System and method for routing messages
First Claim
1. A computer-implemented method for routing messages, comprising the steps of:
- receiving a message, encrypted according to a first encryption process, via a first protocol, the message having a data payload in a first format;
determining a destination for the message;
determining a second protocol for the destination;
determining whether the first format of the data payload is to be converted to a second format;
converting the data payload from the first format to the second format, if it is determined that the first format of the data payload is to be converted to the second format; and
transmitting the message to the destination via the second protocolwherein the message is transmitted in the first format if the data payload was not converted from the first format to the second format, andwherein the message is transmitted in the second format to the destination, if the data payload was converted from the first format to the second format;
determining whether the message is to be encrypted prior to being transmitted to the destination;
decrypting the message, if it is determined that the message is not to be encrypted prior to being transmitted to the destination, wherein the decrypted message is transmitted to the destination;
determining whether the message is to be encrypted according to a second encryption process prior to being transmitted to the destination, if it is determined that the message is to be encrypted prior to being transmitted to the destination; and
decryping the message and encrypting the message according to the second encryption process, if it is determined that the message is to be encrypted according to the second encryption process prior to being transmitted to the destination,wherein the message encrypted according to the second encryption process is transmitted to the destination.
2 Assignments
0 Petitions
Accused Products
Abstract
A hub-and-spoke communication arrangement is provided, in which the “hub” includes a server computer system. The “spokes” are other computers that act as message originators and/or destinations. All internal-to-external messages, and vice versa, are routed through the server computer system to reduce the number of proprietary connections needed between the internal and external entities. In addition, the server computer system provides protocol conversion, message payload conversion, encryption conversion, message broadcast, and/or message archival functionality, so that the “spoke” computers need not be concerned with providing such functionality on their own.
182 Citations
15 Claims
-
1. A computer-implemented method for routing messages, comprising the steps of:
-
receiving a message, encrypted according to a first encryption process, via a first protocol, the message having a data payload in a first format; determining a destination for the message; determining a second protocol for the destination; determining whether the first format of the data payload is to be converted to a second format; converting the data payload from the first format to the second format, if it is determined that the first format of the data payload is to be converted to the second format; and transmitting the message to the destination via the second protocol wherein the message is transmitted in the first format if the data payload was not converted from the first format to the second format, and wherein the message is transmitted in the second format to the destination, if the data payload was converted from the first format to the second format; determining whether the message is to be encrypted prior to being transmitted to the destination; decrypting the message, if it is determined that the message is not to be encrypted prior to being transmitted to the destination, wherein the decrypted message is transmitted to the destination; determining whether the message is to be encrypted according to a second encryption process prior to being transmitted to the destination, if it is determined that the message is to be encrypted prior to being transmitted to the destination; and decryping the message and encrypting the message according to the second encryption process, if it is determined that the message is to be encrypted according to the second encryption process prior to being transmitted to the destination, wherein the message encrypted according to the second encryption process is transmitted to the destination. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer-accessible memory storing computer code for implementing a method for routing messages, wherein the computer code comprises:
-
code for receiving a message, encrypted according to a first encryption process, via a first protocol, the message having a data payload in a first format; code for determining a destination for the message; code for determining a second protocol for the destination; code for determining whether the first format of the data payload is to be converted to a second format; code for converting the data payload from the first format to the second format, if determined that the first format of the data payload is to be converted to the second format; and code for transmitting the message to the destination via the second protocol, wherein the message is transmitted in the first format if the data payload was not converted from the first format to the second format, and wherein the message is transmitted in the second format to the destination if the data payload was converted from the first format to the second format; code for determining whether the message is to be encrypted prior to being transmitted to the destination; code for decrypting the message, if it is determined that the message is not to be encrypted prior to being transmitted to the destination, wherein the decrypted message is transmitted to the destination; code for determining whether the message is to be encrypted according to a second encryption process prior to being transmitted to the destination, if it is determined that the message is to be encrypted prior to being transmitted to the destination; and code for decrypting the message and encrypting the message according to the second encryption process, if it is determined that the message is to be encrypted according to the second encryption process prior to being transmitted to the destination, wherein the message encrypted according to the second encryption process is transmitted to the destination. - View Dependent Claims (7, 8)
-
-
9. A system for routing messages, the system comprising:
-
a first client computer configured to execute a client messaging program that instructs the first client computer to transmit a message via a first protocol; a second client computer; and
a server computer communicatively connected to the first client computer and the second client computer, wherein the server computer is configured to execute a server messaging program that instructs the server computer to at least;receive the message from the first client computer via the first protocol, wherein the message includes information that specifies the second client computer as a destination for the message; determine a second protocol for the second client computer; and transmit the message to the second client computer via the second protocol; wherein the first client computer is programmed at least to encrypt the message according to a free-of-charge encryption process prior to transmission, and the server messaging program further instructs the server computer to at least; decrypt the message according to the free-of-charge encryption process; and encrypt the message according to a proprietary encryption process, wherein the message encrypted according to the proprietary encryption process is transmitted to the second client computer via the second protocol. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A computer-based method for routing messages, comprising the steps of:
-
receiving an MQ message, encrypted according to a first encryption process, via a first protocol, wherein the message has a data payload in a first format;
determining a destination for the message;determining a second protocol for the destination; determining whether the first format of the data payload is to be converted to a second format; converting the data payload from the first format to the second format, if it is determined that the first format of the data payload is to be converted to the second format, wherein the first format or the second format or both the first format and the second format are a Microsoft Word format, a Microsoft Excel.™
. format, a Microsoft Powerpoint.™
. format, a WordPerfect.™
. format, a Portable Document Format (“
PDF”
) format, a text-based format, an XML-based format, an ebXML format, a SWIFT format, a FIX format, an ATM format, a CHIP format, an ACH format, an EDI format, an image file format, or a video file format;determining whether the message is to be encrypted prior to being transmitted to the destination; decrypting the message, if it is determined that the message is not to be encrypted prior to being transmitted to the destination, wherein the decrypted message is transmitted to the destination; determining whether the message is to be encrypted according to a second encryption process prior to being transmitted to the destination, if it is determined that the message is to be encrypted prior to being transmitted to the destination; encrypting the message and encrypting the message according to the second encryption process, if it is determined that the message is to be encrypted according to the second encryption process prior to being transmitted to the destination; determining whether the message is to be archived by reading the message for an indication that the message is to be persistent;
archiving the message, if it is determined that the message is to be archived; andtransmitting the message, encrypted according to the second encryption process, to the destination via the second protocol, wherein the message is transmitted in the first format if the data payload was not converted from the first format to the second format, and wherein the message is transmitted in the second format to the destination if the data payload was converted from the first format to the second format.
-
Specification