Secure transport for mobile communication network
First Claim
Patent Images
1. A method for independently encrypting channels of data in a transaction, comprising:
- encryption of a first data channel in the transaction using a first security association;
encryption of a second data channel in the transaction using a second security association, wherein the first data channel consists of point-to-point control data and the second data channel consists of end-to-end content data; and
encryption of an arbitrary number of additional data channels contained within the transaction using a unique security association for each channel.
4 Assignments
0 Petitions
Accused Products
Abstract
A communication network encrypts a first portion of a transaction associated with point-to-point communications using a point-to-point encryption key. A second portion of the transaction associated with end-to-end communications is encrypted using an end-to-end encryption key.
-
Citations
19 Claims
-
1. A method for independently encrypting channels of data in a transaction, comprising:
-
encryption of a first data channel in the transaction using a first security association; encryption of a second data channel in the transaction using a second security association, wherein the first data channel consists of point-to-point control data and the second data channel consists of end-to-end content data; and encryption of an arbitrary number of additional data channels contained within the transaction using a unique security association for each channel. - View Dependent Claims (2)
-
-
3. A method for independently encrypting channels of data in a transaction, comprising:
-
encryption of a first data channel in the transaction using a first security association; encryption of a second data channel in the transaction using a second security association; negotiation of a first encryption key and security association for the first data channel between a mobile device and a server operating as a transfer agent for the transaction; and
negotiation of a second encryption key and security association for the second data channel between a mobile device and a computer operating as an endpoint for the transaction; and
negotiation of a third encryption key and security association for the first data channel between the server and an endpoint. - View Dependent Claims (4, 5)
-
-
6. A method for independently encrypting channels of data in a transaction, comprising:
-
encryption of a first data channel in the transaction using a first security association; encryption of a second data channel in the transaction using a second security association; encryption of an arbitrary number of additional data channels contained within the transaction using a unique security association for each channel; and leaving a third data channel in the transaction unencrypted. - View Dependent Claims (7)
-
-
8. A method for independently encrypting channels of data in a transaction, comprising:
-
encryption of a first data channel in the transaction using a first security association; encryption of a second data channel in the transaction using a second security association; encryption of an arbitrary number of additional data channels contained within the transaction using a unique security association for each channel; assigning each item in the transaction to one of the data channels; separating the different items in the transaction according to the assigned data channel; encoding the separated items into data groups; encrypting some or all of the data groups using the security associations assigned to the data channel corresponding to each data group; and encoding the processed data groups into one or more packets.
-
-
9. A method for independently encrypting channels of data in a transaction, comprising:
-
encryption of a first data channel in the transaction using a first security association; encryption of a second data channel in the transaction using a second security association; encryption of an arbitrary number of additional data channels contained within the transaction using a unique security association for each channel; encoding a first set of packets containing only the data encrypted using the first security association; encoding a second set of packets containing only the data encrypted using the second security association; and encoding a packet header that contains unencrypted data, the packet header identifying a data size for the first set of packets and the second set of packets; and
transporting the first set of packets and then transporting the second set of packets immediately after the first set of packets.
-
-
10. A system, comprising:
-
one or more processors; and a memory coupled to the processors comprising instructions executable by the processors, the processors operable when executing the instructions to; receive a transaction containing a first portion of data encrypted using a first known encryption key and a second portion of data encrypted using a second unknown encryption key, the server decrypting the first portion of data to determine how to process the transaction while the second portion of data remains encrypted, wherein the first portion of data consists of point-to-point control data and the second portion of data consists of end-to-end content data.
-
-
11. A system, comprising:
-
one or more processors; and a memory coupled to the processors comprising instructions executable by the processors, the processors operable when executing the instructions to; receive a transaction containing a first portion of data encrypted using a first known encryption key and a second portion of data encrypted using a second unknown encryption key, the server decrypting the first portion of data to determine how to process the transaction while the second portion of data remains encrypted, wherein the transaction includes a third unencrypted portion of data, the server combining the decrypted first portion of data with the third unencrypted portion of data and processing the transaction according to the combined first and third portions of data.
-
-
12. A system, comprising:
-
one or more processors; and a memory coupled to the processors comprising instructions executable by the processors, the processors operable when executing the instructions to; receive a transaction containing a first portion of data encrypted using a first known encryption key and a second portion of data encrypted using a second unknown encryption key, the server decrypting the first portion of data to determine how to process the transaction while the second portion of data remains encrypted, wherein the server re-encrypts at least some of the decrypted first portion of data using a third encryption key, and combines the re-encrypted first portion of data with the encrypted second portion of data to fonn a new transaction. - View Dependent Claims (13)
-
-
14. A method for encrypting information, comprising:
-
programming a network processing device to associate different types of items in transactions with different security associations; processing various different transactions at the network processing device; correlating security associations with different channels in the transactions; encrypting or decrypting the items in the transactions according to the corresponding security associations; associating a first type of point-to-point control data with a first known security association and encrypting and decrypting the first type of point-to-point control data prior to sending to an endpoint; and associating a second type of end-to-end content data with a second unknown security association and passing the second type of end-to-end content data to the endpoint without encrypting or decrypting. - View Dependent Claims (15, 16)
-
-
17. A method for encrypting information, comprising:
-
programming a network processing device to associate different types of items in transactions with different security associations; processing various different transactions at the network processing device; correlating security associations with different channels in the transactions; encrypting or decrypting the items in the transactions according to the corresponding security associations; configuring the network processing device with different security associations containing encryption keys, the security associations correlated with at least some of the data channels; decrypting only the items from the data channels having corresponding known security associations with configured encryption keys, while keeping the channels without known security associations encrypted; and processing the transactions according to the decrypted items.
-
-
18. A method for encrypting information, comprising:
-
programming a network processing device to associate different types of items in transactions with different security associations; processing various different transactions at the network processing device; correlating security associations with different channels in the transactions; encrypting or decrypting the items in the transactions according to the corresponding security associations; and configuring the network processing device with an encryption schema that associates different types of items in the transactions with the different security associations, the network processing device encrypting or decrypting items in various received or transmitted transactions according to the configured encryption schema. - View Dependent Claims (19)
-
Specification