SECURE END-TO-END TRANSPORT THROUGH INTERMEDIARY NODES
2 Assignments
0 Petitions
Accused Products
Abstract
A communication network encrypts a first portion of a transaction associated with point-to-point communications using a point-to-point encryption key. A second portion of the transaction associated with end-to-end communications is encrypted using an end-to-end encryption key.
182 Citations
47 Claims
-
1-27. -27. (canceled)
-
28. A computerized system for secure communication comprising a network processing device configured to, at least:
-
process a plurality of transactions containing a plurality of types of item; associate each of the plurality of types of item with at least one of a plurality of security associations in accordance with a configured encryption schema; correlate the plurality of security associations with a plurality of channels in the plurality of transactions; and encrypt or decrypt a plurality of items in the plurality of transactions in accordance with a corresponding security association and the configured encryption schema. - View Dependent Claims (29, 30, 31, 32, 33)
-
-
34. One or more computer-readable media having collectively thereon computer-executable instructions that configure one or more computers to collectively, at least:
-
process a plurality of transactions containing a plurality of types of items; associate each of the plurality of types of items with at least one of a plurality of security associations in accordance with a configured encryption schema; correlate the plurality of security associations with a plurality of channels in the plurality of transactions; and encrypt or decrypt a plurality of items in the plurality of transactions in accordance with a corresponding security association and the configured encryption schema. - View Dependent Claims (35, 36, 37, 38, 39, 40)
-
-
41. One or more computer-readable media having collectively thereon a data structure that configures one or more computers, the data structure comprising:
-
a first portion of a transaction encrypted using a first known encryption key, the first portion of the transaction containing point-to-point control data; and a second portion of the transaction encrypted using a second unknown encryption key, the second portion of the transaction containing end-to-end content data, wherein the first portion of the transaction is decrypted to determine how to process the transaction while the second portion of the transaction remains encrypted. - View Dependent Claims (42, 43, 44, 45, 46, 47)
-
Specification