Secure communications using loop-based authentication flow

A first party uses a secret key to encrypt information, which is then sent through an untrusted connection to a second party. The second party, however, cannot decrypt the information on its own, and it relays the encrypted information through a secure network. The secure network includes one or mor...

Full description

Saved in:
Bibliographic Details
Main Authors Nathan, Richard J, Tredennick, Harry Leslie, Wu, Paul Ying-Fung
Format Patent
LanguageEnglish
Published 28.02.2023
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:A first party uses a secret key to encrypt information, which is then sent through an untrusted connection to a second party. The second party, however, cannot decrypt the information on its own, and it relays the encrypted information through a secure network. The secure network includes one or more nodes linking the first and second parties through one or more trusted connections ("hops"); each hop features uses of a shared secret key unique to that hop. The first party's connection to the network (domain) receives the information relayed through the secure network by the second party, it decrypts that information according to the secret key of the first party, and it then retransmits the decrypted information to the second party using the secure hops. Techniques are provided for sharing a private session key, federated credentials, and private information.
Bibliography:Application Number: US202016915650