http://rdf.ncbi.nlm.nih.gov/pubchem/patent/EP-0642279-A3

Outgoing Links

Predicate Object
assignee http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_eacd252a35e563ff741cb2006460bb80
classificationCPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04K1-00
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04Q3-0016
classificationIPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04Q3-00
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-10
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04Q3-545
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04K1-00
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04M11-00
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-14
filingDate 1994-08-17-04:00^^<http://www.w3.org/2001/XMLSchema#date>
inventor http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_524707e45403a3f9db7d80b07202794d
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_8505fd0ceb6b6ca8a32579d582d59df9
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_310d6ed9c370d0b771c648e63119a519
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_4b5392aed4b42133652e70909f4c7c90
publicationDate 1998-03-18-04:00^^<http://www.w3.org/2001/XMLSchema#date>
publicationNumber EP-0642279-A3
titleOfInvention Secure telecommunications
abstract A security node disposed in the telecommunications network connectingncalling and called parties transforms information (which can be voice, data,nfacsimile, video and other types of calls or messages) encrypted in a first format ton(a) encrypted information in a different format or to (b) non-encrypted information,nand vice-versa. The node is accessible from any location connected to the network.nBy routing calls or messages originated by the calling party and destined for thencalled party via the security node, and providing appropriate control signals to thennode, the information may be encrypted only over a portion of the transmission pathnbetween the parties, and clear over the remainder of the transmission path.nAlternatively, the information may be encrypted in different portions of the pathnusing different encryption algorithms. This arrangement enables the parties to obtainnrelatively secure communications even if only one party has a security device at thenoriginating or terminating end, or if the parties have security devices using differentnhandshaking protocols and encryption algorithms.
priorityDate 1993-08-27-04:00^^<http://www.w3.org/2001/XMLSchema#date>
type http://data.epo.org/linked-data/def/patent/Publication

Incoming Links

Predicate Subject
isCitedBy http://rdf.ncbi.nlm.nih.gov/pubchem/patent/EP-0553553-A2
isDiscussedBy http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID129094243
http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID6432

Total number of triples: 23.