Cryptography – Communication system using cryptography – Wireless communication
Reexamination Certificate
2011-06-07
2011-06-07
Pich, Ponnoreay (Department: 2435)
Cryptography
Communication system using cryptography
Wireless communication
C713S193000, C380S277000, C380S278000, C380S279000, C380S286000
Reexamination Certificate
active
07957532
ABSTRACT:
A network-based data protection scheme for a mobile device utilizes encryption techniques and a remote key server that stores encryption keys on behalf of the mobile device. The mobile device stores encrypted data, preferably having no unencrypted counterpart stored therewith. On an as-needed basis, the mobile device requests a decryption key (or an encrypted version of a decryption key) from the key server, where the decryption key can be used by the mobile device to decrypt the encrypted information. The key server transmits the decryption key to the mobile device after authenticating the user of the mobile device.
REFERENCES:
patent: 5392356 (1995-02-01), Konno et al.
patent: 5517567 (1996-05-01), Epstein
patent: 5548649 (1996-08-01), Jacobson
patent: 6026293 (2000-02-01), Osborn
patent: 6108424 (2000-08-01), Pitiot
patent: 6167252 (2000-12-01), Cohen
patent: 6201871 (2001-03-01), Bostley, III et al.
patent: 6311171 (2001-10-01), Dent
patent: 6460138 (2002-10-01), Morris
patent: 6950521 (2005-09-01), Marcovici et al.
patent: 7050993 (2006-05-01), Piikivi et al.
patent: 7275685 (2007-10-01), Gray et al.
patent: 7325132 (2008-01-01), Takayama et al.
patent: 7596696 (2009-09-01), Perlman
patent: 2002/0023215 (2002-02-01), Wang et al.
patent: 2003/0165240 (2003-09-01), Bantz et al.
patent: 2004/0052379 (2004-03-01), Nishimoto et al.
patent: 2005/0120225 (2005-06-01), Kirsch et al.
patent: 2006/0013397 (2006-01-01), Dorsch et al.
patent: 2006/0025110 (2006-02-01), Liu
patent: 2006/0190724 (2006-08-01), Adams et al.
patent: 2007/0297610 (2007-12-01), Chen et al.
patent: 2009/0110195 (2009-04-01), Paykin et al.
Racheria,G., et al,“Security and privacy issues in wireless and mobile computing”, http://ieeexplore.ieee.org/xpls/abs—all.jsp?arNumber=905910.
Pfitzmann, A., et al, “Trusting mobile user devices and security modules”,http://ieeexplore.ieee.org/search/freesrchabstract.jsp?arnumber=566159&isnumber=12264&punumber=2&k2do.
Hubaux,Jean-Pierre, et al,“The Quest for Security in Mobile Ad Hoc Networks”,http://delivery.acm.org/10.1145/510000/501437/p146-hubaux.pdf?key1=501437&key2=1643094411&coll=Por.
Capkun S. et al.,“Self-organized public-key management for mobile ad hoc networks”,http://ieeexplore.ieee.org/search/freesrchabstract.jsp?arnumber=1195151&isnumber=26880&punum.
Chen Yuqun
Jakubowski Mariusz H.
Liu Zicheng
Yacobi Yacov
Microsoft Corporation
Pich Ponnoreay
Shirazi Sayed Beheshti
LandOfFree
Data protection for a mobile device does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Data protection for a mobile device, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Data protection for a mobile device will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2739074