Method for establishing secure communications among processing devices
First Claim
1. A method for enabling secure communications among processing devices, comprising the steps of:
- establishing a first cryptographically secure session between a first processing device and a second processing device, where said first processing device is remotely located from said second processing device;
establishing a second cryptographically secure session between a third processing device and a fourth processing device, where said third processing device is remotely located from said fourth processing device, where said first processing device communicates with said third processing device over a first communications link, and where said second processing device communicates with said fourth processing device over a second communications link;
in said first processing device;
sending session key information stored in said second processing device to said third processing device via said second communications link and said second cryptographically secure session;
generating said session key in said third processing device at least in part from said session key information;
storing said session key in said third processing device; and
establishing a third cryptographically secure session between said first processing device and said third processing device using said session key.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for open electronic commerce having a customer trusted agent securely communicating with a first money module, and a merchant trusted agent securely communicating with a second money module. Both trusted agents are capable of establishing a first cryptographically secure session, and both money modules are capable of establishing a second cryptographically secure session. The merchant trusted agent transfers electronic merchandise to the customer trusted agent, and the first money module transfers electronic money to the second money module. The money modules inform their trusted agents of the successful completion of payment, and the customer may use the purchased electronic merchandise. A first processing device generates an encryption key. A third processing device receives information from a second processing device by way of a fourth processing device, which information allows the third processing device to generate the encryption key. Thus, the first and third processing devices can securely communicate using the generated encryption key.
209 Citations
11 Claims
-
1. A method for enabling secure communications among processing devices, comprising the steps of:
-
establishing a first cryptographically secure session between a first processing device and a second processing device, where said first processing device is remotely located from said second processing device; establishing a second cryptographically secure session between a third processing device and a fourth processing device, where said third processing device is remotely located from said fourth processing device, where said first processing device communicates with said third processing device over a first communications link, and where said second processing device communicates with said fourth processing device over a second communications link; in said first processing device; sending session key information stored in said second processing device to said third processing device via said second communications link and said second cryptographically secure session; generating said session key in said third processing device at least in part from said session key information; storing said session key in said third processing device; and establishing a third cryptographically secure session between said first processing device and said third processing device using said session key. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for enabling secure communications among processing devices, comprising the steps of:
-
establishing a first cryptographically secure session between a first processing device and a second processing device, where said first processing device is remotely located from said second processing device; establishing a second cryptographically secure session between a third processing device and a fourth processing device, where said third processing device is remotely located from said fourth processing device, where said first processing device communicates with said third processing device over a first communications link, and where said second processing device communicates with said fourth processing device over a second communications link; said first processing device generating a first random number; sending said first random number to said second processing device via said first cryptographically secure session and to said fourth processing device via said second communications link, whereby said first, second, and fourth processing devices store said first random number; said second processing device generating a second random number; sending said second random number to said first processing device via said first cryptographically secure session and to said third processing device via said first communications link, whereby said second, first, and third processing devices store said second random number; said fourth processing device sending said first random number to said third processing device via said second cryptographically secure session; said third processing device sending said second random number to said fourth processing device via said second cryptographically secure session; said first processing device forming a random session key from said first and second random numbers; said second processing device forming said random session key from said first and second random numbers; said third processing device forming said random session key from said first and second random numbers; said fourth processing device forming said random session key from said first and second random numbers; and where said first and third processing devices cryptographically communicate with said session key, and where said second and fourth processing devices cryptographically communicate with said session key. - View Dependent Claims (9, 10, 11)
-
Specification