×

Method and system for securing communication

  • US 9,882,883 B2
  • Filed: 04/14/2017
  • Issued: 01/30/2018
  • Est. Priority Date: 03/25/2009
  • Status: Active Grant
First Claim
Patent Images

1. A method for securing communications between two computing devices, the method comprising:

  • exchanging, between the two computing devices, information to be used by both computing devices to generate a session key, the exchange of information including;

    a first one of the two computing devices encrypting, using a public key of the second one of the two computing devices, a first input, and transmitting to the second one of the two computing devices the first input as encrypted using the public key of the second one of the two computing devices;

    at the second one of the two computing devices, receiving the first input as encrypted using the public key of the second one of the two computing devices, and decrypting, using a private key of the second one of the two computing devices the first input;

    at the second one of the two computing devices, encrypting, using a public key of the first one of the two computing devices, a second input, and transmitting to the first one of the two computing devices the second input as encrypted using the public key of the first one of the two computing devices;

    at the first one of the two computing devices, receiving the second input as encrypted using the public key of the first one of the two computing devices, and decrypting, using a private key of the first one of the two computing devices the second input;

    at both the first one of the two computing devices and the second one of the two computing devices, generating, using the first and second inputs, an initial message digest;

    at both the first one of the two computing devices and the second one of the two computing devices, extracting, from the initial message digests, a shared secret, and storing the shared secret at each of the first one of the two computing devices and the second one of the two computing devices in respective first and second secrets repositories; and

    exchanging, between the two computing devices, data encrypted by a transmitting one of the first one of the two computing devices or the second one of the two computing devices and decrypted by a receiving one of the first one of the two computing devices or the second one of the two computing devices, as appropriate, using at each of the first one of the two computing devices and the second one of the two computing devices an encryption/decryption key produced from application of the shared secret to an encryption module.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×