Intelligent secure data manipulation apparatus and method

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S003000

Reexamination Certificate

active

07730528

ABSTRACT:
A data manipulation appliance can be installed or plugged into a computer network between business partners, and can perform many of the difficult and tedious data manipulation operations in a substantially automated manner. Examples of operations that can be performed by an embodiment of the apparatus include, but are not limited to, encryption, authentication, auditing, shaping data to a common intermediate format for exchange between partners, other auditing of data exchanges in transaction logs, filtering data for privacy compliance and risk management, error detection and correction, mapping internal non-standard data elements to external standard code sets, proxy and protocol re-writing, and so on. The appliance can be embedded with various tools to perform these operations, and therefore appears to be “intelligent.”

REFERENCES:
patent: 5528503 (1996-06-01), Moore et al.
patent: 5550984 (1996-08-01), Gelb
patent: 5621796 (1997-04-01), Davis et al.
patent: 5935212 (1999-08-01), Kalajan et al.
patent: 5946674 (1999-08-01), Nordin et al.
patent: 5961593 (1999-10-01), Gabber et al.
patent: 5987480 (1999-11-01), Donohue et al.
patent: 6002767 (1999-12-01), Kramer
patent: 6003084 (1999-12-01), Green et al.
patent: 6029245 (2000-02-01), Scanlan
patent: 6032260 (2000-02-01), Sasmazel et al.
patent: 6047268 (2000-04-01), Bartoli et al.
patent: 6081900 (2000-06-01), Subramaniam et al.
patent: 6137884 (2000-10-01), Micali
patent: 6144638 (2000-11-01), Obenhuber et al.
patent: 6161139 (2000-12-01), Win et al.
patent: 6182095 (2001-01-01), Leymaster et al.
patent: 6199113 (2001-03-01), Alegre et al.
patent: 6256739 (2001-07-01), Skopp et al.
patent: 6289462 (2001-09-01), McNabb et al.
patent: 6345303 (2002-02-01), Knauerhase et al.
patent: 6351772 (2002-02-01), Murphy et al.
patent: 6389462 (2002-05-01), Cohen et al.
patent: 6401125 (2002-06-01), Makarios et al.
patent: 6460076 (2002-10-01), Srinivasan
patent: 6502106 (2002-12-01), Gampper et al.
patent: 6502135 (2002-12-01), Munger et al.
patent: 6507908 (2003-01-01), Caronni
patent: 6704873 (2004-03-01), Underwood
patent: 6708200 (2004-03-01), Ura et al.
patent: 6721424 (2004-04-01), Radatti
patent: 6779111 (2004-08-01), Gehrmann et al.
patent: 7111060 (2006-09-01), Araujo et al.
patent: 2002/0069366 (2002-06-01), Schoettger
patent: 2002/0133706 (2002-09-01), Khanna et al.
patent: 2002/0159601 (2002-10-01), Bushmitch et al.
patent: 2004/0230820 (2004-11-01), Hui Hsu et al.
patent: 1091536 (2001-04-01), None
Abadi et al, Secure Web Tunneling, Proceeding of the 7thInternl. World Wide Web Conference, Apr. 1998, Computer Networks and ISDN Systems, vol. 30, No. 1-7 (Apr. 1998), pp. 531-539, Retrieved from the Internet on Oct. 9, 2005 <URL: http://birrell.org/andrew/tunnel/>.
Birrell et al., “Pachyderm”, Mar. 1997, Retrieved from the Internet on Jan. 23, 2008: <URL: http://www.wobber.org/ted/cv/pachyderm.pdf>.
Sato, “Basic Technique And Application for Internet Firewall—DelegGate Structure” (formal translation), Computer Software, Jan. 1997.
PCT International Search Report for International Application No. PCT/US02/16866.
Aventail Corporation Tech Brief, “Proxy Architecture Versus Direct Connect,” Apr. 2001.
PCT/US01/40812, PCT Search Report, Apr. 9, 2002.
Wu, Sun et al., “Virtual Proxy Servers for WWW and Intelligent Agents on the Internet,” IEEE, 1997, pp. 200-209.
Newton, Harry, “Newton's Telecom Dictionary,” Telecom Books, 14th Edition, 1998, p. 260.
Kim, Joo-Yong et al., “A Proxy Server Structure and its Cache Consistency Mechanism at the Network Bottleneck,” IEEE, 1999, pp. 278-283.
Greene, Tim, “Access Control Software on tap from Neoteris,” Network World, vol. 18, No. 45, Nov. 5, 2001, pp. 23-24.
Farah, M., “Encrypted Hypertext Transfer Protocol—UGGC/1.0”, Network Working Group, Apr. 1, 2000, pp. 1-5.
“Anonymizer URL Encryption,” http://www.anonymizer.com, Nov. 27, 1999.
“How to Use Anonymizer Surfing,” http://www.anonymizer.com, Mar. 2, 2000.
“Ezproxy: A Remote User Athentication Tool for Libraries”, Status Line, Nylink, No. 142, May 2000, p. 9.
“Mc; McConnell Columns,” Radford University, vol. 7, No. 4, Apr. 2000, p. 3.
Official Communication in Application No. 2003-501886, Mailed Feb. 6, 2007.
Sato, Yutaka, “Basic technology for an internet firewall and applications thereof: Mechanism of DeleGate”, Computer Software, Japan Society for Software Science and Technology, Jan. 16, 1997, vol. 14, No. 1, pp. 55-63.
Suto, Kenji, “Aventail ExtraNet Center”, Software Design, Gijutsu Hyoron K.K., Dec. 18, 2000, No. 122, pp. 216-219.
Kawai, Yasuhiro, “Facilitating cooperation in the two fields of BtoB integrated servers and converters; Increase in the number of products for selection”, Nikkei Internet Technology, Nikkei Business Publications, Inc., Feb. 22, 2001, No. 44, pp. 18-20.
Ando, “XML product for BtoB EC: Movements in the two fields of BtoB integrated servers and converters; Increase in the number of products for selection”, Nikkei Internet Technology, Oct. 22, 2000, No. 40, pp. 162-171.
Supplementary European Search Report for European Application No. EP02737242, mailed November 2, 2009, 3 pages.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Intelligent secure data manipulation apparatus and method does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Intelligent secure data manipulation apparatus and method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Intelligent secure data manipulation apparatus and method will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4226741

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.