Secure end-to-end transport through intermediary nodes
DCFirst Claim
Patent Images
1. A non-transitory computer-readable storage medium storing instructions to be implemented by a first computer having a processor, wherein the instructions, when executed by the processor, cause the first computer to perform steps comprising:
- receiving a token issued by an intermediary server; and
transmitting a transaction message comprising payload data to the intermediary server, wherein the payload data is transmitted to a second computer by the intermediary server based on the token and the intermediary server is coupled to the second computer over a mobile network.
2 Assignments
Litigations
1 Petition
Accused Products
Abstract
A communication network encrypts a first portion of a transaction associated with point-to-point communications using a point-to-point encryption key. A second portion of the transaction associated with end-to-end communications is encrypted using an end-to-end encryption key.
65 Citations
30 Claims
-
1. A non-transitory computer-readable storage medium storing instructions to be implemented by a first computer having a processor, wherein the instructions, when executed by the processor, cause the first computer to perform steps comprising:
-
receiving a token issued by an intermediary server; and transmitting a transaction message comprising payload data to the intermediary server, wherein the payload data is transmitted to a second computer by the intermediary server based on the token and the intermediary server is coupled to the second computer over a mobile network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method implemented on a first computer, the method comprising:
-
receiving a token issued by an intermediary server; and transmitting a transaction message comprising payload data to the intermediary server, wherein the payload data is transmitted to a second computer by the intermediary server based on the token and the intermediary server is coupled to the second computer over a mobile network. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A first computer having a processor configured for:
-
receiving a token issued by an intermediary server; and transmitting a transaction message comprising payload data to the intermediary server, wherein the payload data is transmitted to a second computer by the intermediary server based on the token and the intermediary server is coupled to the second computer over a mobile network. - View Dependent Claims (27, 28, 29, 30)
-
Specification