Security server system
First Claim
Patent Images
1. A system for securely communicating a message between a plurality of participants, wherein the message has a message header and a message content, the system comprising:
- a message router that connects the participants via a network and delivers the message between the participants based on the message header; and
a key server that stores and releases conversation keys to the participants, wherein said conversation keys are used to apply protection to the message content of the message.
12 Assignments
0 Petitions
Accused Products
Abstract
A security server system and method permitting participants acting as the source or destinations for a message or a conversation with multiple messages to securely communicate the messages. The messages have a message header and a message content. A message router connects the participants via a network and delivers the message between the participants based on the message header. A key server creates, stores, and releases conversation keys that the participants use to protect the message content of the message.
116 Citations
28 Claims
-
1. A system for securely communicating a message between a plurality of participants, wherein the message has a message header and a message content, the system comprising:
-
a message router that connects the participants via a network and delivers the message between the participants based on the message header; and a key server that stores and releases conversation keys to the participants, wherein said conversation keys are used to apply protection to the message content of the message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method for securely communicating a message between a plurality of participants in a network, wherein the participant sending the message is a source participant and the participants receiving the message are destination participants and the message has a message header and a message content, the method comprising:
-
(a) at the source participant; (1) obtaining a conversation key; (2) applying protection to the message content of the message based on said conversation key, wherein said protection includes at least one member of the set consisting of encrypting and hashing; and (3) sending the message to the destination participants via the network; and (b) at the destination participants; (1) receiving the message from the source participant via the network; (2) obtaining said conversation key from a key server also in the network; and (3) processing the message content of the message based on said conversation key, wherein said procesing includes at least one of decrypting and hash analysis. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
Specification