×

Oblivious proxying using a secure coprocessor

  • US 7,430,757 B1
  • Filed: 01/08/1999
  • Issued: 09/30/2008
  • Est. Priority Date: 01/08/1999
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for providing secure communications on a network, the method comprising:

  • providing a secure communication for between a client and a server employing an untrusted proxy by means of;

    employing said proxy between said client and said server to provide connection links between said client and said server;

    embedding a secure coprocessor for use as an agent of said client and/or said server which assures that said proxy cannot tamper with the functioning of said agent and view unencrypted communication between said client and said server, said agent being a software program or hardware logic operating within the confines of said secure coprocessor;

    said proxy receiving a specific encrypted communication request from said client;

    said coprocessor is located at the site of said proxy and;

    (a) acts as a converter between at least one protocol said client supports, and at least one other protocol supported by said server, (b) guarantees that an application embedded in said coprocessor performs to a degree of security proscribed by said client and/or said server;

    said proxy forming an n-tuple for a specific communication;

    said proxy forwarding said n-tuple to said coprocessor;

    said coprocessor generating a response, including a directive to said n-tuple;

    said coprocessor sending said response to said proxy andsaid proxy implementing a directive; and

    employing the respective security protocols of said at least one protocol and said at least one other protocol;

    splicing a plurality of secure communication protocols of different protocol suites into the agent, wherein the step of splicing a plurality of secure communication protocols is a security protocol of a Wireless Application Protocol Suite (WAP) to that of an Internet Protocol (IP) device, said WAP being used by a pervasive computing device, and said agent performs at least one content adaptation function.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×