Methods, systems, and media for using dynamic public key infrastructure to send and receive encrypted messages
First Claim
1. A method for transmitting encrypted messages,comprising:
- generating, using a hardware processor by a first application, a first public key and a first private key corresponding to the first application;
transmitting the first public key to a second application;
receiving, from the second application, a second public key;
encrypting a first message using the second public key corresponding to the second application to form an encrypted message;
generating, by the first application, a third public key and a second private key in response to the encrypted message being about to be transmitted;
transmitting the encrypted message and the third public key to the second application;
receiving, from the second application, a second message and a fourth public key corresponding to the second application; and
decrypting the second message using the second private key.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, systems, and media for transmitting encrypted messages are provided. In some arrangements, the method comprises: generating, using a hardware processor by a first application, a first public key and a first private key corresponding to a first application; transmitting the first public key to a second application; receiving, from the second application, a second public key; encrypting a first message using the second public key corresponding to the second application; generating, by the first application, a third public key and a second private key; transmitting the encrypted message and third public key to the second application; receiving, from the second application, a second message and a fourth public key corresponding to the second application; and decrypting the second message using the second private key.
-
Citations
21 Claims
-
1. A method for transmitting encrypted messages,
comprising: -
generating, using a hardware processor by a first application, a first public key and a first private key corresponding to the first application; transmitting the first public key to a second application; receiving, from the second application, a second public key; encrypting a first message using the second public key corresponding to the second application to form an encrypted message; generating, by the first application, a third public key and a second private key in response to the encrypted message being about to be transmitted; transmitting the encrypted message and the third public key to the second application; receiving, from the second application, a second message and a fourth public key corresponding to the second application; and decrypting the second message using the second private key. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for transmitting encrypted messages, the system
comprising: a hardware processor that is programmed to; generate, by a first application, a first public key and a first private key corresponding to the first application; transmit the first public key to a second application; receive, from the second application, a second public key; encrypt a first message using the second public key corresponding to the second application to form an encrypted message; generate, by the first application, a third public key and a second private key in response to the encrypted message being about to be transmitted; transmit the encrypted message and the third public key to the second application; receive, from the second application, a second message and a fourth public key corresponding to the second application; and decrypt the second message using the second private key. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
15. A non-transitory computer-readable medium containing computer executable instructions that, when executed by a processor, cause the processor to perform a method for transmitting encrypted messages, the method comprising:
-
generating, by a first application, a first public key and a first private key corresponding to the first application; transmitting the first public key to a second application; receiving, from the second application, a second public key; encrypting a first message using the second public key corresponding to the second application to form an encrypted message; generating, by the first application, a third public key and a second private key in response to the encrypted message being about to be transmitted; transmitting the encrypted message and the third public key to the second application; receiving, from the second application, a second message and a fourth public key corresponding to the second application; and decrypting the second message using the second private key. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification