A method in a node for managing authorized attempts to access the node. A packet is received from a source, wherein the packet includes a first key. A determination is made as to whether the first key matches a second key for the node. The packet is dropped without a response to the source if the first key does not match the second key. Information from the packet is stored in response to this absence of a match. The information is sent to a selected recipient in response to a selected event, which may be, for example, either immediately or in response to polling to see if the information is present.

 
Web www.patentalert.com

< Secure parameter generating device and parameter generating method in algebraic curve crytography

< Composite digital works having usage rights and method for creating the same

> Method and system for controlling encoded image production using image signatures

> Data security for digital data storage

~ 00289