The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Sep. 05, 2023

Filed:

Feb. 03, 2022
Applicant:

Avast Software S.r.o., Prague, CZ;

Inventors:

Christopher Joseph O'Connell, Tucson, AZ (US);

Barna Csukas, Miercurea Ciuc, RO;

Gabor Miklos, Miercurea Ciuc, RO;

Vitalii Sydorovych, Sidcup, GB;

Rui Santos, Gondomar, PT;

Michal Hojsík, Prague, CZ;

Assignee:

Avast Software s.r.o., Prague, CZ;

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 9/40 (2022.01); H04L 9/32 (2006.01); H04L 9/14 (2006.01); H04L 9/30 (2006.01); H04L 9/06 (2006.01);
U.S. Cl.
CPC ...
H04L 63/0457 (2013.01); H04L 9/065 (2013.01); H04L 9/14 (2013.01); H04L 9/3073 (2013.01); H04L 9/3242 (2013.01); H04L 63/0435 (2013.01); H04L 63/166 (2013.01);
Abstract

A system, computer-readable storage medium, and method for secure network communication. A first device employs a first secret to establish a stream between the first and a second device. A third key, first ciphertext based on a first key, and hash of the first key are received from the second device by the first. A second key is applied to recover a second secret from the first ciphertext. The third key is encrypted to generate a second ciphertext including a third secret. Fourth and fifth keys are derived based on the first, second, and third secrets. A message authentication code is generated based on the fourth and third keys, first ciphertext, hash of the first key, and second ciphertext. The second ciphertext and message authentication code are transmitted by the first to the second device, and the fifth key is employed by the first device to modify the stream.


Find Patent Forward Citations

Loading…