×

DYNAMIC DISTRIBUTED KEY SYSTEM AND METHOD FOR IDENTITY MANAGEMENT, AUTHENTICATION SERVERS, DATA SECURITY AND PREVENTING MAN-IN-THE-MIDDLE ATTACKS

  • US 20090106551A1
  • Filed: 04/25/2007
  • Published: 04/23/2009
  • Est. Priority Date: 04/25/2006
  • Status: Active Grant
First Claim
Patent Images

1. A method of encrypting a communication between a first source computer and a second destination computer, wherein said source and destination computers are each provided respectively with first and second private distributed keys, each associated with a first and second unique private key identifier, wherein a key storage server is provided with said first and second private distributed keys, each associated with said first and second unique private key identifiers, said method comprising:

  • i) said source computer sending a request to said key storage server for a session key;

    ii) said key storage server identifying said source computer and locating its associated private distributed key;

    iii) said key storage server generating a unique session key for the session in question, identified by a unique session identifier;

    iv) said key storage server encrypting the session key with said source computer private distributed key and sending it, with a session identifier, to said source computer;

    v) said source computer using said source computer private distributed key to decrypt the session key and using the session key to encrypt said communication, which is sent to the destination computer along with said session identifier;

    vi) said destination computer receives the encrypted communication and session identifier and sending a request to said key storage server for the session key associated with said session identifier;

    vii) said key storage server determining from the session identifier whether it has the corresponding session key, and whether it has said destination computer'"'"'s private distributed key;

    viii) if said key storage server determines from the session identifier that it has the corresponding session key, and has said destination computer'"'"'s private distributed key, said key storage server encrypting the session key said destination computer'"'"'s private distributed key and communicating it to said destination computer;

    ix) said destination computer then decrypting the session key using its private distributed key and decrypting said communication using the decrypted session key.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×