Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Central trusted authority provides computer authentication
Reexamination Certificate
2007-09-18
2007-09-18
Barron, Jr., Gilberto (Department: 2132)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Central trusted authority provides computer authentication
C380S270000, C705S028000, C705S500000, C714S025000, C714S048000
Reexamination Certificate
active
10638545
ABSTRACT:
An enterprise system with secure wireless messaging includes an application service to process a message. The enterprise system also includes a security service that uses a cryptographic technique to transform between the message and a secure message that is based on the message. A communication service communicates the secure message with a mobile client using a public network. The message may be secured using a cryptographic technique to provide end-to-end security. The enterprise system also may include an information service including information indicating occurrence of a triggering event. The information indicating occurrence of a triggering event may cause the enterprise system to push a secure message to the mobile client.
REFERENCES:
patent: 5819177 (1998-10-01), Vucetic et al.
patent: 6330499 (2001-12-01), Chou et al.
patent: 6438471 (2002-08-01), Katagishi et al.
patent: 6647272 (2003-11-01), Asikainen
patent: 2002/0062251 (2002-05-01), Anandan et al.
patent: 2004/0015689 (2004-01-01), Billhartz
patent: WO99/27678 (1999-06-01), None
patent: WO 00/31931 (2000-06-01), None
Nguyen et al., Security Routing Analysis for Mobile Ad Hoc Networks, Department of Interdisciplinary Telecommunications, University of Colorado at Boulder, Spring 2000.
Zhou et al., Securing Ad Hoc Networks, IEEE Network Magazine, vol. 13, No. 6, Nov./Dec. 1999.
“Gateway,” http://www.webopedia.com/TERM/g/gateway.html, undated, printed from the Internet Nov. 27, 2002, 1 pg.
Gleckman, Howard, “Don't Click on the Dotted Line Just Yet,”Business Week, Nov. 8, 1999, No. 3654, p. 120.
“Next Messaging: An Introduction to SMS, EMS and MMS,” undated, http://www.mobilewhitepapers.com/pdf/messaging.pdf, printed from the Internet Nov. 26, 2002, 25 pgs.
“PKI,” http://www.webopedia.com/TERM/P/PKI.html, undated, printed from the Internet Nov. 26, 2002, 3 pgs.
“Short Message Service,” http://www.webopedia.com/TERM/S/short—message—service.html, undated, printed from the Internet Nov. 26, 2002, 2 pgs.
“STARSIM Advanced Mobile Commerce,” http://www.gdai.com/pdfdocs/starism.pdf, undated, printed from the Internet Nov. 26, 2002, 8 pgs.
“STARSIM Browser Wireless Internet Now,” www.gdai.com/pdfdocs/starsim—browser.pdf, undated, printed from the internet Nov. 26, 2002, 8 pgs.
“Success 4 WAP' White Paper,” http://www.mobilewhitepapers.com/pdf/wap.pdf, Feb. 2001, printed from the Internet Nov. 26, 2002, 22 pgs.
“Tunneling,” http://www.webopedia.com/TERM/T/tunneling.html, undated, printed from the Internet Nov. 27, 2002, 1 pg.
Gomez Laurent
Haller Jochen
Posegga Joachim
Barron Jr. Gilberto
Kim Jung
SAP Aktiengesellschaft
LandOfFree
Enterprise secure messaging architecture does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Enterprise secure messaging architecture, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Enterprise secure messaging architecture will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3784086