Terminal And Method For Receiving Data In A Network
First Claim
Patent Images
1. A method of processing data in a network, said method comprising:
- receiving data at a terminal from said network;
operating said terminal in a first state when said terminal is connected for communicating with said network, wherein said terminal renders said data usable; and
operating said terminal in a second state when said terminal is not connected for communicating with said network, wherein said terminal renders said data unusable.
2 Assignments
0 Petitions
Accused Products
Abstract
Terminal and Method for Receiving Data in a Network In embodiments of the present invention, a method of processing data in a network is provided. In the method, a terminal receives data from the network and is operated in two states. In the first state, in which the terminal is connected to the network, the terminal causes the data to be usable. In the second state, in which the terminal is not connected to the network, the terminal causes the data to be unusable.
23 Citations
20 Claims
-
1. A method of processing data in a network, said method comprising:
-
receiving data at a terminal from said network; operating said terminal in a first state when said terminal is connected for communicating with said network, wherein said terminal renders said data usable; and operating said terminal in a second state when said terminal is not connected for communicating with said network, wherein said terminal renders said data unusable. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A terminal for receiving data in a network, said terminal comprising;
-
a receiver for receiving cryptographic information from said network; a first store for storing received cryptographic information; a receiver for receiving encrypted data from said network; a second store for storing received encrypted data; a processor for decrypting said encrypted data using said cryptographic information; and a third store for storing the decrypted data, wherein said terminal is arranged such that said cryptographic information is not usable at said terminal when said terminal is not connected to said network. - View Dependent Claims (17, 18, 19)
-
-
20. A method of accessing data in a network of computing entities, wherein data is transmitted between computing entities of the network in an encrypted state, said method comprising:
-
establishing a communications connection between a terminal and said network; identifying the terminal to the network and, in response, receiving and storing cryptographic information in a first store of said terminal; receiving encrypted data from said network and storing said encrypted data in a second store of said terminal; decrypting said encrypted data using said cryptographic information and storing the decrypted data in a third store of said terminal; and in response to any disconnection of the terminal from said network, rendering said decrypted information unusable at said terminal while said terminal is disconnected from said network.
-
Specification