Andersen et al., 2019 - Google Patents
The authenticated received chain (ARC) protocolAndersen et al., 2019
View HTML- Document ID
- 2801596844197895830
- Author
- Andersen K
- Long B
- Blank S
- Kucherawy M
- Publication year
External Links
Snippet
RFC 8617: The Authenticated Received Chain (ARC) Protocol [RFC Home] [TEXT|PDF|HTML]
[Tracker] [IPR] [Errata] [Info page] EXPERIMENTAL Errata Exist Internet Engineering Task
Force (IETF) K. Andersen Request for Comments: 8617 LinkedIn Category: Experimental B …
- 238000010200 validation analysis 0 description 42
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements or protocols for real-time communications
- H04L65/10—Signalling, control or architecture
- H04L65/1003—Signalling or session protocols
- H04L65/1006—SIP
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements or protocols for real-time communications
- H04L65/10—Signalling, control or architecture
- H04L65/1003—Signalling or session protocols
- H04L65/1009—H.323
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L29/00—Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
- H04L29/02—Communication control; Communication processing contains provisionally no documents
- H04L29/06—Communication control; Communication processing contains provisionally no documents characterised by a protocol
- H04L29/0602—Protocols characterised by their application
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/164—Implementing security features at a particular protocol layer at the network layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or paths for security, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L7/00—Arrangements for synchronising receiver with transmitter
- H04L7/02—Speed or phase control by the received code signals, the signals containing no special synchronisation information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L7/00—Arrangements for synchronising receiver with transmitter
- H04L7/04—Speed or phase control by synchronisation signals
- H04L7/041—Speed or phase control by synchronisation signals using special codes as synchronising signal
- H04L7/046—Speed or phase control by synchronisation signals using special codes as synchronising signal using a dotting sequence
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Andersen et al. | The authenticated received chain (ARC) protocol | |
Chen et al. | Composition kills: A case study of email sender authentication | |
Allman et al. | Domainkeys identified mail (dkim) signatures | |
US8495736B2 (en) | Method and apparatus for providing information assurance attributes through a data providence architecture | |
EP2351323B1 (en) | Method for supporting attack detection in a distributed system | |
US7950047B2 (en) | Reporting on spoofed e-mail | |
US7634810B2 (en) | Phishing detection, prevention, and notification | |
CN1767507B (en) | System and method for verifying messages | |
US20090138711A1 (en) | Sender Email Address Verification Using Reachback | |
EP2709046A1 (en) | Real-time classification of email message traffic | |
WO2005065358A2 (en) | E-mail certification service | |
Schryen | Anti-spam measures: analysis and design | |
US20110252043A1 (en) | Electronic communication control | |
US20150172251A1 (en) | Method, a system and a computer program product for certifying that a destination email server has received an email message sent from a sender to at least one destination adress | |
Rose et al. | Trustworthy email | |
Hansen et al. | Domainkeys identified mail (DKIM) service overview | |
Andersen | RFC 8617: The Authenticated Received Chain (ARC) Protocol | |
CN112738113B (en) | Organization information label generation method and message transmission method | |
Allman et al. | RFC 4871: Domainkeys identified mail (DKIM) signatures | |
Kucherawy | Domainkeys identified mail (dkim) and mailing lists | |
Martin et al. | Interoperability Issues between Domain-based Message Authentication, Reporting, and Conformance (DMARC) and Indirect Email Flows | |
Raulot | Bypassing phishing protections with email authentication | |
US11916873B1 (en) | Computerized system for inserting management information into electronic communication systems | |
Allman et al. | Domainkeys identified mail (dkim) signatures draft-ietf-dkim-base-10 | |
Finch | Bounce Address Tag Validation (BATV) |