Validity Report
Basic Report
US7233664B2 — Dynamic security authentication for wireless communication networks
Priority Date: 2003-03-13, Publication Date: 2007-06-19, Current Assignee: MOXCHANGE LLCReport Generated: 2022-04-15

Preview Results

Patent Id
Score
Title
Patent Type
Publication Date
Priority Date
Search Efficiency
Original Assignee
Current Assignee
EP1414262A1●●●●●Authentication method for fast handover in a wireless local area networkGRANT2004-04-282002-10-15GreatSamsung Electronics Co LtdSamsung Electronics Co Ltd
US6799270B1●●●●●System and method for secure distribution of digital information to a chain of computer system nodes in a networkGRANT2004-09-281998-10-30GreatCitrix Systems IncCitrix Systems Inc
US20040049676A1●●●●●Methods and protocols for intrusion-tolerant management of collaborative network groupsAPPLICATION2004-03-112001-04-26GreatSRI International IncSRI International Inc, Cisco Systems Inc
US7272381B2●●●●●Mobile authentication system with reduced authentication delayGRANT2007-09-182002-03-04GreatMicrosoft CorpMicrosoft Technology Licensing LLC
US20050152305A1●●●●●Apparatus  method  and medium for self-organizing multi-hop wireless access networksAPPLICATION2005-07-142002-11-25GreatFujitsu LtdFujitsu Ltd
US7409543B1●●●●●Method and apparatus for using a third party authentication serverGRANT2008-08-052000-03-30GreatDigitalPersona IncHID Global Corp
US7107620B2●●●●●Authentication in a packet data networkGRANT2006-09-122000-03-31GreatNokia OyjNokia Technologies Oy
US7046992B2●●●●●Authentication of termination messages in telecommunications systemGRANT2006-05-162001-05-11GreatTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US7370350B1●●●●●Method and apparatus for re-authenticating computing devicesGRANT2008-05-062002-06-27GreatCisco Technology IncCisco Technology Inc
US7193985B1●●●●●System and method for managing foreign agent selections in a mobile internet protocol networkGRANT2007-03-202001-06-14GreatUTStarcom IncCHINOOK LICENSING LLC
US6151679A●●●●●System and method for preventing a first node from being emulated by another nodeGRANT2000-11-211995-09-18GreatFortress Technologies IncBroadband Capital Corp
US5455865A●●●●●Robust packet routing over a distributed network containing malicious failuresGRANT1995-10-031989-05-09GreatDigital Equipment CorpEnterasys Networks Inc
US6275859B1●●●●●Tree-based reliable multicast system where sessions are established by repair nodes that authenticate receiver nodes presenting participation certificates granted by a central authorityGRANT2001-08-141999-10-28GreatSun Microsystems IncOracle America Inc
US20020114469A1●●●●●Method and system for delegation of security procedures to a visited domainAPPLICATION2002-08-222001-02-21GreatNokia OyjNokia Technologies Oy
US20050025091A1●●●●●Methods and apparatus for dynamic session key generation and rekeying in mobile IPAPPLICATION2005-02-032002-11-22GreatCisco Technology IncCisco Technology Inc
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●Great●●●●●●●●●●
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●Great●●●●●●●●●●
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●Great●●●●●●●●●●
Keep up the Momentum with full ranked/tiered results. One-time price.

Predictive Analytics

Composite Research Score (1-10)
7
  MODERATE
Art VolumeLOW
Tech ComplexityINTRICATE
Priority DateEARLY
Tech DiversityAVERAGE
Expert Services Estimate$3,750 — $4,200
There is where a graph would go if the browser supported it.
There is where a graph would go if the browser supported it.

Preview CPC Technology Profile

Possible Classes
1,682
Recommended Classes
421
Government Assigned Classes
5
CPC
Title
Score
H04L9/083involving central third party  e.g. key distribution center [KDC] or trusted third party [TTP]●●●●●
H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner●●●●●
H04L9/321involving a third party or a trusted authority●●●●●
H04L9/0844with user authentication or key authentication  e.g. ElGamal  MTI  MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys●●●●●
H04L63/0442wherein the sending and receiving network entities apply asymmetric encryption  i.e. different keys for encryption and decryption | cryptographic mechanisms or cryptographic arrangements for public-key encryption | (ref: H04L9/30)●●●●●
H04L9/0841involving Diffie-Hellman or related key agreement protocols●●●●●
H04L9/0637Modes of operation  e.g. cipher block chaining [CBC]  electronic codebook [ECB] or Galois/counter mode [GCM]●●●●●
H04L9/3239involving non-keyed hash functions  e.g. modification detection codes [MDCs]  MD5  SHA or RIPEMD●●●●●
H04W12/06Authentication●●●●●
H04L63/08for supporting authentication of entities communicating through a packet data network | cryptographic mechanisms or cryptographic arrangements for entity authentication | (ref: H04L9/32)●●●●●
●●●●●●●●●●●●●●●
●●●●●●●●●●●●●●●
●●●●●●●●●●●●●●●
Keep up the Momentum with full ranked/tiered results. One-time price.
Terms of Service | Privacy Policy | Contact | COPYRIGHT 2020. TECHSON IP, LLC. LIMESTONE, TECHSON, AND INTELLIGENT PROPERTY ARE REGISTERED TRADEMARKS. TECHSON IP IS NOT A LAW FIRM AND DOES NOT PROVIDE LEGAL OPINIONS OR LEGAL ADVICE.