Method and system for secure communications
First Claim
1. A method for securely transmitting a message from a wireless client, the method comprising:
- encrypting a local key using a public key to form an encrypted local key, the local key corresponding to a request to contact a proxy server;
encrypting the message using the local key to form an encrypted message; and
transmitting the encrypted message to the proxy server, the encrypted message comprising at least one packet of data.
6 Assignments
0 Petitions
Accused Products
Abstract
A communications system and methods for securely transmitting a message between a wireless client and a proxy server are provided. A method for transmitting a message from the wireless client to a proxy server is provided. The message includes at least one packet of data and is encrypted using a data encryption key. The data encryption key is encrypted using a proxy server public key prior to sending the encrypted data encryption key to the proxy server. A method for transmitting a message from the proxy server to the wireless client is also provided. The proxy server recovers the data encryption key using the proxy server private key corresponding to the proxy server public key. The proxy server encrypts the message using the data encryption key and transmits the encrypted message to the wireless client. A communications system for secure communications comprising a source of data, a proxy server and a wireless client is also provided. Each transaction in the communications system comprises at least one request message and at least one response message. For each transaction, the wireless client encrypts a data encryption key using a proxy server public key. Messages exchanged between the wireless client and the proxy server are encrypted using the transaction specific data encryption key.
-
Citations
36 Claims
-
1. A method for securely transmitting a message from a wireless client, the method comprising:
-
encrypting a local key using a public key to form an encrypted local key, the local key corresponding to a request to contact a proxy server;
encrypting the message using the local key to form an encrypted message; and
transmitting the encrypted message to the proxy server, the encrypted message comprising at least one packet of data. - View Dependent Claims (2, 3, 4, 6)
applying a secure hash to a first input to form a first multibit hash, the first input comprising a concatenation of an output from a random number generator and at least one other character string; - and
applying a message digest function to the first multibit hash to form the local key.
-
-
4. The method of claim 1, wherein the specific transaction comprises a single request message and each packet of data is less than one kilobyte.
-
6. The method of claim 4, further comprising signaling the encrypted request message to the proxy server with information to validate the encrypted request message.
-
5. A method for securely transmitting a message from a wireless client, the method comprising:
-
encrypting a local key using a public key on a proxy server to form an encrypted local key, the local key corresponding to a specific transaction between the wireless client and the proxy server;
encrypting the message using the local key to form an encrypted message; and
transmitting the encrypted message to the proxy server, the encrypted message comprising at least one packet of data, and a request message corresponding to a hypertext document, the encrypted request message further comprising encrypted request parameters, an encrypted bit, an encryption scheme identifier, a proxy server public key identifier, a proxy server identifier, a wireless client generated indication of current date and time, an encrypted request message integrity check, and the encrypted local key, the encrypted request parameters created from request parameters using the local key, the request parameters including compressed representations of data corresponding to fields in the hypertext document, the compressed representations formatted according to a compact transfer protocol, the encrypted request message integrity check encrypted using the local key.
-
-
7. A method for securely transmitting a message from a proxy server to a wireless client comprising:
-
receiving a message to be transmitted to the wireless device;
receiving an encrypted local key corresponding to a specific transaction between the proxy server and the wireless client;
decrypting the encrypted local key using a public key on the proxy server;
encrypting the message using the local key to form an encrypted message; and
transmitting the encrypted message to the wireless client. - View Dependent Claims (8, 9, 10, 11)
computing a response message integrity check;
encrypting the response message integrity check using the local key to form an encrypted response message integrity check, the encrypted response message further comprising the encrypted response message integrity check.
-
-
11. The method of claim 10, further comprising after the transmitting step:
-
the wireless client receiving the encrypted response message;
the wireless client recovering the response message integrity check from the encrypted response message integrity check using the data encryption key; and
the wireless client verifying the response message integrity check.
-
-
12. A method for securely transmitting a message from a proxy server to a wireless client comprising:
-
receiving an encrypted request message comprising encrypted request parameters, a wireless client generated indication of current data and time, and a proxy server identifier, the encrypted request parameters formed by encrypting request parameters using the local key;
receiving an encrypted wireless client generated request message integrity check, the encrypted request message integrity check formed by encrypting a wireless client generated request message integrity check using the local key, the wireless client generated request message integrity check formed from a concatenation of the request message parameters, the wireless client generated indication of current data and time, and the proxy server identifier;
receiving a local key that was encrypted on the wireless client using a public key stored on a proxy server, the local key corresponding to a specific transaction between the proxy server and the wireless client;
decrypting the local key using a proxy server public key;
encrypting the message using the local key to form an encrypted message; and
transmitting the encrypted message to the wireless client. - View Dependent Claims (13)
recovering the client generated request message integrity check;
recovering the request message parameters;
computing a computed request message integrity check using the request message parameters, the wireless client generated indication of current data and time, and the proxy server identifier;
comparing the computed request message integrity check with the client generated request message integrity check;
responsive to the computed request message integrity check not matching the client generated request message integrity check, the proxy server throwing away the encrypted request message.
-
-
14. A system for secure communications comprising:
-
a source of data comprising means for transmitting markup language messages to a proxy server;
a wireless client coupleable to the proxy server, the wireless client comprising means for exchanging encrypted messages with the proxy server, the encrypted messages comprising encrypted request messages and encrypted response messages, each encrypted message comprising at least one packet of data, each encrypted request message comprising encrypted request parameters and an encrypted local key, the encrypted request parameters created by encrypting request parameters using the local key, the request parameters corresponding to fields in a hypertext document, the encrypted local key created by encrypting a local key on the wireless client using a proxy server public key, the local key corresponding to a transaction, the transaction comprising at least one request message and at least one response message, the HTML messages corresponding to the encrypted request messages; and
wherein the proxy server includes;
means for exchanging encrypted messages with the wireless client, each encrypted message comprising at least one packet of data;
means for fetching markup languages messages from the source of data;
means for recovering the local key from the encrypted local key using the proxy server public key;
wherein each encrypted request message further comprises an encrypted bit, an encryption scheme identifier, a proxy server public key identifier, a proxy server identifier, a wireless client generated indication of current date and time, and an encrypted request message integrity check. - View Dependent Claims (15, 16, 17, 18)
-
-
19. A system for secure communications comprising:
-
a source of data comprising means for transmitting markup language messages to a proxy server;
a wireless client coupleable to the proxy server, the wireless client comprising means for exchanging a first encrypted message with the proxy server, the encrypted messages comprising encrypted request messages and encrypted response messages, each encrypted message comprising at least one packet of data, each encrypted request message comprising encrypted request parameters and an encrypted local key, the encrypted request parameters created by encrypting request parameters using the local key, the request parameters corresponding to fields in a hypertext document, the encrypted local key created by encrypting a local key on the wireless client using a proxy server public key, the local key corresponding to a transaction, the transaction comprising at least one request message and at least one response message, the HTML messages corresponding to the encrypted request messages; and
wherein the proxy server includes;
means for exchanging encrypted messages with the wireless client, each encrypted message comprising at least one packet of data;
means for fetching markup languages messages from the source of data;
means for recovering the local key from the encrypted local key using the proxy server public key; and
wherein the encrypted response message comprises a response message integrity check and compressed data in a compact markup language, the compressed data corresponding to a hypertext markup language message fetched per the encrypted request message, the compressed data comprising an indication of a bit size of the encrypted response message, an indication of whether the response is complete, and encrypted response message parameters, the proxy server further comprises;
means for validating the encrypted request message;
means for computing the response message integrity check; and
means for encrypting response message parameters and the response message integrity check, the means for encrypting comprising using the local key. - View Dependent Claims (20)
means for decrypting the encrypted response message integrity check and the response message using the local key; and
means for validating the response message integrity check.
-
-
21. A method for transmitting communications from a wireless device, the method comprising:
-
generating a local key on the wireless device responsive to a request for signaling a communication from the wireless device, the communication comprising at least one packet of data;
encrypting the local key using a public key located on a proxy server;
encrypting the communication using the local key; and
transmitting the encrypted communication and the encrypted local key to the proxy server. - View Dependent Claims (22, 23, 24, 25)
generating a message integrity check, the message integrity check including one or more parameters to enable the proxy server to check that the communication originated from the wireless device.
-
-
24. The method of claim 23, further comprising encrypting the message integrity check;
- and
transmitting the message integrity check as part of the communication to the proxy server.
- and
-
25. The method of claim 21, further comprising:
-
receiving a request to transmit a hypertext document; and
wherein encrypting the communication includes encrypting the hypertext document.
-
-
26. A method for communicating with a wireless handheld computer, the method comprising:
-
receiving an encrypted local key generated on the wireless handheld computer;
decrypting the local key using a public key located on a server;
encrypting a message using the local key; and
signaling the message to the wireless handheld computer. - View Dependent Claims (27, 28, 29, 30)
-
-
31. A method for communicating with a wireless handheld computer, the method comprising:
-
receiving an encrypted communication from a wireless handheld computer;
accessing a public key;
recovering a local key from the encrypted communication using the public key; and
recovering a communication from the wireless handheld computer using the local key. - View Dependent Claims (32, 33, 34, 35, 36)
-
Specification