Information security – Access control or authentication – Network
Reexamination Certificate
2003-04-11
2009-08-04
Jung, David Y (Department: 2434)
Information security
Access control or authentication
Network
C726S003000, C380S277000
Reexamination Certificate
active
07571469
ABSTRACT:
A terminal for controlling communication can include a receiving unit configured to receive a key to be assigned to a requesting terminal for communication, a processing unit configured to include an indication of assigned communication keys, and a transmission unit configured to transmit the communication request to a communication control functionality.
REFERENCES:
patent: 6310538 (2001-10-01), Boucher
patent: 6338140 (2002-01-01), Owens et al.
patent: 1 178 644 (2002-02-01), None
patent: WO 00/74345 (2000-12-01), None
Fully-fledged two-way public key authentication and key agreement for low-cost terminals Beller, M.J.; Yacobi, Y.; Electronic Letters vol. 29, Issue 11, May 27, 1993 pp. 999-1001.
The private key capacity region for three terminals Ye, C.; Narayan, P.; Information Theory, 2004. ISIT 2004. Proceedings. International Symposium on Jun. 27-Jul. 2, 2004 p. 46.
Secrecy capacities for multiple terminals Csiszar, I.; Narayan, P.; Information Theory, IEEE Transactions on vol. 50, Issue 12, Dec. 2004 pp. 3047-3061.
http://www.mobiletv.nokia.cim/solutions/mbs/files/ipdc22—service—protection.pdf, as printed in year 2007.
http:/
ews.zdnet.co.uk/security/o, 1000000189,2084560,00.htm, as printed in year 2007.
http://www.w3.org/2000/12/drm-ws/pp/cloakware.html, year 2000.
W. Kellerer, P. Sites, and J. Eberspacher “IP Based Enhanced Data Casting Services Over Radio Broadcast Networks,” Proc. IEEE ECUMN, Colmar, France, Oct. 2000, pp. 195--203.
The sharing session key component (SSKC) algorithm for end-to-end secure wireless communication Hsiao-Kuang Wu; Shu-Ching Yang; Yung-Tai Lin; Security Technology, 2000. Proceedings. IEEE 34th Annual 2000 International Carnahan Conference on Oct. 23-25, 2000 pp. 242 - 250.
A secure and efficient conference scheme for mobile communications Xun YI; Chee Kheong Siew; CHik How Tan; Vehicular Technology, IEEE Transactions on vol. 52, Issue 4, Jul. 2003 pp. 784 - 793.
An Effiecient Mobile Authentication Scheme for Wireless Networks Caimu Tang; Wu, D.O.; Wireless Communication, IEEE Transactions on vol. 7, Issue 4, Apr. 2008 pp. 1408 - 1416.
Haverinen, H. et al.; “Cellular Access Control and Charging for Mobile Operator Wireless Local Area Networks”, XP-001143468, IEEE Wireless Communications, Dec. 2002.
Digital Rights Management and Superdistribution of Mobile Content, Nokia, 2001, pp. 2-7.
Jung David Y
Nokia Corporation
Squire Sanders & Dempsey L.L.P.
LandOfFree
Method for communication control in a communication network,... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method for communication control in a communication network,..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for communication control in a communication network,... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4090262