Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Reexamination Certificate
2004-09-23
2009-10-20
Vu, Kimyen (Department: 2435)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
C713S150000, C726S004000, C709S220000, C705S079000
Reexamination Certificate
active
07607006
ABSTRACT:
A method is disclosed for asymmetric security in data communications between two or more nodes. Asymmetric security within data communications refers to sending and receiving messages at different security levels. The method includes a receiving module, a transmission module, and a communication module. The receiving module receives a first message at a first security level from a first node. A security level may be defined by implementation of one or more security features, including encryption, digital signatures, and/or other security features. The transmission module transmits a second message at a second security level to the first node in response to receiving the first message. The first and second messages may be communicated during a single communication session. The communication module communicates the second security level to the first node. The communication may be directly between two nodes or may occur via a broker or other intermediate node.
REFERENCES:
patent: 5602916 (1997-02-01), Grube et al.
patent: 5615261 (1997-03-01), Grube et al.
patent: 5784463 (1998-07-01), Chen et al.
patent: 5935248 (1999-08-01), Kuroda
patent: 5940187 (1999-08-01), Berke
patent: 5960086 (1999-09-01), Atalla
patent: 6021203 (2000-02-01), Douceur et al.
patent: 6185612 (2001-02-01), Jensen et al.
patent: 6490679 (2002-12-01), Tumblin et al.
patent: 6567913 (2003-05-01), Ryan, Jr.
patent: 7137099 (2006-11-01), Knight et al.
patent: 7165179 (2007-01-01), Maruyama et al.
patent: 7236597 (2007-06-01), Elliott et al.
patent: 7257843 (2007-08-01), Fujita et al.
patent: 7269260 (2007-09-01), Adachi et al.
patent: 7350212 (2008-03-01), Lambert et al.
patent: 2001/0005883 (2001-06-01), Wray et al.
patent: 2002/0073313 (2002-06-01), Brown et al.
patent: 2002/0116619 (2002-08-01), Maruyama et al.
patent: 2002/0123325 (2002-09-01), Cooper
patent: 2003/0033349 (2003-02-01), Lambert et al.
patent: 2003/0074579 (2003-04-01), Della-Libera et al.
patent: 2003/0131245 (2003-07-01), Linderman
patent: 2003/0172167 (2003-09-01), Judge et al.
patent: 2004/0071137 (2004-04-01), He et al.
patent: 2004/0078334 (2004-04-01), Malcolm et al.
patent: 2004/0139314 (2004-07-01), Cook et al.
patent: 2004/0223615 (2004-11-01), Dhawan
patent: 2005/0015592 (2005-01-01), Lin
patent: 2006/0015932 (2006-01-01), Ballinger et al.
patent: 2006/0015933 (2006-01-01), Ballinger et al.
patent: 2006/0064736 (2006-03-01), Ahuja et al.
patent: 2006/0106938 (2006-05-01), Dini et al.
patent: 0409397 (1991-01-01), None
Son et al., abstract of “An adaptable security manager for real-time transactions”, 2000, Real-Time Systems, 2000. Euromicro RTS 2000. 12th Euromicro Conference.
By James Hart, IBM Software Group, “Connecting your applications without complex programming”, WebSphere Software, Sep. 2003.
Son, Zimmerman, Hansson “An adaptable security manager for real-time transactions”, p. 1-8.
By Anita Karve, “SSL and S-HTTP” Jan. 1, 1997; http://www.networkmagazine.com/shared/article/showArticle.jhtml?articleID=17601054.
By Dirk Reinshagen, “XML Messaging, Part 2, XML messaging the SOAP way”, http://www.javaworld.com/javaworld/jw-06-2001/jw-0622-xmlmessaging2—p.html.
“The 7 layers of the OSI model”, webopedia, http://webopedia.internet.com/quick—ref/OSI—Layers.asp.
“IBM Tivoli Access Manager for Business Integration Administration Guide” Overview, Version 5.1 SC23-4831-01, http://publib.boulder.ibm.com/trividd/td/ITAMFBI/SC23-4831-01/en—US/HTML/ADM51....
“IBM Tivoli Access Manager for Business Integration Administration Guide” Product Concepts, Version 5.1 SC23-4831-01, http://publib.boulder.ibm.com/trividd/td/ITAMFBI/SC23-4831-01/en—US/HTML/ADM51....
Reiner Sailer and Matthias Kabatnik “History Based Distributed Filtering—A Tagging Approach to Network-Level Access Control” IEEE (2000) pp. 373-382.
Ahuja Pratima
Khangaonkar Manoj
Zhang Kai Mike
International Business Machines - Corporation
Kunzler & McKenzie
Shan April Y
Vu Kimyen
LandOfFree
Method for asymmetric security does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method for asymmetric security, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for asymmetric security will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4093847