×

Method for enhancing security in distributed systems

  • US 9,967,091 B2
  • Filed: 02/12/2015
  • Issued: 05/08/2018
  • Est. Priority Date: 02/12/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method for providing trusted transference of data, using an encryption key, on a secured network, the secured network being comprised of member computers, each member computer having a microprocessor and an associated storage device, comprising:

  • (a) receiving, at a first computer, the first computer being one of the member computers of the secured network, an encryption key request from a second computer having a microprocessor and an associated storage device, the second computer not being one of the member computers of the secured network, the first computer of the secured network having the encryption key for utilization on the secured network;

    (b) determining, by the first computer, if the second computer has at least a predetermined amount of digital money associated with a self-created virtual currency, associated the second computer, to fulfill the encryption key request, the self-created virtual currency being a peer-to-peer protocol that transfers of the digital money associated with the self-created virtual currency from one internet protocol address on the secured network to another internet protocol address on the secured network and validates the transfers, the self-created virtual currency being only used within the secured network;

    (c) sending, from the first computer of the secured network to the second computer, a payment request for the predetermined amount of digital money associated with the self-created virtual currency;

    (d) sending an encryption key, from the first computer of the secured network to the second computer, when the first computer receives from the second computer the predetermined amount of digital money associated with the self-created virtual currency to fulfill the encryption key request;

    (e) sending, from the first computer of the secured network to the second computer, a payment demand when the first computer determines that the second computer does not have at least the predetermined amount of digital money associated with the self-created virtual currency to fulfill the encryption key request;

    (f) sending an encryption key, from the first computer of the secured network to the second computer, when the first computer receives, from the second computer, an appropriate payment associated with the sent payment demand;

    (g) enabling, in response to the encryption key being sent by the first computer to the second computer, trusted transference of data from the second computer to the first computer and trusted transference of data from the first computer to the second computer;

    (h) enabling, in response to the encryption key being sent by the first computer to the second computer, trusted transference of data between the second computer and a third computer and trusted transference of data from the third computer to the second computer, the third computer being one of the member computers of the secured network; and

    (i) transferring, at the first computer of the secured network, the digital money, received from the second computer of the secured network, associated with the self-created virtual currency to an administrative account to prevent unauthorized acquisition of digital money associated the self-created virtual currency from the second computer of the secured network by an unauthorized computer;

    (j) harvesting, at the first computer of the secured network, from other member computers of the secured network, digital money associated with the self-created virtual currency which is no longer needed by the other member computers of the secured network; and

    (k) transferring, at the first computer of the secured network, the harvested digital money associated with the self-created virtual currency to the administrative account to prevent unauthorized acquisition of digital money associated the self-created virtual currency from the other member computers of the secured network that no longer need digital money associated with the self-created virtual currency by an unauthorized computer.

View all claims
  • 7 Assignments
Timeline View
Assignment View
    ×
    ×