Security protocol structure in application layer
First Claim
Patent Images
1. A security protocol structure in an application layer, comprising:
- a secure session layer between a session layer and an application layer, wherein the secret session layer provides a data security function in the application layer.
3 Assignments
0 Petitions
Accused Products
Abstract
A security protocol structure for a Wireless Application Protocol (WAP) standard structure is disclosed. The security protocol structure provides a data security function in an application layer by providing a secret session having a secured session layer security (SSLS) protocol for providing a secret session interface to an application program between the session layer and the application layer.
56 Citations
20 Claims
-
1. A security protocol structure in an application layer, comprising:
a secure session layer between a session layer and an application layer, wherein the secret session layer provides a data security function in the application layer. - View Dependent Claims (2, 3, 4, 5)
-
6. A method of establishing a security protocol structure in an application layer, comprising:
-
receiving a first message containing a client random value from a client;
determining whether the first message is a valid message;
extracting a pre-master secret from the first message;
generating a specific server random value;
generating and transmitting a second message to the client to pass the server random value to the client;
generating a master secret in accordance with the extracted pre-master secret, client random value, and server random value;
generating a key block in accordance with the master secret, client random value, and server random value;
generating from the key block an encryption key value for encryption and decryption algorithms and Message Authentication Code (MAC) algorithms;
generating a third message indicating that encryption is activated; and
generating a fourth message to verify that the client has generated a client master secret identical to the master secret. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification