×

Secure node-to-multinode communication

  • US 10,079,814 B2
  • Filed: 09/04/2015
  • Issued: 09/18/2018
  • Est. Priority Date: 09/23/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method of establishing communication sessions between a first node and a plurality of other nodes, the method comprising:

  • the first node sending a request message to a server for requesting the establishment of secure communication sessions with a plurality of other nodes, the request message including a list of node identifiers wherein each of the node identifiers identifies a respective node of the plurality of other nodes;

    the server receiving said request message from the first node; and

    in response to receiving said request message;

    the server creating a virtual and temporary second node, which is executable within said server;

    the server generating a list of temporary node identifiers on the basis of said list of node identifiers such that each of the plurality of nodes becomes identifiable by its respective temporary node identifier;

    the server communicating the list of temporary node identifiers to the virtual and temporary second node; and

    subsequentlythe server sending a first key generating file to the first node and the server communicating a second key generating file to the virtual and temporary second node;

    the first node starting to process the first key generating file and the virtual and temporary second node starting to process the second key generating file; and

    in responsethe first node generating a first intermediate data set and the virtual and temporary second node generating a second intermediate data set;

    the first node sending the first intermediate data set to the virtual and temporary second node;

    the virtual and temporary second node comparing bits of the first intermediate data set with corresponding bits of the second intermediate data set;

    the virtual and temporary second node generating a third intermediate data set based on the bit-by-bit comparison between the first intermediate data set and the second intermediate data set by setting a first value if the compared bits are equal and setting a second value if the compared bits are unequal;

    the virtual and temporary second node sending the third intermediate data set to the first node;

    the first node comparing bits of the third intermediate data set with corresponding bits of the first intermediate data set;

    the first node generating a first cryptographic key based on the bit-by-bit comparison between the third and the first intermediate data set by keeping the value of the bit of the first intermediate data set if the corresponding bit of the third intermediate data set is set to the first value and ignoring the bit of the first intermediate data set if the corresponding bit of the third intermediate data set is set to the second value;

    the virtual and temporary second node generating a second cryptographic key based on the bit by bit comparison between the first and the second intermediate data set by keeping the value of the bit of the second data set if the corresponding bit of the first intermediate data set is equal and ignoring the bit of the second intermediate data set if the compared bits are unequal, said first and second cryptographic keys being the same;

    the virtual and temporary second node setting up communication channels between the first node and each of the plurality of other nodes, the virtual and temporary second node using the list of temporary node identifiers for identifying the respective nodes of the plurality of nodes to which communication channels are to be set up; and

    in response to the respective communication channels having been set upthe virtual and temporary second node further sending the second cryptographic key to each of the plurality of other nodes; and

    the first node applying the first cryptographic key and each of the plurality of other nodes applying the second cryptographic key during the communication sessions between the first node and each of the plurality of other nodes.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×