…document are normative, the other sections are informative. RFC 3979 BCP 79 ) [ RFC3979 ] deals with rights, including possible patent rights, in technologies developed or specified as part of the IETF Standards Process. This document is not intended to address those issues. This…
…eference to the IETF Executive Director in RFC 2026 was replaced by a document [RFC3979] that precedes the current effort, and that document was, in turn, obsoleted by RFC 8179 [RFC8179]. 3. Removal of the IETF Executive Director as an Option In a few cases, it is no longer appro…
…on of BCP 79 . The version of BCP 79 at the time of this writing was RFC 3979 [ RFC3979 ], which is updated by [ RFC4879 ]. The IRTF Stream has chosen to use the IETF's IPR disclosure mechanism, www.ietf.org/ipr/, for this purpose. The IRTF would prefer that the most liberal term…
…ies and processes regarding intellectual property and patents are outlined in [ RFC3979 ] and [ RFC4879 ] and at https://datatracker.ietf.org/ipr/about/ . McGrew, et al. Informational [Page 20] RFC 6090 Fundamental ECC February 2011 10 . Security Considerations The security level…
…f the group. We follow the intellectual property guidelines outlined in BCP 79 [RFC3979]. IETF participants read the relevant Internet-Drafts, RFCs, and email archives in order to familiarize themselves with the technology under discussion. Working Group sessions run on a very li…
… the group. We follow the intellectual property guidelines outlined in BCP 79 [ RFC3979 ]. IETF participants read the relevant Internet-Drafts, RFCs, and email archives in order to familiarize themselves with the technology under discussion. Working Group sessions run on a very l…
…sion of BCP 79. The version of BCP 79 at the time of this writing was RFC 3979 [RFC3979], which is updated by [RFC4879]. The IRTF Stream has chosen to use the IETF's IPR disclosure mechanism, www.ietf.org/ipr/, for this purpose. The IRTF would prefer that the most liberal terms p…
…cies and processes regarding intellectual property and patents are outlined in [RFC3979] and [RFC4879] and at McGrew, et al. Informational [Page 20] RFC 6090 Fundamental ECC February 2011 10. Security Considerations The security level of an elliptic curve cryptosystem is determin…
…ology is specifically permitted. However, the restrictions set forth in BCP 79 [RFC3979] and BCP 78 [RFC5378] on the use of patented technology in IETF Standards Track protocols must be respected when the specification of a media type is part of a Standards Track protocol. In add…
…intended to remain in the # public domain. Therefore, BCPs 78 [RFC5378] and 79 [RFC3979] do # not apply to the TZ Database or contributions that individuals make # to it. Should any claims be made and substantiated against the TZ # Database, the organization that is providing the…