Increased communication security
First Claim
Patent Images
1. A method of increasing communication security, said method comprising:
- receiving, from a first computer system at a second computer system, a message including a data portion, wherein said data portion is associated with a security token, and wherein said data portion includes a session key;
performing, at said second computer system, processing associated with said message, wherein said processing includes accessing, from said data portion, a first unique identifier associated with said first computer system, and wherein said processing further includes accessing, from a portion of said message other than said data portion, a second unique identifier associated with said first computer system; and
accessing, responsive to said processing, said session key from said data portion, wherein said accessing further comprises accessing said session key if said first unique identifier correlates to said second unique identifier.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of increasing communication security may include receiving, from a first computer system at a second computer system, a message including a data portion, wherein the data portion is associated with a security token, and wherein the data portion includes a session key. The method may also include performing, at the second computer system, processing associated with the message. The method may further include accessing, responsive to the processing, the session key from the data portion.
38 Citations
37 Claims
-
1. A method of increasing communication security, said method comprising:
-
receiving, from a first computer system at a second computer system, a message including a data portion, wherein said data portion is associated with a security token, and wherein said data portion includes a session key; performing, at said second computer system, processing associated with said message, wherein said processing includes accessing, from said data portion, a first unique identifier associated with said first computer system, and wherein said processing further includes accessing, from a portion of said message other than said data portion, a second unique identifier associated with said first computer system; and accessing, responsive to said processing, said session key from said data portion, wherein said accessing further comprises accessing said session key if said first unique identifier correlates to said second unique identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. An apparatus comprising:
-
a communication interface configured to receive, at a computer system, a message including a data portion, wherein said data portion is associated with a security token, and wherein said data portion includes a session key; and a security component configured to perform processing associated with said message, wherein said security component is further configured to perform said processing by accessing, from said data portion, a first unique identifier associated with another computer system, wherein said security component is further configured to perform said processing by accessing, from a portion of said message other than said data portion, a second unique identifier associated with said another computer system, wherein said security component is further configured to access, responsive to said processing, said session key from said data portion, and wherein said security component is further configured to access said session key if said first unique identifier correlates to said second unique identifier. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. An apparatus comprising:
-
means for receiving, from a first computer system at a second computer system, a message including a data portion, wherein said data portion is associated with a security token, and wherein said data portion includes a session key; means for performing, at said second computer system, processing associated with said message, wherein said processing includes accessing, from said data portion, a first unique identifier associated with said first computer system, and wherein said processing further includes accessing, from a portion of said message other than said data portion, a second unique identifier associated with said first computer system; and means for accessing, responsive to said processing, said session key from said data portion, wherein said means for accessing further comprises means for accessing said session key if said first unique identifier correlates to said second unique identifier. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37)
-
Specification