摘要 |
<p>In general, peer-to-peer techniques (4A, 4B, 4C, 4D, 4E of Figure 1) are described for providing secure communications using digital certificates assigned to secure communication servers (SCSs) (2). The secure communication techniques allows enterprise users to communicate data securely between on another without requiring a centralized system (6). The SCS provides the secure communication services, such as certification authe ntication, usually provided by the centralized system. The non-centralized secure communication services provide high fault-tolerance, so that the failure of any system, communication link or oth er infrastructure will only affect the communication sessions directly associated with the infrastructure experiencing failure.</p> |