METHOD FOR CONTROLLING PROTECTED COMMUNICATION LINE IN DYNAMIC NETWORKS Russian patent published in 2007 - IPC G06F21/20 

Abstract RU 2297037 C2

FIELD: technology for improving lines for transferring audio/video signals and data in dynamic networks and computer environments and, in particular, setting up communication lines with encryption and protection means and controlling thereof in such environment.

SUBSTANCE: invention discloses method for setting up protected communication lines for transferring data and controlling them by means of exchanging keys for protection, authentication and authorization. Method includes setup of protected communication line with limited privileges with usage of identifier of mobile computing block. This is especially profitable is user of mobile block does not have information identifying the user and fit for authentication. Also, advantage of provision by user of information taken by default, identifying the user, is that it initiates intervention of system administrator instead of refusal based on empty string. This decentralized procedure allows new users to access the network without required physical presence in central office for demonstration of their tickets.

EFFECT: simplified setup of dynamic protected lines of communication between client computer and server device.

6 cl, 10 dwg

Similar patents RU2297037C2

Title Year Author Number
STABLE AUTHORISATION CONTEXT BASED ON EXTERNAL IDENTIFICATION 2008
  • Mauehrs Dehvid R.
  • Dubrovkin Dehniehl
  • Lejbehn Roj
  • Shmidt Donal'D I.
  • Visvanatan Rehm
  • Brezak Dzhon I.
  • Uord Richard B.
RU2390838C2
STABLE AUTHORISATION CONTEXT BASED ON EXTERNAL IDENTIFICATION 2003
  • Mauehrs Dehvid R.
  • Dubrovkin Dehniehl
  • Lejbehn Roj
  • Shmidt Donal'D I.
  • Visvanatan Rehm
  • Brezak Dzhon I.
  • Uord Richard B.
RU2337399C2
POLICY-CONTROLLED DELEGATION OF ACCOUNT DATA FOR SINGLE REGISTRATION IN NETWORK AND SECURED ACCESS TO NETWORK RESOURCES 2007
  • Medvinskij Gennadij
  • Ilak Kristian
  • Khagiu Kostin
  • Parsonz Dzhon Eh.
  • Fatkhalla Mokhamed Ehmad Ehl' Din
  • Lich Pol Dzh.
  • Kamel' Tarek Bukhaa Ehl'-Din Makhmud
RU2439692C2
PEER-TO-PEER AUTHENTICATION AND AUTHORISATION 2005
  • Gupta Rokhit
  • Manion Todd R.
  • Rao Ravi T.
  • Singkhal Sandip K.
RU2390945C2
DIGITAL RIGHTS MANAGEMENT (DRM) SERVER REGISTRATION/SUBREGISTRATION IN DRM ARCHITECTURE 2004
  • Kostal Gregori
  • Born Stiv
  • Krishnasvami Vinaj
RU2348073C2
METHOD OF AUTHORISING OPERATION TO BE PERFORMED ON TARGETED COMPUTING DEVICE 2014
  • Stern Allon Dzh.
RU2675902C2
MOBILE COMMUNICATION DEVICE AND METHOD FOR OPERATION THEREOF 2014
  • Stern Allon Dzh.
  • Khejli Dzhon
RU2673969C2
PUBLICATION OF DIGITAL CONTENT IN CERTAIN SPACE, SUCH AS ORGANISATION, IN COMPLIANCE WITH SYSTEM OF DIGITAL RIGHTS MANAGEMENT 2004
  • Narin Attila
  • Venkatesh Chandramouli
  • Birum Frehnk D.
  • Demello Marko A.
  • Vaksman Piter Dehvid
  • Malik Prashant
  • Malaviarachchi Rushmi U.
  • Born Stiv
  • Krishnasvami Vinaj
  • Rozenfel'D Evgenij Judzhin
RU2344469C2
MOBILE COMMUNICATION DEVICE AND METHOD FOR OPERATION THEREOF 2014
  • Stern Allon Dzh.
RU2672712C2
INCREASED LEVEL OF AUTOMATION DURING INITIALISATION OF COMPUTER SYSTEM FOR NETWORK ACCESS 2003
  • Krantts Anton V.
  • Mur Timoti M.
  • Abrakham Dalen M.
  • Gudehj Shej
  • Bakhl Pradip
  • Aboba Bernard D.
RU2342700C2

RU 2 297 037 C2

Authors

Mur Timoti M.

Ajjagari Arun

Shetkh Sachin K.

Bakhl Pradip

Dates

2007-04-10Published

2001-02-23Filed