Method and system for securing communication
First Claim
1. A method, comprising:
- determining whether an encrypted communication has been received at a first computer system;
if it is determined that an encrypted communication has been received at the first computer system, then;
identifying a first receiving encryption solution and obtaining algorithm selector bits and an encryption key from the first receiving encryption solution;
identifying an encryption algorithm corresponding to the algorithm selector bits by obtaining a numeric format of the algorithm selector bits, using the numeric format to identify a matching encryption algorithm identifier in an algorithm selector table, and selecting the encryption algorithm associated with the matching algorithm identifier;
decrypting the encrypted communication received at the first computer using the identified encryption algorithm and the encryption key to obtain a clear-text format of the received encrypted communication;
otherwise, if it is determined that an encrypted communication has not been received at the first computer system, then determining whether to send an encrypted communication;
if it is determined to send a communication,identifying a sending encryption solution and obtaining algorithm selector bits and an encryption key from the sending encryption solution;
identifying an encryption algorithm corresponding to the algorithm selector bits by obtaining a numeric format of the algorithm selector bits and using the numeric format to identify a matching encryption algorithm identifier in an algorithm selector table, and selecting the encryption algorithm associated with the matching algorithm identifier;
encrypting the communication using the encryption algorithm and the encryption key to obtain the encrypted communication; and
sending the encrypted communication to a receiver;
upon decrypting the encrypted communication received at the first computer, or sending the encrypted communication to the receiver, or if it is determined not to send a communication, then determining whether to end a communication session;
if it is determined to end the communication session, then ending the communication session;
otherwise,if it is determined not to end the communication session, then determining whether to update the encryption solutions;
if it is determined not to update the encryption solutions determining whether a new encrypted communication has been received at a first computer system, and, if so, repeating the method until ending the communication session, otherwise,if it is determined to update the encryption solutions, generating new encryption solutions and then determining whether a new encrypted communication has been received at a first computer system, and, if so, repeating the method until ending the communication session.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for generating one or more secrets for use by members. The method includes sending a first request for connection with a second member, and sending a second request to connection with a third member. The method further includes receiving, by the first member from the second member, a second input after the first request is sent and after communication is initiated between the first member and the second member and receiving, by the first member from the third member, a third input after the second request is sent and after communication is initiated between the first member and the third member. The method further includes generating, using an n-bit generator executing on the first member, a message digest using a first input, the second input, and the third input, extracting a secret from the message digest, and storing the secret in a secrets repository on the first member.
-
Citations
1 Claim
-
1. A method, comprising:
-
determining whether an encrypted communication has been received at a first computer system; if it is determined that an encrypted communication has been received at the first computer system, then; identifying a first receiving encryption solution and obtaining algorithm selector bits and an encryption key from the first receiving encryption solution; identifying an encryption algorithm corresponding to the algorithm selector bits by obtaining a numeric format of the algorithm selector bits, using the numeric format to identify a matching encryption algorithm identifier in an algorithm selector table, and selecting the encryption algorithm associated with the matching algorithm identifier; decrypting the encrypted communication received at the first computer using the identified encryption algorithm and the encryption key to obtain a clear-text format of the received encrypted communication; otherwise, if it is determined that an encrypted communication has not been received at the first computer system, then determining whether to send an encrypted communication; if it is determined to send a communication, identifying a sending encryption solution and obtaining algorithm selector bits and an encryption key from the sending encryption solution; identifying an encryption algorithm corresponding to the algorithm selector bits by obtaining a numeric format of the algorithm selector bits and using the numeric format to identify a matching encryption algorithm identifier in an algorithm selector table, and selecting the encryption algorithm associated with the matching algorithm identifier; encrypting the communication using the encryption algorithm and the encryption key to obtain the encrypted communication; and sending the encrypted communication to a receiver; upon decrypting the encrypted communication received at the first computer, or sending the encrypted communication to the receiver, or if it is determined not to send a communication, then determining whether to end a communication session; if it is determined to end the communication session, then ending the communication session;
otherwise,if it is determined not to end the communication session, then determining whether to update the encryption solutions; if it is determined not to update the encryption solutions determining whether a new encrypted communication has been received at a first computer system, and, if so, repeating the method until ending the communication session, otherwise, if it is determined to update the encryption solutions, generating new encryption solutions and then determining whether a new encrypted communication has been received at a first computer system, and, if so, repeating the method until ending the communication session.
-
Specification