GB2401292B - Secure network communication - Google Patents

Secure network communication

Info

Publication number
GB2401292B
GB2401292B GB0310169A GB0310169A GB2401292B GB 2401292 B GB2401292 B GB 2401292B GB 0310169 A GB0310169 A GB 0310169A GB 0310169 A GB0310169 A GB 0310169A GB 2401292 B GB2401292 B GB 2401292B
Authority
GB
United Kingdom
Prior art keywords
terminal
network address
network
application
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
GB0310169A
Other versions
GB2401292A (en
Inventor
Richard Craig Beesley
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Roke Manor Research Ltd
Original Assignee
Roke Manor Research Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Roke Manor Research Ltd filed Critical Roke Manor Research Ltd
Priority to GB0310169A priority Critical patent/GB2401292B/en
Publication of GB2401292A publication Critical patent/GB2401292A/en
Application granted granted Critical
Publication of GB2401292B publication Critical patent/GB2401292B/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3495Performance evaluation by tracing or monitoring for systems
    • H04L12/2602
    • H04L29/06047
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/30Managing network names, e.g. use of aliases or nicknames
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

A method of arranging a secure interactive network session between respective users of a first terminal and a second terminal over a data network involves encrypting at a first application a network address of the first terminal and transmitting said encrypted network address from the first application to a network site, for the encrypted network address to be downloaded there from and decrypted by a second application for use by the second terminal. A communication signal may then be received at the first terminal having been transmitted from the second terminal using the decrypted network address. The network address of the first terminal may be encrypted using a symmetric key and the public key of the second terminal. The system may be used in Internet chat, instant messaging and live online game applications.
GB0310169A 2003-05-02 2003-05-02 Secure network communication Expired - Fee Related GB2401292B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0310169A GB2401292B (en) 2003-05-02 2003-05-02 Secure network communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0310169A GB2401292B (en) 2003-05-02 2003-05-02 Secure network communication

Publications (2)

Publication Number Publication Date
GB2401292A GB2401292A (en) 2004-11-03
GB2401292B true GB2401292B (en) 2006-06-07

Family

ID=33155799

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0310169A Expired - Fee Related GB2401292B (en) 2003-05-02 2003-05-02 Secure network communication

Country Status (1)

Country Link
GB (1) GB2401292B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102004055331A1 (en) 2004-11-16 2006-08-17 Jochen Schumacher Method for providing an address in a data network

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH10155040A (en) * 1996-09-30 1998-06-09 Nissin Electric Co Ltd Calling method for dial-up connection communication equipment and monitor control system using the same
JP2000098886A (en) * 1998-09-21 2000-04-07 Matsushita Electric Ind Co Ltd Public key cryptosystem
GB2346229A (en) * 1999-01-29 2000-08-02 Hewlett Packard Co Website usage monitoring
US20020023143A1 (en) * 2000-04-11 2002-02-21 Stephenson Mark M. System and method for projecting content beyond firewalls
WO2003003694A2 (en) * 2001-06-26 2003-01-09 Versada Networks, Inc. Detecting and transporting dynamic presence information over a wireless and wireline communications network

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH10155040A (en) * 1996-09-30 1998-06-09 Nissin Electric Co Ltd Calling method for dial-up connection communication equipment and monitor control system using the same
JP2000098886A (en) * 1998-09-21 2000-04-07 Matsushita Electric Ind Co Ltd Public key cryptosystem
GB2346229A (en) * 1999-01-29 2000-08-02 Hewlett Packard Co Website usage monitoring
US20020023143A1 (en) * 2000-04-11 2002-02-21 Stephenson Mark M. System and method for projecting content beyond firewalls
WO2003003694A2 (en) * 2001-06-26 2003-01-09 Versada Networks, Inc. Detecting and transporting dynamic presence information over a wireless and wireline communications network

Also Published As

Publication number Publication date
GB2401292A (en) 2004-11-03

Similar Documents

Publication Publication Date Title
DE60306835D1 (en) Device for secure multicasting
JP6312616B2 (en) Secure instant messaging
PT2011301E (en) Arrangement of and method for secure data transmission.
ATE527797T1 (en) USER AUTHENTICATION METHOD AND FACILITIES
WO2007123895A3 (en) Privacy enhanced identity scheme using an un-linkable identifier
CN107483505B (en) Method and system for protecting user privacy in video chat
WO2008127446A3 (en) A method and apparatus for time-lapse cryptography
GB0502888D0 (en) Key delivery method and apparatus in a communications system
WO2000041357A8 (en) Exchanging a secret over an unreliable network
CA2450601A1 (en) System and method for compressing secure e-mail for exchange with a mobile data communication device
WO2003081377A3 (en) Methods of exchanging secure messages
WO2002044858A3 (en) System and method for securing a non-secure communication channel
IL159316A (en) System and method for securing privacy of chat participants
WO2000033506A8 (en) Public key cryptosystem with roaming user capability
EP0938209A3 (en) Method and apparatus for conducting crypto-ignition processes between thin client devices and server devices over data networks
TW200735584A (en) Proxy terminal, server device, proxy terminal communication path setting method, and server device communication path setting method
TW200620936A (en) Relay device, authentication server and the method of authentication
CN104618110A (en) VoIP safety meeting session key transmission method
SG143152A1 (en) System and method for secure record protocol using shared knowledge of mobile user credentials
GB2429384A (en) Secure data transmission
ATE335342T1 (en) METHOD FOR KEY AGREEMENT FOR A CRYPTOGRAPHICALLY SECURED POINT-TO-MULTIPOINT CONNECTION
CN106375306A (en) Mobile phone application data transmission encrypting method and system
CN105141984A (en) Network video obtaining system and network video obtaining method
CN104283680A (en) Data transmission method, client side, server and system
CN106549858B (en) Instant messaging encryption method based on identification password

Legal Events

Date Code Title Description
PCNP Patent ceased through non-payment of renewal fee

Effective date: 20070502