Data processing: database and file management or data structures – Database design – Data structure types
Reexamination Certificate
2007-02-06
2007-02-06
Gaffin, Jeffrey (Department: 2165)
Data processing: database and file management or data structures
Database design
Data structure types
C707S793000, C707S793000
Reexamination Certificate
active
10204363
ABSTRACT:
At a terminal where communication can take place via a network, ADF in which property information on data is stored is received, and based upon the communication systems (ordinary/SSL) which were used for receiving this ADF and the communication system which is used for receiving JAR in which the entity of the above mentioned data is stored, whether a communication pattern is allowable determined. JAR is received if the communication pattern is allowable, and JAR is not received if the communication pattern is not allowable for security reasons. In other words, data is obtained only when the communication pattern is allowable.
REFERENCES:
patent: 5477542 (1995-12-01), Takahara et al.
patent: 5949978 (1999-09-01), Kondo et al.
patent: 6523067 (2003-02-01), Mi et al.
patent: 6606708 (2003-08-01), Shifrin et al.
patent: 6766353 (2004-07-01), Lin et al.
patent: 6772159 (2004-08-01), Blount et al.
patent: 6810405 (2004-10-01), LaRue et al.
patent: 6823461 (2004-11-01), Narayanan et al.
patent: 2000-285048 (2000-10-01), None
patent: 2000-305849 (2000-11-01), None
Korba, L., “Towards Secure Agent Distribution and Communication”Proceedings of the 32ndAnnual Hawaii International Conference on System Sciences, 1999, 10 Pages.
Heuer, J. et al., “Adaptive Multimedia Messaging based on MPEG-7—The M3- Box”,Proceedings 2ndInt'l Symposium on Mobile Multimedia Systems&Applications, Nov. 10, 2000, XP-002201575, 8 pages.
Mohan, R. et al., “Adapting Multimedia Internet Content for Universal Access”,IEEE Transactions on Multimedia, IEEE Service Center, vol. 1, No. 1, Mar. 1999, XP002159629, pp. 104-114.
Czerwinski, S. E. et al., “An Architecture for a Secure Service Discovery Service”,MOBICOM '99, Proceedings of the 5thAnnual ACM/IEEE International Conference on Mobile Computing and Networking, vol.conf.5, Aug. 15, 1999, XP000896069, pp. 24-35.
Gong, L., “New Security Architectural Directions for Java (Extended Abstract)”,COMPCON '97, Proceedings, Feb. 23, 1997, XP010219517, pp. 97-102.
Hiramatsu Yoshiaki
Inoue Kyoko
Kamiya Dai
Ooi Tatsuro
Ooseki Eriko
Brinks Hofer Gilson & Lione
Gaffin Jeffrey
NTT DoCoMo Inc.
Wu Yicun
LandOfFree
Data obtaining method and terminals does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Data obtaining method and terminals, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Data obtaining method and terminals will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3893765