Systems and methods for multi-level tagging of encrypted items for additional security and efficient encrypted item determination
First Claim
1. A method for more efficiently providing security for an encrypted item via multi-level tagging, the method comprising:
- (a) identifying, by a device that a first encrypted item of a first message has attached a first tag as one of a first prefix or a first postfix to the first encrypted item that identifies the first encrypted item is encrypted;
(b) removing, by the device responsive to the identification, the first tag from the first encrypted item;
(c) decrypting, by the device responsive to the identification of the first tag, the first encrypted item with the first tag removed;
(d) determining, by the device, that the decrypted item has attached a second tag as one of a second prefix or a second postfix to the decrypted item that identifies that the device had encrypted the item into the first encrypted item; and
(e) processing, by the device responsive to the determination that the decrypted item has attached the second tag, the item with the second tag removed from the first encrypted item.
7 Assignments
0 Petitions
Accused Products
Abstract
The present disclosure is directed towards systems and methods for performing multi-level tagging of encrypted items for additional security and efficient encrypted item determination. A device intercepts a message from a server to a client, parses the message and identifies a cookie. The device processes and encrypts the cookie. The device adds a flag to the cookie indicating the device encrypted the cookie. The device re-inserts the modified cookie into the message and transmits the message. The device intercepts a message from a client and determines whether the cookie in the message was encrypted by the device. If the message was not encrypted by the device, the device transmits the message to its destination. If the message was encrypted by the device, the device removes the flag, decrypts the cookie, removes the tag from the cookie, re-inserts the cookie into the message and transmits the message to its final destination.
-
Citations
13 Claims
-
1. A method for more efficiently providing security for an encrypted item via multi-level tagging, the method comprising:
-
(a) identifying, by a device that a first encrypted item of a first message has attached a first tag as one of a first prefix or a first postfix to the first encrypted item that identifies the first encrypted item is encrypted; (b) removing, by the device responsive to the identification, the first tag from the first encrypted item; (c) decrypting, by the device responsive to the identification of the first tag, the first encrypted item with the first tag removed; (d) determining, by the device, that the decrypted item has attached a second tag as one of a second prefix or a second postfix to the decrypted item that identifies that the device had encrypted the item into the first encrypted item; and (e) processing, by the device responsive to the determination that the decrypted item has attached the second tag, the item with the second tag removed from the first encrypted item. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for multi-level tagging of an encrypted item to provide improved security, the method comprising
(a) receiving, by a device from a sender, a message to a receiver, the message comprising an item to be encrypted; -
(b) attaching, by the device, a first predetermined tag as one of a first prefix or a first postfix to at least one end of the item; (c) encrypting, by the device, the item with the attached first predetermined tag to identify that the device is the device that encrypted the item; (d) attaching, by the device, a second predetermined tag as one of a second prefix or a second postfix to at least one end of the encrypted item, the encrypted item comprising the first predetermined tag, the second predetermined tag identifying that the encrypted item is encrypted; and (e) communicating, by the device, to the receiver the message comprising the encrypted item having attached the second predetermined tag and the encrypted item comprising the first predetermined tag attached to the item. - View Dependent Claims (9, 10, 11, 12, 13)
-
Specification