Abstract: A transmitting device (100) transmits a first packet, comprising a second encryption vector, that is encrypted using a first encryption vector. The transmitting device transmits a second packet that is encrypted using the second encryption vector if an acknowledgement message is received within a predetermined time after transmitting the first packet; otherwise, the first packet is re-transmitted. Upon receipt of the first packet, a receiving device (102) decrypts the first packet using the first encryption vector and transmits the acknowledgement message. Upon receipt of the second packet; the receiving device attempts to decrypt a portion of the second packet using the first and second encryption vectors. If the portion of the second packet was successfully decrypted using the first encryption vector, the receiving device re-transmits the acknowledgement message for the first packet; otherwise, it transmits an acknowledgement message for the second packet.
Type:
Grant
Filed:
July 17, 2003
Date of Patent:
October 31, 2006
Assignee:
Motorola, Inc.
Inventors:
Shmuel Silverman, Robert J. Corke, Ron Rotstein
Abstract: This invention provides a key distribution system for protecting route-update notifications which overcomes the problem of scalability in the processing of authentication information and achieves a shortening of the time required to verify legitimacy. Its context is a key distribution system for protecting route-update notifications, which distributes, to the routers in a mobile communication network, the authentication information established for mobile terminals, which is used by the routers to authenticate mobile terminal route-update notifications that are communicated from the mobile terminals after encryption. In this context, the invention comprises a top-level router for managing the authentication information of all mobile terminals and for distributing it in response to requests from the routers.
Abstract: Various embodiments of systems and methods for implementing filter-based attribute value access control are disclosed. In one embodiment, a method involves designating a location in the directory server, providing attribute related data that includes a filter expression, and selectively controlling access to an entry situated at the designated location using the filter expression in the attribute related data. For example, access to an attribute of the entry may be denied if a criterion defined by the filter expression associated with the attribute is not met by a first value of the attribute.
Abstract: A method and apparatus for forming a security enclosure having improved fold retention. In particular, the enclosure is formed by folding a flexible tamper respondent cloth around an electronic assembly. An adhesive on the inner folded surfaces of the cloth temporarily retains the folds. The enclosure is then exposed to heat and pressure to promote improved adhesion strength of the adhesive, thereby improving fold retention.
Type:
Grant
Filed:
September 1, 2000
Date of Patent:
February 28, 2006
Assignee:
International Business Machines Corporaton
Inventors:
Giuseppe Butturini, Mario L. Cesana, Donald S. Farquhar, Fulvio Fontana