Type of I.P :
Patent A government authority or licence conferring a right or title for a set period, especially the sole right to exclude others from making, using, or selling an invention.
Copyright The exclusive and assignable legal right, given to the originator for a fixed number of years, to print, publish, perform, film, or record literary, artistic, or musical material.
Trademark A symbol, word, or words legally registered or established by use as representing a company or product.
Others Trade Secerts, Innovative Step, Creative etc
Patent Title : An Enhanced Mobile Internet Protocol Version 6 (IPv6) with Multicast Function and Hierarchical Design
Patent Registration No : MY151523A
R&D The invention is at the lab stage or proof concept stage
Pre-Commercial The invention is currently in the process of field testing
Ready For Market Invention is ready to be licensed out or sold
Selling Method :
Exclusive Licensing No person or company other than the named licensee can exploit the relevant intellectual property rights. Importantly, the licensor is also excluded from exploiting the intellectual property rights.
Licensing Authorization to use a particular patent. Licensee may not be the only one licensed to exploit the intellectual property.
Assignment The sale of ownership to the individual assigning the intellectual property.
Product Year :
The proposed handover scheme according to the present invention is an enhancement of the existing Mobile IPv6 protocol; it integrates hierarchical concept and multicast function. hierarchical design was used to shield the micro mobility from macro mobility in order to reduce location update signal and signaling traffic within micro level network while multicasting is used to send packets to mobile node through base station that are near to mobile node. This will reduced handover delay that causes packet lost when mobile node is roaming. The proposed security scheme is extended enhancement of the existing Mobile IPv6 security protocol. It can detect Man-Int-The-Middle attacks or attacks against data and then prevent them. Each mobile node can trust itself to check whether the connection is secured or not. It is done by requesting the receiver or server to return some selected packet to compare with the original generated.
- enhancement of the existing Mobile IPv6 protocol
- multicast function.
- integrates hierarchical concept
In this method, it is proposed to use encryption if any attack is detected so is not increase the delay.
Bid your price Here
Starting Price : USD
Login to Bid