Method and system for securing communication
First Claim
Patent Images
1. A method for obtaining a secure communication session, the method comprising:
- receiving, via a first communication channel and by a server;
a client identifier from a client;
determining, by the server, whether the client is authorized based on the client identifier;
in response to determining that the client is authorized, sending, via a second communication channel and by the server, a challenge;
receiving, via the first communication channel and by the server, a response from the client, said response comprising a combination of (a) information extracted from a message digest computed using the challenge sent by the server with (b) the challenge sent by the server; and
in response to determining that the response is correct, generating, by the server, a cryptographic key for the secure communication by providing at least the challenge as an input to cryptographic key generator.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for obtaining a secure communication session includes a first member computing device receiving, via a first communication channel, a first input from a second member computing device, sending, via a second communication channel, a second input to the second member computing device, and receiving, via the first communication channel, the second input from the second member computing device. The secure communication session is initiated based on the first input and second input.
73 Citations
14 Claims
-
1. A method for obtaining a secure communication session, the method comprising:
-
receiving, via a first communication channel and by a server;
a client identifier from a client;determining, by the server, whether the client is authorized based on the client identifier; in response to determining that the client is authorized, sending, via a second communication channel and by the server, a challenge; receiving, via the first communication channel and by the server, a response from the client, said response comprising a combination of (a) information extracted from a message digest computed using the challenge sent by the server with (b) the challenge sent by the server; and in response to determining that the response is correct, generating, by the server, a cryptographic key for the secure communication by providing at least the challenge as an input to cryptographic key generator. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system for obtaining a secure communication session, the system comprising:
- a computer processor; and
a data repository for storing instructions that when executed by the computer processor cause the computer processor to;receive, via a first communication channel, a client identifier from a client; determine whether the client is authorized based on the client identifier; in response to determining that the client is authorized, send, via a second communication channel, a challenge; receive;
via the first communication channel, a response from the client, said response comprising a combination of (a) information extracted from a message digest computed using the challenge sent by the server with (b) the challenge sent by the server;in response to determining that the response is correct, generate an encryption key using the challenge as an input to an n-bit generator. - View Dependent Claims (8, 9, 10)
- a computer processor; and
-
11. A non-transitory computer readable medium comprising computer readable program code that, when executed by a processor, causes the processor to:
-
receive, via a first communication channel;
a client identifier from a client;determine whether the client is authorized based on the client identifier; in response to determining that the client is authorized, send, via a second communication channel, a challenge; receive, via the first communication channel, a response from the client, said response comprising a combination of (a) information extracted from a message digest computed using the challenge sent by the server with (b) the challenge sent by the server; in response to determining that the response is correct, generate an encryption key by providing at least the challenge as an input to an n-bit generator. - View Dependent Claims (12, 13, 14)
-
Specification