Secure end-to-end notification

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S168000, C380S247000, C380S270000, C370S278000

Reexamination Certificate

active

10062068

ABSTRACT:
Providing secure end-to-end notifications from a notification source to a notification sink despite the notification mechanism including one or more message transit points between the notification source and the notification sink. Initially, security information (e.g., the master security, the cryptographic algorithm, and the like) is negotiated out-of-band from the one or more message transit points so that the message transit points are not apprised of the security information. When a designated event occurs, the notification source generates a push message that includes the notification encrypted using the pre-negotiated security information. When the notification sink receives the push message, the notification sink decrypts the notification using the pre-negotiated security information, as well as supplemental information provided in the push message. Thus, the message transit points only have access to the encrypted form of the notification.

REFERENCES:
patent: 6047357 (2000-04-01), Bannon et al.
patent: 6052788 (2000-04-01), Wesinger et al.
patent: 6317831 (2001-11-01), King
patent: 6665711 (2003-12-01), Boyle et al.
patent: 6707801 (2004-03-01), Hsu
patent: 6909702 (2005-06-01), Leung et al.
patent: 7027597 (2006-04-01), Stojancic et al.
patent: 2002/0042875 (2002-04-01), Shukla
patent: 2002/0101997 (2002-08-01), Curtis et al.
patent: 2002/0124090 (2002-09-01), Poier et al
patent: 2002/0156921 (2002-10-01), Dutta et al.
patent: 2002/0186845 (2002-12-01), Dutta et al.
patent: 2003/0018766 (2003-01-01), Duvvuru
patent: 2003/0072451 (2003-04-01), Pimentel et al.
patent: 2003/0120924 (2003-06-01), Immonen
R. Atkinson, “IP Encapsulating Security Payload (ESP)”, p. 1-12, Aug. 1995.
C. Madson and N. Doraswamy, “RFC 2405: The ESP DES-CBC Cipher Algorithm with Explicit IV”, p. 1-10, Nov. 1998.
S. Kent and R. Atkinson, “RFC 2406: IP Encapsulating Security Payload (ESP)”, p. 1-22, Nov. 1998.
W. Stallings, “Cryptography And Network Security: Principles and Practice”, Prentice-Hall, Inc., p. 402-431, 1999.
Kegel, Dan, “SSL/TLS”, www.kegel.com/ssl/, Sep. 25, 2001.
Protocol Building Blocks, Bruce Schneier, Applied Crytography—Protocols, Algorithms, and Source Code in C, Associate Publisher: Katherine Schowalter, 1994, pp. 19-126 and pp. 376-410.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Secure end-to-end notification does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Secure end-to-end notification, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure end-to-end notification will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3819674

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.