Increased communication security
First Claim
1. A method of increasing communication security, said method comprising:
- responsive to receiving a first message from a first computer system, determining whether said first computer system is authorized to communicate with a second computer system, wherein said determining is performed at a third computer system;
generating a first data portion associated with a security token, wherein said generating said first data portion includes accessing data, wherein said data includes a first instance of a session key, and wherein said generating said first data portion further includes encrypting, using a key associated with said second computer system, said data to generate said first data portion;
if said first computer system is authorized to communicate with said second computer system, communicating a second message from said third computer system for delivery to said first computer system, wherein said second message includes said first data portion and a second data portion, and wherein said second data portion includes a second instance of said session key;
communicating a third message from said first computer system for delivery to said second computer system, wherein said third message includes said first data portion.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of increasing communication security may include determining, responsive to receiving a first message from a first computer system, whether said first computer system is authorized to communicate with a second computer system, wherein said determining is performed at a third computer system. The method may also include generating a first data portion associated with a security token, wherein said generating said first data portion includes accessing data, wherein said data includes a first instance of a session key, and wherein said generating said first data portion further includes encrypting, using a key associated with said second computer system, said data to generate said first data portion. The method may further include communicating, if said first computer system is authorized to communicate with said second computer system, a second message from said third computer system for delivery to said first computer system.
-
Citations
42 Claims
-
1. A method of increasing communication security, said method comprising:
-
responsive to receiving a first message from a first computer system, determining whether said first computer system is authorized to communicate with a second computer system, wherein said determining is performed at a third computer system; generating a first data portion associated with a security token, wherein said generating said first data portion includes accessing data, wherein said data includes a first instance of a session key, and wherein said generating said first data portion further includes encrypting, using a key associated with said second computer system, said data to generate said first data portion; if said first computer system is authorized to communicate with said second computer system, communicating a second message from said third computer system for delivery to said first computer system, wherein said second message includes said first data portion and a second data portion, and wherein said second data portion includes a second instance of said session key; communicating a third message from said first computer system for delivery to said second computer system, wherein said third message includes said first data portion. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A system comprising:
-
a first computer system; a second computer system; and a third computer system configured to determine, responsive to receiving a first message from said first computer system, whether said first computer system is authorized to communicate with said second computer system, wherein said third computer system is further configured to access data, wherein said data includes a first instance of a session key, wherein said third computer system is further configured to encrypt, using a key associated with said second computer system, said data to generate a first data portion, wherein said first data portion is associated with a security token, and wherein said third computer system is further configured to communicate, if said first computer system is authorized to communicate with said second computer system, a second message for delivery to said first computer system, wherein said second message includes said first data portion and a second data portion, and wherein said second data portion includes a second instance of said session key, and wherein said first computer system is configured to communicate a third message for delivery to said second computer system, wherein said third message includes said first data portion. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A system comprising:
-
means for determining, responsive to receiving a first message from a first computer system, whether said first computer system is authorized to communicate with a second computer system, wherein said means for determining is part of a third computer system; means for generating a first data portion associated with a security token, wherein said means for generating said first data portion includes means for accessing data, wherein said data includes a first instance of a session key, and wherein said means for generating said first data portion further includes means for encrypting, using a key associated with said second computer system, said data to generate said first data portion; means for communicating, if said first computer system is authorized to communicate with said second computer system, a second message from said third computer system for delivery to said first computer system, wherein said second message includes said first data portion and a second data portion, and wherein said second data portion includes a second instance of said session key; and means for communicating a third message from said first computer system for delivery to said second computer system, wherein said third message includes said first data portion. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
-
Specification