Method and system for securing communication
First Claim
1. A method for securing communications between two computing devices, the method comprising:
- exchanging, between the two computing devices, information to be used by both computing devices to generate a session key, the exchange of information including;
a first one of the two computing devices encrypting, using a public key of the second one of the two computing devices, a first input, and transmitting to the second one of the two computing devices the first input as encrypted using the public key of the second one of the two computing devices;
at the second one of the two computing devices, receiving the first input as encrypted using the public key of the second one of the two computing devices, and decrypting, using a private key of the second one of the two computing devices the first input;
at the second one of the two computing devices, encrypting, using a public key of the first one of the two computing devices, a second input, and transmitting to the first one of the two computing devices the second input as encrypted using the public key of the first one of the two computing devices;
at the first one of the two computing devices, receiving the second input as encrypted using the public key of the first one of the two computing devices, and decrypting, using a private key of the first one of the two computing devices the second input;
at both the first one of the two computing devices and the second one of the two computing devices, generating, using the first and second inputs, an initial message digest;
at both the first one of the two computing devices and the second one of the two computing devices, extracting, from the initial message digests, a shared secret, and storing the shared secret at each of the first one of the two computing devices and the second one of the two computing devices in respective first and second secrets repositories; and
exchanging, between the two computing devices, data encrypted by a transmitting one of the first one of the two computing devices or the second one of the two computing devices and decrypted by a receiving one of the first one of the two computing devices or the second one of the two computing devices, as appropriate, using at each of the first one of the two computing devices and the second one of the two computing devices an encryption/decryption key produced from application of the shared secret to an encryption module.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for generating one or more secrets for use by members. The method includes sending a first request for connection with a second member, and sending a second request to connection with a third member. The method further includes receiving, by the first member from the second member, a second input after the first request is sent and after communication is initiated between the first member and the second member and receiving, by the first member from the third member, a third input after the second request is sent and after communication is initiated between the first member and the third member. The method further includes generating, using an n-bit generator executing on the first member, a message digest using a first input, the second input, and the third input, extracting a secret from the message digest, and storing the secret in a secrets repository on the first member.
-
Citations
1 Claim
-
1. A method for securing communications between two computing devices, the method comprising:
-
exchanging, between the two computing devices, information to be used by both computing devices to generate a session key, the exchange of information including; a first one of the two computing devices encrypting, using a public key of the second one of the two computing devices, a first input, and transmitting to the second one of the two computing devices the first input as encrypted using the public key of the second one of the two computing devices; at the second one of the two computing devices, receiving the first input as encrypted using the public key of the second one of the two computing devices, and decrypting, using a private key of the second one of the two computing devices the first input; at the second one of the two computing devices, encrypting, using a public key of the first one of the two computing devices, a second input, and transmitting to the first one of the two computing devices the second input as encrypted using the public key of the first one of the two computing devices; at the first one of the two computing devices, receiving the second input as encrypted using the public key of the first one of the two computing devices, and decrypting, using a private key of the first one of the two computing devices the second input; at both the first one of the two computing devices and the second one of the two computing devices, generating, using the first and second inputs, an initial message digest; at both the first one of the two computing devices and the second one of the two computing devices, extracting, from the initial message digests, a shared secret, and storing the shared secret at each of the first one of the two computing devices and the second one of the two computing devices in respective first and second secrets repositories; and exchanging, between the two computing devices, data encrypted by a transmitting one of the first one of the two computing devices or the second one of the two computing devices and decrypted by a receiving one of the first one of the two computing devices or the second one of the two computing devices, as appropriate, using at each of the first one of the two computing devices and the second one of the two computing devices an encryption/decryption key produced from application of the shared secret to an encryption module.
-
Specification