×

Systems and methods for secure communications using organically derived synchronized encryption processes

  • US 10,263,777 B2
  • Filed: 09/16/2016
  • Issued: 04/16/2019
  • Est. Priority Date: 09/18/2015
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for secure communication, the method comprising:

  • generating, at a first node, a parameter data set containing a plurality of values;

    selecting, using a first seed value stored at the first node, one or more of the plurality of values in the parameter data set to form a first parameter subset;

    generating, at the first node, using the first parameter subset, a first cipher key;

    encrypting, at the first node, user data using a first ciphersuite and the first cipher key resulting in encrypted user data;

    generating a first signature based at least on the parameter data set;

    transmitting, from the first node to a second node, a start frame including the parameter data set, the encrypted user data, and the first signature at a first signature location in the start frame;

    receiving, at the second node, the start frame;

    selecting, using a second seed value stored at the second node, one or more of the plurality of values in the parameter data set in the received start frame to form a second parameter subset;

    generating, using the second parameter subset, a second cipher key;

    decrypting the encrypted user data using a second ciphersuite and the second cipher key; and

    verifying the first signature at a first signature location in the start frame;

    encrypting, at the first node, further user data using the first ciphersuite and the first cipher key as encrypted further user data;

    generating a second signature based at least on the further user data;

    transmitting, from the first node to the second node, a data frame including the encrypted further user data and the second signature at a second signature location in the data frame;

    receiving, at the second node, the data frame;

    decrypting the encrypted further user data using the second ciphersuite and the second cipher key; and

    verifying the second signature at the second signature location in the data frame.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×