发明名称 Systems, Methods, and Computer-Readable Media for Secure Digital Communications and Networks
摘要 Provided are system, methods, and computer-readable media for systems, methods, and computer-readable media for secure digital communications and networks. The system provides for secure communication between nodes through the use of a subscription between two nodes based on unique identifiers that are unique to each node, and communication between nodes without a subscription may be blocked. Additionally, secure communications between a node and a remote node are dynamically encrypted using asymmetric and symmetric encryption. The encryption algorithms and key lengths may be changed at each subsequent negotiation between a node and a remote node.
申请公布号 US2015381573(A1) 申请公布日期 2015.12.31
申请号 US201514848667 申请日期 2015.09.09
申请人 STT LLC. 发明人 Armatis Matthew Tyrone
分类号 H04L29/06 主分类号 H04L29/06
代理机构 代理人
主权项 1. A computer-implemented method for secure communications on a digital network, comprising: receiving, at a processor, a first packet at a first node of a network; determining, by a processor, whether a subscription exists between the first node and a second node associated with the packet; performing, by the processor, an authentication of a connection between the first node and the second node in response to determining the subscription exists, the authentication comprising: sending a unique identifier from the first node to the second node, the unique identifier comprising a fingerprint identifier associated with the first node; performing, by the processor, a first synchronization of the connection between the first node and the second node, the first synchronization comprising: receiving a first request from the second node for a first asymmetric public key;generating a first asymmetric public key and a first asymmetric private key each having a first asymmetric key length using a first encryption algorithm;sending the first asymmetric public key to the second node;receiving an encrypted first symmetric key from the second node, the first symmetric key encrypted using the first asymmetric public key and the first symmetric key generated using a second encryption algorithm; anddecrypting the first encrypted symmetric key to obtain the first symmetric key; encrypting data of the first packet using the first symmetric key; sending, over the network, the first packet to the second node; performing, by the processor, a second synchronization of the connection between the first node and the second node in response to determining the subscription exists, the second synchronization comprising: receiving a second request from the second node for a second asymmetric public key;generating a second asymmetric public key and a second asymmetric private key each having a second asymmetric key length using a third encryption algorithm, the third encryption algorithm being different from the first encryption algorithm;sending the second asymmetric public key to the second node;receiving an encrypted second symmetric key from the second node, the second symmetric key encrypted using the first asymmetric public key;decrypting the encrypted second symmetric key to obtain a second symmetric key; andencrypting data of a second packet using the symmetric key.
地址 Austin TX US