Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular node for directing data and applying cryptography
Reexamination Certificate
2005-09-13
2005-09-13
Barron, Jr., Gilberto (Department: 2132)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular node for directing data and applying cryptography
C713S152000, C370S352000, C375S220000
Reexamination Certificate
active
06944760
ABSTRACT:
A method and apparatus for protecting the identities of mobile devices on a wireless network are described. A proxy gateway couples the wireless network to a wired network and maintains data associating a set of service initiators with a set of cryptographic keys. Upon receiving a request from a mobile client device directed to an origin server on the wired network, the proxy gateway identifies the cryptographic key for that origin server and sends to the origin server a proxy request. The proxy request includes an identifier of the mobile device, encrypted using the cryptographic key. When the proxy gateway receives a request from a service initiator on the wired network to push information to a mobile device, it uses the cryptographic key for that service initiator to decode a client identifier in the request and thereby determine whether the request is valid.
REFERENCES:
patent: 6253326 (2001-06-01), Lincke et al.
patent: 6795924 (2004-09-01), Kiessling et al.
patent: 2001/0036224 (2001-11-01), Demello et al.
patent: 2001/0047474 (2001-11-01), Takagi et al.
patent: 2002/0186683 (2002-12-01), Buck et al.
patent: 1 081 916 (2001-03-01), None
Freedom Internet Privacy Suite 2.0, pp. 1-3, 2001, ZeroKnowledge Systems, Inc., downloaded from http://www.freedom.net/info/index.html.
Lorrie Cranor et al., “The Platform for Privacy Preferences 1.0 (P3P1.0) Specification,” pp. 1-150, Sep. 15, 2000, W3C, downloaded from http://www.w3.org/TR/2000/WD-P3P-20000915/.
Eran Gabber et al., “How to Make Personalized Web Browsing Simple, Secure and Anonymous,” Financial Cryptography International Conference, pp. 17-31, 1997, XP-001011338.
Stefan G. Hild et al., “Mobilizing Applications,” IEEE Personal Communications, IEEE Communications Society, vol. 4, No. 5, pp. 26-34, Oct. 1997, XP 000721303.
Barron Jr. Gilberto
Blakely , Sokoloff, Taylor & Zafman LLP
Nobahar A.
Openwave Systems Inc.
LandOfFree
Method and apparatus for protecting identities of mobile... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for protecting identities of mobile..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for protecting identities of mobile... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3415652