×

Multi-user secret decay

  • US 10,341,359 B2
  • Filed: 08/10/2015
  • Issued: 07/02/2019
  • Est. Priority Date: 06/25/2012
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • receiving, at a first device, a computer-generated first version of secret information to be used for securing computer network communications between the first device and a second device communicatively coupled to the first device via the computer network;

    receiving, at the first device, a communication from the second device comprising a second version of the secret information;

    detecting an allowable change in a count from at least one of independent counters of the first device and the second device;

    determining, at the first device, that the second version of the secret information is valid, based at least in part on the allowable change and on an allowable type of deviation between the first version of the secret information and the second version of the secret information;

    generating, at the first device, a third version of the secret information based at least in part on the communication received from the second device and the first version of secret information; and

    storing, at the first device, the third version of the secret information.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×