SECURELY SHARING SECRET INFORMATION THROUGH AN UNSECURE CHANNEL
Secure exchange of information over an unauthenticated communication channel between a sender and a receiver can be implemented as computer-implemented methods, media, and systems. In response to receiving an identifier (ID) of the receiver, a sender provides a symmetric key to the receiver that mat...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Secure exchange of information over an unauthenticated communication channel between a sender and a receiver can be implemented as computer-implemented methods, media, and systems. In response to receiving an identifier (ID) of the receiver, a sender provides a symmetric key to the receiver that matches the ID. The symmetric key is configured for use by the receiver to decrypt encrypted information provided by the sender. The sender receives a plurality of heartbeat calls from a receiver to notify the sender of availability to receive encrypted information. Each call of the plurality of heartbeat calls includes a checksum of the symmetric key. In response to determining that the received plurality of heartbeat calls comply with one or more verification rules for confirming an identity of the receiver, the sender sends the encrypted information for decryption by the receiver using the symmetric key. |
---|