US 9,762,397 C1 (12,925th)
Method and system for sending a message through a secure connection
Sami Vaarala, Espoo (FI); and Antti Nuopponen, Espoo (FI)
Filed by MPH TECHNOLOGIES OY, Espoo (FI)
Assigned to MPH TECHNOLOGIES OY, Espoo (FI)
Reexamination Request No. 90/019,377, Jan. 16, 2024.
Reexamination Certificate for Patent 9,762,397, issued Sep. 12, 2017, Appl. No. 13/685,544, Nov. 26, 2012.
Application 90/019,377 is a continuation of application No. 10/500,930, granted, now 8,346,949, previously published as PCT/FI03/00045, filed on Jan. 21, 2003.
This patent is subject to a terminal disclaimer.
Ex Parte Reexamination Certificate issued on May 28, 2025.
Int. Cl. H04L 9/32 (2006.01); G06F 15/16 (2006.01); H04L 9/08 (2006.01); H04L 9/40 (2022.01); H04L 29/06 (2006.01); H04L 61/256 (2022.01); H04L 29/12 (2006.01); H04L 61/2557 (2022.01); H04L 61/4557 (2022.01)
CPC H04L 63/0281 (2013.01) [H04L 9/0841 (2013.01); H04L 9/0844 (2013.01); H04L 9/321 (2013.01); H04L 61/256 (2013.01); H04L 63/0272 (2013.01); H04L 63/0428 (2013.01); H04L 63/061 (2013.01); H04L 63/08 (2013.01); H04L 63/123 (2013.01); H04L 63/164 (2013.01); H04L 61/2557 (2013.01); H04L 61/4557 (2022.05); H04L 2209/80 (2013.01)]
OG exemplary drawing
AS A RESULT OF REEXAMINATION, IT HAS BEEN DETERMINED THAT:
The patentability of claims 1-2 is confirmed.
1. A method for secure forwarding of a message in a secure connection via an intermediate computer, comprising:
a first computer and a second computer establishing a secure connection by negotiating and exchanging keys with one another according to a key exchange protocol via the intermediate computer,
the intermediate computer receiving a secure message having a first source address sent to an address of the intermediate computer,
the intermediate computer reading an unique identity from the secure message,
the intermediate computer finding a destination address of the secure message by using the unique identity, and
the intermediate computer sending the secure message in the secure connection to the destination address by using the address of the intermediate computer as a second source address.