TECHNIQUES FOR PROVIDING SECURE COMMUNICATIONS AMONG CLIENTS WITH EFFICIENT CREDENTIALS MANAGEMENT
First Claim
1. A method for protecting communications among a plurality of clients, for use in a networked communication system comprising a server and the plurality of clients, the plurality of clients comprising at least a first client and a second client, the method comprising:
- communicating, from the first client to the server, a request for a credential token for a communication between the first client and the second client;
selecting, by the server, the credential token for the communication between the first client and the second client;
communicating, from the server to each of the first client and the second client, the selected credential token; and
communicating, between the first client and the second client using security algorithms and information contained in the credential token received from the server.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, server and client for protecting communications among a plurality of clients, for use in a networked communication system comprising a server and the plurality of clients, the plurality of clients comprising at least a first client and a second client, are provided. The method includes communicating, from the first client to the server, a request for a credential token for a communication between the first client and the second client, selecting, by the server, the credential token for the communication between the first client and the second client, communicating, from the server to each of the first client and the second client, the selected credential token, and communicating, between the first client and the second client using security algorithms and information contained in the credential token received from the server.
28 Citations
24 Claims
-
1. A method for protecting communications among a plurality of clients, for use in a networked communication system comprising a server and the plurality of clients, the plurality of clients comprising at least a first client and a second client, the method comprising:
-
communicating, from the first client to the server, a request for a credential token for a communication between the first client and the second client; selecting, by the server, the credential token for the communication between the first client and the second client; communicating, from the server to each of the first client and the second client, the selected credential token; and communicating, between the first client and the second client using security algorithms and information contained in the credential token received from the server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A server apparatus for protecting communications among a plurality of clients, for use in a networked communication system comprising the server and the plurality of clients, the plurality of clients comprising at least a first client and a second client, the apparatus comprising:
a token server for receiving a request from a first client for a credential token for a communication between the first client and the second client, for selecting the credential token for the communication between the first client and the second client, and for transmitting the selected credential token to each of the first client and the second client. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
19. A client apparatus for protecting communications between the client and at least one counterpart client, for use in a networked communication system comprising the server, the client, and at least one counterpart client, the apparatus comprising:
-
a token client for receiving a credential token from a server for a communication between the client and the counterpart client; a credential table for storing the received credential token from the server and the associations with communicating clients; and a communication unit for communicating between the client and the counterpart client using security algorithms and information contained in the received credential token. - View Dependent Claims (20, 21, 22, 23, 24)
-
Specification