×

Method and system for securing communication

  • US 9,654,451 B2
  • Filed: 06/29/2016
  • Issued: 05/16/2017
  • Est. Priority Date: 03/25/2009
  • Status: Active Grant
First Claim
Patent Images

1. A method, comprising:

  • determining whether an encrypted communication has been received at a first computer system;

    if it is determined that an encrypted communication has been received at the first computer system, then;

    identifying a first receiving encryption solution and obtaining algorithm selector bits and an encryption key from the first receiving encryption solution;

    identifying an encryption algorithm corresponding to the algorithm selector bits by obtaining a numeric format of the algorithm selector bits, using the numeric format to identify a matching encryption algorithm identifier in an algorithm selector table, and selecting the encryption algorithm associated with the matching algorithm identifier;

    decrypting the encrypted communication received at the first computer using the identified encryption algorithm and the encryption key to obtain a clear-text format of the received encrypted communication;

    otherwise, if it is determined that an encrypted communication has not been received at the first computer system, then determining whether to send an encrypted communication;

    if it is determined to send a communication,identifying a sending encryption solution and obtaining algorithm selector bits and an encryption key from the sending encryption solution;

    identifying an encryption algorithm corresponding to the algorithm selector bits by obtaining a numeric format of the algorithm selector bits and using the numeric format to identify a matching encryption algorithm identifier in an algorithm selector table, and selecting the encryption algorithm associated with the matching algorithm identifier;

    encrypting the communication using the encryption algorithm and the encryption key to obtain the encrypted communication; and

    sending the encrypted communication to a receiver;

    upon decrypting the encrypted communication received at the first computer, or sending the encrypted communication to the receiver, or if it is determined not to send a communication, then determining whether to end a communication session;

    if it is determined to end the communication session, then ending the communication session;

    otherwise,if it is determined not to end the communication session, then determining whether to update the encryption solutions;

    if it is determined not to update the encryption solutions determining whether a new encrypted communication has been received at a first computer system, and, if so, repeating the method until ending the communication session, otherwise,if it is determined to update the encryption solutions, generating new encryption solutions and then determining whether a new encrypted communication has been received at a first computer system, and, if so, repeating the method until ending the communication session.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×