The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jun. 25, 2024

Filed:

Jul. 08, 2022
Applicant:

Visa International Service Association, San Francisco, CA (US);

Inventors:

Eric Le Saint, Los Altos, CA (US);

Upendra Mardikar, San Jose, CA (US);

Dominique Fedronic, Belmont, CA (US);

Assignee:

Visa International Service Association, San Francisco, CA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06Q 20/38 (2012.01); G06Q 20/32 (2012.01); H04L 9/08 (2006.01); H04L 9/32 (2006.01); H04L 9/40 (2022.01);
U.S. Cl.
CPC ...
H04L 63/0442 (2013.01); G06Q 20/3227 (2013.01); G06Q 20/3829 (2013.01); H04L 9/0841 (2013.01); H04L 9/3228 (2013.01); H04L 63/0428 (2013.01); H04L 63/068 (2013.01); H04L 63/0823 (2013.01); H04L 2209/04 (2013.01); H04L 2463/061 (2013.01);
Abstract

Embodiments of the invention relate to efficient methods for authenticated communication. In one embodiment, a first computing device can generate a key pair comprising a public key and a private key. The first computing device can generate a first shared secret using the private key and a static second device public key. The first computing device can encrypt request data using the first shared secret to obtain encrypted request data. The first computing device can send a request message including the encrypted request data and the public key to a server computer. Upon receiving a response message from the server computer, the first computing device can determine a second shared secret using the private key and the blinded static second device public key. The first computing device can then decrypt the encrypted response data from the response message to obtain response data.


Find Patent Forward Citations

Loading…