Method for using dynamic Public Key Infrastructure to send and receive encrypted messages between software applications
First Claim
Patent Images
1. A method for using dynamic Public Key Infrastructure to send and receive encrypted messages between software applications comprising:
- (a) generating a sender'"'"'s PKI public and private key pair for a sender application and a receiver'"'"'s PKI public and private key pair for a receiver application, wherein the sender'"'"'s PKI public and private key pair comprises a sender'"'"'s public key and a sender'"'"'s private key and wherein the receiver'"'"'s PKI public and private key pair comprises a receiver'"'"'s public key and a receiver'"'"'s private key, and sharing the sender'"'"'s public key with the receiver application and the receiver'"'"'s public key with the sender application;
(b) building a first message with a format of[IP Address];
[Command];
[Message];
(c) encrypting the first message with the recipient'"'"'s PKI receiver'"'"'s public key to produce an encrypted first message;
(d) generating a new sender'"'"'s PKI public and private key pair, wherein the new sender'"'"'s PKI public and private key pair comprises a new sender'"'"'s public key and a new sender'"'"'s private key;
(e) sending the encrypted first message and the new sender'"'"'s public key to the receiver application;
(f) decrypting the encrypted first message using the receiver'"'"'s private key to produce a decrypted first message having a [Command];
(g) validating the [Command] of the decrypted first message to determine if the [Command] of the decrypted first message is a valid [Command] that is known in advance;
(h) if the [Command] of the decrypted first message is determined to not be a valid [Command], black listing an IP address of the sender application, sending a first fraud alert message to a first mobile phone, and sending a first fraud alert email to a first email address;
(i) if the [Command] of the decrypted first message is determined to be a valid [Command], building an acknowledgement message with a format of[IP Address];
[Command];
[Message];
(j) encrypting the acknowledgement message with the new sender'"'"'s public key to produce an encrypted acknowledgment message;
(k) generating a new receiver'"'"'s PKI public and private key pair, wherein the new receiver'"'"'s PKI public and private key pair comprises a new receiver'"'"'s public key and a new receiver'"'"'s private key;
(l) sending the encrypted acknowledgment message and the new receiver'"'"'s public key to the sender application;
(m) decrypting the encrypted acknowledgment message using the new sender'"'"'s private key to produce a decrypted acknowledgment message having a [Command];
(n) validating the [Command] of the decrypted acknowledgment message to determine if it is a valid [Command] that is known in advance; and
(o) if the [Command] of the decrypted acknowledgment message is determined to not be a valid [Command], black listing an IP address of the receiver application, sending a second fraud alert message to a second mobile phone, and sending a second fraud alert email to a second email address.
1 Assignment
0 Petitions
Accused Products
Abstract
Method for using dynamic Public Key Infrastructure to send and receive encrypted messages between software applications.
17 Citations
6 Claims
-
1. A method for using dynamic Public Key Infrastructure to send and receive encrypted messages between software applications comprising:
-
(a) generating a sender'"'"'s PKI public and private key pair for a sender application and a receiver'"'"'s PKI public and private key pair for a receiver application, wherein the sender'"'"'s PKI public and private key pair comprises a sender'"'"'s public key and a sender'"'"'s private key and wherein the receiver'"'"'s PKI public and private key pair comprises a receiver'"'"'s public key and a receiver'"'"'s private key, and sharing the sender'"'"'s public key with the receiver application and the receiver'"'"'s public key with the sender application; (b) building a first message with a format of [IP Address];
[Command];
[Message];(c) encrypting the first message with the recipient'"'"'s PKI receiver'"'"'s public key to produce an encrypted first message; (d) generating a new sender'"'"'s PKI public and private key pair, wherein the new sender'"'"'s PKI public and private key pair comprises a new sender'"'"'s public key and a new sender'"'"'s private key; (e) sending the encrypted first message and the new sender'"'"'s public key to the receiver application; (f) decrypting the encrypted first message using the receiver'"'"'s private key to produce a decrypted first message having a [Command]; (g) validating the [Command] of the decrypted first message to determine if the [Command] of the decrypted first message is a valid [Command] that is known in advance; (h) if the [Command] of the decrypted first message is determined to not be a valid [Command], black listing an IP address of the sender application, sending a first fraud alert message to a first mobile phone, and sending a first fraud alert email to a first email address; (i) if the [Command] of the decrypted first message is determined to be a valid [Command], building an acknowledgement message with a format of [IP Address];
[Command];
[Message];(j) encrypting the acknowledgement message with the new sender'"'"'s public key to produce an encrypted acknowledgment message; (k) generating a new receiver'"'"'s PKI public and private key pair, wherein the new receiver'"'"'s PKI public and private key pair comprises a new receiver'"'"'s public key and a new receiver'"'"'s private key; (l) sending the encrypted acknowledgment message and the new receiver'"'"'s public key to the sender application; (m) decrypting the encrypted acknowledgment message using the new sender'"'"'s private key to produce a decrypted acknowledgment message having a [Command]; (n) validating the [Command] of the decrypted acknowledgment message to determine if it is a valid [Command] that is known in advance; and (o) if the [Command] of the decrypted acknowledgment message is determined to not be a valid [Command], black listing an IP address of the receiver application, sending a second fraud alert message to a second mobile phone, and sending a second fraud alert email to a second email address. - View Dependent Claims (2, 3, 4, 5, 6)
-
Specification