Information security architecture for remote access control using non-bidirectional protocols
First Claim
1. A method of controlling distribution of electronic information to a user device through a non-bidirectional communication protocol, comprising:
- retrieving, at a user device, a segment of encrypted electronic information;
first sending identification data from the user device to a gateway using the non-bidirectional communication protocol, the identification information including at least one of information associated with a user, information associated with the user device, or information associated with the segment of encrypted electronic information;
first extracting at the gateway the identification data from said first sending;
first forwarding the identification data from the gateway based on a bi-directional protocol;
retrieving an encryption key for the segment;
second forwarding a voucher to the gateway using the bi-directional protocol;
second extracting the voucher from said forwarding;
second sending the voucher to the user device using said a non-bidirectional communication protocol, the voucher including at least the encryption key associated with the segment; and
decrypting, at the user device, the segment using the encryption key for the segment.
9 Assignments
0 Petitions
Accused Products
Abstract
A system and method of controlling distribution of electronic information to a device through a non-bidirectional protocol is disclosed. At a user device, a segment of encrypted electronic information is retrieved. Identification data is sent from the user device using the non-bidirectional communications protocol, where the identification information includes at least one of information associated with a user, information associated with the user device, or information associated with the segment of encrypted electronic information. A copy of an encryption key for the segment is retrieved. A voucher is forwarded to the user device using the non-bidirectional communications protocol, the voucher including at least the encryption key associated with the segment. At the user device, the segment is decrypted using the encryption key for the segment.
-
Citations
24 Claims
-
1. A method of controlling distribution of electronic information to a user device through a non-bidirectional communication protocol, comprising:
-
retrieving, at a user device, a segment of encrypted electronic information; first sending identification data from the user device to a gateway using the non-bidirectional communication protocol, the identification information including at least one of information associated with a user, information associated with the user device, or information associated with the segment of encrypted electronic information; first extracting at the gateway the identification data from said first sending; first forwarding the identification data from the gateway based on a bi-directional protocol; retrieving an encryption key for the segment; second forwarding a voucher to the gateway using the bi-directional protocol; second extracting the voucher from said forwarding; second sending the voucher to the user device using said a non-bidirectional communication protocol, the voucher including at least the encryption key associated with the segment; and decrypting, at the user device, the segment using the encryption key for the segment. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of controlling distribution of electronic information, comprising:
-
receiving identification information transmitted via a non-bidirectional communication protocol and then a bidirectional protocol, the identification information including at least information associated with a user, a user device, and a segment of encrypted electronic information; retrieving an encryption key for the segment; preparing a voucher, the voucher including at least an encryption key for decrypting the segment, and a validity period; encrypting the voucher using a key specific to at least the user device; and forwarding the voucher using the bidirectional protocol followed by the non-bidirectional communication protocol. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A system for controlling distribution of electronic information to a user device through a non-bidirectional communications protocol, comprising:
-
said user device being configured to access a segment of encrypted electronic information and to send identification data to a gateway using the non-bidirectional communications protocol, the identification information including at least one of information associated with a user, information associated with the user device, or information associated with the segment of encrypted electronic information; a remote site including at least one server configured to retrieving a copy of an encryption key for the segment and forward a voucher to the gateway using a bidirectional communications protocol, wherein the voucher includes at least the encryption key associated with the segment; the gateway being configured to receive the identification data from the user device using the non-bidirectional protocol and forward the identification data to the remote site using the bidirectional protocol, and to receive the voucher from the remote site using the bidirectional protocol and to forward the voucher to the user device using the non-bidirectional protocol; and said user device being configured to receive said voucher and decrypt the segment using the encryption key for the segment. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
-
20. A system of controlling distribution of electronic information, comprising:
-
at least one server configured to; receive identification information sent using a non-bidirectional communications protocol followed by using a bidirectional protocol, the identification information including at least information associated with a user, a user device, and a segment of encrypted electronic information; retrieve a copy of an encryption key for the segment; prepare a voucher that includes at least an encryption key for decrypting the segment and a validity period; encrypt the voucher using a key specific to at least the user device; and forward the voucher using the bidirectional protocol followed by using the non-bidirectional communications protocol. - View Dependent Claims (21, 22, 23, 24)
-
Specification