Decentralized authoritative messaging
First Claim
Patent Images
1. A method for accessing an encrypted communication, the method comprising:
- receiving, at a first device, a first encrypted communication from a second device, wherein a first ephemeral component and a signature of the first ephemeral component are included in a header of the first encrypted communication;
deriving, by the first device, a first key using the first ephemeral component and a second ephemeral component;
decrypting, by the first device, the first encrypted communication received from the second device using, in part, the first key;
providing, by the first device, the first decrypted communication to a user of the first device.
2 Assignments
0 Petitions
Accused Products
Abstract
A secure chat client is described that allows users to exchange encrypted communications via secure chat rooms, as well as one-to-one communications. In particular, the secure chat client allows users to create, configure, and manage secure chat rooms. Furthermore, the secure chat client provides users with the ability to recover secure messages when they obtain a new device or otherwise lose communications.
-
Citations
18 Claims
-
1. A method for accessing an encrypted communication, the method comprising:
-
receiving, at a first device, a first encrypted communication from a second device, wherein a first ephemeral component and a signature of the first ephemeral component are included in a header of the first encrypted communication; deriving, by the first device, a first key using the first ephemeral component and a second ephemeral component; decrypting, by the first device, the first encrypted communication received from the second device using, in part, the first key; providing, by the first device, the first decrypted communication to a user of the first device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for accessing an encrypted communication, the system comprising:
-
an interface configured to receive a first encrypted communication from a second device, wherein a first ephemeral component and a signature of the first ephemeral component are included in a header of the first encrypted communication; a processor configured to derive a first key using the first ephemeral component and a second ephemeral component and decrypt the first encrypted communication received from the second device using, in part, the first key; and an output configured to provide the first decrypted communication to a user of a first device. - View Dependent Claims (11, 12)
-
-
13. A non-transitory computer-readable medium comprising instructions that when, executed by at least one processor, perform the steps of:
-
receiving a first encrypted communication from a second device, wherein a first ephemeral component and a signature of the first ephemeral component are included in a header of the first encrypted communication; deriving a first key using the first ephemeral component and a second ephemeral component; decrypting the first encrypted communication received from the second device using, in part, the first key; providing the first decrypted communication to a user of a first device. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification