Digital security bubble
First Claim
Patent Images
1. A system, comprising:
- a processor configured to;
receive, at a first device, an encrypted encapsulation from a sender, wherein the encrypted encapsulation includes an encrypted communication, an encrypted first key, and a first identifier;
determine whether the first device is permitted to access the encrypted encapsulation by comparing the first identifier received in the encrypted encapsulation with a second identifier related to one or more components of the first device;
decrypt the encrypted first key using at least a second key when the first identifier matches the second identifier;
decrypt the encrypted communication using the first key to produce a decrypted communication; and
provide the decrypted communication to a recipient;
a memory coupled to the processor and configured to provide the processor with instructions.
4 Assignments
0 Petitions
Accused Products
Abstract
A digital security bubble encapsulation is disclosed. A public key and a device identifier of at least one recipient is requested from a first server. A message containing one or more components is encrypted using a symmetric key. The symmetric key is encrypted with a public key received in response to the request. The encrypted message, the encrypted symmetric key, and the device identifier are encapsulated in a digital security bubble encapsulation. The digital security bubble encapsulation is transmitted to a second server.
102 Citations
20 Claims
-
1. A system, comprising:
-
a processor configured to; receive, at a first device, an encrypted encapsulation from a sender, wherein the encrypted encapsulation includes an encrypted communication, an encrypted first key, and a first identifier; determine whether the first device is permitted to access the encrypted encapsulation by comparing the first identifier received in the encrypted encapsulation with a second identifier related to one or more components of the first device; decrypt the encrypted first key using at least a second key when the first identifier matches the second identifier; decrypt the encrypted communication using the first key to produce a decrypted communication; and provide the decrypted communication to a recipient; a memory coupled to the processor and configured to provide the processor with instructions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method, comprising:
-
receiving, at a first device, an encrypted encapsulation from a second device, wherein the encrypted encapsulation includes an encrypted communication, an encrypted first key, and a first identifier; determining, at the first device, whether the first device is permitted to access the encrypted encapsulation by comparing the first identifier received in the encrypted encapsulation with a second identifier related to one or more components of the first device; decrypting, by the first device, the encrypted first key using at least a second key when the first identifier matches the second identifier; decrypting, by the first device, the encrypted communication using the first key to produce a decrypted communication; and providing, by the first device, the decrypted communication to a user of the first device. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable medium comprising instructions that when, executed by at least one processor, perform the steps of:
-
receiving, at a first device, an encrypted encapsulation from a second device, wherein the encrypted encapsulation includes an encrypted communication, an encrypted first key, and a first identifier; determining whether the first device is permitted to access the encrypted encapsulation by comparing the first identifier received in the encrypted encapsulation with a second identifier related to one or more components of the first device; decrypting the encrypted first key using at least a second key when the first identifier matches the second identifier; decrypting the encrypted communication using the first key to produce a decrypted communication; and providing the decrypted communication to a user of the first device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification