Method for asymmetric security
First Claim
1. A method for asymmetric message security, the method comprising:
- receiving a first message at a second node, the first message received from a first node, the first message secured at a first security level, the first security level actively selected from a plurality of available security levels, the first security level selected in accordance with a sensitivity level of the first message, wherein the first node and the second node comprise a central processing unit and an electronic storage device;
processing the first message according to the first security level to make the first message usable by the second node;
selecting a second security level for a second message, the second security level is a different security level than the first security level, the second security level selected from the plurality of available security levels, the second security level selected in accordance with a sensitivity level of the second message, wherein the first security level and the second security level are selected to minimize use of security resources;
applying the selected second security level to the second message;
transmitting the second message at the second security level to the first node in response to receiving the first message, the first message and the second message together communicated within a single communication session; and
communicating the second security level to the first node.
1 Assignment
0 Petitions
Accused Products
Abstract
A method is disclosed for asymmetric security in data communications between two or more nodes. Asymmetric security within data communications refers to sending and receiving messages at different security levels. The method includes a receiving module, a transmission module, and a communication module. The receiving module receives a first message at a first security level from a first node. A security level may be defined by implementation of one or more security features, including encryption, digital signatures, and/or other security features. The transmission module transmits a second message at a second security level to the first node in response to receiving the first message. The first and second messages may be communicated during a single communication session. The communication module communicates the second security level to the first node. The communication may be directly between two nodes or may occur via a broker or other intermediate node.
38 Citations
8 Claims
-
1. A method for asymmetric message security, the method comprising:
-
receiving a first message at a second node, the first message received from a first node, the first message secured at a first security level, the first security level actively selected from a plurality of available security levels, the first security level selected in accordance with a sensitivity level of the first message, wherein the first node and the second node comprise a central processing unit and an electronic storage device; processing the first message according to the first security level to make the first message usable by the second node; selecting a second security level for a second message, the second security level is a different security level than the first security level, the second security level selected from the plurality of available security levels, the second security level selected in accordance with a sensitivity level of the second message, wherein the first security level and the second security level are selected to minimize use of security resources; applying the selected second security level to the second message; transmitting the second message at the second security level to the first node in response to receiving the first message, the first message and the second message together communicated within a single communication session; and communicating the second security level to the first node. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
Specification