Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Reexamination Certificate
2005-12-13
2005-12-13
Jung, David (Department: 2134)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
C713S168000, C713S175000, C713S153000
Reexamination Certificate
active
06976177
ABSTRACT:
A secure communication method for allowing a mobile host to communicate with a correspondent host over a Virtual Private Network. The method comprises negotiating one or more Security Associations between the mobile host and a correspondent host of a Virtual Private Network. Subsequently, a communication is initiated between the mobile host and a Security Gateway and an authentication certificate sent to the Security Gateway, the certificate containing at least the identity of a Security Association which will be used for subsequent communication between the mobile host and the correspondent host. Data packets can then be sent from the mobile host to the correspondent host using the identified Security Association, via the Security Gateway. However, the data packets are forwarded by the Security Gateway to the correspondent host only if they are authenticated by the Security Gateway.
REFERENCES:
patent: 5940591 (1999-08-01), Boyle et al.
patent: 6330562 (2001-12-01), Boden et al.
Zao et al., “A public-key based secure Mobile IP”, J.C. Baltzer AG, Sceince Publishers, pp. 373-390.
Reavis, Jim, “Is VPN the killer application for PKI?”, Sep. 22, 1999, Network World Fusion.
Zao et al., A public-key based secure mobile IP, Wireless Networks, vol. 5, Issue 5 (Oct. 1999) pp.: 373-390 Year of Publication: 1999.
Dynamic network-based secure VPN deployment in GPRS Xenakis, C.; Merakos, L.; Personal, Indoor and Mobile Radio Communications, 2002. The 13th IEEE International Symposium on vol. 3, Sep. 15-18, 2002, Page(s).:1260-1265 vol.3.
An agent-based shopping system Benedicenti, L.; Xuguang Chen; Xiaoran Cao; Paranjape, R.; Electrical and Computer Engineering, 2004. Canadian Conference on vol. 2, May 2-5, 2004 Page(s):703-705, vol. 2.
Simple mobility support for IPsec tunnel mode Byoung-Jo, K.; Srinivasan, S.; Vehicular Technology Conference, 2003. VTC 2003-Fall. 2003 IEEE 58th vol. 3, Oct. 6-9, 2003 Page(s):1999-2003 vol. 3 Digital Object Identifier 10.1109/VETECF.2003.1285375.
Jacobs, S., et al., “Security of Current Mobile IP Solutions”, Proceedings of the Military Communications Conference, Nov. 3, 1997, pp. 1122-1128, XP 000792591.
Inoue, A., et al., “IP Layer Security and Mobility Support Design Policy and an Implementation”, Proceedings of the ISS'97 International Switching Symposium, Toronto, Canada, Sep. 21-23, 1997, pp. 571-577, XP000720565.
Zao, J., et al., “A Public-Key Based Secure Mobile IP”, Proceedings of the Mobicom'97 Third Annual ACM/IEEE International Conference on Mobile Computing and Networking, Budapest, Hungary, pp. 26-30, Sep. 1997, XP 000764777.
Burleigh Roger
Jung David
Telefonaktiebolaget LM Ericsson (publ)
LandOfFree
Virtual private networks does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Virtual private networks, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Virtual private networks will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3501246