http://rdf.ncbi.nlm.nih.gov/pubchem/patent/EP-0642277-A2

Outgoing Links

Predicate Object
assignee http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_eacd252a35e563ff741cb2006460bb80
classificationCPCAdditional http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04M2203-609
classificationCPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04M3-16
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04Q3-0016
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04K1-00
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04M3-42
classificationIPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04M11-00
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04Q3-00
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04M3-16
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04M3-42
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04M3-22
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04M3-00
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04M1-24
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04K1-00
filingDate 1994-08-17-04:00^^<http://www.w3.org/2001/XMLSchema#date>
inventor http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_4b5392aed4b42133652e70909f4c7c90
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_b86b0f7e1ed20da89ff1368188494227
publicationDate 1995-03-08-04:00^^<http://www.w3.org/2001/XMLSchema#date>
publicationNumber EP-0642277-A2
titleOfInvention Secure telecommunications
abstract A security node disposed in the telecommunications network connecting calling and called parties transforms information (which can be voice, data, facsimile, video and other types of calls or messages) encrypted in a first format to (a) encrypted information in a different format or to (b) non-encrypted information, and vice-versa. The node is accessible from any location connected to the network. By routing calls or messages originated by the calling party and destined for the called party via the security node, and providing appropriate control signals to the node, the information may be encrypted only over a portion of the transmission path between the parties, and clear over the remainder of the transmission path. Alternatively, the information may be encrypted in different portions of the path using different encryption algorithms. This arrangement enables the parties to obtain relatively secure communications even if only one party has a security device at the originating or terminating end, or if the parties have security devices using different handshaking protocols and encryption algorithms.
isCitedBy http://rdf.ncbi.nlm.nih.gov/pubchem/patent/WO-2004056077-A3
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/EP-1084542-A4
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/EP-1084542-A1
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/CN-100586134-C
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-7133696-B2
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/WO-2004056077-A2
priorityDate 1993-08-27-04:00^^<http://www.w3.org/2001/XMLSchema#date>
type http://data.epo.org/linked-data/def/patent/Publication

Incoming Links

Predicate Subject
isCitedBy http://rdf.ncbi.nlm.nih.gov/pubchem/patent/EP-0553553-A2
isDiscussedBy http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID6432
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID419523852
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID129094243

Total number of triples: 33.