×

Use and generation of a session key in a secure socket layer connection

  • US 7,975,139 B2
  • Filed: 04/30/2002
  • Issued: 07/05/2011
  • Est. Priority Date: 05/01/2001
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for establishing a secure connection and authenticating a server in connections formed with PKI procedures, wherein a server public key, obtained from the server by a client, is used with asymmetric cryptography to establish a symmetric session key for encryption of communications with symmetric cryptography during the connection, said method offering an alternative for authenticating the server public key, and comprising:

  • generating a symmetric server authentication key by the server, the server authentication key used for encrypting server authentication information;

    transmitting a server public key by the server to the client in clear text form;

    generating a symmetric client authentication key by the client, the server authentication key and the client authentication key being identical to each other as both are generated using a common secret known to both the client and server, said common secret generated by;

    generating a strong authentication token time-based response by a strong authentication token at the client;

    deriving a client authentication key from the response by the client;

    sending a synchronization challenge from the server to the client;

    encrypting the synchronization challenge with the client authentication key by the client;

    sending the encrypted synchronization challenge from the client to the server; and

    generating said server authentication key by the server that corresponds to the client authentication key used by the client,sending server authentication information to the client to authenticate the server, the server authentication information including data related to the server'"'"'s public key, the server authentication information encrypted by the server using the server authentication key and a symmetric encryption algorithm,decrypting, at the client, received server authentication information with the client authentication key and a symmetric decryption algorithm to obtain data related to the server public key, andverifying the correctness of the server authentication information at the client in order to authenticate the server by comparing the decrypted data related to the server public key with the server public key used in establishing the secure connection and received from the server.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×