Simon Josefsson wrote:
My reading of RedPhone's IPR disclosure 1026 is that they claim to
have a patent application about a larger system that includes
tls-authz as one part, and uses it in particular way. If you want to
build a system matching the numbered list 1..4 in the disclosure
-housley-tls-authz-extns-07.txt to
Proposed Standard
FWIW (and it would be good if other actual
IETF participants care to indicate +1 if they agree):
The actual words in RedPhone's current disclosure:
RedPhone Security hereby asserts that the techniques for
sending and receiving
Brian E Carpenter brian.e.carpen...@gmail.com writes:
FWIW (and it would be good if other actual
IETF participants care to indicate +1 if they agree):
The actual words in RedPhone's current disclosure:
RedPhone Security hereby asserts that the techniques for
sending and receiving
Simon Josefsson wrote:
I disagree. The IETF policies around patents mention use as well
as implementation. Thus, a license that permit implementation
but not permitting use should generate similar scrutiny and
discussion. It poses the same problem for actual users.
I strongly disagree
I agree with Brian and Marshall, but let me introduce a different
perspective on the issue.
Marshall Eubanks wrote:
[...]
I don't see any sensible way you get from the [Brian interprtetation] to the
[FSF interpretation].
Maybe it's a matter of ideological objection to patents.
Tim,
On 2009-02-10 18:32, Tim Bray wrote:
On Mon, Feb 9, 2009 at 5:50 PM, Brian E Carpenter
brian.e.carpen...@gmail.com wrote:
FWIW (and it would be good if other actual
IETF participants care to indicate +1 if they agree):
The actual words in RedPhone's current disclosure:
RedPhone
FWIW (and it would be good if other actual
IETF participants care to indicate +1 if they agree):
The actual words in RedPhone's current disclosure:
RedPhone Security hereby asserts that the techniques for
sending and receiving authorizations defined in TLS Authorizations
Extensions (version
On Mon, Feb 9, 2009 at 5:50 PM, Brian E Carpenter
brian.e.carpen...@gmail.com wrote:
FWIW (and it would be good if other actual
IETF participants care to indicate +1 if they agree):
The actual words in RedPhone's current disclosure:
RedPhone Security hereby asserts that the techniques for
Dear Brian;
On Feb 9, 2009, at 8:50 PM, Brian E Carpenter wrote:
FWIW (and it would be good if other actual
IETF participants care to indicate +1 if they agree):
FWIW I read the IPR statement and couldn't figure out what the recent
posters
were talking about either.
Hunting around, I