Invention Grant
US09185133B2 Methods, devices and systems for establishing end-to-end secure connections and for securely communicating data packets
有权
用于建立端到端安全连接和安全地传送数据包的方法,设备和系统
- Patent Title: Methods, devices and systems for establishing end-to-end secure connections and for securely communicating data packets
- Patent Title (中): 用于建立端到端安全连接和安全地传送数据包的方法,设备和系统
-
Application No.: US14234451Application Date: 2012-07-24
-
Publication No.: US09185133B2Publication Date: 2015-11-10
- Inventor: Sye Loong Keoh , Oscar Garcia Morchon , Sandeep Shankaran Kumar , Martina Brachmann , Bozena Erdmann
- Applicant: Sye Loong Keoh , Oscar Garcia Morchon , Sandeep Shankaran Kumar , Martina Brachmann , Bozena Erdmann
- Applicant Address: NL Eindhoven
- Assignee: KONINKLIJKE PHILIPS N.V.
- Current Assignee: KONINKLIJKE PHILIPS N.V.
- Current Assignee Address: NL Eindhoven
- Agent Meenakshy Chakravorty
- International Application: PCT/IB2012/053759 WO 20120724
- International Announcement: WO2013/014609 WO 20130131
- Main IPC: G06F12/00
- IPC: G06F12/00 ; H04L29/06

Abstract:
The invention provides methods, devices (102, 110, 124, 136) and communication systems (100) for establishing end-to-end secure connections and for securely communicating data packets. Such a communication system (100) comprises a first device (124, 136), an intermediate device (110) and a second device (102). The first device (124, 136) communications via a first network (120), which is based on a first transport protocol and a first transport security protocol with the intermediate device (110). The second device (102) communications via a second network, which is based on a second transport protocol and a second transport security protocol with the intermediate device (110). The intermediate device (110) modifies packets received via first network to packets suitable for communication via the second network, and vice versa. The first device (124, 136) is able to reconstruct a header of a received packet as if the packet was sent via the second network (108) and its transport and security protocols. Further, the first device (124) is able to verify, on basis of the reconstructed header, verification fields which are generated on basis of the second transport security protocol.
Public/Granted literature
Information query