Claims
- 1. A computer program product for use in conjunction with a computer system having a server and a client, the computer program product comprising a computer readable storage medium and a computer program mechanism embedded therein, the computer program mechanism, comprising: a program module that directs the computer system and/or components thereof including at least one or the client or server, to function in a specified manner to provide message communications, the message communications occurring in a computer system hardware architecture neutral and operating system neutral and network transport protocol neutral manner for conducting a secure response session, the program module including instructions for:
A. extracting, by a Client who is establishing a secure response session to a Entity in order to respond to a message from the Entity, the Entity's public key and matching destination address of the Entity from a trusted source or storage means; B. extracting, by the Client, the Client's public and private key and certificate chain from a trusted source or storage means; C. using the extracted client public and private key and certificate chain information along with the previously extracted Entity destination address to create a secure session with the Entity using a secure session protocol; D. sending, by the Client, a first Data message after any session setup messages, that contains a Resource Tag that was included in the message received from the Entity to which this client initiated session is a response; E. setting up, by the Entity, the session setup portion of the secure session protocol; and F. verifying, by the Entity, the Client's certificate chain and the Resource Tag that is received in the first Data message from the Client.
- 2. A hardware architecture neutral and operating system neutral and network transport neutral method for secure response session using less software code and network bandwidth than conventional systems, said method comprising the steps of:
A. extracting, by a Client who is establishing a secure response session to a Entity in order to respond to a message from the Entity, the Entity's public key and matching destination address of the Entity from a trusted source or storage means; B. extracting, by the Client, the Client's public and private key and certificate chain from a trusted source or storage means; C. using the extracted client public and private key and certificate chain information along with the previously extracted Entity destination address to create a secure session with the Entity using a secure session protocol; D. sending, by the Client, a first Data message after any session setup messages, that contains a Resource Tag that was included in the message received from the Entity to which this client initiated session is a response; E. setting up, by the Entity, the session setup portion of the secure session protocol; and F. verifying, by the Entity, the Client's certificate chain and the Resource Tag that is received in the first Data message from the Client.
- 3. The method in claim 2, further comprising:
G. exchanging, between the Client and the Entity, additional data related to the application that is using the secure response protocol;
- 4. The method in claim 2, further comprising:
H. terminating the session, by either the Client or the Entity, by closing the underlying network connection.
- 5. The method in claim 4, wherein the underlying network connection is a TCP-based network connection.
- 6. The method in claim 4, wherein the public key and matching destination address has been verified previously using a digital signature (verified with a trusted public key) or cryptographic checksum (verified with a trusted key derived from a Master Key or Session Key or Message Key).
- 7. The method in claim 2, wherein the Entity's public key comprises a RSA or a RSA based public key.
- 8. The method in claim 2, wherein the matching destination address comprises a URL or URL based address.
- 9. The method in claim 2, wherein the trusted source or storage means comprises data selected from the set consisting of a normal conventional e-mail message, a non-secured web page, a secured web page, and combinations thereof.
- 10. The method in claim 2, wherein the secured web page is secured by any of SSL, PCT, or TLS.
- 11. The method in claim 2, wherein the trusted storage means comprises data received from communicating with a Server via a secure session.
- 12. The method in claim 2, wherein the Client's keys and certificate chain comprise fixed values.
- 13. The method in claim 2, wherein the Client's keys and certificate chain comprise fixed values shared by more than one Client system and wherein the Entity authenticates the Client based on this Resource Tag.
- 14. The method in claim 2, wherein the Client's keys and certificate chain are unique to this Client, and the Entity authenticates the Client using this unique certificate and/or using a Resource Tag was included in the message received from the Entity to which this session is a response.
- 15. The method in claim 2, wherein said Entity comprises a Merchant.
- 16. A method for conducting a secure response session from a Client that is establishing a secure response session to an Entity in order to respond to a message from the Entity, said method comprising the steps of: extracting, by the Client, information including the Entity's public key and destination address and Client's public and private key and certificate chain from one or more trusted source;
using, by the Client, the extracted information to create a secure session with the Entity using a secure session protocol; and sending, by the Client, a first data message that contains a resource tag that was included in the message received from the Entity to which this Client initiated session is a response.
- 17. The method in claim 16, wherein the first data message is sent after one or more session setup message.
- 18. The method in claim 16, further comprising:
setting up, by the Entity, the session setup portion of the secure session protocol; and verifying, by the Entity, the Client's certificate chain and the Resource Tag that is received in the first Data message from the Client.
- 19. The method in claim 16, wherein said Entity comprises a Merchant.
- 20. The method in claim 18, wherein said Entity comprises a Merchant.
- 21. The method of claim 2, wherein the trusted source or storage means comprises a Compact Certificate as explained earlier, or chain of Compact Certificates leading to a trusted root public key.
- 22. A computer program product for use in conjunction with a computer system, the computer program product comprising a computer readable storage medium and a computer program mechanism embedded therein, the computer program mechanism, comprising: a program module that directs the computer system and/or components thereof, to function in a specified manner to conduct a secure response session from a Client that is establishing a secure response session to an Entity in order to respond to a message from the Entity and occurring in a computer system hardware architecture neutral and operating system neutral and network transport protocol neutral manner for conducting a secure response session, the program module including instructions for:
extracting, by the Client, information including the Entity's public key and destination address and Client's public and private key and certificate chain from one or more trusted source; using, by the Client, the extracted information to create a secure session with the Entity using a secure session protocol; and sending, by the Client, a first data message that contains a resource tag that was included in the message received from the Entity to which this Client initiated session is a response.
RELATED APPLICATIONS
[0001] This application claims the benefit of priority under 35 U.S.C. Sections 119(e) and/or 120 and incorporates by reference each of the following U.S. patent applications:
[0002] U.S. Provisional Application Serial No. 60/271,455 (Attorney Docket No. P-70322/RMA) filed Feb. 25, 2001, entitled Hardware Architecture, Operating System And Network Transport Neutral System, Method And Computer Program Product For Secure Communications And Messaging;
[0003] U.S. utility application Ser. No. 09/______ (Attorney Docket No. A-70553/RMA) filed ______, entitled Hardware Architecture, Operating System And Network Transport Neutral System, Method And Computer Program Product For Secure Communications And Messaging;
[0004] U.S. utility application Ser. No. 09/______ (Attorney Docket No. A-70554/RMA) filed ______, entitled System and Method for Authorization of Access to a Resource;
[0005] U.S. utility application Ser. No. 09/______ (Attorney Docket No. A-70555/RMA) filed ______, entitled System, Method, and Structure for Generating and Using A Compressed Digital Certificate,
[0006] U S. utility application Ser. No. 09/______ (Attorney Docket No. A-70556/RMA) filed ______, entitled Common Security Protocol Structure and Mechanism and System and Method for Using.
[0007] U.S. utility application Ser. No. 09/______ (Attorney Docket No. A-70557/RMA) filed ______, entitled System and Method for Conducting A Secure Interactive Communication Session;
[0008] U S. utility application Ser. No. 09/______ (Attorney Docket No. A-70558/RMA) filed ______, entitled System and Method for Secure Unidirectional Messaging;
[0009] U S. utility application Ser. No. 09/______ (Attorney Docket No. A-70559/RMA) filed ______, entitled Secure Certificate and System and Method for Issuing and Using Same;
[0010] U.S. utility application Ser. No. 09/______ (Attorney Docket No. A-70560/RMA) filed ______, entitled System and Method for Conducting a Secure Response Communication Session;
[0011] U.S. utility application Ser. No. 09/______ (Attorney Docket No. A-70561/RMA) filed ______, entitled System and Method for Communicating A Secure Unidirectional Response Message;
[0012] U.S. utility application Ser. No. 09/______ (Attorney Docket No. A-70562/RMA) filed ______, entitled System, Method And Computer Program Product For Device, Operating System, And Network Transport Neutral Secure Interactive Multi-Media Messaging; each of which is hereby incorporated by reference.
[0013] U.S. patent application Ser. No. 09/627,357, filed Jul. 28, 2000, entitled Method for Cooperatively Executing a Plurality of Code Threads in a Processor Using Instruction Retry upon Resource Constraints;
[0014] U.S. patent application Ser. No. 09/627,645, filed Jul. 28, 2000, entitled Business Method to Generate and Electronically Distribute Rich Media E-mail Messages to People with Physical Disabilities;
[0015] U.S. patent application Ser. No.09/627,358, filed Jul. 28, 2000, entitled Business Method for Generating and Electronically Distributing Targeted Author-Once Architecture Independent Rich Media Content,
[0016] U.S. patent application Ser. No. 09/628,205, filed Jul. 28, 2000, entitled Method to Generate and Electronically Distribute Highly Targeted Rich Media E-mail Messages;
[0017] U.S. patent application Ser. No. 09/706,661 filed Nov. 4, 2000, entitled Hardware Architecture Neutral Computer Program Language And Structure And Method For Execution;
[0018] U.S. patent application Ser. No. 09/706,621 filed Nov. 4, 2000, entitled System and Method for Autonomous Generation of Customized File Having Procedural and Data Elements from Non-procedural Flat-File Descriptors;
[0019] U.S. patent application Ser. No. 09/706,664, filed Nov. 4, 2000, entitled System and Method for Intelligently Scaling Procedure/Data Sets to Adapt the Procedure/data Sets to Receiver Attributes and Maintain Message Intent;
[0020] U.S. patent application Ser. No. 09/706,609 filed Nov. 4, 2000, entitled Intent Preserving Message Adaptation and Conversion System and Method for Communicating with Sensory And/or Physically Challenged Persons;
[0021] U.S. patent application Ser. No. 091706,612 filed Nov. 4, 2000, entitled System and Method for Searching and Selecting Data and Control Elements in Message Procedural/data Set for Automatic and Complete Portrayal of Message to Maintain Message Intent;
[0022] U.S. patent application Ser. No. 09/706,617 filed Nov. 4, 2000, entitled System and Method for Adapting Content for Sensory and Physically Challenged Persons Using Embedded Semantic Elements in a Procedurally Based Message File;
[0023] U.S. patent application Ser. No. 091706,615 filed Nov. 4, 2000, entitled System and Method for Forward and Backward Content Based Version Control for Automated Autonomous Playback on Client Devices Having Diverse Hardware and Software;
[0024] U S. patent application Ser. No. 09/706,611 filed Nov. 4, 2000, entitled System and Method for Reducing Unauthorized Access by Procedural Messages Executing in a Computer System to Computer System or Memory or Programs or Data Stored Therein;
[0025] U.S. patent application Ser. No. 09/706,614 filed Nov. 4, 2000, entitled System and Method for Self-directed Loading of an Input Buffer with Procedural Messages from a Stream of Sub-files Containing Sets of Logical Files;
[0026] U.S. patent application Ser. No. 09/706,610 filed Nov. 4, 2000, entitled System and Method for Device-Neutral Procedurally-Based Content Display Layout and Content Playback;
[0027] U.S. patent application Ser. No. 09/706,616 filed Nov. 4, 2000, entitled System and Method for Thin Procedural Multi-Media Player Run-Time Engine Having Application Program Level Cooperative Multi-threading and Constrained Resource Retry with Anti-Stall Features;
[0028] U.S. patent application Ser. No. 09/706,613 filed Nov. 4, 2000, entitled System and Method for Streaming Multimedia-Rich Interactive Experiences Over a Communications Channel; and
[0029] U.S. patent application Ser. No. 09706,606 filed Nov. 4, 2000, entitled System and Method for Cooperative Application-Level Multi-Thread Execution Including Instruction Retry Feature Upon Identifying Constrained System Resource; each of which is hereby incorporated by reference.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60271455 |
Feb 2001 |
US |