×

Secure communications using loop-based authentication flow

  • US 10,263,779 B2
  • Filed: 03/07/2016
  • Issued: 04/16/2019
  • Est. Priority Date: 09/24/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method implemented by a first party, comprising:

  • electronically receiving a first digital message from a second party, wherein the first digital message has been encrypted using a first secret key associated with the second party;

    further encrypting the first digital message using a computing device of the first party and using a second secret key associated with the first party;

    transmitting the further encrypted first digital message as a second digital message to a third party, the third party to decrypt the second digital message using the second secret key, to thereby recover the first digital message therefrom;

    transmitting to the third party identification information for the second party, wherein the third party is to use the identification information to obtain decryption of the first digital message according to the first secret key, to obtain from the first digital message payload information provided by the second party which was encrypted using the first secret key, wherein the payload information comprises at least one of a federated credential, a token and a secret key;

    electronically receiving from the third party a third digital message comprising the payload information provided by the second party, encrypted using the second secret key; and

    decrypting the third digital message using the second secret key;

    wherein the method further comprisesreceiving a header with the third digital message which identifies the second party,determining based on the header that the third digital message corresponds to the first digital message, andstoring the payload information provided by the second party in digital storage.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×