METHOD AND SYSTEM FOR THE EXCHANGE OF DIGITALLY SIGNED OBJECTS OVER AN INSECURE NETWORK
First Claim
1. A method for authenticated communication of messages among computer systems in an insecure network, the method comprising:
- building a first signed object message in a first computer system, the first signed object message including a first sequence number, a first object, and a first signature;
sending the first signed object message to a second computer system;
verifying the first signed object message in the second computer system;
building a second signed object message in the second computer system for replying to the first computer system when the first signed object message is verified, the second signed object message including a second sequence number, a second object, and a second signature.
1 Assignment
0 Petitions
Accused Products
Abstract
Method and system aspects for authenticated communication of messages among computer systems in an insecure network are described. These aspects include building a first signed object message in a first computer system, the first signed object message including a first sequence number, a first object and a first signature. Further included is sending the first signed object message to a second computer system, verifying the first signed object message in the second computer system, and building a second signed object message in the second computer system for replying to the first computer system when the first signed object message is verified, the second signed object message including a second sequence number, a second object, and a second signature.
-
Citations
16 Claims
-
1. A method for authenticated communication of messages among computer systems in an insecure network, the method comprising:
-
building a first signed object message in a first computer system, the first signed object message including a first sequence number, a first object, and a first signature;
sending the first signed object message to a second computer system;
verifying the first signed object message in the second computer system;
building a second signed object message in the second computer system for replying to the first computer system when the first signed object message is verified, the second signed object message including a second sequence number, a second object, and a second signature. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An authenticated system of communication across an insecure network of computer systems, the system comprising:
-
a first computer system acting as a sender, the sender sending a first signed object to initiate communication, the first signed object including a first sequence number, a first object, and a first signature; and
a second computer system acting as a recipient, the recipient receiving the first signed object, verifying the first signed object, and when verified, sending a second signed object in reply, the second signed object including a second sequence number, a second object, and a second signature. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A method for achieving authenticated communication over an insecure network of computer systems, the method comprising:
-
providing a signed object socket;
building signed object messages for authenticated channel communication via the signed object socket; and
performing verification techniques on the signed object messages upon receipt of each signed object message within a computer system to ensure and maintain authenticated channel communication. - View Dependent Claims (15, 16)
-
Specification