SECURE MULTI-PARTY PROTOCOL
First Claim
1. A method for securing communications between a first computer and a second computer, the method comprising:
- receiving, by the second computer from the first computer over a communications network, a request data packet, the request data packet including a control block comprising a symmetric key, and a data block encrypted with the symmetric key, wherein the control block is encrypted with a public key of a public-private key pair;
decrypting, by the second computer, the control block with a private key of the public-private key pair;
extracting, by the second computer, the symmetric key from the control block; and
decrypting, by the second computer, the encrypted data block with the extracted symmetric key.
1 Assignment
0 Petitions
Accused Products
Abstract
A requestor and a responder may conduct secure communication by making API calls based on a secure multi-party protocol. The requestor may send a request data packet sent in a API request to the responder, where the request data packet can include at least a control block that is asymmetrically encrypted and a data block that is symmetrically encrypted. The responder may return a response data packet to the requestor, where the response data packet can include at least a control block and a data block that are both symmetrically encrypted. The requestor and the responder may derive the keys for decrypting the encrypted portions of the request and response data packets based on some information only known to the requestor and the responder. The secure multi-party protocol forgoes the need to store and manage keys in a hardware security module.
-
Citations
20 Claims
-
1. A method for securing communications between a first computer and a second computer, the method comprising:
-
receiving, by the second computer from the first computer over a communications network, a request data packet, the request data packet including a control block comprising a symmetric key, and a data block encrypted with the symmetric key, wherein the control block is encrypted with a public key of a public-private key pair; decrypting, by the second computer, the control block with a private key of the public-private key pair; extracting, by the second computer, the symmetric key from the control block; and decrypting, by the second computer, the encrypted data block with the extracted symmetric key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer comprising:
-
a processor; and a computer readable medium coupled to the processor, the computer readable medium comprising code executable to perform a method for securing communications between a first computer and a second computer, the method comprising performing, by the second computer; receiving from the first computer over a communications network, a request data packet, the request data packet including a control block comprising a symmetric key, and a data block encrypted with the symmetric key, wherein the control block is encrypted with a public key of a public-private key pair; decrypting the control block with a private key of the public-private key pair; extracting from the control block, the symmetric key; and decrypting the encrypted data block with the extracted symmetric key. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification