Method and system for establishing a secure communication tunnel
First Claim
1. A computer-implemented method for establishing a secure communication tunnel between a device and a server, wherein the method is carried out at the server having a processor and a memory configured to provide instructions to the processor and the method comprises:
- receiving a session request from the device to establish a secure tunnel;
carrying out a handshake procedure to set up an encryption/decryption key for the secure tunnel wherein the handshake procedure uses a first communication channel from the server to the device;
sending a first component of the handshake procedure to the device via the first communication channel; and
sending a second component of the handshake procedure to the device via a second communication channel,wherein continuing the handshake procedure or commencing use of the secure tunnel established by the handshake procedure comprises use, by the device, of the second component sent to the device via the second communication channel.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer-implemented method for establishing a secure communication tunnel between a device and a server is provided. The method comprises the server receiving a session request from the device to establish a secure tunnel. A handshake procedure is carried out to set up an encryption/decryption key for the secure tunnel. The handshake procedure uses a first communication channel from the server to the device. The method also includes sending a component of the handshake procedure to the device via a second communication channel. This component is required by the device to continue the handshake procedure or to commencing use of the secure tunnel established by the handshake procedure.
-
Citations
21 Claims
-
1. A computer-implemented method for establishing a secure communication tunnel between a device and a server, wherein the method is carried out at the server having a processor and a memory configured to provide instructions to the processor and the method comprises:
-
receiving a session request from the device to establish a secure tunnel; carrying out a handshake procedure to set up an encryption/decryption key for the secure tunnel wherein the handshake procedure uses a first communication channel from the server to the device; sending a first component of the handshake procedure to the device via the first communication channel; and sending a second component of the handshake procedure to the device via a second communication channel, wherein continuing the handshake procedure or commencing use of the secure tunnel established by the handshake procedure comprises use, by the device, of the second component sent to the device via the second communication channel. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer-implemented method for establishing a secure communication tunnel between a device and a server, wherein the method is carried out at the device having a processor and a memory configured to provide instructions to the processor and the method comprises:
-
sending a session request to the server to establish a secure tunnel; carrying out a handshake procedure to set up an encryption/decryption key for the secure tunnel wherein the handshake procedure uses a first communication channel from the server to the device; receiving a first component of the handshake procedure via the first communication channel; receiving a second component of the handshake procedure via a second communication channel; and automatically detecting the receipt of the second component at the second communication channel and using this component to continue the handshake procedure or to commence use of the secure tunnel established by the handshake procedure. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A system for establishing a secure communication tunnel comprising a server having a processor and a memory configured to provide instructions to the processor for carrying out functions of server components, the server including:
-
a handshake initiating component for initiating a handshake procedure with a device in response to receiving a session request from the device; a handshake component for carrying out a handshake procedure to set up an encryption/decryption key for the secure communication tunnel wherein the handshake procedure uses a first communication channel from the server to the device; a first component sending module for transmitting a first component of the handshake procedure to the device via the first communication channel; and a second component sending module for transmitting a second component of the handshake procedure to the device via a second communication channel, wherein continuing the handshake procedure or commencing use of the secure communication tunnel established by the handshake procedure comprises use of the second component by the device. - View Dependent Claims (19, 20)
-
-
21. A system for establishing a secure communication tunnel comprising a device having a processor and a memory configured to provide instructions to the processor for carrying out functions of device components, the device including:
-
a handshake initiating component for initiating a handshake procedure with a server by transmitting a session request to the server to establish a secure tunnel; a handshake component for carrying out a handshake procedure to set up an encryption/decryption key for the secure tunnel wherein the handshake procedure uses a first communication channel from the server to the device; a first automatic detection component for automatically detecting a first component of the handshake procedure received via the first communication channel; a second automatic detection component for automatically detecting a second component of the handshake procedure received via a second communication channel; and a handshake finalizing component for finalizing the handshake procedure using the component of the handshake procedure received via the second communication channel or a session commencing component for commencing use of the secure tunnel established by the handshake procedure using the component of the handshake procedure received via the second communication channel.
-
Specification