×

Techniques for key distribution for use in encrypted communications

  • US 8,281,136 B2
  • Filed: 02/07/2006
  • Issued: 10/02/2012
  • Est. Priority Date: 10/21/2005
  • Status: Expired due to Fees
First Claim
Patent Images

1. A machine-implemented method to execute on a proxy, the method, comprising:

  • receiving, from a principal and by the method, a request for an authentication token, the principal already authenticated to the method when the request is received from the principal;

    obtaining, by the method, from a secure storage a secret associated with the principal, access to the secure storage is exclusive to the method and the secure storage is managed by the method, the secret is not shared with the principal, the secret supplied separately to the secret storage by an administrator for the principal and entered by the administrator on behalf of the principal using offline techniques during a different interaction than that which is associated with receiving the request from the principal, the secrete storage associated exclusively with the principal by the method; and

    generating, by the method, the authentication token as an encrypted token, the authentication token when presented by the principal vouches for an identity of the principal when the principal subsequently interacts with the method and with other services or other principals, the other services or the other principals also interact with the method, the generated authentication token including some random information managed by the method to ensure subsequent encryption tokens generated are different in terms of their content even though a same encryption technique is being used with the encryption token and with the subsequent encryption tokens and storing the encrypted token and the subsequent encrypted tokens in the secret store.

View all claims
  • 11 Assignments
Timeline View
Assignment View
    ×
    ×