Information security – Access control or authentication
Reexamination Certificate
2007-09-18
2011-10-11
Zand, Kambiz (Department: 2434)
Information security
Access control or authentication
C380S227000, C380S046000
Reexamination Certificate
active
08037510
ABSTRACT:
Techniques to overlay ciphersuite negotiation on top of the mesh link establishment protocol without sacrificing security. Two cryptographic primitives may be utilized: (1) a message integrity code, which is denoted as mK, where K is an authentication key (mKmay be utilized to detect forged messages); and (2) a cryptographic random number generator, which will be denoted as rng. The techniques may use rng to produce values that cannot be predicted by any polynomial time algorithm.
REFERENCES:
patent: 7489645 (2009-02-01), Simon et al.
patent: 2007/0121947 (2007-05-01), Sood et al.
patent: 2007/0162751 (2007-07-01), Braskich et al.
patent: 2007/0189249 (2007-08-01), Gurevich et al.
patent: 2008/0065884 (2008-03-01), Emeott et al.
patent: 2008/0065888 (2008-03-01), Zheng et al.
Maughan, et al., “Internet Security Association and Key Management Protocol (ISAKMP)”, draft-ietf-ipsecisakmp-07.txt.ps, Feb. 21, 1997, 77 pgs.
PCT Search Report for PCT/US2007/078808 mailed Mar. 14, 2008, 10 pgs.
Notice of Preliminary Rejection for Korean Patent Application No. 10-2009-7004379 mailed Jun. 17, 2010, 10 pgs.
Walker Jesse
Zhao Meiyuan
Blakely , Sokoloff, Taylor & Zafman LLP
Intel Corporation
Kaplan Benjamin
Zand Kambiz
LandOfFree
Techniques for negotiation of security policies in wireless... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Techniques for negotiation of security policies in wireless..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Techniques for negotiation of security policies in wireless... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4281066