Gemalto SA

France

Back to Profile

1-22 of 22 for Gemalto SA Sort by
Query
Patent
United States - USPTO
Aggregations Reset Report
IPC Class
H04L 29/06 - Communication control; Communication processing characterised by a protocol 5
H04W 4/00 - Services specially adapted for wireless communication networksFacilities therefor 5
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure 4
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols 4
H04W 12/06 - Authentication 4
See more
Found results for  patents

1.

Method to counter DCA attacks of order 2 and higher on table-based implementations

      
Application Number 16337197
Grant Number 11201724
Status In Force
Filing Date 2017-09-22
First Publication Date 2019-07-25
Grant Date 2021-12-14
Owner GEMALTO SA (France)
Inventor Gouget, Aline

Abstract

The present invention relates to a method to counter DCA attacks of order 2 and higher order applied on an encoded table-based (TCabi,j) implementation of block-cipher of a cryptographic algorithm to be applied to a message (m), said method comprising the steps of: —translating a cryptographic algorithm block-cipher to be applied on a message (m) into a series of look-up tables (Tabi,j),—applying secret invertible encodings to get a series of look-up tables (TCi,j),—computing message-dependent masking values, comprising the computation of at least two shares of masking value (mmask1, mmask2) for the input of the table network based on at least two different message derivation functions (F1, F2),—re-randomizing the tables (TCi,j) using the computed message-dependent masking values (mmask1, mmask2),—computing rounds to be applied on the message (m) based on the randomized network of tables (TCi,j).

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems

2.

Method for accessing a roaming device and corresponding proxy network

      
Application Number 15540990
Grant Number 10015663
Status In Force
Filing Date 2015-12-21
First Publication Date 2018-01-04
Grant Date 2018-07-03
Owner GEMALTO SA (France)
Inventor Kuc, Jean-François

Abstract

A roaming device sends, through a visited network and a proxy network, to a home network, an identifier for a first subscription. The home network sends, through the proxy network, to the visited network, data relating to the first subscription. The proxy network sends to the home network a first temporary address. The visited network sends to the proxy network a second temporary address. The device activates a second subscription. The device sends, through the visited network and the proxy network, to the roaming provider network, an identifier for the second subscription. The roaming provider network sends, through the proxy network, to the visited network, data relating to the second subscription. The proxy network registers the first subscription identifier, the second subscription identifier, the first temporary address and the second temporary address. The proxy network sends to the roaming provider network the first temporary address.

IPC Classes  ?

  • H04W 8/12 - Mobility data transfer between location registers or mobility servers
  • H04W 8/02 - Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]Transfer of mobility data, e.g. between HLR, VLR or external networks
  • H04W 8/18 - Processing of user or subscriber data, e.g. subscribed services, user preferences or user profilesTransfer of user or subscriber data
  • H04W 8/06 - Registration at serving network Location Register, VLR or user mobility server
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04W 48/18 - Selecting a network or a communication service
  • H04M 15/00 - Arrangements for metering, time-control or time-indication

3.

UICCs embedded in terminals or removable therefrom

      
Application Number 15260899
Grant Number 09817993
Status In Force
Filing Date 2016-09-09
First Publication Date 2016-12-29
Grant Date 2017-11-14
Owner GEMALTO SA (France)
Inventor
  • Merrien, Lionel
  • Berard, Xavier
  • Girard, Pierre
  • Proust, Philippe
  • Vergnes, Fabrice
  • Faria, Frédéric
  • Imoucha, Franck

Abstract

The invention proposes several improvements related to the management of secure elements, like UICCs embedding Sim applications, these secure elements being installed, fixedly or not, in terminals, like for example mobile phones. In some cases, the terminals are constituted by machines that communicate with other machines for M2M (Machine to Machine) applications.

IPC Classes  ?

  • G06F 21/43 - User authentication using separate channels for security data wireless channels
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • H04W 8/24 - Transfer of terminal data
  • H04W 12/10 - Integrity
  • G06F 9/445 - Program loading or initiating
  • H04W 4/00 - Services specially adapted for wireless communication networksFacilities therefor
  • H04W 8/20 - Transfer of user or subscriber data
  • H04W 12/04 - Key management, e.g. using generic bootstrapping architecture [GBA]
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 12/06 - Authentication
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 9/08 - Key distribution
  • H04W 8/22 - Processing or transfer of terminal data, e.g. status or physical capabilities
  • H04B 1/3816 - Mechanical arrangements for accommodating identification devices, e.g. cards or chipsTransceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving with connectors for programming identification devices
  • H04W 12/08 - Access security
  • H04W 8/18 - Processing of user or subscriber data, e.g. subscribed services, user preferences or user profilesTransfer of user or subscriber data
  • H04W 84/04 - Large scale networksDeep hierarchical networks

4.

Method and device for managing a subscriber device

      
Application Number 14898598
Grant Number 09510189
Status In Force
Filing Date 2014-06-19
First Publication Date 2016-05-12
Grant Date 2016-11-29
Owner GEMALTO SA (France)
Inventor
  • Chiaramello, Daniel
  • Bordas, Aurelia
  • Lecuyer, Christophe
  • Zannin, François
  • Kuc, Jean-François
  • Mavrakis, Daniel
  • Troadec, Hervé

Abstract

A method for managing a subscriber device includes a first detection step in which a first device detects a first status relating to a presence of a subscriber device under a radio coverage of a home mobile network. In the first detection step, the first device intercepts a message for requesting whether the subscriber device has or has not been stolen, as request message, the request message originating from a Mobile Switching Center relating to the home mobile network and being addressed to an Equipment Identity Register relating to the home mobile network. A corresponding first device is also disclosed.

IPC Classes  ?

  • H04M 1/66 - Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
  • H04W 8/22 - Processing or transfer of terminal data, e.g. status or physical capabilities
  • H04M 15/00 - Arrangements for metering, time-control or time-indication
  • H04W 12/12 - Detection or prevention of fraud
  • H04W 48/18 - Selecting a network or a communication service
  • H04W 8/00 - Network data management
  • H04W 8/10 - Mobility data transfer between location register and external networks
  • H04W 8/02 - Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]Transfer of mobility data, e.g. between HLR, VLR or external networks
  • H04W 36/14 - Reselecting a network or an air interface
  • H04W 64/00 - Locating users or terminals for network management purposes, e.g. mobility management
  • H04W 92/24 - Interfaces between hierarchically similar devices between backbone network devices

5.

Non alterable structure including cryptographic material

      
Application Number 14651770
Grant Number 09680638
Status In Force
Filing Date 2013-12-03
First Publication Date 2015-10-29
Grant Date 2017-06-13
Owner GEMALTO SA (France)
Inventor
  • Detcheverry, Frank
  • Lambert, Patrick
  • Poplin, Fabien

Abstract

The present invention relates to a method to build a non-alterable structure and to such a non-alterable structure including data relative to a set of cryptographic material generated randomly or derived from a secret key linked to a business use, the non-alterable structure being intended to be transferred from a first entity to a second entity, the entities sharing at least an encryption/decryption key and a signature key, the structure comprising at least business data relative to the intended use of cryptographic material, an encrypted protection key encrypted with the encryption key, an encrypted set of cryptographic material encrypted with the protection key, a signature of the set of cryptographic material, the protection key and the data relative to the intended use of cryptographic material signed with the signature key.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • H04L 9/08 - Key distribution
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

6.

Method for registering at least one public address in an IMS network, and corresponding application

      
Application Number 14413835
Grant Number 09854046
Status In Force
Filing Date 2013-07-11
First Publication Date 2015-08-20
Grant Date 2017-12-26
Owner GEMALTO SA (France)
Inventor
  • Baudouin, Julien
  • Fine, Jean-Yves

Abstract

The invention relates, in particular, to a method for registering at least one public address in an IMS network including a terminal that interacts with a security element. According to the invention, the security element includes an application that invites the user of the terminal, upon the occurrence of an event, to enter a public address, selected by the user, via the man/machine interface of the terminal, the application transmitting the public address, accompanied by at least one identifier of the security element, to a remote network via the terminal such that the remote network associates the public address with the identifier.

IPC Classes  ?

  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04W 8/04 - Registration at HLR or HSS [Home Subscriber Server]
  • H04W 12/06 - Authentication
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

7.

Method for initiating an OTA session

      
Application Number 14369373
Grant Number 09402180
Status In Force
Filing Date 2012-12-26
First Publication Date 2015-08-06
Grant Date 2016-07-26
Owner GEMALTO SA (France)
Inventor
  • Merrien, Lionel
  • Amiel, Patrice
  • Preulier, Eric

Abstract

The invention relates to a method for initiating an OTA session in a mobile radio communication network at the request of a user of a mobile terminal. The OTA session is established between the mobile terminal and a remote OTA server, the mobile terminal including a security element such as a UICC card. According to the invention, the method comprises: i) entering a special code using the man/machine interface of said mobile terminal; ii) said security element intercepting said special code; and iii) opening said OTA session between said mobile terminal and said remote server in a secure mode.

IPC Classes  ?

  • H04W 12/06 - Authentication
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 4/00 - Services specially adapted for wireless communication networksFacilities therefor

8.

Method for attaching a roaming telecommunication terminal to a visited operator network

      
Application Number 14412713
Grant Number 09668119
Status In Force
Filing Date 2013-07-01
First Publication Date 2015-07-09
Grant Date 2017-05-30
Owner GEMALTO SA (France)
Inventor
  • Tuilier, Edmond
  • Kuc, Jean-François

Abstract

The invention concerns a method for attaching a roaming telecommunication terminal to a visited network, the terminal having a security element. The method includes transmitting from the home network to the terminal a rejection message that is function of the features of the terminal and the security element.

IPC Classes  ?

  • H04W 4/00 - Services specially adapted for wireless communication networksFacilities therefor
  • H04W 8/02 - Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]Transfer of mobility data, e.g. between HLR, VLR or external networks
  • H04W 60/06 - De-registration or detaching
  • H04W 76/02 - Connection set-up
  • H04W 8/12 - Mobility data transfer between location registers or mobility servers

9.

Cryptographic method for protecting a key hardware register against fault attacks

      
Application Number 14363887
Grant Number 09544132
Status In Force
Filing Date 2012-11-30
First Publication Date 2014-10-09
Grant Date 2017-01-10
Owner GEMALTO SA (France)
Inventor
  • Salgado, Stephanie
  • Perion, Fabrice

Abstract

The present invention relates to cryptographic method that are resistant to fault injection attacks, to protect the confidentiality and the integrity of secret keys. For that, the invention describes a method to protect a key hardware register against fault attack, this register being inside an hardware block cipher BC embedded inside an electronic component, said component containing stored inside a memory area a cryptographic key K, characterized in that it comprises following steps: A.) loading the key Kram inside said register; B.) computing a value X such as K=BC(K,X); C.) after at least one sensitive operation, computing a value V such as V=BC(K,X); D.) matching the value V with the key Kram value stored in the memory area; E.) if the matching is not ok detecting that a fault occurs.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

10.

Method for exporting on a secure server data comprised on a UICC comprised in a terminal

      
Application Number 13991689
Grant Number 09294919
Status In Force
Filing Date 2011-12-05
First Publication Date 2014-05-01
Grant Date 2016-03-22
Owner GEMALTO SA (France)
Inventor
  • Merrien, Lionel
  • Berard, Xavier

Abstract

A method for exporting on a UICC in a terminal. An export request signed by the UICC, is transmitted by the terminal to a secure server. The server verifies the signed export request by comparing the signature and the identity of the UICC. The server sends a signed export certificate to the UICC via the terminal. An export package containing the data is prepared, signed and encrypted by the UICC, and sent to the terminal. The terminal transmits the export package to the server. The server signs an acknowledgment message and transmits it to the UICC via the terminal. In the UICC, the data that have been exported is destroyed, and a signed acknowledge message is sent to the server via the terminal. The server makes the data available for a further transfer to a new terminal or UICC.

IPC Classes  ?

  • H04W 12/06 - Authentication
  • H04W 4/00 - Services specially adapted for wireless communication networksFacilities therefor

11.

System and method for securely using multiple subscriber profiles with a security component and a mobile telecommunications device

      
Application Number 13814067
Grant Number 09647984
Status In Force
Filing Date 2011-08-04
First Publication Date 2013-10-24
Grant Date 2017-05-09
Owner GEMALTO SA (France)
Inventor
  • Merrien, Lionel
  • Barbe, Serge

Abstract

System and method for allowing a mobile telecom device to use multiple profiles. The system and method includes operating a security function to perform a cryptographic operation on a profile using a cryptography key of the security function thereby producing a cryptographically protected profile, storing the cryptographically protected profile, and activating the cryptographically protected profile by operating the security function to verify that the cryptographically protected profile has been cryptographically protected using the cryptography key of the security function, and upon verifying that the cryptographically protected profile has been protected using the cryptography key of the security function, activating the cryptographically protected profile.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 4/00 - Services specially adapted for wireless communication networksFacilities therefor
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04W 12/08 - Access security
  • H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

12.

Mobile device with independent battery and radiofrequency communication interface

      
Application Number 13636376
Grant Number 10049316
Status In Force
Filing Date 2011-03-16
First Publication Date 2013-01-10
Grant Date 2018-08-14
Owner GEMALTO SA (France)
Inventor
  • Thill, Michel
  • Gravez, Pierre
  • Antoine, Matthieu

Abstract

The invention is aimed at optimizing the life of the power supply of mobile equipment with a radiofrequency communication interface by switching off the power to it when it reaches a given state. A mobile device (102) has a battery (206), a radiofrequency circuit (201) allowing the mobile device (102) to exchange information with a host device (101). The mobile device (102) comprises an electronic switch (202) connected between the battery (206) and at least the radiofrequency circuit (201), where the switch makes it possible to supply power or not to the radiofrequency circuit. A power control circuit (203) is capable of controlling the electronic switch (202) so that it ceases to power the radiofrequency circuit as soon a break in communication is detected.

IPC Classes  ?

  • G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
  • G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
  • H04W 52/02 - Power saving arrangements

13.

Dynamic application name display

      
Application Number 13508230
Grant Number 09600954
Status In Force
Filing Date 2010-11-05
First Publication Date 2012-12-20
Grant Date 2017-03-21
Owner GEMALTO SA (France)
Inventor Iversen, Shaun

Abstract

The present invention relates to a method for providing data during an Application Selection process from a processing device to an interface device, wherein it comprises a step of modifying dynamically at least a part of said data from transaction to transaction, said at least part of data being a dynamic data.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor
  • G07F 7/10 - Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card together with a coded signal
  • G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
  • G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs

14.

Method for securely creating a new user identity within an existing cloud account in a cloud computing system

      
Application Number 13095149
Grant Number 08578452
Status In Force
Filing Date 2011-04-27
First Publication Date 2012-11-01
Grant Date 2013-11-05
Owner Gemalto SA (France)
Inventor Lu, Hongqian Karen

Abstract

The invention proposes a method for securely creating a new user identity within an existing cloud account in a cloud computing system, said cloud computing system providing cloud services and resources, said cloud account comprising cloud user identities, said method comprising enabling a first user to access the cloud services and resources using a first security device, wherein it comprises authenticating to the first security device, creating a new user identity within the cloud account for a second user using the first security device.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

15.

Process for securing an identification document and secure identification document

      
Application Number 13318146
Grant Number 10259256
Status In Force
Filing Date 2010-04-30
First Publication Date 2012-03-01
Grant Date 2019-04-16
Owner GEMALTO SA (France)
Inventor Nikkila, Jarmo

Abstract

The invention relates to a process for securing an identification document and to a secure identification document. More particularly, the process uses UV sensitive ink(s) to define a pattern only visible under UV radiations, by printing a first layer of a transparent ablation varnish (13), printing a layer (14) of UV sensitive ink(s) over said first layer of transparent ablation varnish, removing parts of the layer (14) of UV sensitive ink(s), by means of a laser beam, some remaining areas of said UV sensitive ink(s) defining said pattern to be revealed in color under UV radiations, and some areas, where the UV sensitive ink(s) has been removed and the laser beam has interacted with the ablation varnish (13), absorbing the UV radiations with effect of creating black color. Other systems and methods are disclosed.

IPC Classes  ?

  • B42D 25/387 - Special inks absorbing or reflecting ultraviolet light
  • B42D 25/351 - Translucent or partly translucent parts, e.g. windows
  • B42D 25/435 - Marking by removal of material using electromagnetic radiation, e.g. laser
  • B42D 25/00 - Information-bearing cards or sheet-like structures characterised by identification or security featuresManufacture thereof
  • B41M 3/14 - Security printing
  • B41M 5/24 - Ablative recording, e.g. by burning marksSpark recording
  • B42D 25/43 - Marking by removal of material

16.

Radiofrequency communication device with an offset antenna

      
Application Number 13130067
Grant Number 08670803
Status In Force
Filing Date 2009-11-24
First Publication Date 2011-09-22
Grant Date 2014-03-11
Owner Gemalto SA (France)
Inventor
  • Schuh, Jean-Francois
  • Bonnet, Didier

Abstract

The invention relates to a radiofrequency communication device that comprises a gripping beating body having a surface; an electronic and/or electric circuit extending in the gripping beating body; at least one antenna provided in the vicinity of the electronic circuit. The device includes a connection circuit for connection to the antenna, that is provided at least partially in the gripping beating body and extends from the electronic circuit up to connection points of the antenna, said antenna connection points being accessible from the outside of the beating body.

IPC Classes  ?

  • H04M 1/00 - Substation equipment, e.g. for use by subscribers

17.

Zero divisors protecting exponentiation

      
Application Number 13057703
Grant Number 08639944
Status In Force
Filing Date 2009-07-30
First Publication Date 2011-06-02
Grant Date 2014-01-28
Owner Gemalto SA (France)
Inventor Vigilant, David

Abstract

D mod N against invasive attacks. The invention comprises applying a mask to the message m, and after the modular exponentiation is carried out, in verifying that the exponentiation was not altered thanks to properties introduced by the mask.

IPC Classes  ?

18.

Method for protecting the access to an electronic object connected to a computer

      
Application Number 12744275
Grant Number 08316437
Status In Force
Filing Date 2008-11-21
First Publication Date 2010-11-11
Grant Date 2012-11-20
Owner Gemalto SA (France)
Inventor Joffray, Olivier

Abstract

An electronic object carries out at least one operation on one element of an application installed in a computer. The method includes transmitting a random value of the electronic object to the computer, when such operation is completed, while maintaining in the electronic object the right of access to the electronic object by the user; storing the random value in the computer; giving access to the electronic object by the application and, in the case of a new access to the electronic object by the application; transmitting the random values stored in the computer to the electronic object; comparing, in the electronic object, the random value received from the computer with the random value previously transmitted to the computer; and, in case the random values are matching, re-establishing the previously acquired rights in the electronic object and thereby giving the application the access to the electronic object.

IPC Classes  ?

  • G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures

19.

Mobile telecommunication selecting method

      
Application Number 12738825
Grant Number 08688116
Status In Force
Filing Date 2008-10-16
First Publication Date 2010-11-04
Grant Date 2014-04-01
Owner Gemalto SA (France)
Inventor
  • Seif, Jacques
  • Dubois, Christophe

Abstract

The invention relates to a method to select a telecommunication network with a mobile equipment (10,20) comprising a mobile communication device (10) and a personal token (20), the method operating an algorithm (25) which selects at least one network to be operated by the mobile equipment among a plurality of available networks, wherein in the method, the algorithm is stored and run in the personal token (20).

IPC Classes  ?

  • H04J 3/17 - Time-division multiplex systems in which the transmission channel allotted to a first user may be taken away and re-allotted to a second user if the first user becomes inactive, e.g. TASI

20.

Data medium, identity document and corresponding security-protection method

      
Application Number 12084941
Grant Number 08448853
Status In Force
Filing Date 2006-11-13
First Publication Date 2009-09-03
Grant Date 2013-05-28
Owner Gemalto SA (France)
Inventor Lesur, Jean-Luc

Abstract

A data medium has at least first and second parts joined together, each having an outer face turned towards the outside and a hidden inner face. At least one of the first and second parts bears, at a certain distance from the outer faces, hidden markings corresponding to personalization data. This first part and preferably the second part of the medium are, at least locally, opaque with respect to through-transmission of laser radiation liable to modify the hidden markings.

IPC Classes  ?

  • G06K 19/00 - Record carriers for use with machines and with at least a part designed to carry digital markings

21.

Integer division method secure against covert channel attacks

      
Application Number 10534873
Grant Number 08233614
Status In Force
Filing Date 2003-11-13
First Publication Date 2006-06-22
Grant Date 2012-07-31
Owner Gemalto SA (France)
Inventor
  • Joye, Marc
  • Villegas, Karine

Abstract

n of an updated datum (b or /b) or a dummy datum (c or /c) followed by the addition of the datum updated with word A.

IPC Classes  ?

  • H04K 1/00 - Secret communication
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • H04L 9/28 - Arrangements for secret or secure communicationsNetwork security protocols using particular encryption algorithm

22.

Portable device for securing packet traffic in a host platform

      
Application Number 10471562
Grant Number 08250624
Status In Force
Filing Date 2003-09-12
First Publication Date 2004-05-06
Grant Date 2012-08-21
Owner Gemalto SA (France)
Inventor Lamotte, Thierry

Abstract

A device, such as a chip card, is connected to a host platform that is linked to a packet network such as the Internet. The device detects security policy designation parameters in packets leaving and entering the platform and processes the packets according to stored security policies designated by the designation parameters detected. The security information linked to a user can therefore be moved from one platform to another and it is not processed by the platform. Security policies are managed by a server with which the device can initiate a communication when no security policy corresponding to the policy designation parameters detected in a packet is recognized, so that the server can assist the device in negotiating a security policy.

IPC Classes  ?

  • G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions