Techniques for handshake-free encrypted communication using symmetric key caching during request-and-response
First Claim
Patent Images
1. An apparatus, comprising:
- a processor circuit on a device;
a key component operative on the processor circuit to retrieve a first symmetric encryption key from a key store using an identifier associated with a second device;
a message component operative on the processor circuit to construct a message comprising a data section and a timestamp, the data section encrypted using the first symmetric encryption key, the timestamp comprising a time the message was constructed and to indicate a start of a validity period for the message; and
a network component operative on the processor circuit to transmit the message to the second device and to receive a response to the message from the second device, the response encrypted using the first symmetric encryption key and comprising a second symmetric encryption key, the key component operative to replace the first symmetric key with the second symmetric key in the key store and associate the second symmetric key with the identifier associated with the second device, the second symmetric key to encrypt subsequent messages to the second device.
2 Assignments
0 Petitions
Accused Products
Abstract
Techniques for handshake-free encrypted communication are described. An apparatus may comprise a key component, a message component, and a network component. The key component may be operative to retrieve a first symmetric encryption key from a key store and to store a second symmetric encryption key in the key store. The message component may be operative to construct a message comprising a data section, the data section encrypted using the first symmetric encryption key. The network component may be operative to transmit the message to a device and to receive a response to the message, the response comprising the second symmetric encryption key. Other embodiments are described and claimed.
-
Citations
16 Claims
-
1. An apparatus, comprising:
-
a processor circuit on a device; a key component operative on the processor circuit to retrieve a first symmetric encryption key from a key store using an identifier associated with a second device; a message component operative on the processor circuit to construct a message comprising a data section and a timestamp, the data section encrypted using the first symmetric encryption key, the timestamp comprising a time the message was constructed and to indicate a start of a validity period for the message; and a network component operative on the processor circuit to transmit the message to the second device and to receive a response to the message from the second device, the response encrypted using the first symmetric encryption key and comprising a second symmetric encryption key, the key component operative to replace the first symmetric key with the second symmetric key in the key store and associate the second symmetric key with the identifier associated with the second device, the second symmetric key to encrypt subsequent messages to the second device. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer-implemented method, comprising:
-
retrieving, by a key component, a first symmetric encryption key from a key store using an identifier associated with a device; encrypting, by a message component, a data section using the first symmetric encryption key; constructing, by the message component, a message comprising the encrypted data section and a timestamp, the timestamp comprising a time the message was constructed and to indicate a start of a validity period for the message; transmitting, by a network component, the message to the device; receiving, by the network component, a response to the message, the response encrypted using the first symmetric encryption key and comprising a second symmetric encryption key; replacing, by the key component, the first symmetric key with the second symmetric key in the key store; and associating the second symmetric key with the identifier associated with the device, the second symmetric key to encrypt subsequent messages to the device. - View Dependent Claims (8, 9, 10, 11)
-
-
12. At least one non-transitory computer-readable storage medium comprising instructions that, when executed, cause a system to:
-
retrieve, by a key component, a first symmetric encryption key from a key store using an identifier associated with a device; encrypt, by a message component, a data section using the first symmetric encryption key; construct, by the message component, a message comprising the data section and a timestamp, the timestamp comprising a time the message was constructed and to indicate a start of a validity period for the message; transmit, by a network component, the message to the device; receive, by the network component, a response to the message, the response encrypted using the first symmetric encryption key and comprising a second symmetric encryption key; decrypt, by the message component, the response using the first symmetric encryption key; replace, by the key component, the first symmetric key with the second symmetric key in the key store; and associate the second symmetric key with the identifier associated with the device, the second symmetric key to encrypt subsequent messages to the device. - View Dependent Claims (13, 14, 15, 16)
-
Specification