Secure end-to-end transport through intermediary nodes
First Claim
Patent Images
1. A non-transitory computer-readable storage medium, the non-transitory computer-readable storage medium storing instructions to be implemented on at least one server including at least one processor, the instructions when executed by the at least one processor cause the at least one server to perform a method for processing a transaction, the method comprising:
- receiving a username and a password from a first computer;
authenticating the username and the password with a user database;
issuing a token for the first computer, wherein a first point-to-point security association is negotiated with the first computer and a second point-to-point security association is negotiated with a second computer;
receiving a transaction message from the second computer, the transaction message comprising control data and payload data, wherein;
the control data provides authentication of a source of the transaction and includes the token; and
the token provides transaction routing information; and
transmitting the payload data to the first computer based on the token.
2 Assignments
0 Petitions
Accused Products
Abstract
A communication network encrypts a first portion of a transaction associated with point-to-point communications using a point-to-point encryption key. A second portion of the transaction associated with end-to-end communications is encrypted using an end-to-end encryption key.
8 Citations
24 Claims
-
1. A non-transitory computer-readable storage medium, the non-transitory computer-readable storage medium storing instructions to be implemented on at least one server including at least one processor, the instructions when executed by the at least one processor cause the at least one server to perform a method for processing a transaction, the method comprising:
-
receiving a username and a password from a first computer; authenticating the username and the password with a user database; issuing a token for the first computer, wherein a first point-to-point security association is negotiated with the first computer and a second point-to-point security association is negotiated with a second computer; receiving a transaction message from the second computer, the transaction message comprising control data and payload data, wherein; the control data provides authentication of a source of the transaction and includes the token; and the token provides transaction routing information; and transmitting the payload data to the first computer based on the token. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method implemented on at least one server for processing a transaction, the method comprising:
-
receiving a username and a password from a first computer; authenticating the username and the password with a user database; issuing a token for the first computer, wherein a first point-to-point security association is negotiated with the first computer and a second point-to-point security association is negotiated with a second computer; receiving a transaction message from the second computer, the transaction message comprising control data and payload data, wherein; the control data provides authentication of a source of the transaction and includes the token; and the token provides transaction routing information; and transmitting the payload data to the first computer based on the token. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A server for processing a transaction, the server having a processor configured for:
-
receiving a username and a password from a first computer; authenticating the username and the password with a user database; issuing a token for the first computer, wherein a first point-to-point security association is negotiated with the first computer and a second point-to-point security association is negotiated with a second computer; receiving a transaction message from the second computer, the transaction message comprising control data and payload data, wherein; the control data provides authentication of a source of the transaction and includes the token; and the token provides transaction routing information; and transmitting the payload data to the first computer based on the token. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification