The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Sep. 01, 2020

Filed:

May. 31, 2016
Applicant:

Intel Corporation, Santa Clara, CA (US);

Inventors:

Brian J. Hernacki, Santa Clara, CA (US);

Sumanth Naropanth, Bangalore, IN;

Chandra Prakash Gopalaiah, Santa Clara, CA (US);

Assignee:

Intel Corporation, Santa Clara, CA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 9/32 (2006.01); H04W 12/02 (2009.01); H04L 9/08 (2006.01); H04L 29/06 (2006.01); H04L 9/14 (2006.01); H04W 12/04 (2009.01); H04W 12/06 (2009.01);
U.S. Cl.
CPC ...
H04L 9/3242 (2013.01); H04L 9/0822 (2013.01); H04L 9/14 (2013.01); H04L 63/0428 (2013.01); H04L 63/06 (2013.01); H04L 63/061 (2013.01); H04L 63/08 (2013.01); H04L 63/0876 (2013.01); H04W 12/02 (2013.01); H04W 12/04 (2013.01); H04W 12/06 (2013.01); H04L 2209/80 (2013.01);
Abstract

Various examples are directed to systems and methods for communications security. For example, a computing device may generate a connection between the computing device and a client device. A first application executing at the computing device may send a first application session key to the client device via the connection. The first application may perform a cryptographic operation on a first message based at least in part on the first application session key to generate a first cryptographic result and send the first cryptographic result to the client device via the connection. The first application may receive a second cryptographic result from the client device via the connection and determine that the second cryptographic result was obtained with the first application session key.


Find Patent Forward Citations

Loading…