Electrical computers and digital processing systems: support – Multiple computer communication using cryptography
Reexamination Certificate
2007-11-20
2007-11-20
Vu, Kim (Department: 2135)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
C713S168000, C380S247000, C380S270000, C370S278000
Reexamination Certificate
active
10062068
ABSTRACT:
Providing secure end-to-end notifications from a notification source to a notification sink despite the notification mechanism including one or more message transit points between the notification source and the notification sink. Initially, security information (e.g., the master security, the cryptographic algorithm, and the like) is negotiated out-of-band from the one or more message transit points so that the message transit points are not apprised of the security information. When a designated event occurs, the notification source generates a push message that includes the notification encrypted using the pre-negotiated security information. When the notification sink receives the push message, the notification sink decrypts the notification using the pre-negotiated security information, as well as supplemental information provided in the push message. Thus, the message transit points only have access to the encrypted form of the notification.
REFERENCES:
patent: 6047357 (2000-04-01), Bannon et al.
patent: 6052788 (2000-04-01), Wesinger et al.
patent: 6317831 (2001-11-01), King
patent: 6665711 (2003-12-01), Boyle et al.
patent: 6707801 (2004-03-01), Hsu
patent: 6909702 (2005-06-01), Leung et al.
patent: 7027597 (2006-04-01), Stojancic et al.
patent: 2002/0042875 (2002-04-01), Shukla
patent: 2002/0101997 (2002-08-01), Curtis et al.
patent: 2002/0124090 (2002-09-01), Poier et al
patent: 2002/0156921 (2002-10-01), Dutta et al.
patent: 2002/0186845 (2002-12-01), Dutta et al.
patent: 2003/0018766 (2003-01-01), Duvvuru
patent: 2003/0072451 (2003-04-01), Pimentel et al.
patent: 2003/0120924 (2003-06-01), Immonen
R. Atkinson, “IP Encapsulating Security Payload (ESP)”, p. 1-12, Aug. 1995.
C. Madson and N. Doraswamy, “RFC 2405: The ESP DES-CBC Cipher Algorithm with Explicit IV”, p. 1-10, Nov. 1998.
S. Kent and R. Atkinson, “RFC 2406: IP Encapsulating Security Payload (ESP)”, p. 1-22, Nov. 1998.
W. Stallings, “Cryptography And Network Security: Principles and Practice”, Prentice-Hall, Inc., p. 402-431, 1999.
Kegel, Dan, “SSL/TLS”, www.kegel.com/ssl/, Sep. 25, 2001.
Protocol Building Blocks, Bruce Schneier, Applied Crytography—Protocols, Algorithms, and Source Code in C, Associate Publisher: Katherine Schowalter, 1994, pp. 19-126 and pp. 376-410.
Butler Lee M.
Cohen Josh R.
Hammond Bradley M.
Kramer Michael
Roberts Paul
Microsoft Corporation
Shaw Yin-Chen
Vu Kim
Workman Nydegger
LandOfFree
Secure end-to-end notification does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Secure end-to-end notification, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure end-to-end notification will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3819674