Digital security bubble
First Claim
Patent Images
1. A method comprising:
- receiving, at a first device, a notification of an encrypted encapsulation from a security platform;
obtaining, by the first device, the encrypted encapsulation from the security platform in response to receiving the notification, wherein the encrypted encapsulation includes an encrypted message, an encrypted first key, and a device identifier associated with an intended recipient;
decrypting, by the first device, the encrypted encapsulation;
comparing, by the first device, the received device identifier with a local device identifier;
decrypting, by the first device, the encrypted first key using a private key of the intended recipient in response to a determination that the received device identifier matches the local device identifier;
decrypting, by the first device, the encrypted message using the first key to produce a decrypted message; and
providing, by the first device, the decrypted message to a recipient.
2 Assignments
0 Petitions
Accused Products
Abstract
A digital security bubble encapsulation is disclosed. A public key and a device identifier of at least one recipient is requested from a first server. A message containing one or more components is encrypted using a symmetric key. The symmetric key is encrypted with a public key received in response to the request. The encrypted message, the encrypted symmetric key, and the device identifier are encapsulated in a digital security bubble encapsulation. The digital security bubble encapsulation is transmitted to a second server.
110 Citations
13 Claims
-
1. A method comprising:
-
receiving, at a first device, a notification of an encrypted encapsulation from a security platform; obtaining, by the first device, the encrypted encapsulation from the security platform in response to receiving the notification, wherein the encrypted encapsulation includes an encrypted message, an encrypted first key, and a device identifier associated with an intended recipient; decrypting, by the first device, the encrypted encapsulation; comparing, by the first device, the received device identifier with a local device identifier; decrypting, by the first device, the encrypted first key using a private key of the intended recipient in response to a determination that the received device identifier matches the local device identifier; decrypting, by the first device, the encrypted message using the first key to produce a decrypted message; and providing, by the first device, the decrypted message to a recipient. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer-readable medium comprising instructions that, when executed by a processor, perform the steps of:
-
receiving a notification of an encrypted encapsulation from a security platform; obtaining the encrypted encapsulation from the security platform in response to receiving the notification, wherein the encrypted encapsulation includes an encrypted message, an encrypted first key, and a device identifier associated with an intended recipient; decrypting the encrypted encapsulation; comparing the received device identifier with a local device identifier; decrypting the encrypted first key using a private key of the intended recipient in response to a determination that the received device identifier matches the local device identifier; decrypting the encrypted message using the first key to produce a decrypted message; and providing the decrypted message to a recipient. - View Dependent Claims (9, 10, 11, 12, 13)
-
Specification