Information security – Policy
Reexamination Certificate
2006-09-29
2011-10-25
Tran, Ellen (Department: 2433)
Information security
Policy
Reexamination Certificate
active
08046820
ABSTRACT:
A method for providing network security comprising a step of configuring a remote network to engage network security negotiation with a local network. The method includes a step of configuring a first security policy of a security component within the local network to pass through a network security negotiating communication between the local network and the remote network, and a step of establishing a network security negotiation between the remote network and a security parameter generator via the security component. The security parameter generator can be located within the local network and configured to provide secure communication with the remote network.
REFERENCES:
patent: 5237611 (1993-08-01), Rasmussen et al.
patent: 5577209 (1996-11-01), Boyle et al.
patent: 5940591 (1999-08-01), Boyle et al.
patent: 6035405 (2000-03-01), Gage et al.
patent: 6061600 (2000-05-01), Ying
patent: 6173399 (2001-01-01), Gilbrech
patent: 6275859 (2001-08-01), Wesley et al.
patent: 6330562 (2001-12-01), Boden et al.
patent: 6484257 (2002-11-01), Ellis
patent: 6556547 (2003-04-01), Srikanth et al.
patent: 6591150 (2003-07-01), Shirota
patent: 6658114 (2003-12-01), Farn et al.
patent: 6697857 (2004-02-01), Dixon et al.
patent: 6711679 (2004-03-01), Guski et al.
patent: 6823462 (2004-11-01), Cheng et al.
patent: 6915437 (2005-07-01), Swander et al.
patent: 6920559 (2005-07-01), Nessett et al.
patent: 6981139 (2005-12-01), Enokida
patent: 6986061 (2006-01-01), Kunzinger
patent: 7103784 (2006-09-01), Brown et al.
patent: 2002/0154782 (2002-10-01), Chow et al.
patent: 2002/0162026 (2002-10-01), Neuman et al.
patent: 2003/0135753 (2003-07-01), Batra
patent: 2003/0191937 (2003-10-01), Balissat et al.
patent: 2003/0233568 (2003-12-01), Maufer et al.
patent: 2004/0005061 (2004-01-01), Buer et al.
patent: 2004/0044891 (2004-03-01), Hanzlik et al.
patent: 2004/0062399 (2004-04-01), Takase
patent: 2004/0117657 (2004-06-01), Gabor et al.
patent: 2004/0160903 (2004-08-01), Gai et al.
patent: 2004/0225895 (2004-11-01), Mukherjee et al.
patent: 2004/0268124 (2004-12-01), Narayanan
patent: 2005/0010765 (2005-01-01), Swander et al.
patent: 2005/0066159 (2005-03-01), Poussa et al.
patent: 2005/0125684 (2005-06-01), Schmidt
patent: 2005/0138369 (2005-06-01), Lebovitz et al.
patent: 2005/0149732 (2005-07-01), Freeman et al.
patent: 2005/0182958 (2005-08-01), Pham et al.
patent: 2005/0190758 (2005-09-01), Gai et al.
patent: 2005/0213574 (2005-09-01), Yoshimura et al.
patent: 2005/0223111 (2005-10-01), Bhandaru et al.
patent: 2006/0039364 (2006-02-01), Wright
patent: 2006/0072748 (2006-04-01), Buer
patent: 2006/0072762 (2006-04-01), Buer
patent: 2008/0127327 (2008-05-01), Carrasco
Zhang, Yongguang; A Multi-Layer IP Security Protocol for TCP Performance Enhancement in Wireless Networks; IEEE Journal on Selected Areas in Communications; Section III. The Principle of Multi-Layer security Protection; p. 4 http://home.att.net/˜ygz/papers/jsac04.pdf.
Serge-Paul Carrasco; Overlay network for security policies; Network World; Dec. 8, 2006; http://www.networkworld.com
ews/tech/2006/121106techupdate.html?page=1.
Tipton, Harold F. Drause, Micki; Information Security Management Handbook; 6th Edition; vol. 2; 2008; Chapter 14; p. 194; http://books.google.com/books?id=EqpjYH—Z6MQC&printsec=frontcover&source=gbs—v2—summary—r&cad=0#v=onepage&q=&f=false.
IPsec Security Policy IKE Action MIB; Section 7.3; Baer et al; IPSP; Oct. 19, 2006 http://tools.ietf.org/html/draft-ietf-ipsp-ikeaction-mib-02.
White Paper; CipherOptics; A Comparison with IETF's MSec and Cisco's DMVPN; 2006 http://www.infosec.co.uk/ExhibitorLibrary/520/wp-ce—vs—dmvpn—20.pdf.
Frankel, S. “Demystifying the IPsec Puzzle,”Artech House, Ch. 5, pp. 87-127 (2001).
Frankel, S. “Demystifying the IPsec Puzzle,”Artech House, Ch. 9, pp. 179-205 (2001).
Certes Networks, Inc.
Hamilton Brook Smith & Reynolds P.C.
Tran Ellen
LandOfFree
Transporting keys between security protocols does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Transporting keys between security protocols, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Transporting keys between security protocols will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4293991