Method of supporting SSL/TLS protocols in a resource-constrained device
First Claim
Patent Images
1. A method of providing secure communication between a resource constrained device and a remote node over a computer network, comprising:
- supporting an SSL/TLS protocol stack on the resource-constrained device by performing at least one optimization step to reduce the resources required to support the SSL/TLS protocol stack on the resource constrained device.
1 Assignment
0 Petitions
Accused Products
Abstract
System and method for secure communication between a resource constrained device and a remote node over a computer network. The system and method according to the invention supports an SSL/TLS protocol stack on the resource-constrained device by performing at least one optimization step to reduce the resources required to support the SSL/TLS protocol stack on the resource constrained device.
77 Citations
20 Claims
-
1. A method of providing secure communication between a resource constrained device and a remote node over a computer network, comprising:
supporting an SSL/TLS protocol stack on the resource-constrained device by performing at least one optimization step to reduce the resources required to support the SSL/TLS protocol stack on the resource constrained device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
Specification