Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2007-07-11
2011-12-27
Shaw, Yin-Chen (Department: 2439)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S153000, C713S168000, C713S176000, C726S002000, C726S003000, C726S004000, C726S005000, C726S006000, C380S277000, C380S278000, C709S202000
Reexamination Certificate
active
08086863
ABSTRACT:
Secure message transfer of at least one message from a sender to a receiver within a network system may be provided. For example, a message structure information regarding the at least one message may be computed on a sender-side and according to a pre-given scheme. The computed message structure information may be added as message account information into the at least one message to be sent. The message account information may be protected by a signature. The at least one message may be transferred through the network system to the receiver. On a receiver-side, the message account information may be validated after reception of the at least one message and according to the pre-given scheme.
REFERENCES:
patent: 6233601 (2001-05-01), Walsh
patent: 7287166 (2007-10-01), Chang et al.
patent: 7577852 (2009-08-01), Okazaki et al.
patent: 2002/0065777 (2002-05-01), Kondo et al.
patent: 2002/0144118 (2002-10-01), Maruyama
Ordille, Joann, J.,“When agents roam, who can you trust?”, IEEE, 1996.
European Search Report, (Feb. 6, 2007).
Jansen, W. A., “Countermeasures for mobile agent security”, Computer Communications, Elsevier Science Publishers BV, Amsterdam, NL, (Nov. 1, 2000),1667-1676.
Negm, K.E.A. “Design, implementation and testing of mobile agent protection mechanism for MANETS”, The 3rd ACS/IEEE International Conference on Computer Systems and Applications, Cairo, Egypt, (Jan. 3, 2005), 519-526.
Corradi, A. et al., “Mobile agents protection in the Internet environment”, The 23rd Annual International Computer Software and Applications Conference, Phoenix, AZ, COMPSAC '99, (Oct. 27, 1999),80-85.
Alfalayleh, M. et al., “Scout and routed mobile agents”, 3rd IEEE International Conference on Industrial Informatics, Perth, Australia, (Aug. 10, 2005), 667-674.
Ordille, J J., “When agents roam, who can you trust?”, First Annual Conference on Emerging Technologies and Applications in Communications, Portland, OR, (May 7, 1996),188-191.
Karnik, N M., et al., “Security in the Ajanta Mobile Agent System”, Software Practice & Experience, Wiley & Sons, Bognor Regis, GB, (Apr. 10, 2001), 301-329.
Brake Hughes Bellermann LLP
SAP (AG)
Shaw Yin-Chen
LandOfFree
Method and a system for protecting path and data of a mobile... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and a system for protecting path and data of a mobile..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and a system for protecting path and data of a mobile... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4272280