Encrypted message communication
First Claim
1. A computer-implemented method for communicating message data from a sender computer to a receiver computer via a network, the method comprising, at the sender computer:
- encrypting, by a processor, the message data in dependence on a cryptographic key to produce a ciphertext;
establishing, by the processor, an access password for the ciphertext with a host computer connected to the network and sending the access password to the host computer with the ciphertext;
sending, by the processor, the ciphertext via the network to the host computer for storage in association with the access password by the host computer; and
sending, by the processor, over the network, an email message containing said cryptographic key in cleartext, to the receiver computer via the network without requiring said processor to encrypt said cryptographic key;
wherein the cryptographic key comprises a random cryptographic value which is independent of the access password, said receiver computer configured to decrypt the ciphertext using said cryptographic key to obtain said message data.
1 Assignment
0 Petitions
Accused Products
Abstract
Computer-implemented methods are provided for communicating message data from a sender computer to a receiver computer via a network. The sender computer encrypts the message data in dependence on a cryptographic key to produce a ciphertext, and establishes an access password for the ciphertext with a host computer connected to the network. The sender computer sends the ciphertext via the network to the host computer, and sends an email, containing the cryptographic key in cleartext, to the receiver computer via the network. The cryptographic key comprises a random cryptographic value which is independent of the access password. The host computer receives the ciphertext from the sender computer and stores the ciphertext in association with the access password. The receiver computer receives the email from the sender computer and sends an access request for the ciphertext, and an input password, to the host computer via the network. The host computer, on receiving the access request and the input password, sends the ciphertext to the receiver computer via the network if the input password equals the access password. The receiver computer decrypts the received ciphertext using the cryptographic key to obtain the message data.
-
Citations
22 Claims
-
1. A computer-implemented method for communicating message data from a sender computer to a receiver computer via a network, the method comprising, at the sender computer:
-
encrypting, by a processor, the message data in dependence on a cryptographic key to produce a ciphertext; establishing, by the processor, an access password for the ciphertext with a host computer connected to the network and sending the access password to the host computer with the ciphertext; sending, by the processor, the ciphertext via the network to the host computer for storage in association with the access password by the host computer; and sending, by the processor, over the network, an email message containing said cryptographic key in cleartext, to the receiver computer via the network without requiring said processor to encrypt said cryptographic key; wherein the cryptographic key comprises a random cryptographic value which is independent of the access password, said receiver computer configured to decrypt the ciphertext using said cryptographic key to obtain said message data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-implemented method for communicating message data between a sender computer and a receiver computer via a network, the method comprising, at a host computer connected to the network:
-
receiving, at a hardware processor of said host computer, a ciphertext encrypting the message data using a cryptographic key, from the sender computer via the network; establishing, by the hardware processor, an access password for the ciphertext with the sender computer, said cryptographic key comprising a random cryptographic value which is independent of the access password; receiving, by the hardware processor, the access password from the sender computer with the ciphertext; and storing the ciphertext in association with the access password in a memory associated with said host computer; receiving, at the hardware processor, an access request for the ciphertext, and an input password, from the receiver computer via the network; and sending, by the hardware processor, the ciphertext via the network to the receiver computer if the input password equals the access password, said receiver computer obtaining said cryptographic key from said sender computer without requiring said sender computer to encrypt said cryptographic key, and said receiver computer configured to decrypt the ciphertext using said cryptographic key to obtain said message data. - View Dependent Claims (11, 12, 13)
-
-
14. A computer-implemented method for receiving message data from a sender computer via a network, wherein the message data is encrypted, in dependence on a cryptographic key comprising a random cryptographic value, in a ciphertext produced by the sender computer and the ciphertext is stored by a host computer connected to the network in association with an access password established at said sender computer and communicated to said host computer by said sender computer, said cryptographic key comprising a random cryptographic value which is independent of the access password, the method comprising, at a receiver computer connected to the network:
-
receiving, at a hardware processor of said receiver computer, an email containing said cryptographic key in cleartext, from the sender computer via the network, said email is communicated between the sender computer and the receiver computer via an email-provider system connected to the network, and said sender computer communicating said cryptographic key to the receiver computer in said e-mail without requiring said sender computer to encrypt said cryptographic key; receiving, at the receiver computer, from said sender computer, said access password independently of said email-provider system; sending, by the hardware processor, an access request for the ciphertext, and the access password, to the host computer via the network; receiving, by the hardware processor, the ciphertext from the host computer via the network; and decrypting, by the hardware processor, the ciphertext using said cryptographic key to obtain said message data. - View Dependent Claims (15, 16)
-
-
17. A computer-implemented method for communicating message data from a sender computer to a receiver computer via a network, the method comprising
at the sender computer: - encrypting the message data in dependence on a cryptographic key to produce a ciphertext;
establishing an access password for the ciphertext with a host computer connected to the network;
sending the ciphertext via the network to the host computer;
sending, by the sender computer, the established access password to the host computer with the ciphertext; and
sending an email, containing said cryptographic key in cleartext, to the receiver computer via the network without requiring said sender computer to encrypt said cryptographic key, wherein the cryptographic key comprises a random cryptographic value which is independent of the access password,at the host computer, receiving the ciphertext from the sender computer and storing the ciphertext in association with the access password, at the receiver computer, receiving said email from the sender computer and sending an access request for the ciphertext, and an input password, to the host computer via the network, at the host computer, receiving said access request and the input password from the receiver computer and sending the ciphertext to the receiver computer via the network if the input password equals the access password, and at the receiver computer, receiving the ciphertext from the host computer and decrypting the ciphertext using said cryptographic key to obtain said message data. - View Dependent Claims (18, 19, 20, 21, 22)
- encrypting the message data in dependence on a cryptographic key to produce a ciphertext;
Specification