SYSTEM AND METHOD FOR IMPLEMENTING AN ENHANCED TRANSPORT LAYER SECURITY PROTOCOL
First Claim
1. A method at a mobile device for securely communicating with a server operating on a computer network, comprising:
- establishing a wireless connection with a computer network;
establishing a secure connection with the server using a non-proprietary security protocol;
sending a first encrypted service request to the server via the non-proprietary security protocol;
receiving a first encrypted response from the server that includes a unique location of a security servlet operating on the computer network and communicating with the server via a secure link;
sending a second encrypted service request to the security servlet using the unique location of the security servlet, the second service request for decryption by the security servlet and transfer to the server.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method for implementing an enhanced transport layer security (ETLS) protocol is provided. The system includes a primary server, an ETLS servlet and an ETLS software module. The primary server operates on a computer network and is configured to communicate over the computer network using a non-proprietary security protocol. The ETLS servlet also operates on the computer network and is securely coupled to the primary server. The ETLS servlet is configured to communicate over the computer network using an ETLS security protocol. The ETLS software module operates on a mobile device, and is configured to communicate over the computer network using either the non-proprietary security protocol or the ETLS security protocol. Operationally, the ETLS software module initially contacts the server over the computer network using the non-proprietary security protocol, and subsequently contacts the server through the ETLS servlet using the ETLS security protocol.
-
Citations
20 Claims
-
1. A method at a mobile device for securely communicating with a server operating on a computer network, comprising:
-
establishing a wireless connection with a computer network; establishing a secure connection with the server using a non-proprietary security protocol; sending a first encrypted service request to the server via the non-proprietary security protocol; receiving a first encrypted response from the server that includes a unique location of a security servlet operating on the computer network and communicating with the server via a secure link; sending a second encrypted service request to the security servlet using the unique location of the security servlet, the second service request for decryption by the security servlet and transfer to the server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method at a server for securely communicating with a mobile device via a computer network, comprising:
-
establishing a secure connection with the mobile device using a non-proprietary security protocol; receiving a first encrypted service request from the mobile device via the non-proprietary security protocol; sending a first encrypted response to the mobile device that includes the unique location of a security servlet operating on the computer network and communicating with the server via a secure link; receiving a second encrypted service request from the mobile device via the security servlet, the second service request having been received and decrypted by the security servlet and transferred to the server. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification