APPARATUS AND METHOD FOR PROTECTING PROPRIETARY INFORMATION OVER PUBLIC NOTIFICATION INFRASTRUCTURE
First Claim
1. A method comprising:
- generating an obfuscation of a notification;
transmitting the obfuscation to an end-user device via an unsecure notification infrastructure; and
in response to a request from the end-user device, transmitting the notification to the end-user device via a secure connection.
1 Assignment
0 Petitions
Accused Products
Abstract
A method includes generating an obfuscation of a notification and transmitting the obfuscation to an end-user device via an unsecure notification infrastructure. The method also includes, in response to a request from the end-user device, transmitting the notification to the end-user device via a secure connection. The request from the end-user device can also be received via the secure connection. The method could also include receiving information associated with an event and storing at least one of the notification and the information in association with the obfuscation, where the notification contains the information. The event could denote an event associated with an industrial process control and automation system. The obfuscation could include a unique identifier associated with the notification or a summary of the notification.
-
Citations
20 Claims
-
1. A method comprising:
-
generating an obfuscation of a notification; transmitting the obfuscation to an end-user device via an unsecure notification infrastructure; and in response to a request from the end-user device, transmitting the notification to the end-user device via a secure connection. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An apparatus comprising:
-
at least one memory configured to store a notification and an obfuscation of the notification; at least one interface configured to transmit the obfuscation to an end-user device via an unsecure notification infrastructure; and at least one processing device configured, in response to a request from the end-user device, to initiate transmission of the notification to the end-user device via a secure connection. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable medium containing computer readable program code that, when executed, causes at least one processing device to:
-
obtain an obfuscation of a notification; initiate transmission of the obfuscation to an end-user device via an unsecure notification infrastructure; and in response to a request from the end-user device, to initiate transmission of the notification to the end-user device via a secure connection. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A non-transitory computer readable medium containing computer readable program code that, when executed, causes at least one processing device of a mobile device to:
-
receive an obfuscation of a notification at the mobile device via an unsecure notification infrastructure; initiate transmission of a request for the notification via a secure connection; receive the notification at the mobile device via the secure connection; and present the notification at the mobile device.
-
Specification