ROLLOVER OF ENCRYPTION KEYS IN A PACKET-COMPATIBLE NETWORK

Number of patents in Portfolio can not be more than 2000

United States of America

APP PUB NO 20220029800A1
SERIAL NO

17380149

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

There is provided a technique of establishing encryption keys for communication between 1st peer and 2nd peer via a data path. The technique comprises: by each peer, using input keying material to independently generate equivalent pairs of peer encryption keys (PEKs), verifying equivalence of the generated PEK pairs, and using by 1st peer and 2nd peer the verified PEK pairs to become in possession of equivalent pairs of session encryption keys (SEKs). Verifying comprises: generating by 1st peer a first handshake (HS) message encrypted by PEK Tx1 and sending the first HS message to the 2nd peer via the data path; decrypting by the 2nd peer the first HS message using the PEK Rx2, generating a second HS message encrypted by PEK Tx2, and sending the second HS message to the 1st peer via the data path; and decrypting the second HS message by the 1st peer using PEK Rx1.

Loading the Abstract Image... loading....

First Claim

See full text

Family

Loading Family data... loading....

Patent Owner(s)

Patent OwnerAddress
ADVA NETWORK SECURITY GMBH12489 BERLIN

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
CHO, Joo Yeon Wolfratshausen, DE 9 11
SERGEEV, Andrew Kfar Sba, IL 20 120

Cited Art Landscape

Load Citation

Patent Citation Ranking

Forward Cite Landscape

Load Citation