Peer-to-peer security authentication protocol
First Claim
Patent Images
1. A method of computer security, comprising:
- receiving at a first node a salt that was transmitted by a second node; and
using the received salt to decrypt encrypted data.
1 Assignment
0 Petitions
Accused Products
Abstract
A salt transmitted by a second node is received at a first node. The received salt is used to decrypt encrypted data. Optionally, authorization to access a service provided by the second node is received by the first node. In some cases the service includes access to one or more files.
-
Citations
27 Claims
-
1. A method of computer security, comprising:
-
receiving at a first node a salt that was transmitted by a second node; and using the received salt to decrypt encrypted data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method of computer security, comprising:
-
obtaining at a first node a salt; and sending the salt and encrypted data to a second node. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23)
-
-
24. A system for computer security, including:
-
a processor; and a memory coupled with the processor, wherein the memory is configured to provide the processor with instructions which when executed cause the processor to; receive at a first node a salt that was transmitted by a second node; and use the received salt to decrypt encrypted data.
-
-
25. A system for computer security, including:
-
a processor; and a memory coupled with the processor, wherein the memory is configured to provide the processor with instructions which when executed cause the processor to; obtain at a first node a salt; and send the salt and encrypted data to a second node.
-
-
26. A computer program product for computer security, the computer program product being embodied in a computer readable medium and comprising computer instructions for:
-
receiving at a first node a salt that was transmitted by a second node; and using the received salt to decrypt encrypted data.
-
-
27. A computer program product for authenticating a client to a server, the computer program product being embodied in a computer readable medium and comprising computer instructions for:
-
obtaining at a first node a salt; and sending the salt and encrypted data to a second node.
-
Specification