US20230208822A1 - Method and system for secure communications - Google Patents

Method and system for secure communications Download PDF

Info

Publication number
US20230208822A1
US20230208822A1 US18/117,702 US202318117702A US2023208822A1 US 20230208822 A1 US20230208822 A1 US 20230208822A1 US 202318117702 A US202318117702 A US 202318117702A US 2023208822 A1 US2023208822 A1 US 2023208822A1
Authority
US
United States
Prior art keywords
client device
secure communication
peer
client
secure
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
US18/117,702
Inventor
Dennis Vance Pollutro
Viji Bettadapura
Charles Illingworth
Saroop Mathur
John Zavgren
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sdse Networks Inc
Original Assignee
Sdse Networks Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sdse Networks Inc filed Critical Sdse Networks Inc
Priority to US18/117,702 priority Critical patent/US20230208822A1/en
Assigned to SDSE NETWORKS, INC. reassignment SDSE NETWORKS, INC. CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: SDSE Networks LLC
Assigned to SDSE Networks LLC reassignment SDSE Networks LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ILLINGWORTH, Charles, MATHUR, SAROOP, POLLUTRO, DENNIS VANCE, ZAVGREN, John, BETTADAPURA, Viji
Publication of US20230208822A1 publication Critical patent/US20230208822A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0263Rule management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/067Network architectures or network communication protocols for network security for supporting key management in a packet data network using one-time keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]

Definitions

  • the present disclosure is directed toward secure communications and, in particular, toward a cloud-based management service platform that enables rapid stand-up and tear-down of doubly encrypted enclaves between two enabled endpoints (also referred to as client devices).
  • Internet communications have a vital impact on today's society, allowing individuals to have a wider range of communication and interactions. These range from sharing thoughts and experiences, to doing business online, completing financial transactions online, conducting Internet banking online, and sharing confidential and proprietary information and data online. With the proliferation of Internet communications and computer networks, there have arisen a growing number of unscrupulous individuals seeking to access such confidential information and data communications over computer networks. As such, security is a pressing concern to prevent the theft of confidential/personal information and data.
  • Secure communication is desired when two entities are communicating with one another and they do not want a third party to listen in or view data transmissions.
  • Secure communications include means by which information and data can be shared with varying degrees of certainty that third parties cannot intercept what was transmitted.
  • VPN Virtual Private Networks
  • VPN concentrators binary/static key messaging systems
  • the disclosed system and method is directed toward overcoming one or more of the above-mentioned problems, though not necessarily limited to embodiments that do.
  • the disclosed system and method is a result of the need to solve a gap in current technical capabilities, that gap being the desire to have systems that “automatically” connects endpoints (e.g., computers, phones, Internet of Things (IOT) devices, servers, cloud hosted services, cloud containers, etc.) using standard encryption (e.g., Advanced Encryption Standard (AES), SHAW BlueCurve Network Security, etc.) at the time of a communication or transaction (e.g., an Automatic Teller Machine (ATM) request and response for funds, a sensitive message between users, an online purchase, data exchanging between IOT devices, etc.) and be accomplished on any network of opportunity (any Internet Protocol (IP) network, e.g., a public Wireless Fidelity (WiFi) network, a private network, or any combination of public or private networks wired, wireless, or even satellite) all without heavy traditional and manual processes and equipment like a Virtual Private Network (VPN), VPN concentrators, and binary/static key messaging systems.
  • IP Internet Protocol
  • AKA setup
  • teardown teardown procedures
  • a first client device e.g., smartphone
  • a second client device e.g., bank server, ATM, etc.
  • a standup and teardown procedure that establishes and severs communication links, respectively.
  • the disclosed system/method allows for rapid standup and teardown of doubly encrypted enclaves between client devices (or endpoints) that can work on any network.
  • the disclosed system and method delivers the same result as if all devices that wanted to communicate for a particular transaction were physically plugged together with a network cable for only the time of the communication and only for the particular “application” that needs to communicate.
  • each device has a private/personal VPN inside the device, with policy (all VPNs have policy) for such communication, and each endpoint has a unique one-time “encryption key” only known by that endpoint that is used for “one” communication or transaction.
  • the system and method disclosed herein deliver this capability with less overhead, no physical hardware or network components, and with less manual labor, all built with pure software.
  • the system leverages the concept of a “software definable virtual network adaptor” referred to and documentation as an agent or client.
  • the disclosed system and method provides for “any IP based application” to pass traffic natively.
  • the disclosed system and method leverages an ephemeral keying method/methods that, when triggered, generate one-time use keys that are then associated with the unique connection and/or session. Note, these one-time use keys change with each and every connection and/or session. Instead of being ephemerally generated one time like many other solutions, each key is destroyed and a new one is created every time a connection and/or session occurs—i.e., a new key is generated/destroyed with every standup/teardown.
  • the system includes a “platform” made up of an auto-scaling, self-healing, microservices that operate via a fully distributed architecture.
  • the platform can live on a cloud, in a data center, on a virtual machine, or any combination thereof.
  • the platform can also be used between microservices, as discussed later in this disclosure.
  • the platform can be configured so that it is only used to “coordinate” all the information necessary to “set up” these one-time, ephemeral keyed, cryptographic private networks and then steps out of the data path.
  • the platform is also the “coordinator” for all endpoint policy.
  • the platform is made up of a host of API plugins that can interact with “traditional backend systems” to reuse or pull common information to set policy about each endpoint.
  • the platform in many ways is the traffic cop.
  • One key element to keep in mind is the speed at which these transactions need to occur and how many “one-time keys” need to be generated, yet still be more efficient that traditional network gear.
  • an endpoint, server or service can also provide for “intra container” communication, thus providing, mutually keyed, point to point (container to container), encrypted connections based on a software defined virtual adapters that used ephemeral one-time use keys.
  • a “side car” common method for software add-ons in cloud computing
  • the cloud host provider as a service that can be consumed by anyone hosting applications on the cloud provider's network.
  • the ease of implementation make it such that only a reference to, and a definition change (e.g., only a few lines of code) within its Kubernetes orchestration, is necessary for the entire cloud application to use the transactional two way ephemeral keyed encryption between its containers.
  • Unlike conventional “micro-segmentation products” that require tremendous rewire as well as management of an entire micro segmentation system, this capability becomes native to the cloud host fabric and is inherited by any who use it.
  • a method for secure communication between client devices. The method includes receiving a request, at a secure communication platform, from a from a first client device to communicate with a second client device; determining, by the secure communication platform, whether the first client device is permitted to communicate with the second client device; if communication is permitted: generating, by the individual client devices, a one-time use ephemeral key; transmitting, by the secure communication platform, the generated one-time use ephemeral keys to the first and second client devices; establishing, by the secure communication platform, a secure communication session directly between the first and second client devices, wherein communications between the first and second client devices are encrypted and decrypted using the connection specific one-time use ephemeral keys of each device; and destroying, by the endpoint device, the one-time use ephemeral key upon termination of the secure communication session between the first and second client devices.
  • the method further includes generating, by the client devices, a new one-time use ephemeral key pair for each subsequent secure communication session between the first and second client devices.
  • the subsequent ephemeral public keys of each connection-specific pair will be transmitted and authenticated via the secure communication platform.
  • the one-time use ephemeral key includes a public-private key pair.
  • the method further includes: receiving, by the secure communication platform, control session information from the first and second client devices; and determining, by the secure communication platform, termination of the secure communication session using the received control session information.
  • the method further includes denying, by the secure communication platform, the request by the first client device if it is determined that communication is not permitted.
  • a system for secure communication between client devices.
  • the system includes a secure communication platform including a processing server configured to: receive a request from a from a first client device to communicate with a second client device; determine whether the first client device is permitted to communicate with the second client device; if communication is permitted: generate a one-time use ephemeral key; transmit the generated one-time use ephemeral key to the first and second client devices; establish a secure communication session directly between the first and second client devices, wherein communications between the first and second client devices are encrypted and decrypted using the one-time use ephemeral key; and destroy the one-time use ephemeral key upon termination of the secure communication session between the first and second client devices.
  • the processing server is further configured to direct the client devices to generate a new one-time use ephemeral key for each subsequent secure communication session between the first and second client devices.
  • the one-time use ephemeral key comprises a public-private key pair.
  • the processing server is further configured to: receive control session information from the first and second client devices; and determine termination of the secure communication session using the received control session information.
  • the processing server is further configured to deny the request by the first client device if it is determined that communication is not permitted.
  • FIG. 1 is a swim lane flow diagram illustrating interaction between the first and second clients and the secure communication platform for establishing a secure communication session.
  • FIG. 2 shows an exemplary secure communication platform architecture.
  • FIG. 3 shows a block diagram of an embodiment of the secure communication platform with microservices residing in an Original Equipment Manufacturer cloud or data center infrastructure.
  • FIG. 4 shows another exemplary secure communication platform architecture.
  • FIG. 5 shows another exemplary secure communication platform architecture.
  • FIG. 6 shows an exemplary Single Packet Authorization architecture that may be used with the system.
  • FIG. 7 depicts a high-level view of an exemplary system common library.
  • FIG. 8 is an illustration of exemplary hardware architecture for an embodiment of a communication device.
  • the secure communication platform 200 includes an elastic cloud-based eco-system of highly available geographically distributed services that work together to provision, enable, and set-up secure communication paths (also called enclaves) between any pair of enabled endpoints (client devices) anywhere on the Internet.
  • a first client device 202 transmits a request to the secure communication platform 200 to communicate with a second client device 202 (at 100 ).
  • the secure communication platform (SCP) 200 receives the request and determines whether the first client device 202 is authorized or permitted to communicate with the second client device 202 (at 110 ). If communication is not permitted, the secure communication platform 200 sends a notice back to the first client device 202 that the request was denied (at 120 ). If communication is permitted, the secure communication platform 200 directs the endpoints to generate one-time use ephemeral keys (at 140 ) and transmits the generated and authenticated one-time use ephemeral keys to the first and second client devices 202 (at 150 ).
  • the secure communication platform 200 delivers connection parameters for the establishment of a secure communication session between the first and second client devices 202 (at 160 ). After establishment of direct communication, the secure communication platform 200 is removed from the secure communication session, such that the secure communication session is directly between the first and second client devices 202 (at 170 ). Communications between the first and second client devices 202 are encrypted and decrypted using the one-time use ephemeral key.
  • the first and second client devices 202 transmit control session information to the secure communication platform 200 (at 180 ).
  • the secure communication platform 200 determines when a termination of the secure communication session occurs using the received control session information (at 190 ). Once it is determined that the secure communication is terminated, the one-time use ephemeral key is invalidated by the secure communication platform 200 and all traffic between the first and second client devices 202 ceases (at 195 ).
  • the one-time use ephemeral key is destroyed, it is not used again.
  • a new one-time use ephemeral key is generated for each subsequent secure communication session between the first and second client devices 202 .
  • the one-time use ephemeral key may include a public-private key pair.
  • Enabled endpoints can initiate secure communications on-demand, with the resulting encrypted communication routing directly between the two communicating endpoints with no broker or other infrastructure inserted between the client devices 202 .
  • a communication functions as though the two endpoints are directly connected via a virtual Network connection.
  • Endpoint authentication and enclave communication require mutual digital certificate verification.
  • an ephemeral certificate is issued for the communication that is valid only for the duration of the communication.
  • Policy (a set of protocols defining guidelines for access) is defined for each endpoint, which determines which communication is permitted between an endpoint(s) and another endpoint, service, or device. Policy also determines connection information that is specific to enclave creation with the endpoint(s).
  • the management infrastructure (e.g., the secure communication platform 200 ) is responsible for validating endpoints/endpoint policies, applying group and device policy, and initiating enclave creation.
  • the management infrastructure can be deployed as a Virtual Private Cloud (VPC) 208 .
  • the VPC 208 can include a container-based microservices 204 architecture, enabling on-demand elastic scalability and API-enabled management. Intra-service communications between Docker containers require mutual certificate exchange and are encrypted.
  • Ephemeral certificates are short lived certificates that are used by applications for the purpose of proving their identity across a network and to reduce the window of vulnerability of their private keys.
  • Each client device 202 is automated to request a new certificate for each new session (control session with the secure communication platform 200 , or secure enclave connection with a peer client device 202 ).
  • the secure communication platform 200 after the required validation, generates a new certificate for the next session with the client device 202 .
  • CTL Certificate Revocation Lists
  • the secure communication platform 200 When a client device 202 requests the secure communication platform 200 to create a new enclave session with a peer client device 202 , the secure communication platform 200 provides information about the peer client device 202 (including connectivity details) that the client device 202 can use to create a secure enclave session with the peer client device 202 . It should be noted that the secure communication platform 200 does this even if the client device 202 and/or peer client device 202 is/are behind Network Address Translation (NAT) firewall(s). Each client device 202 maintains a control session with the secure communication platform 200 .
  • NAT Network Address Translation
  • the system manages communications of each client device 202 by using Client Groups definitions and Policies definitions via management API. These Client Groups and Policies can be defined globally, as well as per group or individual client device 202 . These are used by the system to determine if a client device 202 can communicate with a peer client device 202 . These are also used to determine which traffic between client devices 202 should be encrypted. For instance, the type of application and/or the final destination of traffic can be used to determine if the traffic should be encrypted.
  • SPA Single Packet Authorization
  • SPA 412 is a unique security technique that makes a system's cloud service invisible except to authorized client devices 202 .
  • SPA 412 is an optional feature that can be used with the system—e.g., SPA 412 can be an optional security layer.
  • SPA 412 verifies the authenticity of client devices 202 before they may connect to their unique cloud service.
  • SPA 412 can simultaneously and silently deny access to unauthorized client devices 202 via a dynamic firewall. After a client device 202 is authorized by SPA 412 , the dynamic firewall allows connections from the authenticated client device 202 so that the protected end-points can connect to an Original Equipment Manufacturer (OEM) services and infrastructure.
  • OEM Original Equipment Manufacturer
  • the dynamic firewall makes a cloud service invisible and unresponsive to port scanners. It should be noted that because SPA 412 messages can be processed faster than they can be generated and transported by client devices 202 and adversaries alike, these invisible secure communication platform 200 entry points are invulnerable to all Distributed Denial of Service (DDoS) attacks.
  • DDoS Distributed Denial of Service
  • the system can be integrated into an OEM partner's infrastructure by means of API's that hook into the secure communication platform 200 and client device 202 software.
  • the system provides a management API to be used by OEM partners to provision the secure communication platform 200 , users/groups, and policies across multiple domains. These APIs can also be used to integrate provisioning of the system into a partner's administration/web management console. In addition, the APIs can allow for customizing specific components.
  • an embodiment of the secure communication platform 200 includes microservices 204 (an architecture that arranges an application as a collection of loosely coupled services) that reside in the cloud (public, private or on premises). It can be deployed inside an OEM partner's cloud or data center infrastructure.
  • the secure communication platform 200 can include the following features:
  • system functionality is implemented as stateless (does not save client device 202 data generated in one session for use in the next session with that client device 202 ) microservices 204 running in Docker-based containers.
  • the microservices 204 are not publicly accessible, and communicate with each other over end-to-end secure links, using certificates to authenticate and exchange messages. All microservices 204 work together by communicating with each other using a message-queue service (e.g., Amazon Web Service Simple Queue Service (AWS SQS)).
  • AWS SQS Amazon Web Service Simple Queue Service
  • Messages between microservices 204 are mutually authenticated and encrypted using system generated certificates uniquely identifying each microservice 204 . This provides end-to-end security between the microservices 204 and does not rely on the cloud-provider-managed keys.
  • a Certificate Management Service (CMS) 408 can be used for generating and managing certificates for the client devices 202 and platform microservices 204 .
  • the CMS 408 can use the security barrier services of Vault 404 to sign and generate certificates for authorized client devices 202 and microservices 204 .
  • the CMS 408 can be configured to use a self-signed Certificate Authority (CA) by default but can also be configured via API to use a third-party Certificate Authority by its OEM partner. Separate intermediate CA's can be used to sign certificates for the clients and microservices 204 .
  • CA self-signed Certificate Authority
  • an Introduction Service (IS) 410 can be used to manage all communications with the client devices 202 for registration, login/logout, enclave requests, and periodic status updates.
  • the Secure Communications Platform ( 200 ) validates a client device 202 before allowing it to establish a secure session with the secure communication platform 200 , for client device 202 registration or client device 202 login.
  • the IS 410 can achieve this by communicating with a User Management Service (UMS).
  • UMS User Management Service
  • the UMS manages users and groups.
  • the IS 410 is responsible for registration of authorized client devices 202 when details unique to the client device 202 , such as a password and device-specific information, is captured and stored in the user-database 400 of the secure communication platform 200 . Subsequent requests to login are validated against these stored values for device-specific details.
  • the IS 410 acts as an intermediary to obtain client device 202 policies and group members, as well as update client device 202 registration details in the secure communication platform's 200 datastore.
  • the IS 410 is also responsible to act as the intermediary when a client device 202 initiates a request for an enclave with a peer client device 202 .
  • the IS 410 checks if the client device 202 is permitted to communicate with the requested peer client device 202 , and, if allowed, provides each end of the connection with credentials and connectivity details that allow them to set up a secure enclave, even if one or both of the client devices 202 are behind NAT firewalls and are not publicly reachable.
  • the IS 410 also handles periodic status updates from client devices 202 about their enclave activity status as long as the client devices 202 stay logged in.
  • a UMS 420 can be used for managing clients and groups.
  • the primary responsibility of UMS 420 can be to handle requests from the IS 410 if a client device 202 is valid or to retrieve group members of a client device 202 to determine if a client device 202 is allowed to communicate with its requested peer client device 202 . It also updates user-info in the database 400 on behalf of the IS 410 .
  • TheUMS 420 uses Structured Query Language (SQL) queries to read/write client information from/to the database 400 .
  • SQL Structured Query Language
  • the secure communication platform 200 allows definition of policies that are one of three types:
  • Each of these policies are relevant to one or more microservices 204 , depending on their function.
  • a Policy Management Service (SPM) 414 can be used for computing and retrieving policies that are applicable to a client device 202 or to a service based on its group membership and configured policy overrides, if any. It also provides policies that apply to each microservice 204 upon startup and whenever the policies are updated by a management administrator.
  • SPM Policy Management Service
  • each client device 202 connects to the secure communication platform 200 using a control session and with each of its peer client devices 202 using an enclave session.
  • a Session/Enclave Management Service (SESM) 416 can be used for managing and monitoring all control and enclave sessions that are active at any given time.
  • the SESM 416 can be configured to generate a unique session id when a new control or enclave session is created by the IS for a client device 202 . It can also be configured to remove sessions that are inactive or torn down as reported by the IS 410 .
  • a Web Console Service (WCS) 418 can be used for providing Representational State Transfer (REST) API to provision/configure the secure communication platform 200 with client users/groups/policies once it has been deployed.
  • the WCS 418 allows Role-Based Access Control (RBAC) to administer the secure communication platform 200 and policies.
  • RBAC Role-Based Access Control
  • the WCS 418 can be configured to validate data passed through management APIs and store it in a Postgres database.
  • the microservices 204 that run as Docker containers are auto-scaled and load-balanced using Kubernetes (e.g., AWS Elastic Kubernetes Service (EKS)) in one or more VPC 208 , based on the number of client devices 202 registered and the number of active enclave sessions at any given time.
  • Kubernetes e.g., AWS Elastic Kubernetes Service (EKS)
  • All microservices 204 log their activity both at system and application (client/session activity) level.
  • the centralized logging service is responsible for collating logs from all services and storing them for later log-viewing and alerting.
  • logs can include:
  • Each microservice 204 is required to report its health at regular intervals to the Kubernetes engine that ensures high-availability in a load-balanced manner.
  • the secure communication platform 200 can include an API gateway that allows an OEM partner to make API calls into the secure communication platform 200 .
  • the API calls are routed through the respective microservices 204 to facilitate any needed changes (ex: adapter to route SQL queries to the partner's database).
  • the cloud service integrates into the OEM Partner's infrastructure by providing APIs to:
  • the OEM partner's solution includes client software that already runs on each end -point device, it is possible to incorporate functionality into the partner's client (assuming there are no physical constraints) by making calls to the client-provided API.
  • the client device 202 registration can be executed as part of the partner's client's registration process.
  • Agent devices 402 will provide APIs to:
  • Each deployed secure communication platform 200 can be configured to optionally connect into a centrally managed NOC 206 . This can be achieved via a unique Customer ID.
  • the secure communication platform 200 can then report telemetry data and continual health status to the NOC 206 .
  • the NOC 206 uses this data to monitor all deployments to ensure that any health parameters stay within thresholds and aberrations are alerted to administrators by email/messages and handled pro-actively.
  • the secure communication platform's 200 core microservices 204 may be not publicly reachable and to reside within VPC's 208 in one or more regions.
  • the secure communication platform 200 is accessible using one or more public IP addresses/ports using REST API or over IPsec sessions from the clients.
  • An agent device 402 communicates with the management service over IPsec.
  • the management service authenticates communicating end-points, and establishes the peer-to-peer encrypted communication, removing the management service from the client device 202 to client device 202 (or peer-to-peer (P2P)) communication path.
  • the control session monitors session activity to monitor when the secure communication completes.
  • the enabled applications on peer client devices 202 use the encrypted enclave, via IPsec, to communicate with each other.
  • the following exemplary steps can be implemented to facilitate a client device 202 communicating a peer client device 202 via the system:
  • Short certificate lifetimes reduce the time window of vulnerability for a client device 202 and/or the session communication through compromise of the certificate. For instance, short certificate lifetimes provide “Perfect Forward Authentication” in the sense that a compromised client device 202 cannot join the agent device 402 because its private key may be used only once for authentication.
  • the SPA 412 (if used) will ensure that the secure communication platform 200 accepts requests only from client devices 202 that have a valid SPA 412 key provisioned by the secure communication platform 200 .
  • These SPA 412 keys are assigned ephemerally for every new session with the management service, thereby eliminating the key being used by an unauthorized end-point device.
  • the following benefits can be realized with the use of SPA 412 :
  • a single secure communication platform 200 can support multiple tenants. But the clusters of microservices 204 , datastore, certificate issuing authority, and domain names are separately maintained so that there is no overlap of control data nor enclave session traffic between any two tenants.
  • the secure communication platform 200 can be deployed using Kubernetes/Terraform. Kubernetes orchestration of all microservices 204 may be provisioned by Terraform.
  • the secure communication platform 200 deployment is optimized for the needs of each OEM partner.
  • the important factors that are to be considered and fed into the deployment engine are:
  • a client device 202 When a client device 202 is added to the system (e.g., via management API), some of the policies applicable to a client device 202 can be discovered during client installation:
  • the client devices 202 can run on Windows, Linux, or Android-based end-points. Client devices 202 can be user-managed (human interfacing with a machine) or unmanaged (ex: a server/service or IoT device).
  • a client device 202 is added to a secure communication platform 200 through the management API. When a client device 202 is added to the secure communication platform 200 , a unique set of credentials are provided for installation on the client device 202 , along with the client software. The credentials allow the secure communication platform 200 to identify the client device 202 when it first registers. The credentials are unique to the client device 202 and cannot be re-used on any other end-point, making it impossible for an end-point to be spoofed.
  • the client device 202 creates a virtual network adapter, and the client software encrypts all traffic routed through the virtual network adapter while all traffic coming in through the adapter is decrypted by the client software.
  • the client device 202 registers with the management service (via the secure communication platform 200 ) the very first time with its one-time registration credentials and using the Uniform Resource Locator/Internet Protocol (URL/IP) address provided as part of its registration package. As part of registration, the client device 202 receives a new set of credentials that it uses to log in/sign in to the system. Once signed in, the client device 202 has a control session with the management service. It is free to accept enclaves from peer client devices 202 in its roster or initiate connections to any of the peer client devices 202 on its roster. The client device 202 uses the control session to request the management service to set up a new enclave and receives notifications about an enclave request from a peer client device 202 on the control session. The control session is kept alive by periodic status updates.
  • URL/IP Uniform Resource Locator/Internet Protocol
  • the secure communication platform 200 checks if it is allowed, and, if so, provides the routable IP address of each peer client device 202 to the other and new certificates to each end-points.
  • the client devices 202 use these new certificates to establish a new IPsec session between themselves. Since the private keys corresponding to the new certificates are known only to the client devices 202 , all traffic between them is visible to only the two peer client devices 202 and none other.
  • Client devices 202 are deployed by installing a client application along with a unique client package that holds credentials and other installation related details unique to each client device 202 .
  • the client-package is generated by means of invoking a management API after adding a client to the management service.
  • the actual deployments can be done in several ways, including but not limited to:
  • the client devices 202 are registered with their management service as part of installation. Thereafter, depending on the type of client device 202 , the client device 202 may stay logged in and auto-accept connection requests from peer client devices 202 , auto-connect to peer client devices 202 in its group, or connect to peer client devices 202 and accept connection requests manually as needed.
  • a client device 202 When a client device 202 needs to be removed from the system, an administrator marks it as disabled for the system. Then that client device's 202 current certificates are marked as disabled. This action prevents the agent device 402 from establishing any new IPSec sessions to communicate with the backend. Any existing connections are terminated and all enclave sessions with peer client devices 202 are terminated by forcing them to terminate their respective enclave-sessions.
  • the following is an exemplary agent device 402 lifecycle process.
  • a client package is generated that contains cryptographic material and other information that will allow the client to register. This package is protected with a secret user-specific passphrase.
  • the agent software installed on each client allows connecting to multiple network domains to be operated on the same device by creating separate profiles for each domain. Each domain can use a pool of private network IP addresses that are assigned to each registered agent device 402 .
  • the installation package includes:
  • the management service stores a copy of the client device's 202 SPA 412 registration public key, a one-time-use public key, and a certificate serial number in the user database 400 for the next login session's validation.
  • the SPA 412 searches its cached SPA 412 public keys to identify the one that validates its signature and then installs a firewall rule for the registration. If the SPA 412 operation fails to open the firewall for this client device 202 , it pauses and retries until the SPA 412 is successful.
  • the client device 202 can be identified by the source IP address in the SPA 412 message packet.
  • the agent device 402 performs the following:
  • the management service performs the following:
  • the agent device 402 receives the ephemeral certificate, the SPA 412 port number, and the backend IP addresses for its next login. The agent device 402 is now fully registered. The cloud service revokes the one-time-use certificate and closes the IPSec connection.
  • the agent device 402 creates and transmits the SPA 412 message to open the firewall if SPA 412 is enabled. It uses its ephemeral login certificate to create an IPSec connection to the cloud service. After the IPSec connection is available, the agent device 402 logs in using the client device's 202 password and sends:
  • the management service :
  • the agent device 402 receives:
  • the agent device 402 is now logged in with the management service, and available to initiate or receive enclaves.
  • the agent device 402 generates an enclave request in one of three ways:
  • the client device 202 enclave is established with an exchange between the client device 202 and the management service, which involves the following:
  • the peer-to-peer enclave is set up by the following:
  • Termination of an enclave on the agent involves disconnection of the IPsec session and removal of certificate used for the enclave. Termination on the backend involves updating the enclave status to disconnected and continuing to log out.
  • the backend marks the client device 202 as unavailable for connections and closes the firewall rule allowing traffic from the client device 202 .
  • the cloud service can generate its own keys or can be configured to use the OEM partner's Key Management System.
  • Generation of certificates for the agent devices 402 can use the OEM customer's CA as root, if provided, and a certificate chain that includes the CA as intermediate CA. If not, the system provides its own root CA. All keys generated by the agent devices 402 can optionally leverage random-number-generator functions, if available on the client device 202 . All signing operations inside the agent devices 402 can also optionally leverage Trust Platform Module (TPM) functionality on the client device 202 . All keys on the cloud service are generated by using a secure random number generator.
  • the agent device 402 is uniquely identified by its username.
  • the CSR and certificate subject field embed the user name:platform in their common name, e.g., user name:::device (ex: Mary::windows10).
  • IPsec stack used in the agent device 402 supports:
  • FIG. 7 depicts a high-level view of the system common library.
  • the system common library provides software modules that are used by all other microservices 204 .
  • the common library includes m(REF BACK TO 700 ) messaging (e.g., Simple Queue Service (SQS)), certificate management, cryptographic functions, other miscellaneous functions, etc.
  • the common library can be written in Go language.
  • a “C” language wrapper can be provided so applications written in other languages including C/C++, Java and Python can directly use the library.
  • the Microservice Messaging Library provides APIs to send and receive messages over AWS's SQS.
  • the MML 700 transparently implements security of messages and handles message encryption and decryption within the library so the application does not need to know anything about how to encrypt and decrypt messages, or even what certificate is being used.
  • the MML 700 implements a Request/Response paradigm over the microservice messages.
  • the Microservice Message Bus is secured via credentials that are injected into the individual containers.
  • the Crypto provides encryption/decryption of JavaScript Object Notation (JSON) messages using the standard Json Web Encryption (JWE). It also provides APIs to sign and verify JSON messages using JSON Web Signatures (JWS). JWE provides a standards-based method to encode JSON messages.
  • the messages are encrypted using the public key of the recipient.
  • an AES algorithm can be used with a 256-bit key in Galois Counter Mode (GCM). This mode provides combined encryption and message integrity.
  • GCM Galois Counter Mode
  • a RSA Optimal Asymmetric Encryption Padding (RSA-OAEP) mode can be used to encrypt the AES encryption key.
  • RSA For JWS Signatures, RSA is used.
  • the crypto 702 has support for additional features used with signatures such as timestamps, replay detection, and proof of work. These are handled within the crypto library so the applications do not need to implement these.
  • the window for valid timestamp is configurable (e.g., the default can be 5 minutes).
  • the amount of work needed for proof of work is also configurable, and, by default, it can be disabled (set to 0).
  • the crypto library identifies and retrieve the public key used for encryption of message, and if the key is not available, it requests the key from CMS 408 .
  • the CMS microservice retrieves the key from Vault 404 . It also identifies and retrieves the private key used for decryption of message.
  • the Certificate Management 408 implements automated certificate management. Certificates are automatically retrieved from the Vault database 406 , as needed. When a microservice 204 needs to send a message to another microservice 204 , it needs to encrypt the message. Encryption requires the certificate of the recipient of the message. This certificate is obtained from Vault 404 by sending a request to CMS 408 . The following sequence of operations are performed by the common library during initialization when the service is launched.
  • FIG. 8 illustrates a representative computer system 800 in which embodiments of the distributed architecture of the present disclosure, or portions thereof, may be implemented as computer-readable code.
  • the client devices, communication devices, servers, routers, services, and endpoints disclosed herein may be implemented in whole or in part by a computer system 800 using hardware, software, firmware, non-transitory computer readable media having instructions stored thereon, or a combination thereof and may be implemented in one or more computer systems or other processing systems.
  • Hardware, software executed in a processor, or any combination thereof may embody modules and components used to implement the methods and steps of the present disclosure.
  • the distributed architecture of the present disclosure can live on a cloud, in a data center, on a virtual machine, or any combination thereof, and even can be used between micro services as discussed later in this disclosure.
  • cloud computing has become more predominant. Cloud computing may be used as an alternative to having local servers or personal devices handling users' applications. In general, cloud computing may indicate that function or storage comes from “the cloud”.
  • the cloud is often understood to mean a public network, possibly based on TCP/IP networks, specifically often assumed to be the Internet, so that function within the environment does not come from a specific identifiable device.
  • cloud computing may include a network of “cloud servers” interconnected as if in a grid running in parallel, sometimes using techniques of virtualization, to maximize computing power per computer and/or server.
  • cloud computing may represent a subset of grid computing that may include utility computing and other approaches to the use of shared computing resource.
  • programmable logic may execute on a commercially available processing platform configured by executable software code to become a specific purpose computer or a special purpose device (e.g., programmable logic array, application-specific integrated circuit, etc.).
  • a person having ordinary skill in the art may appreciate that embodiments of the disclosed subject matter can be practiced with various computer system configurations, including multi-core multiprocessor systems, minicomputers, mainframe computers, computers linked or clustered with distributed functions, as well as pervasive or miniature computers that may be embedded into virtually any device.
  • at least one processor device and a memory may be used to implement the above-described embodiments.
  • a processor unit or device as discussed herein may be a single processor, a plurality of processors, or combinations thereof. Processor devices may have one or more processor “cores.”
  • the terms “computer program medium,” “non-transitory computer readable medium,” and “computer usable medium” as discussed herein are used to generally refer to tangible media such as a removable storage unit 818 , a removable storage unit 822 , and a hard disk installed in hard disk drive 812 .
  • Processor device 804 may be a special purpose or a general purpose processor device specifically configured to perform the functions discussed herein.
  • the processor device 804 may be connected to a communications infrastructure 806 , such as a bus, message queue, network, multi-core message-passing scheme, etc.
  • the network may be any network suitable for performing the functions as disclosed herein and may include a local area network (“LAN”), a wide area network (“WAN”), a wireless network (e.g., “Wi-Fi”), a mobile communication network, a satellite network, the Internet, fiber optic, coaxial cable, infrared, radio frequency (“RF”), or any combination thereof.
  • LAN local area network
  • WAN wide area network
  • WiFi wireless network
  • RF radio frequency
  • the computer system 800 may also include a main memory 808 (e.g., random access memory, read-only memory, etc.), and may also include a secondary memory 810 .
  • the secondary memory 810 may include the hard disk drive 812 and a removable storage drive 814 , such as a floppy disk drive, a magnetic tape drive, an optical disk drive, a flash memory, etc.
  • the removable storage drive 814 may read from and/or write to the removable storage unit 818 in a well-known manner.
  • the removable storage unit 818 may include a removable storage media that may be read by and written to by the removable storage drive 814 .
  • the removable storage drive 814 is a floppy disk drive or universal serial bus port
  • the removable storage unit 818 may be a floppy disk or portable flash drive, respectively.
  • the removable storage unit 818 may be non-transitory computer readable recording media.
  • the secondary memory 810 may include alternative means for allowing computer programs or other instructions to be loaded into the computer system 800 , for example, the removable storage unit 822 and an interface 820 .
  • Examples of such means may include a program cartridge and cartridge interface (e.g., as found in video game systems), a removable memory chip (e.g., EEPROM, PROM, etc.) and associated socket, and other removable storage units 822 and interfaces 820 as will be apparent to persons having skill in the relevant art.
  • Data stored in the computer system 800 may be stored on any type of suitable computer readable media, such as optical storage (e.g., a compact disc, digital versatile disc, Blu-ray disc, etc.) or magnetic tape storage (e.g., a hard disk drive).
  • the data may be configured in any type of suitable database configuration, such as a relational database, a SQL database, a distributed database, an object database, etc. Suitable configurations and storage types will be apparent to persons having skill in the relevant art.
  • the computer system 800 may also include a communications interface 824 .
  • the communications interface 824 may be configured to allow software and data to be transferred between the computer system 800 and external devices.
  • Exemplary communications interfaces 824 may include a modem, a network interface (e.g., an Ethernet card), a communications port, a Personal Computer Memory Card International Association (PCMCIA) slot and card, etc.
  • Software and data transferred via the communications interface 824 may be in the form of signals, which may be electronic, electromagnetic, optical, or other signals as will be apparent to persons having skill in the relevant art.
  • the signals may travel via a communications path 826 , which may be configured to carry the signals and may be implemented using wire, cable, fiber optics, a phone line, a cellular phone link, a radio frequency link, etc.
  • the computer system 800 may further include a display interface 802 .
  • the display interface 802 may be configured to allow data to be transferred between the computer system 800 and external display 830 .
  • Exemplary display interfaces 802 may include high-definition multimedia interface (HDMI), digital visual interface (DVI), video graphics array (VGA), etc.
  • the display 830 may be any suitable type of display for displaying data transmitted via the display interface 802 of the computer system 800 , including a cathode ray tube (CRT) display, liquid crystal display (LCD), light-emitting diode (LED) display, capacitive touch display, thin-film transistor (TFT) display, etc.
  • CTR cathode ray tube
  • LCD liquid crystal display
  • LED light-emitting diode
  • TFT thin-film transistor
  • Computer program medium and computer usable medium may refer to memories, such as the main memory 808 and secondary memory 810 , which may be memory semiconductors (e.g., Dynamic Random Access Memory (DRAM), etc.). These computer program products may be means for providing software to the computer system 800 .
  • Computer programs e.g., computer control logic
  • Such computer programs may enable computer system 800 to implement the present methods as discussed herein.
  • the computer programs when executed, may enable processor device 804 to implement the methods as discussed herein. Accordingly, such computer programs may represent controllers of the computer system 800 .
  • the software may be stored in a computer program product and loaded into the computer system 800 using the removable storage drive 814 , interface 820 , and hard disk drive 812 , or communications interface 824 .
  • the processor device 804 may comprise one or more modules or engines configured to perform the functions of the computer system 800 .
  • Each of the modules or engines may be implemented using hardware and, in some instances, may also utilize software executed on hardware, such as corresponding to program code and/or programs stored in the main memory 808 or secondary memory 810 .
  • program code may be compiled by the processor device 804 (e.g., by a compiling module or engine) prior to execution by the hardware of the computer system 800 .
  • the program code may be source code written in a programming language that is translated into a lower level language, such as assembly language or machine code, for execution by the processor device 804 and/or any additional hardware components of the computer system 800 .
  • the process of compiling may include the use of lexical analysis, preprocessing, parsing, semantic analysis, syntax-directed translation, code generation, code optimization, and any other techniques that may be suitable for translation of program code into a lower level language suitable for controlling the computer system 800 to perform the functions disclosed herein. It will be apparent to persons having skill in the relevant art that such processes result in the computer system 800 being a specially configured computer system 800 uniquely programmed to perform the functions discussed above.

Abstract

A system/method for secure communication between client devices includes receiving a request, at a secure communication platform, from a from a first client device to communicate with a second client device; determining, by the secure communication platform, whether the first client device is permitted to communicate with the second client device; if communication is permitted: generating, by the secure communication platform, a one-time use ephemeral key; transmitting, by the secure communication platform, the generated one-time use ephemeral key to the first and second client devices; establishing, by the secure communication platform, a secure communication session directly between the first and second client devices, wherein communications between the first and second client devices are encrypted and decrypted using the one-time use ephemeral key; and destroying, by the secure communication platform, the one-time use ephemeral key upon termination of the secure communication session between the first and second client devices.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application is related to and claims the benefit of priority to U.S. Provisional Patent Application No. 62/979,711, filed Feb. 21, 2020, and U.S. Non-Provisional patent application Ser. No. 17/179,852, filed Feb. 19, 2021, the entire contents of which are incorporated herein by reference.
  • FIELD OF THE DISCLOSURE
  • The present disclosure is directed toward secure communications and, in particular, toward a cloud-based management service platform that enables rapid stand-up and tear-down of doubly encrypted enclaves between two enabled endpoints (also referred to as client devices).
  • BACKGROUND OF THE DISCLOSURE
  • Internet communications have a vital impact on today's society, allowing individuals to have a wider range of communication and interactions. These range from sharing thoughts and experiences, to doing business online, completing financial transactions online, conducting Internet banking online, and sharing confidential and proprietary information and data online. With the proliferation of Internet communications and computer networks, there have arisen a growing number of unscrupulous individuals seeking to access such confidential information and data communications over computer networks. As such, security is a pressing concern to prevent the theft of confidential/personal information and data.
  • Secure communication is desired when two entities are communicating with one another and they do not want a third party to listen in or view data transmissions. Secure communications include means by which information and data can be shared with varying degrees of certainty that third parties cannot intercept what was transmitted.
  • As the speed at which Internet communications has increased, it has become increasingly difficult to provide the required level of security for such transactions using heavy traditional and manual processes and equipment such as, for example, Virtual Private Networks (VPN), VPN concentrators, binary/static key messaging systems, etc.
  • The disclosed system and method is directed toward overcoming one or more of the above-mentioned problems, though not necessarily limited to embodiments that do.
  • SUMMARY OF THE DISCLOSURE
  • The disclosed system and method is a result of the need to solve a gap in current technical capabilities, that gap being the desire to have systems that “automatically” connects endpoints (e.g., computers, phones, Internet of Things (IOT) devices, servers, cloud hosted services, cloud containers, etc.) using standard encryption (e.g., Advanced Encryption Standard (AES), SHAW BlueCurve Network Security, etc.) at the time of a communication or transaction (e.g., an Automatic Teller Machine (ATM) request and response for funds, a sensitive message between users, an online purchase, data exchanging between IOT devices, etc.) and be accomplished on any network of opportunity (any Internet Protocol (IP) network, e.g., a public Wireless Fidelity (WiFi) network, a private network, or any combination of public or private networks wired, wireless, or even satellite) all without heavy traditional and manual processes and equipment like a Virtual Private Network (VPN), VPN concentrators, and binary/static key messaging systems.
  • In telecommunications, switching between networks or communication links occurs via setup (AKA “standup”) and teardown procedures. For instance, a first client device (e.g., smartphone) making a secure connection and exchanging sensitive information with a second client device (e.g., bank server, ATM, etc.) occurs via a standup and teardown procedure that establishes and severs communication links, respectively. As will be explained herein, the disclosed system/method allows for rapid standup and teardown of doubly encrypted enclaves between client devices (or endpoints) that can work on any network.
  • Conceptually, the disclosed system and method delivers the same result as if all devices that wanted to communicate for a particular transaction were physically plugged together with a network cable for only the time of the communication and only for the particular “application” that needs to communicate. Also, each device has a private/personal VPN inside the device, with policy (all VPNs have policy) for such communication, and each endpoint has a unique one-time “encryption key” only known by that endpoint that is used for “one” communication or transaction. Once the communication is completed, the “wires” are all removed, the key is destroyed (never to be used again) and the VPN is removed.
  • To accomplish the above would be nearly impossible with today's technology capabilities, as well as impractical for situations where many hundreds, thousands or even millions of transactions a day are required. However, the technology disclosed herein is necessary in today's highly transactional environment to reduce the “attack surface” so that an attacker would not have time to intercept the communication or transaction, as once completed it would no longer exist.
  • The system and method disclosed herein deliver this capability with less overhead, no physical hardware or network components, and with less manual labor, all built with pure software.
  • To eliminate the need to manipulate a particular software applications (meaning no need for an Application Programming Interface (API), Software Development Kit (SDK) or rewrite of the application required like with other “proxy system” like software defined perimeter tools, software defined network capabilities or zero trust networks), the system leverages the concept of a “software definable virtual network adaptor” referred to and documentation as an agent or client. The disclosed system and method provides for “any IP based application” to pass traffic natively.
  • The disclosed system and method leverages an ephemeral keying method/methods that, when triggered, generate one-time use keys that are then associated with the unique connection and/or session. Note, these one-time use keys change with each and every connection and/or session. Instead of being ephemerally generated one time like many other solutions, each key is destroyed and a new one is created every time a connection and/or session occurs—i.e., a new key is generated/destroyed with every standup/teardown.
  • The system includes a “platform” made up of an auto-scaling, self-healing, microservices that operate via a fully distributed architecture. The platform can live on a cloud, in a data center, on a virtual machine, or any combination thereof. The platform can also be used between microservices, as discussed later in this disclosure. The platform can be configured so that it is only used to “coordinate” all the information necessary to “set up” these one-time, ephemeral keyed, cryptographic private networks and then steps out of the data path. The platform is also the “coordinator” for all endpoint policy. The platform is made up of a host of API plugins that can interact with “traditional backend systems” to reuse or pull common information to set policy about each endpoint. The platform in many ways is the traffic cop. One key element to keep in mind is the speed at which these transactions need to occur and how many “one-time keys” need to be generated, yet still be more efficient that traditional network gear.
  • It is understood that it would be nearly impossible to manage keys at this rate using traditional methods, and that associations between those keys would be outrageous, also removing traditional network overhead such as hardware VPNs and VPN concentrators is a key to the success of the disclosed system and method. This disclosure describes how each of the components of the system operate, and how it is possible to accomplish this capability at a scale necessary to meet today and future demands, not just in a lab.
  • Today, many applications that are built using “containers” and using orchestration technology like Kubernetes lacking the ability to leverage strong (mutual authenticated and keyed) connection between the containers that make up the application, especially those that were written over the last several years to meet the demand of “cloud computing”. Yet, the disclosed system and method, because of its adaptability and independence of hardware and traditional methods, can also be applied to protect “intra connections” between containers within a cloud (docker/Kubernetes) based application without the need to “rewrite or interface with an API”, meaning it will work with already developed applications or ones being currently built.
  • Much like the disclosed system and method does for an endpoint, server or service, it can also provide for “intra container” communication, thus providing, mutually keyed, point to point (container to container), encrypted connections based on a software defined virtual adapters that used ephemeral one-time use keys.
  • With the system and method disclosed herein, rather than an agent being deployed to an endpoint, a “side car” (common method for software add-ons in cloud computing) mechanism is used, and defined by the cloud host provider as a service that can be consumed by anyone hosting applications on the cloud provider's network. The ease of implementation make it such that only a reference to, and a definition change (e.g., only a few lines of code) within its Kubernetes orchestration, is necessary for the entire cloud application to use the transactional two way ephemeral keyed encryption between its containers. Unlike conventional “micro-segmentation products” that require tremendous rewire as well as management of an entire micro segmentation system, this capability becomes native to the cloud host fabric and is inherited by any who use it.
  • In one embodiment, a method is provided for secure communication between client devices. The method includes receiving a request, at a secure communication platform, from a from a first client device to communicate with a second client device; determining, by the secure communication platform, whether the first client device is permitted to communicate with the second client device; if communication is permitted: generating, by the individual client devices, a one-time use ephemeral key; transmitting, by the secure communication platform, the generated one-time use ephemeral keys to the first and second client devices; establishing, by the secure communication platform, a secure communication session directly between the first and second client devices, wherein communications between the first and second client devices are encrypted and decrypted using the connection specific one-time use ephemeral keys of each device; and destroying, by the endpoint device, the one-time use ephemeral key upon termination of the secure communication session between the first and second client devices.
  • In one form, the method further includes generating, by the client devices, a new one-time use ephemeral key pair for each subsequent secure communication session between the first and second client devices. The subsequent ephemeral public keys of each connection-specific pair will be transmitted and authenticated via the secure communication platform.
  • In one form, the one-time use ephemeral key includes a public-private key pair.
  • In one form, the method further includes: receiving, by the secure communication platform, control session information from the first and second client devices; and determining, by the secure communication platform, termination of the secure communication session using the received control session information.
  • In one form, the method further includes denying, by the secure communication platform, the request by the first client device if it is determined that communication is not permitted.
  • In another embodiment, a system is provided for secure communication between client devices. The system includes a secure communication platform including a processing server configured to: receive a request from a from a first client device to communicate with a second client device; determine whether the first client device is permitted to communicate with the second client device; if communication is permitted: generate a one-time use ephemeral key; transmit the generated one-time use ephemeral key to the first and second client devices; establish a secure communication session directly between the first and second client devices, wherein communications between the first and second client devices are encrypted and decrypted using the one-time use ephemeral key; and destroy the one-time use ephemeral key upon termination of the secure communication session between the first and second client devices.
  • In one form, the processing server is further configured to direct the client devices to generate a new one-time use ephemeral key for each subsequent secure communication session between the first and second client devices.
  • In one form, the one-time use ephemeral key comprises a public-private key pair.
  • In one form, the processing server is further configured to: receive control session information from the first and second client devices; and determine termination of the secure communication session using the received control session information.
  • In one form, the processing server is further configured to deny the request by the first client device if it is determined that communication is not permitted.
  • Additional features, aspects, objects, advantages, and possible applications of the disclosed system and method will become apparent from a study of the exemplary embodiments and examples described below, in combination with the Figures and the appended claims.
  • BRIEF DESCRIPTION OF THE FIGURES
  • The above and other objects, aspects, features, advantages, and possible applications of the present disclosure will be more apparent from the following more particular description thereof, presented in conjunction with the following drawings. It should be understood that like reference numbers used in the drawings may identify like components.
  • FIG. 1 is a swim lane flow diagram illustrating interaction between the first and second clients and the secure communication platform for establishing a secure communication session.
  • FIG. 2 shows an exemplary secure communication platform architecture.
  • FIG. 3 shows a block diagram of an embodiment of the secure communication platform with microservices residing in an Original Equipment Manufacturer cloud or data center infrastructure.
  • FIG. 4 shows another exemplary secure communication platform architecture.
  • FIG. 5 shows another exemplary secure communication platform architecture.
  • FIG. 6 shows an exemplary Single Packet Authorization architecture that may be used with the system.
  • FIG. 7 depicts a high-level view of an exemplary system common library.
  • FIG. 8 is an illustration of exemplary hardware architecture for an embodiment of a communication device.
  • DETAILED DESCRIPTION
  • The following description is of an embodiment presently contemplated for carrying out the systems and methods disclosed herein. This description is not to be taken in a limiting sense but is made merely for the purpose of describing the general principles and features. The scope should be determined with reference to the claims.
  • Referring to FIGS. 1-2 , a system and method are disclosed for secure communication between enabled endpoints (also referred to as client devices 202). The secure communication platform 200 (SPC) includes an elastic cloud-based eco-system of highly available geographically distributed services that work together to provision, enable, and set-up secure communication paths (also called enclaves) between any pair of enabled endpoints (client devices) anywhere on the Internet.
  • As shown in the swimlane flowchart of FIG. 1 , a first client device 202 transmits a request to the secure communication platform 200 to communicate with a second client device 202 (at 100). The secure communication platform (SCP) 200 receives the request and determines whether the first client device 202 is authorized or permitted to communicate with the second client device 202 (at 110). If communication is not permitted, the secure communication platform 200 sends a notice back to the first client device 202 that the request was denied (at 120). If communication is permitted, the secure communication platform 200 directs the endpoints to generate one-time use ephemeral keys (at 140) and transmits the generated and authenticated one-time use ephemeral keys to the first and second client devices 202 (at 150).
  • The secure communication platform 200 delivers connection parameters for the establishment of a secure communication session between the first and second client devices 202 (at 160). After establishment of direct communication, the secure communication platform 200 is removed from the secure communication session, such that the secure communication session is directly between the first and second client devices 202 (at 170). Communications between the first and second client devices 202 are encrypted and decrypted using the one-time use ephemeral key.
  • Separate from the secure communication session, the first and second client devices 202 transmit control session information to the secure communication platform 200 (at 180). The secure communication platform 200 determines when a termination of the secure communication session occurs using the received control session information (at 190). Once it is determined that the secure communication is terminated, the one-time use ephemeral key is invalidated by the secure communication platform 200 and all traffic between the first and second client devices 202 ceases (at 195).
  • Once the one-time use ephemeral key is destroyed, it is not used again. A new one-time use ephemeral key is generated for each subsequent secure communication session between the first and second client devices 202. As will be explained herein, the one-time use ephemeral key may include a public-private key pair.
  • Enabled endpoints (e.g., client devices 202) can initiate secure communications on-demand, with the resulting encrypted communication routing directly between the two communicating endpoints with no broker or other infrastructure inserted between the client devices 202. With the disclosed system, a communication functions as though the two endpoints are directly connected via a virtual Network connection. Endpoint authentication and enclave communication require mutual digital certificate verification. Further, each time an enclave communication is initiated, an ephemeral certificate is issued for the communication that is valid only for the duration of the communication. Policy (a set of protocols defining guidelines for access) is defined for each endpoint, which determines which communication is permitted between an endpoint(s) and another endpoint, service, or device. Policy also determines connection information that is specific to enclave creation with the endpoint(s).
  • The management infrastructure (e.g., the secure communication platform 200) is responsible for validating endpoints/endpoint policies, applying group and device policy, and initiating enclave creation. The management infrastructure can be deployed as a Virtual Private Cloud (VPC) 208. The VPC 208 can include a container-based microservices 204 architecture, enabling on-demand elastic scalability and API-enabled management. Intra-service communications between Docker containers require mutual certificate exchange and are encrypted.
  • Ephemeral certificates are short lived certificates that are used by applications for the purpose of proving their identity across a network and to reduce the window of vulnerability of their private keys. Each client device 202 is automated to request a new certificate for each new session (control session with the secure communication platform 200, or secure enclave connection with a peer client device 202). The secure communication platform 200, after the required validation, generates a new certificate for the next session with the client device 202. Thus, there is no administrator overhead to manage and maintain each client's keys, certificates or Certificate Revocation Lists (CRL). Instead, the system manages the regeneration of new certificates and revocation of the old ones, as needed.
  • When a client device 202 requests the secure communication platform 200 to create a new enclave session with a peer client device 202, the secure communication platform 200 provides information about the peer client device 202 (including connectivity details) that the client device 202 can use to create a secure enclave session with the peer client device 202. It should be noted that the secure communication platform 200 does this even if the client device 202 and/or peer client device 202 is/are behind Network Address Translation (NAT) firewall(s). Each client device 202 maintains a control session with the secure communication platform 200. Once the enclave is active, there is no third-party in the middle that can act as a proxy between the two client devices 202 because the control sessions that each client device 202 has with the secure communication platform 200 uses a different set of credentials and has no inroads into the enclave session between the two client devices 202. The control sessions are needed only to exchange periodic status updates.
  • The system manages communications of each client device 202 by using Client Groups definitions and Policies definitions via management API. These Client Groups and Policies can be defined globally, as well as per group or individual client device 202. These are used by the system to determine if a client device 202 can communicate with a peer client device 202. These are also used to determine which traffic between client devices 202 should be encrypted. For instance, the type of application and/or the final destination of traffic can be used to determine if the traffic should be encrypted.
  • Some embodiments include the use of Single Packet Authorization (SPA) 412 (see FIG. 4 ). SPA is a unique security technique that makes a system's cloud service invisible except to authorized client devices 202. SPA 412 is an optional feature that can be used with the system—e.g., SPA 412 can be an optional security layer. SPA 412 verifies the authenticity of client devices 202 before they may connect to their unique cloud service. SPA 412 can simultaneously and silently deny access to unauthorized client devices 202 via a dynamic firewall. After a client device 202 is authorized by SPA 412, the dynamic firewall allows connections from the authenticated client device 202 so that the protected end-points can connect to an Original Equipment Manufacturer (OEM) services and infrastructure. The dynamic firewall makes a cloud service invisible and unresponsive to port scanners. It should be noted that because SPA 412 messages can be processed faster than they can be generated and transported by client devices 202 and adversaries alike, these invisible secure communication platform 200 entry points are invulnerable to all Distributed Denial of Service (DDoS) attacks.
  • The system can be integrated into an OEM partner's infrastructure by means of API's that hook into the secure communication platform 200 and client device 202 software. The system provides a management API to be used by OEM partners to provision the secure communication platform 200, users/groups, and policies across multiple domains. These APIs can also be used to integrate provisioning of the system into a partner's administration/web management console. In addition, the APIs can allow for customizing specific components.
  • Referring to FIG. 3 , an embodiment of the secure communication platform 200 includes microservices 204 (an architecture that arranges an application as a collection of loosely coupled services) that reside in the cloud (public, private or on premises). It can be deployed inside an OEM partner's cloud or data center infrastructure. The secure communication platform 200 can include the following features:
      • 1. Docker/Microservices 204 based architecture.
      • 2. Auto-scaling and Load-Balancing.
      • 3. Logging and alerting system.
      • 4. Health Monitoring.
      • 5. API Gateway.
      • 6. Connection to a Network Operation Center (NOC) 206.
      • 7. Platform Perimeter Security (e.g., SPA 412).
      • 8. Support for Multi-Tenancy.
  • In an exemplary embodiment, system functionality is implemented as stateless (does not save client device 202 data generated in one session for use in the next session with that client device 202) microservices 204 running in Docker-based containers. The microservices 204 are not publicly accessible, and communicate with each other over end-to-end secure links, using certificates to authenticate and exchange messages. All microservices 204 work together by communicating with each other using a message-queue service (e.g., Amazon Web Service Simple Queue Service (AWS SQS)). Messages between microservices 204 are mutually authenticated and encrypted using system generated certificates uniquely identifying each microservice 204. This provides end-to-end security between the microservices 204 and does not rely on the cloud-provider-managed keys.
  • A Certificate Management Service (CMS) 408 can be used for generating and managing certificates for the client devices 202 and platform microservices 204. The CMS 408 can use the security barrier services of Vault 404 to sign and generate certificates for authorized client devices 202 and microservices 204. The CMS 408 can be configured to use a self-signed Certificate Authority (CA) by default but can also be configured via API to use a third-party Certificate Authority by its OEM partner. Separate intermediate CA's can be used to sign certificates for the clients and microservices 204.
  • Referring to FIG. 4 , in some embodiments, an Introduction Service (IS) 410 can be used to manage all communications with the client devices 202 for registration, login/logout, enclave requests, and periodic status updates. The Secure Communications Platform (200) validates a client device 202 before allowing it to establish a secure session with the secure communication platform 200, for client device 202 registration or client device 202 login. The IS 410 can achieve this by communicating with a User Management Service (UMS). The UMS manages users and groups. The IS 410 is responsible for registration of authorized client devices 202 when details unique to the client device 202, such as a password and device-specific information, is captured and stored in the user-database 400 of the secure communication platform 200. Subsequent requests to login are validated against these stored values for device-specific details. The IS 410 acts as an intermediary to obtain client device 202 policies and group members, as well as update client device 202 registration details in the secure communication platform's 200 datastore.
  • The IS 410 is also responsible to act as the intermediary when a client device 202 initiates a request for an enclave with a peer client device 202. The IS 410 checks if the client device 202 is permitted to communicate with the requested peer client device 202, and, if allowed, provides each end of the connection with credentials and connectivity details that allow them to set up a secure enclave, even if one or both of the client devices 202 are behind NAT firewalls and are not publicly reachable. The IS 410 also handles periodic status updates from client devices 202 about their enclave activity status as long as the client devices 202 stay logged in.
  • In some embodiments, a UMS 420 can be used for managing clients and groups. The primary responsibility of UMS 420 can be to handle requests from the IS 410 if a client device 202 is valid or to retrieve group members of a client device 202 to determine if a client device 202 is allowed to communicate with its requested peer client device 202. It also updates user-info in the database 400 on behalf of the IS 410. TheUMS 420 uses Structured Query Language (SQL) queries to read/write client information from/to the database 400.
  • The secure communication platform 200 allows definition of policies that are one of three types:
      • 1. Global Policies—common to the system, applies to all client devices 202.
      • 2. Group/User policies—apply to a group of client devices 202, can be overridden for a specific user.
      • 3. User Policies—Apply to a user (client device 202).
  • Each of these policies are relevant to one or more microservices 204, depending on their function.
  • In some embodiments, a Policy Management Service (SPM) 414 can be used for computing and retrieving policies that are applicable to a client device 202 or to a service based on its group membership and configured policy overrides, if any. It also provides policies that apply to each microservice 204 upon startup and whenever the policies are updated by a management administrator.
  • As noted herein, each client device 202 connects to the secure communication platform 200 using a control session and with each of its peer client devices 202 using an enclave session. In some embodiments, a Session/Enclave Management Service (SESM) 416 can be used for managing and monitoring all control and enclave sessions that are active at any given time. For instance, the SESM 416 can be configured to generate a unique session id when a new control or enclave session is created by the IS for a client device 202. It can also be configured to remove sessions that are inactive or torn down as reported by the IS 410.
  • In exemplary embodiments, a Web Console Service (WCS) 418 can be used for providing Representational State Transfer (REST) API to provision/configure the secure communication platform 200 with client users/groups/policies once it has been deployed. The WCS 418 allows Role-Based Access Control (RBAC) to administer the secure communication platform 200 and policies. Depending on the administrator's role (SuperAdmin or DomainAdmin), the administrator is allowed to manage the entire secure communication platform 200 or any one or combination of its domains. The WCS 418 can be configured to validate data passed through management APIs and store it in a Postgres database.
  • The microservices 204 that run as Docker containers are auto-scaled and load-balanced using Kubernetes (e.g., AWS Elastic Kubernetes Service (EKS)) in one or more VPC 208, based on the number of client devices 202 registered and the number of active enclave sessions at any given time.
  • The load-balancing functionality:
      • 1. Distributes client device 202 requests, or network load, efficiently across multiple clusters.
      • 2. Ensures high availability and reliability by sending requests only to instances that are online.
      • 3. Provides flexibility to automatically add or subtract services as demand dictates.
  • Auto-scaling functionality:
      • 1. Ensures that the user/policy database 400 is automatically scaled and requests are load-balanced.
      • 2. Ensures that the certificate datastore is scaled and is accessible to all CMS 408 services that are coupled with Vault 404 functionality.
      • 3. Ensures that Ejabberd (a chat server that can service a larger number of users than IS can) is scaled at a different rate than IS and its services are made available to each IS service instance.
  • All microservices 204 log their activity both at system and application (client/session activity) level. The centralized logging service is responsible for collating logs from all services and storing them for later log-viewing and alerting.
  • Examples of logs can include:
      • Activity logs (logged by IS, SESM 416):
        • Client login/logout events.
        • Client enclave creation/tear-down.
        • Client request denied due to invalid certificate or invalid password etc.
        • Admin logs in.
      • Configuration logs (logged by WCS 418):
        • Policy changes (by which admin).
        • Groups/users addition/deletion/change.
        • Admins addition/deletion infrastructure logs (logged by orchestration service (e.g., Kubernetes)).
        • A new microservice 204 start (to handle increased incoming requests or to replace an existing non-responsive one).
        • An IS service start in a new region.
        • A new cluster being added.
      • Security logs (logged by IS 410, CMS 408):
        • Security group (ACL) modified by Admin.
        • Successful/unsuccessful login by user.
        • Password change affected by users.
        • Certificate expiry/renewal for users.
        • New certificate generated/revoked for user/microservice 204.
  • Each microservice 204 is required to report its health at regular intervals to the Kubernetes engine that ensures high-availability in a load-balanced manner.
  • Referring to FIG. 5 , the secure communication platform 200 can include an API gateway that allows an OEM partner to make API calls into the secure communication platform 200. The API calls are routed through the respective microservices 204 to facilitate any needed changes (ex: adapter to route SQL queries to the partner's database). The cloud service integrates into the OEM Partner's infrastructure by providing APIs to:
      • 1. Provision and manage users (ex: Active Directory) using partner's User Management system.
      • 2. Provision and manage policies for groups/endpoints, using partner's database.
      • 3. Import a root CA for CMS 408.
      • 4. Provision and manage keys.
      • 5. Log session and enclave activity into the customer's auditing system.
  • If the OEM partner's solution includes client software that already runs on each end -point device, it is possible to incorporate functionality into the partner's client (assuming there are no physical constraints) by making calls to the client-provided API. As an example, the client device 202 registration can be executed as part of the partner's client's registration process. Agent devices 402 will provide APIs to:
      • 1. Integrate into the OEM partner's own client-software, if any.
      • 2. Integrate into the OEM partner's client installer.
      • 3. Integrate with a centralized deployment system or create drop-in installations.
      • 4. Log client activity into a central client audit log.
  • Each deployed secure communication platform 200 can be configured to optionally connect into a centrally managed NOC 206. This can be achieved via a unique Customer ID. The secure communication platform 200 can then report telemetry data and continual health status to the NOC 206. The NOC 206 uses this data to monitor all deployments to ensure that any health parameters stay within thresholds and aberrations are alerted to administrators by email/messages and handled pro-actively.
  • As noted herein, it is contemplated for the secure communication platform's 200 core microservices 204 to be not publicly reachable and to reside within VPC's 208 in one or more regions. The secure communication platform 200 is accessible using one or more public IP addresses/ports using REST API or over IPsec sessions from the clients. An agent device 402 communicates with the management service over IPsec. The management service authenticates communicating end-points, and establishes the peer-to-peer encrypted communication, removing the management service from the client device 202 to client device 202 (or peer-to-peer (P2P)) communication path. The control session monitors session activity to monitor when the secure communication completes. The enabled applications on peer client devices 202 use the encrypted enclave, via IPsec, to communicate with each other.
  • The following exemplary steps can be implemented to facilitate a client device 202 communicating a peer client device 202 via the system:
      • 1. A client device 202 is added as a client/user in the user-database 400.
      • 2. A custom client package encrypted with a unique passphrase, specifically generated for the client device 202, is installed on the client device 202. This can be done manually or using an automated central deployment system. The passphrase is needed to decrypt the package.
      • 3. The system ensures that the client package includes one-time ephemeral credentials for registration. This may be achieved by using SPA 412 followed by IPsec.
      • 4. The agent device 402 first registers with the cloud service, wherein a unique password is generated for additional security for a user-managed device.
      • 5. The cloud service issues ephemeral credentials to the agent device 402.
      • 6. The agent/client connects to the backend using the credentials.
      • 7. The system requests a new set of credentials for the next session and stores it in memory.
      • 8. If the agent device's 402 credentials username match, the client device 202 is allowed to login to the agent device 402.
      • 9. A logged in service agent (ex: an ATM machine) runs any of the enabled applications that will automatically initiate or use an existing enclave. Each new enclave uses a new set of enclave credentials to connect with the peer agent (ex: Server), as long as the peer is also online (logged in).
      • 10. The agent and peer are both enabled by the management service to reach each other directly, even if behind a NAT device.
      • 11. When a client device 202 logs out, all its connections with peer client devices 202 are torn down.
      • 12. The agent devices 402 can be set by policy to stay connected to the server at all times, renewing its ephemeral certificates periodically (based on policy), or can initiate a connection to the server whenever there is a requirement to communicate with a peer, or any other timing necessary to meet the specific requirement of the deployment.
      • 13. The agent device 402 uses a new certificate for mutual authentication every time it connects with the cloud service, or with a peer agent device 402, and in each case, the agent device 402 will request an ephemeral certificate.
      • 14. The agent device 402 generates a public private key pair. For peer-to-peer enclaves, these keys may be held in process memory. There is no need to write them to persistent storage where they may be read by adversaries or malware, because they are ephemeral.
      • 15. The client device 202 generates an X.509 Certificate Signing Request (CSR) that contains an appropriate subject field.
      • 16. The client device 202 sends the CSR message to the cloud service (along with other objects relevant to the session).
      • 17. The CMS 408, operating within the cloud service, receives the CSR message, reads the subject field in the CSR and submits it to the appropriate intermediate CA for signing. The CMS 408 sends an ephemeral one-time-use certificate back to the client device 202, and the agent device 402 receives the certificate object and it is now ready for use.
  • Short certificate lifetimes reduce the time window of vulnerability for a client device 202 and/or the session communication through compromise of the certificate. For instance, short certificate lifetimes provide “Perfect Forward Authentication” in the sense that a compromised client device 202 cannot join the agent device 402 because its private key may be used only once for authentication.
  • Referring to FIG. 6 , the SPA 412 (if used) will ensure that the secure communication platform 200 accepts requests only from client devices 202 that have a valid SPA 412 key provisioned by the secure communication platform 200. These SPA 412 keys are assigned ephemerally for every new session with the management service, thereby eliminating the key being used by an unauthorized end-point device. The following benefits can be realized with the use of SPA 412:
      • 1. The cloud services and/or OEM partner application servers running the agent device 402 are invisible to unauthorized client devices 202 and adversaries alike—all open ports are protected by a dynamic firewall that blocks all unauthorized network access.
      • 2. Client authorization is verified with a single SPA 412 datagram transmission. There is no connection, acknowledgement, or any form of feedback whatsoever.
      • 3. All SPA 412 messages are processed (e.g., processed in the Linux kernel) faster than at network speeds. SPA 412 messages contain Bitcoin-style “Proof of Work” that makes the act of forgery arbitrarily expensive, and digital signatures that require access to a client-specific secret key. They also contain time stamps and Globally Unique Identifiers (GUIDs) that make replay attacks impossible. Any forged or replayed SPA 412 messages transmitted by adversaries are detected on the basis of: a) time stamp; b) nonce; c) Proof-Of-Work; and d) a digital signature. If an adversary were to replay a captured SPA 412 message, it would need to replay the packet before it expired, and even then, the GUID from the previous transmission is used to filter replays. These attacks are ineffective and logged for possible mitigation.
      • 4. A client-specific firewall rule is installed at the backend (target server) after authorization. Adversaries (who have different IP flow characteristics) will always be silently blocked, thus maintaining invisibility.
  • The following are exemplary process steps to be used for operation of an SPA 412 within the system:
      • 1. The client device 202 generates and transmits a SPA 412 message that contains six fields:
        • i. SPA 412 version number;
        • ii. a time stamp;
        • iii. a GUID;
        • iv. padding;
        • v. Proof-of-Work (POW); and
        • vi. the Rivest, Shamir, and Adleman (RSA) signature of the client device 202.
      • 2. The SPA 412 receives the message and filters it on the basis of these fields. Illegitimate messages that are stale (or acausal), show insufficient work, or have invalid signatures, etc., are discarded without any feedback. This filtering occurs in the Linux kernel at a rate that is guaranteed to exceed the rate that any adversary can create and transport any bogus SPA 412 messages. Also, bogus messages are logged for forensic analysis.
      • 3. When a legitimate SPA 412 message is received, the SPA 412 creates a flow-specific firewall rule that will provide access to the backend to the authorized client device 202. Firewall rules are also created that provide access to approved application servers.
      • 4. The dynamic firewalls are updated with the new rules that are communicated with end-to-end encryption.
      • 5. The authorized client device XX connects to the backend and the application servers via the installed firewall rules, and authenticates itself with ephemeral certificates. SPA 412 operates at the IP network layer, whereas authentication operates at the session layer.
  • A single secure communication platform 200 can support multiple tenants. But the clusters of microservices 204, datastore, certificate issuing authority, and domain names are separately maintained so that there is no overlap of control data nor enclave session traffic between any two tenants. The secure communication platform 200 can be deployed using Kubernetes/Terraform. Kubernetes orchestration of all microservices 204 may be provisioned by Terraform.
  • The secure communication platform 200 deployment is optimized for the needs of each OEM partner. The important factors that are to be considered and fed into the deployment engine are:
      • 1. Regions and cloud-providers (e.g., AWS) made available for the secure communication platform 200, which can be based on density of end-user devices.
      • 2. Mechanism for downloading the client packages (ex: Client app store, One-time web-link, manual deployment of other).
      • 3. Partner component definitions—ex: Root CA certificates, database credentials, cloud-provider credentials, Active Directory access credentials.
      • 4. Scalability factors (maximum number of simultaneous client devices 202 by region, thresholds for deploying new services (ex: minimum acceptable sessions/sec).
      • 5. Ports to be used for the control sessions and enclaves, which can be determined by firewall limitations and access-rules in regions where client devices 202 are located.
  • When a client device 202 is added to the system (e.g., via management API), some of the policies applicable to a client device 202 can be discovered during client installation:
      • 1. The client type to be supported—if the client device 202 is managed/unmanaged and the OS platform it runs on.
      • 2. Firewall, NAT, and Maximum Transmission Unit (MTU) restrictions, if any, in the client device's 202 path of connectivity to the Internet that determine the port that can be used on the client device 202.
      • 3. Network bandwidth available to the client device 202.
  • The client devices 202 can run on Windows, Linux, or Android-based end-points. Client devices 202 can be user-managed (human interfacing with a machine) or unmanaged (ex: a server/service or IoT device). A client device 202 is added to a secure communication platform 200 through the management API. When a client device 202 is added to the secure communication platform 200, a unique set of credentials are provided for installation on the client device 202, along with the client software. The credentials allow the secure communication platform 200 to identify the client device 202 when it first registers. The credentials are unique to the client device 202 and cannot be re-used on any other end-point, making it impossible for an end-point to be spoofed. The client device 202 creates a virtual network adapter, and the client software encrypts all traffic routed through the virtual network adapter while all traffic coming in through the adapter is decrypted by the client software.
  • The client device 202 registers with the management service (via the secure communication platform 200) the very first time with its one-time registration credentials and using the Uniform Resource Locator/Internet Protocol (URL/IP) address provided as part of its registration package. As part of registration, the client device 202 receives a new set of credentials that it uses to log in/sign in to the system. Once signed in, the client device 202 has a control session with the management service. It is free to accept enclaves from peer client devices 202 in its roster or initiate connections to any of the peer client devices 202 on its roster. The client device 202 uses the control session to request the management service to set up a new enclave and receives notifications about an enclave request from a peer client device 202 on the control session. The control session is kept alive by periodic status updates.
  • When a client device 202 requests an enclave to be created with a peer client device 202, the secure communication platform 200 checks if it is allowed, and, if so, provides the routable IP address of each peer client device 202 to the other and new certificates to each end-points. The client devices 202 use these new certificates to establish a new IPsec session between themselves. Since the private keys corresponding to the new certificates are known only to the client devices 202, all traffic between them is visible to only the two peer client devices 202 and none other.
  • Client devices 202 are deployed by installing a client application along with a unique client package that holds credentials and other installation related details unique to each client device 202. The client-package is generated by means of invoking a management API after adding a client to the management service. The actual deployments can be done in several ways, including but not limited to:
      • 1. Manual installation on client device 202 using a Universal Serial Bus (USB) with client application and client-package.
      • 2. Installation from the app-store (in case of Android or Windows).
      • 3. A one-time use web-link provided to the users with a unique password via an out-of-band mechanism (such as email). The web-link will allow the user to download the client application and/or the client package after entering a provided passcode for identity-validation.
      • 4. Installing and registering a client device 202 through calls into the client management API.
  • Once deployed, the client devices 202 are registered with their management service as part of installation. Thereafter, depending on the type of client device 202, the client device 202 may stay logged in and auto-accept connection requests from peer client devices 202, auto-connect to peer client devices 202 in its group, or connect to peer client devices 202 and accept connection requests manually as needed.
  • When a client device 202 needs to be removed from the system, an administrator marks it as disabled for the system. Then that client device's 202 current certificates are marked as disabled. This action prevents the agent device 402 from establishing any new IPSec sessions to communicate with the backend. Any existing connections are terminated and all enclave sessions with peer client devices 202 are terminated by forcing them to terminate their respective enclave-sessions.
  • The following is an exemplary agent device 402 lifecycle process.
  • Provisioning of an Agent
  • When a user is added to the agent device 402, a client package is generated that contains cryptographic material and other information that will allow the client to register. This package is protected with a secret user-specific passphrase. The agent software installed on each client allows connecting to multiple network domains to be operated on the same device by creating separate profiles for each domain. Each domain can use a pool of private network IP addresses that are assigned to each registered agent device 402. The installation package includes:
      • 1. Username—corresponding to Username+domain+platform (unique across the installation).
      • 2. SPA 412 private key for registration.
      • 3. One-time-use X509 registration certificate and RSA-2048 private key (generated by the cloud service).
      • 4. Domain.
      • 5. Auto-registration option (yes/no).
      • 6. Cipher suites allowed.
      • 7. Backend IP address(es) and SPA 412 transport protocol and port.
      • 8. A timestamp.
      • 9. A digital signature.
  • When a user/device is added, the management service stores a copy of the client device's 202 SPA 412 registration public key, a one-time-use public key, and a certificate serial number in the user database 400 for the next login session's validation.
  • Before registration commences, if the client device 202 sends an SPA 412 message to the cloud service, the SPA 412 searches its cached SPA 412 public keys to identify the one that validates its signature and then installs a firewall rule for the registration. If the SPA 412 operation fails to open the firewall for this client device 202, it pauses and retries until the SPA 412 is successful. The client device 202 can be identified by the source IP address in the SPA 412 message packet.
  • Client Registration Process
  • The agent device 402 performs the following:
      • 1. Sends a SPA 412 message, if it is SPA 412-enabled.
      • 2. Creates an IPSec tunnel to the management service and authenticates itself with its pre-assigned one-time-use certificate.
      • 3. It dictates its allowed cipher suites and does not proceed with registration if none are acceptable.
      • 4. It creates key pairs for IPSec and SPA 412 (if enabled) for its next login to the backend.
      • 5. It sends the following information to the management service:
        • a. The version number.
        • b. Salted and hashed user password.
        • c. Domain identity.
        • d. The SPA 412 public key (if enabled) to be used for the next login.
        • e. A CSR for an agent certificate for the next login session.
  • The management service performs the following:
      • 1. Receives an incoming IPsec connection from the client device 202, validates the client certificate, and checks its revocation status (e.g., using online Certificate Status Protocol (OCSP)).
      • 2. Validates that the username, device, and control serial number from the certificate matches the certificate serial number stored for the client device 202 in the user database 400.
      • 3. Stores the client information in the user database 400.
      • 4. Passes the CSR message to the CMS 408 for signature, by an appropriate intermediate CA. This ephemeral certificate is used for the next login session.
  • The agent device 402 receives the ephemeral certificate, the SPA 412 port number, and the backend IP addresses for its next login. The agent device 402 is now fully registered. The cloud service revokes the one-time-use certificate and closes the IPSec connection.
  • Client Login Process
  • The agent device 402 creates and transmits the SPA 412 message to open the firewall if SPA 412 is enabled. It uses its ephemeral login certificate to create an IPSec connection to the cloud service. After the IPSec connection is available, the agent device 402 logs in using the client device's 202 password and sends:
      • 1. The version number.
      • 2. Login username (including device and domain).
      • 3. CSR with a signature to generate an ephemeral certificate for the next login.
      • 4. SPA 412 public key for the next login if SPA 412 is enabled.
  • The management service:
      • 1. Verifies that the Client Certificate is valid and not revoked (e.g, using OCSP).
      • 2. Verifies that the username and serial number from the ephemeral certificate matches information in the client/user database 400.
      • 3. Validates the password as a second factor of authentication.
      • 4. Stores the login SPA 412 public key for next login (if enabled for SPA 412).
      • 5. Generates a new certification and updates the new control serial number in user database 400 for client device 202.
  • The agent device 402 receives:
      • 1. The ephemeral certificate for its next login session.
      • 2. Session-specific policies/settings including the-enabled applications and the-enabled destinations.
      • 3. A list of peers for its group.
  • The agent device 402 is now logged in with the management service, and available to initiate or receive enclaves.
  • Client Enclave Request
  • The agent device 402 generates an enclave request in one of three ways:
      • When the agent device 402 explicitly requests to set up an enclave with a peer (managed client); or
      • Automatically based on client device 202 settings (auto-enclave option/unmanaged client); or
      • Enclave-on-demand triggered by traffic from the-enabled application.
  • The client device 202 enclave is established with an exchange between the client device 202 and the management service, which involves the following:
      • 1. The agent device 402 sends a request to the backend in an enclave request with a specific peer or named service.
      • 2. The management service: a.) validates username and session ID; b.) checks if peer is logged in and if the two peers are allowed to form an enclave with each other; c.) generates an enclave ID unique to the enclave; and d.) forwards the enclave request to the peer and the peer accepts the enclave request.
      • 3. The peer: a.) if the peer accepts, it generates a CSR containing the enclave ID as the subject alternative name; b.) accepts the enclave request attaching the CSR in its response.
      • 4. The management service requests the client to generate a CSR passing it the enclave ID.
      • 5. The agent device 402 generates a CSR with the enclave ID as subject alternative name and sends it.
      • 6. The management service: a.) generates new certificates for the client and peer; b.) sends enclave parameters including the above to both client and peer.
    The Peer-to-Peer Enclave
  • The peer-to-peer enclave is set up by the following:
      • 1. A connection is created with the client IP address using port number specified in enclave parameters over an IPSec tunnel using the enclave certificates.
      • 2. Enclave ID is passed during establishment of IPSec tunnel.
      • 3. Once our enclave is established, the application data is passed within the enclave.
      • 4. Incoming packets received in the enclave on the adapter are decrypted and forwarded back to the enabled application.
      • 5. Each client device 202 sends a periodic enclave status update to the management service.
    Enclave Termination
  • When a client device 202 or its peer device 202 terminate an enclave, the termination is reported back by the client device 202 to the backend by passing the enclave ID. If both client devices 202 fail to report the termination, the backend detects it after an idle timeout in enclave status update and terminates the sessions. Termination of an enclave on the agent involves disconnection of the IPsec session and removal of certificate used for the enclave. Termination on the backend involves updating the enclave status to disconnected and continuing to log out.
  • Logout
  • When a client device 202 logs out, the backend marks the client device 202 as unavailable for connections and closes the firewall rule allowing traffic from the client device 202.
  • It should be noted that the cloud service can generate its own keys or can be configured to use the OEM partner's Key Management System. Generation of certificates for the agent devices 402 can use the OEM customer's CA as root, if provided, and a certificate chain that includes the CA as intermediate CA. If not, the system provides its own root CA. All keys generated by the agent devices 402 can optionally leverage random-number-generator functions, if available on the client device 202. All signing operations inside the agent devices 402 can also optionally leverage Trust Platform Module (TPM) functionality on the client device 202. All keys on the cloud service are generated by using a secure random number generator. The agent device 402 is uniquely identified by its username. The CSR and certificate subject field embed the user name:platform in their common name, e.g., user name::device (ex: Mary::windows10).
  • IPsec stack used in the agent device 402 supports:
      • 1. Authentication Methods:
        • RSA Signatures (2048, 4096 are supported. Custom key sizes also supported).
      • 2. Encryption Algorithms:
        • AES (Key sizes 128, 192, 256).
        • AES Encryption Modes: GCM, CTR, GMAC, XCBC.
      • 3. Integrity Algorithms: SHA2-256, SHA2-384, SHA2-512.
      • 4. Key Agreement:
        • Diffie Hellman (2048, 3072, 4096, 6144, 8192).
    Common Library for Microservers
  • FIG. 7 depicts a high-level view of the system common library. The system common library provides software modules that are used by all other microservices 204. The common library includes m(REF BACK TO 700) messaging (e.g., Simple Queue Service (SQS)), certificate management, cryptographic functions, other miscellaneous functions, etc. The common library can be written in Go language. cln addition, a “C” language wrapper can be provided so applications written in other languages including C/C++, Java and Python can directly use the library.
  • The Microservice Messaging Library (MML 700) provides APIs to send and receive messages over AWS's SQS. The MML 700 transparently implements security of messages and handles message encryption and decryption within the library so the application does not need to know anything about how to encrypt and decrypt messages, or even what certificate is being used. In addition, the MML 700 implements a Request/Response paradigm over the microservice messages. The Microservice Message Bus is secured via credentials that are injected into the individual containers.
  • The Crypto provides encryption/decryption of JavaScript Object Notation (JSON) messages using the standard Json Web Encryption (JWE). It also provides APIs to sign and verify JSON messages using JSON Web Signatures (JWS). JWE provides a standards-based method to encode JSON messages. The messages are encrypted using the public key of the recipient. For encryption, an AES algorithm can be used with a 256-bit key in Galois Counter Mode (GCM). This mode provides combined encryption and message integrity. A RSA Optimal Asymmetric Encryption Padding (RSA-OAEP) mode can be used to encrypt the AES encryption key.
  • For JWS Signatures, RSA is used. The crypto 702 has support for additional features used with signatures such as timestamps, replay detection, and proof of work. These are handled within the crypto library so the applications do not need to implement these. The window for valid timestamp is configurable (e.g., the default can be 5 minutes). The amount of work needed for proof of work is also configurable, and, by default, it can be disabled (set to 0). With the JWE based encryption/decryption, the crypto library identifies and retrieve the public key used for encryption of message, and if the key is not available, it requests the key from CMS 408. The CMS microservice retrieves the key from Vault 404. It also identifies and retrieves the private key used for decryption of message.
  • The Certificate Management 408 implements automated certificate management. Certificates are automatically retrieved from the Vault database 406, as needed. When a microservice 204 needs to send a message to another microservice 204, it needs to encrypt the message. Encryption requires the certificate of the recipient of the message. This certificate is obtained from Vault 404 by sending a request to CMS 408. The following sequence of operations are performed by the common library during initialization when the service is launched.
      • 1. The certificate and private key for the service are loaded from the local file system, if these exist. The filenames are based on the configured base directory and the configured service name. The names are derived as follows:
        • Certificate: BASEDIR/ca/certs/SERVICENAME-cert.pem
        • Private Key: BASEDIR/ca/private/SERVICENAME-privkey.pem
      • 2. The certificate for CMS 408 is loaded. This is needed to retrieve certificates for other microservices 204 from CMS 408.
      • 3. If the certificate or private key is not found in step 1, then a new private/public key pair is generated and a CSR message is generated. The CSR is sent to CMS 408 to get the certificate for the service. This certificate is saved to local file system so it is available for future use.
      • 4. If the certificate and private key is found in step 1, then its expiration date is checked. If the certificate has expired, it is not used, and step 3 is performed to generate a new certificate.
      • 5. The certificate and private key are kept cached in memory and also saved to disk for future use.
      • 6. When a service needs to communicate with another service, it looks up the certificate for the recipient service. If it exists in cached memory, it is used unless it has expired. If the certificate does not exist or has expired, then the certificate is retrieved by sending a GetCert message to CMS 408.
  • FIG. 8 illustrates a representative computer system 800 in which embodiments of the distributed architecture of the present disclosure, or portions thereof, may be implemented as computer-readable code. For example, the client devices, communication devices, servers, routers, services, and endpoints disclosed herein may be implemented in whole or in part by a computer system 800 using hardware, software, firmware, non-transitory computer readable media having instructions stored thereon, or a combination thereof and may be implemented in one or more computer systems or other processing systems. Hardware, software executed in a processor, or any combination thereof may embody modules and components used to implement the methods and steps of the present disclosure.
  • As previously noted, the distributed architecture of the present disclosure can live on a cloud, in a data center, on a virtual machine, or any combination thereof, and even can be used between micro services as discussed later in this disclosure. As Internet use has become more popular, “cloud computing” has become more predominant. Cloud computing may be used as an alternative to having local servers or personal devices handling users' applications. In general, cloud computing may indicate that function or storage comes from “the cloud”. The cloud is often understood to mean a public network, possibly based on TCP/IP networks, specifically often assumed to be the Internet, so that function within the environment does not come from a specific identifiable device. The architecture behind cloud computing may include a network of “cloud servers” interconnected as if in a grid running in parallel, sometimes using techniques of virtualization, to maximize computing power per computer and/or server. In general, cloud computing may represent a subset of grid computing that may include utility computing and other approaches to the use of shared computing resource.
  • If programmable logic is used, such logic may execute on a commercially available processing platform configured by executable software code to become a specific purpose computer or a special purpose device (e.g., programmable logic array, application-specific integrated circuit, etc.). A person having ordinary skill in the art may appreciate that embodiments of the disclosed subject matter can be practiced with various computer system configurations, including multi-core multiprocessor systems, minicomputers, mainframe computers, computers linked or clustered with distributed functions, as well as pervasive or miniature computers that may be embedded into virtually any device. For instance, at least one processor device and a memory may be used to implement the above-described embodiments.
  • A processor unit or device as discussed herein may be a single processor, a plurality of processors, or combinations thereof. Processor devices may have one or more processor “cores.” The terms “computer program medium,” “non-transitory computer readable medium,” and “computer usable medium” as discussed herein are used to generally refer to tangible media such as a removable storage unit 818, a removable storage unit 822, and a hard disk installed in hard disk drive 812.
  • Various embodiments of the present disclosure are described in terms of this representative computer system 800. After reading this description, it will become apparent to a person skilled in the relevant art how to implement the present disclosure using other computer systems and/or computer architectures.
  • Although operations may be described as a sequential process, some of the operations may in fact be performed in parallel, concurrently, and/or in a distributed environment, and with program code stored locally or remotely for access by single or multi-processor machines. In addition, in some embodiments the order of operations may be rearranged without departing from the spirit of the disclosed subject matter.
  • Processor device 804 may be a special purpose or a general purpose processor device specifically configured to perform the functions discussed herein. The processor device 804 may be connected to a communications infrastructure 806, such as a bus, message queue, network, multi-core message-passing scheme, etc. The network may be any network suitable for performing the functions as disclosed herein and may include a local area network (“LAN”), a wide area network (“WAN”), a wireless network (e.g., “Wi-Fi”), a mobile communication network, a satellite network, the Internet, fiber optic, coaxial cable, infrared, radio frequency (“RF”), or any combination thereof. Other suitable network types and configurations will be apparent to persons having skill in the relevant art. The computer system 800 may also include a main memory 808 (e.g., random access memory, read-only memory, etc.), and may also include a secondary memory 810. The secondary memory 810 may include the hard disk drive 812 and a removable storage drive 814, such as a floppy disk drive, a magnetic tape drive, an optical disk drive, a flash memory, etc.
  • The removable storage drive 814 may read from and/or write to the removable storage unit 818 in a well-known manner. The removable storage unit 818 may include a removable storage media that may be read by and written to by the removable storage drive 814. For example, if the removable storage drive 814 is a floppy disk drive or universal serial bus port, the removable storage unit 818 may be a floppy disk or portable flash drive, respectively. In one embodiment, the removable storage unit 818 may be non-transitory computer readable recording media.
  • In some embodiments, the secondary memory 810 may include alternative means for allowing computer programs or other instructions to be loaded into the computer system 800, for example, the removable storage unit 822 and an interface 820. Examples of such means may include a program cartridge and cartridge interface (e.g., as found in video game systems), a removable memory chip (e.g., EEPROM, PROM, etc.) and associated socket, and other removable storage units 822 and interfaces 820 as will be apparent to persons having skill in the relevant art.
  • Data stored in the computer system 800 (e.g., in the main memory 808 and/or the secondary memory 810) may be stored on any type of suitable computer readable media, such as optical storage (e.g., a compact disc, digital versatile disc, Blu-ray disc, etc.) or magnetic tape storage (e.g., a hard disk drive). The data may be configured in any type of suitable database configuration, such as a relational database, a SQL database, a distributed database, an object database, etc. Suitable configurations and storage types will be apparent to persons having skill in the relevant art.
  • The computer system 800 may also include a communications interface 824. The communications interface 824 may be configured to allow software and data to be transferred between the computer system 800 and external devices. Exemplary communications interfaces 824 may include a modem, a network interface (e.g., an Ethernet card), a communications port, a Personal Computer Memory Card International Association (PCMCIA) slot and card, etc. Software and data transferred via the communications interface 824 may be in the form of signals, which may be electronic, electromagnetic, optical, or other signals as will be apparent to persons having skill in the relevant art. The signals may travel via a communications path 826, which may be configured to carry the signals and may be implemented using wire, cable, fiber optics, a phone line, a cellular phone link, a radio frequency link, etc.
  • The computer system 800 may further include a display interface 802. The display interface 802 may be configured to allow data to be transferred between the computer system 800 and external display 830. Exemplary display interfaces 802 may include high-definition multimedia interface (HDMI), digital visual interface (DVI), video graphics array (VGA), etc. The display 830 may be any suitable type of display for displaying data transmitted via the display interface 802 of the computer system 800, including a cathode ray tube (CRT) display, liquid crystal display (LCD), light-emitting diode (LED) display, capacitive touch display, thin-film transistor (TFT) display, etc.
  • Computer program medium and computer usable medium may refer to memories, such as the main memory 808 and secondary memory 810, which may be memory semiconductors (e.g., Dynamic Random Access Memory (DRAM), etc.). These computer program products may be means for providing software to the computer system 800. Computer programs (e.g., computer control logic) may be stored in the main memory 808 and/or the secondary memory 810. Computer programs may also be received via the communications interface 824. Such computer programs, when executed, may enable computer system 800 to implement the present methods as discussed herein. In particular, the computer programs, when executed, may enable processor device 804 to implement the methods as discussed herein. Accordingly, such computer programs may represent controllers of the computer system 800. Where the present disclosure is implemented using software executed on hardware, the software may be stored in a computer program product and loaded into the computer system 800 using the removable storage drive 814, interface 820, and hard disk drive 812, or communications interface 824.
  • The processor device 804 may comprise one or more modules or engines configured to perform the functions of the computer system 800. Each of the modules or engines may be implemented using hardware and, in some instances, may also utilize software executed on hardware, such as corresponding to program code and/or programs stored in the main memory 808 or secondary memory 810. In such instances, program code may be compiled by the processor device 804 (e.g., by a compiling module or engine) prior to execution by the hardware of the computer system 800. For example, the program code may be source code written in a programming language that is translated into a lower level language, such as assembly language or machine code, for execution by the processor device 804 and/or any additional hardware components of the computer system 800. The process of compiling may include the use of lexical analysis, preprocessing, parsing, semantic analysis, syntax-directed translation, code generation, code optimization, and any other techniques that may be suitable for translation of program code into a lower level language suitable for controlling the computer system 800 to perform the functions disclosed herein. It will be apparent to persons having skill in the relevant art that such processes result in the computer system 800 being a specially configured computer system 800 uniquely programmed to perform the functions discussed above.
  • It should be understood that the disclosure of a range of values is a disclosure of every numerical value within that range, including the end points. It should also be appreciated that some components, features, and/or configurations may be described in connection with only one particular embodiment, but these same components, features, and/or configurations can be applied or used with many other embodiments and should be considered applicable to the other embodiments, unless stated otherwise or unless such a component, feature, and/or configuration is technically impossible to use with the other embodiment. Thus, the components, features, and/or configurations of the various embodiments can be combined together in any manner and such combinations are expressly contemplated and disclosed by this statement.
  • It will be apparent to those skilled in the art that numerous modifications and variations of the described examples and embodiments are possible considering the above teachings of the disclosure. The disclosed examples and embodiments are presented for purposes of illustration only. Other alternate embodiments may include some or all of the features disclosed herein.
  • Therefore, it is the intent to cover all such modifications and alternate embodiments, which is to be given the full breadth thereof.
  • It should be understood that modifications to the embodiments disclosed herein can be made to meet a particular set of design criteria. Therefore, while certain exemplary embodiments of the device and methods of using and making the same disclosed herein have been discussed and illustrated, it is to be distinctly understood that the disclosure is not limited thereto but may be otherwise variously embodied and practiced within the scope of the following claims.

Claims (23)

What is claimed is:
1. A method of providing secure communication between client devices, the method comprising:
receiving a request, at a processing server of a secure communication platform, from a first client device to communicate with a second client device;
in response to a determination that the first client device is permitted to communicate with the second client device:
generating, by the processing server of the secure communication platform, a one-time use ephemeral key;
transmitting, by the processing server of the secure communication platform, the generated one-time use ephemeral key to both the first client device and the second client device; and
establishing, by the processing server of the secure communication platform, a peer-to-peer secure enclave communication session directly between the first client device and the second client device.
2. The method of claim 1, further comprising:
destroying, by the processing server, the one-time use ephemeral key upon termination of the peer-to-peer secure enclave communication session.
3. The method of claim 1, further comprising generating, by the secure communication platform, a new one-time use ephemeral key for each subsequent secure communication session between the first and second client devices.
4. The method of claim 1, wherein the one-time use ephemeral key comprises a public-private key pair.
5. The method of claim 1, further comprising:
receiving, by the secure communication platform, control session information from the first and second client devices; and
determining, by the secure communication platform, termination of the peer-to-peer secure enclave communication session using the received control session information.
6. The method of claim 5, further comprising:
ceasing, by the secure communication platform, all information traffic between the first client device and the second client device when termination of the peer-to-peer secure enclave communication session is determined.
7. The method of claim 1, further comprising:
denying, by the secure communication platform, the request by the first client device if it is determined that communication is not permitted.
8. The method of claim 1, further comprising:
removing the secure communication platform from the peer-to-peer secure enclave communication session so that the peer-to-peer secure enclave communication session is directly between the first and second client devices.
9. The method of claim 1, further comprising:
establishing a management infrastructure via control of the secure communication platform, the management infrastructure being deployed as a Virtual Private Cloud.
10. The method of claim 9, further comprising:
providing on-demand elastic scalability via a Docker-based microservices architecture.
11. The method of claim 1, further comprising:
verifying authenticity of at least one of the first client device and the second client device via a Single Packet Authorization security layer.
12. A system for providing secure communication between client devices, comprising:
a secure communication platform including a hardware processing server configured to:
receive a request from the first client device to communicate with the second client device;
in response to a determination that the first client device is permitted to communicate with the second client device:
generate a one-time use ephemeral key;
transmit the generated one-time use ephemeral key to both the first client device and the second client device; and
establish a peer-to-peer secure enclave communication session directly between the first client device and the second client device.
13. The system of claim 12, wherein the hardware processing server is further configured to destroy the one-time use ephemeral key upon termination of the pee-to-peer secure enclave communication session.
14. The system of claim 12, wherein the hardware processing server is further configured to generate a new one-time use ephemeral key for each subsequent secure communication session between the first and second client devices.
15. The system of claim 12, wherein the one-time use ephemeral key comprises a public-private key pair.
16. The system of claim 12, wherein the hardware processing server is further configured to:
receive control session information from the first and second client devices; and
determine termination of the peer-to-peer secure enclave communication session using the received control session information.
17. The system of claim 16, wherein the hardware processing server is further configured to cease all information traffic between the first client device and the second client device when termination of the peer-to-peer secure enclave communication session is determined.
18. The system of claim 12, wherein the hardware processing server is further configured to deny the request by the first client device if it is determined that communication is not permitted.
19. The system of claim 12, wherein the hardware processing server is further configured to remove the secure communication platform from the peer-to-peer secure enclave communication session so that the peer-to-peer secure enclave communication session is directly between the first and second client devices.
20. The system of claim 12, wherein the secure communication platform is deployed as a Virtual Private Cloud.
21. The system of claim 20, wherein the Virtual Private Cloud comprises a Docker-based microservices architecture.
22. The system of claim 12, further comprising a Single Packet Authorization security layer configured to verify authenticity of at least one of the first client device and the second client device.
23. A method of providing secure communication between client devices, the method comprising:
receiving a request, at a secure communication platform, from a first client device to communicate with a second client device;
in response to a determination that communication is permitted:
generating, by the secure communication platform, a one-time use ephemeral key; and
transmitting, by the secure communication platform, the generated one-time use ephemeral key to the first and second client devices;
establishing, by the secure communication platform, a secure communication session between the first and second client devices;
receiving, by the secure communication platform, control session information from the first and second client devices; and
determining, by the secure communication platform, termination of the secure communication session using the received control session information.
US18/117,702 2020-02-21 2023-03-06 Method and system for secure communications Pending US20230208822A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US18/117,702 US20230208822A1 (en) 2020-02-21 2023-03-06 Method and system for secure communications

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US202062979711P 2020-02-21 2020-02-21
US17/179,852 US11621945B2 (en) 2020-02-21 2021-02-19 Method and system for secure communications
US18/117,702 US20230208822A1 (en) 2020-02-21 2023-03-06 Method and system for secure communications

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US17/179,852 Continuation US11621945B2 (en) 2020-02-21 2021-02-19 Method and system for secure communications

Publications (1)

Publication Number Publication Date
US20230208822A1 true US20230208822A1 (en) 2023-06-29

Family

ID=77365482

Family Applications (2)

Application Number Title Priority Date Filing Date
US17/179,852 Active 2041-04-10 US11621945B2 (en) 2020-02-21 2021-02-19 Method and system for secure communications
US18/117,702 Pending US20230208822A1 (en) 2020-02-21 2023-03-06 Method and system for secure communications

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US17/179,852 Active 2041-04-10 US11621945B2 (en) 2020-02-21 2021-02-19 Method and system for secure communications

Country Status (4)

Country Link
US (2) US11621945B2 (en)
EP (1) EP4107903A4 (en)
JP (1) JP2023514736A (en)
WO (1) WO2021168164A1 (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11457050B1 (en) * 2020-12-10 2022-09-27 Amazon Technologies, Inc. Ephemeral data stream service
US11343195B1 (en) 2020-12-10 2022-05-24 .Amazon Technologies, Inc. Ephemeral data stream routing service
US11831638B1 (en) * 2021-04-19 2023-11-28 Amazon Technologies, Inc. Single-packet authorization using proof of work
US11785449B2 (en) * 2021-09-30 2023-10-10 Visa International Service Association Secure on-demand ultra-wideband communication channels systems and methods
CN113992365A (en) * 2021-10-15 2022-01-28 北京天融信网络安全技术有限公司 Key distribution method and device and electronic equipment
CN114257471B (en) * 2021-11-09 2024-04-05 网宿科技股份有限公司 Authentication method, network device and storage medium
CN114039949B (en) * 2021-12-24 2024-03-26 上海观安信息技术股份有限公司 Cloud service floating IP binding method and system
US11457073B1 (en) 2022-02-09 2022-09-27 coretech It, UAB Supernode graceful shutdown in a proxy infrastructure
US20240121321A1 (en) * 2022-10-05 2024-04-11 Hong Kong Applied Science and Technology Research Institute Company Limited Method and apparatus for removing stale context in service instances in providing microservices

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050050328A1 (en) * 2003-09-02 2005-03-03 Authenture, Inc. Key generation method for communication session encryption and authentication system
US20060093138A1 (en) * 2004-10-29 2006-05-04 Alain Durand Secure authenticated channel
US20170373854A1 (en) * 2016-06-22 2017-12-28 Vmware, Inc. Methods and apparatus to authenticate and differentiate virtually identical resources using session chaining
US20180210742A1 (en) * 2017-01-24 2018-07-26 Microsoft Technology Licensing, Llc Enclave abstraction model
US20190020631A1 (en) * 2017-07-12 2019-01-17 Wickr Inc. Sending Secure Communications Using A Local Ephemeral Key Pool
US20190089532A1 (en) * 2016-03-08 2019-03-21 Marvell World Trade Ltd. Methods and Apparatus for Secure Device Authentication
US20190140832A1 (en) * 2017-11-08 2019-05-09 Wickr Inc. End-to-End Encryption During a Secure Communication Session
US20190243963A1 (en) * 2018-02-07 2019-08-08 NEC Laboratories Europe GmbH Replica trusted execution environment: enabling seamless replication of trusted execution environment (tee)-based enclaves in the cloud
US20190356482A1 (en) * 2018-05-17 2019-11-21 Iot And M2M Technologies, Llc A hosted dynamic provisioning protocol with servers and a networked responder
US10762197B1 (en) * 2019-03-26 2020-09-01 Alibaba Group Holding Limited Program execution and data proof scheme using multiple key pair signatures
US20220294608A1 (en) * 2018-11-27 2022-09-15 nChain Holdings Limited Systems and methods for efficient and secure processing, accessing and transmission of data via a blockchain network

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ATE368981T1 (en) 2000-03-29 2007-08-15 Vadium Technology Inc UNIQUE PAD ENCRYPTION WITH CENTRAL KEY SERVICE AND KEY-ENABLED CHARACTERS
US20020136410A1 (en) * 2001-03-26 2002-09-26 Sun Microsystems, Inc. Method and apparatus for extinguishing ephemeral keys
SE534384C2 (en) * 2009-07-03 2011-08-02 Kelisec Ab Method of generating an encryption / decryption key
US9886267B2 (en) * 2014-10-30 2018-02-06 Equinix, Inc. Interconnection platform for real-time configuration and management of a cloud-based services exchange
RU2018125626A (en) * 2015-12-16 2020-01-16 Виза Интернэшнл Сервис Ассосиэйшн SYSTEMS AND METHODS OF PROTECTED MULTILATERAL COMMUNICATION USING AN INTERMEDIARY
US10917239B2 (en) * 2016-02-26 2021-02-09 Fornetix Llc Policy-enabled encryption keys having ephemeral policies
US10075518B2 (en) * 2016-04-06 2018-09-11 Box, Inc. Collaborator network creation using cloud-based metadata
AU2018228890B2 (en) * 2017-03-01 2020-08-06 Apple Inc. System access using a mobile device

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050050328A1 (en) * 2003-09-02 2005-03-03 Authenture, Inc. Key generation method for communication session encryption and authentication system
US20060093138A1 (en) * 2004-10-29 2006-05-04 Alain Durand Secure authenticated channel
US20190089532A1 (en) * 2016-03-08 2019-03-21 Marvell World Trade Ltd. Methods and Apparatus for Secure Device Authentication
US20170373854A1 (en) * 2016-06-22 2017-12-28 Vmware, Inc. Methods and apparatus to authenticate and differentiate virtually identical resources using session chaining
US20180210742A1 (en) * 2017-01-24 2018-07-26 Microsoft Technology Licensing, Llc Enclave abstraction model
US20190020631A1 (en) * 2017-07-12 2019-01-17 Wickr Inc. Sending Secure Communications Using A Local Ephemeral Key Pool
US20190140832A1 (en) * 2017-11-08 2019-05-09 Wickr Inc. End-to-End Encryption During a Secure Communication Session
US20190243963A1 (en) * 2018-02-07 2019-08-08 NEC Laboratories Europe GmbH Replica trusted execution environment: enabling seamless replication of trusted execution environment (tee)-based enclaves in the cloud
US20190356482A1 (en) * 2018-05-17 2019-11-21 Iot And M2M Technologies, Llc A hosted dynamic provisioning protocol with servers and a networked responder
US20220294608A1 (en) * 2018-11-27 2022-09-15 nChain Holdings Limited Systems and methods for efficient and secure processing, accessing and transmission of data via a blockchain network
US10762197B1 (en) * 2019-03-26 2020-09-01 Alibaba Group Holding Limited Program execution and data proof scheme using multiple key pair signatures

Also Published As

Publication number Publication date
US20210266303A1 (en) 2021-08-26
EP4107903A4 (en) 2023-08-23
WO2021168164A1 (en) 2021-08-26
US11621945B2 (en) 2023-04-04
EP4107903A1 (en) 2022-12-28
JP2023514736A (en) 2023-04-07

Similar Documents

Publication Publication Date Title
US11621945B2 (en) Method and system for secure communications
US11477037B2 (en) Providing forward secrecy in a terminating SSL/TLS connection proxy using ephemeral Diffie-Hellman key exchange
US20200169539A1 (en) System and method for a multi system trust chain
US10178181B2 (en) Interposer with security assistant key escrow
US10903999B1 (en) Protecting PII data from man-in-the-middle attacks in a network
US8549300B1 (en) Virtual single sign-on for certificate-protected resources
US8214635B2 (en) Transparent proxy of encrypted sessions
US20170201382A1 (en) Secure Endpoint Devices
AU2016369606A1 (en) Systems and methods for secure multi-party communications using a proxy
US20070074282A1 (en) Distributed SSL processing
US20180375648A1 (en) Systems and methods for data encryption for cloud services
WO2019178942A1 (en) Method and system for performing ssl handshake
EP3742698B1 (en) Systems and methods providing connection lease anti-theft features for virtual computing sessions
US10158610B2 (en) Secure application communication system
JP2022533520A (en) Computing system and related method for providing connection lease exchange and mutual trust protocol
US20210377239A1 (en) Method for distributed application segmentation through authorization
US11611541B2 (en) Secure method to replicate on-premise secrets in a cloud environment
Huda et al. A Proposed Cryptography Key Management in Software-Defined Networking (SDN)
이현우 Transport Layer Security Extensions for Middleboxes and Edge Computing

Legal Events

Date Code Title Description
AS Assignment

Owner name: SDSE NETWORKS, INC., VIRGINIA

Free format text: CHANGE OF NAME;ASSIGNOR:SDSE NETWORKS LLC;REEL/FRAME:063014/0899

Effective date: 20211130

Owner name: SDSE NETWORKS LLC, VIRGINIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:POLLUTRO, DENNIS VANCE;BETTADAPURA, VIJI;ILLINGWORTH, CHARLES;AND OTHERS;SIGNING DATES FROM 20160822 TO 20210218;REEL/FRAME:062932/0396

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED