×

Token-based key generation

  • US 9,071,424 B1
  • Filed: 03/29/2013
  • Issued: 06/30/2015
  • Est. Priority Date: 03/29/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method performed by a first computing device, the method comprising:

  • engaging in a handshake procedure with a remote second computing device to establish a secure channel;

    generating a first encryption key using a first token having a secret seed, the first encryption key being the same as a second encryption key generated by the second computing device using a second token having the same secret seed; and

    using the first encryption key to engage in encrypted communications with the second computing device,wherein;

    generating the first encryption key using the first token includes cryptographically combining the secret seed with a current time value;

    engaging in the handshake procedure includes;

    receiving a remote clock value within a handshake message from the second computing device, the remote clock value indicating a current clock value of a clock device in the possession of the second computing device;

    obtaining the current time value from a local clock device in the possession of the first computing device; and

    calculating a clock skew between the remote clock value and the current time value; and

    cryptographically combining the secret seed with the current time value includes offsetting the current time value by the clock skew.

View all claims
  • 18 Assignments
Timeline View
Assignment View
    ×
    ×