Network-based secure input/output (I/O) module (SIOM)
First Claim
Patent Images
1. A method, comprising:
- obtaining, by one or more processors of a hardware server, a manifest that identifies encryption algorithms, encryption keys, protocols, and encryption key sizes, and processing, by the hardware server, the encryption algorithms with the encryption keys, and the encryption key sizes as the protocols, and establishing, by the hardware server through the protocols, encrypted communication sessions with two peripherals over a Local-Area Network;
receiving, by one or more processors of the hardware server, pairing requests from the two separate peripherals over the LAN; and
establishing, by the one or more processors of the hardware server, a separate and unique secure session with each separate peripheral using information identified in the manifest for processing as a secure protocol, and managing each unique secure session with a different encryption and with a different encryption key size from that which is processed for a remaining unique secure session being processed for a remaining one of the two separate peripherals.
6 Assignments
0 Petitions
Accused Products
Abstract
A Secure Input/Output (I/O) Module (SIOM) is networked-enabled providing secure communications with terminals and peripherals integrated into the terminals. Communications between devices are securely made through encrypted communication sessions provisioned, defined, and managed through a secure protocol using the network-based SIOM. In an embodiment, a single-tenant network-based SIOM is provided. In an embodiment, a hybrid dual single-tenant and multi-tenant network-based SIOM is provided. In an embodiment, a multi-tenant network-based SIOM is provided. In an embodiment, a cloud-based SIOM is provided.
8 Citations
20 Claims
-
1. A method, comprising:
-
obtaining, by one or more processors of a hardware server, a manifest that identifies encryption algorithms, encryption keys, protocols, and encryption key sizes, and processing, by the hardware server, the encryption algorithms with the encryption keys, and the encryption key sizes as the protocols, and establishing, by the hardware server through the protocols, encrypted communication sessions with two peripherals over a Local-Area Network; receiving, by one or more processors of the hardware server, pairing requests from the two separate peripherals over the LAN; and establishing, by the one or more processors of the hardware server, a separate and unique secure session with each separate peripheral using information identified in the manifest for processing as a secure protocol, and managing each unique secure session with a different encryption and with a different encryption key size from that which is processed for a remaining unique secure session being processed for a remaining one of the two separate peripherals. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method, comprising:
-
receiving, by one or more processors of a hardware server, a first pairing request from a first peripheral and a second pairing request from a second peripheral over a Wide-Area Network (WAN); obtaining, by the one or more processors of the hardware server, a manifest that identifies encryption algorithms, encryption keys, protocols, and encryption key sizes, and processing, by the hardware server, the encryption algorithms with the encryption keys and the encryption key sizes as the protocols, and establishing, by the hardware server, through the protocols secure and encrypted communication sessions with the first peripheral and the second peripheral over the WAN; and establishing, by the one or more processors of the hardware server, a first secure session with the first peripheral and a second secure session with the second peripheral over the WAN with the first secure session processing a first custom encryption identified from information in the manifest and the second secure session processing a second custom encryption identified from the information in the manifest, wherein the first custom encryption is different from the second custom encryption, and wherein the first custom encryption includes a different encryption key size processed during the first secure session from a second custom encryption key size processed during the second secure session. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A system comprising:
-
a hardware server device; a network-based secure input/output module (SIOM) configured and adapted to;
i) execute on the hardware server device and pair with two separate peripheral devices over a network connection, ii) obtain a manifest that identifies encryption algorithms, encryption keys, protocols, and encryption key sizes, and process the encryption algorithms with the encryption keys and the encryption key sizes as the protocols to establish through the hardware server device using the protocols separate, secure, and encrypted communication sessions with each of the peripheral devices over the network connection, and iii) establish separate and unique secure sessions with each separate peripheral device over the network in response to the identifying and process a first encryption for a first one of the separate and unique secure sessions identified from information in the manifest and process a second encryption for a second of the unique secure session identified from the information in the manifest, wherein the first encryption uses a first encryption key size and encryption processed during the first one of the unique secure session that is different from a second encryption key and encryption size that is processed during the second of the unique secure sessions with the second encryption. - View Dependent Claims (19, 20)
-
Specification