×

Secure session capability using public-key cryptography without access to the private key

  • US 8,966,267 B1
  • Filed: 04/08/2014
  • Issued: 02/24/2015
  • Est. Priority Date: 04/08/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method in a first server for establishing a secure session with a client device, the method comprising:

  • receiving a first message from the client device that initiates a handshake procedure to establish a secure session between the client device and the first server and transmitting the first message to a second server;

    receiving, from the second server, a second message in response to the first message and transmitting the second message to the client device;

    receiving, from the second server, a third message that includes a digital certificate and transmitting the third message to the client device;

    receiving, from the second server, a fourth message that includes a set of cryptographic parameters that is signed using a private key stored on the second server and not available on the first server and transmitting the fourth message to the client device, wherein the set of cryptographic parameters are to be used by the client device when generating a premaster secret and include a Diffie-Hellman public value selected by the second server;

    receiving, from the second server, a fifth message that indicates that a server hello part of the handshake procedure is complete and transmitting the fifth message to the client device;

    receiving, from the client device, a sixth message that includes a Diffie-Hellman public value selected by the client device and transmitting the sixth message to the second server;

    receiving, from the second server, a seventh message that includes a set of one or more session keys to be used in the secure session for encrypting and decrypting communication between the client device and the first server that were generated at least using a master secret that is generated using a premaster secret that is generated using the Diffie-Hellman public value selected by the client device and the Diffie-Hellman public value selected by the second server;

    receiving, from the client device, an eighth message that indicates that future messages sent from the client device will be encrypted;

    receiving, from the client device, a ninth message that is encrypted according to the session keys;

    transmitting, to the client device, a tenth message that indicates that future messages sent to the client device will be encrypted; and

    transmitting, to the client device, an eleventh message that is encrypted according to the session keys.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×