CPC H04L 9/3213 (2013.01) [H04L 9/0825 (2013.01); H04L 9/3247 (2013.01); H04L 67/1097 (2013.01); H04L 2209/60 (2013.01)] | 20 Claims |
1. A computerized method of secure communication performed by one or more computer processors, the method comprising:
receiving, from a monitoring service monitoring an authentication application, a token generated by the monitoring service using a private key of a public-private key pair, the token associated with a message indicating a disruption in a performance of the authentication application identified based on the monitoring;
validating the received token using a public key of the public-private key pair by verifying a signature of the received token as being generated by the private key accessible by the monitoring service;
determining an authenticity of the received token by determining the received token matches at least a portion of a stored token stored within a secure datastore by the monitoring service having write access to the secure datastore; and
modifying a service provided by a service application based on the disruption in the performance of the authentication application in response to validating the received token and determining the authenticity of the received token.
|