Method for asymmetric security

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S150000, C726S004000, C709S220000, C705S079000

Reexamination Certificate

active

07607006

ABSTRACT:
A method is disclosed for asymmetric security in data communications between two or more nodes. Asymmetric security within data communications refers to sending and receiving messages at different security levels. The method includes a receiving module, a transmission module, and a communication module. The receiving module receives a first message at a first security level from a first node. A security level may be defined by implementation of one or more security features, including encryption, digital signatures, and/or other security features. The transmission module transmits a second message at a second security level to the first node in response to receiving the first message. The first and second messages may be communicated during a single communication session. The communication module communicates the second security level to the first node. The communication may be directly between two nodes or may occur via a broker or other intermediate node.

REFERENCES:
patent: 5602916 (1997-02-01), Grube et al.
patent: 5615261 (1997-03-01), Grube et al.
patent: 5784463 (1998-07-01), Chen et al.
patent: 5935248 (1999-08-01), Kuroda
patent: 5940187 (1999-08-01), Berke
patent: 5960086 (1999-09-01), Atalla
patent: 6021203 (2000-02-01), Douceur et al.
patent: 6185612 (2001-02-01), Jensen et al.
patent: 6490679 (2002-12-01), Tumblin et al.
patent: 6567913 (2003-05-01), Ryan, Jr.
patent: 7137099 (2006-11-01), Knight et al.
patent: 7165179 (2007-01-01), Maruyama et al.
patent: 7236597 (2007-06-01), Elliott et al.
patent: 7257843 (2007-08-01), Fujita et al.
patent: 7269260 (2007-09-01), Adachi et al.
patent: 7350212 (2008-03-01), Lambert et al.
patent: 2001/0005883 (2001-06-01), Wray et al.
patent: 2002/0073313 (2002-06-01), Brown et al.
patent: 2002/0116619 (2002-08-01), Maruyama et al.
patent: 2002/0123325 (2002-09-01), Cooper
patent: 2003/0033349 (2003-02-01), Lambert et al.
patent: 2003/0074579 (2003-04-01), Della-Libera et al.
patent: 2003/0131245 (2003-07-01), Linderman
patent: 2003/0172167 (2003-09-01), Judge et al.
patent: 2004/0071137 (2004-04-01), He et al.
patent: 2004/0078334 (2004-04-01), Malcolm et al.
patent: 2004/0139314 (2004-07-01), Cook et al.
patent: 2004/0223615 (2004-11-01), Dhawan
patent: 2005/0015592 (2005-01-01), Lin
patent: 2006/0015932 (2006-01-01), Ballinger et al.
patent: 2006/0015933 (2006-01-01), Ballinger et al.
patent: 2006/0064736 (2006-03-01), Ahuja et al.
patent: 2006/0106938 (2006-05-01), Dini et al.
patent: 0409397 (1991-01-01), None
Son et al., abstract of “An adaptable security manager for real-time transactions”, 2000, Real-Time Systems, 2000. Euromicro RTS 2000. 12th Euromicro Conference.
By James Hart, IBM Software Group, “Connecting your applications without complex programming”, WebSphere Software, Sep. 2003.
Son, Zimmerman, Hansson “An adaptable security manager for real-time transactions”, p. 1-8.
By Anita Karve, “SSL and S-HTTP” Jan. 1, 1997; http://www.networkmagazine.com/shared/article/showArticle.jhtml?articleID=17601054.
By Dirk Reinshagen, “XML Messaging, Part 2, XML messaging the SOAP way”, http://www.javaworld.com/javaworld/jw-06-2001/jw-0622-xmlmessaging2—p.html.
“The 7 layers of the OSI model”, webopedia, http://webopedia.internet.com/quick—ref/OSI—Layers.asp.
“IBM Tivoli Access Manager for Business Integration Administration Guide” Overview, Version 5.1 SC23-4831-01, http://publib.boulder.ibm.com/trividd/td/ITAMFBI/SC23-4831-01/en—US/HTML/ADM51....
“IBM Tivoli Access Manager for Business Integration Administration Guide” Product Concepts, Version 5.1 SC23-4831-01, http://publib.boulder.ibm.com/trividd/td/ITAMFBI/SC23-4831-01/en—US/HTML/ADM51....
Reiner Sailer and Matthias Kabatnik “History Based Distributed Filtering—A Tagging Approach to Network-Level Access Control” IEEE (2000) pp. 373-382.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for asymmetric security does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for asymmetric security, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for asymmetric security will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4093847

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.