Endpoint identification and security
First Claim
Patent Images
1. A data structure comprising:
- an address field that comprises one or more endpoint addresses for an entity;
a security field that comprises one or more keys for facilitating secure communications with the entity at least one of the one or more endpoint addresses; and
wherein the contents of the address field and the security field are serialized in the data structure and wherein the data structure is extensible such that new address fields and security fields may be added.
3 Assignments
0 Petitions
Accused Products
Abstract
A data structure with endpoint address and security information. The data structure includes an address field that includes one or more endpoint addresses for an entity. The data structure further includes a security field that includes one or more keys for facilitating secure communications with the entity. The data structure may also be such that the contents of the address field and the security field are serialized in the data structure. The data structure may be extensible such that new address fields and security fields may be added.
27 Citations
47 Claims
-
1. A data structure comprising:
-
an address field that comprises one or more endpoint addresses for an entity;
a security field that comprises one or more keys for facilitating secure communications with the entity at least one of the one or more endpoint addresses; and
wherein the contents of the address field and the security field are serialized in the data structure and wherein the data structure is extensible such that new address fields and security fields may be added. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A data structure comprising:
-
an identity field that identifies an entity;
an address field that comprises one or more endpoint addresses for the entity; and
wherein the contents of the identity field and the address field are serialized in the data structure and wherein the data structure is extensible such that new identity fields and new address fields may be added. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31)
-
-
32. A method of creating a reference data structure, the method comprising acts of:
-
creating an address field that comprises one or more endpoints addresses for an entity;
creating a security field that comprises one or more keys for facilitating secure communications with the entity at least one of the one or more endpoint addresses; and
serializing data in the address field and the security field to create a serialized extensible data structure. - View Dependent Claims (33, 34, 35, 36, 37)
-
-
38. A method of creating a reference data structure, the method comprising acts of:
-
creating an identity field that comprises data identifying an entity;
creating an address field that comprises one or more endpoints addresses for the entity; and
serializing data in the identity field and the address field to create a serialized extensible data structure. - View Dependent Claims (39, 40, 41, 42)
-
-
43. A method of communicating between endpoints on a network, the method comprising;
-
accessing a serialized extensible data structure to obtain an endpoint address for an entity on a network;
accessing the serialized extensible data structure to obtain a security key;
encrypting data using the security key; and
sending the data to the endpoint address for the entity on the network. - View Dependent Claims (44, 45, 46, 47)
-
Specification