×

Session negotiations

  • US 10,601,789 B2
  • Filed: 11/27/2017
  • Issued: 03/24/2020
  • Est. Priority Date: 06/13/2013
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • at a first security module of a plurality of security modules;

    obtaining, from an operator device, a first request for a session key;

    in response to the first request, using a domain key to encrypt one or more session keys and information usable to identify the operator device, the domain key accessible to each of the plurality of security modules; and

    providing the one or more session keys and encrypted one or more session keys to the operator device; and

    at a second security module, different from the first security module, of the plurality of security modules;

    obtaining, from the operator device, a second request to perform a cryptographic operation, the second request including data, an encrypted session key from the encrypted one or more session keys, and a digital signature generated based at least in part on the session key;

    using the domain key to decrypt the encrypted session key and the information usable to identify the operator device;

    verifying that the operator device matches the information usable to identify the operator device;

    using the session key to verify the digital signature;

    as a result of verifying the digital signature and verifying that the operator device matches the information usable to identify the operator device, performing the requested cryptographic operation using at least the data;

    using the session key to encrypt a result of performing the requested cryptographic operation; and

    providing the encrypted result to the operator device.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×