GB2401292B - Secure network communication - Google Patents
Secure network communicationInfo
- Publication number
- GB2401292B GB2401292B GB0310169A GB0310169A GB2401292B GB 2401292 B GB2401292 B GB 2401292B GB 0310169 A GB0310169 A GB 0310169A GB 0310169 A GB0310169 A GB 0310169A GB 2401292 B GB2401292 B GB 2401292B
- Authority
- GB
- United Kingdom
- Prior art keywords
- terminal
- network address
- network
- application
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 230000002452 interceptive effect Effects 0.000 abstract 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3466—Performance evaluation by tracing or monitoring
- G06F11/3495—Performance evaluation by tracing or monitoring for systems
-
- H04L12/2602—
-
- H04L29/06047—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/30—Managing network names, e.g. use of aliases or nicknames
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Information Transfer Between Computers (AREA)
Abstract
A method of arranging a secure interactive network session between respective users of a first terminal and a second terminal over a data network involves encrypting at a first application a network address of the first terminal and transmitting said encrypted network address from the first application to a network site, for the encrypted network address to be downloaded there from and decrypted by a second application for use by the second terminal. A communication signal may then be received at the first terminal having been transmitted from the second terminal using the decrypted network address. The network address of the first terminal may be encrypted using a symmetric key and the public key of the second terminal. The system may be used in Internet chat, instant messaging and live online game applications.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0310169A GB2401292B (en) | 2003-05-02 | 2003-05-02 | Secure network communication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0310169A GB2401292B (en) | 2003-05-02 | 2003-05-02 | Secure network communication |
Publications (2)
Publication Number | Publication Date |
---|---|
GB2401292A GB2401292A (en) | 2004-11-03 |
GB2401292B true GB2401292B (en) | 2006-06-07 |
Family
ID=33155799
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0310169A Expired - Fee Related GB2401292B (en) | 2003-05-02 | 2003-05-02 | Secure network communication |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2401292B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102004055331A1 (en) | 2004-11-16 | 2006-08-17 | Jochen Schumacher | Method for providing an address in a data network |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH10155040A (en) * | 1996-09-30 | 1998-06-09 | Nissin Electric Co Ltd | Calling method for dial-up connection communication equipment and monitor control system using the same |
JP2000098886A (en) * | 1998-09-21 | 2000-04-07 | Matsushita Electric Ind Co Ltd | Public key cryptosystem |
GB2346229A (en) * | 1999-01-29 | 2000-08-02 | Hewlett Packard Co | Website usage monitoring |
US20020023143A1 (en) * | 2000-04-11 | 2002-02-21 | Stephenson Mark M. | System and method for projecting content beyond firewalls |
WO2003003694A2 (en) * | 2001-06-26 | 2003-01-09 | Versada Networks, Inc. | Detecting and transporting dynamic presence information over a wireless and wireline communications network |
-
2003
- 2003-05-02 GB GB0310169A patent/GB2401292B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH10155040A (en) * | 1996-09-30 | 1998-06-09 | Nissin Electric Co Ltd | Calling method for dial-up connection communication equipment and monitor control system using the same |
JP2000098886A (en) * | 1998-09-21 | 2000-04-07 | Matsushita Electric Ind Co Ltd | Public key cryptosystem |
GB2346229A (en) * | 1999-01-29 | 2000-08-02 | Hewlett Packard Co | Website usage monitoring |
US20020023143A1 (en) * | 2000-04-11 | 2002-02-21 | Stephenson Mark M. | System and method for projecting content beyond firewalls |
WO2003003694A2 (en) * | 2001-06-26 | 2003-01-09 | Versada Networks, Inc. | Detecting and transporting dynamic presence information over a wireless and wireline communications network |
Also Published As
Publication number | Publication date |
---|---|
GB2401292A (en) | 2004-11-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE60306835D1 (en) | Device for secure multicasting | |
JP6312616B2 (en) | Secure instant messaging | |
PT2011301E (en) | Arrangement of and method for secure data transmission. | |
ATE527797T1 (en) | USER AUTHENTICATION METHOD AND FACILITIES | |
WO2007123895A3 (en) | Privacy enhanced identity scheme using an un-linkable identifier | |
CN107483505B (en) | Method and system for protecting user privacy in video chat | |
WO2008127446A3 (en) | A method and apparatus for time-lapse cryptography | |
GB0502888D0 (en) | Key delivery method and apparatus in a communications system | |
WO2000041357A8 (en) | Exchanging a secret over an unreliable network | |
CA2450601A1 (en) | System and method for compressing secure e-mail for exchange with a mobile data communication device | |
WO2003081377A3 (en) | Methods of exchanging secure messages | |
WO2002044858A3 (en) | System and method for securing a non-secure communication channel | |
IL159316A (en) | System and method for securing privacy of chat participants | |
WO2000033506A8 (en) | Public key cryptosystem with roaming user capability | |
EP0938209A3 (en) | Method and apparatus for conducting crypto-ignition processes between thin client devices and server devices over data networks | |
TW200735584A (en) | Proxy terminal, server device, proxy terminal communication path setting method, and server device communication path setting method | |
TW200620936A (en) | Relay device, authentication server and the method of authentication | |
CN104618110A (en) | VoIP safety meeting session key transmission method | |
SG143152A1 (en) | System and method for secure record protocol using shared knowledge of mobile user credentials | |
GB2429384A (en) | Secure data transmission | |
ATE335342T1 (en) | METHOD FOR KEY AGREEMENT FOR A CRYPTOGRAPHICALLY SECURED POINT-TO-MULTIPOINT CONNECTION | |
CN106375306A (en) | Mobile phone application data transmission encrypting method and system | |
CN105141984A (en) | Network video obtaining system and network video obtaining method | |
CN104283680A (en) | Data transmission method, client side, server and system | |
CN106549858B (en) | Instant messaging encryption method based on identification password |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PCNP | Patent ceased through non-payment of renewal fee |
Effective date: 20070502 |