Detecting corrupted data before transmission to a client

Electrical computers and digital processing systems: multicomput – Remote data accessing

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C709S203000, C709S218000, C709S219000, C709S229000, C713S176000, C713S180000, C713S193000, C713S194000, C726S022000, C726S023000

Reexamination Certificate

active

07552196

ABSTRACT:
A method of data transmission including receiving a request for data over an Internet, by a data provider; obtaining data, in response to the request, at the data provider; applying a quality assurance procedure to the obtained data, responsive to the request, at the provider and other than any virus scanning of said data; and transmitting the data over the Internet responsive to the assurance. Preferably, the quality assurance procedure includes assuring that the data is pre-approved for transmission. Preferably, the procedure includes verifying a digital signature of the data.

REFERENCES:
patent: 4672572 (1987-06-01), Alsberg
patent: 5060185 (1991-10-01), Naito et al.
patent: 5161192 (1992-11-01), Carter et al.
patent: 5343471 (1994-08-01), Cassagnol
patent: 5406628 (1995-04-01), Beller et al.
patent: 5442645 (1995-08-01), Ugon
patent: 5454000 (1995-09-01), Dorfman
patent: 5475839 (1995-12-01), Watson et al.
patent: 5489896 (1996-02-01), Sofer et al.
patent: 5548649 (1996-08-01), Jacobson
patent: 5550957 (1996-08-01), Davidson et al.
patent: 5576755 (1996-11-01), Davis et al.
patent: 5613012 (1997-03-01), Hoffman et al.
patent: 5623600 (1997-04-01), Ji et al.
patent: 5636139 (1997-06-01), McLaughlin et al.
patent: 5671282 (1997-09-01), Wolff et al.
patent: 5701342 (1997-12-01), Anderson
patent: 5802320 (1998-09-01), Baehr et al.
patent: 5818654 (1998-10-01), Reddy et al.
patent: 5835726 (1998-11-01), Shwed et al.
patent: 5883954 (1999-03-01), Ronning
patent: 5926549 (1999-07-01), Pinkas
patent: 5935246 (1999-08-01), Benson
patent: 5956481 (1999-09-01), Walsh et al.
patent: 6041316 (2000-03-01), Allen
patent: 6047270 (2000-04-01), Joao et al.
patent: 6076166 (2000-06-01), Moshfeghi et al.
patent: 6233313 (2001-05-01), Farris et al.
patent: 6233565 (2001-05-01), Lewis et al.
patent: 6233618 (2001-05-01), Shannon
patent: 6327579 (2001-12-01), Crawford
patent: 6336078 (2002-01-01), Sakayori et al.
patent: 6343284 (2002-01-01), Ishikawa et al.
patent: 6351811 (2002-02-01), Groshon et al.
patent: 6389421 (2002-05-01), Hawkins et al.
patent: 6389538 (2002-05-01), Gruse et al.
patent: 6532493 (2003-03-01), Aviani et al.
patent: 6668246 (2003-12-01), Yeung et al.
patent: 6905889 (2005-06-01), Lowther
patent: 6920474 (2005-07-01), Walsh et al.
patent: 7246144 (2007-07-01), Walsh et al.
patent: 7251787 (2007-07-01), Levin et al.
patent: 2002/0002678 (2002-01-01), Chow et al.
patent: 198 28 253 (2000-02-01), None
patent: 0 872 990 (1998-10-01), None
patent: WO 97/37467 (1997-10-01), None
patent: WO 98/40992 (1998-09-01), None
Novalennium; “Automation Engines”—Concept of Operation Website,Novalennium, publication date unknown—(copy provided from Sep. 13, 1999); http://www.novalennium.comm/SecurePage/SecurePageConceptofOperation.htm.
E-Lock Technologies, Products Assured WebSite,E-Lock Technologies, ; publication date unknown—(copy provided from Feb. 29, 2000); www.elock.com.
Creative Digital Technology; SecurePage website,Creative Technologies, Australia, publication date unknown—(provided copy available from Feb. 29, 2000); http://www.creative.com.au/cdtprod/Securepage.htm.
Tanenbaum, Andrew S.,Computer Networks, Third Edition, Prentice Hall, pp. 613-622 (1996).
Sale, K. and Al-Saqabi, K., “Error Detection and Diagnosis for Fault Tolerance in Distributed Systems,”Information and Software Technology, No. 39, pp. 975-983 (1998).
Yakal, Kathy. “Sign on the Digital Line.”PC Magazine, p. 32, (Aug. 29, 2000).
“Assured Website”E-Lock Technologies, publication date unknown—(copy retrieved from the Internet via www.elock.com on Feb. 29, 2000).
“G-Server—How it Works,”Gilian Technologies, publication date unknown—(copy retrieved from the Internet via www.gilian.com on Aug. 21, 2000).
“Gilian Technologies Announces Participation in F5 Networks Affinity Partner Program,”Business Wire, p. 330 (Apr. 24, 2000).
Schneier, Bruce, “Applied Cryptograph,” Katherine Schowalter, Canada, Second Edition, p. 4, 5, 32, 33 (1996).
Computer Dictionary, Microsoft Press, Third Edition, p. 103, 210, 239, 258, 262, 327, 436, 437 (1996).
Anonymous, “Getting the Right Virus Scanner,”.Computimes, Malaysia, Financial Times Information Limited (Feb. 19, 1998).
Buckler, Grant, “Softcop Claims Better Way to Try before You Buy,”.Newsbytes News Network, Financial Times Information Limited (Dec. 4, 1995).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Detecting corrupted data before transmission to a client does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Detecting corrupted data before transmission to a client, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Detecting corrupted data before transmission to a client will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4071944

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.