Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Having particular address related cryptography
Reexamination Certificate
2005-02-01
2005-02-01
Peeso, Thomas R. (Department: 2132)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Having particular address related cryptography
C713S168000, C713S152000, C713S152000
Reexamination Certificate
active
06851050
ABSTRACT:
The present invention provides methods, systems, and computer program instructions for providing location-independent packet routing and secure access in a wireless networking environment (such as that encountered within a building), enabling client devices to travel seamlessly within the environment. Each client device uses a constant address. An address translation process that is transparent to the client and server is automatically performed as the device roams through the environment, enabling efficient client migration from one supporting access point to another. The secure access techniques provide user-centric authentication and allow policy-driven packet filtering, while taking advantage of encryption capabilities that are built in to the hardware at each endpoint.
REFERENCES:
patent: WO 01 06734 (2001-01-01), None
patent: WO 01 28185 (2001-04-01), None
Aziz, A. et al, “Privacy and Authentication for Wireless Local Area Networks: A Secure Communications Protocol to Prevent Unauthorized Access”, IEEE Personal Communications, IEEE Communications Society, US, vol. 1, No. 1, 1994, pp. 25-31, XP000460718, ISSN: 1070-9916.
Bharghavan, V., “Secure Wireless LANs”, 2nd ACM Conference on Computer and Communications Security, Nov. 2, 1994, pp. 10-17, XP002155490.
Hung-Yu, Lin et al., “Authentication in Wireless Communications”, Global Telecommunications Conference, 1993, including a Communications Theory Mini-Conference. Technical Program Conference Record, IEEE in Houston.
GlobeCom '93., IEEE Houston, TX, USA, Nov. 29-Dec. 2, 1993, New York, NY, USA, IEEE, Nov. 29, 1993, pp. 550-554, XP010109722, ISBN: 0-7803-0917-0.
Haartsen, J., “Bluetooth: Vision, Goals, and Architecture”, Mobile Computing and Communications Review, ACM, New York, NY, US, vol. 2, No. 4, Oct. 1, 1998, pp. 38-45, XP000784002.
Snoeren et al, “And End-to-End Approach to Host Mobility”, 6th ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom '00), Aug. 2000, Boston, MA.
“3Com Introduces Industry's First Layer 3 Wireless LAN Security Solution”, published at http://www.3com.com
ews/releases/pr00/jul0500a.html, Jul. 5, 2000, Santa Clara, CA.
Jue, J P et al. “Design and analysis of replicated servers to support IP-host mobility in enterprise networks”, Communications, 1997. ICC '97 Montreal, Que., Canada Jun. 8-12, 1997, New York, NY, USA, IEEE, US, Jun. 8, 1997, pp. 1256-1260, XP010226957 ISBN: 0-7803-3925-8.
Gopal Ajei Sarat
Singhal Sandeep Kishan
Doubet Marcia L.
Peeso Thomas R.
ReefEdge, Inc.
LandOfFree
Providing secure network access for short-range wireless... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Providing secure network access for short-range wireless..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Providing secure network access for short-range wireless... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3466527