Resources Contact Us Home
Mobile computer and method of packet encryption and authentication in mobile computing based on security policy of visited network

Image Number 6 for United States Patent #6170057.

A mobile computer and a packet encryption and authentication method which are capable of controlling an activation of a packet encryption and authentication device belonging to the mobile computer according to the security policy at the visited network of the mobile computer. The mobile computer is provided with a packet encryption and authentication unit having an ON/OFF switchable function for applying an encryption and authentication processing on input/output packets of the mobile computer. Then, one of the packet encryption and authentication unit and an external packet processing device is selectively controlled to carry out the encryption and authentication processing on the input/output packets, where the external packet processing device being provided in a visited network at which the mobile computer is located and having a function for relaying packets transferred between a computer located in the visited network and a computer located in another network by applying the encryption and authentication processing.

  Recently Added Patents
System and method for detecting states
Motor and disk drive apparatus
Semiconductor device comprising a Fin and method for manufacturing the same
Pelvic registration device for medical navigation
System and method for distributing emergency data messages to public safety answering points in a balanced manner
Morphinan compounds
Micro-fluidic device
  Randomly Featured Patents
Pharmaceutical composition for external use
Process to produce 19-nor-10.beta.-carboxylic acids by fungal oxidation of 6-substituted-.DELTA.6-pregnanes
Emergency auto visual communication system
System and method for effectively performing a scene rectification procedure
RFID handshaking
Rigid closed cell polyisocyanate based foams for use as positive flotation materials in watercraft
Parallel intrusion search in hierarchical VLSI designs with substituting scan line
Optical imaging system
Electrical connector with embedded terminals
Trolleybus current collector system enabling common line passing