Information security – Access control or authentication – Network
Reissue Patent
2007-03-06
2009-11-17
Jung, David Y (Department: 2434)
Information security
Access control or authentication
Network
C726S005000, C726S003000
Reissue Patent
active
RE040992
ABSTRACT:
A method and system for authorizing communications sent from a sender to a recipient. The authorization system receives a communication sent from a sender to a recipient. The authorization system determines whether that sender is authorized to send communications to that recipient. If the authorization system determines that the sender is not authorized, then the authorization system sends an authorization communication to the sender. The authorization communication requests authorization information from the sender. When the authorization system receives the authorization information, it determines whether the information is correct. If correct, then the authorization system indicates that the sender is authorized and forwards the communication to the recipient. When a subsequent communication sent from the sender to the recipient is received, the authorization system may automatically determine that the sender is authorized and forward the communication to the recipient without re-contacting the sender.
REFERENCES:
patent: 5604792 (1997-02-01), Solomon et al.
patent: 6199102 (2001-03-01), Cobb
patent: 6691156 (2004-02-01), Drummond et al.
patent: 6868498 (2005-03-01), Katsikas
A prototype of security for active networks, Kou Yanan; Li Zengzhi; Liao Zhigang; Algorithms and Architectures for Parallel Processing, 2002. Proceedings. Fifth International Conference on Oct. 23-25, 2002 pp. 338-341.
Practical broadcast authentication in sensor networks, Liu, D.; Ning, P.; Zhu, S.; Jajodia, S.; Mobile and Ubiquitous Systems: Networking and Services, 2005, MobiQuitous 2005. The Second Annual International Conference on Jul. 17-21, 2005 pp. 118-129.
A Key Management and Authenication Model for Ad hoc Network, Jianwei Liu; Chun Liu; Keqiang Guo; Personal, Indoor and Mobile Radio Communications, 2007, PIMRC 2007. IEEE 18th International Symposium on Sep. 3-7, 2007 pp. 1-5.
Sorkin, D., “Technical and Legal Approaches to Unsolicited Electronic Email,” U.S.F. L. Rev. 325, Apr. 2001, pp. 325-330 and 347-354.
Habraken, “Lesson 9, Creating Email,” Teach Yourself Microsoft Outlook 98 in 10 minutes, Sams Publishing, Apr. 1998, pp. 1-5.
Wikipedia, “Letter,” Encyclopedia, available at http://en.wikipedia.org/wiki/Letter, p. 1.
Angwin, J., “Postal Service to deliver the e-mail,” The Wall Street Journal Online, Jul. 30, 2000, pp. 1-7.
Automatic access controls in the Defense Message System (DMS); Dzierzawski, D.; Military Communications Conference Proceedings, 1999, MII.COM 1999, IEEE vol. 2, Oct. 31-Nov. 3, 1999 pp. 1262-1266, vol. 2.
Establishing a secure multicast group for remote software delivery; Lin Han et al.; Enabling Technologies: Infrastructure for Collaborative Enterprises, Proceedings. IEEE 8th International Workshops on Jun. 16-18, 1999 pp. 194-195.
Authorization in the digital library secure access to services across enterprise boundaries; Ching et al.; Research and Technology Advances in Digital Libraries, Proceedings of the Third Forum on May 13-15, 1996 pp. 110-119.
Cartmell Brian R.
Elliott Cameron S.
LandOfFree
Method and system for blocking unwanted communications does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system for blocking unwanted communications, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for blocking unwanted communications will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4070719