Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Reexamination Certificate
2005-03-10
2010-06-22
Kim, Jung (Department: 2432)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
C713S168000, C713S171000, C709S227000
Reexamination Certificate
active
07743245
ABSTRACT:
“Honest” is a nice word. Sadly, some people in this world are not honest. In an increasingly wired world, dishonest people have found myriad opportunities to illicitly acquire one's confidential data, to monitor or interfere with one's networking activities, e.g., to monitor what you are doing, downloading, accessing, etc., to eavesdrop on or hijack telephony control and voice data or other protocols on your network, etc. To address such risks, typically a secured communication protocol, e.g., TLS or SSL, is utilized to protect communication. Unfortunately, TLS, SSL, and many other security environments require the underlying communication protocol to be TCP/IP, while some protocols needing communication protection, such as VoIP, RTP, SNMP, etc. only operate on UDP and not TCP/IP. Thus, a network shim or other embodiments disclosed herein may be used to allow such UDP based application programs and protocols to use security environments requiring a TCP/IP type transport.
REFERENCES:
patent: 5491800 (1996-02-01), Goldsmith et al.
patent: 6141698 (2000-10-01), Krishnan et al.
patent: 6959441 (2005-10-01), Moore
patent: 7353380 (2008-04-01), VanHeyningen
patent: 7360075 (2008-04-01), VanHeyningen et al.
patent: 2003/0081783 (2003-05-01), Adusumilli et al.
International Search Report and Written Opinion from PCT/US2006/008710, mailed Jul. 27, 2006, 12 pgs.
Rescorla, E., et al., “Datagram Transport Layer Security; draft-rescorla-dtls-05.txt,” IETF Standard-Working-Draft, Internet Engineering Task Force, IETF, CH, No. 5, Jun. 2004, XP015040212, 26 pgs.
Modadugu, Nagendra, et al., “The Design and Implementation of Datagram TLS,” Network and Distributed System Security Symposium (NDSS) Proceedings, Online, Feb. 6, 2004, XP002390018, 13 pgs.
Teong, Chua Seng, et al., “3G Compliant WAP Based System for Medical Data Access,” TENCON 2004, 2004 IEEE Region 10 Conference Chiang Mai, Thailand Nov. 21-24, 2004, Piscataway, NJ, USA, IEEE, Nov. 21, 2004, XP010797909, pp. 227-230.
Intel Corporation
Kim Jung
Schwabe Williamson & Wyatt P.C.
LandOfFree
Security protocols on incompatible transports does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Security protocols on incompatible transports, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security protocols on incompatible transports will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4249481