IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0136142
(2016-04-22)
|
등록번호 |
US-9954832
(2018-04-24)
|
발명자
/ 주소 |
- Pollet, Cody
- Burgess, Charles
- Roach, Courtney
- Hart, Brandon
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 |
피인용 횟수 :
0 인용 특허 :
80 |
초록
▼
In one embodiment, a method of secure network transmission is performed by a computer system. The method includes encrypting a payload via a first symmetric key and encrypting the first symmetric key via a second symmetric key. The method further includes encrypting an author header comprising the e
In one embodiment, a method of secure network transmission is performed by a computer system. The method includes encrypting a payload via a first symmetric key and encrypting the first symmetric key via a second symmetric key. The method further includes encrypting an author header comprising the encrypted first symmetric key and a recipient list via a third symmetric key, wherein the recipient list comprises at least one recipient. The method also includes encrypting the third symmetric key via a public asymmetric key associated with an authentication server. Furthermore, the method includes transmitting the encrypted author header and the encrypted third symmetric key to the authentication server for use in recipient-initiated pre-access authentication. In addition, the method includes transmitting the encrypted payload and the second symmetric key over a computer network to the at least one recipient.
대표청구항
▼
1. A method comprising, by an authentication server: receiving, from a recipient computer system, a recipient header in relation to an encrypted payload received by the recipient computer system from a sender computer system, wherein the recipient header comprises metadata and recipient authenticati
1. A method comprising, by an authentication server: receiving, from a recipient computer system, a recipient header in relation to an encrypted payload received by the recipient computer system from a sender computer system, wherein the recipient header comprises metadata and recipient authentication information;causing the metadata of the recipient header to be correlated to a particular authentication header of a plurality of stored authentication headers;wherein the particular authentication header comprises: an encrypted data subportion that includes an authorized recipient list and an encrypted first symmetric key, wherein the encrypted first symmetric key is encrypted via a second symmetric key; andan encrypted third symmetric key that is distinct from the encrypted first symmetric key and the second symmetric key, wherein the encrypted data subportion is encrypted via the encrypted third symmetric key, wherein the encrypted third symmetric key is encrypted via a public key associated with the authentication server;decrypting the encrypted third symmetric key via a private asymmetric key associated with the authentication server;decrypting the encrypted data subportion via the decrypted encrypted third symmetric key;authenticating the recipient computer system as an authorized recipient of the encrypted payload based, at least in part, on a determined match between the recipient authentication information and the authorized recipient list of the decrypted encrypted data subportion;responsive to the authenticating, encrypting the encrypted first symmetric key via a public asymmetric key associated with the recipient computer system to yield a doubly-encrypted first symmetric key; andtransmitting the doubly-encrypted first symmetric key to the recipient computer system so that the encrypted payload can be decrypted by the recipient computer system. 2. The method of claim 1, wherein the plurality of stored authentication headers are maintained in a data store that is physically separate from the authentication server. 3. The method of claim 1, wherein the plurality of stored authentication headers are maintained in a data store resident on the authentication server. 4. The method of claim 1, wherein the particular authentication header comprises metadata sufficient to identify the particular authentication header. 5. The method of claim 1, wherein the recipient header comprises credentials associated with a user of the recipient computer system. 6. The method of claim 1, wherein the recipient header comprises the public asymmetric key associated with the recipient computer system. 7. An authentication system comprising a processor and memory, wherein the processor and memory in combination are operable to perform a method comprising: receiving, from a recipient computer system, a recipient header in relation to an encrypted payload received by the recipient computer system from a sender computer system, wherein the recipient header comprises metadata and recipient authentication information;causing the metadata of the recipient header to be correlated to a particular authentication header of a plurality of stored authentication headers;wherein the particular authentication header comprises: an encrypted data subportion that includes an authorized recipient list and an encrypted first symmetric key, wherein the encrypted first symmetric key is encrypted via a second symmetric key; andan encrypted third symmetric key that is distinct from the encrypted first symmetric key and the second symmetric key, wherein the encrypted data subportion is encrypted via the encrypted third symmetric key, wherein the encrypted third symmetric key is encrypted via a public key associated with the authentication system;decrypting the encrypted third symmetric key via a private asymmetric key associated with the authentication system;decrypting the encrypted data subportion via the decrypted encrypted third symmetric key;authenticating the recipient computer system as an authorized recipient of the encrypted payload based, at least in part, on a determined match between the recipient authentication information and the authorized recipient list of the decrypted encrypted data subportion;responsive to the authenticating, encrypting the encrypted first symmetric key via a public asymmetric key associated with the recipient computer system to yield a doubly-encrypted first symmetric key; andtransmitting the doubly-encrypted first symmetric key to the recipient computer system so that the encrypted payload can be decrypted by the recipient computer system. 8. The authentication system of claim 7, wherein the plurality of stored authentication headers are maintained in a data store that is physically separate from the authentication system. 9. The authentication system of claim 7, wherein the plurality of stored authentication headers are maintained in a data store resident on the authentication system. 10. The method of claim 1, wherein the particular authentication header comprises metadata sufficient to identify the particular authentication header. 11. The authentication system of claim 7, wherein the recipient header comprises credentials associated with a user of the recipient computer system. 12. The authentication system of claim 7, wherein the recipient header comprises the public asymmetric key associated with the recipient computer system. 13. A computer-program product comprising a non-transitory computer-usable medium having computer-readable program code embodied therein, the computer-readable program code adapted to be executed to implement a method comprising: receiving, from a recipient computer system, a recipient header in relation to an encrypted payload received by the recipient computer system from a sender computer system, wherein the recipient header comprises metadata and recipient authentication information;causing the metadata of the recipient header to be correlated to a particular authentication header of a plurality of stored authentication headers;wherein the particular authentication header comprises: an encrypted data subportion that includes an authorized recipient list and an encrypted first symmetric key, wherein the encrypted first symmetric key is encrypted via a second symmetric key; andan encrypted third symmetric key that is distinct from the encrypted first symmetric key and the second symmetric key, wherein the encrypted data subportion is encrypted via the encrypted third symmetric key, wherein the encrypted third symmetric key is encrypted via a public key associated with an authentication server;decrypting the encrypted third symmetric key via a private asymmetric key associated with the authentication server;decrypting the encrypted data subportion via the decrypted encrypted third symmetric key;authenticating the recipient computer system as an authorized recipient of the encrypted payload based, at least in part, on a determined match between the recipient authentication information and the authorized recipient list of the decrypted encrypted data subportion;responsive to the authenticating, encrypting the encrypted first symmetric key via a public asymmetric key associated with the recipient computer system to yield a doubly-encrypted first symmetric key; andtransmitting the doubly-encrypted first symmetric key to the recipient computer system so that the encrypted payload can be decrypted by the recipient computer system. 14. The computer-program product of claim 13, wherein the plurality of stored authentication headers are maintained in a data store that is physically separate from the authentication server. 15. The computer-program product of claim 13, wherein the plurality of stored authentication headers are maintained in a data store resident on the authentication server. 16. The computer-program product of claim 13, wherein the particular authentication header comprises metadata sufficient to identify the particular authentication header. 17. The computer-program product of claim 13, wherein the recipient header comprises credentials associated with a user of the recipient computer system. 18. The computer-program product of claim 13, wherein the recipient header comprises the public asymmetric key associated with the recipient computer system.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.