Unlock instant, AI-driven research and patent intelligence for your innovation.

Dynamic distributed key system and method for identity management, authentication servers, data security and preventing man-in-the-middle attacks

A server and key technology, applied in authentication and identity management, revocation and encryption, network expansion, detection fields

Inactive Publication Date: 2011-06-08
斯蒂芬·L.·博伦 +1
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This is the most secure method of ensuring key privacy; however this becomes problematic when one wishes to establish new dynamic sessions with parties that do not have pre-shared key information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic distributed key system and method for identity management, authentication servers, data security and preventing man-in-the-middle attacks
  • Dynamic distributed key system and method for identity management, authentication servers, data security and preventing man-in-the-middle attacks
  • Dynamic distributed key system and method for identity management, authentication servers, data security and preventing man-in-the-middle attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In the following description, specific details are set forth in order to provide a thorough understanding of the present invention to those skilled in the art. However, well known elements may not have been shown or described in detail to avoid unnecessarily obscuring the disclosure. Accordingly, the specification and drawings are to be regarded as illustrative rather than restrictive.

[0031] figure 1 The existing public key asymmetric encryption method for encrypting communications between Bob and Alice is shown, which is currently the most widely used method for providing security for authentication and encryption online.

[0032] figure 2 A possible configuration that can utilize the secure communication link of the present invention using a conventional computing network is shown. In arrangement 10, all data sent over the Internet 12 between networks 14 and 16 is encrypted. In arrangement 18, all data sent between any workstation nodes 20 with a gatekeeper is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A distributed key encryption system and method is provided in which a key storage server provides a session key to the source and destination computers by encrypting the session key with unique distributed private keys that are associated with the respective source and destination computers by unique private key identifiers The destination computer then decrypts the encrypted session key using it's distributed private key and then decrypts the communication using the decrypted session key.

Description

technical field [0001] The invention relates to the field of electronic communication security, in particular to network expansion, verification and identity management, detection, revocation and encryption methods. Background technique [0002] The most widely used method of providing security for authentication and encryption online is an asymmetric encryption system designed using public keys, where authentication relies on certificates issued by a certificate server. Public Key Infrastructure (PKI) systems have known security weaknesses such as vulnerability to man-in-the-middle (MitM) attacks because they are often improperly implemented. [0003] PKI systems are expensive not only because of all the steps involved in the architecture, but also because of their choice of cryptographic techniques. The strength of encryption used by PKI has recently been called into question. Public keys are compound primes, and they are always hackable. Significant advances have been ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/14H04L9/32H04L9/28
CPCH04L63/0428H04L9/3226H04L9/321H04L9/0822H04L9/083
Inventor 斯蒂芬·L.·博伦安德烈·J.·布里森
Owner 斯蒂芬·L.·博伦