×

Method for using dynamic Public Key Infrastructure to send and receive encrypted messages between software applications

  • US 10,135,618 B2
  • Filed: 03/25/2016
  • Issued: 11/20/2018
  • Est. Priority Date: 03/25/2016
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for using dynamic Public Key Infrastructure to send and receive encrypted messages between software applications comprising:

  • (a) generating a sender'"'"'s PKI public and private key pair for a sender application and a receiver'"'"'s PKI public and private key pair for a receiver application, wherein the sender'"'"'s PKI public and private key pair comprises a sender'"'"'s public key and a sender'"'"'s private key and wherein the receiver'"'"'s PKI public and private key pair comprises a receiver'"'"'s public key and a receiver'"'"'s private key, and sharing the sender'"'"'s public key with the receiver application and the receiver'"'"'s public key with the sender application;

    (b) building a first message with a format of[IP Address];

    [Command];

    [Message];

    (c) encrypting the first message with the recipient'"'"'s PKI receiver'"'"'s public key to produce an encrypted first message;

    (d) generating a new sender'"'"'s PKI public and private key pair, wherein the new sender'"'"'s PKI public and private key pair comprises a new sender'"'"'s public key and a new sender'"'"'s private key;

    (e) sending the encrypted first message and the new sender'"'"'s public key to the receiver application;

    (f) decrypting the encrypted first message using the receiver'"'"'s private key to produce a decrypted first message having a [Command];

    (g) validating the [Command] of the decrypted first message to determine if the [Command] of the decrypted first message is a valid [Command] that is known in advance;

    (h) if the [Command] of the decrypted first message is determined to not be a valid [Command], black listing an IP address of the sender application, sending a first fraud alert message to a first mobile phone, and sending a first fraud alert email to a first email address;

    (i) if the [Command] of the decrypted first message is determined to be a valid [Command], building an acknowledgement message with a format of[IP Address];

    [Command];

    [Message];

    (j) encrypting the acknowledgement message with the new sender'"'"'s public key to produce an encrypted acknowledgment message;

    (k) generating a new receiver'"'"'s PKI public and private key pair, wherein the new receiver'"'"'s PKI public and private key pair comprises a new receiver'"'"'s public key and a new receiver'"'"'s private key;

    (l) sending the encrypted acknowledgment message and the new receiver'"'"'s public key to the sender application;

    (m) decrypting the encrypted acknowledgment message using the new sender'"'"'s private key to produce a decrypted acknowledgment message having a [Command];

    (n) validating the [Command] of the decrypted acknowledgment message to determine if it is a valid [Command] that is known in advance; and

    (o) if the [Command] of the decrypted acknowledgment message is determined to not be a valid [Command], black listing an IP address of the receiver application, sending a second fraud alert message to a second mobile phone, and sending a second fraud alert email to a second email address.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×