WO2022219391A1 - System and method for secured transmission of packets between a host and an end-user - Google Patents

System and method for secured transmission of packets between a host and an end-user Download PDF

Info

Publication number
WO2022219391A1
WO2022219391A1 PCT/IB2021/058346 IB2021058346W WO2022219391A1 WO 2022219391 A1 WO2022219391 A1 WO 2022219391A1 IB 2021058346 W IB2021058346 W IB 2021058346W WO 2022219391 A1 WO2022219391 A1 WO 2022219391A1
Authority
WO
WIPO (PCT)
Prior art keywords
socket layer
secure socket
websites
module
information
Prior art date
Application number
PCT/IB2021/058346
Other languages
French (fr)
Inventor
Bharanishunkkar Shanmugavel
Original Assignee
Bharanishunkkar Shanmugavel
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bharanishunkkar Shanmugavel filed Critical Bharanishunkkar Shanmugavel
Priority to DE112021007532.2T priority Critical patent/DE112021007532T5/en
Publication of WO2022219391A1 publication Critical patent/WO2022219391A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements

Definitions

  • Embodiments of the present disclosure relate to establishing secure socket layer connection and more particularly, to a system and a method for secured transmission of packets between a host and an end-user.
  • SSL certificates are known today to provide secure connections between two computers such as between a client and a server.
  • An SSL certificate is an electronic certificate/document which attests to the binding of a public encryption key to an individual or computer.
  • the SSL certificate allows verification of a claim by the individual or computer that a specific public key is associated with the individual or computer. This allows another party to be assured that the individual or computer is the entity to which this other party intends to communicate.
  • the SSL certificate ensures that all data passed between the web server and browser remain private.
  • Various approaches are available for enabling the transmission of data packets between a host and an end-user using the SSL certificates.
  • a system for secured transmission of packets between a host and an end-user includes a processing subsystem hosted on a server.
  • the processing subsystem is configured to execute on a network to control bidirectional communications among a plurality of modules.
  • the processing subsystem includes an information receiving module configured to receive information associated with one or more websites hosted by one or more corresponding website owners.
  • the information receiving module is also configured to fetch one or more secure socket layer certificates corresponding to each of the one or more websites from one or more respective secure socket layer service providers.
  • the processing subsystem also includes a security information modification module operatively coupled to the information receiving module.
  • the security information modification module is configured to enable the one or more website owners to modify a plurality of properties of the one or more secure socket layer certificates corresponding to each of the one or more websites using a request for change.
  • the processing subsystem also includes a security information verification module operatively coupled to the security information modification module.
  • the security information verification module is configured to enable the one or more respective secure socket layer service providers to verify a plurality of values representative of each of the plurality of the properties modified periodically.
  • the security information verification module is also configured to create an index associated with each of the one or more websites for enabling searching by one or more end-users upon verification of the plurality of values representative of each of the plurality of the properties.
  • the security information verification module is also configured to enable the one or more respective secure socket layer service providers to verify the search index created for the searching using a predetermined set of procedures.
  • the security information verification module is also configured to allow the one or more respective secure socket layer service providers to provide a distributed index associated with each of the one or more websites to one or more end- users based on pooling of the index created.
  • the security information verification module is also configured to update the created and pooled index periodically.
  • the processing subsystem also includes a website ranking module operatively coupled to the security information verification module.
  • the website ranking module is configured to authorize the one or more respective secure socket layer service providers to rank each of the one or more websites between the one or more respective secure socket layer service providers using a website ranking technique based on the plurality of properties and one or more end user’s queries.
  • the processing subsystem also includes a direct route access module operatively coupled to the website ranking module.
  • the direct route access module is configured to provide an access to the one or more website owners and the one or more end-users for facilitating packet routing over an interconnected network via a secure socket layer protocol.
  • a method for secured transmission of packets between a host and an end-user includes receiving, by an information receiving module, information associated with one or more websites hosted by one or more corresponding website owners.
  • the method also includes fetching, by the information receiving module, one or more secure socket layer certificates corresponding to each of the one or more websites from one or more respective secure socket layer service providers.
  • the method also includes enabling, by a security information modification module, the one or more website owners to modify a plurality of properties of the one or more secure socket layer certificates corresponding to each of the one or more websites using a request for change.
  • the method also includes enabling, by a security information verification module, the one or more respective secure socket layer service providers to verify a plurality of values representative of each of the plurality of the properties modified periodically.
  • the method also includes creating, by the security information verification module, an index associated with each of the one or more websites for enabling searching by one or more end-users upon verification of the plurality of values representative of each of the plurality of the properties.
  • the method also includes enabling, by the security information verification module, the one or more respective secure socket layer service providers to verify the index created for the searching using a predetermined set of procedures.
  • the method also includes updating, by the security information verification module, the created and pooled index periodically.
  • the method also includes allowing, by the security information verification module, the one or more respective secure socket layer service providers to provide a distributed index associated with each of the one or more websites to one or more end-users based on pooling of the index created.
  • the method also includes authorizing, by a website ranking module, the one or more respective secure socket layer service providers to rank each of the one or more websites between the one or more respective secure socket layer service providers using a website ranking technique based on the plurality of properties and one or more end user’s queries.
  • the method also includes providing, by a direct route access module, an access to the one or more website owners and the one or more end-users for facilitating packet routing over an interconnected network via a secure socket layer protocol.
  • FIG. 1 is a block diagram of a system for secured transmission of packets between a host and an end-user in accordance with an embodiment of the present disclosure
  • FIG. 2 illustrates a schematic representation of an exemplary embodiment of a system for secured transmission of packets between a host and an end-user of FIG.l in accordance with an embodiment of the present disclosure
  • FIG. 3 is a block diagram of a computer or a server in accordance with an embodiment of the present disclosure
  • FIG. 4 (a) and FIG. 4 (b) is a flow chart representing the steps involved in a method for secured transmission of packets between a host and an end-user of FIG. 1 in accordance with the embodiment of the present disclosure.
  • Embodiments of the present disclosure relate to a system and a method for secured transmission of packets between a host and an end-user.
  • the system includes a processing subsystem hosted on a server.
  • the processing subsystem is configured to execute on a network to control bidirectional communications among a plurality of modules.
  • the processing subsystem includes an information receiving module configured to receive information associated with one or more websites hosted by one or more corresponding website owners.
  • the information receiving module is also configured to fetch one or more secure socket layer certificates corresponding to each of the one or more websites from one or more respective secure socket layer service providers.
  • the processing subsystem also includes a security information modification module operatively coupled to the information receiving module.
  • the security information modification module is configured to enable the one or more website owners to modify a plurality of properties of the one or more secure socket layer certificates corresponding to each of the one or more websites using a request for change.
  • the processing subsystem also includes a security information verification module operatively coupled to the security information modification module.
  • the security information verification module is configured to enable the one or more respective secure socket layer service providers to verify a plurality of values representative of each of the plurality of the properties modified periodically.
  • the security information verification module is also configured to create an index associated with each of the one or more websites for enabling searching by one or more end-users upon verification of the plurality of values representative of each of the plurality of the properties.
  • the security information verification module is also configured to enable the one or more respective secure socket layer service providers to verify the index created for the searching using a predetermined set of procedures.
  • the security information verification module is also configured to allow the one or more respective secure socket layer service providers to provide a distributed index associated with each of the one or more websites to one or more end-users based on pooling of the search index created.
  • the security information verification module is also configured to update the created and pooled index periodically.
  • the processing subsystem also includes a website ranking module operatively coupled to the security information verification module.
  • the website ranking module is configured to authorize the one or more respective secure socket layer service providers to rank each of the one or more websites between the one or more respective secure socket layer service providers using a website ranking technique based on the plurality of properties and one or more end user’s queries.
  • the processing subsystem also includes a direct route access module operatively coupled to the website ranking module.
  • the direct route access module is configured to provide an access to the one or more website owners and the one or more end-users for facilitating packet routing over an interconnected network via a secure socket layer protocol.
  • FIG. 1 is a block diagram of a system (100) for secured transmission of packets between a host and an end-user in accordance with an embodiment of the present disclosure.
  • the system includes a processing subsystem hosted on a server.
  • the server (108) may include a cloud server.
  • the server (108) may include a local server.
  • the processing subsystem (105) is configured to execute on a network (not shown in FIG. 1) to control bidirectional communications among a plurality of modules.
  • the network may include a wired network such as a local area network (LAN).
  • the network may include a wireless network such as Wi-Fi, Bluetooth, near field communication (NFC), infra-red communication (RFID) or the like.
  • the processing subsystem (105) includes an information receiving module (110) configured to receive information associated with one or more websites hosted by one or more corresponding website owners.
  • the term ‘website owner’ is defined as a host or an individual or an entity who is responsible for publishing and maintaining the contents of the website.
  • the term ‘one or more websites’ is defined as a location connected with internet which includes one or more contents such as one or more webpages, one or more webpage contents, one or more domain names, one or more IP addresses and the like.
  • the information associated with the website may include, but not limited to, a category of the website, a domain name of the website and the like.
  • the information receiving module (110) is also configured to fetch one or more secure socket layer certificates corresponding to each of the one or more websites from one or more respective secure socket layer service providers.
  • the one or more secure socket layer (SSL) certificates corresponding to each of the one or more websites are purchased from the one or more respective secure socket layer service providers.
  • SSL secure socket layer
  • the term ‘secure socket layer service provider’ is defined as a service provider who issues SSL certificates to ensure encrypted communication between websites and web browsers, providing trust and security for people visiting websites.
  • the processing subsystem (105) also includes a security information modification module (120) operatively coupled to the information receiving module (110).
  • the security information modification module (120) is configured to enable the one or more website owners to modify a plurality of properties of the one or more secure socket layer certificates corresponding to each of the one or more websites using a request for change.
  • the plurality of properties of the one or more secure socket layer certificates may include at least one of contact details, one or more additional contact details, location information, one or more keywords associated with the one or more websites, description associated with the one or more websites, route information, gateway information and media access control address information, domain name service information or a combination thereof.
  • the contact details may include contact details of a website owner.
  • the one or more additional contact details may include contact information of one or more sales professional associated with the one or more websites.
  • the location information may include a latitude information and a longitude information of the one or more website owners associated with the one or more websites.
  • the route information for the one or more respective service providers may include an internet protocol version 4 (IPv4) information or an internet protocol version 6 (IPv6) information for facilitating packet routing.
  • IPv4 internet protocol version 4
  • IPv6 internet protocol version 6
  • the processing subsystem (105) also includes a security information verification module (130) operatively coupled to the security information modification module (120).
  • the security information verification module (130) is configured to enable the one or more respective secure socket layer service providers to verify a plurality of values representative of each of the plurality of the properties modified periodically.
  • the plurality of values representative of each of the properties are verified by the SSL service providers either automatically or manually.
  • the SSL service providers pool or share the plurality of values representative of the plurality of properties and store such data. Such data is updated, tested and verified periodically.
  • the security information verification module (130) is also configured to create an index associated with each of the one or more websites for enabling searching by one or more end-users upon verification of the plurality of values representative of each of the plurality of the properties.
  • search index is defined as a body of structured data that a search engine refers to when looking for results that are relevant to a specific query.
  • the security information verification module (130) is also configured to enable the one or more respective secure socket layer (SSL) service providers to verify the h index created for the searching using a predetermined set of procedures.
  • SSL secure socket layer
  • the security information verification module (130) is also configured to allow the one or more respective secure socket layer service providers to provide a distributed index associated with each of the one or more websites to one or more end- users based on pooling of the index created. For example, the one or more website owners or hosts updates corresponding website page information such as the one or more keywords or description in the SSL certificates which becomes the index of the website. As a result, there is no need for the one or more website owners to allow bots or search engine to scrap through the one or more websites which further helps in increased website performance, improved security and helps in preventing content stealing or duplication.
  • the one or more respective SSL service providers further pools the index, share within themselves, and provides the distributed index to the one or more end-users.
  • the one or more SSL service providers also test verifies the index created for the searching using automated set of procedures or manually.
  • the security information verification module is also configured to update the created and pooled index periodically.
  • the processing subsystem (105) also includes a website ranking module (140) operatively coupled to the security information verification module (130).
  • the website ranking module (140) is configured to authorize the one or more respective secure socket layer service providers to rank each of the one or more websites between the one or more respective secure socket layer service providers using a website ranking technique based on the plurality of properties and one or more end user’s queries.
  • the website raking technique ranks the one or more domain names, the one or more IP addresses such as IPv4, IPv6, one or more website pages, one or more webpage contents and the like.
  • the website ranking technique may include, but not limited to, a PageRank technique, Google Panda R , Google Penguin R , Google Payday Loan R and the like.
  • the term “ranking one or more websites” is defined as ranking one or more webpage contents, one or more domain names, one or more IP addresses and the like.
  • the processing subsystem (105) also includes a direct route access module (150) operatively coupled to the website ranking module (140).
  • the direct route access module (150) is configured to provide an access to the one or more website owners and the one or more end-users for facilitating packet routing over an interconnected network via a secure socket layer protocol.
  • the access may include at least one of placing, sharing, buying routes, selling routes, establishing routers or a combination thereof by the one or more website owners or the one or more end-users.
  • the direct route access module (150) is also configured to provide an option of setting up a routing device at a network utility service provider’s website to update each of the one or more secure socket layer certificate with corresponding route and media access control address information for the packet routing.
  • the utility service provider may include an internet service provider (ISP).
  • the routing device may include, but not limited to, a physical routing device, a virtual routing device, a shared routing device or a private routing device.
  • the direct route access module (150) enables the one or more website owners or the hosts to update the one or more SSL certificates with their route and MAC address information for packet routing. This enable an opportunity for the one or more website owners to own a route. Thus, the one or more website owners may purchase a specific route with the ISPs and update the certificate.
  • the end-user uses the route info in the certificate to communicate with the fileserver.
  • the Webserver may include, but not limited to, a web server, a storage server and the like.
  • the end-user browser’s software is modified to use these services or browser/surfer are produced to incorporate the changes.
  • the host has the opportunity to setup up routers and all other network equipment including cables such as virtual/physical/shared at the ISP, but the end user may also set up routers at the ISP to receive and send packets on the.
  • the hosts or the one or more website owners and the one or more end-users may agree on the packet routing using SSL protocol.
  • FIG. 2 illustrates a schematic representation of an exemplary embodiment of a system for secured transmission of packets between a host and an end-user of FIG.l in accordance with an embodiment of the present disclosure.
  • the system (100) is utilised by website owner and he or she wants to reach out his or her consumer through internet for understanding how packets travel.
  • the website owner needs to have a control over the packets or packets routing techniques which facilitate secured transmission of packets between a host and an end-user such as the website owner and the consumer respectively.
  • the website owner is a cakeshop owner and he wants to host a website associated with his cake shop for facilitating online shopping.
  • an information receiving module (110) of a processing subsystem (105) receives information associated with website.
  • the processing subsystem (105) is hosted on a remote server such as a cloud server.
  • the processing subsystem (105) is configured to execute on a network (115) to control bidirectional communications among a plurality of modules.
  • the network may include a wireless communication network such as Wi-Fi, Bluetooth, near field communication (NFC), infra-red communication (RFID) or the like.
  • the information receiving module (110) also fetches a secure socket layer certificate corresponding to the website from a respective secure socket layer (SSL) service provider.
  • SSL secure socket layer
  • the secure socket layer (SSL) certificate (102) corresponding to the website is purchased from the respective secure socket layer service provider.
  • the processing subsystem (105) also includes a security information modification module (120) to enable the website owner to modify a plurality of properties of the secure socket layer certificate corresponding to the cakeshop website using a request for change (RFC).
  • the plurality of properties of the secure socket layer (SSL) certificates may include at least one of contact details, one or more additional contact details, location information, one or more keywords associated with the one or more websites, description associated with the website, route information, gateway information and media access control address information, domain name service information or a combination thereof.
  • the contact details may include contact details of a website owner.
  • the one or more additional contact details may include contact information of one or more sales professional associated with the website.
  • the one or more additional contact details may include contact information of one or more helpdesk assistants.
  • the location information may include a latitude information and a longitude information of the website owner associated with the website.
  • the route information for the respective service provider (118) may include an internet protocol version 4 (IPv4) information or an internet protocol version 6 (IPv6) information for facilitating packet routing.
  • IPv4 internet protocol version 4
  • IPv6 internet protocol version 6
  • a security information verification module (130) Upon modification of the plurality of properties of the SSL certificate, a security information verification module (130) enables the one or more respective secure socket layer service providers to verify a plurality of values representative of each of the plurality of the properties modified periodically. The plurality of values representative of each of the properties is verified by the SSL service providers either automatically or manually.
  • the security information verification module (130) is also configured to create an index associated with each of the one or more websites for enabling searching by one or more end-users upon verification of the plurality of values representative of each of the plurality of the properties. For verification of the index created, the security information verification module (130) uses a predetermined set of procedures.
  • the security information verification module (130) also allows the respective secure socket layer service provider to provide a distributed index associated with the website of the cakeshop to the end-user based on pooling of the index created for the searching.
  • a website ranking module authorizes the respective secure socket layer service provider to rank each of the one or more websites between the one or more secure socket layer service providers using a website ranking technique based on the plurality of properties and one or more end user’s queries.
  • the website ranking technique may include, but not limited to, a PageRank technique, Google Panda R , Google Penguin R , Google Payday Loan R and the like.
  • the processing subsystem (105) also includes a direct route access module (150) to provide an access to the website owner and the end-user for facilitating packet routing over an interconnected network via a secure socket layer protocol.
  • the access may include at least one of placing, sharing, buying routes, selling routes, establishing routers or a combination thereof by the website owner or the one or more end-user.
  • the direct route access module (150) is also configured to provide an option of setting up a routing device at a network utility service provider’s (ISP) website to update the secure socket layer certificate with corresponding route and media access control address information for the packet routing.
  • ISP network utility service provider
  • the direct route access module (150) not only provides the host an opportunity to setup up routers and all other network equipment including cables such as virtual/physical/shared at the ISP, but the end user may also set up routers at the ISP to receive and send packets on the internet securely and efficient without any latency or delay.
  • FIG. 3 is a block diagram of a computer or a server in accordance with an embodiment of the present disclosure.
  • the server (200) includes processor(s) (230), and memory (210) operatively coupled to the bus (220).
  • the processor(s) (230), as used herein, means any type of computational circuit, such as, but not limited to, a microprocessor, a microcontroller, a complex instruction set computing microprocessor, a reduced instruction set computing microprocessor, a very long instruction word microprocessor, an explicitly parallel instruction computing microprocessor, a digital signal processor, or any other type of processing circuit, or a combination thereof.
  • the memory (210) includes several subsystems stored in the form of executable program which instructs the processor (230) to perform the method steps illustrated in FIG. 1.
  • the memory (210) includes a processing subsystem (105) of FIG.l.
  • the processing subsystem (105) further has following modules: an information receiving module (110), a security information modification module (120), a security information verification module (130), a website ranking module (140), and a direct route access module (150).
  • the information receiving module (110) configured to receive information associated with one or more websites hosted by one or more corresponding website owners.
  • the information receiving module (110) is also configured to fetch one or more secure socket layer certificates corresponding to each of the one or more websites from one or more respective secure socket layer service providers.
  • the security information modification module (120) is configured to enable the one or more website owners to modify a plurality of properties of the one or more secure socket layer certificates corresponding to each of the one or more websites using a request for change.
  • the security information verification module (130) is configured to enable the one or more respective secure socket layer service providers to verify a plurality of values representative of each of the plurality of the properties modified periodically.
  • the security information verification module (130) is also configured to create an index associated with each of the one or more websites for enabling searching by one or more end-users upon verification of the plurality of values representative of each of the plurality of the properties.
  • the security information verification module (130) is also configured to enable the one or more respective secure socket layer service providers to verify the index created for the searching using a predetermined set of procedures.
  • the security information verification module (130) is also configured to allow the one or more respective secure socket layer service providers to provide a distributed index associated with each of the one or more websites to one or more end- users based on pooling of the index created.
  • the security information verification module is also configured to update the created and pooled index periodically.
  • the website ranking module (140) is configured to authorize the one or more respective secure socket layer service providers to rank each of the one or more websites between the one or more respective secure socket layer service providers using a website ranking technique based on the plurality of properties and one or more end user’s queries.
  • the direct route access module (150) is configured to provide an access to the one or more website owners and the one or more end-users for facilitating packet routing over an interconnected network via a secure socket layer protocol.
  • the bus (220) as used herein refers to be internal memory channels or computer network that is used to connect computer components and transfer data between them.
  • the bus (220) includes a serial bus or a parallel bus, wherein the serial bus transmits data in bit-serial format and the parallel bus transmits data across multiple wires.
  • the bus (220) as used herein, may include but not limited to, a system bus, an internal bus, an external bus, an expansion bus, a frontside bus, a backside bus and the like.
  • FIG. 4 (a) and FIG. 4 (b) is a flow chart representing the steps involved in a method (300) for secured transmission of packets between a host and an end-user of FIG. 1 in accordance with the embodiment of the present disclosure.
  • the method (300) includes receiving, by an information receiving module, information associated with one or more websites hosted by one or more corresponding website owners in step 310.
  • receiving the information associated with the one or more websites hosted by the one or more corresponding website owners may include receiving the information associated with the website including, but not limited to, a category of the website, a domain name of the website and the like.
  • the method (300) also includes fetching, by the information receiving module, one or more secure socket layer certificates corresponding to each of the one or more websites from one or more respective secure socket layer service providers in step 320.
  • the method (300) also includes enabling, by a security information modification module, the one or more website owners to modify a plurality of properties of the one or more secure socket layer (SSL) certificates corresponding to each of the one or more websites using a request for change in step 330.
  • enabling the one or more website owners to modify the plurality of properties of the one or more SSL certificates may include enabling the one or more website owners to modify the plurality of properties of the one or more secure socket layer certificates including at least one of contact details, one or more additional contact details, location information, one or more keywords associated with the one or more websites, description associated with the one or more websites, route information, gateway information and media access control address information, domain name service information or a combination thereof.
  • the contact details may include contact details of a website owner.
  • the one or more additional contact details may include contact information of one or more sales professional associated with the one or more websites.
  • the location information may include a latitude information and a longitude information of the one or more website owners associated with the one or more websites.
  • the route information for the one or more respective service providers may include an internet protocol version 4 (IPv4) information or an internet protocol version 6 (IPv6) information for facilitating packet routing.
  • IPv4 internet protocol version 4
  • IPv6 internet protocol version 6
  • the method (300) also includes enabling, by a security information verification module, the one or more respective secure socket layer service providers to verify a plurality of values representative of each of the plurality of the properties modified periodically in step 340.
  • the method (300) also includes creating, by the security information verification module, an index associated with each of the one or more websites for enabling searching by one or more end-users upon verification of the plurality of values representative of each of the plurality of the properties in step 350.
  • the method (300) also includes enabling, by the security information verification module, the one or more respective secure socket layer service providers to verify the search index created for the searching using a predetermined set of procedures in step 360.
  • the method (300) also includes allowing, by the security information verification module, the one or more respective secure socket layer service providers to provide a distributed index associated with each of the one or more websites to one or more end-users based on pooling of the index created in step 370.
  • the method also includes updating, by the security information verification module, the created and pooled index periodically in step 375.
  • the method (300) also includes authorizing, by a website ranking module, the one or more respective secure socket layer service providers to rank each of the one or more websites between the one or more respective secure socket layer service providers using a website ranking technique based on the plurality of properties and one or more end user’s queries in step 380.
  • authorizing the one or more respective SSL service providers to rank each of the one or more websites using the website ranking technique may include ranking the one or more websites using a PageRank technique, Google Panda R, Google Penguin R, Google Payday Loan R and the like.
  • the method (300) also includes providing, by a direct route access module, an access to the one or more website owners and the one or more end-users for facilitating packet routing over an interconnected network via a secure socket layer protocol in step 390.
  • providing the access to the one or more website owners and the one or more end-users for facilitating the packet routing may include providing the access of at least one of placing, sharing, buying routes, selling routes, establishing routers or a combination thereof by the one or more website owners or the one or more end-users.
  • Various embodiments of the present disclosure ensure secured transmission of the data packets from the one or more website owners to the one or more end-users in a very efficient, cost-effective and fastest manner.
  • the present disclosed system does not require web crawlers or scrappers to extract information from the one or more websites for search indexing which further makes the process simple and reduces dependency on the web crawlers.
  • the present disclosed system provides the end user/consumers and or hosts ISPs to place, share, buy and sell routes, router such as physical, virtual and shared and other network equipment and software will be called as route as a service.
  • router such as physical, virtual and shared and other network equipment and software will be called as route as a service.

Abstract

A system for secured transmission of packets is disclosed. An information receiving module (110) fetches one or more secure socket layer certificates corresponding to each one or more websites from one or more respective secure socket layer service providers. A security information modification module (120) enables the one or more website owners to modify a plurality of properties of the one or more secure socket layer certificates. A security information verification module (130) enables the one or more respective secure socket layer service providers to verify a plurality of values representative of each of the plurality of the properties, creates an index. A website ranking module (140) authorizes the one or more respective secure socket layer service providers to rank each of the one or more websites. A direct route access module (150) provides an access to the one or more website owners and the one or more end-users for facilitating packet routing.

Description

SYSTEM AND METHOD FOR SECURED TRANSMISSION OF PACKETS BETWEEN A HOST AND AN END-USER
EARUIEST PRIORITY DATE:
This Application claims priority from a patent application filed in India having Patent Application No. 202141017731, filed on April 16, 2021 and titled “SYSTEM AND METHOD FOR SECURED TRANSMISSION OF PACKETS BETWEEN A HOST AND AN END-USER.”
BACKGROUND
Embodiments of the present disclosure relate to establishing secure socket layer connection and more particularly, to a system and a method for secured transmission of packets between a host and an end-user.
SSL certificates are known today to provide secure connections between two computers such as between a client and a server. An SSL certificate is an electronic certificate/document which attests to the binding of a public encryption key to an individual or computer. The SSL certificate allows verification of a claim by the individual or computer that a specific public key is associated with the individual or computer. This allows another party to be assured that the individual or computer is the entity to which this other party intends to communicate. The SSL certificate ensures that all data passed between the web server and browser remain private. Various approaches are available for enabling the transmission of data packets between a host and an end-user using the SSL certificates.
Conventionally, the approaches available for the transmission of the data packets require storing private SSL certificates on personal computers. However, such a conventional approach is expensive and hard to protect from unauthorized disclosure. Also, such a conventional approach does not ensure secured transmission of the data packets as a direct route to reach the end-users or consumers is a point of concern. Moreover, the present disclosed system requires web crawlers or scrappers to extract information from the one or more websites for search indexing which further makes the process complicated and increases dependency. Hence, there is a need for an improved system and a method for secured transmission of packets between a host and an end-user in order to address the aforementioned issues.
BRIEF DESCRIPTION
In accordance with an embodiment of the present disclosure, a system for secured transmission of packets between a host and an end-user is disclosed. The system includes a processing subsystem hosted on a server. The processing subsystem is configured to execute on a network to control bidirectional communications among a plurality of modules. The processing subsystem includes an information receiving module configured to receive information associated with one or more websites hosted by one or more corresponding website owners. The information receiving module is also configured to fetch one or more secure socket layer certificates corresponding to each of the one or more websites from one or more respective secure socket layer service providers. The processing subsystem also includes a security information modification module operatively coupled to the information receiving module. The security information modification module is configured to enable the one or more website owners to modify a plurality of properties of the one or more secure socket layer certificates corresponding to each of the one or more websites using a request for change. The processing subsystem also includes a security information verification module operatively coupled to the security information modification module. The security information verification module is configured to enable the one or more respective secure socket layer service providers to verify a plurality of values representative of each of the plurality of the properties modified periodically. The security information verification module is also configured to create an index associated with each of the one or more websites for enabling searching by one or more end-users upon verification of the plurality of values representative of each of the plurality of the properties. The security information verification module is also configured to enable the one or more respective secure socket layer service providers to verify the search index created for the searching using a predetermined set of procedures. The security information verification module is also configured to allow the one or more respective secure socket layer service providers to provide a distributed index associated with each of the one or more websites to one or more end- users based on pooling of the index created. The security information verification module is also configured to update the created and pooled index periodically. The processing subsystem also includes a website ranking module operatively coupled to the security information verification module. The website ranking module is configured to authorize the one or more respective secure socket layer service providers to rank each of the one or more websites between the one or more respective secure socket layer service providers using a website ranking technique based on the plurality of properties and one or more end user’s queries. The processing subsystem also includes a direct route access module operatively coupled to the website ranking module. The direct route access module is configured to provide an access to the one or more website owners and the one or more end-users for facilitating packet routing over an interconnected network via a secure socket layer protocol.
In accordance with another embodiment of the present disclosure, a method for secured transmission of packets between a host and an end-user is disclosed. The method includes receiving, by an information receiving module, information associated with one or more websites hosted by one or more corresponding website owners. The method also includes fetching, by the information receiving module, one or more secure socket layer certificates corresponding to each of the one or more websites from one or more respective secure socket layer service providers. The method also includes enabling, by a security information modification module, the one or more website owners to modify a plurality of properties of the one or more secure socket layer certificates corresponding to each of the one or more websites using a request for change. The method also includes enabling, by a security information verification module, the one or more respective secure socket layer service providers to verify a plurality of values representative of each of the plurality of the properties modified periodically. The method also includes creating, by the security information verification module, an index associated with each of the one or more websites for enabling searching by one or more end-users upon verification of the plurality of values representative of each of the plurality of the properties. The method also includes enabling, by the security information verification module, the one or more respective secure socket layer service providers to verify the index created for the searching using a predetermined set of procedures. The method also includes updating, by the security information verification module, the created and pooled index periodically. The method also includes allowing, by the security information verification module, the one or more respective secure socket layer service providers to provide a distributed index associated with each of the one or more websites to one or more end-users based on pooling of the index created. The method also includes authorizing, by a website ranking module, the one or more respective secure socket layer service providers to rank each of the one or more websites between the one or more respective secure socket layer service providers using a website ranking technique based on the plurality of properties and one or more end user’s queries. The method also includes providing, by a direct route access module, an access to the one or more website owners and the one or more end-users for facilitating packet routing over an interconnected network via a secure socket layer protocol.
To further clarify the advantages and features of the present disclosure, a more particular description of the disclosure will follow by reference to specific embodiments thereof, which are illustrated in the appended figures. It is to be appreciated that these figures depict only typical embodiments of the disclosure and are therefore not to be considered limiting in scope. The disclosure will be described and explained with additional specificity and detail with the appended figures.
BRIEF DESCRIPTION OF THE DRAWINGS
The disclosure will be described and explained with additional specificity and detail with the accompanying figures in which:
FIG. 1 is a block diagram of a system for secured transmission of packets between a host and an end-user in accordance with an embodiment of the present disclosure;
FIG. 2 illustrates a schematic representation of an exemplary embodiment of a system for secured transmission of packets between a host and an end-user of FIG.l in accordance with an embodiment of the present disclosure;
FIG. 3 is a block diagram of a computer or a server in accordance with an embodiment of the present disclosure; and FIG. 4 (a) and FIG. 4 (b) is a flow chart representing the steps involved in a method for secured transmission of packets between a host and an end-user of FIG. 1 in accordance with the embodiment of the present disclosure.
Further, those skilled in the art will appreciate that elements in the figures are illustrated for simplicity and may not have necessarily been drawn to scale. Furthermore, in terms of the construction of the device, one or more components of the device may have been represented in the figures by conventional symbols, and the figures may show only those specific details that are pertinent to understanding the embodiments of the present disclosure so as not to obscure the figures with details that will be readily apparent to those skilled in the art having the benefit of the description herein.
DETAILED DESCRIPTION
For the purpose of promoting an understanding of the principles of the disclosure, reference will now be made to the embodiment illustrated in the figures and specific language will be used to describe them. It will nevertheless be understood that no limitation of the scope of the disclosure is thereby intended. Such alterations and further modifications in the illustrated system, and such further applications of the principles of the disclosure as would normally occur to those skilled in the art are to be construed as being within the scope of the present disclosure.
The terms "comprises", "comprising", or any other variations thereof, are intended to cover a non-exclusive inclusion, such that a process or method that comprises a list of steps does not include only those steps but may include other steps not expressly listed or inherent to such a process or method. Similarly, one or more devices or sub-systems or elements or structures or components preceded by "comprises... a" does not, without more constraints, preclude the existence of other devices, sub-systems, elements, structures, components, additional devices, additional sub-systems, additional elements, additional structures or additional components. Appearances of the phrase "in an embodiment", "in another embodiment" and similar language throughout this specification may, but not necessarily do, all refer to the same embodiment.
Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by those skilled in the art to which this disclosure belongs. The system, methods, and examples provided herein are only illustrative and not intended to be limiting.
In the following specification and the claims, reference will be made to a number of terms, which shall be defined to have the following meanings. The singular forms “a”, “an”, and “the” include plural references unless the context clearly dictates otherwise.
Embodiments of the present disclosure relate to a system and a method for secured transmission of packets between a host and an end-user. The system includes a processing subsystem hosted on a server. The processing subsystem is configured to execute on a network to control bidirectional communications among a plurality of modules. The processing subsystem includes an information receiving module configured to receive information associated with one or more websites hosted by one or more corresponding website owners. The information receiving module is also configured to fetch one or more secure socket layer certificates corresponding to each of the one or more websites from one or more respective secure socket layer service providers. The processing subsystem also includes a security information modification module operatively coupled to the information receiving module. The security information modification module is configured to enable the one or more website owners to modify a plurality of properties of the one or more secure socket layer certificates corresponding to each of the one or more websites using a request for change. The processing subsystem also includes a security information verification module operatively coupled to the security information modification module. The security information verification module is configured to enable the one or more respective secure socket layer service providers to verify a plurality of values representative of each of the plurality of the properties modified periodically. The security information verification module is also configured to create an index associated with each of the one or more websites for enabling searching by one or more end-users upon verification of the plurality of values representative of each of the plurality of the properties. The security information verification module is also configured to enable the one or more respective secure socket layer service providers to verify the index created for the searching using a predetermined set of procedures. The security information verification module is also configured to allow the one or more respective secure socket layer service providers to provide a distributed index associated with each of the one or more websites to one or more end-users based on pooling of the search index created. The security information verification module is also configured to update the created and pooled index periodically. The processing subsystem also includes a website ranking module operatively coupled to the security information verification module. The website ranking module is configured to authorize the one or more respective secure socket layer service providers to rank each of the one or more websites between the one or more respective secure socket layer service providers using a website ranking technique based on the plurality of properties and one or more end user’s queries. The processing subsystem also includes a direct route access module operatively coupled to the website ranking module. The direct route access module is configured to provide an access to the one or more website owners and the one or more end-users for facilitating packet routing over an interconnected network via a secure socket layer protocol.
FIG. 1 is a block diagram of a system (100) for secured transmission of packets between a host and an end-user in accordance with an embodiment of the present disclosure. The system includes a processing subsystem hosted on a server. In one embodiment, the server (108) may include a cloud server. In another embodiment, the server (108) may include a local server. The processing subsystem (105) is configured to execute on a network (not shown in FIG. 1) to control bidirectional communications among a plurality of modules. In one embodiment, the network may include a wired network such as a local area network (LAN). In another embodiment, the network may include a wireless network such as Wi-Fi, Bluetooth, near field communication (NFC), infra-red communication (RFID) or the like.
The processing subsystem (105) includes an information receiving module (110) configured to receive information associated with one or more websites hosted by one or more corresponding website owners. As used herein, the term ‘website owner’ is defined as a host or an individual or an entity who is responsible for publishing and maintaining the contents of the website. Similarly, the term ‘one or more websites’ is defined as a location connected with internet which includes one or more contents such as one or more webpages, one or more webpage contents, one or more domain names, one or more IP addresses and the like. In one embodiment, the information associated with the website may include, but not limited to, a category of the website, a domain name of the website and the like. The information receiving module (110) is also configured to fetch one or more secure socket layer certificates corresponding to each of the one or more websites from one or more respective secure socket layer service providers. In one embodiment, the one or more secure socket layer (SSL) certificates corresponding to each of the one or more websites are purchased from the one or more respective secure socket layer service providers. As used herein, the term ‘secure socket layer service provider’ is defined as a service provider who issues SSL certificates to ensure encrypted communication between websites and web browsers, providing trust and security for people visiting websites.
The processing subsystem (105) also includes a security information modification module (120) operatively coupled to the information receiving module (110). The security information modification module (120) is configured to enable the one or more website owners to modify a plurality of properties of the one or more secure socket layer certificates corresponding to each of the one or more websites using a request for change. In one embodiment, the plurality of properties of the one or more secure socket layer certificates may include at least one of contact details, one or more additional contact details, location information, one or more keywords associated with the one or more websites, description associated with the one or more websites, route information, gateway information and media access control address information, domain name service information or a combination thereof. In such embodiment, the contact details may include contact details of a website owner. In another embodiment, the one or more additional contact details may include contact information of one or more sales professional associated with the one or more websites. In some embodiment, the location information may include a latitude information and a longitude information of the one or more website owners associated with the one or more websites. In some embodiment, the route information for the one or more respective service providers may include an internet protocol version 4 (IPv4) information or an internet protocol version 6 (IPv6) information for facilitating packet routing.
The processing subsystem (105) also includes a security information verification module (130) operatively coupled to the security information modification module (120). The security information verification module (130) is configured to enable the one or more respective secure socket layer service providers to verify a plurality of values representative of each of the plurality of the properties modified periodically. The plurality of values representative of each of the properties are verified by the SSL service providers either automatically or manually. The SSL service providers pool or share the plurality of values representative of the plurality of properties and store such data. Such data is updated, tested and verified periodically.
The security information verification module (130) is also configured to create an index associated with each of the one or more websites for enabling searching by one or more end-users upon verification of the plurality of values representative of each of the plurality of the properties. As used herein, the term ‘search index’ is defined as a body of structured data that a search engine refers to when looking for results that are relevant to a specific query. The security information verification module (130) is also configured to enable the one or more respective secure socket layer (SSL) service providers to verify the h index created for the searching using a predetermined set of procedures. The security information verification module (130) is also configured to allow the one or more respective secure socket layer service providers to provide a distributed index associated with each of the one or more websites to one or more end- users based on pooling of the index created. For example, the one or more website owners or hosts updates corresponding website page information such as the one or more keywords or description in the SSL certificates which becomes the index of the website. As a result, there is no need for the one or more website owners to allow bots or search engine to scrap through the one or more websites which further helps in increased website performance, improved security and helps in preventing content stealing or duplication. The one or more respective SSL service providers further pools the index, share within themselves, and provides the distributed index to the one or more end-users. The one or more SSL service providers also test verifies the index created for the searching using automated set of procedures or manually. The security information verification module is also configured to update the created and pooled index periodically.
The processing subsystem (105) also includes a website ranking module (140) operatively coupled to the security information verification module (130). The website ranking module (140) is configured to authorize the one or more respective secure socket layer service providers to rank each of the one or more websites between the one or more respective secure socket layer service providers using a website ranking technique based on the plurality of properties and one or more end user’s queries. In some embodiment, the website raking technique ranks the one or more domain names, the one or more IP addresses such as IPv4, IPv6, one or more website pages, one or more webpage contents and the like. In one embodiment, the website ranking technique may include, but not limited to, a PageRank technique, Google Panda R, Google Penguin R, Google Payday Loan R and the like. As used herein, the term “ranking one or more websites” is defined as ranking one or more webpage contents, one or more domain names, one or more IP addresses and the like.
The processing subsystem (105) also includes a direct route access module (150) operatively coupled to the website ranking module (140). The direct route access module (150) is configured to provide an access to the one or more website owners and the one or more end-users for facilitating packet routing over an interconnected network via a secure socket layer protocol. In one embodiment, the access may include at least one of placing, sharing, buying routes, selling routes, establishing routers or a combination thereof by the one or more website owners or the one or more end-users. The direct route access module (150) is also configured to provide an option of setting up a routing device at a network utility service provider’s website to update each of the one or more secure socket layer certificate with corresponding route and media access control address information for the packet routing. In one embodiment, the utility service provider may include an internet service provider (ISP). In such embodiment, the routing device may include, but not limited to, a physical routing device, a virtual routing device, a shared routing device or a private routing device.
The direct route access module (150) enables the one or more website owners or the hosts to update the one or more SSL certificates with their route and MAC address information for packet routing. This enable an opportunity for the one or more website owners to own a route. Thus, the one or more website owners may purchase a specific route with the ISPs and update the certificate. When an end-user wants to reach a particular website, the end-user uses the route info in the certificate to communicate with the fileserver. In one embodiment, the Webserver may include, but not limited to, a web server, a storage server and the like. The end-user browser’s software is modified to use these services or browser/surfer are produced to incorporate the changes. Here, not only the host has the opportunity to setup up routers and all other network equipment including cables such as virtual/physical/shared at the ISP, but the end user may also set up routers at the ISP to receive and send packets on the. The hosts or the one or more website owners and the one or more end-users may agree on the packet routing using SSL protocol.
FIG. 2 illustrates a schematic representation of an exemplary embodiment of a system for secured transmission of packets between a host and an end-user of FIG.l in accordance with an embodiment of the present disclosure. Considering an example, wherein the system (100) is utilised by website owner and he or she wants to reach out his or her consumer through internet for understanding how packets travel. For understanding such stuffs, the website owner needs to have a control over the packets or packets routing techniques which facilitate secured transmission of packets between a host and an end-user such as the website owner and the consumer respectively. Let us assume that the website owner is a cakeshop owner and he wants to host a website associated with his cake shop for facilitating online shopping.
In order to obtain information associated with the website hosted by the website owner, an information receiving module (110) of a processing subsystem (105) receives information associated with website. Here, the processing subsystem (105) is hosted on a remote server such as a cloud server. The processing subsystem (105) is configured to execute on a network (115) to control bidirectional communications among a plurality of modules. For example, the network may include a wireless communication network such as Wi-Fi, Bluetooth, near field communication (NFC), infra-red communication (RFID) or the like.
Once, the information associated with the website is received, the information receiving module (110) also fetches a secure socket layer certificate corresponding to the website from a respective secure socket layer (SSL) service provider. In one embodiment, the secure socket layer (SSL) certificate (102) corresponding to the website is purchased from the respective secure socket layer service provider.
The processing subsystem (105) also includes a security information modification module (120) to enable the website owner to modify a plurality of properties of the secure socket layer certificate corresponding to the cakeshop website using a request for change (RFC). In the example used herein, the plurality of properties of the secure socket layer (SSL) certificates may include at least one of contact details, one or more additional contact details, location information, one or more keywords associated with the one or more websites, description associated with the website, route information, gateway information and media access control address information, domain name service information or a combination thereof. In such a context, the contact details may include contact details of a website owner. In another example, the one or more additional contact details may include contact information of one or more sales professional associated with the website. In yet another embodiment, the one or more additional contact details may include contact information of one or more helpdesk assistants. Again, the location information may include a latitude information and a longitude information of the website owner associated with the website. Again, the route information for the respective service provider (118) may include an internet protocol version 4 (IPv4) information or an internet protocol version 6 (IPv6) information for facilitating packet routing.
Upon modification of the plurality of properties of the SSL certificate, a security information verification module (130) enables the one or more respective secure socket layer service providers to verify a plurality of values representative of each of the plurality of the properties modified periodically. The plurality of values representative of each of the properties is verified by the SSL service providers either automatically or manually. The security information verification module (130) is also configured to create an index associated with each of the one or more websites for enabling searching by one or more end-users upon verification of the plurality of values representative of each of the plurality of the properties. For verification of the index created, the security information verification module (130) uses a predetermined set of procedures. The security information verification module (130) also allows the respective secure socket layer service provider to provide a distributed index associated with the website of the cakeshop to the end-user based on pooling of the index created for the searching.
Further, once the verification of the index is completed, a website ranking module (140) authorizes the respective secure socket layer service provider to rank each of the one or more websites between the one or more secure socket layer service providers using a website ranking technique based on the plurality of properties and one or more end user’s queries. For example, the website ranking technique may include, but not limited to, a PageRank technique, Google Panda R, Google Penguin R, Google Payday Loan R and the like.
Furthermore, the processing subsystem (105) also includes a direct route access module (150) to provide an access to the website owner and the end-user for facilitating packet routing over an interconnected network via a secure socket layer protocol. In the example used herein, the access may include at least one of placing, sharing, buying routes, selling routes, establishing routers or a combination thereof by the website owner or the one or more end-user. The direct route access module (150) is also configured to provide an option of setting up a routing device at a network utility service provider’s (ISP) website to update the secure socket layer certificate with corresponding route and media access control address information for the packet routing. Thus, the direct route access module (150), not only provides the host an opportunity to setup up routers and all other network equipment including cables such as virtual/physical/shared at the ISP, but the end user may also set up routers at the ISP to receive and send packets on the internet securely and efficient without any latency or delay.
FIG. 3 is a block diagram of a computer or a server in accordance with an embodiment of the present disclosure. The server (200) includes processor(s) (230), and memory (210) operatively coupled to the bus (220). The processor(s) (230), as used herein, means any type of computational circuit, such as, but not limited to, a microprocessor, a microcontroller, a complex instruction set computing microprocessor, a reduced instruction set computing microprocessor, a very long instruction word microprocessor, an explicitly parallel instruction computing microprocessor, a digital signal processor, or any other type of processing circuit, or a combination thereof.
The memory (210) includes several subsystems stored in the form of executable program which instructs the processor (230) to perform the method steps illustrated in FIG. 1. The memory (210) includes a processing subsystem (105) of FIG.l. The processing subsystem (105) further has following modules: an information receiving module (110), a security information modification module (120), a security information verification module (130), a website ranking module (140), and a direct route access module (150).
The information receiving module (110) configured to receive information associated with one or more websites hosted by one or more corresponding website owners. The information receiving module (110) is also configured to fetch one or more secure socket layer certificates corresponding to each of the one or more websites from one or more respective secure socket layer service providers. The security information modification module (120) is configured to enable the one or more website owners to modify a plurality of properties of the one or more secure socket layer certificates corresponding to each of the one or more websites using a request for change. The security information verification module (130) is configured to enable the one or more respective secure socket layer service providers to verify a plurality of values representative of each of the plurality of the properties modified periodically. The security information verification module (130) is also configured to create an index associated with each of the one or more websites for enabling searching by one or more end-users upon verification of the plurality of values representative of each of the plurality of the properties. The security information verification module (130) is also configured to enable the one or more respective secure socket layer service providers to verify the index created for the searching using a predetermined set of procedures. The security information verification module (130) is also configured to allow the one or more respective secure socket layer service providers to provide a distributed index associated with each of the one or more websites to one or more end- users based on pooling of the index created. The security information verification module is also configured to update the created and pooled index periodically. The website ranking module (140) is configured to authorize the one or more respective secure socket layer service providers to rank each of the one or more websites between the one or more respective secure socket layer service providers using a website ranking technique based on the plurality of properties and one or more end user’s queries. The direct route access module (150) is configured to provide an access to the one or more website owners and the one or more end-users for facilitating packet routing over an interconnected network via a secure socket layer protocol. [0001] The bus (220) as used herein refers to be internal memory channels or computer network that is used to connect computer components and transfer data between them. The bus (220) includes a serial bus or a parallel bus, wherein the serial bus transmits data in bit-serial format and the parallel bus transmits data across multiple wires. The bus (220) as used herein, may include but not limited to, a system bus, an internal bus, an external bus, an expansion bus, a frontside bus, a backside bus and the like.
[0002] FIG. 4 (a) and FIG. 4 (b) is a flow chart representing the steps involved in a method (300) for secured transmission of packets between a host and an end-user of FIG. 1 in accordance with the embodiment of the present disclosure. The method (300) includes receiving, by an information receiving module, information associated with one or more websites hosted by one or more corresponding website owners in step 310. In one embodiment, receiving the information associated with the one or more websites hosted by the one or more corresponding website owners may include receiving the information associated with the website including, but not limited to, a category of the website, a domain name of the website and the like.
[0003] The method (300) also includes fetching, by the information receiving module, one or more secure socket layer certificates corresponding to each of the one or more websites from one or more respective secure socket layer service providers in step 320.
[0004] The method (300) also includes enabling, by a security information modification module, the one or more website owners to modify a plurality of properties of the one or more secure socket layer (SSL) certificates corresponding to each of the one or more websites using a request for change in step 330. In one embodiment, enabling the one or more website owners to modify the plurality of properties of the one or more SSL certificates may include enabling the one or more website owners to modify the plurality of properties of the one or more secure socket layer certificates including at least one of contact details, one or more additional contact details, location information, one or more keywords associated with the one or more websites, description associated with the one or more websites, route information, gateway information and media access control address information, domain name service information or a combination thereof. In such embodiment, the contact details may include contact details of a website owner. In another embodiment, the one or more additional contact details may include contact information of one or more sales professional associated with the one or more websites. In some embodiment, the location information may include a latitude information and a longitude information of the one or more website owners associated with the one or more websites. In some embodiment, the route information for the one or more respective service providers may include an internet protocol version 4 (IPv4) information or an internet protocol version 6 (IPv6) information for facilitating packet routing.
[0005] The method (300) also includes enabling, by a security information verification module, the one or more respective secure socket layer service providers to verify a plurality of values representative of each of the plurality of the properties modified periodically in step 340. The method (300) also includes creating, by the security information verification module, an index associated with each of the one or more websites for enabling searching by one or more end-users upon verification of the plurality of values representative of each of the plurality of the properties in step 350. The method (300) also includes enabling, by the security information verification module, the one or more respective secure socket layer service providers to verify the search index created for the searching using a predetermined set of procedures in step 360.
[0006] The method (300) also includes allowing, by the security information verification module, the one or more respective secure socket layer service providers to provide a distributed index associated with each of the one or more websites to one or more end-users based on pooling of the index created in step 370. The method also includes updating, by the security information verification module, the created and pooled index periodically in step 375.
[0007] The method (300) also includes authorizing, by a website ranking module, the one or more respective secure socket layer service providers to rank each of the one or more websites between the one or more respective secure socket layer service providers using a website ranking technique based on the plurality of properties and one or more end user’s queries in step 380. In one embodiment, authorizing the one or more respective SSL service providers to rank each of the one or more websites using the website ranking technique may include ranking the one or more websites using a PageRank technique, Google Panda R, Google Penguin R, Google Payday Loan R and the like.
The method (300) also includes providing, by a direct route access module, an access to the one or more website owners and the one or more end-users for facilitating packet routing over an interconnected network via a secure socket layer protocol in step 390. In some embodiment, providing the access to the one or more website owners and the one or more end-users for facilitating the packet routing may include providing the access of at least one of placing, sharing, buying routes, selling routes, establishing routers or a combination thereof by the one or more website owners or the one or more end-users.
Various embodiments of the present disclosure ensure secured transmission of the data packets from the one or more website owners to the one or more end-users in a very efficient, cost-effective and fastest manner.
Moreover, the present disclosed system does not require web crawlers or scrappers to extract information from the one or more websites for search indexing which further makes the process simple and reduces dependency on the web crawlers.
Furthermore, the present disclosed system provides the end user/consumers and or hosts ISPs to place, share, buy and sell routes, router such as physical, virtual and shared and other network equipment and software will be called as route as a service. Thus, provides a better alternative to those seeking VPN services.
It will be understood by those skilled in the art that the foregoing general description and the following detailed description are exemplary and explanatory of the disclosure and are not intended to be restrictive thereof.
While specific language has been used to describe the disclosure, any limitations arising on account of the same are not intended. As would be apparent to a person skilled in the art, various working modifications may be made to the method in order to implement the inventive concept as taught herein. The figures and the foregoing description give examples of embodiments. Those skilled in the art will appreciate that one or more of the described elements may well be combined into a single functional element. Alternatively, certain elements may be split into multiple functional elements. Elements from one embodiment may be added to another embodiment. For example, the order of processes described herein may be changed and are not limited to the manner described herein. Moreover, the actions of any flow diagram need not be implemented in the order shown; nor do all of the acts need to be necessarily performed. Also, those acts that are not dependent on other acts may be performed in parallel with the other acts. The scope of embodiments is by no means limited by these specific examples.

Claims

WE CLAIM:
1. A system (100) for secured transmission of packets between a host and an end-user comprising: a processing subsystem (105) hosted on a server (108), and configured to execute on a network to control bidirectional communications among a plurality of modules comprising: an information receiving module (110) configured to: receive information associated with one or more websites hosted by one or more corresponding website owners; and fetch one or more secure socket layer certificates corresponding to each of the one or more websites from one or more respective secure socket layer service providers; a security information modification module (120) operatively coupled to the information receiving module (110), wherein the security information modification module (120) is configured to enable the one or more website owners to modify a plurality of properties of the one or more secure socket layer certificates corresponding to each of the one or more websites using a request for change; a security information verification module (130) operatively coupled to the security information modification module (120), wherein the security information verification module (130) is configured to: enable the one or more respective secure socket layer service providers to verify a plurality of values representative of each of the plurality of the properties modified periodically; create an index associated with each of the one or more websites for enabling searching by one or more end-users upon verification of the plurality of values representative of each of the plurality of the properties; enable the one or more respective secure socket layer service providers to verify the index created for the searching using a predetermined set of procedures; allow the one or more respective secure socket layer service providers to provide a distributed index associated with each of the one or more websites to one or more end-users based on pooling of the index created; and update created and pooled index periodically; a website ranking module (140) operatively coupled to the security information verification module (130), wherein the website ranking module (140) is configured to authorize the one or more respective secure socket layer service providers to rank each of the one or more websites between the one or more respective secure socket layer service providers using a website ranking technique based on the plurality of properties and one or more end user’s queries; and a direct route access module (150) operatively coupled to the website ranking module (140), wherein the direct route access module (150) is configured to provide an access to the one or more website owners and the one or more end-users for facilitating packet routing over an interconnected network via a secure socket layer protocol.
2. The system (100) as claimed in claim 1, wherein the one or more secure socket layer certificates corresponding to each of the one or more websites are purchased from the one or more respective secure socket layer service providers.
3. The system (100) as claimed in claim 1, wherein the plurality of properties of the one or more secure socket layer certificates comprises at least one of contact details, one or more additional contact details, location information, one or more keywords associated with the one or more websites, description associated with the one or more websites, route information, gateway information and media access control address information, domain name service information or a combination thereof.
4. The system (100) as claimed in claim 3, wherein the one or more additional contact details comprises at least one of contact information of one or more sales professional associated with the one or more websites, one or more helpdesk person associated with the one or more websites or a combination thereof.
5. The system (100) as claimed in claim 3, wherein the location information comprises a latitude information and a longitude information of the one or more website owners associated with the one or more websites.
6. The system (100) as claimed in claim 3, wherein the route information for the one or more respective service providers comprises an internet protocol version 4 information or an internet protocol version 6 information for facilitating packet routing.
7. The system (100) as claimed in claim 1, wherein the direct route access module (150) is configured to provide an option of setting up a routing device at a utility service provider’s website to update each of the one or more secure socket layer certificate with corresponding route and media access control address information for the packet routing, wherein the routing device comprises a physical routing device, a virtual routing device, a shared routing device or a private routing device.
8. The system (100) as claimed in claim 1, wherein the access comprises at least one of placing, sharing, buying routes, selling routes, establishing routers or a combination thereof by the one or more website owners or the one or more end- users.
9. A method (300) comprising: receiving, by an information receiving module, information associated with one or more websites hosted by one or more corresponding website owners (310); fetching, by the information receiving module, one or more secure socket layer certificates corresponding to each of the one or more websites from one or more respective secure socket layer service providers (320); enabling, by a security information modification module, the one or more website owners to modify a plurality of properties of the one or more secure socket layer certificates corresponding to each of the one or more websites using a request for change (330); enabling, by a security information verification module, the one or more respective secure socket layer service providers to verify a plurality of values representative of each of the plurality of the properties modified periodically (340); creating, by the security information verification module, an index associated with each of the one or more websites for enabling searching by one or more end-users upon verification of the plurality of values representative of each of the plurality of the properties (350); enabling, by the security information verification module, the one or more respective secure socket layer service providers to verify the index created for the searching using a predetermined set of procedures (360); allowing, by the security information verification module, the one or more respective secure socket layer service providers to provide a distributed index associated with each of the one or more websites to one or more end-users based on pooling of the index created (370); updating, by the security information verification module, created and pooled index periodically (375); authorizing, by a website ranking module, the one or more respective secure socket layer service providers to rank each of the one or more websites between the one or more secure socket layer service providers using a website ranking technique based on the plurality of properties and one or more end user’s queries (380); and providing, by a direct route access module, an access to the one or more website owners and the one or more end-users for facilitating packet routing over an interconnected network via a secure socket layer protocol (390).
PCT/IB2021/058346 2021-04-16 2021-09-14 System and method for secured transmission of packets between a host and an end-user WO2022219391A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
DE112021007532.2T DE112021007532T5 (en) 2021-04-16 2021-09-14 SYSTEM AND METHOD FOR SECURELY TRANSMITTING PACKETS BETWEEN A HOST AND AN END USER

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN202141017731 2021-04-16
IN202141017731 2021-04-16

Publications (1)

Publication Number Publication Date
WO2022219391A1 true WO2022219391A1 (en) 2022-10-20

Family

ID=83639683

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2021/058346 WO2022219391A1 (en) 2021-04-16 2021-09-14 System and method for secured transmission of packets between a host and an end-user

Country Status (2)

Country Link
DE (1) DE112021007532T5 (en)
WO (1) WO2022219391A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5657390A (en) * 1995-08-25 1997-08-12 Netscape Communications Corporation Secure socket layer application program apparatus and method
US20060174115A1 (en) * 2005-01-28 2006-08-03 Goutham Rao Method and system for verification of an endpoint security scan
US7801885B1 (en) * 2007-01-25 2010-09-21 Neal Akash Verma Search engine system and method with user feedback on search results

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5657390A (en) * 1995-08-25 1997-08-12 Netscape Communications Corporation Secure socket layer application program apparatus and method
US20060174115A1 (en) * 2005-01-28 2006-08-03 Goutham Rao Method and system for verification of an endpoint security scan
US7801885B1 (en) * 2007-01-25 2010-09-21 Neal Akash Verma Search engine system and method with user feedback on search results

Also Published As

Publication number Publication date
DE112021007532T5 (en) 2024-02-15

Similar Documents

Publication Publication Date Title
US7552327B2 (en) Method and apparatus for conducting a confidential search
US11140177B2 (en) Distributed data authentication and validation using blockchain
US20170257428A1 (en) Peer to peer browser content caching
US7333990B1 (en) Dynamic reverse proxy
US7237030B2 (en) System and method for preserving post data on a server system
WO2017114206A1 (en) Method and device for processing short link, and short link server
US20150295882A1 (en) Computer-implemented method, apparatus, and computer-readable medium for processing named entity queries using a cached functionality in a domain name system
US20090070863A1 (en) Access server and connection restriction method
US20090013063A1 (en) Method for enabling internet access to information hosted on csd
CN106055603B (en) Browser access network address recommended method, client and system based on VPN
EP3306900B1 (en) Dns routing for improved network security
JP2002538525A (en) Proxy server that increases client requests using user profile data
WO2012154472A1 (en) System and method for network redirection
US9313187B1 (en) Network site customization using proxies
CN103220261A (en) Proxy method, device and system of open authentication application program interface
US10848479B2 (en) Enabling encrypted communications between a user and a third party hosting service via a proxy server
US20170171147A1 (en) Method and electronic device for implementing domain name system
US20080263126A1 (en) Internet bridge for applications and web servers
WO2007135627A2 (en) Mobile phone used within a client-server system
JP4567173B2 (en) Concentration / Connection System, Concentration / Connection Method and Concentration / Connection Device
US20140172985A1 (en) Method and system for forming a hierarchically complete, absent of query syntax elements, valid Uniform Resource Locator (URL) link consisting of a domain name followed by server resource path segment containing syntactically complete e-mail address
US20210392108A1 (en) Server-side initiation of dns resolution
WO2022219391A1 (en) System and method for secured transmission of packets between a host and an end-user
US10013691B1 (en) Separating control of network sites
US9906503B1 (en) Notifying a registrant if communications between a user and a third party hosting service are not secure

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21936865

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 112021007532

Country of ref document: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21936865

Country of ref document: EP

Kind code of ref document: A1