Method for enhancing security in distributed systems
First Claim
1. A method for providing trusted transference of data, using an encryption key, on a secured network, the secured network being comprised of member computers, each member computer having a microprocessor and an associated storage device, comprising:
- (a) receiving, at a first computer, the first computer being one of the member computers of the secured network, an encryption key request from a second computer having a microprocessor and an associated storage device, the second computer not being one of the member computers of the secured network, the first computer of the secured network having the encryption key for utilization on the secured network;
(b) determining, by the first computer, if the second computer has at least a predetermined amount of digital money associated with a self-created virtual currency, associated the second computer, to fulfill the encryption key request, the self-created virtual currency being a peer-to-peer protocol that transfers of the digital money associated with the self-created virtual currency from one internet protocol address on the secured network to another internet protocol address on the secured network and validates the transfers, the self-created virtual currency being only used within the secured network;
(c) sending, from the first computer of the secured network to the second computer, a payment request for the predetermined amount of digital money associated with the self-created virtual currency;
(d) sending an encryption key, from the first computer of the secured network to the second computer, when the first computer receives from the second computer the predetermined amount of digital money associated with the self-created virtual currency to fulfill the encryption key request;
(e) sending, from the first computer of the secured network to the second computer, a payment demand when the first computer determines that the second computer does not have at least the predetermined amount of digital money associated with the self-created virtual currency to fulfill the encryption key request;
(f) sending an encryption key, from the first computer of the secured network to the second computer, when the first computer receives, from the second computer, an appropriate payment associated with the sent payment demand;
(g) enabling, in response to the encryption key being sent by the first computer to the second computer, trusted transference of data from the second computer to the first computer and trusted transference of data from the first computer to the second computer;
(h) enabling, in response to the encryption key being sent by the first computer to the second computer, trusted transference of data between the second computer and a third computer and trusted transference of data from the third computer to the second computer, the third computer being one of the member computers of the secured network; and
(i) transferring, at the first computer of the secured network, the digital money, received from the second computer of the secured network, associated with the self-created virtual currency to an administrative account to prevent unauthorized acquisition of digital money associated the self-created virtual currency from the second computer of the secured network by an unauthorized computer;
(j) harvesting, at the first computer of the secured network, from other member computers of the secured network, digital money associated with the self-created virtual currency which is no longer needed by the other member computers of the secured network; and
(k) transferring, at the first computer of the secured network, the harvested digital money associated with the self-created virtual currency to the administrative account to prevent unauthorized acquisition of digital money associated the self-created virtual currency from the other member computers of the secured network that no longer need digital money associated with the self-created virtual currency by an unauthorized computer.
7 Assignments
0 Petitions
Accused Products
Abstract
A method and system secures an encryption key for utilization on a secured network by receiving, at a trusted node, an encryption key request from a requesting node, the encryption key request including a public encryption key of a public/private encryption key pair associated with the requesting node; determining, at the trusted node, if the requesting node has previously supplied enough virtual currency to support the request; choosing an encryption key for distributing to the requesting node when it is determined the requesting node has enough virtual currency; encrypting the chosen encryption key with the public encryption key of a public/private encryption key pair associated with the requesting node; and sending the encrypted encryption key to the requesting node.
-
Citations
10 Claims
-
1. A method for providing trusted transference of data, using an encryption key, on a secured network, the secured network being comprised of member computers, each member computer having a microprocessor and an associated storage device, comprising:
-
(a) receiving, at a first computer, the first computer being one of the member computers of the secured network, an encryption key request from a second computer having a microprocessor and an associated storage device, the second computer not being one of the member computers of the secured network, the first computer of the secured network having the encryption key for utilization on the secured network; (b) determining, by the first computer, if the second computer has at least a predetermined amount of digital money associated with a self-created virtual currency, associated the second computer, to fulfill the encryption key request, the self-created virtual currency being a peer-to-peer protocol that transfers of the digital money associated with the self-created virtual currency from one internet protocol address on the secured network to another internet protocol address on the secured network and validates the transfers, the self-created virtual currency being only used within the secured network; (c) sending, from the first computer of the secured network to the second computer, a payment request for the predetermined amount of digital money associated with the self-created virtual currency; (d) sending an encryption key, from the first computer of the secured network to the second computer, when the first computer receives from the second computer the predetermined amount of digital money associated with the self-created virtual currency to fulfill the encryption key request; (e) sending, from the first computer of the secured network to the second computer, a payment demand when the first computer determines that the second computer does not have at least the predetermined amount of digital money associated with the self-created virtual currency to fulfill the encryption key request; (f) sending an encryption key, from the first computer of the secured network to the second computer, when the first computer receives, from the second computer, an appropriate payment associated with the sent payment demand; (g) enabling, in response to the encryption key being sent by the first computer to the second computer, trusted transference of data from the second computer to the first computer and trusted transference of data from the first computer to the second computer; (h) enabling, in response to the encryption key being sent by the first computer to the second computer, trusted transference of data between the second computer and a third computer and trusted transference of data from the third computer to the second computer, the third computer being one of the member computers of the secured network; and (i) transferring, at the first computer of the secured network, the digital money, received from the second computer of the secured network, associated with the self-created virtual currency to an administrative account to prevent unauthorized acquisition of digital money associated the self-created virtual currency from the second computer of the secured network by an unauthorized computer; (j) harvesting, at the first computer of the secured network, from other member computers of the secured network, digital money associated with the self-created virtual currency which is no longer needed by the other member computers of the secured network; and (k) transferring, at the first computer of the secured network, the harvested digital money associated with the self-created virtual currency to the administrative account to prevent unauthorized acquisition of digital money associated the self-created virtual currency from the other member computers of the secured network that no longer need digital money associated with the self-created virtual currency by an unauthorized computer. - View Dependent Claims (2, 3, 4)
-
-
5. A method for providing trusted transference of data, using an encryption key, on a secured network, the secured network being comprised of member computers, each member computer having a microprocessor and an associated storage device, comprising:
-
(a) receiving, at a first computer, the first computer being one of the member computers of the secured network, an encryption key request from a second computer having a microprocessor and an associated storage device, the second computer not being one of the member computers of the secured network, the first computer of the secured network having the encryption key for utilization on the secured network, the encryption key request including a public encryption key of a public/private encryption key pair associated with the second computer; (b) determining, by the first computer, if the second computer has at least a predetermined amount of digital money associated with a self-created virtual currency, associated the second computer, to fulfill the encryption key request, the self-created virtual currency being a peer-to-peer protocol that transfers of the digital money associated with the self-created virtual currency from one internet protocol address on the secured network to another internet protocol address on the secured network and validates the transfers, the self-created virtual currency being only used within the secured network; (c) sending, from the first computer of the secured network to the second computer, a payment request for the predetermined amount of digital money associated with the self-created virtual currency; (d) sending, from the first computer of the secured network to the second computer, a payment demand when the first computer determines that the second computer does not have at least the predetermined amount of digital money associated with the self-created virtual currency to fulfill the encryption key request; (e) choosing an encryption key for distributing to the second computer when the first computer receives from the second computer the predetermined amount of digital money associated with the self-created virtual currency to fulfill the encryption key request or when the first computer receives, from the second computer, an appropriate payment associated with the sent payment demand; (f) encrypting the chosen encryption key with the public encryption key of a public/private encryption key pair associated with the second computer; (g) sending the encrypted encryption key, from the first computer, to the second computer; (h) enabling, in response to the encrypted encryption key being sent by the first computer to the second computer, trusted transference of data from the second computer to the first computer and trusted transference of data from the first computer to the second computer; (i) enabling, in response to the encrypted encryption key being sent by the first computer to the second computer, trusted transference of data between the second computer and a third computer and trusted transference of data from the third computer to the second computer, the third computer being one of the member computers of the secured network; (j) transferring, at the first computer of the secured network, the digital money, received from the second computer of the secured network, associated with the self-created virtual currency to an administrative account to prevent unauthorized acquisition of digital money associated the self-created virtual currency from the second computer of the secured network by an unauthorized computer; (k) harvesting, at the first computer of the secured network, from other member computers of the secured network, digital money associated with the self-created virtual currency which is no longer needed by the other member computers of the secured network; and (l) transferring, at the first computer of the secured network, the harvested digital money associated with the self-created virtual currency to the administrative account to prevent unauthorized acquisition of digital money associated the self-created virtual currency from the other member computers of the secured network that no longer need digital money associated with the self-created virtual currency by an unauthorized computer. - View Dependent Claims (6, 7)
-
-
8. A system for providing trusted transference of data, using an encryption key, on a secured network, the secured network being comprised of member computers, each member computer having a microprocessor and an associated storage device, comprising:
-
a first computer having encryption keys for utilization on a secured network, said first computer being one of the member computers of the secured network; and a second computer having a microprocessor and an associated storage device, said second computer not being a member computer of the secured network; said second computer sending an encryption key request to said first computer, said encryption key request including a public encryption key of a public/private encryption key pair associated with said second computer; said first computer determining if said second computer has at least a predetermined amount of digital money associated with a self-created virtual currency, associated said second computer, to fulfill the encryption key request, said self-created virtual currency being a peer-to-peer protocol that transfers of the digital money associated with said self-created virtual currency from one internet protocol address on the secured network to another internet protocol address on the secured network and validates the transfers, said self-created virtual currency being only used within the secured network; said first computer sending, to said second computer, a payment request for said predetermined amount of digital money associated with said self-created virtual currency; said first computer sending, to said second computer, a payment demand when said first computer determines that said second computer does not have at least said predetermined amount of digital money associated with said self-created virtual currency to fulfill the encryption key request said first computer choosing an encryption key for distributing to said second computer when said first computer receives from said second computer said predetermined amount of digital money associated with said self-created virtual currency to fulfill the encryption key request or when said first computer receives, from said second computer, an appropriate payment associated with the sent payment demand; said first computer encrypting the chosen encryption key with the public encryption key of a public/private encryption key pair associated with said second computer; said first computer sending the encrypted encryption key to said second computer; said encrypted encryption key enabling trusted transference of data from said second computer to said first computer and trusted transference of data from said first computer to said second computer; said encrypted encryption key enabling trusted transference of data between said second computer and a third computer and trusted transference of data from said third computer to said second computer, said third computer being one of the member computers of the secured network; said first computer transferring the self-created virtual currency to an administrative account to prevent unauthorized acquisition of the self-created virtual currency from said second computer of the secured network by an unauthorized computer; said first computer harvesting from other member computers of the secured network, digital money associated with the self-created virtual currency which is no longer needed by the other member computers of the secured network; said first computer transferring the harvested digital money associated with the self-created virtual currency to the administrative account to prevent unauthorized acquisition of digital money associated the self-created virtual currency from the other member computers of the secured network that no longer need digital money associated with the self-created virtual currency by an unauthorized computer. - View Dependent Claims (9, 10)
-
Specification