US 7,321,968 B1
Method and apparatus for encoding, transmitting and decoding a digital message
Christoph Capellaro, Oberhaching (Germany); Gerhard Hoffmann, München (Germany); Klaus Lukas, München (Germany); and Michael Munzert, München (Germany)
Assigned to Fujitsu Siemens Computer, Munich (Germany)
Appl. No. 9/446,425
PCT Filed Jun. 19, 1998, PCT No. PCT/DE98/01693
§ 371(c)(1), (2), (4) Date Dec. 20, 1999,
PCT Pub. No. WO99/00929, PCT Pub. Date Jan. 07, 1999.
Claims priority of application No. 197 27 267 (DE), filed on Jun. 26, 1997.
Int. Cl. H04L 9/00 (2006.01); G06F 15/16 (2006.01); H04K 1/00 (2006.01)
U.S. Cl. 713—152  [713/150; 713/151; 709/229; 709/230; 380/255] 36 Claims
OG exemplary drawing
 
3. A method for encoding a digital message, for transmitting the digital message from a first computer unit to a second computer unit and for decoding the digital message, the method comprising:
encoding the digital message, by a first application in the first computer unit, to form an encoded message via employment of an encoding format of a simple network management protocol;
subjecting the encoded message, not a decoded message obtained from the encoded message, by a first proxy agent in the first computer unit, to at least one first cryptographic process to form a cryptographically processed message;
encoding the cryptographically processed message, in the first computer unit, via employment of the encoding format of the simple network management protocol used to produce the encoded message to form an encoded, cryptographically processed message;
transmitting the encoded, cryptographically processed message from the first computer unit to the second computer unit;
decoding the encoded, cryptographically processed message, in the second computer unit, according to the encoding format of the simple network management protocol to form a decoded, cryptographically processed message;
subjecting the decoded, cryptographically processed message, by a second proxy agent in the second computer unit, to a second cryptographic process inverse relative to the at least one first cryptographic process to form an inversely cryptographically processed message; and
decoding the inversely cryptographically processed message, by a second application in the second computer unit, into the digital message according to the encoding format of the simple network management protocol.