Piggy-backed key exchange protocol for providing secure low-overhead browser connections from a client to a server using a trusted third party

   
   

A method, system, and computer program product for establishing security parameters that are used to exchange data on a secure connection. A piggy-backed key exchange protocol is defined, with which these security parameters are advantageously exchanged. By piggy-backing the key exchange onto other already-required messages (such as a client's HTTP GET request, or the server's response thereto), the overhead associated with setting up a secure browser-to-server connection is minimized. This technique is defined for a number of different scenarios, where the client and server may or may not share an encoding scheme, and is designed to maintain the integrity of application layer communication protocols. In one scenario, a client and a server exchange secure messages using a trusted third party.

 
Web www.patentalert.com

< Bytecode instruction processor with switch instruction handling logic

< Method and system for presentation and manipulation of PKCS authenticated-data objects

> Software system and method for graphically building customized recipe flowcharts

> Web based application re-coded for OS/2 compatibility

~ 00124