Message exchange in an information technology network
First Claim
1. A method of requesting a service from a first enterprise, wherein at least an aspect of a request for the service requires authorisation by a second enterprise, the method comprising the steps of:
- generating a document having a first module including first data, and a second module including encrypted second data;
sending the document to the first enterprise;
at the first enterprise, separating the first and second modules, and sending the second module to the second enterprise;
at the second enterprise, decrypting the second encrypted data within the second module, and on the basis of the second data, generating an authorisation for the first enterprise to proceed with the service request; and
sending the authorisation to the first enterprise.
2 Assignments
0 Petitions
Accused Products
Abstract
Messages including encrypted data and having the form of XML documents are exchanged within an information technology network according to Simple Object Access Protocol (SOAP). Each message includes a session key (encrypted to the public key of the party receiving the message) within the XML document containing the encrypted data, meaning that each message is interpretable in a “stand alone” condition, without reference to some shared state (such as the session key for instance) between the parties involved in the messaging. Tags are used to generate modules within the document, and enable easy and convenient separation of elements of the document for distribution by the SOAP gateway protocol handler to the relevant application.
-
Citations
28 Claims
-
1. A method of requesting a service from a first enterprise, wherein at least an aspect of a request for the service requires authorisation by a second enterprise, the method comprising the steps of:
-
generating a document having a first module including first data, and a second module including encrypted second data;
sending the document to the first enterprise;
at the first enterprise, separating the first and second modules, and sending the second module to the second enterprise;
at the second enterprise, decrypting the second encrypted data within the second module, and on the basis of the second data, generating an authorisation for the first enterprise to proceed with the service request; and
sending the authorisation to the first enterprise. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method of communicating with first and second enterprises via a publicly accessible network comprising the steps of:
-
generating a markup language request document containing first data for processing by the first enterprise, and second data, encrypted for decryption by the second enterprise, and structuring the document to locate the first data in a first module of the document, and the second data in a second module of the document, separable from the first module without decryption of the second module; and
sending the request document to the first enterprise. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A method of exchanging messages between a first and a second party in accordance with an XML-based messaging Protocol comprising the steps of:
-
generating, on behalf of the first party, an outbound message including a first XML document, and including within the first XML document an outbound session key to which at least part one parameter within the first XML document is encrypted;
generating on behalf of the second party a reply message including a second XML document, and including within the second XML document a reply session key to which at least one further parameter within the second XML document is encrypted. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28)
-
Specification