Processing

Please wait...

Settings

Settings

Goto Application

1. WO2018017609 - SECURE ASYNCHRONOUS COMMUNICATIONS

Publication Number WO/2018/017609
Publication Date 25.01.2018
International Application No. PCT/US2017/042665
International Filing Date 18.07.2017
IPC
H04L 9/08 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Arrangements for secret or secure communication
08Key distribution
CPC
G06F 21/608
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
606by securing the transmission between two devices or processes
608Secure printing
H04L 2209/60
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
2209Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
60Digital content management, e.g. content distribution
H04L 63/061
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
06for supporting key management in a packet data network
061for key exchange, e.g. in peer-to-peer networks
H04L 63/062
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
06for supporting key management in a packet data network
062for key distribution, e.g. centrally by trusted party
H04L 63/0876
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
08for supporting authentication of entities communicating through a packet data network
0876based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
H04L 63/123
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
12Applying verification of the received information
123received data contents, e.g. message integrity
Applicants
  • FUGUE, INC. [US]/[US]
Inventors
  • SCHOOF, Alexander E.
Agents
  • CRAWFORD, Joshua A.
Priority Data
62/363,81518.07.2016US
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) SECURE ASYNCHRONOUS COMMUNICATIONS
(FR) COMMUNICATIONS ASYNCHRONES SÉCURISÉES
Abstract
(EN)
Techniques for securing and authenticating asynchronous messages using a key manager are provided. A first component sending an asynchronous message to a second component may identify itself to a key manager by a private key and may receive an encrypted signing key from the key manager. The first component may then hash message content, encrypt the hashed message content using the signing key, and send the encrypted result along with the original message content to the receiving component via asynchronous messaging. The receiving component, which may obtain a symmetric signing key from the key manager or from local storage, may decrypt the received encrypted result using the symmetric signing key, and may hash the received original message content using the same hashing algorithm as the sending component; if the two results match, the receiving component may determine that the message is authentic and uncorrupted.
(FR)
La présente invention concerne des techniques pour sécuriser et authentifier des messages asynchrones à l’aide d’un gestionnaire de clés. Un premier composant envoyant un message asynchrone à un second composant peut s’identifier auprès d’un gestionnaire de clés par une clé privée et peut recevoir, en provenance du gestionnaire de clés, une clé de signature chiffrée. Le premier composant peut ensuite hacher le contenu du message, chiffrer le contenu haché du message à l’aide de la clé de signature, et envoyer le résultat chiffré conjointement avec le contenu original du message au composant récepteur via une messagerie asynchrone. Le composant récepteur, qui peut obtenir, en provenance du gestionnaire de clés ou d’un système de stockage local, une clé de signature symétrique, peut déchiffrer le résultat chiffré reçu à l’aide de la clé de signature symétrique et peut hacher le contenu original du message reçu à l’aide du même algorithme de hachage que le composant émetteur ; si les deux résultats concordent, le composant récepteur peut déterminer que le message est authentique et non corrompu.
Latest bibliographic data on file with the International Bureau