Non-centralized secure communication services
First Claim
Patent Images
1. A method comprising:
- requesting a secure communication flow between devices;
authenticating an identity of each of the devices using peer-to-peer authentication; and
establishing a secure communication flow between the devices upon authenticating the identity of each of the devices.
1 Assignment
0 Petitions
Accused Products
Abstract
In general, peer-to-peer techniques are described for providing secure communications using digital certificates assigned to secure communication servers (SCSs). The secure communication techniques allows enterprise users to communicate data securely between on another without requiring a centralized system. The SCS provides the secure communication services, such as certification authentication, usually provided by the centralized system. The non-centralized secure communication services provide high fault-tolerance, so that the failure of any system, communication link or other infrastructure will only affect the communication sessions directly associated with the infrastructure experiencing failure.
-
Citations
28 Claims
-
1. A method comprising:
-
requesting a secure communication flow between devices;
authenticating an identity of each of the devices using peer-to-peer authentication; and
establishing a secure communication flow between the devices upon authenticating the identity of each of the devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system comprising:
-
a first device; and
a second device, wherein the first and second devices authenticate identities of one another using peer-to-peer authentication, and establish a secure communication flow between the devices upon authenticating the identity of each of the devices. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A secure communication device comprising:
-
an authentication manager to authenticate an identity of another device using peer-to-peer authentication; and
a security manager to establish a secure communication flow to communicate with the device upon authentication. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A system comprising:
-
a server hosting a web-accessible, cryptographically protected file system; and
a client device to remotely access the file system, wherein the server requires a digital certificate and a private key to grant the client access to the file system. - View Dependent Claims (27, 28)
-
Specification