Global Information Lookup Global Information

Identity Registration Protocol information


The Internet Assigned Numbers Authority (IANA) officially assigned TCP port 4604 to the Identity Registration Protocol (IRP) created by Sixscape Communications, Pte. Ltd. The assignment was issued by IANA on 17 March 2014, and is listed in the official IANA resource registry.

There are a very limited number of port numbers, which are assigned by IANA for protocols recognized as viable, complying with current protocol design standards, and not already covered by existing Internet standards. For example, port 25 was assigned to the SMTP email protocol many years ago.[when?] This establishes a standard and eliminates conflicts with other protocols. The technical review of IRP was performed by Lars Eggert, the distinguished chair of the Internet Research Task Force.[1]

IRP was created by Lawrence E. Hughes, co-founder and CTO of Sixscape Communications, to allow applications to register their name, email address, UserID, their current IPv6 address and other information with the company's Domain Identity Registry server. IRP also supports all functions of a Public Key Infrastructure and an authenticated Address Registry. Sixscape's Domain Identity Registry server issues and manages X.509 client digital certificates for authentication and secure messaging. The Address Registry feature enables a new connectivity paradigm, called End2End Direct, in which user applications can connect directly to each other rather than via intermediary servers as is common with Client/Server architecture applications common on the older IPv4 Internet.

IRP is a streaming network protocol (TCP-based, connection-oriented).[2] It is a Client/Server design with clearly defined server and client roles and implementations. It is secured with TLS v1.2 using the latest, strongest ciphersuites (e.g. Diffie Hellman Ephemeral for key exchange, AES256 for symmetric encryption and SHA2/384 for message digest). It does server to client authentication using an X.509 Server certificate, similar to web or email servers.[3] It normally does client to server authentication with X.509 client certificates (usually obtained via IRP), with fallback to Username/Password Authentication (UPA) if needed. UPA can be disabled on a per-user basis. IRP protocol messages are valid XML documents.

  1. ^ "Internet Research Task Force". IETF. Retrieved 2022-06-15.
  2. ^ "Video Streaming Protocols - What Are They & How Do They Work?". CDNetworks. 2021-12-19. Retrieved 2022-06-15.
  3. ^ Crothers, Brooke (2022-04-28). "Mutual TLS: Vital for Securing Microservices in a Service Mesh". Security Boulevard. Retrieved 2022-06-15.

and 27 Related for: Identity Registration Protocol information

Request time (Page generated in 0.8527 seconds.)

Identity Registration Protocol

Last Update:

Numbers Authority (IANA) officially assigned TCP port 4604 to the Identity Registration Protocol (IRP) created by Sixscape Communications, Pte. Ltd. The assignment...

Word Count : 410

Host Identity Protocol

Last Update:

The Host Identity Protocol (HIP) is a host identification technology for use on Internet Protocol (IP) networks, such as the Internet. The Internet has...

Word Count : 493

Direct End to End Secure Chat Protocol

Last Update:

(for encryption of all content). SixChat uses the company’s Identity Registration Protocol (IANA assigned port 4604) for address registry and retrieval...

Word Count : 608

WHOIS

Last Update:

WHOIS (pronounced as the phrase "who is") is a query and response protocol that is used for querying databases that store an Internet resource's registered...

Word Count : 5308

List of TCP and UDP port numbers

Last Update:

numbers used by protocols for operation of network applications. The Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) only need...

Word Count : 12621

OpenID

Last Update:

depending on its requirements). The OpenID protocol does not rely on a central authority to authenticate a user's identity. Moreover, neither services nor the...

Word Count : 6037

Belgian identity card

Last Update:

A Belgian identity card (Dutch: Identiteitskaart, French: Carte d’identité, German: Personalausweis) is a national identity card issued to all citizens...

Word Count : 1302

IP Multimedia Services Identity Module

Last Update:

Services Identity Module (ISIM) application - ISIM standard 3GPP TS 24.229 IP multimedia call control protocol based on Session Initiation Protocol (SIP)...

Word Count : 180

IP Multimedia Subsystem

Last Update:

IMS using different IP-connectivity networks, routing group identities, multiple registration and forking, presence, speech recognition and speech-enabled...

Word Count : 4554

German identity card

Last Update:

The German Identity Card (German: Personalausweis, pronounced [pɛʁzoˈnaːlʔaʊ̯sˌvaɪ̯s] ) is issued to German citizens by local registration offices in...

Word Count : 2703

List of SIP response codes

Last Update:

The Session Initiation Protocol (SIP) is a signalling protocol used for controlling communication sessions such as Voice over IP telephone calls. SIP...

Word Count : 3020

IP multicast

Last Update:

Protocols associated with IP multicast include Internet Group Management Protocol, Protocol Independent Multicast and Multicast VLAN Registration. IGMP...

Word Count : 4076

SIP extensions for the IP Multimedia Subsystem

Last Update:

The Session Initiation Protocol (SIP) is the signaling protocol selected by the 3rd Generation Partnership Project (3GPP) to create and control multimedia...

Word Count : 6767

Federated identity

Last Update:

federated identity management (FIdM) amounts to having a common set of policies, practices and protocols in place to manage the identity and trust into...

Word Count : 1418

Secure Remote Password protocol

Last Update:

The Secure Remote Password protocol (SRP) is an augmented password-authenticated key exchange (PAKE) protocol, specifically designed to work around existing...

Word Count : 3404

Common Indexing Protocol

Last Update:

Object for use in the Common Indexing Protocol RFC 2655 CIP Index Object Format for SOIF Objects RFC 2656 Registration Procedures for SOIF Template Types...

Word Count : 363

SAML metadata

Last Update:

identity provider or a SAML service provider) User interface elements Signing keys or encryption keys Single sign-on protocol endpoints Registration and...

Word Count : 7634

Extensible Provisioning Protocol

Last Update:

The Extensible Provisioning Protocol (EPP) is a flexible protocol designed for allocating objects within registries over the Internet. The motivation...

Word Count : 2094

Simple Mail Transfer Protocol

Last Update:

The Simple Mail Transfer Protocol (SMTP) is an Internet standard communication protocol for electronic mail transmission. Mail servers and other message...

Word Count : 7177

Philippine national identity card

Last Update:

2nd quarter, the PSA will master PhilSys's processes such as protocols regarding registration and transaction-number generation. September 2019 is set as...

Word Count : 2499

MAC address

Last Update:

(OSI) network model, MAC addresses are used in the medium access control protocol sublayer of the data link layer. As typically represented, MAC addresses...

Word Count : 3749

Public key infrastructure

Last Update:

management protocol such as CMP. The PKI role that may be delegated by a CA to assure valid and correct registration is called a registration authority...

Word Count : 4098

Regional Transport Office

Last Update:

(also known as road tax and road fund licence) and sells personalised registrations. Along with this, the RTO is also responsible to inspect vehicle's insurance...

Word Count : 820

National identity cards in the European Economic Area and Switzerland

Last Update:

National identity cards are identity documents issued to citizens of most European Union and European Economic Area (EEA) member states, with the exception...

Word Count : 5916

ISCSI

Last Update:

Computer Systems Interface or iSCSI (/aɪˈskʌzi/ eye-SKUZ-ee) is an Internet Protocol-based storage networking standard for linking data storage facilities....

Word Count : 3244

Online identity

Last Update:

whether the identity is worthy of trust. Online identities are associated with users through authentication, which typically requires registration and logging...

Word Count : 6079

BitTorrent

Last Update:

BitTorrent, also referred to as simply torrent, is a communication protocol for peer-to-peer file sharing (P2P), which enables users to distribute data...

Word Count : 9151

PDF Search Engine © AllGlobal.net