US 12,238,072 B1
Secure communications to multiple devices and multiple parties using physical and virtual key storage
Christopher Edward Delaney, Front Royal, VA (US); Chava Louis Jurado, Leesburg, VA (US); Carl Bailey Jacobs, Fredericksburg, VA (US); Jeremiah MacDonald, Greenville, SC (US); Michael Vincent Chest, Taylors, SC (US); and Walter Adeyinka Ademiluyi, Boyds, MD (US)
Assigned to Cyber IP Holdings, LLC, Herndon, VA (US)
Filed by Cyber IP Holdings, LLC, Herndon, VA (US)
Filed on Dec. 13, 2023, as Appl. No. 18/538,056.
Application 18/538,056 is a continuation of application No. 18/160,502, filed on Jan. 27, 2023, granted, now 11,888,822.
Application 18/160,502 is a continuation of application No. 16/578,547, filed on Sep. 23, 2019, granted, now 11,601,402, issued on Mar. 7, 2023.
Application 16/578,547 is a continuation in part of application No. 16/401,498, filed on May 2, 2019, granted, now 11,349,646, issued on May 31, 2022.
Claims priority of provisional application 62/666,424, filed on May 3, 2018.
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/40 (2022.01); G06F 9/451 (2018.01); H04L 9/08 (2006.01); H04L 9/32 (2006.01)
CPC H04L 63/0281 (2013.01) [G06F 9/452 (2018.02); H04L 9/0863 (2013.01); H04L 9/3268 (2013.01); H04L 63/0428 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method for establishing secure communications comprising:
sending, by a client computing device to a server, a request to instantiate a virtual key store (VKS) node, the server instantiating the VKS node in response to receiving the request and generating a cryptographically calculated uniform resource locator (URL) after instantiation of the VKS node; and
establishing, in response to the request and using the generated cryptographically calculated URL, communications between the client computing device and an instance such that the instance acts as a cryptographic proxy with at least one remote computing device such that information being sent by the application is encrypted at the VKS node and that encrypted information being sent by the at least one remote computing device is decrypted at the VKS node;
wherein:
the VKS node receives a cryptographic identity certificate from a certification authority server; and
the instance is instantiated and configured with the cryptographic identity certificate.