Mesh networks with exclusion capability

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S003000

Reexamination Certificate

active

07665126

ABSTRACT:
In an exemplary method implementation, a method includes: designating a neighborhood administrator; receiving notification of a delinquent router from the designated neighborhood administrator; and excluding the delinquent router responsive to the notification. In an exemplary mesh router implementation, a mesh router is capable of establishing a wireless mesh network with other mesh routers, the mesh router is further capable of designating a neighborhood administrator mesh router; and the mesh router is adapted to exclude another mesh router that is associated with a particular certificate when the particular certificate has been identified as delinquent by the designated neighborhood administrator. mesh router.

REFERENCES:
patent: 5220604 (1993-06-01), Gasser et al.
patent: 5434863 (1995-07-01), Onishi et al.
patent: 5548728 (1996-08-01), Danknick
patent: 5580177 (1996-12-01), Gase et al.
patent: 5613096 (1997-03-01), Danknick
patent: 6389532 (2002-05-01), Gupta et al.
patent: 6397260 (2002-05-01), Wils et al.
patent: 6397329 (2002-05-01), Aiello et al.
patent: 6425004 (2002-07-01), Hardjono
patent: 6788648 (2004-09-01), Peterson
patent: 6853988 (2005-02-01), Dickinson et al.
patent: 6879574 (2005-04-01), Naghian et al.
patent: 6917985 (2005-07-01), Madruga et al.
patent: 7047409 (2006-05-01), Aull et al.
patent: 7096359 (2006-08-01), Agrawal et al.
patent: 7181614 (2007-02-01), Gehrmann et al.
patent: 7286489 (2007-10-01), Ades
patent: 7308574 (2007-12-01), Dare et al.
patent: 7317914 (2008-01-01), Adya et al.
patent: 7382762 (2008-06-01), Chmora et al.
patent: 2002/0053020 (2002-05-01), Teijido et al.
patent: 2002/0124169 (2002-09-01), Agrawal et al.
patent: 2002/0162018 (2002-10-01), Gunter et al.
patent: 2003/0149874 (2003-08-01), Balfanz et al.
patent: 2003/0235175 (2003-12-01), Naghian et al.
patent: 2004/0015689 (2004-01-01), Billhartz
patent: 2004/0103275 (2004-05-01), Ji et al.
patent: 2004/0139022 (2004-07-01), Singer et al.
patent: 2004/0190468 (2004-09-01), Saijonmaa
patent: 2005/0027778 (2005-02-01), Dimitrelis et al.
patent: 2005/0191990 (2005-09-01), Willey et al.
Kaya et al. Secure Group Management: Secure multicast groups on Ad Hoc networks. Proceedings of the 1st ACM workshop on Security of Ad Hoc and Sensor Networks. ACM Press. Oct. 2003. pp. 1-10.
Crepeau, Claude, and Davis, Carlton R. Authentication: A certificate revocation scheme for wireless ad hoc networks. Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks. ACM Press. Oct. 2003. pp. 1-8.
Candolin, C., Kari, H.H. A security architecture for wireless ad hoc networks. MILCOM 2002 Proceedings vol. 2, Oct. 7-10, 2002 pp. 1095-1100 vol. 2.
Chu et al. A secure multicast protocol with copyright protection. ACM SIGCOMM Computer Communication Review. vol. 32 Issue 2. Apr. 2002 pp. 1-19.
Self-securing ad hoc wireless networks; Haiyun Luo Zerfos, P. Jiejun Kong Songwu Lu Lixia Zhang Jul. 1-4, 2002; pp. 567-574.
Garefalakis, T. et al., “Securing Personal Area Networks,” 13th IEEE Int'l. Symposium on Personal Indoor and Mobile Radio Communications, Sep. 15-18, 2002, Pavilhao Altantico, Lisboa, Portugal, vol. 3, pp. 1257-1259.
Kaprynski, M. et al., “Signalling-Efficient Signature Based PKI Authentication Method for Wireless Communication Systems,” 5th European Personal Mobile Communications Conference 2003 (IEEE Conf. Publ. 492), Apr. 22-25, 2003, Glasgow, UK, pp. 501-505.
Yi, Seung et al., “Key Management for Heterogeneous Ad Hoc Wireless Networks,” Proceedings 10th IEEE Int'l. Conference en Network Protocols, Nov. 12-15, 2002, Paris, France, pp. 202-203.
Munoz, Jose L. et al., “Certificate Revocation Policies for Wireless Communications,” Proceedings of the IASTED Int'l. Conference Communication Systems are Networks, Sep. 9-12, 2002, Malaga, Spain, pp. 427-432.
Trask, N.T. et al., “Adapting Public Key Infrastructures to the Mobile Environment,” Internet and Wireless Security, 2002, UK, ISBN: 0 85296 197 9, pp. 163-170.
Singh, Arun K., “Deployment of Public-Key Infrastructure in Wireless Data Networks,” Networking—ICN 2001, First Int'l. Conference on Networking, Proceedings, Part II, Jul. 9-13, 2001, pp. 217-224.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Mesh networks with exclusion capability does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Mesh networks with exclusion capability, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Mesh networks with exclusion capability will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4197600

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.