Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular node for directing data and applying cryptography
Reexamination Certificate
2006-03-28
2006-03-28
Jung, David (Department: 2134)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular node for directing data and applying cryptography
C713S150000, C713S152000
Reexamination Certificate
active
07020771
ABSTRACT:
Providing data security involves receiving a request message at an intermediate network node. The request message is associated with a number of data packets from a communication device. The intermediate network node determines whether the request message has a satisfactory security hint. If the request message does not have a satisfactory security hint, the intermediate network node performs a security procedure on the data packets. If the request message has a satisfactory security hint, the intermediate network node relies on a security transform present in the data packets and routes the data packets without performing the security procedure.
REFERENCES:
An enhanced one-bit identity authentication protocol for access control in IEEE 802.11; Wang, H.; Aravind Velayutham; Military Communications Conference, 2003. MILCOM 2003. IEEE vol. 2, Oct. 13-16, 2003 Page(s):839-843 vol. 2.
Enhancing survivability of security services using redundancy; Hiltunen, M.A.; Schlichting, R.D.; Ugarte, C.A.; Dependable Systems and Networks, 2001. Proceedings. The International Conference on Jul. 1-4, 2001 Page(s):173-182.
Enhancing security via stochastic routing: Bohacek, S.; Hespanha, J.P.; Obraczka, K.; Junsoo Lee; Chansook Lim; Computer Communications and Networks, 2002. Proceedings. Eleventh International Conference on Oct. 14-16, 2002 Page(s):58-62.
B. Davie, et al., “Integrated Services in the Presence of Compressible Flows”, Network Working Group, Request for Comments: 3006, Category: Standards Track, © The Internet Society 2000, ftp://ftp.rfc-editor.org/in-notes/rfc3006.txt; 13 pages, Printed Feb. 21, 2003.
Y. Bernet, “Format of the RSVP DCLASS Object”, Network Working Group, Request for Comments: 2996, Category: Standards Track, © The Internet Society 2000, ftp://ftp.rfc-editor.org/in-notes/rfc2996.txt; 9 pages, Printed Feb. 10, 2003.
D. Durham, et al., “The COPS (Common Open Policy Service) Protocol”, Network Working Group, Request for Comments: 2748, Category: Standards Track, © The Internet Society 2000, ftp://ftp.rfc-editor.org/in-notes/rfc2748.txt; 36 pages, Printed Feb. 10, 2003.
R. Braden, et al., “Resource ReSerVation Protocol (RSVP)—Version 1 Message Processing Rules”, Network Working Group, Request for Comments: 2209, Category: International, Sep. 1997, ftp://ftp.rfc-editor.org/in-notes/rfc2209.txt; 24 pages, Printed Feb. 10, 2003.
Baker & Botts L.L.P.
Jung David
LandOfFree
Controlling data security procedures using an admission... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Controlling data security procedures using an admission..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Controlling data security procedures using an admission... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3600046