US 12,452,081 B2
System and method for cryptographic data transfer and authentication in a distributed network
Saurabh Garg, Haryana (IN); and Maneesh Sethia, Telangana, AZ (US)
Assigned to BANK OF AMERICA CORPORATION, Charlotte, NC (US)
Filed by BANK OF AMERICA CORPORATION, Charlotte, NC (US)
Filed on Sep. 1, 2023, as Appl. No. 18/241,306.
Prior Publication US 2025/0080359 A1, Mar. 6, 2025
Int. Cl. H04L 9/32 (2006.01); H04L 9/08 (2006.01); H04L 9/14 (2006.01)
CPC H04L 9/3247 (2013.01) [H04L 9/0819 (2013.01); H04L 9/0861 (2013.01); H04L 9/14 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A system for cryptographic data transfer and authentication in a distributed network, the system comprising:
a processing device; and
a non-transitory storage device comprising instructions that, when executed by the processing device, causes the processing device to perform the steps of:
receive request data for a request to transfer data from a first endpoint device to a second endpoint device;
generate a first secret key and a second secret key via an artificial neural network engine, wherein the first secret key and the second secret key are symmetrical;
distribute the first secret key and the second secret key via a cloud server, wherein the cloud server encrypts the first secret key with a first public key associated with the first endpoint device to generate an encrypted first secret key, and wherein the cloud server encrypts the second secret key with a second public key associated with the second endpoint device to generate an encrypted second secret key, wherein the first endpoint device and the second endpoint device are nodes of a distributed network;
store the encrypted first secret key and the encrypted second secret key in the cloud server;
transmit, in response to a request from the first endpoint device, the encrypted first secret key to the first endpoint device, wherein the first endpoint device obtains a decrypted first secret key from the encrypted first secret key by applying a first private key associated with the first public key; and
transmit, in response to a request from the second endpoint device, the encrypted second secret key to the first endpoint device, wherein the second endpoint device obtains a decrypted second secret key from the encrypted second secret key by applying a second private key associated with the second public key.