Ping-Pong Wake Protocol

Core Delivery Mode for High-Security Profile

Secure Legion's stateless, serverless delivery handshake that ensures messages are only delivered when you are physically present and have unlocked your device.

1. Purpose

The Ping-Pong Wake Protocol is Secure Legion's stateless, serverless delivery handshake.

It solves one brutal requirement:

"Do not deliver a message to my device unless I am physically present and have unlocked it."

This guarantees:

Ping-Pong is the high-security mode of Secure Legion. Other users can still use the asynchronous encrypted relay mode for convenience.

2. Roles

No permanent servers or relays are required. Relays can act only as optional transport layers for wake tokens, never as message custodians.

3. Cryptographic Material

Each Secure Legion identity includes:

All private keys are stored in hardware security modules (StrongBox / Secure Enclave).

4. Lifecycle Overview

  1. Sender creates message M.
  2. M is encrypted → ciphertext C.
  3. C stored locally (encrypted queue).
  4. Sender emits encrypted Ping Token to Receiver.
  5. Receiver wakes, authenticates, sends Pong.
  6. Sender transmits ciphertext C → Receiver.
  7. Receiver decrypts and displays; C is deleted.

5. Sender Behavior

Message Preparation

Ping Creation

Ping Transport

Ping can be transmitted through:

Relays only move opaque encrypted tokens, not metadata.

6. Receiver Behavior

Wake & Authentication

Pong Response

Receiver constructs Pong:

7. Secure Transfer After Pong

  1. Sender verifies Pong and matches to queued message ID.
  2. Sender transmits ciphertext C over secure channel.
  3. Sender deletes C.
  4. Receiver decrypts in memory.
  5. For view-once messages, keys and plaintext are erased instantly.

8. Key Advantages

Device-Gated Delivery

Messages can't arrive without verified user presence.

Zero Metadata Exposure

Relays only see opaque, fixed-length encrypted blobs.

Configurable Privacy Profiles

Users can choose Ping-Pong (real-time, high-security) or Async Relay (convenience mode with encrypted time-limited storage).

9. Storage Model

Component Stored Where Notes
Ciphertext Sender Device Encrypted, TTL-based
Wake Tokens Transport Opaque, fixed-size
Private Keys Hardware Enclave Non-exportable

10. Failures & Timeouts

Each queued message has:

11. Duress PIN Integration

When a duress PIN is entered:

12. Patentable Novelty

Two-phase authenticated wake handshake (Ping → Pong).

Biometric/PIN-gated message release.

Serverless metadata-free wake transport.

Duress-triggered cryptographic revocation.

Summary

The Ping-Pong Wake Protocol gives users direct control over when and how encrypted messages are delivered.

No central servers, no metadata leaks, and no unintended deliveries — fulfilling Secure Legion's promise:

No servers. No metadata. No compromises.