×

Dynamic distributed key system and method for identity management, authentication servers, data security and preventing man-in-the-middle attacks

  • US 9,166,782 B2
  • Filed: 04/25/2007
  • Issued: 10/20/2015
  • Est. Priority Date: 04/25/2006
  • Status: Active Grant
First Claim
Patent Images

1. A method of encrypting a communication between a first source computer and a second destination computer, wherein said source and destination computers are each provided respectively with first and second private distributed keys, each associated with a first and second unique private key identifier, wherein a key storage server is provided with said first and second private distributed keys, each associated with said first and second unique private key identifiers, said method comprising:

  • i) providing said key storage server, said key storage server being provided with said first and second private distributed keys, each associated with said first and second unique private key identifiers;

    ii) said source computer sending a first request to said key storage server for a session key;

    iii) said key storage server identifying said source computer and locating its associated first private distributed key;

    iv) said key storage server generating a unique session key for the session in question, identified by a unique session identifier;

    v) said key storage server encrypting the session key with said source computer'"'"'s first private distributed key and sending the encrypted session key, with a session identifier, to said source computer;

    vi) said source computer using said source computer'"'"'s first private distributed key to decrypt the session key and using the session key to encrypt said communication, which is sent to the destination computer along with said session identifier;

    vii) said destination computer receiving the encrypted communication and session identifier and sending a second request to said key storage server for the session key associated with said session identifier;

    viii) said key storage server determining from the session identifier whether it has the corresponding session key, and whether it has said destination computer'"'"'s private distributed key;

    ix) if said key storage server determines from the session identifier that it has the corresponding session key, and has said destination computer'"'"'s private distributed key, said key storage server encrypting the session key with said destination computer'"'"'s private distributed key and communicating it to said destination computer; and

    x) said destination computer then decrypting the session key using its second private distributed key and decrypting said communication using the decrypted session key;

    wherein to distribute private keys the server performs an encryption application comprising receiving a device-specific identifier from a new device, generating a unique application key and unique starting offset from the device-specific identifier, encrypting a private key with said unique key and sending said encrypted private key to the new device; and

    wherein key segments that have yet to be created are compared by comparing key segments ahead of the last offset to authenticate a user.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×