×

Encryption using alternate authentication key

  • US 8,713,311 B1
  • Filed: 11/07/2012
  • Issued: 04/29/2014
  • Est. Priority Date: 11/07/2012
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for changing authentication keys when transmitting data, the method comprising:

  • receiving a first data packet comprising a first sender-generated authentication value generated using a first authentication key, and a first message encrypted using a first encryption key;

    receiving an indication that subsequent data packets will include authentication values generated using a second authentication key;

    receiving a second data packet comprising a second sender-generated authentication value and an encrypted second message;

    applying the second authentication key to the second data packet to generate a recipient-generated authentication value;

    when the recipient-generated authentication value that is generated using the second authentication key matches the second sender-generated authentication value, decrypting the encrypted second message; and

    when the recipient-generated authentication value that is generated using the second authentication key does not match the second sender-generated authentication value;

    applying the first authentication key to the second data packet to generate another recipient-generated authentication value; and

    when the recipient-generated authentication value that is generated using the first authentication key matches the second sender-generated authentication value, decrypting the encrypted message using the first encryption key,wherein the first authentication key and the second authentication key comprise Message Authentication Code (MAC) keys, andwherein the first authentication key and the first encryption key are included in a first cipher specification.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×