<pasi.ero...@nokia.com> writes:

> My reading of RedPhone's IPR disclosure 1026 is that they claim to
> have a patent application about a larger system that includes
> tls-authz as one part, and uses it in particular way. If you want to
> build a system matching the numbered list 1..4 in the disclosure
> (RedPhone's description of what they claim is covered), then you
> would have to consider this IPR disclosure.

A license is required for each of the cases 1, 2, 3, and 4 individually.

As far as I read item 3, it seems to cover many kind of realistic use of
this protocol.  As soon as you have some authorization data, you would
typically compare the sender of the authorization to some set of valid
issuers.

> However, I think there are many more good uses for tls-authz that
> do *not* match items 1..4.

That would change things.  Can you describe a practical way to use
tls-authz that wouldn't be covered by, for example, item 3?  I tried to
understand one unencumbered use-case of tls-authz earlier:
<http://thread.gmane.org/gmane.ietf.general/33561>.  To my reading, the
example seems encumbered.  If you can explain an unencumbered use-case
that would help.

> Just because someone has filed a patent application on some rather
> obscure combination of B+C+D should not prevent others from using the
> protocol for things not covered by that application. Thus, I support
> publishing this as an RFC (either Informational or Standards Track).

Obviously part of our disagreement seems to be what is "obscure".

Would you still support publication if the patent application covers
broader ways to use the protocol?

/Simon
_______________________________________________
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf

Reply via email to