Abstract: A method and apparatus for a trusted intermediary server to assist with the secure exchange of data across a communications network, and in particular a packet-based network, such as the public Internet or an intranet. Communications are routed between private ports of the clients through the trusted intermediary server, with the private key transfer supported by a second type of communication medium. Although the trusted intermediary server negotiates the connection and is involved in the process, the communicants can perform their own key agreement and authentication for protecting data routed through the system.
Abstract: The present invention provides a method and apparatus for a trusted service provider (TSP) which assists with the secure exchange of data across the public switched telephone network. Communications are routed via a TSP, which uses cryptographic techniques to conceal the identities (e.g., telephone numbers) of the call initiator and call recipient, thereby preventing traffic analysis attacks. The TSP also performs cryptographic handshakes with the call initiator and call recipient to authenticate callers. The TSP further provides cryptographic keying material which communicants may use to help protect communications and to directly authenticate and identify each other. Although the TSP is trusted to negotiate the connection and is involved in the process, the communicants can perform their own key agreement and authentication for protecting data routed via the TSP.
Type:
Grant
Filed:
May 4, 2010
Date of Patent:
November 15, 2011
Assignee:
Synectic Design, LLC
Inventors:
Michael J. Horgan, Tim Allen, Michael Gardiner, Terri McGill
Abstract: The present invention provides a method and apparatus for a trusted service provider (TSP) which assists with the secure exchange of data across the public switched telephone network. Communications are routed via a TSP, which uses cryptographic techniques to conceal the identities (e.g., telephone numbers) of the call initiator and call recipient, thereby preventing traffic analysis attacks. The TSP also performs cryptographic handshakes with the call initiator and call recipient to authenticate callers. The TSP further provides cryptographic keying material which communicants may use to help protect communications and to directly authenticate and identify each other. Although the TSP is trusted to negotiate the connection and is involved in the process, the communicants can perform their own key agreement and authentication for protecting data routed via the TSP.
Type:
Application
Filed:
May 4, 2010
Publication date:
October 28, 2010
Applicant:
SYNECTIC DESIGN LLC
Inventors:
Michael J. Horgan, Tim Allen, Michael Gardiner, Terri McGill
Abstract: The present invention provides a method and apparatus for a trusted service provider (TSP) which assists with the secure exchange of data across the public switched telephone network. Communications are routed via a TSP, which uses cryptographic techniques to conceal the identities (e.g., telephone numbers) of the call initiator and call recipient, thereby preventing traffic analysis attacks. The TSP also performs cryptographic handshakes with the call initiator and call recipient to authenticate callers. The TSP further provides cryptographic keying material which communicants may use to help protect communications and to directly authenticate and identify each other. Although the TSP is trusted to negotiate the connection and is involved in the process, the communicants can perform their own key agreement and authentication for protecting data routed via the TSP.
Type:
Grant
Filed:
August 8, 1997
Date of Patent:
June 22, 2010
Assignee:
Synectic Design LLC
Inventors:
Michael J. Horgan, Tim Allen, Michael Gardiner, Terri McGill