METHOD FOR SECURE TRANSFER OF MULTIPLE SMALL MESSAGES
First Claim
1. A method performed by a client device operating on a network, the method comprising:
- (a) receiving a first software component transmitted using a secure connection on the network;
(b) receiving a second software component transmitted using an unsecure connection on the network;
(c) requesting a content object using the unsecure connection;
(d) receiving, via the unsecure connection, an encrypted version of the requested content object;
(e) transferring the encrypted version of the requested content object from an unsecure domain containing the second software component to a secure domain containing the first software component;
(f) decrypting the encrypted content object using the first component to obtain the requested content object; and
(g) rendering the requested content object on the client device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for securely transferring a multiplicity of short messages using an unsecure connection begins by loading a secure domain component on a client device using a secure connection and then loading an unsecure domain component on the client device. Encrypted messages are sent from an unsecure server to the unsecure domain component. The client device transfers the received encrypted message from the unsecure domain to the secure domain, where the secure domain component decrypts the received encrypted messages. This method works repeatedly without reloading either the secure domain component or the unsecure domain component and by using the unsecure connection to transfer the encrypted messages.
-
Citations
15 Claims
-
1. A method performed by a client device operating on a network, the method comprising:
-
(a) receiving a first software component transmitted using a secure connection on the network; (b) receiving a second software component transmitted using an unsecure connection on the network; (c) requesting a content object using the unsecure connection; (d) receiving, via the unsecure connection, an encrypted version of the requested content object; (e) transferring the encrypted version of the requested content object from an unsecure domain containing the second software component to a secure domain containing the first software component; (f) decrypting the encrypted content object using the first component to obtain the requested content object; and (g) rendering the requested content object on the client device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A client device comprising:
-
a network interface that connects the client device to an unsecure server and a secure server; a processor having access to memory; a first component stored in a first domain, the first component transferred into the memory by a secure connection to the secure server; a second component stored in a second domain, the second component transferred into the memory by an unsecure connection to the unsecure server; and a cross domain message transfer mechanism; wherein an encrypted object transferred by the unsecure connection into the second component is decrypted by the first component after the processor invokes the cross domain message transfer mechanism to transfer the encrypted object from the unsecure domain to the secure domain. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
Specification