×

Piggy-backed key exchange protocol for providing secure, low-overhead browser connections to a server with which a client shares a message encoding scheme

  • US 6,751,731 B1
  • Filed: 10/12/1999
  • Issued: 06/15/2004
  • Est. Priority Date: 10/12/1999
  • Status: Expired due to Term
First Claim
Patent Images

1. In a computing environment having a connection to a network, a computer program product embodied on one or more computer readable media, for establishing a secure connection between a client application and a server application using existing message types, wherein said client application and said server application have a common message encoding scheme, said computer program product comprising:

  • computer-readable program code means for sending a content request from said client application to said server application, wherein said content request uses a first existing message type onto which is piggy-backed first security data, such that said client application provides said server application with said first security data for use by said server application in establishing said secure connection, wherein a parameter portion of said first security data comprises zero or more parameters to be used by said server application when creating a content response and a client nonce portion of said first security data comprises a client nonce provided by said client application, said parameter portion encrypted with said client nonce and said client nonce portion encrypted with a key such that only said server application can decrypt said client nonce portion, according to said common message encoding scheme; and

    computer-readable program code means for sending said content response, from said server application to said client application responsive to receiving said content request, wherein;

    (1) at least a portion of content included in said content response is encrypted; and

    (2) said content response uses a second existing message type onto which is piggy-backed second security data, such that said server application provides said client application with said second security data for use by said sever application in establishing said secure connection.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×