PUBLIC KEY PASSING
First Claim
1. A method for securely passing public keys, the method comprising:
- encrypting a first user public key, wherein the first user public key is associated with a first user device;
passing the encrypted first user public key to a first gateway server over a secure communication link;
receiving an encrypted second user public key from the first gateway server over the secure communication link, wherein the second user public key is associated with a second user device, and wherein the second user device is associated with a second gateway server; and
decrypting the second user public key.
1 Assignment
0 Petitions
Accused Products
Abstract
An improved approach to public key passing is provided to inhibit man-in-the-middle (MITM) attacks during an exchange of public keys over one or more public networks. In one embodiment, a method for securely passing public keys includes encrypting a first user public key, wherein the first user public key is associated with a first user device. The method also includes passing the encrypted first user public key to a first gateway server over a secure communication link. The method further includes receiving an encrypted second user public key from the first gateway server over the secure communication link, wherein the second user public key is associated with a second user device, and wherein the second user device is associated with a second gateway server. In addition, the method includes decrypting the second user public key.
-
Citations
20 Claims
-
1. A method for securely passing public keys, the method comprising:
-
encrypting a first user public key, wherein the first user public key is associated with a first user device; passing the encrypted first user public key to a first gateway server over a secure communication link; receiving an encrypted second user public key from the first gateway server over the secure communication link, wherein the second user public key is associated with a second user device, and wherein the second user device is associated with a second gateway server; and decrypting the second user public key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for securely passing public keys, the method comprising:
-
receiving an encrypted first user public key from a first user device over a first secure communication link between the first user device and a first gateway server, wherein the first user public key is associated with the first user device; decrypting the first user public key; passing the first user public key to a second gateway server; receiving a second user public key from the second gateway server, wherein the second user public key is associated with a second user device; encrypting the second user public key; and passing the encrypted second user public key to the first user device over the first secure communication link. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. An apparatus for securely passing public keys, the apparatus comprising:
-
means for encrypting a first user public key, wherein the first user public key is associated with a first user device; means for passing the encrypted first user public key to a first gateway server over a secure communication link; means for receiving an encrypted second user public key from the first gateway server over the secure communication link, wherein the second user public key is associated with a second user device, and wherein the second user device is associated with a second gateway server; and means for decrypting the second user public key. - View Dependent Claims (17)
-
-
18. An apparatus for securely passing public keys, the apparatus comprising:
-
means for receiving an encrypted first user public key from a first user device over a first secure communication link between the first user device and a first gateway server, wherein the first user public key is associated with the first user device; means for decrypting the first user public key; means for passing the first user public key to a second gateway server; means for receiving a second user public key from the second gateway server, wherein the second user public key is associated with a second user device; means for encrypting the second user public key; and means for passing the encrypted second user public key to the first user device over the first secure communication link. - View Dependent Claims (19, 20)
-
Specification