Secure short message service (SMS) communications
First Claim
1. A system, comprising:
- a non-transitory memory; and
one or more hardware processors coupled to the non-transitory memory and configured to read instructions from the non-transitory memory to cause the system to perform operations comprising;
receiving, via a text messaging channel, an encrypted message and a first key from a first device associated with a sender;
verifying the first key based at least in part on a first identifier associated with the sender and a first variable pre-negotiated with the sender;
decrypting the encrypted message;
determining a second identifier associated with a receiver of the encrypted message;
generating a second key based on the second identifier and a second variable pre-negotiated with the receiver;
re-encrypting the decrypted message using the second key; and
transmitting, via the text messaging channel, the re-encrypted message to a second device associated with the receiver.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems, methods, and computer program products for providing secure messaging communications are disclosed. For example, a computer-implemented method may include receiving an encrypted message and a key from a sender associated with a first computing device where the encrypted message is generated by the first computing device, verifying the received key at least in part based on a comparison with a pre-determined key, processing one or more unique factors associated with the sender in view of verifying the received key, decrypting the encrypted message, re-encrypting a result of the decrypting using a key of a receiver associated with a second computing device, and sending the re-encrypted result to the receiver associated with the second computing device.
27 Citations
20 Claims
-
1. A system, comprising:
-
a non-transitory memory; and one or more hardware processors coupled to the non-transitory memory and configured to read instructions from the non-transitory memory to cause the system to perform operations comprising; receiving, via a text messaging channel, an encrypted message and a first key from a first device associated with a sender; verifying the first key based at least in part on a first identifier associated with the sender and a first variable pre-negotiated with the sender; decrypting the encrypted message; determining a second identifier associated with a receiver of the encrypted message; generating a second key based on the second identifier and a second variable pre-negotiated with the receiver; re-encrypting the decrypted message using the second key; and transmitting, via the text messaging channel, the re-encrypted message to a second device associated with the receiver. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method comprising:
-
receiving, by one or more hardware processors via a text messaging channel, an encrypted message from a first device associated with a sender; generating, by the one or more hardware processors, a first key for decrypting the encrypted message based at least in part on a first identifier associated with the sender and a first variable pre-negotiated with the sender; decrypting, by the one or more hardware processors, the encrypted message using the first key; generating, by the one or more hardware processors, a second key based at least in part on a second identifier associated with a receiver of the encrypted message; re-encrypting, by the one or more hardware processors, the decrypted message using the second key; and transmitting, by the one or more hardware processors via the text messaging channel, the re-encrypted message to a second device associated with the receiver. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory machine-readable medium having stored thereon machine-readable instructions executable to cause a machine to perform operations comprising:
-
receiving, via a text messaging channel, an encrypted message and a first key from a first device associated with a sender; verifying the first key based at least in part on a first identifier associated with the sender and a first variable pre-negotiated with the sender; decrypting the encrypted message; determining a second identifier associated with a receiver of the encrypted message; generating a second key based on the second identifier and a second variable pre-negotiated with the receiver; re-encrypting the decrypted message using the second key; and transmitting, via the text messaging channel, the re-encrypted message to a second device associated with the receiver. - View Dependent Claims (18, 19, 20)
-
Specification