SECURE COMMUNICATION SYSTEM AND METHOD

Data can be transmitted from a user terminal to a decryption component over a network in a limited connectivity environment At the user terminal, the data can be received from a user. If it is determined that the data is sensitive data, the data is encrypted using a secure encryption key. A packet i...

Full description

Saved in:
Bibliographic Details
Main Author KAAL MADIS
Format Patent
LanguageEnglish
Korean
Published 22.08.2014
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Data can be transmitted from a user terminal to a decryption component over a network in a limited connectivity environment At the user terminal, the data can be received from a user. If it is determined that the data is sensitive data, the data is encrypted using a secure encryption key. A packet is generated based on a tunneling protocol. The packet includes command data and encrypted sensitive data. The command data includes an address of a network component, command and command identifier. The command identifies that the secure encryption key has been used to encrypt the sensitive data. At the network component identified in the address, the packet is received at a first port; the command is read; the packet is forwarded via a second port to the decryption component for decryption; and a response packet is forwarded, including a response and the command identifier, to the user terminal.
Bibliography:Application Number: KR20147016330