Key exchange for a process-based security system
First Claim
1. A method of performing a key exchange between a client and a server having a process-based security system comprising the steps of:
- sending user identification information from the client to the server;
modifying the task structure of the client by the server to reflect a pending request for key exchange;
generating a first random number;
sending the first random number to the client;
retrieving a password associated with the user identification information by the server;
entering a password at the client;
calculating a first key using a transformative function operating on the password and the first random number by the server;
calculating a first key using the transformative function operating on password and the first random number by the client;
using the result of the calculated first key as a first key; and
modifying the task structure of the client by the server to reflect the completion of the key exchange.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for performing a key exchange between a client and a server having a process-based security system begins by sending user identification information from the client to the server. The server modifies the task structure of the client by the server to reflect a pending request for key exchange. The server generates a first random number and sends the first random number to the client. The server retrieves a password associated with the user identification information from storage. A user enters a password at the client. The server and the client then each calculate a first key using a transformative function operating on the password and the first random number. The client and server then use the result of the calculated first key as a first key. The server modifies the task structure of the client to reflect the completion of the key exchange.
-
Citations
20 Claims
-
1. A method of performing a key exchange between a client and a server having a process-based security system comprising the steps of:
-
sending user identification information from the client to the server;
modifying the task structure of the client by the server to reflect a pending request for key exchange;
generating a first random number;
sending the first random number to the client;
retrieving a password associated with the user identification information by the server;
entering a password at the client;
calculating a first key using a transformative function operating on the password and the first random number by the server;
calculating a first key using the transformative function operating on password and the first random number by the client;
using the result of the calculated first key as a first key; and
modifying the task structure of the client by the server to reflect the completion of the key exchange. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system for key exchange between a client and key exchange server having a process-based security system comprising:
-
a key exchange server processor communicably connected to a client;
a key exchange server memory connected to said key exchange server processor;
wherein said key exchange server processor;
receives user identification information from said client;
modifies the task structure of the client to reflect a pending request for key exchange;
generates a first random number;
sends the first random number to the client;
retrieves a password associated with the user identification information from the key exchange server memory;
calculates a first key using a transformative function operating on the password and the first random number;
uses the result of the calculated first key as a first key; and
modifies the task structure of the client to reflect the completion of the key exchange. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
Specification