003/0149874 (2003-08-01), Balfanz et al.
patent: 2003/0235175 (2003-12-01), Naghian et al.
patent: 2004/0015689 (2004-01-01), Billhartz
patent: 2004/0103275 (2004-05-01), Ji et al.
patent: 2004/0139022 (2004-07-01), Singer et al.
patent: 2004/0190468 (2004-09-01), Saijonmaa
patent: 2005/0027778 (2005-02-01), Dimitrelis et al.
patent: 2005/0191990 (2005-09-01), Willey et al.
Kaya et al. Secure Group Management: Secure multicast groups on Ad Hoc networks. Proceedings of the 1st ACM workshop on Security of Ad Hoc and Sensor Networks. ACM Press. Oct. 2003. pp. 1-10.
Crepeau, Claude, and Davis, Carlton R. Authentication: A certificate revocation scheme for wireless ad hoc networks. Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks. ACM Press. Oct. 2003. pp. 1-8.
Candolin, C., Kari, H.H. A security architecture for wireless ad hoc networks. MILCOM 2002 Proceedings vol. 2, Oct. 7-10, 2002 pp. 1095-1100 vol. 2.
Chu et al. A secure multicast protocol with copyright protection. ACM SIGCOMM Computer Communication Review. vol. 32 Issue 2. Apr. 2002 pp. 1-19.
Self-securing ad hoc wireless networks; Haiyun Luo Zerfos, P. Jiejun Kong Songwu Lu Lixia Zhang Jul. 1-4, 2002; pp. 567-574.
Garefalakis, T. et al., “Securing Personal Area Networks,” 13th IEEE Int'l. Symposium on Personal Indoor and Mobile Radio Communications, Sep. 15-18, 2002, Pavilhao Altantico, Lisboa, Portugal, vol. 3, pp. 1257-1259.
Kaprynski, M. et al., “Signalling-Efficient Signature Based PKI Authentication Method for Wireless Communication Systems,” 5th European Personal Mobile Communications Conference 2003 (IEEE Conf. Publ. 492), Apr. 22-25, 2003, Glasgow, UK, pp. 501-505.
Yi, Seung et al., “Key Management for Heterogeneous Ad Hoc Wireless Networks,” Proceedings 10th IEEE Int'l. Conference en Network Protocols, Nov. 12-15, 2002, Paris, France, pp. 202-203.
Munoz, Jose L. et al., “Certificate Revocation Policies for Wireless Communications,” Proceedings of the IASTED Int'l. Conference Communication Systems are Networks, Sep. 9-12, 2002, Malaga, Spain, pp. 427-432.
Trask, N.T. et al., “Adapting Public Key Infrastructures to the Mobile Environment,” Internet and Wireless Security, 2002, UK, ISBN: 0 85296 197 9, pp. 163-170.
Singh, Arun K., “Deployment of Public-Key Infrastructure in Wireless Data Networks,” Networking—ICN 2001, First Int'l. Conference on Networking, Proceedings, Part II, Jul. 9-13, 2001, pp. 217-224.
Bahl Paramvir
Simon Daniel R.
Wang Helen Jiahe
Lee & Hayes PLLC
Microsoft Corporation
Turchen James
Zand Kambiz
LandOfFree
Mesh networks with exclusion capability does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Mesh networks with exclusion capability, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Mesh networks with exclusion capability will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4197600