This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed. Find sources: "Identity Registration Protocol" – news · newspapers · books · scholar · JSTOR(July 2022) (Learn how and when to remove this message)
The Internet Assigned Numbers Authority (IANA) officially assigned TCP port 4604 to the Identity Registration Protocol (IRP) created by Sixscape Communications, Pte. Ltd. The assignment was issued by IANA on 17 March 2014, and is listed in the official IANA resource registry.
There are a very limited number of port numbers, which are assigned by IANA for protocols recognized as viable, complying with current protocol design standards, and not already covered by existing Internet standards. For example, port 25 was assigned to the SMTP email protocol many years ago.[when?] This establishes a standard and eliminates conflicts with other protocols. The technical review of IRP was performed by Lars Eggert, the distinguished chair of the Internet Research Task Force.[1]
IRP was created by Lawrence E. Hughes, co-founder and CTO of Sixscape Communications, to allow applications to register their name, email address, UserID, their current IPv6 address and other information with the company's Domain Identity Registry server. IRP also supports all functions of a Public Key Infrastructure and an authenticated Address Registry. Sixscape's Domain Identity Registry server issues and manages X.509 client digital certificates for authentication and secure messaging. The Address Registry feature enables a new connectivity paradigm, called End2End Direct, in which user applications can connect directly to each other rather than via intermediary servers as is common with Client/Server architecture applications common on the older IPv4 Internet.
IRP is a streaming network protocol (TCP-based, connection-oriented).[2] It is a Client/Server design with clearly defined server and client roles and implementations. It is secured with TLS v1.2 using the latest, strongest ciphersuites (e.g. Diffie Hellman Ephemeral for key exchange, AES256 for symmetric encryption and SHA2/384 for message digest). It does server to client authentication using an X.509 Server certificate, similar to web or email servers.[3] It normally does client to server authentication with X.509 client certificates (usually obtained via IRP), with fallback to Username/Password Authentication (UPA) if needed. UPA can be disabled on a per-user basis. IRP protocol messages are valid XML documents.
^"Internet Research Task Force". IETF. Retrieved 2022-06-15.
^"Video Streaming Protocols - What Are They & How Do They Work?". CDNetworks. 2021-12-19. Retrieved 2022-06-15.
^Crothers, Brooke (2022-04-28). "Mutual TLS: Vital for Securing Microservices in a Service Mesh". Security Boulevard. Retrieved 2022-06-15.
and 27 Related for: Identity Registration Protocol information
Numbers Authority (IANA) officially assigned TCP port 4604 to the IdentityRegistrationProtocol (IRP) created by Sixscape Communications, Pte. Ltd. The assignment...
The Host IdentityProtocol (HIP) is a host identification technology for use on Internet Protocol (IP) networks, such as the Internet. The Internet has...
(for encryption of all content). SixChat uses the company’s IdentityRegistrationProtocol (IANA assigned port 4604) for address registry and retrieval...
WHOIS (pronounced as the phrase "who is") is a query and response protocol that is used for querying databases that store an Internet resource's registered...
numbers used by protocols for operation of network applications. The Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) only need...
depending on its requirements). The OpenID protocol does not rely on a central authority to authenticate a user's identity. Moreover, neither services nor the...
A Belgian identity card (Dutch: Identiteitskaart, French: Carte d’identité, German: Personalausweis) is a national identity card issued to all citizens...
Services Identity Module (ISIM) application - ISIM standard 3GPP TS 24.229 IP multimedia call control protocol based on Session Initiation Protocol (SIP)...
IMS using different IP-connectivity networks, routing group identities, multiple registration and forking, presence, speech recognition and speech-enabled...
The German Identity Card (German: Personalausweis, pronounced [pɛʁzoˈnaːlʔaʊ̯sˌvaɪ̯s] ) is issued to German citizens by local registration offices in...
The Session Initiation Protocol (SIP) is a signalling protocol used for controlling communication sessions such as Voice over IP telephone calls. SIP...
Protocols associated with IP multicast include Internet Group Management Protocol, Protocol Independent Multicast and Multicast VLAN Registration. IGMP...
The Session Initiation Protocol (SIP) is the signaling protocol selected by the 3rd Generation Partnership Project (3GPP) to create and control multimedia...
federated identity management (FIdM) amounts to having a common set of policies, practices and protocols in place to manage the identity and trust into...
The Secure Remote Password protocol (SRP) is an augmented password-authenticated key exchange (PAKE) protocol, specifically designed to work around existing...
Object for use in the Common Indexing Protocol RFC 2655 CIP Index Object Format for SOIF Objects RFC 2656 Registration Procedures for SOIF Template Types...
identity provider or a SAML service provider) User interface elements Signing keys or encryption keys Single sign-on protocol endpoints Registration and...
The Extensible Provisioning Protocol (EPP) is a flexible protocol designed for allocating objects within registries over the Internet. The motivation...
The Simple Mail Transfer Protocol (SMTP) is an Internet standard communication protocol for electronic mail transmission. Mail servers and other message...
2nd quarter, the PSA will master PhilSys's processes such as protocols regarding registration and transaction-number generation. September 2019 is set as...
(OSI) network model, MAC addresses are used in the medium access control protocol sublayer of the data link layer. As typically represented, MAC addresses...
management protocol such as CMP. The PKI role that may be delegated by a CA to assure valid and correct registration is called a registration authority...
(also known as road tax and road fund licence) and sells personalised registrations. Along with this, the RTO is also responsible to inspect vehicle's insurance...
National identity cards are identity documents issued to citizens of most European Union and European Economic Area (EEA) member states, with the exception...
Computer Systems Interface or iSCSI (/aɪˈskʌzi/ eye-SKUZ-ee) is an Internet Protocol-based storage networking standard for linking data storage facilities....
whether the identity is worthy of trust. Online identities are associated with users through authentication, which typically requires registration and logging...
BitTorrent, also referred to as simply torrent, is a communication protocol for peer-to-peer file sharing (P2P), which enables users to distribute data...