US 12,470,529 B2
Platform and method for automated moving target defense
Thomas M. McNamara, Jr., Ellicott City, MD (US); and Nicholas M. Hughes, Sykesville, MD (US)
Filed by Hopr Corporation, Columbia, MD (US)
Filed on Jun. 14, 2023, as Appl. No. 18/334,875.
Application 18/334,875 is a continuation in part of application No. 17/472,799, filed on Sep. 13, 2021, granted, now 11,716,312.
Prior Publication US 2023/0328047 A1, Oct. 12, 2023
Int. Cl. G06F 7/04 (2006.01); G06F 15/16 (2006.01); H04L 9/40 (2022.01); H04L 29/06 (2006.01)
CPC H04L 63/0435 (2013.01) 7 Claims
OG exemplary drawing
 
1. A system for secure message traffic communication comprising:
an automated moving target defense (AMTD) platform server device initiating a sidecar container at two or more message traffic endpoints;
each of said sidecar containers querying a central location to retrieve identical Code Hidden in Plain Sight (CHIPS) algorithms and one or more dynamic secret elements;
each of said sidecar containers querying a central location to retrieve both lease and time-to-live timing values;
each of said sidecar containers creating an identical ephemeral symmetric secret value;
each of said sidecar containers utilizing said ephemeral symmetric secret values to create an original Machine Alias ID (MAID) at each of said message traffic endpoints;
each of said sidecar containers active to modify or update each of said original MAIDs upon expiration of lease and time-to-live timing values utilizing said identical CHIPS algorithm in each sidecar to create rotated MAIDs;
said AMTD creating an identity trust chain where each Sidecar rotates its machine alias ID (at a defined number of sessions or an expiration of a defined time period) to a new alias derived from its original machine ID alias, one or more of its previous machine ID aliases, its current machine ID alias, and a pre-established time value;
each of said sidecar containers active to encrypt message workload utilizing said ephemeral symmetric secret value;
said AMTD platform transmitting said message workload among said message traffic endpoints;
each endpoint sidecar receiving said message workload decrypting said message workload utilizing said ephemeral symmetric secret and providing said message workload to a user.