METHOD AND SYSTEM FOR PROVIDING PERSONALIZED SERVICE MOBILITY
First Claim
1. A method for securely transmitting personal profile information, comprising:
- encrypting the personal profile information, stored in a first location, in accordance with instance-based parameters;
retrieving the encrypted personal profile information at a second location; and
decrypting the encrypted personal profile information if the instance-based parameters are satisfied.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for securely transporting personalized service policies from a trusted home SIP server to an un-trusted host server, through a hostile environment, such as the Internet, using identity-based encryption. A user is able to define an instance-based encryption seed for a public key to be used in encryption of SIP, or other open signaling protocol, personalized services, including defining the time and the location at which the public key is to be valid. The method consists of encrypting, in accordance with instance-based parameters, personal profile information describing the personalized service policies; retrieving the encrypted personal profile information at the un-trusted host server; and decrypting the encrypted personal profile information if the instance-based parameters are satisfied.
-
Citations
58 Claims
-
1. A method for securely transmitting personal profile information, comprising:
-
encrypting the personal profile information, stored in a first location, in accordance with instance-based parameters;
retrieving the encrypted personal profile information at a second location; and
decrypting the encrypted personal profile information if the instance-based parameters are satisfied. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A system for transmitting personal profile information over a packet-based network, comprising:
-
a first user agent storing personalized services policies and communicating with a server to encrypt, using identity-based encryption, the personalized policies in accordance with user-defined criteria;
a second user agent, remote from the first user agent, to receive the encrypted personalized service policies; and
a private key generator, in communication with the first and second user agents, to generate a private key in accordance with the public key, the private key being adapted to decrypt the encrypted personalized services policies only when the user-defined criteria are satisfied. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A method for providing personalized service mobility over a packet-based network, comprising:
-
defining a public key in accordance with instance-based parameters;
encrypting a personalized services profile using the public key;
transmitting the encrypted personalized services profile over the packet-based network;
generating a private key in accordance with the public key;
decrypting the encrypted personal profile information with the private key if the instance-based parameters are satisfied. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. A user agent for securely deploying personalized services policies, comprising:
-
means for receiving a personalized services profile encrypted with a public key defined by instance-based parameters;
means for receiving a private key generated in accordance with the public key; and
a decryption engine to decrypt the encrypted personalized services profile if the instance-based parameters are satisfied. - View Dependent Claims (36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46)
-
-
47. A method for securely deploying personalized services, comprising:
-
receiving a personalized services profile encrypted in accordance with a public key;
receiving a private key generated in accordance with the public key;
decrypting the encrypted personalized services profile if instance-based parameters associated with the public and private keys are satisfied. - View Dependent Claims (48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58)
-
Specification