Dynamic distributed key system and method for identity management, authentication servers, data security and preventing man-in-the-middle attacks
A server and key technology, applied in authentication and identity management, revocation and encryption, network expansion, detection fields
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0030] In the following description, specific details are set forth in order to provide a thorough understanding of the present invention to those skilled in the art. However, well known elements may not have been shown or described in detail to avoid unnecessarily obscuring the disclosure. Accordingly, the specification and drawings are to be regarded as illustrative rather than restrictive.
[0031] figure 1 The existing public key asymmetric encryption method for encrypting communications between Bob and Alice is shown, which is currently the most widely used method for providing security for authentication and encryption online.
[0032] figure 2 A possible configuration that can utilize the secure communication link of the present invention using a conventional computing network is shown. In arrangement 10, all data sent over the Internet 12 between networks 14 and 16 is encrypted. In arrangement 18, all data sent between any workstation nodes 20 with a gatekeeper is...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 