SYSTEMS AND METHODS FOR SECURE COMMUNICATIONS USING AN OPEN PEER PROTOCOL
First Claim
Patent Images
1. A method for proving the identity of an owner of a Key within a Key-space, said method comprising:
- providing a Key owner with a one-time use value;
receiving from the Key owner a first package, said first package including the one-time use value and a digital signature of exclusively the one-time use value;
receiving from the Key owner a second package, said second package including a public key that corresponds to a previously generated private key, and a digital signature of the public key;
computing a hash value of the second package and comparing said hash value with a previously obtained Key to verify authenticity; and
inputting the one-time use value, the public key, and the digital signature of the one-time use value into a signature-verifying algorithm to verify authenticity, wherein the message to be verified that is input into the signature-verifying algorithm consists of the one-time use value.
0 Assignments
0 Petitions
Accused Products
Abstract
A cryptographic system and method for providing secure peer to peer communications over a network. The invention includes systems and methods for generating unique keys in a key-space, using a third party authentication system to provide identities for owners of those keys, proving the ownership of the keys, using a distributed database for establishing any kind of secure communication between two or more parties, and using the ownership of the keys in the key-space to establish secure communications
-
Citations
22 Claims
-
1. A method for proving the identity of an owner of a Key within a Key-space, said method comprising:
-
providing a Key owner with a one-time use value; receiving from the Key owner a first package, said first package including the one-time use value and a digital signature of exclusively the one-time use value; receiving from the Key owner a second package, said second package including a public key that corresponds to a previously generated private key, and a digital signature of the public key; computing a hash value of the second package and comparing said hash value with a previously obtained Key to verify authenticity; and inputting the one-time use value, the public key, and the digital signature of the one-time use value into a signature-verifying algorithm to verify authenticity, wherein the message to be verified that is input into the signature-verifying algorithm consists of the one-time use value. - View Dependent Claims (2, 3, 4)
-
-
5. A system for proving the identity of an owner of a Key within a Key-space, said system comprising:
a computing device that includes; a providing module that provides a Key owner with a one-time use value; a first package receiving module that receives from the Key owner a first package, said first package including the one-time use value and a digital signature of exclusively the one-time use value; a second package receiving module that receives from the Key owner a second package, said second package including a public key that corresponds to a previously generated private key, and a digital signature of the public key; a hash value computing and comparison module that computes, via a computer processor, a hash value of the second package and compares said hash value with a previously obtained Key to verify authenticity; and a first package signature-verifying module that inputs the one-time use value, public key, and the digital signature of the one-time use value into a signature-verifying algorithm to verify authenticity, wherein the message to be verified that is input into the signature-verifying algorithm consists of the one-time use value. - View Dependent Claims (6, 7, 8)
-
9. A method for providing identity proof of a Key owner through an authentication service, said method comprising:
-
receiving proof of Key owner authentication from at least one of the Key owner and the authentication service; receiving a first package from the Key owner, said first package including a publicly available identifier associated with the authentication service, a Key associated with the owner, and a digital signature of exclusively the publicly available identifier and the Key; using a signing algorithm to sign the first package using a certificate, thereby generating a digital signature of the first package; and providing a second package to the Key owner, said second package including the first package and the digital signature of the first package. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A system for providing identity proof of a Key owner through an authentication service, said system comprising:
a computing device that includes; an authentication receiving module that receives proof of Key owner authentication from at least one of the Key owner and the authentication service; a first package receiving module that receives a first package from the Key owner, said first package including a publicly available identifier associated with the authentication service, a Key associated with the Key owner, and a digital signature of exclusively the publicly available identifier and the Key; a digital signature module that uses a signing algorithm to sign the first package via a computer processor using a certificate, thereby generating a digital signature of the first package; and a second package providing module that provides a second package to the Key owner, said second package including the first package and the digital signature of the first package. - View Dependent Claims (17, 18, 19, 20, 21, 22)
Specification