Method and a system for protecting path and data of a mobile...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S153000, C713S168000, C713S176000, C726S002000, C726S003000, C726S004000, C726S005000, C726S006000, C380S277000, C380S278000, C709S202000

Reexamination Certificate

active

08086863

ABSTRACT:
Secure message transfer of at least one message from a sender to a receiver within a network system may be provided. For example, a message structure information regarding the at least one message may be computed on a sender-side and according to a pre-given scheme. The computed message structure information may be added as message account information into the at least one message to be sent. The message account information may be protected by a signature. The at least one message may be transferred through the network system to the receiver. On a receiver-side, the message account information may be validated after reception of the at least one message and according to the pre-given scheme.

REFERENCES:
patent: 6233601 (2001-05-01), Walsh
patent: 7287166 (2007-10-01), Chang et al.
patent: 7577852 (2009-08-01), Okazaki et al.
patent: 2002/0065777 (2002-05-01), Kondo et al.
patent: 2002/0144118 (2002-10-01), Maruyama
Ordille, Joann, J.,“When agents roam, who can you trust?”, IEEE, 1996.
European Search Report, (Feb. 6, 2007).
Jansen, W. A., “Countermeasures for mobile agent security”, Computer Communications, Elsevier Science Publishers BV, Amsterdam, NL, (Nov. 1, 2000),1667-1676.
Negm, K.E.A. “Design, implementation and testing of mobile agent protection mechanism for MANETS”, The 3rd ACS/IEEE International Conference on Computer Systems and Applications, Cairo, Egypt, (Jan. 3, 2005), 519-526.
Corradi, A. et al., “Mobile agents protection in the Internet environment”, The 23rd Annual International Computer Software and Applications Conference, Phoenix, AZ, COMPSAC '99, (Oct. 27, 1999),80-85.
Alfalayleh, M. et al., “Scout and routed mobile agents”, 3rd IEEE International Conference on Industrial Informatics, Perth, Australia, (Aug. 10, 2005), 667-674.
Ordille, J J., “When agents roam, who can you trust?”, First Annual Conference on Emerging Technologies and Applications in Communications, Portland, OR, (May 7, 1996),188-191.
Karnik, N M., et al., “Security in the Ajanta Mobile Agent System”, Software Practice & Experience, Wiley & Sons, Bognor Regis, GB, (Apr. 10, 2001), 301-329.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and a system for protecting path and data of a mobile... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and a system for protecting path and data of a mobile..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and a system for protecting path and data of a mobile... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4272280

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.