Mobility architecture using pre-authentication,...

Multiplex communications – Communication over free space – Having a plurality of contiguous regions served by...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C370S338000, C370S401000, C455S432100, C455S436000, C455S442000

Reexamination Certificate

active

07046647

ABSTRACT:
In some illustrative embodiments, a novel system and method is provided that can, for example, extend concepts of pre-authentication (such as, e.g., IEEE 802.11i pre-authentication) so as to operate across networks or subnetworks (such as, e.g., IP subnets). In preferred embodiments, a novel architecture includes one or both of two new mechanisms that substantially improve, e.g., higher-layer handoff performance. A first mechanism is referred to as “pre-configuration,” which allows a mobile to pre-configure higher-layer information effective in candidate IP subnets to handoff. A second mechanism is referred to as “virtual soft-handoff,” which allows a mobile to send or receive packets through the candidate IP subnets even before it is actually perform a handoff to any of the candidate IP subnets.

REFERENCES:
patent: 6094426 (2000-07-01), Honkasalo et al.
patent: 6832087 (2004-12-01), Gwon et al.
patent: 2002/0098840 (2002-07-01), Hanson et al.
patent: 2002/0118656 (2002-08-01), Agrawal et al.
patent: 2002/0167921 (2002-11-01), Vakil et al.
patent: 2003/0009576 (2003-01-01), Apostolopoulos et al.
patent: 2003/0125027 (2003-07-01), Gwon et al.
patent: 2003/0142647 (2003-07-01), Agrawal et al.
patent: 2003/0193910 (2003-10-01), Shoaib et al.
patent: 2004/0073786 (2004-04-01), O'Neill et al.
patent: 2004/0085931 (2004-05-01), Rezaiifar
patent: 2004/0120328 (2004-06-01), Adrangi et al.
patent: 2004/0208151 (2004-10-01), Haverinen et al
patent: 2004/0240412 (2004-12-01), Winget
patent: 2005/0018637 (2005-01-01), Karoubalis et al.
patent: 2005/0076216 (2005-04-01), Nyberg
patent: 2005/0113109 (2005-05-01), Adrangi et al.
Mun, Y., “Layer 2 Handoff For Mobile-IPv4 With 802.11 . . . ,” Community.roxen.com, Sep. 2003, pp. 1-5.
Malki, K. El et al., “Local Mobility Management And Fast Handoffs In IPv6,” Local Mobility & Fast Handoffs in IPv6, 2001, pp. 1-11.
Malki, K. El et al., “Simultaneous Bindings For Mobile IPv6 Fast Handoffs,” Mobil IP Working Group, Jun. 2002, pp. 1-15.
Hsieh, Robert et al. “A Comparison Of Mechanisms For Improving Mobile IP Handoff Latency For End-To-End TCP,” 2003, pp. 1-13.
Daley, G. et al., “Movement Detection Optimization In Mobile IPv6,” Mobile-IP Working Group, Feb. 2003, pp. 1-15.
Aboba, B., “IEEE 802.1X Pre-Authentication,” Jun. 17, 2002, pp. 1-47.
Aboba, B. “PPP EAP TLS Authentication Protocol,” Network Group, Oct. 1999, pp. 1-22.
Blunk, L. et al. “Extensible Authentication Protocol (EAP),” EAP Working Group, Sep. 2003, pp. 1-42.
Droms, R. et al., “RFC 3118—Authentication For DHCP Messages,” Network Working Group, Jun. 2001, pp. 1-12.
Droms, R., “RFC 2131—Dynamic Host Configuration Protocol,” Network Working Group, Mar. 1997, pp. 1-33.
Funk, P., “EAP Tunneled TLS Authentication Protocol,”PPPEXT Working Group, Nov. 2002, pp. 1-37.
Funk, P., “EAP Tunneled TLS Authentication Protocol,”PPPEXT Working Group, Aug. 2003, pp. 1-38.
Forsberg, D. et al., “Protocol For Carrying Authentication For Network Access,” PANA Working Group, Oct. 24, 2003, pp. 1-63.
Glenn, R. et al., “RFC 2410—The Null Encryption Algorithm And Its Use With Ipsec,” Network Working Group, Nov. 1998, pp. 1-5.
Harkins, D. et al., “RFC 2409—The Internet Key Exchange,” Network Working Group, Nov. 1998, pp. 1-30.
Congdon, P., “IEEE 802.1X Overview—Port Based Network Access Control,” Hewlett Packard, Mar. 2000, pp. 1-11.
Loughney, J. et al., “Context Transfer Protocol,” Seamoby Working Group, Oct. 25, 2003, pp. 1-23.
Kent, S. et al., “RFC 2402—IP Authentication Header,” Network Working Group, Nov. 1998, pp. 1-17.
Kent, S et al. “RFC 2406—IP Encapsulating Security Payload,” Network Working Group, Nov. 1998, pp. 1-17.
Kivinen, T., “DHCP Over Ike,” IP Security Protocol Working Group, Apr. 2, 2003, pp. 1-13.
Liebsch, M. et al., “Candidate Access Router Discovery,” IETF Seamoby Working Group, Sep. 2003, pp. 1-41.
Liebsch, M. et al., “Candidate Access Router Discovery,” IETF Seamoby Working Group, Nov. 2003, pp. 1-28.
Palekar, A. et al., “Protected EAP Protocol Version 2,” PPPEXT Working Group, Oct. 26, 2003, pp. 1-68.
Patel, B. et al., “RFC 3456—Dynamic Host Configuration Protocol (DHCPv4) Configuration of Ipsec Tunnel Mode,” Network Working Group, Jan. 2003, pp. 1-13.
Puthenkulam, J. et al., “The Compound Authentication Binding Problem,” EAP Working Group, Oct. 27, 2003, pp. 1-33.
Sheffer, Y. et al., “PIC, A Pre-Ike Credential Provisioning Protocol,” IPSRA Working Group, Oct. 9, 2002, pp. 1-29.
Droms, R. et al., “RFC 3118—Authentication for DHCP Massages,” Network Working Group, Jun. 2001, pp. 1-12.
Kaufman, C., “Internet Key Exchange (IKEv2) Protocol,” Internet-Draft, Oct. 9, 2003, pp. 1-94.
Tschofenig, H. et al., “EAP IKEv2Method,” Internet-draft, Community.roxen.com, Oct. 2003, pp. 1-10.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Mobility architecture using pre-authentication,... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Mobility architecture using pre-authentication,..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Mobility architecture using pre-authentication,... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3532160

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.