KEY-BASED ENCRYPTION

There is disclosed a method, apparatus, computer program and computer program product for facilitating secure data communications. The secure data communications is carried out using a secret key for encrypting data flowing between first and second entities over a communications link. First it is de...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: RUMSEY JONATHAN, HARRAN RICHARD MICHAEL WYN, HORAN MICHAEL
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator RUMSEY JONATHAN
HARRAN RICHARD MICHAEL WYN
HORAN MICHAEL
description There is disclosed a method, apparatus, computer program and computer program product for facilitating secure data communications. The secure data communications is carried out using a secret key for encrypting data flowing between first and second entities over a communications link. First it is determined that the communications link has been idle. Once it is determined that there is now data to flow over the previously idle communications link, the generation of a new secret key is initiated. This new secret key is then used for encrypting data sent between the first and the second entities over the communications link. ® KIPO & WIPO 2007
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_KR20070003862A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>KR20070003862A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_KR20070003862A3</originalsourceid><addsrcrecordid>eNrjZBDxdo3UdXIMdnVRcPVzDooMCPH09-NhYE1LzClO5YXS3AzKbq4hzh66qQX58anFBYnJqXmpJfHeQUYGBuYGBgbGFmZGjsbEqQIA7-Ufbw</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>KEY-BASED ENCRYPTION</title><source>esp@cenet</source><creator>RUMSEY JONATHAN ; HARRAN RICHARD MICHAEL WYN ; HORAN MICHAEL</creator><creatorcontrib>RUMSEY JONATHAN ; HARRAN RICHARD MICHAEL WYN ; HORAN MICHAEL</creatorcontrib><description>There is disclosed a method, apparatus, computer program and computer program product for facilitating secure data communications. The secure data communications is carried out using a secret key for encrypting data flowing between first and second entities over a communications link. First it is determined that the communications link has been idle. Once it is determined that there is now data to flow over the previously idle communications link, the generation of a new secret key is initiated. This new secret key is then used for encrypting data sent between the first and the second entities over the communications link. ® KIPO &amp; WIPO 2007</description><language>eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2007</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20070105&amp;DB=EPODOC&amp;CC=KR&amp;NR=20070003862A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20070105&amp;DB=EPODOC&amp;CC=KR&amp;NR=20070003862A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>RUMSEY JONATHAN</creatorcontrib><creatorcontrib>HARRAN RICHARD MICHAEL WYN</creatorcontrib><creatorcontrib>HORAN MICHAEL</creatorcontrib><title>KEY-BASED ENCRYPTION</title><description>There is disclosed a method, apparatus, computer program and computer program product for facilitating secure data communications. The secure data communications is carried out using a secret key for encrypting data flowing between first and second entities over a communications link. First it is determined that the communications link has been idle. Once it is determined that there is now data to flow over the previously idle communications link, the generation of a new secret key is initiated. This new secret key is then used for encrypting data sent between the first and the second entities over the communications link. ® KIPO &amp; WIPO 2007</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2007</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZBDxdo3UdXIMdnVRcPVzDooMCPH09-NhYE1LzClO5YXS3AzKbq4hzh66qQX58anFBYnJqXmpJfHeQUYGBuYGBgbGFmZGjsbEqQIA7-Ufbw</recordid><startdate>20070105</startdate><enddate>20070105</enddate><creator>RUMSEY JONATHAN</creator><creator>HARRAN RICHARD MICHAEL WYN</creator><creator>HORAN MICHAEL</creator><scope>EVB</scope></search><sort><creationdate>20070105</creationdate><title>KEY-BASED ENCRYPTION</title><author>RUMSEY JONATHAN ; HARRAN RICHARD MICHAEL WYN ; HORAN MICHAEL</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_KR20070003862A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2007</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>RUMSEY JONATHAN</creatorcontrib><creatorcontrib>HARRAN RICHARD MICHAEL WYN</creatorcontrib><creatorcontrib>HORAN MICHAEL</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>RUMSEY JONATHAN</au><au>HARRAN RICHARD MICHAEL WYN</au><au>HORAN MICHAEL</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>KEY-BASED ENCRYPTION</title><date>2007-01-05</date><risdate>2007</risdate><abstract>There is disclosed a method, apparatus, computer program and computer program product for facilitating secure data communications. The secure data communications is carried out using a secret key for encrypting data flowing between first and second entities over a communications link. First it is determined that the communications link has been idle. Once it is determined that there is now data to flow over the previously idle communications link, the generation of a new secret key is initiated. This new secret key is then used for encrypting data sent between the first and the second entities over the communications link. ® KIPO &amp; WIPO 2007</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_KR20070003862A
source esp@cenet
subjects ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title KEY-BASED ENCRYPTION
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T11%3A32%3A29IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=RUMSEY%20JONATHAN&rft.date=2007-01-05&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EKR20070003862A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true