Method and system for secure communications over a public network
First Claim
1. A method of secure communications over a public network, comprising the steps of:
- establishing a permanent key and an ordered sequence of limited use keys;
enabling the use of the permanent key at any time;
enabling the use of the limited use keys for a predetermined usage for each of the limited use keys in the ordered sequence; and
disabling each of the limited use keys after the predetermined usage for each of the limited use keys in the ordered sequence respectively.
1 Assignment
0 Petitions
Accused Products
Abstract
A method (100) of secure communications over a public network can include establishing a permanent key and an ordered sequence of limited use keys (102), enabling the use of the permanent key at any time (104) and enabling the use of the limited use keys for a predetermined usage (106). The step of establishing the order sequence of limited use keys can optionally include the step of establishing an ordered sequence of single-use keys (108). The method can further include the step of requesting (110) the ordered sequence of limited use keys from an access protected website and optionally storing (116) the ordered sequence of limited use keys and a respective status for each of the limited use keys. The method can further include the step of disabling (112) each of the limited use keys after the predetermined usage for each of the limited use keys.
62 Citations
17 Claims
-
1. A method of secure communications over a public network, comprising the steps of:
-
establishing a permanent key and an ordered sequence of limited use keys;
enabling the use of the permanent key at any time;
enabling the use of the limited use keys for a predetermined usage for each of the limited use keys in the ordered sequence; and
disabling each of the limited use keys after the predetermined usage for each of the limited use keys in the ordered sequence respectively. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A secure networking system, comprising:
-
at least one server; and
a processor forming a portion of the server, wherein the processor is programmed to;
establish a permanent key and an ordered sequence of limited use keys;
enable the use of the permanent key at any time;
enable the use of the limited use keys for a predetermined usage for each of the limited use keys in the ordered sequence; and
disable each of the limited use keys after the predetermined usage for each of the limited use keys in the ordered sequence respectively. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A machine readable storage, having stored thereon a computer program having a plurality of code sections executable by a machine for causing the machine to perform the steps of:
-
establish a permanent key and an ordered sequence of limited use keys;
enable the use of the permanent key at any time;
enable the use of the limited use keys for a predetermined usage for each of the limited use keys in the ordered sequence; and
disable each of the limited use keys after the predetermined usage for each of the limited use keys in the ordered sequence respectively. - View Dependent Claims (17)
-
Specification