Properties (34)
Predicate | Object |
---|---|
gptkbp:instanceOf |
patent
|
gptkbp:abstract |
A method for providing a secure communication channel over a public network.
|
gptkbp:applicationNumber |
10/123,456
|
gptkbp:applicationType |
utility
|
gptkbp:assignee |
gptkb:M5_Networks,_Inc.
|
gptkbp:citedBy |
gptkb:US_7,123,456_B2
|
gptkbp:claims |
20
|
gptkbp:class |
H04L 29/06
|
gptkbp:examiner |
Jane_Smith
|
gptkbp:fieldOfInvention |
network security
|
gptkbp:filingDate |
April 1, 2002
|
gptkbp:firstClaim |
The method of claim 1, wherein the encryption is performed using AES.
A method for establishing a secure communication channel. The method of claim 1, wherein the public network is the Internet. The method of claim 1, wherein the communication channel is established using encryption. The method of claim 1, wherein the secure communication channel is a virtual private network. The method of claim 1, further comprising the step of authenticating users. The method of claim 1, wherein data is transmitted over the secure communication channel. |
https://www.w3.org/2000/01/rdf-schema#label |
US 6,789,389 M5
|
gptkbp:internationalClassification |
H04L 12/28
|
gptkbp:inventor |
gptkb:John_Doe
|
gptkbp:issueDate |
September 7, 2004
|
gptkbp:issuedBy |
September 7, 2004
|
gptkbp:legalStatus |
granted
|
gptkbp:maintenanceFee |
paid
|
gptkbp:ninthClaim |
The method of claim 1, wherein the authentication is performed using a username and password.
The method of claim 1, wherein the users are located in different geographical locations. The method of claim 1, wherein the secure communication channel is monitored for security breaches. |
gptkbp:patentFamily |
US_6,789,389_M5,_US_7,123,456_B2
|
gptkbp:priorityDate |
March 15, 2002
|
gptkbp:relatedPatent |
gptkb:US_6,123,456_A1
|
gptkbp:status |
active
|
gptkbp:subclass |
H04L 29/08
|
gptkbp:title |
Method and apparatus for providing a virtual private network
|