Controlling data security procedures using an admission...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular node for directing data and applying cryptography

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S150000, C713S152000

Reexamination Certificate

active

07020771

ABSTRACT:
Providing data security involves receiving a request message at an intermediate network node. The request message is associated with a number of data packets from a communication device. The intermediate network node determines whether the request message has a satisfactory security hint. If the request message does not have a satisfactory security hint, the intermediate network node performs a security procedure on the data packets. If the request message has a satisfactory security hint, the intermediate network node relies on a security transform present in the data packets and routes the data packets without performing the security procedure.

REFERENCES:
An enhanced one-bit identity authentication protocol for access control in IEEE 802.11; Wang, H.; Aravind Velayutham; Military Communications Conference, 2003. MILCOM 2003. IEEE vol. 2, Oct. 13-16, 2003 Page(s):839-843 vol. 2.
Enhancing survivability of security services using redundancy; Hiltunen, M.A.; Schlichting, R.D.; Ugarte, C.A.; Dependable Systems and Networks, 2001. Proceedings. The International Conference on Jul. 1-4, 2001 Page(s):173-182.
Enhancing security via stochastic routing: Bohacek, S.; Hespanha, J.P.; Obraczka, K.; Junsoo Lee; Chansook Lim; Computer Communications and Networks, 2002. Proceedings. Eleventh International Conference on Oct. 14-16, 2002 Page(s):58-62.
B. Davie, et al., “Integrated Services in the Presence of Compressible Flows”, Network Working Group, Request for Comments: 3006, Category: Standards Track, © The Internet Society 2000, ftp://ftp.rfc-editor.org/in-notes/rfc3006.txt; 13 pages, Printed Feb. 21, 2003.
Y. Bernet, “Format of the RSVP DCLASS Object”, Network Working Group, Request for Comments: 2996, Category: Standards Track, © The Internet Society 2000, ftp://ftp.rfc-editor.org/in-notes/rfc2996.txt; 9 pages, Printed Feb. 10, 2003.
D. Durham, et al., “The COPS (Common Open Policy Service) Protocol”, Network Working Group, Request for Comments: 2748, Category: Standards Track, © The Internet Society 2000, ftp://ftp.rfc-editor.org/in-notes/rfc2748.txt; 36 pages, Printed Feb. 10, 2003.
R. Braden, et al., “Resource ReSerVation Protocol (RSVP)—Version 1 Message Processing Rules”, Network Working Group, Request for Comments: 2209, Category: International, Sep. 1997, ftp://ftp.rfc-editor.org/in-notes/rfc2209.txt; 24 pages, Printed Feb. 10, 2003.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Controlling data security procedures using an admission... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Controlling data security procedures using an admission..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Controlling data security procedures using an admission... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3600046

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.