Transporting keys between security protocols

Information security – Policy

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

08046820

ABSTRACT:
A method for providing network security comprising a step of configuring a remote network to engage network security negotiation with a local network. The method includes a step of configuring a first security policy of a security component within the local network to pass through a network security negotiating communication between the local network and the remote network, and a step of establishing a network security negotiation between the remote network and a security parameter generator via the security component. The security parameter generator can be located within the local network and configured to provide secure communication with the remote network.

REFERENCES:
patent: 5237611 (1993-08-01), Rasmussen et al.
patent: 5577209 (1996-11-01), Boyle et al.
patent: 5940591 (1999-08-01), Boyle et al.
patent: 6035405 (2000-03-01), Gage et al.
patent: 6061600 (2000-05-01), Ying
patent: 6173399 (2001-01-01), Gilbrech
patent: 6275859 (2001-08-01), Wesley et al.
patent: 6330562 (2001-12-01), Boden et al.
patent: 6484257 (2002-11-01), Ellis
patent: 6556547 (2003-04-01), Srikanth et al.
patent: 6591150 (2003-07-01), Shirota
patent: 6658114 (2003-12-01), Farn et al.
patent: 6697857 (2004-02-01), Dixon et al.
patent: 6711679 (2004-03-01), Guski et al.
patent: 6823462 (2004-11-01), Cheng et al.
patent: 6915437 (2005-07-01), Swander et al.
patent: 6920559 (2005-07-01), Nessett et al.
patent: 6981139 (2005-12-01), Enokida
patent: 6986061 (2006-01-01), Kunzinger
patent: 7103784 (2006-09-01), Brown et al.
patent: 2002/0154782 (2002-10-01), Chow et al.
patent: 2002/0162026 (2002-10-01), Neuman et al.
patent: 2003/0135753 (2003-07-01), Batra
patent: 2003/0191937 (2003-10-01), Balissat et al.
patent: 2003/0233568 (2003-12-01), Maufer et al.
patent: 2004/0005061 (2004-01-01), Buer et al.
patent: 2004/0044891 (2004-03-01), Hanzlik et al.
patent: 2004/0062399 (2004-04-01), Takase
patent: 2004/0117657 (2004-06-01), Gabor et al.
patent: 2004/0160903 (2004-08-01), Gai et al.
patent: 2004/0225895 (2004-11-01), Mukherjee et al.
patent: 2004/0268124 (2004-12-01), Narayanan
patent: 2005/0010765 (2005-01-01), Swander et al.
patent: 2005/0066159 (2005-03-01), Poussa et al.
patent: 2005/0125684 (2005-06-01), Schmidt
patent: 2005/0138369 (2005-06-01), Lebovitz et al.
patent: 2005/0149732 (2005-07-01), Freeman et al.
patent: 2005/0182958 (2005-08-01), Pham et al.
patent: 2005/0190758 (2005-09-01), Gai et al.
patent: 2005/0213574 (2005-09-01), Yoshimura et al.
patent: 2005/0223111 (2005-10-01), Bhandaru et al.
patent: 2006/0039364 (2006-02-01), Wright
patent: 2006/0072748 (2006-04-01), Buer
patent: 2006/0072762 (2006-04-01), Buer
patent: 2008/0127327 (2008-05-01), Carrasco
Zhang, Yongguang; A Multi-Layer IP Security Protocol for TCP Performance Enhancement in Wireless Networks; IEEE Journal on Selected Areas in Communications; Section III. The Principle of Multi-Layer security Protection; p. 4 http://home.att.net/˜ygz/papers/jsac04.pdf.
Serge-Paul Carrasco; Overlay network for security policies; Network World; Dec. 8, 2006; http://www.networkworld.com
ews/tech/2006/121106techupdate.html?page=1.
Tipton, Harold F. Drause, Micki; Information Security Management Handbook; 6th Edition; vol. 2; 2008; Chapter 14; p. 194; http://books.google.com/books?id=EqpjYH—Z6MQC&printsec=frontcover&source=gbs—v2—summary—r&cad=0#v=onepage&q=&f=false.
IPsec Security Policy IKE Action MIB; Section 7.3; Baer et al; IPSP; Oct. 19, 2006 http://tools.ietf.org/html/draft-ietf-ipsp-ikeaction-mib-02.
White Paper; CipherOptics; A Comparison with IETF's MSec and Cisco's DMVPN; 2006 http://www.infosec.co.uk/ExhibitorLibrary/520/wp-ce—vs—dmvpn—20.pdf.
Frankel, S. “Demystifying the IPsec Puzzle,”Artech House, Ch. 5, pp. 87-127 (2001).
Frankel, S. “Demystifying the IPsec Puzzle,”Artech House, Ch. 9, pp. 179-205 (2001).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Transporting keys between security protocols does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Transporting keys between security protocols, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Transporting keys between security protocols will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4293991

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.